![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
IACR Cryptology ePrint Archive, Volume 2017
Volume 2017, 2017
- Jorge Luis Villar:
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. 1 - (Withdrawn) Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption. 2
- Mike Hamburg:
The STROBE protocol framework. 3 - Sungwook Kim, Jinsu Kim, Jae Hong Seo:
A New Approach for Practical Function-Private Inner Product Encryption. 4 - Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi:
High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves. 5 - Eduardo Ruiz Duarte:
Reduced Mumford divisors of a genus 2 curve through its jacobian function field. 6 - Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk:
Algebraic Attack Efficiency versus S-box Representation. 7 - Joshua Gancher, Adam Groce, Alex Ledger:
Externally Verifiable Oblivious RAM. 8 - Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi:
Access Control Encryption for Equality, Comparison, and More. 9 - Wutichai Chongchitmate, Rafail Ostrovsky:
Circuit-Private Multi-Key FHE. 10 - Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. 11 - Venkata Koppula, Andrew Poelstra, Brent Waters:
Universal Samplers with Fast Verification. 12 - Meilof Veeningen:
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation. 13 - Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser:
ORAMs in a Quantum World. 14 - Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes. 15 - Yevgeniy Dodis, Jonathan Katz, John P. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang:
Provable Security of Substitution-Permutation Networks. 16 - Gottfried Herold, Elena Kirshanova:
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm. 17 - Nir Bitansky:
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs. 18 - Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena:
SMART POOL : Practical Decentralized Pooled Mining. 19 - Olivier Levillain, Maxence Tury, Nicolas Vivet:
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets. 20 - Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters:
A Generic Approach to Constructing and Proving Verifiable Random Functions. 21 - Jan Camenisch, Anja Lehmann:
Privacy for Distributed Databases via (Un)linkable Pseudonyms. 22 - Nuttapong Attrapadung:
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits. 23 - Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann:
Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases. 24 - Charanjit S. Jutla, Arnab Roy:
Improved Structure Preserving Signatures under Standard Bilinear Assumptions. 25 - Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam:
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. 26 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
Scalable Multi-Party Private Set-Intersection. 27 - (Withdrawn) A Decentralized PKI In A Mobile Ecosystem. 28
- Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich:
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions. 29 - Jonathan Katz, Samuel Ranellucci, Xiao Wang:
Authenticated Garbling and Communication-Efficient, Constant-Round, Secure Two-Party Computation. 30 - Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache:
Honey Encryption for Language. 31 - Mohamed Sabt, Jacques Traoré:
Cryptanalysis of GlobalPlatform Secure Channel Protocols. 32 - Peter Pessl:
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures. 33 - Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov:
Analysis of the NORX Core Permutation. 34 - Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff:
Privacy-Preserving Classification on Deep Neural Network. 35 - Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan:
Low-Complexity Cryptographic Hash Functions. 36 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange:
Double-base scalar multiplication revisited. 37 - Fabrice Benhamouda, Florian Bourse, Helger Lipmaa:
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions. 38 - Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Preneel:
PePTCAP: A Privacy-enhancing Protocol for(Temporary) Car Access Provision. 39 - Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Practical Non-Malleable Codes from ℓ-more Extractable Hash Functions. 40 - Yongge Wang, Qutaibah M. Malluhi:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. 41 - Yuanxi Dai, Yannick Seurin, John P. Steinberger, Aishwarya Thiruvengadam:
Five Rounds are Sufficient and Necessary for the Indifferentiability of Iterated Even-Mansour. 42 - Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. 43 - Matthew McKague, David M. Eyers:
Anonymous contribution of data. 44 - Essam Ghadafi:
Efficient Round-Optimal Blind Signatures in the Standard Model. 45 - Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade:
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption. 46 - Martin R. Albrecht:
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL. 47 - Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. 48 - Rachid El Bansarkhani:
LARA - A Design Concept for Lattice-based Encryption. 49 - Peter T. Breuer:
An Obfuscating Compiler. 50 - Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
A note on VRFs from Verifiable Functional Encryption. 51 - Boris Skoric:
A short note on the security of Round-Robin Differential Phase-Shift QKD. 52 - Dimitar Jetchev, Benjamin Wesolowski:
Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem. 53 - Javier Herranz:
Attribute-Based Encryption Implies Identity-Based Encryption. 54 - Prabhat Kushwaha, Ayan Mahalanobis:
A Probabilistic Baby-Step Giant-Step Algorithm. 55 - Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. 56 - Mathias Wagner, Stefan Heyse:
Single-Trace Template Attack on the DES Round Keys of a Recent Smart Card. 57 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
WalnutDSA(TM): A Quantum Resistant Group Theoretic Digital Signature Algorithm. 58 - Kamalesh Acharya, Ratna Dutta:
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext. 59 - Jacqueline Brendel, Marc Fischlin:
Zero Round-Trip Time for the Extended Access Control Protocol. 60 - Tibor Jager, Rafael Kurek:
Continuous Collision Resistance and its Applications. 61 - Arash Afshar, Payman Mohassel, Mike Rosulek:
Efficient Maliciously Secure Two Party Computation for Mixed Programs. 62 - Chaya Ganesh, Arpita Patra:
Optimal Extension Protocols for Byzantine Broadcast and Agreement. 63 - Yin Li, Yu Zhang:
Fast Montgomery-like Square Root Computation for All Trinomials. 64 - Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint:
FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime. 65 - Seiko Arita, Sari Handa:
Subring Homomorphic Encryption. 66 - Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke:
Computation of a 768-bit prime field discrete logarithm. 67 - Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
Authenticated Encryption in the Face of Protocol and Side Channel Leakage. 68 - Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact Security of PMAC. 69 - Charlie Jacomme, Steve Kremer, Guillaume Scerri:
Symbolic Models for Isolated Execution Environments. 70 - Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers. 71 - Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki:
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes. 72 - Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee:
Visual Honey Encryption: Application to Steganography. 73 - Joo-Im Kim, Ji Won Yoon:
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication. 74 - Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
A First DFA on PRIDE: from Theory to Practice (extended version). 75 - Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version). 76 - Martin Ekerå, Johan Håstad:
Quantum algorithms for computing short discrete logarithms and factoring RSA integers. 77 - Andre Esser, Robert Kübler, Alexander May:
LPN Decoded. 78 - Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim:
Faster Bootstrapping of FHE over the Integers. 79 - Ilan Komargodski, Gil Segev:
From Minicrypt to Obfustopia via Private-Key Functional Encryption. 80 - Ivo Kubjas, Tiit Pikma, Jan Willemson
:
Estonian Voting Verification Mechanism Revisited Again. 81 - Marc Fischlin, Felix Günther:
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. 82 - Anna Johnston:
Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders. 83 - Laszlo Hars:
Hardware Bit-Mixers. 84 - Laszlo Hars:
Information Security Applications of Bit-Mixers. 85 - David Derler, Sebastian Ramacher, Daniel Slamanig:
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation. 86 - Sabyasachi Dey, Santanu Sarkar:
Cryptanalysis of full round Fruit. 87 - Subhamoy Maitra, Akhilesh Siddhanti:
A Differential Fault Attack on Plantlet. 88 - Yuri L. Borissov, Peter G. Boyvalenkov, Robert Tsenkov:
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes. 89 - Saiyu Qi, Yichen Li, Yuanqing Zheng, Yong Qi:
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. 90 - Vincent Herbert, Caroline Fontaine:
Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme. 91 - Atsushi Takayasu, Yao Lu, Liqiang Peng:
Small CRT-Exponent RSA Revisited. 92 - Vasyl Ustimenko:
On new multivariate cryptosystems based on hidden Eulerian equations over finite fields. 93 - Shalev Ben-David, Or Sattath:
Quantum Tokens for Digital Signatures. 94 - Gunnar Hartung:
Attacks on Secure Logging Schemes. 95 - Shota Yamada:
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques. 96 - Claude Carlet, Pierrick Méaux, Yann Rotella:
Boolean functions with restricted input and their robustness; application to the FLIP cipher. 97 - Vanesa Daza, Nikolaos Makriyannis:
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions. 98 - Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Vcelák, Leonid Reyzin, Sharon Goldberg:
Can NSEC5 be practical for DNSSEC deployments? 99 - Dan Boneh, Sam Kim, Hart William Montgomery:
Private Puncturable PRFs From Standard Lattice Assumptions. 100 - Jérémy Jean, Thomas Peyrin, Siang Meng Sim:
Optimizing Implementations of Lightweight Building Blocks. 101 - Serge Fehr, Louis Salvail:
Quantum Authentication and Encryption with Key Recycling. 102 - Hannes Groß, Stefan Mangard:
Reconciling d+1Masking in Hardware and Software. 103 - Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz:
Implementing BP-Obfuscation Using Graph-Induced Encoding. 104 - Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan:
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. 105 - Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun:
μchain: How to Forget without Hard Forks. 106 - Erik-Oliver Blass, Guevara Noubir:
Secure Logging with Crash Tolerance. 107 - Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic Side Channel Attacks Against RSA. 108 - Yevgeniy Dodis, Dario Fiore:
Unilaterally-Authenticated Key Exchange. 109 - Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. 110 - Jonathan Burns, Daniel Moore, Katrina Ray, Ryan Speers, Brian Vohaska:
EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves. 111 - Xavier Bultel, Pascal Lafourcade:
Zero-Knowledge Proxy Re-Identification Revisited. 112 - Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl:
Algebraic Fault Analysis of SHA-3. 113 - Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan:
Zero-Knowledge Proofs of Proximity. 114 - Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman:
An efficient self-blindable attribute-based credential scheme. 115 - Vincent Grosso, François-Xavier Standaert:
Masking Proofs are Tight (and How to Exploit it in Security Evaluations). 116 - Zhaohui Cheng:
The SM9 Cryptographic Schemes. 117 - Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
A New Structural-Differential Property of 5-Round AES. 118 - Christopher Portmann:
Quantum Authentication with Key Recycling. 119 - Rishab Goyal, Venkata Koppula, Brent Waters:
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption. 120 - David Kohel:
Twisted μ4-normal form for elliptic curves. 121 - Vadim Lyubashevsky, Gregory Neven:
One-Shot Verifiable Encryption from Lattices. 122 - Rishab Goyal, Venkata Koppula, Brent Waters:
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. 123 - Sanjam Garg
, Susumu Kiyoshima, Omkant Pandey:
On the Exact Round Complexity of Self-Composable Two-Party Computation. 124 - Payman Mohassel, Mike Rosulek:
Non-Interactive Secure 2PC in the Offline/Online and Batch Settings. 125 - Seny Kamara, Tarik Moataz:
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity. 126 - Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. 127 - Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo:
New Collision Attacks on Round-Reduced Keccak. 128 - Payman Mohassel, Mike Rosulek, Alessandra Scafuro:
Sublinear Zero-Knowledge Arguments for RAM Programs. 129 - Adi Akavia, Tal Moran:
Topology-Hiding Computation Beyond Logarithmic Diameter. 130 - Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed:
A Practical Multivariate Blind Signature Scheme. 131 - Roel Peeters, Jens Hermans, Aysajan Abidin:
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol. 132 - Christian Badertscher, Ueli Maurer:
Composable and Robust Outsourced Storage. 133 - Ryan Stanley-Oakes:
A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes. 134 - Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov:
Hashing Garbled Circuits for Free. 135 - Anna Johnston:
Dispersed Cryptography and the Quotient Ring Transform. 136 - Paul Grubbs, Thomas Ristenpart, Yuval Yarom:
Modifying an Enciphering Scheme after Deployment. 137 - François-Xavier Standaert:
How (not) to Use Welch's T-test in Side-Channel Security Evaluations. 138 - David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon:
Revisiting AES Related-Key Differential Attacks with Constraint Programming. 139 - Markus Schmidt, Nina Bindel:
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples. 140 - Dario Fiore, María Isabel González Vasco, Claudio Soriente:
Partitioned Group Password-Based Authenticated Key Exchange. 141 - Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner:
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme. 142 - Ran Canetti, Yilei Chen:
Constraint-hiding Constrained PRFs for NC1 from LWE. 143 - Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin:
Privacy-Preserving Search of Similar Patients in Genomic Data. 144 - Viet Tung Hoang, Stefano Tessaro:
The Multi-User Security of Double Encryption. 145 - Mohammad Hajiabadi, Bruce M. Kapron:
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions. 146 - Amos Beimel, Yuval Ishai, Eyal Kushilevitz:
Ad Hoc PSM Protocols: Secure Computation Without Coordination. 147 - Olivier Sanders, Cristina Onete
, Pierre-Alain Fouque:
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data. 148 - Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. 149 - Elette Boyle, Niv Gilboa, Yuval Ishai:
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation. 150 - Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay:
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption. 151 - Fermi Ma, Mark Zhandry:
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption. 152 - Iraklis Leontiadis, Ming Li:
Storage Efficient Substring Searchable Symmetric Encryption. 153 - Thorsten Kranz, Friedrich Wiemer, Gregor Leander:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. 154 - Yoshinori Aono, Phong Q. Nguyen:
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning. 155 - Orfeas Stefanos Thyfronitis Litos, Dionysis Zindros:
Trust Is Risk: A Decentralized Financial Trust Platform. 156 - Kim Ramchen:
Detecting General Algebraic Manipulation Attacks. 157 - Martin Potthast
, Christian Forler, Eik List, Stefan Lucks:
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy. 158 - Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. 159 - Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. 160 - Giorgia Azzurra Marson, Bertram Poettering:
Security Notions for Bidirectional Channels. 161 - Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. 162 - Anamaria Costache, Nigel P. Smart:
Homomorphic Encryption without Gaussian Noise. 163 - Benny Applebaum, Barak Arkis, Pavel Raykov, Prashant Nalini Vasudevan:
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations. 164 - Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. 165 - Kristian Gjøsteen, Martin Strand:
A roadmap to fully homomorphic elections: Stronger security, better verifiability. 166 - Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid:
Cloud Storage File Recoverability. 167 - Shay Gueron, Adam Langley, Yehuda Lindell:
AES-GCM-SIV: Specification and Analysis. 168 - Nicholas Hilbert, Christian S. Jensen, Dan Lin, Wei Jiang:
UFace: Your Universal Password That No One Can See. 169 - Martin Seysen:
Error-free protection of EC point multiplication by modular extension. 170 - Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan J. Shepherd:
Quantum Key Search with Side Channel Advice. 171 - Ashwin Jha, Avradip Mandal, Mridul Nandi:
On The Exact Security of Message Authentication Using Pseudorandom Functions. 172 - Marc Stevens, Daniel Shumow:
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions. 173 - Ruiyu Zhu, Yan Huang:
Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes. 174 - Goutam Paul, Souvik Ray:
Analysis of Burn-in period for RC4 State Transition. 175 - Yuval Ishai, Mor Weiss:
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge. 176 - Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson:
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets. 177 - Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
Optimal Differential Trails in SIMON-like Ciphers. 178 - Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse:
REM: Resource-Efficient Mining for Blockchains. 179 - Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang:
Robust Synchronous P2P Primitives Using SGX Enclaves. 180 - Silvia Mella, Joan Daemen, Gilles Van Assche:
New techniques for trail bounds and application to differential trails in Keccak. 181 - Leif Both, Alexander May:
The Approximate k-List Problem. 182 - Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. 183 - Guillaume Endignoux, Damian Vizár:
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models. 184 - Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:
A Virtual Wiretap Channel for Secure MessageTransmission. 185 - Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev:
A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies. 186 - H. Gopalakrishna Gadiyar, R. Padma:
The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives. 187 - Wenying Zhang, Vincent Rijmen:
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer. 188 - Jonathan Katz, Samuel Ranellucci, Xiao Wang:
Authenticated Garbling and Efficient Maliciously Secure Multi-Party Computation. 189 - Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov:
The first collision for full SHA-1. 190 - David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. 191 - (Withdrawn) Improved Hybrid Consensus Scheme with Privacy-preserving Property. 192
- Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer:
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures. 193 - Andrea Visconti, Chiara Valentina Schiavo, René Peralta:
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2). 194 - Chaoyun Li, Qingju Wang:
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices. 195 - Bao-Hong Li, Guoqing Xu, Yin-Liang Zhao:
Attribute-based concurrent signatures. 196 - Wenying Zhang, Zhaohui Xing, Keqin Feng:
A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group. 197 - Masahiro Yagisawa:
FHE with Recursive Ciphertext. 198 - Dustin Moody, Ray A. Perlner, Daniel Smith-Tone:
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme. 199 - Jan Camenisch, Manu Drijvers, Anja Lehmann:
Anonymous Attestation with Subverted TPMs. 200 - Gabriel Kaptchuk, Ian Miers, Matthew Green:
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control. 201 - Marshall Ball
, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan:
Average-Case Fine-Grained Hardness. 202 - Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan:
Proofs of Useful Work. 203 - Tomer Ashur, Daniël Bodden, Orr Dunkelman:
Linear Cryptanalysis Using Low-bias Linear Approximations. 204 - Anindya Shankar Bhandari, Dipanwita Roy Chowdhury:
ZETA: Towards Tagless Authenticated Encryption. 205 - Yongge Wang:
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes. 206 - Gizem S. Çetin, Hao Chen, Kim Laine, Kristin E. Lauter, Peter Rindal, Yuhou Xia:
Private Queries on Encrypted Genomic Data. 207 - Sylvain Ruhault:
SoK: Security Models for Pseudo-Random Number Generators. 208 - Qipeng Liu, Mark Zhandry:
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness. 209 - Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas:
Public Key Cryptosystems with Noisy Secret Keys. 210 - James Alderman, Keith M. Martin, Sarah Louise Renwick:
Multi-level Access in Searchable Symmetric Encryption. 211 - Craig Costello, Benjamin Smith:
Montgomery curves and their arithmetic: The case of large characteristic fields. 212 - Ghazal Kachigar, Jean-Pierre Tillich:
Quantum Information Set Decoding Algorithms. 213 - Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez:
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer. 214 - (Withdrawn) SEVDSI: Secure, Efficient and Verifiable Data Set Intersection. 215
- Ignacio Cascudo, Bernardo David:
SCRAPE: Scalable Randomness Attested by Public Entities. 216 - Kuo-Hui Yeh:
Cryptanalysis of Wang et al's Certificateless Signature Scheme without Bilinear Pairings. 217 - Kenji Yasunaga, Kosuke Yuzawa:
Repeated Games for Generating Randomness in Encryption. 218 - Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin:
Attribute-Based Encryption from Identity-Based Encryption. 219 - Kazuhiko Minematsu, Tetsu Iwata:
Cryptanalysis of PMACx, PMAC2x, and SIVx. 220 - Florian Göpfert, Christine van Vredendaal, Thomas Wunderer:
A Quantum Attack on LWE with Arbitrary Error Distribution. 221 - (Withdrawn) A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption. 222
- Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer:
0-RTT Key Exchange with Full Forward Secrecy. 223 - Hao Chen, Kim Laine, Rachel Player:
Simple Encrypted Arithmetic Library - SEAL v2.1. 224 - Ling Ren, Srinivas Devadas:
Bandwidth Hard Functions for ASIC Resistance. 225 - Ruiyu Zhu, Yan Huang:
Faster LEGO-based Secure Computation without Homomorphic Commitments. 226 - Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Towards Shared Ownership in the Cloud. 227 - João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar Melchor, Marc-Olivier Killijian, Jean-Pierre Hubaux:
Efficient and Secure Outsourcing of Genomic Data Storage. 228 - Claude Crépeau, Nan Yang:
Multi-Prover Interactive Proofs: Unsound Foundations. 229 - Yaron Velner, Jason Teutsch, Loi Luu:
Smart Contracts Make Bitcoin Mining Pools Vulnerable. 230 - Sergey Agievich:
EHE: nonce misuse-resistant message authentication. 231 - Alexander Chepurnoy, Tuyet Duong, Lei Fan, Hong-Sheng Zhou:
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake. 232 - Shashank Agrawal, Melissa Chase:
Simplifying Design and Analysis of Complex Predicate Encryption Schemes. 233 - Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. 234 - Isheeta Nargis:
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption. 235 - Pierre Loidreau:
A new rank metric codes based encryption scheme. 236 - Tim Ruffing, Giulio Malavolta:
Switch Commitments: A Safety Switch for Confidential Transactions. 237 - Tim Ruffing, Pedro Moreno-Sanchez
:
Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin. 238 - Tomer Ashur, Orr Dunkelman, Atul Luykx:
Boosting Authenticated Encryption Robustness With Minimal Modifications. 239 - Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. 240 - Alexander Russell, Cristopher Moore, Aggelos Kiayias, Saad Quader:
Forkable Strings are Rare. 241 - Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies:
Full accounting for verifiable outsourcing. 242 - Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. 243 - Mateus Borges, Quoc-Sang Phan, Antonio Filieri, Corina S. Pasareanu:
Model-counting Approaches For Nonlinear Numerical Constraints. 244 - Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Cache-Base Application Detection in the Cloud Using Machine Learning. 245 - Joël Cathébras, Alexandre Carbon, Renaud Sirdey, Nicolas Ventroux:
An Analysis of FV Parameters Impact Towards its Hardware Acceleration. 246 - Mohamed Saied Emam Mohamed, Albrecht Petzoldt:
Efficient Multivariate Ring Signature Schemes. 247 - Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai:
IPcore implementation susceptibility: A case study of Low latency ciphers. 248 - Mitar Milutinovic, Warren He, Howard Wu, Maxinder Kanwal:
Proof of Luck: an Efficient Blockchain Consensus Protocol. 249 - Huijia Lin, Stefano Tessaro:
Indistinguishability Obfuscation from Bilinear Maps and Block-Wise Local PRGs. 250 - Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim:
A Lattice-Based Universal Thresholdizer for Cryptographic Systems. 251 - Jean-Sébastien Coron:
High-Order Conversion From Boolean to Arithmetic Masking. 252 - Chris Brzuska, Håkon Jacobsen:
A Modular Security Analysis of EAP and IEEE 802.11. 253 - Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Juan Ai:
Towards Easy Key Enumeration. 254 - Lorenzo Grassi, Christian Rechberger:
New Limits for AES Known-Key Distinguishers. 255 - Ralf Küsters, Daniel Rausch:
A Framework for Universally Composable Diffie-Hellman Key Exchange. 256 - Aayush Jain, Peter M. R. Rasmussen, Amit Sahai:
Threshold Fully Homomorphic Encryption. 257 - Chris Peikert, Oded Regev, Noah Stephens-Davidowitz:
Pseudorandomness of Ring-LWE for Any Ring and Modulus. 258 - Daniele Micciancio, Michael Walter:
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time. 259 - Shoichi Hirose, Yu Sasaki, Kan Yasuda:
Message-Recovery MACs and Verification-Unskippable AE. 260 - Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? 261 - Peter Scholl, Nigel P. Smart, Tim Wood:
When It's All Just Too Much: Outsourcing MPC-Preprocessing. 262 - Sylvain Guilley, Liran Lerman:
Bivariate attacks and confusion coefficients. 263 - Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez:
A note on how to (pre-)compute a ladder. 264 - Kamalesh Acharya, Ratna Dutta:
Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation. 265 - Tyge Tiessen:
From Higher-Order Differentials to Polytopic Cryptanalysis. 266 - Seungkwang Lee:
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis. 267 - Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder:
Efficient Sanitizable Signatures without Random Oracles. 268 - Okan Seker, Thomas Eisenbarth, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. 269 - Keita Inasawa, Kenji Yasunaga:
Rational Proofs against Rational Verifiers. 270 - Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. 271 - Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht:
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA. 272 - Huijia Lin, Rafael Pass, Pratik Soni:
Two-Round Concurrent Non-Malleable Commitment from Time-Lock Puzzles. 273 - Rishab Goyal, Venkata Koppula, Brent Waters:
Lockable Obfuscation. 274 - Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka:
Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption. 275 - Daniel Wichs, Giorgos Zirdelis:
Obfuscating Compute-and-Compare Programs under LWE. 276 - Alex Lombardi, Vinod Vaikuntanathan:
Minimizing the Complexity of Goldreich's Pseudorandom Generator. 277 - Yunwen Liu, Vincent Rijmen:
New Observations on Invariant Subspace Attack. 278 - Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
:
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. 279 - Rafaël Del Pino, Vadim Lyubashevsky:
Amortization with Fewer Equations for Proving Knowledge of Small Secrets. 280 - Kallista A. Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth:
Practical Secure Aggregation for Privacy Preserving Machine Learning. 281 - Dominique Unruh:
Collapsing sponges: Post-quantum security of the sponge construction. 282 - Thorben Moos, Amir Moradi:
On the Easiness of Turning Higher-Order Leakages into First-Order. 283 - Maik Ender, Alexander Wild, Amir Moradi:
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA. 284 - Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors. 285 - (Withdrawn) Impossible Differential Attack on Midori128 Using Rebound-like Technique. 286
- Liwei Zhang, A. Adam Ding, François Durvaux, François-Xavier Standaert, Yunsi Fei:
Towards Sound and Optimal Leakage Detection Procedure. 287 - Pooya Farshim, Claudio Orlandi, Razvan Rosie:
Security of Symmetric Primitives under Incorrect Usage of Keys. 288 - Matthias Krause:
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks. 289 - Yuanqi Shen, Hai Zhou:
Double DIP: Re-Evaluating Security of Logic Encryption Algorithms. 290 - Dakshita Khurana, Amit Sahai:
Two-Message Non-Malleable Commitments from Standard Sub-exponential Assumptions. 291 - Shihui Fu, Xiutao Feng:
Involutory Differentially 4-Uniform Permutations from Known Constructions. 292 - Daniel J. Bernstein, Tanja Lange:
Montgomery curves and the Montgomery ladder. 293 - Jung Hee Cheon, Miran Kim, Yong Soo Song:
Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme. 294 - Ludo Tolhuizen, Ronald Rietman, Óscar García-Morchón:
Improved key-reconciliation method. 295 - Adi Akavia, Rio LaVigne, Tal Moran:
Topology-Hiding Computation on all Graphs. 296 - Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete
, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. 297 - Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O'Sullivan, Tim Güneysu, Francesco Regazzoni:
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling. 298 - Hao Chen, Kim Laine, Peter Rindal:
Fast Private Set Intersection from Homomorphic Encryption. 299 - Iddo Bentov, Pavel Hubácek, Tal Moran, Asaf Nadler:
Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies. 300 - Alex Lombardi, Vinod Vaikuntanathan:
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation. 301 - (Withdrawn) Quantum preimage, 2nd-preimage, and collision resistance of SHA3. 302
- Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model. 303 - Yang Yu, Guangwu Xu, Xiaoyun Wang:
Provably Secure NTRUEncrypt over More General Cyclotomic Rings. 304 - Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner:
A Zero Knowledge Sumcheck and its Applications. 305 - Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. 306 - Ling Ren, Kartik Nayak, Ittai Abraham, Srinivas Devadas:
Practical Synchronous Byzantine Consensus. 307 - Nicholas Genise, Daniele Micciancio:
Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus. 308 - Maiki Fujita, Takeshi Koshiba:
Perfectly Secure Message Transmission Scheme against Rational Adversaries. 309 - Shuai Han, Shengli Liu:
KDM-Secure Public-Key Encryption from Constant-Noise LPN. 310 - Aaron Hutchinson, Koray Karabina:
Constructing Multidimensional Differential Addition Chains and their Applications. 311 - Boaz Barak, Zvika Brakerski, Ilan Komargodski, Pravesh K. Kothari:
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation). 312 - (Withdrawn) A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes. 313
- Daniel J. Bernstein, Tanja Lange:
Post-quantum cryptography - dealing with the fallout of physics success. 314 - Bernardo Ferreira, João Leitão, Henrique João L. Domingos:
Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version). 315 - Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Exploring Potential 6LoWPAN Traffic Side Channels. 316 - Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi:
Solidus: Confidential Distributed Ledger Transactions via PVORM. 317 - (Withdrawn) Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud. 318
- Sikhar Patranabis, Debdeep Mukhopadhyay:
Encrypt-Augment-Recover: Computationally Function Private Predicate Encryption in the Public-Key Setting. 319 - Neriman Gamze Orhon, Hüseyin Hisil:
Speeding up Huff Form of Elliptic Curves. 320 - Dingfeng Ye, Peng Liu, Jun Xu:
Towards Practical Obfuscation of General Circuits. 321 - (Withdrawn) Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction. 322
- Atsushi Takayasu, Yohei Watanabe:
Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance. 323 - Srikanth Ch, C. E. Veni Madhavan, Kumar Swamy H. V.:
Family of PRGs based on Collections of Arithmetic Progressions. 324 - Rolf Haenni, Reto E. Koenig, Philipp Locher, Eric Dubuis:
CHVote System Specification. 325 - Manuel Barbosa, Dario Catalano, Dario Fiore:
Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data. 326 - Alan Szepieniec, Ward Beullens, Bart Preneel:
MQ Signatures for PKI. 327 - Debrup Chakraborty, Sebati Ghosh, Palash Sarkar:
Evaluating Bernstein-Rabin-Winograd Polynomials. 328 - Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Maliciously Secure Multi-Client ORAM. 329 - Abhishek Jain
, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum:
Distinguisher-Dependent Simulation in Two Rounds and its Applications. 330 - Daan Leermakers, Boris Skoric:
Optimal attacks on qubit-based Quantum Key Recycling. 331 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
Reforgeability of Authenticated Encryption Schemes. 332 - Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Faster Homomorphic Function Evaluation using Non-Integral Base Encoding. 333 - Razvan Barbulescu, Sylvain Duquesne:
Updating key size estimations for pairings. 334 - (Withdrawn) Privacy-Preserving Linear Regression on Distributed Data. 335
- Carmina Georgescu, Alina Petrescu-Nita, Emil Simion, Antonela Toma:
NIST Randomness Tests (in)dependence. 336 - Gang Sheng, Chunming Tang, Wei Gao, Yunlu Cai, Xing Hu:
Authentication of Outsourced Linear Function Query with Efficient Updates. 337 - Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena:
A Traceability Analysis of Monero's Blockchain. 338 - Alan Kaminsky:
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication. 339 - (Withdrawn) Enhancing Security by Combining Biometrics and Cryptography. 340
- Dragos Dumitrescu, Ioan-Mihail Stan, Emil Simion:
Steganography techniques. 341 - Chunsheng Gu:
Multilinear Maps Using a Variant of Ring-LWE. 342 - Essam Ghadafi, Jens Groth:
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups. 343 - Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti:
DUPLO: Unifying Cut-and-Choose for Garbled Circuits. 344 - Kostas Papagiannopoulos, Nikita Veshchikov:
Mind the Gap: Towards Secure 1st-order Masking in Software. 345 - Subhadeep Banik, Takanori Isobe:
Some cryptanalytic results on Lizard. 346 - Naghmeh Karimi, Jean-Luc Danger, Florent Lozach, Sylvain Guilley:
Predictive Aging of Reliability of two Delay PUFs. 347 - Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran:
Removal Attacks on Logic Locking and Camouflaging Techniques. 348 - Panos Kampanakis, Scott R. Fluhrer:
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards. 349 - Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez:
The Montgomery ladder on binary elliptic curves. 350 - Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta:
Post-quantum RSA. 351 - Daniel J. Bernstein, Jean-François Biasse, Michele Mosca:
A low-resource quantum factoring algorithm. 352 - San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease. 353 - Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart:
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts. 354 - Joppe W. Bos, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen:
White-Box Cryptography: Don't Forget About Grey Box Attacks. 355 - Bart Mennink, Alan Szepieniec:
XOR of PRPs in a Quantum World. 356 - Nico Döttling, Jesper Buus Nielsen, Maciej Obremski:
Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model. 357 - Olivier Blazy, Céline Chevalier, Paul Germouty:
Almost Optimal Oblivious Transfer from QA-NIZK. 358 - Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
New Protocols for Conditional Disclosure of Secrets (and More). 359 - Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen:
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error. 360 - Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka:
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption. 361 - Jesper Buus Nielsen:
Universally Composable Zero-Knowledge Proof of Membership. 362 - Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF. 363 - Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols. 364 - Boaz Barak:
The Complexity of Public-Key Cryptography. 365 - Gideon Samid, Serguei Popov:
BitFlip: A Randomness-Rich Cipher. 366 - Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, Yu Long:
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity. 367 - Sumanta Sarkar, Habeeb Syed:
Analysis of Toeplitz MDS Matrices. 368 - (Withdrawn) Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. 369
- Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial:
"The Simplest Protocol for Oblivious Transfer" Revisited. 370 - Lijing Zhou, Licheng Wang, Yiru Sun:
On the Efficient Construction of Lightweight Orthogonal MDS Matrices. 371 - Antoine Joux, Vanessa Vitse:
A crossbred algorithm for solving Boolean polynomial systems. 372 - Ryo Hiromasa, Yutaka Kawai:
Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption. 373 - Alexandre Gélin, Benjamin Wesolowski:
Loop-abort faults on supersingular isogeny cryptosystems. 374 - Karl Wüst, Arthur Gervais:
Do you need a Blockchain? 375 - (Withdrawn) Determining the Minimum Degree of an S-box. 376
- Stefan Wüller, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. 377 - Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek:
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables. 378 - Yan Bo Ti:
Fault attack on Supersingular Isogeny Cryptosystems. 379 - Sam Kim, David J. Wu:
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions. 380 - Alexandre de Castro:
Quantum one-way permutation over the finite field of two elements. 381 - Steven Cavanaugh:
A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK. 382 - Travis Scholl:
Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography. 383 - Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang:
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers. 384 - Benny Applebaum:
Garbled Circuits as Randomized Encodings of Functions: a Primer. 385 - Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou:
Four Round Secure Computation without Setup. 386 - Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng:
Homomorphically Encrypted Arithmetic Operations over the Integer Ring. 387 - Silvan Streit, Fabrizio De Santis:
Post-Quantum Key Exchange on ARMv8-A - A New Hope for NEON made Simple. 388 - Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. 389 - Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen:
On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations. 390 - Subhabrata Samajder, Palash Sarkar:
Another Look at Success Probability in Linear Cryptanalysis. 391 - Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey:
Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE. 392 - Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner:
Privacy-Preserving Interdomain Routing at Internet Scale. 393 - Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Double-spending Prevention for Bitcoin zero-confirmation transactions. 394 - Hannes Groß, David Schaffenrath, Stefan Mangard:
Higher-Order Side-Channel Protected Implementations of Keccak. 395 - Payman Mohassel, Yupeng Zhang:
SecureML: A System for Scalable Privacy-Preserving Machine Learning. 396 - Edoardo Persichetti:
Efficient Digital Signatures From Coding Theory. 397 - Dominique Unruh:
Post-Quantum Security of Fiat-Shamir. 398 - David McCann, Elisabeth Oswald:
Practical Evaluation of Masking Software Countermeasures on an IoT processor. 399 - Cédric Van Rompay, Refik Molva, Melek Önen:
A Leakage-Abuse Attack Against Multi-User Searchable Encryption. 400 - Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. 401 - Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain
:
A New Approach to Round-Optimal Secure Multiparty Computation. 402 - Masaaki Shirase:
Condition on composite numbers easily factored with elliptic curve method. 403 - Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal:
Short generators without quantum computers: the case of multiquadratics. 404 - Jingjing Wang, Xiaoyu Zhang, Jingjing Guo, Jianfeng Wang:
Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare". 405 - Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Bryan Ford:
OmniLedger: A Secure, Scale-Out, Decentralized Ledger. 406 - Peter Rindal, Roberto Trifiletti:
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments. 407 - Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast. 408 - Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges:
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. 409 - Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanathan:
Fast Proxy Re-Encryption for Publish/Subscribe Systems. 410 - Çetin Kaya Koç:
A New Algorithm for Inversion mod pk. 411 - Ximing Fu, Xiaoyun Wang, Jiazhe Chen:
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently. 412 - Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava:
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems. 413 - Alex Biryukov, Léo Perrin:
Symmetrically and Asymmetrically Hard Cryptography. 414 - Osman Biçer, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Albert Levi:
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates. 415 - Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete
:
Breaking and Fixing the HB+DB protocol. 416 - Massimo Bartoletti, Stefano Lande, Alessandro Sebastian Podda:
A Proof-of-Stake protocol for consensus on Bitcoin subchains. 417 - Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong Authenticated Key Exchange with Auxiliary Inputs. 418 - Alessandro Budroni, Federico Pintore:
Efficient hash maps to 픾2 on BLS curves. 419 - Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang:
Construction and Filtration of Lightweight Formalized MDS Matrices. 420 - Eric Brier, Rémi Géraud, David Naccache:
Exploring Naccache-Stern Knapsack Encryption. 421 - Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs. 422 - Alexander Koch, Stefan Walzer
:
Foundations for Actively Secure Card-based Cryptography. 423 - Markku-Juhani O. Saarinen:
On Reliability, Reconciliation, and Error Correction in Ring-LWE Encryption. 424 - Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Card-Based Protocols Using Unequal Division Shuffle. 425 - Masahiro Yagisawa:
FHPKE based on multivariate discrete logarithm problem. 426 - Gregor Leander, Alexander May:
Grover Meets Simon - Quantumly Attacking the FX-construction. 427 - Douglas R. Stinson:
Optimal Ramp Schemes and Related Combinatorial Objects. 428 - Christian Badertscher, Christian Matt, Ueli Maurer:
Strengthening Access Control Encryption. 429 - Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène:
Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping. 430 - Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi:
Understanding RUP Integrity of COLM. 431 - Kaisa Nyberg:
Statistical and Linear Independence of Binary Random Variables. 432 - Saikrishna Badrinarayanan, Sanjam Garg
, Yuval Ishai, Amit Sahai, Akshay Wadia:
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions. 433 - Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo:
FourQ on embedded devices with strong countermeasures against side-channel attacks. 434 - Atul Luykx, Bart Mennink, Kenneth G. Paterson:
Analyzing Multi-Key Security Degradation. 435 - Kaiyan Zheng, Peng Wang:
A Uniform Class of Weak Keys for Universal Hash Functions. 436 - Michael Scott:
Slothful reduction. 437 - James Howe, Máire O'Neill:
GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography. 438 - Abdelrahaman Aly, Mathieu Van Vyve:
Practically Efficient Secure Single-Commodity Multi-Market Auctions. 439 - Nicolas T. Courtois, Klaus Schmeh, Jörg Drobick, Jacques Patarin, Maria-Bristena Oprisanu, Matteo Scarlata, Om Bhallamudi:
Cryptographic Security Analysis of T-310. 440 - Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan:
New Approach to Practical Leakage-Resilient Public-Key Cryptography. 441 - Jeremiah Blocki, Samson Zhou:
On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i. 442 - Joël Alwen, Jeremiah Blocki, Benjamin Harsha:
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions. 443 - Ming Li, Jian Weng, Anjia Yang, Wei Lu:
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing. 444 - Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. 445 - Diana Maimut, George Teseleanu:
Secretly Embedding Trapdoors into Contract Signing Protocols. 446 - Huige Li, Haibo Tian, Fangguo Zhang:
Block Chain based Searchable Symmetric Encryption. 447 - (Withdrawn) Obfuscation of Bloom Filter Queries from Ring-LWE. 448
- Shihui Fu, Xiutao Feng, Baofeng Wu:
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies. 449 - Elena Pagnin, Aikaterini Mitrokotsa:
Privacy-preserving biometric authentication: challenges and directions. 450 - Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. 451 - Jian Liu, Mika Juuti, Yao Lu, N. Asokan:
Oblivious Neural Network Predictions via MiniONN transformations. 452 - Johannes Blömer, Gennadij Liske:
Subtleties in Security Definitions for Predicate Encryption with Public Index. 453 - Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich:
Algorand: Scaling Byzantine Agreements for Cryptocurrencies. 454 - Daniel Apon, Xiong Fan, Feng-Hao Liu:
Vector Encoding over Lattices and Its Applications. 455 - Xiong Fan, Feng-Hao Liu:
Proxy Re-Encryption and Re-Signatures from Lattices. 456 - Masahito Hayashi, Takeshi Koshiba:
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority. 457 - (Withdrawn) Fully Homomorphic Encryption Using Multivariate Polynomials. 458
- Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test. 459 - Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila:
Transitioning to a Quantum-Resistant Public Key Infrastructure. 460 - Daniel Jost, Ueli Maurer:
Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions. 461 - Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan:
Leakage-Resilient Tweakable Encryption from One-Way Functions. 462 - Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance against Invariant Attacks: How to Choose the Round Constants. 463 - Mike Rosulek, Morgan Shirley:
On the Structure of Unconditional UC Hybrid Protocols. 464 - Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong:
Lelantos: A Blockchain-based Anonymous Physical Delivery System. 465 - Yusuke Naito:
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security. 466 - Sam Kim, David J. Wu:
Access Control Encryption for General Policies from Standard Assumptions. 467 - Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov:
Why Your Encrypted Database Is Not Secure. 468 - Hiroaki Anada, Seiko Arita:
Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption. 469 - José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot:
On the Relation Between SIM and IND-RoR Security Models for PAKEs. 470 - Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith-Tone:
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree. 471 - Cengiz Örencik, Erkay Savas, Mahmoud Alewiwi:
A Unified Framework for Secure Search Over Encrypted Cloud Data. 472 - Bart Mennink, Samuel Neves:
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory. 473 - Bart Mennink:
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. 474 - Pooya Farshim, Louiza Khati, Damien Vergnaud:
Security of Even-Mansour Ciphers under Key-Dependent Messages. 475 - Mihir Bellare, Adam O'Neill, Igors Stepanovs:
Forward-Security under Continual Leakage. 476 - Dan Boneh, Sam Kim, David J. Wu:
Constrained Keys for Invertible Pseudorandom Functions. 477 - Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens:
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. 478 - Keita Emura:
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions. 479 - Thomas Prest:
Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence. 480 - Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha:
A New Public-Key Cryptosystem via Mersenne Numbers. 481 - Léo Ducas, Alice Pellet-Mary:
On the Statistical Leak of the GGH13 Multilinear Map and some Variants. 482 - Sergiu Carpov, Pascal Aubry, Renaud Sirdey:
A multi-start heuristic for multiplicative depth minimization of boolean circuits. 483 - Jung Hee Cheon, Minki Hhan, Changmin Lee:
Cryptanalysis of the Overstretched NTRU Problem for General Modulus Polynomial. 484 - Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating compromisable storage systems. 485 - Ilan Komargodski, Moni Naor, Eylon Yogev:
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions. 486 - Yi Lu:
New Linear Attacks on Block Cipher GOST. 487 - Nir Bitansky, Yael Tauman Kalai, Omer Paneth:
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions. 488 - Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan:
Multi Collision Resistant Hash Functions and their Applications. 489 - Peter Pessl, Leon Groot Bruinderink, Yuval Yarom:
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures. 490 - Chongwon Cho, Nico Döttling, Sanjam Garg
, Divya Gupta, Peihan Miao, Antigoni Polychroniadou:
Laconic Oblivious Transfer and its Applications. 491 - Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood:
Reducing Communication Channels in MPC. 492 - Georg T. Becker:
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice. 493 - Tomás Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson:
A Reaction Attack on the QC-LDPC McEliece Cryptosystem. 494 - Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi:
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy. 495 - Dragos Rotaru, Nigel P. Smart, Martijn Stam:
Modes of Operation Suitable for Computing on Encrypted Data. 496 - Itai Dinur, Niv Nadler:
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme. 497 - Joan Daemen, Bart Mennink, Gilles Van Assche:
Full-State Keyed Duplex With Built-In Multi-User Support. 498 - Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. 499 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps. 500 - Felix Günther, Sogol Mazaheri:
A Formal Treatment of Multi-key Channels. 501 - Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar
:
DeepSecure: Scalable Provably-Secure Deep Learning. 502 - Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie:
Encryption Switching Protocols Revisited: Switching modulo p. 503 - Craig Costello, Hüseyin Hisil:
A simple and compact algorithm for SIDH with arbitrary degree isogenies. 504 - Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:
Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers. 505 - (Withdrawn) Optimal Overcoming Weak Expectations. 506
- Maciej Obremski, Maciej Skorski
:
Inverted Leftover Hash Lemma. 507 - Victor Cauchois, Clément Gomez, Reynald Lercier:
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations. 508 - Fang Song, Aaram Yun:
Quantum Security of NMAC and Related Constructions. 509 - Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton:
Hedging Public-Key Encryption in the Real World. 510 - Alex Biryukov, Léo Perrin:
State of the Art in Lightweight Symmetric Cryptography. 511 - (Withdrawn) Provably Secure Two-Factor Authentication Scheme for E-Health Using Smart Card. 512
- Patrick Holzer, Thomas Wunderer:
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor pα qβ. 513 - Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich:
Identity-based Encryption from Codes with Rank Metric. 514 - Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs:
Be Adaptive, Avoid Overcommitting. 515 - Claude Carlet:
Characterizations of the differential uniformity of vectorial functions by the Walsh transform. 516 - Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson:
PRF-ODH: Relations, Instantiations, and Impossibility Results. 517 - Joost Renes, Benjamin Smith:
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs. 518 - Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala:
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case. 519 - Juan A. Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:
The Price of Low Communication in Secure Multi-Party Computation. 520 - F. Betül Durak, Serge Vaudenay:
Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains. 521 - Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
On the Hardness of the Mersenne Low Hamming Ratio Assumption. 522 - Vadim Lyubashevsky, Gregor Seiler:
Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge Proofs. 523 - Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan:
Compact Structure-preserving Signatures with Almost Tight Security. 524 - Romain Gay, Dennis Hofheinz, Lisa Kohl:
Kurosawa-Desmedt Meets Tight Security. 525 - Jiangshan Yu, Mark Ryan:
Evaluating web PKIs. 526 - Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:
Key Rotation for Authenticated Encryption. 527 - Claude Carlet:
Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets. 528 - Ling Song, Guohong Liao, Jian Guo:
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak. 529 - Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi:
Non-Malleable Codes for Space-Bounded Tampering. 530 - Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template Attack vs Bayes Classifier. 531 - Xavier Boyen, Qinyi Li:
All-But-Many Lossy Trapdoor Functions from Lattices and Applications. 532 - Gorjan Alagic, Christian Majenz:
Quantum non-malleability and authentication. 533 - Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. 534 - Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. 535 - Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche:
HACL*: A Verified Modern Cryptographic Library. 536 - Wei Dai, Viet Tung Hoang, Stefano Tessaro:
Information-theoretic Indistinguishability via the Chi-squared Method. 537 - Sumegha Garg, Henry Yuen, Mark Zhandry:
New security notions and feasibility results for authentication of quantum data. 538 - Pratik Soni, Stefano Tessaro:
Public-Seed Pseudorandom Permutations. 539 - Jens Groth, Mary Maller:
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. 540 - Sanjam Garg
, Mohammad Mahmoody, Ameer Mohammed:
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives. 541 - Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication. 542 - Nico Döttling, Sanjam Garg
:
Identity-Based Encryption from the Diffie-Hellman Assumption. 543 - Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev:
Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability. 544 - Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci:
Resource-efficient OT combiners with active security. 545 - Hitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry:
X509CLOUD - Framework for a Ubiquitous PKI. 546 - Seyed Farhad Aghili, Hamid Mala:
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce. 547 - Yarkin Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang:
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem. 548 - Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher:
ZeroTrace : Oblivious Memory Primitives from Intel SGX. 549 - Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai:
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments. 550 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions. 551 - Yehuda Lindell:
Fast Secure Two-Party ECDSA Signing. 552 - Scott R. Fluhrer:
Further Analysis of a Proposed Hash-Based Signature Standard. 553 - Renaud Dubois:
Trapping ECC with Invalid Curve Bug Attacks. 554 - Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion. 555 - Sankhanil Dey, Ranjan Ghosh:
Multiplication and Division over Extended Galois Field GF(pq): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF(pq). 556 - Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
:
Watermarking Public-key Cryptographic Functionalities and Implementations. 557 - (Withdrawn) Detecting Large Integer Arithmetic for Defense Against Crypto Ransomware. 558
- Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval:
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange. 559 - Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers:
Notes on the design and analysis of SIMON and SPECK. 560 - Yashvanth Kondi, Arpita Patra:
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic. 561 - Björn Haase, Benoît Labrique:
Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices. 562 - Jacob Alperin-Sheriff, Daniel Apon:
Weak is Better: Tightly Secure Short Signatures from Weak PRFs. 563 - Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya
:
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks. 564 - Pramod Subramanyan, Rohit Sinha, Ilia A. Lebedev, Srinivas Devadas, Sanjit A. Seshia:
A Formal Foundation for Secure Remote Execution of Enclaves. 565 - Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo:
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services. 566 - Elette Boyle, Yuval Ishai, Rafael Pass, Mary Wootters:
Can We Access a Database Both Locally and Privately? 567 - Ran Canetti, Justin Holmgren
, Silas Richelson:
Towards Doubly Efficient Private Information Retrieval. 568 - Yihua Zhang, Marina Blanton
, Fattaneh Bayatbabolghani:
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. 569 - Anders P. K. Dalskov, Claudio Orlandi:
Assessing the No-Knowledge Property of SpiderOak ONE. 570 - Christophe Petit:
Faster Algorithms for Isogeny Problems using Torsion Point Images. 571 - Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk:
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks. 572 - Bernardo Machado David, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol. 573 - (Withdrawn) A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment. 574
- Ehsan Ebrahimi Targhi, Dominique Unruh:
Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds. 575 - Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
The Security of SIMON-like Ciphers Against Linear Cryptanalysis. 576 - Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser:
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors. 577 - Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation. 578 - Mridul Nandi:
Birthday Attack on Dual EWCDM. 579 - Riddhi Ghosal:
Analysing Relations involving small number of Monomials in AES S- Box. 580 - Gilles Dequen, Sorina Ionica, Monika Trimoska:
Parallel Collision Search with Radix Trees. 581 - Angela Jäschke, Frederik Armknecht:
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation. 582 - (Withdrawn) Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers. 583
- Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. 584 - Pavel Tarasov, Hitesh Tewari:
Internet Voting Using Zcash. 585 - Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry:
Deterministic, Stash-Free Write-Only ORAM. 586 - Georg Fuchsbauer:
Subversion-zero-knowledge SNARKs. 587 - Maciej Obremski, Maciej Skorski
:
Renyi Entropy Estimation Revisited. 588 - Juay Guan Hee:
An Attempt to Cryptanalyze A Partially Known Cipher Algorithm. 589 - Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu:
Constant bandwidth ORAM with small block size using PIR operations. 590 - Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-based Ranging. 591 - Anja Becker, Dusan Kostic:
Speeding up lattice sieve with Xeon Phi coprocessor. 592 - Alessio Caminata, Elisa Gorla:
Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra. 593 - Robert Primas, Peter Pessl, Stefan Mangard:
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption. 594 - Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes. 595 - Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. 596 - Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain
, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. 597 - Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin E. Lauter:
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms. 598 - Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michal Zajac:
A Subversion-Resistant SNARK. 599 - Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich:
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. 600 - Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. 601 - Sean Bowe, Ariel Gabizon, Matthew D. Green:
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK. 602 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes. 603 - Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz:
A Modular Analysis of the Fujisaki-Okamoto Transformation. 604 - Xavier Bultel, Pascal Lafourcade:
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures. 605 - Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter:
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. 606 - Edward Eaton:
Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model. 607 - Vincent Immler, Robert Specht, Florian Unterstein:
Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs. 608 - Alessandro Amadori, Federico Pintore, Massimiliano Sala:
On the discrete logarithm problem for prime-field elliptic curves. 609 - Céline Blondeau, Roberto Civino, Massimiliano Sala:
Differential Attacks: Using Alternative Operations. 610 - David S. Leslie, Chris Sherfield, Nigel P. Smart:
Multi-Rate Threshold FlipThem. 611 - Martin R. Albrecht, Amit Deo:
Large Modulus Ring-LWE >= Module-LWE. 612 - Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim:
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications. 613 - Mathias Wagner, Stefan Heyse:
Brute-Force Search Strategies for Single-Trace and Few - Traces Template Attacks on the DES Round Keys of a Recent Smart Card. 614 - Nabil Alkeilani Alkadri, Johannes Buchmann, Rachid El Bansarkhani, Juliane Krämer:
A Framework to Select Parameters for Lattice-Based Cryptography. 615 - Bingsheng Zhang, Hong-Sheng Zhou:
Digital Liquid Democracy: How to Vote Your Delegation Statement. 616 - Benny Applebaum, Ivan Damgård, Yuval Ishai, Michael Nielsen, Lior Zichron:
Secure Arithmetic Computation with Constant Computational Overhead. 617 - Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth:
CacheZoom: How SGX Amplifies The Power of Cache Attacks. 618 - Qiong Huang, Jianye Huang:
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting. 619 - Eike Kiltz, Julian Loss:
The Algebraic Group Model and its Applications. 620 - Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks. 621 - Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. 622 - Marios O. Choudary, Pantelimon George Popescu:
Back to Massey: Impressively fast, scalable and tight security evaluation tools. 623 - Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
Fast Leakage Assessment. 624 - Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl:
How to Break Secure Boot on FPGA SoCs through Malicious Hardware. 625 - Hai Zhou, Ruifeng Jiang, Shuyu Kong:
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions. 626 - Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding right into disaster: Left-to-right sliding windows leak. 627 - Miruna Rosca, Amin Sakzad, Ron Steinfeld, Damien Stehlé:
Middle-Product Learning With Errors. 628 - Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert:
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks. 629 - Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli: a cross-platform permutation. 630 - Ran Canetti, Amit Lichtenberg:
Certifying Trapdoor Permutations, Revisited. 631 - Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek:
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures. 632 - Léo Ducas, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS - Dilithium: Digital Signatures from Module Lattices. 633 - Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Damien Stehlé:
CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. 634 - Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski:
PERUN: Virtual Payment Channels over Cryptographic Currencies. 635 - Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng:
Implementing 128-bit Secure MPKC Signatures. 636 - Anthony Journault, François-Xavier Standaert:
Very High Order Masking: Efficient Implementation and Security Evaluation. 637 - Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka:
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness. 638 - Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. 639 - Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache:
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms. 640 - Chunsheng Gu:
Integer Version of Ring-LWE and its Applications. 641 - Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami:
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata. 642 - Morten Dahl, Valerio Pastro, Mathieu Poumeyrol:
Private Data Aggregation on a Budget. 643 - (Withdrawn) On Space-Scarce Economy In Blockchain Systems. 644
- Shay Gueron, Nicky Mouha:
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security. 645 - Mehrdad Nojoumian:
Rational Trust Modeling. 646 - Subhamoy Maitra, Nishant Sinha, Akhilesh Siddhanti, Ravi Anand, Sugata Gangopadhyay:
A TMDTO Attack Against Lizard. 647 - Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford:
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. 648 - Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-based Authenticated Encryption: How Small Can We Go? 649 - Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada:
Efficient Public Trace and Revoke from Standard Assumptions. 650 - (Withdrawn) Rescuing LoRaWAN 1.0. 651
- Andrej Bogdanov, Alon Rosen:
Pseudorandom Functions: Three Decades Later. 652 - Fanbao Liu, Fengmei Liu:
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions. 653 - Tom Eccles, Basel Halak:
A Secure and Private Billing Protocol for Smart Metering. 654 - Jiao Hu, Ruilin Li, Chaojing Tang:
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones. 655 - Lei Fan, Hong-Sheng Zhou:
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake). 656 - Sanjit Chatterjee, Sayantan Mukherjee, Tapas Pandit:
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient. 657 - Avradip Mandal, John C. Mitchell, Hart William Montgomery, Arnab Roy:
Privacy for Targeted Advertising. 658 - Russell W. F. Lai, Sherman S. M. Chow:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. 659 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou:
Profiling Good Leakage Models For Masked Implementations. 660 - Bernardo Ferreira, João Leitão, Henrique João L. Domingos:
MuSE: Multimodal Searchable Encryption for Cloud Applications. 661 - Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich:
A new signature scheme based on (U|U+V) codes. 662 - Thomas Unterluggauer, Mario Werner, Stefan Mangard:
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives. 663 - Paul Grubbs, Jiahui Lu, Thomas Ristenpart:
Message Franking via Committing Authenticated Encryption. 664 - Michael A. Raskin:
Lower bounds on communication for multiparty computation of multiple AND instances with secret sharing. 665 - Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner:
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. 666 - Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe:
High-speed key encapsulation from NTRU. 667 - Sikhar Patranabis, Debdeep Mukhopadhyay:
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs. 668 - Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong:
Speeding up Elliptic Curve Scalar Multiplication without Precomputation. 669 - Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas:
Private Set Intersection for Unequal Set Sizes with Mobile Applications. 670 - Alex Biryukov, Daniel Feher, Dmitry Khovratovich:
Guru: Universal Reputation Module for Distributed Consensus Protocols. 671 - Anat Paskin-Cherniavsky, Slava Radune:
Coding for interactive communication beyond threshold adversaries. 672 - Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
Differential Fault Analysis Automation. 673 - Mario Werner, Thomas Unterluggauer, Robert Schilling, David Schaffenrath, Stefan Mangard:
Transparent Memory Encryption and Authentication. 674 - Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz:
Memory-Tight Reductions. 675 - Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya:
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC. 676 - Amanda Cristina Davi Resende, Diego F. Aranha:
Unbalanced Approximate Private Set Intersection. 677 - Akhilesh Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay:
Differential Fault Attack on Grain v1, ACORN v3 and Lizard. 678 - Nils Löken:
Searchable Encryption with Access Control. 679 - Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
SOFIA: MQ-based signatures in the QROM. 680 - Alexandre de Castro:
Controlled-NOT function can provoke biased interpretation from Bell's test experiments. 681 - Alexandros Zacharakis, Panagiotis Grontas, Aris Pagourtzis:
Conditional Blind Signatures. 682 - Ruiyu Zhu, Yan Huang:
Efficient Privacy-Preserving Edit Distance and Beyond. 683 - Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. 684 - Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal:
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication. 685 - Ren Zhang, Bart Preneel:
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol. 686 - (Withdrawn) Impossibility of Secure Multi-Party Products in Non-Abelian Groups. 687
- Marko Balogh, Edward Eaton, Fang Song:
Quantum Collision-Finding in Non-Uniform Random Functions. 688 - Yasufumi Hashimoto:
On the security of HMFEv. 689 - Po-Chun Kuo
, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang:
Post-Quantum Key Exchange on FPGAs. 690 - Fanbao Liu, Fengmei Liu:
Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak. 691 - Deepesh Data, Manoj Prabhakaran:
Towards Characterizing Securely Computable Two-Party Randomized Functions. 692 - Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers. 693 - Patrick McCorry, Ethan Heilman, Andrew Miller:
Atomically Trading with Roger: Gambling on the success of a hardfork. 694 - Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann:
Updatable Tokenization: Formal Definitions and Provably Secure Constructions. 695 - Hai Zhou:
A Humble Theory and Application for Logic Encryption. 696 - Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev:
Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying. 697 - Sean Murphy, Rachel Player:
Noise Distributions in Homomorphic Ring-LWE. 698 - Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. 699 - Johannes Buchmann, Denise Demirel, Lucas Schabhüser, Patrick Struck:
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability. 700 - Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage. 701 - Shay Gueron, Yehuda Lindell:
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation. 702 - Helger Lipmaa:
Optimally Sound Sigma Protocols Under DCRA. 703 - Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang:
A Key Backup Scheme Based on Bitcoin. 704 - Aikaterini Mitrokotsa, Cristina Onete
, Elena Pagnin, Mahesh Perera:
Multi-Hop Distance Estimation: How Far are You? 705 - Hugues Thiebeauld, Georges Gagnerot, Antoine Wurcker, Christophe Clavier:
SCATTER : A New Dimension in Side-Channel. 706 - Irene Giacomelli, Somesh Jha, C. David Page, Kyonghwan Yoon:
Privacy-Preserving Ridge Regression on Distributed Data. 707 - Tetsu Iwata, Yannick Seurin:
Reconsidering the Security Bound of AES-GCM-SIV. 708 - Sauvik Bhattacharya, Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen:
spKEX: An optimized lattice-based key exchange. 709 - Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia:
Distributed Computing with Channel Noise. 710 - Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert:
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model. 711 - Vasyl Ustimenko:
On desynchronised El Gamal algorithm. 712 - Paul Rösler, Christian Mainka, Jörg Schwenk:
More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema. 713 - Shafi Goldwasser, Saleet Klein, Daniel Wichs:
The Edited Truth. 714 - Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. 715 - Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. 716 - Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes. 717 - Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura:
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper). 718 - Jacqueline Brendel, Denise Demirel:
Efficient Proactive Secret Sharing. 719 - Bailey Kacsmar, Sarah Plosker, Ryan Henry:
Computing Low-Weight Discrete Logarithms. 720 - Donghoon Chang, Sweta Mishra, Somitra Kumar Sanadhya, Ajit Pratap Singh:
On Making U2F Protocol Leakage-Resilient via Re-keying. 721 - Helger Lipmaa, Kateryna Pavlyk:
A Simpler Rate-Optimal CPIR Protocol. 722 - Rotem Tsabary:
An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both. 723 - Giulia Traverso, Denise Demirel, Johannes Buchmann:
Dynamic and Verifiable Hierarchical Secret Sharing. 724 - Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann:
AS3: Adaptive Social Secret Sharing for Distributed Storage Systems. 725 - David Fontaine, Olivier Vivolo:
Proposal of primitive polynomials for Linux kernel PRNG. 726 - Michael Scott:
A note on the implementation of the Number Theoretic Transform. 727 - Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann:
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems. 728 - Subhabrata Samajder, Palash Sarkar:
Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses. 729 - Yang Yu, Léo Ducas:
Second Order Statistical Behavior of LLL and BKZ. 730 - Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen:
Revisiting Difficulty Control for Blockchain Systems. 731 - Marc Joye:
Privacy-Preserving Ridge Regression Without Garbled Circuits. 732 - Yongge Wang:
Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme. 733 - Dakshita Khurana:
Round Optimal Concurrent Non-Malleability from Polynomial Hardness. 734 - Tanping Zhou, Xiaoyuan Yang, Longfei Liu, Wei Zhang, Yitao Ding:
Faster Bootstrapping with Multiple Addends. 735 - Yogesh Swami:
SGX Remote Attestation is not Sufficient. 736 - Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang:
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. 737 - Mihaela Ion, Ben Kreuter, Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung:
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions. 738 - (Withdrawn) Secure Storage with Replication and Transparent Deduplication. 739
- Eleonora Cagli, Cécile Dumas, Emmanuel Prouff:
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures - Profiling Attacks without Pre-Processing -. 740 - Peng Xu, Xia Gao, Wei Wang, Willy Susilo, Qianhong Wu, Hai Jin:
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security. 741 - Jonathan Bootle, Mehdi Tibouchi:
Cryptanalysis of Compact-LWE. 742 - Mike Hamburg:
Cryptanalysis of 22 1/2 rounds of Gimli. 743 - Virendra Kumar, Jonathan Petit, William Whyte:
Binary Hash Tree based Certificate Access Management. 744 - Burton S. Kaliski Jr.:
A Quantum "Magic Box" for the Discrete Logarithm Problem. 745 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
On the Tightness of Forward-Secure Signature Reductions. 746 - Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives. 747 - Jean-Claude Bajard, Julien Eynard, M. Anwar Hasan, Paulo Martins, Leonel Sousa, Vincent Zucca:
Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes. 748 - Ioannis Demertzis
, Dimitrios Papadopoulos, Charalampos Papamanthou:
Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency. 749 - Razvan Rosie:
Adaptive-Secure VRFs with Shorter Keys from Static Assumptions. 750 - Rémi Géraud, David Naccache, Razvan Rosie:
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers. 751 - Michael Clear, Ciaran McGoldrick:
Attribute-Based Group Homomorphic Encryption and Additively Homomorphic IBE. 752 - David A. Basin, Andreas Lochbihler, S. Reza Sefidgar:
CryptHOL: Game-based Proofs in Higher-order Logic. 753 - Ahto Buldas, Matthias Geihs, Johannes Buchmann:
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions. 754 - Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz:
Efficient, Reusable Fuzzy Extractors from LWE. 755 - Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade:
Verifiable Private Polynomial Evaluation. 756 - Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-based Algorithm for Key Encapsulation. 757 - Fabrice Boudot:
On Improving Integer Factorization and Discrete Logarithm Computation using Partial Triangulation. 758 - Carsten Baum, Vadim Lyubashevsky:
Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings. 759 - (Withdrawn) GIFT: A Small Present (Full version). 760
- Yang Xie, Ankur Srivastava:
Anti-SAT: Mitigating SAT Attack on Logic Locking. 761 - Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal:
Private Collaborative Neural Network Learning. 762 - Masahiro Yagisawa:
Improved Fully Homomorphic Encryption without Bootstrapping. 763 - Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. 764 - Vahid Amin Ghafari, Honggang Hu, Mohammadsadegh alizadeh:
Necessary conditions for designing secure stream ciphers with the minimal internal states. 765 - Arjun Chopra:
GLYPH: A New Insantiation of the GLP Digital Signature Scheme. 766 - Xavier Bonnetain:
Quantum Key-Recovery on full AEZ. 767 - S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan:
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing. 768 - Peter Rindal, Mike Rosulek:
Malicious-Secure Private Set Intersection via Dual Execution. 769 - Angelo Massimo Perillo, Emiliano De Cristofaro:
PAPEETE: Private, Authorized, and Fast Personal Genomic Testing. 770 - Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh:
Post-quantum security of the sponge construction. 771 - Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Oblivious Computation with Data Locality. 772 - Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade:
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction. 773 - Steven D. Galbraith, Frederik Vercauteren:
Computational problems in supersingular elliptic curve isogenies. 774 - Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos:
Proofs of Work for Blockchain Protocols. 775 - Ward Beullens, Bart Preneel:
Field lifting for smaller UOV public keys. 776 - Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald:
Encrypting Messages for Incomplete Chains of Certificates. 777 - Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias:
MCMix: Anonymous Messaging via Secure Multiparty Computation. 778 - Bibhas Chandra Das, Md Kutubuddin Sardar, Avishek Adhikari:
Efficient Constructions for t- (k, n)*-Random Grid Visual Cryptographic Schemes. 779 - Bin Zhang, Xinxin Gong:
New Algorithms for Solving LPN. 780 - Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR. 781 - Wanfen Guo, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
Efficient Attribute-Based Secure Keyword Search on the Cloud Storage. 782 - Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar:
HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion. 783 - Colin Boyd, Britta Hale:
Secure Channels and Termination: The Last Word on TLS. 784 - Aloni Cohen:
What about Bob? The Inadequacy of CPA Security for Proxy Reencryption. 785 - Giorgia Azzurra Marson, Bertram Poettering:
With one it is easy, with many it gets complicated: Understanding Channel Security for Groups. 786 - Lukas Zobernig, Steven D. Galbraith, Giovanni Russello:
Indistinguishable Predicates: A New Tool for Obfuscation. 787 - William Diehl:
Attack on AES Implementation Exploiting Publicly-visible Partial Result. 788 - Gustavo Banegas, Daniel J. Bernstein:
Low-communication parallel quantum multi-target preimage search. 789 - Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti:
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation. 790 - Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar R. Weippl:
Merged Mining: Curse of Cure? 791 - Jean-Marie Chauvet:
Gimli, Lord of the Glittering TRS-80. 792 - Tung Chou:
McBits Revisited. 793 - Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka:
Anonymous Single-Round Server-Aided Verification. 794 - Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee:
Private Constrained PRFs (and More) from LWE. 795 - Sikhar Patranabis, Debdeep Mukhopadhyay:
Lightweight Symmetric-Key Hidden Vector Encryption without Pairings. 796 - (Withdrawn) Multi-Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model. 797
- Daniel Günther, Ágnes Kiss, Thomas Schneider:
More Efficient Universal Circuit Constructions. 798 - Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu:
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques. 799 - Fukang Liu, Florian Mendel, Gaoli Wang:
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. 800 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Attribute-Based Signatures for Turing Machines. 801 - Gottfried Herold, Max Hoffmann, Michael Klooß, Carla Ràfols, Andy Rupp
:
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs. 802 - Andrei Lapets, Mayank Varia, Azer Bestavros, Frederick Jansen:
Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications. 803 - Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. 804 - Raphael Bost, Brice Minaud, Olga Ohrimenko:
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives. 805 - Daniel Genkin, Luke Valenta, Yuval Yarom:
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. 806 - Shashank Agrawal, Melissa Chase:
FAME: Fast Attribute-based Message Encryption. 807 - Shuichi Katsumata:
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications. 808 - Hao Chen, Kim Laine, Rachel Player, Yuhou Xia:
High-Precision Arithmetic in Homomorphic Encryption. 809 - Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart:
The TypTop System: Personalized Typo-Tolerant Password Checking. 810 - Scott R. Fluhrer:
Reassessing Grover's Algorithm. 811 - Bart Mennink, Samuel Neves:
Optimal PRFs from Blockcipher Designs. 812 - Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad:
Industrial Feasibility of Private Information Retrieval. 813 - Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve. 814 - Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer:
Revisiting the Expected Cost of Solving uSVP and Applications to LWE. 815 - Yehuda Lindell, Ariel Nof:
A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority. 816 - (Withdrawn) A Universal Designated Verifier Signature Scheme with Non-Delegatability in the Standard Model. 817
- Yong Li, Sven Schäge:
No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial. 818 - Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen:
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing. 819 - Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. 820 - José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira:
A Fast and Verified Software Stack for Secure Function Evaluation. 821 - Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs. 822 - Rami Khalil, Arthur Gervais:
Revive: Rebalancing Off-Blockchain Payment Networks. 823 - Ela Lee:
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control. 824 - Syed Mahbub Hafiz, Ryan Henry:
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR. 825 - Brent Carmer, Alex J. Malozemoff, Mariana Raykova:
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits. 826 - Jack Doerner, Abhi Shelat:
Scaling ORAM for Secure Computation. 827 - (Withdrawn) Standardizing Bad Cryptographic Practice - A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property. 828
- Jakub Breier, Xiaolu Hou:
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code. 829 - Daan Leermakers, Boris Skoric:
Security proof for Round Robin Differential Phase Shift QKD. 830 - Geng Wang, Haiyang Zhang, Fengmei Liu:
Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases. 831 - Lorenzo Grassi:
Mixture Differential Cryptanalysis: New Approaches for Distinguishers and Attacks on round-reduced AES. 832 - Steven A. Myers, Adam Shull:
Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation. 833 - Daniel Masny:
Authentication from Weak PRFs with Hidden Auxiliary Input. 834 - Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan:
Coppersmith's lattices and "focus groups": an attack on small-exponent RSA. 835 - Yin Li, Xingpo Ma, Qin Chen, Chuanda Qi:
Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials. 836 - Avijit Dutta, Ashwin Jha, Mridul Nandi:
Tight Security Analysis of EHtM MAC. 837 - Jiang Zhang, Yu Yu:
Two-Round PAKE from Approximate SPH and Instantiations from Lattices. 838 - Jing Li, Licheng Wang:
Noiseless Fully Homomorphic Encryption. 839 - Saud Al Musa, Guangwu Xu:
Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas. 840 - Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel:
Efficient Length Doubling From Tweakable Block Ciphers. 841 - Darren Hurley-Smith, Julio Hernandez-Castro:
Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators. 842 - Federico Giacon, Eike Kiltz, Bertram Poettering:
Hybrid Encryption in a Multi-User Setting, Revisited. 843 - David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementing Conjunction Obfuscation under Entropic Ring LWE. 844 - Ritam Bhaumik, Mridul Nandi:
Improved Security for OCB3. 845 - Yaron Gvili:
How to Prove Megabytes (Per Second). 846 - André Chailloux, María Naya-Plasencia, André Schrottenloher:
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography. 847 - Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang:
Single Key Variant of PMAC_Plus. 848 - Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas López, Palash Sarkar:
FAST: Disk Encryption and Beyond. 849 - Evgenios M. Kornaropoulos, Petros Efstathopoulos:
Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs. 850 - Ivica Nikolic:
How to Use Metaheuristics for Design of Symmetric-Key Primitives. 851 - Yusuke Naito:
Blockcipher-based MACs: Beyond the Birthday Bound without Message Length. 852 - Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi:
Generic Forward-Secure Key Agreement Without Signatures. 853 - Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang:
Zero-Knowledge Password Policy Check from Lattices. 854 - Xiaojuan Zhang, Xiutao Feng, Dongdai Lin:
Fault Attack on ACORN v3. 855 - Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang:
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash. 856 - Anthony Barnett, Jay Santokhi, Michael Simpson, Nigel P. Smart, Charlie Stainton-Bygrave, Srinivas Vivek, Adrian Waller:
Image Classification using non-linear Support Vector Machines on Encrypted Data. 857 - Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA-3 under Relaxed Fault Models. 858 - Jie Chen, Junqing Gong:
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups. 859 - Ling Sun, Wei Wang, Meiqin Wang:
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property. 860 - T.-H. Hubert Chan, Kai-Min Chung, Elaine Shi:
On the Depth of Oblivious Parallel RAM. 861 - Aner Ben-Efraim, Yehuda Lindell, Eran Omri:
Efficient Scalable Constant-Round MPC via Garbled Circuits. 862 - Julia Kastner, Alexander Koch, Stefan Walzer
, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
The Minimum Number of Cards in Practical Card-based Protocols. 863 - Akinori Hosoyamada, Yu Sasaki, Keita Xagawa:
Quantum Multicollision-Finding Algorithm. 864 - Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar:
The First Thorough Side-Channel Hardware Trojan. 865 - Papa B. Seye, Augustin P. Sarr:
Enhanced Modelling of Authenticated Key Exchange Security. 866 - S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan:
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing. 867 - Takanori Isobe, Kyoji Shibutani:
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers. 868 - Sebastian Faust, Clara Paglialonga, Tobias Schneider:
Amortizing Randomness Complexity in Private Circuits. 869 - Eike Kiltz, Julian Loss, Jiaxin Pan:
Tightly-Secure Signatures from Five-Move Identification Protocols. 870 - Shai Halevi, Yuval Ishai, Abhishek Jain
, Ilan Komargodski, Amit Sahai, Eylon Yogev:
Non-Interactive Multiparty Computation without Correlated Randomness. 871 - Jonathan Bootle, Andrea Cerulli, Essam Ghadafi, Jens Groth, Mohammad Hajiabadi, Sune K. Jakobsen:
Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability. 872 - Sarah Miracle, Scott Yilek:
Cycle Slicer: An Algorithm for Building Permutations on Special Domains. 873 - Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue, Daniel Wichs:
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions. 874 - Iddo Bentov, Ranjit Kumaresan, Andrew Miller:
Instantaneous Decentralized Poker. 875 - Benoît Libert, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE. 876 - Mihir Bellare, Viet Tung Hoang:
Identity-Based Format-Preserving Encryption. 877 - David Cerezo Sánchez:
Raziel: Private and Verifiable Smart Contracts on Blockchains. 878 - Jean-Sébastien Coron:
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations. 879 - Danielle Morgan, Arnis Parsovs:
Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version). 880 - Sarah Meiklejohn, Rebekah Mercer:
Möbius: Trustless Tumbling for Transaction Privacy. 881 - Baptiste Olivier, Tony Quertier:
Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms. 882 - Ilya Mironov, Gil Segev, Ido Shahaf:
Strengthening the Security of Encrypted Databases: Non-Transitive JOINs. 883 - Giulia Bianco, Elisa Gorla:
Scalar multiplication in compressed coordinates in the trace-zero subgroup. 884 - Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang:
PermuteRam: Optimizing Oblivious Computation for Efficiency. 885 - Giulia Bianco, Elisa Gorla:
Compression for trace zero points on twisted Edwards curves. 886 - Zvika Brakerski, Yael Tauman Kalai, Renen Perlman:
Succinct Spooky Free Compilers Are Not Black Box Sound. 887 - Philippe Camacho, Fernando Krell:
Asynchronous provably-secure hidden services. 888 - Alexander Maximov, Helena Sjoberg:
On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2). 889 - Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the One-Per-Message Unforgeability of (EC)DSA and its Variants. 890 - Nicky Mouha, M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Finding Bugs in Cryptographic Hash Function Implementations. 891 - Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi:
The Iterated Random Function Problem. 892 - Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin:
Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space. 893 - Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac:
An Efficient Pairing-Based Shuffle Argument. 894 - Andrey Bogdanov, Philip S. Vejre:
Linear Cryptanalysis of DES with Asymmetries. 895 - Ashokkumar C., M. Bhargav Sri Venkatesh, Ravi Prakash Giri, Bernard Menezes:
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks. 896 - Roderick Bloem
, Hannes Groß, Rinat Iusupov, Bettina Könighofer, Stefan Mangard, Johannes Winter:
Formal Verification of Masked Hardware Implementations in the Presence of Glitches. 897 - Stefan Kölbl:
Putting Wings on SPHINCS. 898 - Bernardo David, Rafael Dowsley, Mario Larangeira:
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement. 899 - Núria Costa, Ramiro Martínez, Paz Morillo:
Proof of a shuffle for lattice-based cryptography (Full version). 900 - Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:
Stateful Multi-Client Verifiable Computation. 901 - Essam Ghadafi:
How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors. 902 - Omer Paneth, Guy N. Rothblum:
On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments. 903 - Srinivas Devadas, Ling Ren, Hanshen Xiao:
On Iterative Collision Search for LPN and Subset Sum. 904 - Alonso González:
A Ring Signature of size Θ(sqrt[3]{n}) without Random Oracles. 905 - Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet-Mary:
Notes On GGH13 Without The Presence Of Ideals. 906 - Anastasiya Gorodilova:
On differential equivalence of APN functions. 907 - Ivan Damgård, Claudio Orlandi, Mark Simkin:
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings. 908 - Jean-Philippe Aumasson, Guillaume Endignoux:
Clarifying the subset-resilience problem. 909 - Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey:
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC). 910 - Vincent Immler, Matthias Hiller, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh:
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs. 911 - Paul Laird:
On Two Round Rerunnable MPC Protocols. 912 - Rafael Pass, Elaine Shi:
Thunderella: Blockchains with Optimistic Instant Confirmation. 913 - T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi:
Cache-Oblivious and Data-Oblivious Sorting and Applications. 914 - Lisa Eckey, Sebastian Faust, Julian Loss:
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work. 915 - Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner:
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model. 916 - Moses D. Liskov:
A practical, perfectly secure password scheme in the bounded retrieval model. 917 - Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff:
Linear Repairing Codes and Side-Channel Attacks. 918 - Oriol Farràs, Tarik Kaced, Sebastià Martín Molleví, Carles Padró:
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing. 919 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti:
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations. 920 - Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. 921 - Shachar Lovett, Jiapeng Zhang:
On the impossibility of entropy reversal, and its application to zero-knowledge proofs. 922 - Long Chen, Zhenfeng Zhang, Xueqing Wang:
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension. 923 - T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi:
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. 924 - Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti:
Resettably-Sound Resettable Zero Knowledge in Constant Rounds. 925 - Daniel Genkin, Yuval Ishai, Mor Weiss:
How to Construct a Leakage-Resilient (Stateless) Trusted Party. 926 - Kuan Cheng, Yuval Ishai, Xin Li:
Near-Optimal Secret Sharing and Error Correcting Codes in AC0. 927 - Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bülent Yener:
Environmental Authentication in Malware. 928 - Dahmun Goudarzi, Antoine Joux, Matthieu Rivain:
How to Securely Compute with Noisy Leakage in Quasilinear Complexity. 929 - Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Four-state Non-malleable Codes with Explicit Constant Rate. 930 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti:
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds. 931 - Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin:
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs. 932 - Jean-Philippe Aumasson, Guillaume Endignoux:
Improving Stateless Hash-Based Signatures. 933 - Zahra Jafargholi, Alessandra Scafuro, Daniel Wichs:
Adaptively Indistinguishable Garbled Circuits. 934 - Rishab Goyal, Vipul Goyal:
Overcoming Cryptographic Impossibility Results using Blockchains. 935 - André Chailloux, Thomas Debris-Alazard:
A tight security reduction in the quantum random oracle model for code-based signature schemes. 936 - Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John P. Steinberger:
Random Oracles and Non-Uniformity. 937 - Philip Lafrance, Alfred Menezes:
On the security of the WOTS-PRF signature scheme. 938 - Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou:
Towards Optimal Pre-processing in Leakage Detection. 939 - Amos Beimel, Oriol Farràs, Yuval Mintz, Naty Peter:
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures. 940 - (Withdrawn) CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage. 941
- Prabhanjan Ananth, Abhishek Jain
:
On Secure Two-Party Computation in Three Rounds. 942 - Sanjam Garg
, Mohammad Mahmoody, Ameer Mohammed:
When does Functional Encryption Imply Obfuscation? 943 - Susumu Kiyoshima, Huijia Lin, Muthuramakrishnan Venkitasubramaniam:
A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models. 944 - Joël Alwen, Björn Tackmann:
Moderately Hard Functions: Definition, Instantiations, and Applications. 945 - Fermi Ma, Mark Zhandry:
New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks. 946 - Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam:
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model. 947 - Ilan Komargodski, Anat Paskin-Cherniavsky:
Evolving Secret Sharing: Dynamic Thresholds and Robustness. 948 - Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann:
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures. 949 - Saeed Mahloujifar, Mohammad Mahmoody:
Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners. 950 - Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber:
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics. 951 - Yehuda Lindell, Tal Rabin:
Secure Two-Party Computation with Fairness - A Necessary Design Principle. 952 - George Teseleanu:
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures. 953 - Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. 954 - Charlotte Bonte, Eleftheria Makri, Amin Ardeshirdavani, Jaak Simm, Yves Moreau, Frederik Vercauteren:
Privacy-Preserving Genome-Wide Association Study is Practical. 955 - Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. 956 - Nico Döttling, Sanjam Garg
:
From Selective IBE to Full IBE and Selective HIBE. 957 - Nico Döttling, Nils Fleischhacker, Johannes Krupp
, Dominique Schröder:
Two-Message, Oblivious Evaluation of Cryptographic Functionalities. 958 - Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi:
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU. 959 - Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz:
Unforgeable Quantum Encryption. 960 - José Becerra, Petra Sala, Marjan Skrobot:
An Offline Dictionary Attack against zkPAKE Protocol. 961 - Christophe Petit, Kristin E. Lauter:
Hard and Easy Problems for Supersingular Isogeny Graphs. 962 - Aggelos Kiayias, Andrew Miller, Dionysis Zindros:
Non-Interactive Proofs of Proof-of-Work. 963 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Recursive ORAMs with Practical Constructions. 964 - Andreas Hülsing:
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes. 965 - Andreas Hülsing, Lea Rausch, Johannes Buchmann:
Optimal Parameters for XMSS^MT. 966 - Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan:
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions. 967 - Sarani Bhattacharya, Clémentine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay:
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls. 968 - Bei Liang, Aikaterini Mitrokotsa:
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation. 969 - Jia Xu, Ee-Chien Chang, Jianying Zhou:
A New Functional Encryption for Multidimensional Range Query. 970 - Abdelrahaman Aly, Sara Cleemput:
An Improved Protocol for Securely Solving the Shortest Path Problem and its Application to Combinatorial Auctions. 971 - Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu:
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings. 972 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Symmetric Searchable Encryption with Sharing and Unsharing. 973 - Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena:
Obscuro: A Bitcoin Mixer using Trusted Execution Environments. 974 - Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray:
Differential Attacks on Deterministic Signatures. 975 - Mike Rosulek:
Improvements for Gate-Hiding Garbled Circuits. 976 - Akinori Hosoyamada, Yu Sasaki:
Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations. 977 - Nico Döttling, Sanjam Garg
, Mohammad Hajiabadi, Daniel Masny:
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes. 978 - Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon:
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption. 979 - Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth:
Yoyo Tricks with AES. 980 - Marcel Keller, Avishay Yanai:
Efficient Maliciously Secure Multiparty Computation for RAM. 981 - Katriel Cohn-Gordon, Cas Cremers:
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet. 982 - Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee:
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions. 983 - Marc Fischlin, Sogol Mazaheri:
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks. 984 - Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella:
Breaking Ed25519 in WolfSSL. 985 - Kirsten Eisenträger, Sean Hallgren, Travis Morrison:
On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves. 986 - Fuyuki Kitagawa, Keisuke Tanaka:
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption. 987 - Yusong Du, Baodian Wei:
On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers. 988 - Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Decentralized Multi-Client Functional Encryption for Inner Product. 989 - Sumanta Sarkar, Habeeb Syed:
Bounds on the Differential Branch Number of Permutations. 990 - Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng:
Secure Code Updates for Smart Embedded Devices based on PUFs. 991 - Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank K. Gürkaynak, Michael Muehlberghuber:
Leakage Bounds for Gaussian Side Channels. 992 - Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. 993 - Stian Fauskanger, Igor A. Semaev:
Separable Statistics and Multidimensional Linear Cryptanalysis. 994 - Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang:
A signature scheme from Learning with Truncation. 995 - Guillaume Bonnoron, Léo Ducas, Max Fillinger:
Large FHE gates from Tensored Homomorphic Accumulator. 996 - Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach:
Hash Proof Systems over Lattices Revisited. 997 - Yuanqi Shen, Amin Rezaei, Hai Zhou:
A Comparative Investigation of Approximate Attacks on Logic Encryptions. 998 - Léo Ducas:
Shortest Vector from Lattice Sieving: a Few Dimensions for Free. 999 - Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No right to remain silent: Isolating Malicious Mixes. 1000 - Mark Zhandry, Cong Zhang:
Impossibility of Order-Revealing Encryption in Idealized Models. 1001 - Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo:
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications. 1002 - Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia, Mahdi Zamani:
Secure Multi-Party Computation in Large Networks. 1003 - Sanjam Garg
, Akshayaram Srinivasan:
Garbled Protocols and Two-Round MPC from Bilinear Maps. 1004 - Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa:
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model. 1005 - Ashish Choudhury, Arpita Patra, Divya Ravi:
Round and Communication Efficient Unconditionally-secure MPC with t < n/3 in Partially Synchronous Network. 1006 - Herman Galteland, Kristian Gjøsteen:
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys. 1007 - Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. 1008 - Gabriel Gallin, Türkü Özlüm Çelik, Arnaud Tisserand:
Architecture level Optimizations for Kummer based HECC on FPGAs. 1009 - (Withdrawn) A New Digital Rights Management Solution Based on White-Box Cryptography. 1010
- Eduard Hauck, Julian Loss:
Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption. 1011 - Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced River Keyak. 1012 - Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Homomorphic SIM2D Operations: Single Instruction Much More Data. 1013 - Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler:
Attacking Deterministic Signature Schemes using Fault Attacks. 1014 - Armando Faz-Hernández, Julio López, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez:
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol. 1015 - Sahar Mazloom, S. Dov Gordon:
Differentially Private Access Patterns in Secure Computation. 1016 - Virginie Lallemand, Shahram Rasoolzadeh:
Differential Cryptanalysis of 18-Round PRIDE. 1017 - Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
A Fair Protocol for Data Trading Based on Bitcoin Transactions. 1018 - Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin:
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. 1019 - Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li:
A Novel Pre-Computation Scheme of Window τNAF for Koblitz Curves. 1020 - Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson:
Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round. 1021 - Rachid El Bansarkhani, Ali El Kaafarani:
Direct Anonymous Attestation from Lattices. 1022 - Ashrujit Ghoshal, Thomas De Cnudde:
Several Masked Implementations of the Boyar-Peralta AES S-Box. 1023 - Srinivas Vivek:
Revisiting a Masked Lookup-Table Compression Scheme. 1024 - Andreas Hülsing, Tanja Lange, Kit Smeets:
Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto. 1025 - (Withdrawn) Cube Attack against Full Kravatte. 1026
- Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus:
Eliminating Variables in Boolean Equation Systems. 1027 - Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda Alkhzaimi:
Cryptanalysis of 1-Round KECCAK. 1028 - Pyrros Chaidos, Geoffroy Couteau:
Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge. 1029 - Ling Song, Jian Guo, Danping Shi:
New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions. 1030 - Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay:
Lightweight Design Choices for LED-like Block Ciphers. 1031 - Giulia Traverso, Denise Demirel, Johannes Buchmann:
Performing Computations on Hierarchically Shared Secrets. 1032 - T.-H. Hubert Chan, Kai-Min Chung, Bruce M. Maggs, Elaine Shi:
Foundations of Differentially Oblivious Algorithms. 1033 - Sebastian Meiser, Esfandiar Mohammadi:
Ratio Buckets: A Numeric Method for r-Fold Tight Differential Privacy. 1034 - Tassos Dimitriou:
Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications. 1035 - Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur:
Rotational-XOR Cryptanalysis of Reduced-round SPECK. 1036 - Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini:
DAGS: Key Encapsulation using Dyadic GS Codes. 1037 - Hervé Chabanne, Julien Keuffer, Refik Molva:
Embedded Proofs for Verifiable Neural Networks. 1038 - Muslum Ozgur Ozmen, Attila A. Yavuz:
Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones. 1039 - (Withdrawn) Threshold Implementations of GIFT: A Trade-off Analysis. 1040
- Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin:
Compact Zero-Knowledge Proofs of Small Hamming Weight. 1041 - René Bødker Christensen:
On one-round reliable message transmission. 1042 - Yi Liu, Qi Wang:
An E-voting Protocol Based on Blockchain. 1043 - Erik-Oliver Blass, Florian Kerschbaum:
Strain: A Secure Auction for Blockchains. 1044 - José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Sala, Marjan Skrobot:
Tightly-Secure PAK(E). 1045 - Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, Rakesh B. Bobba
:
Approximate Thumbnail Preserving Encryption. 1046 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert:
Consolidating Inner Product Masking. 1047 - Divya Gupta, Hemanta K. Maji, Mingyuan Wang:
Constant-rate Non-malleable Codes in the Split-state Model. 1048 - Sarah McCarthy, Neil Smyth, Elizabeth O'Sullivan:
A Practical Implementation of Identity-Based Encryption over NTRU Lattices. 1049 - Sean Bowe, Ariel Gabizon, Ian Miers:
Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model. 1050 - Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. 1051 - Charles V. Wright, David Pouliot:
Early Detection and Analysis of Leakage Abuse Vulnerabilities. 1052 - Gilles Barthe, François Dupressoir, Benjamin Grégoire:
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'. 1053 - Seyed Farhad Aghili, Hamid Mala:
On the security of another CRC based ultralightweight RFID authentication protocol. 1054 - Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic:
Cellular Automata Based S-boxes. 1055 - Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam:
Round-Optimal Secure Multi-Party Computation. 1056 - Joppe W. Bos, Peter L. Montgomery:
Montgomery Arithmetic from a Software Perspective. 1057 - Zhengzhong Jin, Yunlei Zhao:
Optimal Key Consensus in Presence of Noise. 1058 - Lijing Zhou, Licheng Wang, Yiru Sun:
CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite. 1059 - Raphael Bost, Pierre-Alain Fouque:
Thwarting Leakage Abuse Attacks against Searchable Encryption - A Formal Approach and Applications to Database Padding. 1060 - Marshall Ball
, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering. 1061 - Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
Towards Breaking the Exponential Barrier for General Secret Sharing. 1062 - Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. 1063 - Satrajit Ghosh, Tobias Nilges:
An Algebraic Approach to Maliciously Secure Private Set Intersection. 1064 - (Withdrawn) On the Security of a Lightweight Cloud Data Auditing Scheme. 1065
- Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell:
Bulletproofs: Short Proofs for Confidential Transactions and More. 1066 - Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li:
Sharding PoW-based Blockchains via Proofs of Knowledge. 1067 - Marie-Sarah Lacharité, Kenneth G. Paterson:
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. 1068 - Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp
:
Non-Malleability vs. CCA-Security: The Case of Commitments. 1069 - Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez
, Björn Tackmann, Marko Vukolic:
The Transaction Graph for Modeling Blockchain Semantics. 1070 - Le Dong, Yongxia Mao:
Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks. 1071 - Sabyasachi Dey, Santanu Sarkar:
Settling the mystery of Zr=r in RC4. 1072 - Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin:
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers. 1073 - S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi:
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20. 1074 - Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi:
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. 1075 - Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A generalized attack on RSA type cryptosystems. 1076 - Maher Boudabra, Abderrahmane Nitaj:
A New Generalization of the KMOV Cryptosystem. 1077 - Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov:
The Tao of Inference in Privacy-Protected Databases. 1078 - Andreas Wiemers, Dominik Klein:
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack. 1079 - Mark Zhandry:
Quantum Lightning Never Strikes the Same State Twice. 1080 - Colin D. Walter:
The Montgomery and Joye Powering Ladders are Dual. 1081 - Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers:
Instruction Duplication: Leaky and Not Too Fault-Tolerant! 1082 - Zhi Chen, Junjie Shen, Alex Nicolau, Alexander V. Veidenbaum, Nahid Farhady Ghalaty, Rosario Cammarota:
CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization. 1083 - Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim:
Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version). 1084 - Stjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay, Karlo Knezevic:
Profiled SCA with a New Twist: Semi-supervised Learning. 1085 - Xingchen Wang, Yunlei Zhao:
File-injection Attack and Forward Security for Order-revealing Encryption. 1086 - Arjen K. Lenstra:
General purpose integer factoring. 1087 - Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain
, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Promise Zero Knowledge and its Applications to Round Optimal MPC. 1088 - Jian Liu, Li Duan, Yong Li, N. Asokan:
Secure Deduplication of Encrypted Data: Refined Model and New Constructions. 1089 - Lorenz Breidenbach, Philip Daian, Florian Tramèr
, Ari Juels:
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. 1090 - Arka Rai Choudhuri, Matthew Green, Abhishek Jain
, Gabriel Kaptchuk, Ian Miers:
Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards. 1091 - Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti:
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model. 1092 - Thomas Espel, Laurent Katz, Guillaume Robin:
Proposal for Protocol on a Quorum Blockchain with Zero Knowledge. 1093 - Chris Peikert, Sina Shiehian:
Privately Constraining and Programming PRFs, the LWE Way. 1094 - Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Analysis of the Bitcoin UTXO set. 1095 - Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma:
Post-quantum IND-CCA-secure KEM without Additional Hash. 1096 - Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Non-malleable Randomness Encoders and their Applications. 1097 - David Pouliot, Scott Griffy, Charles V. Wright:
The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage. 1098 - Sadegh Jamshidpour, Zahra Ahmadian:
Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method. 1099 - Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang:
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication. 1100 - Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing. 1101 - Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption. 1102 - Vahid Amin Ghafari, Honggang Hu:
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a. 1103 - Yang Wang, Mingqiang Wang:
Efficient provable-secure NTRUEncrypt over any cyclotomic field. 1104 - Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang:
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance. 1105 - Weijin Wang, Yu Qin, Jingbin Liu, Dengguo Feng:
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version). 1106 - Lucas Kowalczyk, Tal Malkin, Jonathan R. Ullman, Daniel Wichs:
Hardness of Non-Interactive Differential Privacy from One-Way Functions. 1107 - Kristin E. Lauter, Michael Naehrig:
Cryptographic Pairings. 1108 - Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi:
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation. 1109 - Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina, Axel Legay:
The secrets of profiling for side-channel analysis: feature selection matters. 1110 - Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov:
Fuzzy Authenticated Key Exchange. 1111 - Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng:
Manifold Learning Towards Masking Implementations: A First Study. 1112 - Henry Corrigan-Gibbs, Dmitry Kogan:
The Discrete-Logarithm Problem with Preprocessing. 1113 - Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier:
Fast Homomorphic Evaluation of Deep Discretized Neural Networks. 1114 - Colin D. Walter:
Hardware Aspects of Montgomery Modular Multiplication. 1115 - Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki:
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption. 1116 - Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters:
Risky Traitor Tracing and New Differential Privacy Negative Results. 1117 - Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman:
Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus. 1118 - Léonard Benedetti, Aurélien Thierry, Julien Francq:
Detection of cryptographic algorithms with grap. 1119 - David Cash, Cong Zhang:
A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage. 1120 - Valérie Nachef, Nicolas Marrière, Emmanuel Volte:
Differential Attacks on LILLIPUT Cipher. 1121 - Martin Ekerå:
On post-processing in the quantum algorithm for computing short discrete logarithms. 1122 - Cecilia Boschini, Jan Camenisch, Gregory Neven:
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs. 1123 - Nicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino:
A formal model of Bitcoin transactions. 1124 - Fabrice Benhamouda, Huijia Lin:
k-Round MPC from k-Round OT via Garbled Interactive Circuits. 1125 - Robin Ankele, Andrew Simpson:
Privacy Games for Syntactic Privacy Notions. 1126 - Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi:
On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption. 1127 - Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:
Forward Secure Efficient Group Signature in Dynamic Setting using Lattices. 1128 - Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
Probabilistic solution of Yao's millionaires' problem. 1129 - Daniel Jost, Ueli Maurer, João L. Ribeiro:
Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio. 1130 - Mikhail Anokhin:
A Certain Family of Subgroups of $\mathbb Z_n^\star$ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption. 1131 - Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish:
Doubly-efficient zkSNARKs without trusted setup. 1132 - Anton Muehlemann:
Sentiment Protocol: A Decentralized Protocol Leveraging Crowd Sourced Wisdom. 1133 - Jeroen Delvaux:
Machine Learning Attacks on PolyPUF, OB-PUF, RPUF, and PUF-FSM. 1134 - Albrecht Petzoldt:
On the Complexity of the Hybrid Approach on HFEv-. 1135 - Maria Eichlseder, Daniel Kales:
Clustering Related-Tweak Characteristics: Application to MANTIS-6. 1136 - Daniel Kales, Maria Eichlseder, Florian Mendel:
Note on the Robustness of CAESAR Candidates. 1137 - Justin Holmgren
, Lisa Yang:
(A Counterexample to) Parallel Repetition for Non-Signaling Multi-Player Games. 1138 - Leif Both, Alexander May:
Decoding Linear Codes with High Error Rate and its Impact for LPN Security. 1139 - Robin Kwant, Tanja Lange, Kimberley Thissen:
Lattice Klepto: Turning Post-Quantum Crypto Against Itself. 1140 - Virendra Sule, Anmol Yadav:
Cryptanalysis of Bivium using a Boolean all solution solver. 1141 - Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty:
PIR with compressed queries and amortized query processing. 1142 - Gustavo H. M. Zanon, Marcos A. Simplício Jr., Geovandro C. C. F. Pereira, Javad Doliskani, Paulo S. L. M. Barreto:
Faster isogeny-based compressed key agreement. 1143 - Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage:
How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace. 1144 - Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. 1145 - Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
A Zero-Knowledge Version of vSQL. 1146 - Serge Vaudenay, Damian Vizár:
Under Pressure: Security of Caesar Candidates beyond their Guarantees. 1147 - Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger:
Improvements to the Linear Layer of LowMC: A Faster Picnic. 1148 - Jintai Ding, Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Improved Cryptanalysis of HFEv- via Projection. 1149 - Vladimir Kolesnikov, Mike Rosulek, Ni Trieu:
SWiM: Secure Wildcard Pattern Matching From OT Extension. 1150 - Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer:
Shorter Linear Straight-Line Programs for MDS Matrices. 1151 - Catherine Meadows:
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption. 1152 - Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, Ari Juels:
Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware. 1153 - David Derler, Sebastian Ramacher, Daniel Slamanig:
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives. 1154 - Thalia M. Laing, Douglas R. Stinson:
A Survey and Refinement of Repairable Threshold Schemes. 1155 - Sanjam Garg
, Akshayaram Srinivasan:
Two-Round Multiparty Secure Computation from Minimal Assumptions. 1156 - Ebrahim M. Songhori, M. Sadegh Riazi, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
:
ARM2GC: Simple and Efficient Garbled Circuit Framework by Skipping. 1157 - Thang Hoang, Attila A. Yavuz, F. Betül Durak, Jorge Guajardo:
Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM. 1158 - Chunsheng Gu:
Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals. 1159 - Daniel Hart, Dohoon Kim, Giacomo Micheli, Guillermo Pascual-Perez, Christophe Petit, Yuxuan Quek:
A Practical Cryptanalysis of WalnutDSA. 1160 - Sankhanil Dey, Ranjan Ghosh:
A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes. 1161 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
Kayawood, a Key Agreement Protocol. 1162 - Najwa Aaraj, Florian Caullery, Marc Manzano:
MILP-aided Cryptanalysis of Round Reduced ChaCha. 1163 - M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
:
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. 1164 - Megha Byali, Arpita Patra, Divya Ravi, Pratik Sarkar:
Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security. 1165 - Jakub Breier, Dirmanto Jap, Shivam Bhasin:
SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers. 1166 - Sanjay Bhattacherjee, Palash Sarkar:
Cryptocurrency Voting Games. 1167 - Fabien Coelho, Arnaud Larroche, Baptiste Colin:
Itsuku: a Memory-Hardened Proof-of-Work Scheme. 1168 - David Berend, Bernhard Jungk, Shivam Bhasin:
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. 1169 - Yuanqi Shen, Amin Rezaei, Hai Zhou:
SAT-based Bit-flipping Attack on Logic Encryptions. 1170 - Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf:
Attacks on the AJPS Mersenne-based cryptosystem. 1171 - Matthias Hamann, Matthias Krause, Willi Meier:
A Note on Stream Ciphers that Continuously Use the IV. 1172 - Osmanbey Uzunkol, Öznur Kalkar, Isa Sertkaya:
Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction. 1173 - Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera:
Efficient Optimal Ate Pairing at 128-bit Security Level. 1174 - Alan Szepieniec, Bart Preneel:
Short Solutions to Nonlinear Systems of Equations. 1175 - Amin Rezaei, Yuanqi Shen, Shuyu Kong, Jie Gu, Hai Zhou:
Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks. 1176 - Sailesh Simhadri, James Steel, Benjamin Fuller:
Reusable Authentication from the Iris. 1177 - Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu:
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. 1178 - Claude Carlet, Stjepan Picek:
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials. 1179 - Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes. 1180 - Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang:
Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs. 1181 - Merav Parter, Eylon Yogev:
Distributed Computing Made Secure: A New Cycle Cover Theorem. 1182 - Hayo Baan, Sauvik Bhattacharya, Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Jose Luis Torre-Arce, Zhenfei Zhang:
Round2: KEM and PKE based on GLWR. 1183 - Ryann Cartor, Daniel Smith-Tone:
EFLASH: A New Multivariate Encryption Scheme. 1184 - Jintai Ding, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage. 1185 - Aner Ben-Efraim:
On Multiparty Garbling of Arithmetic Circuits. 1186 - Sanjam Garg
, Mohammad Mahmoody, Daniel Masny, Izaak Meckler:
On the Round Complexity of OT Extension. 1187 - Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature Schemes with a Fuzzy Private Key. 1188 - Hanno Böck, Juraj Somorovsky, Craig Young:
Return Of Bleichenbacher's Oracle Threat (ROBOT). 1189 - Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren:
PICS: Private Image Classification with SVM. 1190 - Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. 1191 - Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS. 1192 - Victor Arribas, Begül Bilgin
, George Petrides, Svetla Nikova, Vincent Rijmen:
Rhythmic Keccak: SCA Security and Low Latency in HW. 1193 - Ivan Tjuawinata, Tao Huang, Hongjun Wu:
Improved Differential Cryptanalysis on Generalized Feistel Schemes. 1194 - Oscar Reparaz, Lauren De Meyer, Begül Bilgin
, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel P. Smart:
CAPA: The Spirit of Beaver against Physical Attacks. 1195 - Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. 1196 - David Pointcheval, Olivier Sanders:
Reassessing Security of Randomizable Signatures. 1197 - Joost Renes:
Computing isogenies between Montgomery curves using the action of (0, 0). 1198 - Xiaoyang Dong, Xiaoyun Wang:
Quantum Key-recovery Attack on Feistel Structures. 1199 - Lorenzo Grassi:
MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box. 1200 - Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. 1201 - Javad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto:
Faster Cryptographic Hash Function From Supersingular Isogeny Graphs. 1202 - David Derler, Sebastian Ramacher, Daniel Slamanig:
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More. 1203 - Erick Nascimento, Lukasz Chmielewski:
Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version). 1204 - Sabyasachi Karati, Palash Sarkar:
Connecting Legendre with Kummer and Edwards. 1205 - Daniel J. Bernstein, Bo-Yin Yang:
Asymptotically faster quantum algorithms to solve multivariate quadratic equations. 1206 - Mingqiang Wang, Xue Wang, Tao Zhan:
Unconditionally secure multi-party quantum commitment scheme. 1207 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum:
Security notions for cloud storage and deduplication. 1208 - Yiyuan Luo, Xuejia Lai:
Improvements for Finding Impossible Differentials of Block Cipher Structures. 1209 - Gilles Macario-Rat, Jacques Patarin:
Two-Face: New Public Key Multivariate Schemes. 1210 - Qingju Wang, Lorenzo Grassi, Christian Rechberger:
Zero-Sum Partitions of PHOTON Permutations. 1211 - Oana Stan, Mohamed-Haykel Zayani, Renaud Sirdey, Amira Ben Hamida, Alessandro Ferreira Leite, Mallek Mziou-Sallami:
A New Crypto-Classifier Service for Energy Efficiency in Smart Cities. 1212 - Michael Meyer, Steffen Reith, Fabio Campos
:
On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic. 1213 - Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny:
HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction. 1214 - Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz:
Lattice-Based Public Key Encryption with Keyword Search. 1215 - Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik:
Probabilistic and Considerate Attestation of IoT Devices against Roving Malware. 1216 - Shan Fu, Zongyue Wang, Fanxing Wei, Guoai Xu, An Wang:
Linear Regression Side Channel Attack Applied on Constant XOR. 1217 - Dimitris Mouris, Nektarios Georgios Tsoutsos, Michail Maniatakos:
TERMinator Suite: Benchmarking Privacy-Preserving Architectures. 1218 - Subhabrata Samajder, Palash Sarkar:
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations. 1219 - Lynn Batten, Xun Yi:
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change. 1220 - Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr:
Weak-Unforgeable Tags for Secure Supply Chain Management. 1221 - Muslum Ozgur Ozmen, Thang Hoang, Attila A. Yavuz:
Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search. 1222 - Hannes Groß, Rinat Iusupov, Roderick Bloem
:
Generic Low-Latency Masking. 1223 - Keita Xagawa:
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017. 1224 - Yehuda Lindell, Avishay Yanai:
Fast Garbling of Circuits over 3-Valued Logic. 1225 - Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz:
New (and Old) Proof Systems for Lattice Problems. 1226 - Victor Arribas, Svetla Nikova, Vincent Rijmen:
VerMI: Verification Tool for Masked Implementations. 1227 - Gottfried Herold, Elena Kirshanova, Thijs Laarhoven:
Speed-ups and time-memory trade-offs for tuple lattice sieving. 1228 - Akinori Hosoyamada, Yu Sasaki:
Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions. 1229 - Marcel Keller, Valerio Pastro, Dragos Rotaru:
Overdrive: Making SPDZ Great Again. 1230 - Houda Ferradi, David Naccache:
Integer Reconstruction Public-Key Encryption. 1231 - Motahhareh Gharahi, Shahram Khazaei:
Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants. 1232 - Gilles Barthe, Benjamin Grégoire, Vincent Laporte:
Provably secure compilation of side-channel countermeasures. 1233 - Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric:
High-Precision Privacy-Preserving Real-Valued Function Evaluation. 1234 - Rafaël del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler:
Practical Quantum-Safe Voting from Lattices. 1235 - Jean-Charles Faugère, Kelsey Horan, Delaram Kahrobaei, Marc Kaplan, Elham Kashefi, Ludovic Perret:
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations. 1236 - Thang Hoang, Attila A. Yavuz, Jorge Guajardo:
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services. 1237 - Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, Attila A. Yavuz:
Efficient Oblivious Data Structures for Database Services on the Cloud. 1238 - Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie:
An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain. 1239 - Mridula Singh, Patrick Leu, Srdjan Capkun:
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks. 1240 - Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu:
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus). 1241 - Taotao Li, Parhat Abla, Mingsheng Wang, Qianwen Wei:
Designing Proof of Transaction Puzzles for Cryptocurrency. 1242 - Hongda Li, Dongxue Pan, Peifang Ni:
Augmented Black-Box Simulation and Zero Knowledge Argument for NP. 1243 - Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng:
Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity". 1244 - Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun:
IntegriKey: End-to-End Integrity Protection of User Input. 1245 - Alessandro Cilardo, Andrea Primativo:
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus. 1246 - Min Liang, Li Yang:
Block encryption of quantum messages. 1247 - Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, Stefano Tessaro:
Foundations of Homomorphic Secret Sharing. 1248 - Xiaoyang Dong, Zheng Li, Xiaoyun Wang:
Quantum Cryptanalysis on Some Generalized Feistel Schemes. 1249 - Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Non-Interactive Delegation for Low-Space Non-Deterministic Computation. 1250 - Nir Drucker, Shay Gueron:
A toolbox for software optimization of QC-MDPC code-based cryptosystems. 1251 - Jacqueline Brendel, Marc Fischlin, Felix Günther:
Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3. 1252 - Yann Le Corre, Johann Großschädl, Daniel Dinu:
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors. 1253 - Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savas:
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices. 1254 - Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia:
On the Strategy and Behavior of Bitcoin Mining with N-attackers. 1255 - Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia:
A Universally Composable Treatment of Network Time. 1256 - Oscar Reparaz, Benedikt Gierlichs:
A first-order chosen-plaintext DPA attack on the third round of DES. 1257 - Yongge Wang, Qutaibah M. Malluhi:
Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project. 1258 - Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie:
Cryptanalysis of HK17. 1259 - Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Learning Parity with Noise. 1260 - Sachin Kumar, Jawad Haj-Yihia, Mustafa Khairallah, Anupam Chattopadhyay:
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates. 1261 - Gary McGuire, Daniela Müller:
A few more index calculus algorithms for the ECDLP. 1262
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.