


default search action
IACR Cryptology ePrint Archive, Volume 2025
Volume 2025, 2025
- Shweta Agrawal, Simran Kumari, Shota Yamada:
Attribute Based Encryption for Turing Machines from Lattices. 1 - Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou:
Voting with coercion resistance and everlasting privacy using linkable ring signatures. 2 - Aditya Singh Rawat, Mahabir Prasad Jhanwar:
Post-Quantum DNSSEC with Faster TCP Fallbacks. 3 - Radhika Garg, Xiao Wang:
Smaug: Modular Augmentation of LLVM for MPC. 4 - Tanusree Sharma, Mizanur Rahman, Silvia Sandhi, Yang Wang, Rifat Shahriyar, S. M. Taiabul Haque:
What is "legal" and "illegal?": Social Norms, Current Practices and Perceived Risks among the Cryptocurrency Users in Bangladesh. 5 - Ittai Abraham, Renas Bacho, Julian Loss, Gilad Stern:
Nearly Quadratic Asynchronous Distributed Key Generation. 6 - Daniel Nager:
Non Linearizable Entropic Operator. 7 - Angold Wang:
A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials. 8 - Merve Karabulut, Reza Azarderakhsh:
Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust. 9 - Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
A Combinatorial Approach to IoT Data Security. 10 - Dipayan Saha, Farimah Farahmandi:
DL-SCADS: Deep Learning-Based Post-Silicon Side-Channel Analysis Using Decomposed Signal. 11 - Wouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede:
Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell. 12 - José Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega:
Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms. 13 - Md Kawser Bepary, Arunabho Basu, Sajeed Mohammad, Rakibul Hassan, Farimah Farahmandi, Mark M. Tehranipoor:
SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity. 14 - Jianjun Hu:
A New Method for Solving Discrete Logarithm Based on Index Calculus. 15 - Yuval Efron, Ertem Nusret Tas:
Dynamically Available Common Subset. 16 - Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo:
New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version). 17 - Maxime Bombar, Nicolas Resch, Emiel Wiedijk:
On the Independence Assumption in Quasi-Cyclic Code-Based Cryptography. 18 - Hao Chung, Ke Wu, Elaine Shi:
Foundations of Platform-Assisted Auctions. 19 - Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, Heeseok Kim, Seokhie Hong:
ProbeShooter: A New Practical Approach for Probe Aiming. 20 - Thomas Johansson, Mustafa Khairallah, Vu Nguyen:
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem. 21 - Zhihao Li, Xuan Shen, Xianhui Lu, Ruida Wang, Yuan Zhao, Zhiwei Wang, Benqiang Wei:
Leveled Functional Bootstrapping via External Product Tree. 22 - Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri:
Cryptography is Rocket Science: Analysis of BPSec. 23 - Olivier Blazy, Emmanuel Conchon, Philippe Gaborit, Philippe Krejci, Cristina Onete:
Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited. 24 - Ky Nguyen:
Chosen-Ciphertext Security for Inner Product FE: Multi-Client and Multi-Input, Generically. 25 - Wakaha Ogata, Toi Tomita, Kenta Takahashi, Masakatsu Nishigaki:
How to use your brain for cryptography without trustworthy machines. 26 - Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler:
Constant time lattice reduction in dimension 4 with application to SQIsign. 27 - Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei, Liuyu Yang:
Extending Groth16 for Disjunctive Statements. 28 - Dongyu Wu:
Highly Efficient Server-Aided Multiparty Subfield VOLE Distribution Protocol. 29 - Jingwei Hu, Zhiqi Liu, Cong Zuo:
Delegated Multi-party Private Set Intersection from Secret Sharing. 30 - Varun Madathil, Alessandra Scafuro, Tanner Verber:
Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH. 31 - Alessandra Scafuro, Tanner Verber:
A New Paradigm for Server-Aided MPC. 32 - Laia Amorós, James Clements, Chloe Martindale:
Parametrizing Maximal Orders Along Supersingular ℓ-Isogeny Paths. 33 - Alex Evans, Nicolas Mohnblatt, Guillermo Angeris:
ZODA: Zero-Overhead Data Availability. 34 - Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao:
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience. 35 - Aydin Abadi, Yvo Desmedt:
Scalable Post-Quantum Oblivious Transfers for Resource-Constrained Receivers. 36 - Daniel A. Nagy, János Tapolcai, István András Seres, Bence Ladóczki:
Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon. 37 - Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate:
Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains. 38 - Huayi Qi, Minghui Xu, Xiaohua Jia, Xiuzhen Cheng:
VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness. 39 - Keitaro Hashimoto, Shuichi Katsumata, Thom Wiggers:
Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol. 40 - Omid Mirzamohammadi, Jan Bobolz, Mahdi Sedaghat, Emad Heydari Beni, Aysajan Abidin, Dave Singelée, Bart Preneel:
Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure. 41 - James Clements:
Structural Results for Maximal Quaternion Orders and Connecting Ideals of Prime Power Norm in Bp,∞. 42 - Colin Finkbeiner, Mohamed E. Najd, Julia Guskind, Ghada Almashaqbeh:
SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models. 43 - Jeffrey Champion, Yao-Ching Hsieh, David J. Wu:
Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE. 44 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Nimish Mishra, Ayantika Chatterjee, Debdeep Mukhopadhyay:
IND-CPAC: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption. 45 - Benny Applebaum, Oded Nir:
The Meta-Complexity of Secret Sharing. 46 - Shweta Agrawal, Giulio Malavolta, Tianwei Zhang:
Time-Lock Puzzles from Lattices. 47 - Jianqiao Cambridge Mo, Brandon Reagen:
ABLE: Optimizing Mixed Arithmetic and Boolean Garbled Circuit. 48 - Theophilus Agama:
On the gap between terms in an addition chain. 49 - Elodie Ngoie Mutombo, Mike Wa Nkongolo, Mahmut Tokmak:
Cryptojacking detection using local interpretable model-agnostic explanations. 50 - Ziqi Zhu, Kai Zhang, Zhili Chen, Junqing Gong, Haifeng Qian:
Black-Box Registered ABE from Lattices. 51 - Yashvanth Kondi, Divya Ravi:
Separating Broadcast from Cheater Identification. 52 - Gefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova, Xiao Wang, Ning Luo:
Founding Zero-Knowledge Proofs of Training on Optimum Vicinity. 53 - Hyunjung Son, Seunghun Paik, Yunki Kim, Sunpill Kim, Heewon Chung, Jae Hong Seo:
Doubly Efficient Fuzzy Private Set Intersection for High-dimensional Data with Cosine Similarity. 54 - Justin Drake, Dmitry Khovratovich, Mikhail Kudinov, Benedikt Wagner:
Hash-Based Multi-Signatures for Post-Quantum Ethereum. 55 - Xichao Hu, Lin Jiao:
Partial-guess, Pre-sieve, Greedy-search - New Unified Key Recovery Framework of Impossible Boomerang Attacks: Full-round Attack on ARADI. 56 - Bhargav Nagaraja Bhatt, Fatemeh Shirazi, Alistair Stewart:
Trustless Bridges via Random Sampling Light Clients. 57 - Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger:
Skyscraper: Fast Hashing on Big Primes. 58 - Hossein Hafezi, Aditi Partap, Sourav Das, Joseph Bonneau:
Fair Signature Exchange. 59 - Shuang Sun, Eleftheria Makri:
SoK: Multiparty Computation in the Preprocessing Model. 60 - Thibauld Feneuil, Matthieu Rivain:
CAPSS: A Framework for SNARK-Friendly Post-Quantum Signatures. 61 - Kathrin Hövelmanns, Mikhail A. Kudinov:
Treating dishonest ciphertexts in post-quantum KEMs - explicit vs. implicit rejection in the FO transform. 62 - Yibo Cao, Shiyuan Xu, Gang Xu, Xiu-Bo Chen, Tao Shang, Yuling Chen, Zongpeng Li:
PunSearch: Enabling Puncturable Encrypted Search over Lattice for Cloud Storage Systems. 63 - Faxing Wang, Shaanan Cohney, Joseph Bonneau:
SoK: Trusted setups for powers-of-tau strings. 64 - Lev Soukhanov, Yaroslav Rebenko:
Morgana: a laconic circuit builder. 65 - Jaehyung Kim:
Efficient Homomorphic Integer Computer from CKKS. 66 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Constant latency and finality for dynamically available DAG. 67 - Jonas Nick, Liam Eagen, Robin Linus:
Shielded CSV: Private and Efficient Client-Side Validation. 68 - Oskar Goldhahn:
On Composing Generic Voting Schemes for Improved Privacy. 69 - Andrew Lewis-Pye, Tim Roughgarden:
Beyond Optimal Fault-Tolerance. 70 - Hossein Abdinasibfar, Camille Nuoskala, Antonis Michalas:
The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption. 71 - Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Sam Martin, Taeho Jung:
PSMT: Private Segmented Membership Test for Distributed Record Linkage. 72 - Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Xichao Hu, Linchun Wan, Hongwei Sun, Qi Su:
Conditional Constant Function Problem and Its Quantum Solutions: Attacking Feistel Ciphers. 73 - Chao Niu, Zhicong Huang, Zhaomin Yang, Yi Chen, Liang Kong, Cheng Hong, Tao Wei:
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering. 74 - Sonia Belaïd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphné Trama, Nicolas Ye:
Further Improvements in AES Execution over TFHE: Towards Breaking the 1 sec Barrier. 75 - Vojtech Suchanek, Vladimir Sedlacek, Marek Sýs:
Decompose and conquer: ZVP attacks on GLV curves. 76 - Eri Nakajima, Keisuke Hara, Kyosuke Yamashita:
On Multi-Key FuncCPA Secure Encryption Schemes. 77 - Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Thomas Prest, Rolfe Schmidt:
Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol. 78 - Upasana Mandal, Shubhi Shukla, Nimish Mishra, Sarani Bhattacharya, Paritosh Saxena, Debdeep Mukhopadhyay:
Uncovering Security Vulnerabilities in Intel Trust Domain Extensions. 79 - Véronique Cortier, Alexandre Debant, Pierrick Gaudry:
Breaking verifiability and vote privacy in CHVote. 80 - Iftach Haitner, Yehuda Lindell, Nikolaos Makriyannis:
Integer Commitments, Old and New Tools. 81 - Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong:
Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer. 82 - Tiantian Gong, Gustavo Franco Camilo, Kartik Nayak, Andrew Lewis-Pye, Aniket Kate:
Recover from Excessive Faults in Partially-Synchronous BFT SMR. 83 - Yijia Chang, Songze Li:
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity. 84 - Michele Battagliola, Giacomo Borin, Giovanni Di Crescenzo, Alessio Meneghetti, Edoardo Persichetti:
Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements. 85 - Ahmed Alharbi, Charles Bouillaguet:
Artificial Results From Hardware Synthesis. 86 - Maiara F. Bollauf, Maja Lie, Cong Ling:
On Gaussian Sampling for q-ary Lattices and Linear Codes with Lee Weight. 87 - Aydin Abadi, Amirreza Sarencheh, Henry Skeoch, Thomas Zacharias:
ICT: Insured Cryptocurrency Transactions. 88 - Hayder Tirmazi, Tien Phuoc Tran:
An Introduction to Protein Cryptography. 89 - Fangan-Yssouf Dosso, Nadia El Mrabet, Nicolas Méloni, François Palma, Pascal Véron:
Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System. 90 - Ruslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi:
poqeth: Efficient, post-quantum signature verification on Ethereum. 91 - Jake Doliskani:
Public-Key Quantum Money From Standard Assumptions (In The Generic Model). 92 - Indranil Thakur, Angshuman Karmakar, Chaoyun Li, Bart Preneel:
A Survey on Transciphering and Symmetric Ciphers for Homomorphic Encryption. 93 - Geoffroy Couteau, Lalita Devadas, Aditya Hegde, Abhishek Jain, Sacha Servan-Schreiber:
Multi-Key Homomorphic Secret Sharing. 94 - Elette Boyle, Lalita Devadas, Sacha Servan-Schreiber:
Non-Interactive Distributed Point Functions. 95 - Elette Boyle, Abhishek Jain, Sacha Servan-Schreiber, Akshayaram Srinivasan:
Simultaneous-Message and Succinct Secure Computation. 96 - Mingfei Zhang, Rujia Li, Xueqian Lu, Sisi Duan:
Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake. 97 - Maxence Brugeres, Victor Languille, Petr Kuznetsov, Hamza Zarfaoui:
Fast, private and regulated payments in asynchronous networks. 98 - Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng:
Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus. 99 - Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng:
Zero-Knowledge Proofs of Quantumness. 100 - Mateusz Lesniak, Michal Wronski, Ewa Syta, Miroslaw Kutylowski:
Unveiling Privacy Risks in Quantum Optimization Services. 101 - Antoine Bak:
A practical distinguisher on the full Skyscraper permutation. 102 - Zihao Wei, Siwei Sun, Fengmei Liu, Lei Hu, Zhiyu Zhang:
Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes. 103 - Nir Bitansky, Saroja Erabelli, Rachit Garg:
Additive Randomized Encodings from Public Key Encryption. 104 - Srinath T. V. Setty, Justin Thaler:
Twist and Shout: Faster memory checking arguments via one-hot addressing and increments. 105 - Joo Woo, Jonghyun Kim, Ga Hee Hong, Seungwoo Lee, Minkyu Kim, Hochang Lee, Jong Hwan Park:
NTRU+Sign: Compact NTRU-Based Signatures Using Bimodal Distributions. 106 - Fabio Campos, Andreas Hellenbrand, Michael Meyer, Krijn Reijnders:
dCTIDH: Fast & Deterministic CTIDH. 107 - Samir Bouftass:
Subset sum, a new insight. 108 - Wasilij Beskorovajnov, Sarai Eilebrecht, Yufan Jiang, Jörn Müller-Quade:
A Formal Treatment of Homomorphic Encryption Based Outsourced Computation in the Universal Composability Framework. 109 - Gaspard Anthoine, Daniele Cozzo, Dario Fiore:
Verification-efficient Homomorphic Signatures for Verifiable Computation over Data Streams. 110 - Alain Couvreur, Rakhi Pratihar, Nihan Tanisali, Ilaria Zappatore:
On the structure of the Schur squares of Twisted Generalized Reed-Solomon codes and application to cryptanalysis. 111 - Marija Mikic, Mihajlo Srbakoski, Strahinja Praska:
Post-Quantum Stealth Address Protocols. 112 - James Hsin-Yu Chiang, Ivan Damgård, William R. Duro, Sunniva Engan, Sebastian Kolby, Peter Scholl:
Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. 113 - Cyrius Nugier, Jean-Christophe Deneuville:
Better Codes for the HQC Cryptosystem. 114 - Keitaro Hashimoto, Wakaha Ogata, Yusuke Sakai:
Signatures with Tight Adaptive Corruptions from Search Assumptions. 115 - Jonas Schupp, Georg Sigl:
A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). 116 - Martin R. Albrecht, Nicolas Gama, James Howe, Anand Kumar Narayanan:
Post-Quantum Online/Offline Signatures. 117 - Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov:
How to Prove False Statements: Practical Attacks on Fiat-Shamir. 118 - Nouri Alnahawi, David Haas, Erik Mauß, Alexander Wiesmaier:
SoK: PQC PAKEs - Cryptographic Primitives, Design and Security. 119 - Katharina Boudgoust, Hannah Keller:
Module Learning with Errors with Truncated Matrices. 120 - Vasyl Ustimenko:
On symbolic computations over arbitrary commutative rings and cryptography with the temporal Jordan-Gauss graphs. 121 - Yunhao Wang, Fan Zhang:
Qelect: Lattice-based Single Secret Leader Election Made Practical. 122 - Thomas Pornin:
Falcon on ARM Cortex-M4: an Update. 123 - Ali Sah Özcan, Erkay Savas:
GPU Implementations of Three Different Key-Switching Methods for Homomorphic Encryption Schemes. 124 - Hayder Tirmazi:
A Privacy Model for Classical & Learned Bloom Filters. 125 - Chang Chen, Guoyu Yang, Qi Chen, Wei Wang, Jin Li:
Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding. 126 - Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini:
A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures. 127 - Ivan Bjerre Damgård, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen:
Asynchronous YOSO a la Paillier. 128 - Benedikt Bünz, Tushar Mopuri, Alireza Shirzad, Sriram Sridhar:
DewTwo: a transparent PCS with quasi-linear prover, logarithmic verifier and 4.5KB proofs from falsifiable assumptions. 129 - Neekon Vafa, Vinod Vaikuntanathan:
Symmetric Perceptrons, Number Partitioning and Lattices. 130 - Xavier Bultel, Charles Olivier-Anclin:
On the Anonymity of Linkable Ring Signatures. 131 - Ryan Lehmkuhl, Alexandra Henzinger, Henry Corrigan-Gibbs:
Distributional Private Information Retrieval. 132 - Henry Bambury, Phong Q. Nguyen:
Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms. 133 - Minghang Li, Qianhong Wu, Zhipeng Wang, Bo Qin, Bohang Wei, Hang Ruan, Shihong Xiong, Zhenyang Ding:
TockOwl: Asynchronous Consensus with Fault and Network Adaptability. 134 - Andrea Basso, Giacomo Borin, Wouter Castryck, Maria Corte-Real Santos, Riccardo Invernizzi, Antonin Leroux, Luciano Maino, Frederik Vercauteren, Benjamin Wesolowski:
PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies. 135 - Pierrick Gaudry, Julien Soumier, Pierre-Jean Spaenlehauer:
Isogeny-based Cryptography using Isomorphisms of Superspecial Abelian Surfaces. 136 - Jonas Bertels, Hilder V. L. Pereira, Ingrid Verbauwhede:
FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs. 137 - Jeremiah Blocki, Seunghoon Lee:
Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM. 138 - Rabiah Alnashwan, Benjamin Dowling, Bhagya Wimalasiri:
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers. 139 - Yevgeniy Dodis, Jiaxin Guan, Peter Hall, Alison Lin:
HELP: Everlasting Privacy through Server-Aided Randomness. 140 - Nico Döttling, Jesko Dujmovic, Antoine Joux:
Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials. 141 - Karthikeyan Bhargavan, Maxime Buyse, Lucas Franceschino, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters:
hax: Verifying Security-Critical Rust Software using Multiple Provers. 142 - Simon Holmgaard Kamp:
A New Way to Achieve Round-Efficient Asynchronous Byzantine Agreement. 143 - George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz:
KZH-Fold: Accountable Voting from Sublinear Accumulation. 144 - Reuven Yakar, Avishai Wool, Eyal Ronen:
Breaking RSA with Overclocking-induced GPU Faults. 145 - Jinyi Qiu, Aydin Aysu:
SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis. 146 - Maria Corte-Real Santos, Craig Costello, Sam Frengley:
Efficient algorithms for the detection of (N,N)-splittings and endomorphisms. 147 - Vincent Diemunsch, Lucca Hirschi, Steve Kremer:
A Comprehensive Formal Security Analysis of OPC UA. 148 - Hanwen Feng, Yingzi Gao, Yuan Lu, Qiang Tang, Jing Xu:
Practical Asynchronous Distributed Key Reconfiguration and Its Applications. 149 - Craig Costello, Gaurish Korpal:
On pairs of primes with small order reciprocity. 150 - Alex B. Grilo, Ramis Movassagh:
Quantum function secret sharing. 151 - Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay:
Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World. 152 - Sarah Arpin, Jun Bo Lau, Ray A. Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur:
Error floor prediction with Markov models for QC-MDPC codes. 153 - Phillip Gajland, Vincent Hwang, Jonas Janneck:
Shadowfax: Combiners for Deniability. 154 - Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan:
Cycles and Cuts in Supersingular L-Isogeny Graphs. 155 - Athish Pranav Dharmalingam, Sai Venkata Krishnan, K. R. Sivaramakrishnan, N. S. Narayanaswamy:
TallyGuard: Privacy Preserving Tallied-as-cast Guarantee. 156 - Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek:
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis. 157 - Jianing Zhang, Haoyang Wang:
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool. 158 - Yincen Chen, Qinggan Fu, Ning Zhao, Jiahao Zhao, Ling Song, Qianqian Yang:
A Holistic Framework for Impossible Boomerang Attacks. 159 - Claude Carlet, Palash Sarkar:
The Nonlinear Filter Model of Stream Cipher Redivivus. 160 - Foteini Baldimtsi, Julia Kastner, Julian Loss, Omar Renawi:
Secure Showing of Partial Attributes. 161 - Francesca Falzon, Tianxin Tang:
Learning from Functionality Outputs: Private Join and Compute in the Real World. 162 - Olivier Bernard, Marc Joye:
Bootstrapping (T)FHE Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys. 163 - Rishab Goyal, Saikumar Yadugiri:
Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions. 164 - Jiacheng Gao, Yuan Zhang, Sheng Zhong:
Shuffle Shamir Secret Shares Uniformly with Linear Online Communication. 165 - Abhraneel Dutta, Emrah Karagoz, Edoardo Persichetti, Pakize Sanal:
Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography. 166 - Mahdi Soleimani, Grace Jia, In Gim, Seung-seob Lee, Anurag Khandelwal:
Wiretapping LLMs: Network Side-Channel Attacks on Interactive LLM Services. 167 - Oriol Farràs, Miquel Guiot:
Revisiting Beimel-Weinreb Weighted Threshold Secret Sharing Schemes. 168 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
Efficient Pseudorandom Correlation Generators for Any Finite Field. 169 - Mohamed Abdelmonem, Lukas Holzbaur, Håvard Raddum, Alexander Zeh:
Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. 170 - Alex Charlès, Aleksei Udovenko:
A light white-box masking scheme using Dummy Shuffled Secure Multiplication. 171 - Junkai Liang, Daqi Hu, Pengfei Wu, Yunbo Yang, Qingni Shen, Zhonghai Wu:
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice. 172 - Nick Aquina, Bruno Cimoli, Soumya Das, Kathrin Hövelmanns, Fiona Johanna Weber, Chigo Okonkwo, Simon Rommel, Boris Skoric, Idelfonso Tafur Monroy, Sebastian R. Verschoor:
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography. 173 - Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Sri Aravinda Krishnan Thyagarajan:
VITARIT: Paying for Threshold Services on Bitcoin and Friends. 174 - Joël Alwen, Georg Fuchsbauer, Marta Mularczyk:
Updatable Public-Key Encryption, Revisited. 175 - Aniket Kate, Easwar Vivek Mangipudi, Charan Nomula, Raghavendra Ramesh, Athina Terzoglou, Joshua Tobkin:
HyperLoop: Rationally secure efficient cross-chain bridge. 176 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
On the Power of Sumcheck in Secure Multiparty Computation. 177 - Chao Niu, Muzhou Li, Jifu Zhang, Meiqin Wang:
Improved Differential and Linear Cryptanalysis on Round-Reduced SIMON. 178 - Vahid Jahandideh, Bart Mennink, Lejla Batina:
Higher-Order Deterministic Masking with Application to Ascon. 179 - Di Wu, Shoupeng Ren, Yuman Bai, Lipeng He, Jian Liu, Wu Wen, Kui Ren, Chun Chen:
On the Atomicity and Efficiency of Blockchain Payment Channels. 180 - Max Duparc, Mounir Taha:
Improved NTT and CRT-based RNR Blinding for Side-Channel and Fault Resistant Kyber. 181 - Zhiyuan An, Fangguo Zhang:
Deny Whatever You Want: Dual-Deniable Public-Key Encryption. 182 - Apostolos Mavrogiannakis, Xian Wang, Ioannis Demertzis, Dimitrios Papadopoulos, Minos N. Garofalakis:
OBLIVIATOR: Oblivious Parallel Joins and other Operators in Shared Memory Environments. 183 - Orfeas Stefanos Thyfronitis Litos, Zhaoxuan Wu, Alfredo Musumeci, Songyun Hu, James Helsby, Michael Breza, William Knottenbelt:
NodeChain: Cheap Data Integrity Without Consensus. 184 - Marcel Nageler, Shibam Ghosh, Marlene Jüttler, Maria Eichlseder:
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions. 185 - Maher Mamah:
Computing Quaternion Embeddings and Endomorphism rings of Supersingular Oriented Elliptic curves. 186 - Huck Bennett, Drisana Bhatia, Jean-François Biasse, Medha Durisheti, Lucas LaBuff, Vincenzo Pallozzi Lavorante, Phillip Waitkevich:
Asymptotic improvements to provable algorithms for the code equivalence problem. 187 - Nan Wang, Qianhui Wang, Dongxi Liu, Muhammed F. Esgin, Alsharif Abuadbba:
BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. 188 - Madhurima Mukhopadhyay:
Experimentally studying path-finding problem between conjugates in supersingular isogeny graphs: Optimizing primes and powers to speed-up cycle finding. 189 - Jad Silbak, Daniel Wichs:
Binary Codes for Error Detection and Correction in a Computationally Bounded World. 190 - Cruz Barnum, David Heath:
Adaptive Distributional Security: A Framework for Input-Adaptive Cryptography. 191 - Shivam Bhasin, Dirmanto Jap, Marina Krcek, Stjepan Picek, Prasanna Ravi:
Practical Electromagnetic Fault Injection on Intel Neural Compute Stick 2. 192 - Julien Béguinot, Loïc Masure:
On the Average Random Probing Model. 193 - Sarisht Wadhwa, Julian Ma, Thomas Thiery, Barnabe Monnot, Luca Zanolini, Fan Zhang, Kartik Nayak:
AUCIL: An Inclusion List Design for Rational Parties. 194 - Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin:
Finding a polytope: A practical fault attack against Dilithium. 195 - Dimitri Koshelev, Antonio Sanso:
Endomorphisms for Faster Cryptography on Elliptic Curves of Moderate CM Discriminants, II. 196 - Tim Beyne, Michiel Verbauwhede:
Cryptanalysis of a nonlinear filter-based stream cipher. 197

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.