Communications in Cryptology IACR CiC

All papers

Volume 1, Issue 1

On the Efficiency of Generic, Quantum Cryptographic Constructions
Keita Xagawa

Impossibility of Post-Quantum Shielding Black-Box Constructions of CCA from CPA
Loïs Huguenin-Dumittan, Serge Vaudenay

Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs
Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López

Proximity Testing with Logarithmic Randomness
Benjamin E. Diamond, Jim Posen

Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures
Marloes Venema, Leon Botros

Verifiable Encryption from MPC-in-the-Head
Akira Takahashi, Greg Zaverucha

A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation
Dan Boneh, Benedikt Bünz, Ben Fisch

Optimizations and Practicality of High-Security CSIDH
Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers

Bit Security as Cost to Demonstrate Advantage
Keewoo Lee

A Prime-Order Group with Complete Formulas from Even-Order Elliptic Curves
Thomas Pornin

CCA Security with Short AEAD Tags
Mustafa Khairallah

Computing isogenies between finite Drinfeld modules
Benjamin Wesolowski

Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers
Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin

Understanding binary-Goppa decoding
Daniel J. Bernstein

Simple Two-Message OT in the Explicit Isogeny Model
Emmanuela Orsini, Riccardo Zanotto

Feldman's Verifiable Secret Sharing for a Dishonest Majority
Yi-Hsiu Chen, Yehuda Lindell

Post-Quantum Ready Key Agreement for Aviation
Marcel Tiepelt, Christian Martin, Nils Maeurer

Broadcast Encryption using Sum-Product decomposition of Boolean functions
Aurélien Dupin, Simon Abelard

How to Make Rational Arguments Practical and Extractable
Matteo Campanelli, Chaya Ganesh, Rosario Gennaro

Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space
Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira

X-Wing The Hybrid KEM You've Been Looking For
Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karolin Varner, Bas Westerbaan

New Attacks on LowMC Using Partial Sets in the Single-Data Setting
Subhadeep Banik, Andrea Caforio, Serge Vaudenay

A provably masked implementation of BIKE Key Encapsulation Mechanism
Loïc Demange, Mélissa Rossi

Verifiable FHE via Lattice-based SNARKs
Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens

Simple Three-Round Multiparty Schnorr Signing with Full Simulatability
Yehuda Lindell

Computing 2-isogenies between Kummer lines
Damien Robert, Nicolas Sarkis

On the Two-sided Permutation Inversion Problem
Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi

Survey: Recovering cryptographic keys from partial information, by example
Gabrielle De Micheli, Nadia Heninger

Secure Multi-Party Linear Algebra with Perfect Correctness
Jules Maire, Damien Vergnaud

Preliminary Cryptanalysis of the Biscuit Signature Scheme
Charles Bouillaguet, Julia Sauvage

New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation
Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang

Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
Samuel Bouaziz–Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu


Volume 1, Issue 2

A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems
Vincent Hwang

An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures
Gil Segev, Liat Shapira

Decentralized Multi-Client Functional Encryption with Strong Security
Ky Nguyen, David Pointcheval, Robert Schädlich

Randomness Generation for Secure Hardware Masking – Unrolled Trivium to the Rescue
Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, François-Xavier Standaert

Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?
Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan

A Comprehensive Survey on Post-Quantum TLS
Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier

A Central Limit Approach for Ring-LWE Noise Analysis
Sean Murphy, Rachel Player

Compact Key Function Secret Sharing with Non-linear Decoder
Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay

Provably Secure and Area-Efficient Modular Addition over Boolean Shares
Guilhèm Assael, Philippe Elbaz-Vincent

Communication-Efficient Multi-Party Computation for RMS Programs
Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl

Optimizing and Implementing Fischlin's Transform for UC-Secure Zero Knowledge
Yi-Hsiu Chen, Yehuda Lindell

PACIFIC Privacy-preserving automated contact tracing featuring integrity against cloning
Scott Griffy, Anna Lysyanskaya

Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom Generators
Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai

Efficient isochronous fixed-weight sampling with applications to NTRU
Décio Luiz Gazzoni Filho, Tomás S. R. Silva, Julio López

Ad Hoc Broadcast, Trace, and Revoke Plus Time-Space Trade-Offs for Attribute-Based Encryption
Ji Luo

Public-Key Authenticated Encryption with Keyword Search Made Easy
Qinyi Li, Xavier Boyen

A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers
Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin

Inspector Gadget
Camille Mutschler, Laurent Imbert, Thomas Roche

Synchronous Distributed Key Generation without Broadcasts
Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak

Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication
Jianhua Wang, Tao Huang, Shuang Wu, Zilong Liu

FEDT: Forkcipher-based Leakage-resilient Beyond-birthday-secure AE
Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal

Efficient Post-Quantum Pattern Matching on Encrypted Data
Anis Bkakria, Malika Izabachène

All issues

VolumeIssue
11 (32 papers)
12 (22 papers)