All papers
Volume 1, Issue 1
On the Efficiency of Generic, Quantum Cryptographic Constructions
Keita Xagawa
Impossibility of Post-Quantum Shielding Black-Box Constructions of CCA from CPA
Loïs Huguenin-Dumittan, Serge Vaudenay
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs
Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López
Proximity Testing with Logarithmic Randomness
Benjamin E. Diamond, Jim Posen
Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures
Marloes Venema, Leon Botros
Verifiable Encryption from MPC-in-the-Head
Akira Takahashi, Greg Zaverucha
A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation
Dan Boneh, Benedikt Bünz, Ben Fisch
Optimizations and Practicality of High-Security CSIDH
Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers
Bit Security as Cost to Demonstrate Advantage
Keewoo Lee
A Prime-Order Group with Complete Formulas from Even-Order Elliptic Curves
Thomas Pornin
CCA Security with Short AEAD Tags
Mustafa Khairallah
Computing isogenies between finite Drinfeld modules
Benjamin Wesolowski
Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers
Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin
Understanding binary-Goppa decoding
Daniel J. Bernstein
Simple Two-Message OT in the Explicit Isogeny Model
Emmanuela Orsini, Riccardo Zanotto
Feldman's Verifiable Secret Sharing for a Dishonest Majority
Yi-Hsiu Chen, Yehuda Lindell
Post-Quantum Ready Key Agreement for Aviation
Marcel Tiepelt, Christian Martin, Nils Maeurer
Broadcast Encryption using Sum-Product decomposition of Boolean functions
Aurélien Dupin, Simon Abelard
How to Make Rational Arguments Practical and Extractable
Matteo Campanelli, Chaya Ganesh, Rosario Gennaro
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space
Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira
X-Wing The Hybrid KEM You've Been Looking For
Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karolin Varner, Bas Westerbaan
New Attacks on LowMC Using Partial Sets in the Single-Data Setting
Subhadeep Banik, Andrea Caforio, Serge Vaudenay
A provably masked implementation of BIKE Key Encapsulation Mechanism
Loïc Demange, Mélissa Rossi
Verifiable FHE via Lattice-based SNARKs
Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability
Yehuda Lindell
Computing 2-isogenies between Kummer lines
Damien Robert, Nicolas Sarkis
On the Two-sided Permutation Inversion Problem
Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi
Survey: Recovering cryptographic keys from partial information, by example
Gabrielle De Micheli, Nadia Heninger
Secure Multi-Party Linear Algebra with Perfect Correctness
Jules Maire, Damien Vergnaud
Preliminary Cryptanalysis of the Biscuit Signature Scheme
Charles Bouillaguet, Julia Sauvage
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation
Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
Samuel Bouaziz–Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu
Volume 1, Issue 2
A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems
Vincent Hwang
An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures
Gil Segev, Liat Shapira
Decentralized Multi-Client Functional Encryption with Strong Security
Ky Nguyen, David Pointcheval, Robert Schädlich
Randomness Generation for Secure Hardware Masking – Unrolled Trivium to the Rescue
Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, François-Xavier Standaert
Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?
Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan
A Comprehensive Survey on Post-Quantum TLS
Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier
A Central Limit Approach for Ring-LWE Noise Analysis
Sean Murphy, Rachel Player
Compact Key Function Secret Sharing with Non-linear Decoder
Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay
Provably Secure and Area-Efficient Modular Addition over Boolean Shares
Guilhèm Assael, Philippe Elbaz-Vincent
Communication-Efficient Multi-Party Computation for RMS Programs
Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl
Optimizing and Implementing Fischlin's Transform for UC-Secure Zero Knowledge
Yi-Hsiu Chen, Yehuda Lindell
PACIFIC Privacy-preserving automated contact tracing featuring integrity against cloning
Scott Griffy, Anna Lysyanskaya
Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom Generators
Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai
Efficient isochronous fixed-weight sampling with applications to NTRU
Décio Luiz Gazzoni Filho, Tomás S. R. Silva, Julio López
Ad Hoc Broadcast, Trace, and Revoke Plus Time-Space Trade-Offs for Attribute-Based Encryption
Ji Luo
Public-Key Authenticated Encryption with Keyword Search Made Easy
Qinyi Li, Xavier Boyen
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers
Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin
Inspector Gadget
Camille Mutschler, Laurent Imbert, Thomas Roche
Synchronous Distributed Key Generation without Broadcasts
Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak
Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication
Jianhua Wang, Tao Huang, Shuang Wu, Zilong Liu
FEDT: Forkcipher-based Leakage-resilient Beyond-birthday-secure AE
Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal
Efficient Post-Quantum Pattern Matching on Encrypted Data
Anis Bkakria, Malika Izabachène
Volume 1, Issue 3
Capybara and Tsubaki: Verifiable Random Functions from Group Actions and Isogenies
Yi-Fu Lai
Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting
Aron van Baarsen, Marc Stevens
A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level
Diego F. Aranha, Georgios Fotiadis, Aurore Guillevic
Block Cipher Doubling for a Post-Quantum World
Ritam Bhaumik, André Chailloux, Paul Frixons, Bart Mennink, María Naya-Plasencia
Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications
Jonathan Komada Eriksen, Antonin Leroux
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions
Samuel Jaques
Optimizing $c$-sum BKW and Faster Quantum Variant for LWE
Jinzheng Cao, Qingfeng Cheng, Jian Weng
Implicit Factorization with Shared Any Bits
Chunzhi Zhao, Junqi Zhang, Jinzheng Cao, Qingfeng Cheng, Fushan Wei
Quantum Procedures for Nested Search Problems with Applications in Cryptanalysis
André Schrottenloher, Marc Stevens
Efficient Maliciously Secure Oblivious Exponentiations
Carsten Baum, Jens Berlips, Walther Chen, Ivan B. Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu
Truncated multiplication and batch software SIMD AVX512 implementation for faster Montgomery multiplications and modular exponentiation
Laurent-Stéphane Didier, Nadia El Mrabet, Léa Glandus, Jean-Marc Robert
Unpacking Needs Protection A Single-Trace Secret Key Recovery Attack on Dilithium
Ruize Wang, Kalle Ngo, Joel Gärtner, Elena Dubrova
Improving Differential-Neural Cryptanalysis
Liu Zhang, Zilong Wang, Baocang Wang
Side-Channel Linearization Attack on Unrolled Trivium Hardware
Soichiro Kobayashi, Rei Ueno, Yosuke Todo, Naofumi Homma
FINALLY: A Multi-Key FHE Scheme Based on NTRU and LWE
Jeongeun Park, Barry van Leeuwen, Oliver Zajonc
Unforgeability of Blind Schnorr in the Limited Concurrency Setting
Franklin Harding, Jiayu Xu
Cryptanalysis of TS-Hash
Aleksei Udovenko
Uncloneable Quantum Advice
Anne Broadbent, Martti Karvonen, Sébastien Lord
Non-interactive Private Multivariate Function Evaluation using Homomorphic Table Lookup
Ruixiao Li, Hayato Yamana
Plaintext-based Side-channel Collision Attack
Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
Qian Guo, Erik Mårtensson, Adrian Åström
Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash
Debasmita Chakraborty, Mridul Nandi
Discrete Logarithm Factory
Haetham Al Aswad, Emmanuel Thomé, Cécile Pierrot
Matching radar signals and fingerprints with MPC
Benjamin Hansen Mortensen, Mathias Karsrud Nordal, Martin Strand
Special Soundness Revisited
Douglas Wikström
Special Soundness in the Random Oracle Model
Douglas Wikström
A Note on Related-Tweakey Impossible Differential Attacks
Xavier Bonnetain, Virginie Lallemand
Multi Designated Verifier Ring Signatures
Sebastian Kolby, Elena Pagnin, Sophia Yakoubov
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA
Yansong Feng, Abderrahmane Nitaj, Yanbin Pan
Constant-Round YOSO MPC Without Setup
Sebastian Kolby, Divya Ravi, Sophia Yakoubov
The Uber-Knowledge Assumption: A Bridge to the AGM
Balthazar Bauer, Pooya Farshim, Patrick Harasser, Markulf Kohlweiss
Almost pairwise independence and resilience to deep learning attacks
Rustem Takhanov
A Security Analysis of Restricted Syndrome Decoding Problems
Ward Beullens, Pierre Briaud, Morten Øygarden
Key Rank Estimation Methods: Comparisons and Practical Considerations
Rebecca Hay, Elisabeth Oswald
Efficiently Detecting Masking Flaws in Software Implementations
Nima Mahdion, Elisabeth Oswald
An analysis of the Crossbred Algorithm for the MQ Problem
Damien Vidal, Claire Delaplace, Sorina Ionica
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV
Robin Geelen
Efficient Algorithm for Generating Optimal Inequality Candidates for MILP Modeling of Boolean Functions
Alexander Bille, Elmar Tischhauser
Finding Practical Parameters for Isogeny-based Cryptography
Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Francisco Rodríguez-Henríquez
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge
Ida Bruhns, Sebastian Berndt, Jonas Sander, Thomas Eisenbarth
Leakage Model-flexible Deep Learning-based Side-channel Analysis
Lichao Wu, Azade Rezaeezade, Amir Ali-pour, Guilherme Perin, Stjepan Picek
Tweakable ForkCipher from Ideal Block Cipher
Sougata Mandal
Attacking trapdoors from matrix products
Thomas Decru, Tako Boris Fouotsa, Paul Frixons, Valerie Gilchrist, Christophe Petit
Information Theoretic Evaluation of Raccoon's Side-Channel Leakage
Dinal Kamel, François-Xavier Standaert, Olivier Bronchain
Analysis of Layered ROLLO-I: A BII-LRPC code-based KEM
Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, Hansol Ryu
Efficient Boolean-to-Arithmetic Mask Conversion in Hardware
Aein Rezaei Shahmirzadi, Michael Hutter
Reinventing BrED: A Practical Construction Formal Treatment of Broadcast Encryption with Dealership
Avishek Majumder, Sayantan Mukherjee
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH
Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu
Volume 1, Issue 4
Lattice-based Multi-Authority/Client Attribute-based Encryption for Circuits
Valerio Cini, Russell W. F. Lai, Ivy K. Y. Woo
Simulation-Secure Threshold PKE from LWE with Polynomial Modulus
Daniele Micciancio, Adam Suhl
Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications
Nicolas Alhaddad, Mayank Varia, Ziling Yang
Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies
Giacomo Borin, Yi-Fu Lai, Antonin Leroux
A New Paradigm for Server-Aided MPC
Alessandra Scafuro, Tanner Verber
HELP: Everlasting Privacy through Server-Aided Randomness
Yevgeniy Dodis, Jiaxin Guan, Peter Hall, Alison Lin
Fault-tolerant Verifiable Dynamic SSE with Forward and Backward Privacy
Bibhas Chandra Das, Nilanjan Datta, Avishek Majumder, Subhabrata Samajder
Proximity Gaps in Interleaved Codes
Benjamin E. Diamond, Angus Gruen
Masked Computation of the Floor Function and Its Application to the FALCON Signature
Pierre-Augustin Berthet, Justine Paillet, Cédric Tavernier, Lilian Bossuet, Brice Colombier
More Efficient Lattice-Based Electronic Voting from NTRU
Patrick Hough, Caroline Sandsbråten, Tjerand Silde
Scaling Lattice Sieves across Multiple Machines
Martin R. Albrecht, Joe Rowell
Folding Schemes with Privacy Preserving Selective Verification
Joan Boyar, Simon Erfurth
Authenticity in the Presence of Leakage using a Forkcipher
Francesco Berti, François-Xavier Standaert, Itamar Levi
A Key-Recovery Attack on a Leaky SeaSign Variant
Shai Levin
On Loopy Belief Propagation for SASCAs An Analysis and Empirical Study of the Inference Problem
Rishub Nagpal, Gaëtan Cassiers, Robert Primas, Christian Knoll, Franz Pernkopf, Stefan Mangard
Learning with Errors from Nonassociative Algebras
Andrew Mendelsohn, Cong Ling
MAYO Key Recovery by Fixing Vinegar Seeds
Sönke Jendral, Elena Dubrova
On Quantum Simulation-Soundness
Behzad Abdolmaleki, Céline Chevalier, Ehsan Ebrahimi, Giulio Malavolta, Quoc-Huy Vu
Scalable Nonlinear Sequence Generation using Composite Mersenne Product Registers
David Gordon, Arman Allahverdi, Simon Abrelat, Anna Hemingway, Adil Farooq, Isabella Smith, Nitya Arora, Allen Ian Chang, Yongyu Qiang, Vincent John Mooney III
Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes
Zihao Wei, Siwei Sun, Fengmei Liu, Lei Hu, Zhiyu Zhang
Cryptography is Rocket Science Analysis of BPSec
Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash
Mingyu Liang, Seung Geol Choi, Dana Dachman-Soled, Linsheng Liu, Arkady Yerukhimovich
Building a BBB Pseudorandom Permutation using Lai-Massey Networks
Ritam Bhaumik, Mohammad Amin Raeisi
Zero-Knowledge Proofs of Quantumness
Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng
Ultra Low-Latency Block Cipher uLBC
Guoxiao Liu, Qingyuan Yu, Liyuan Tang, Shihe Ma, Congming Wei, Keting Jia, Lingyue Qin, Xiaoyang Dong, Yantian Shen
Security Guidelines for Implementing Homomorphic Encryption
Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee
XorSHAP: Privacy-Preserving Explainable AI for Decision Tree Models
Dimitar Jetchev, Marius Vuille
Perfectly Secure Fluid MPC with Abort and Linear Communication Complexity
Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou
Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH
Varun Madathil, Alessandra Scafuro, Tanner Verber
A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography
Sam Buxbaum, Mohammad Mahmoody
Publicly-Detectable Watermarking for Language Models
Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang
On the Key-Commitment Properties of Forkcipher-based AEADs
Mostafizar Rahman, Samir Kundu, Takanori Isobe
Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice
Kamil Kluczniak
Foundations of Data Availability Sampling
Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner
An efficient combination of quantum error correction and authentication
Yfke Dulek, Garazi Muguruza, Florian Speelman
All issues
Volume | Issue |
---|---|
1 | 1 (32 papers) |
1 | 2 (22 papers) |
1 | 3 (48 papers) |
1 | 4 (35 papers) |