


default search action
IACR Cryptology ePrint Archive, Volume 2025
Volume 2025, 2025
- Shweta Agrawal, Simran Kumari, Shota Yamada:
Attribute Based Encryption for Turing Machines from Lattices. 1 - Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou:
Voting with coercion resistance and everlasting privacy using linkable ring signatures. 2 - Aditya Singh Rawat, Mahabir Prasad Jhanwar:
Post-Quantum DNSSEC with Faster TCP Fallbacks. 3 - Radhika Garg, Xiao Wang:
Smaug: Modular Augmentation of LLVM for MPC. 4 - Tanusree Sharma, Mizanur Rahman, Silvia Sandhi, Yang Wang, Rifat Shahriyar, S. M. Taiabul Haque:
What is "legal" and "illegal?": Social Norms, Current Practices and Perceived Risks among the Cryptocurrency Users in Bangladesh. 5 - Ittai Abraham, Renas Bacho, Julian Loss, Gilad Stern:
Nearly Quadratic Asynchronous Distributed Key Generation. 6 - Daniel Nager:
Non Linearizable Entropic Operator. 7 - Angold Wang:
A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials. 8 - Merve Karabulut, Reza Azarderakhsh:
Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust. 9 - Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
A Combinatorial Approach to IoT Data Security. 10 - Dipayan Saha, Farimah Farahmandi:
DL-SCADS: Deep Learning-Based Post-Silicon Side-Channel Analysis Using Decomposed Signal. 11 - Wouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede:
Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell. 12 - José Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega:
Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms. 13 - Md Kawser Bepary, Arunabho Basu, Sajeed Mohammad, Rakibul Hassan, Farimah Farahmandi, Mark Tehranipoor:
SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity. 14 - Jianjun Hu:
A New Method for Solving Discrete Logarithm Based on Index Calculus. 15 - Yuval Efron, Ertem Nusret Tas:
Dynamically Available Common Subset. 16 - Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo:
New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version). 17 - Maxime Bombar, Nicolas Resch, Emiel Wiedijk:
On the Independence Assumption in Quasi-Cyclic Code-Based Cryptography. 18 - Hao Chung, Ke Wu, Elaine Shi:
Foundations of Platform-Assisted Auctions. 19 - Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, Heeseok Kim, Seokhie Hong:
ProbeShooter: A New Practical Approach for Probe Aiming. 20 - Thomas Johansson, Mustafa Khairallah, Vu Nguyen:
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem. 21 - Zhihao Li, Xuan Shen, Xianhui Lu, Ruida Wang, Yuan Zhao, Zhiwei Wang, Benqiang Wei:
Leveled Functional Bootstrapping via External Product Tree. 22 - Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri:
Cryptography is Rocket Science: Analysis of BPSec. 23 - Olivier Blazy, Emmanuel Conchon, Philippe Gaborit, Philippe Krejci, Cristina Onete:
Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited. 24 - Ky Nguyen:
Chosen-Ciphertext Security for Inner Product FE: Multi-Client and Multi-Input, Generically. 25 - Wakaha Ogata, Toi Tomita, Kenta Takahashi, Masakatsu Nishigaki:
How to use your brain for cryptography without trustworthy machines. 26 - Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler:
Constant time lattice reduction in dimension 4 with application to SQIsign. 27 - Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei, Liuyu Yang:
Extending Groth16 for Disjunctive Statements. 28 - Dongyu Wu:
Highly Efficient Server-Aided Multiparty Subfield VOLE Distribution Protocol. 29 - Jingwei Hu, Zhiqi Liu, Cong Zuo:
Delegated Multi-party Private Set Intersection from Secret Sharing. 30 - Varun Madathil, Alessandra Scafuro, Tanner Verber:
Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH. 31 - Alessandra Scafuro, Tanner Verber:
A New Paradigm for Server-Aided MPC. 32 - Laia Amorós, James Clements, Chloe Martindale:
Parametrizing Maximal Orders Along Supersingular ℓ-Isogeny Paths. 33 - Alex Evans, Nicolas Mohnblatt, Guillermo Angeris:
ZODA: Zero-Overhead Data Availability. 34 - Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao:
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience. 35 - Aydin Abadi, Yvo Desmedt:
Scalable Post-Quantum Oblivious Transfers for Resource-Constrained Receivers. 36 - Daniel A. Nagy, János Tapolcai, István András Seres, Bence Ladóczki:
Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon. 37 - Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate:
Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains. 38 - Huayi Qi, Minghui Xu, Xiaohua Jia, Xiuzhen Cheng:
VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness. 39 - Keitaro Hashimoto, Shuichi Katsumata, Thom Wiggers:
Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol. 40 - Omid Mirzamohammadi, Jan Bobolz, Mahdi Sedaghat, Emad Heydari Beni, Aysajan Abidin, Dave Singelée, Bart Preneel:
Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure. 41 - James Clements:
Structural Results for Maximal Quaternion Orders and Connecting Ideals of Prime Power Norm in Bp,∞. 42 - Colin Finkbeiner, Mohamed E. Najd, Julia Guskind, Ghada Almashaqbeh:
SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models. 43 - Jeffrey Champion, Yao-Ching Hsieh, David J. Wu:
Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE. 44 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Nimish Mishra, Ayantika Chatterjee, Debdeep Mukhopadhyay:
IND-CPAC: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption. 45 - Benny Applebaum, Oded Nir:
The Meta-Complexity of Secret Sharing. 46 - Shweta Agrawal, Giulio Malavolta, Tianwei Zhang:
Time-Lock Puzzles from Lattices. 47 - Jianqiao Cambridge Mo, Brandon Reagen:
ABLE: Optimizing Mixed Arithmetic and Boolean Garbled Circuit. 48 - Theophilus Agama:
On the gap between terms in an addition chain. 49 - Elodie Ngoie Mutombo, Mike Wa Nkongolo, Mahmut Tokmak:
Cryptojacking detection using local interpretable model-agnostic explanations. 50 - Ziqi Zhu, Kai Zhang, Zhili Chen, Junqing Gong, Haifeng Qian:
Black-Box Registered ABE from Lattices. 51 - Yashvanth Kondi, Divya Ravi:
Separating Broadcast from Cheater Identification. 52 - Gefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova, Xiao Wang, Ning Luo:
Founding Zero-Knowledge Proofs of Training on Optimum Vicinity. 53 - Hyunjung Son, Seunghun Paik, Yunki Kim, Sunpill Kim, Heewon Chung, Jae Hong Seo:
Doubly Efficient Fuzzy Private Set Intersection for High-dimensional Data with Cosine Similarity. 54 - Justin Drake, Dmitry Khovratovich, Mikhail A. Kudinov, Benedikt Wagner:
Hash-Based Multi-Signatures for Post-Quantum Ethereum. 55 - Xichao Hu, Lin Jiao:
Partial-guess, Pre-sieve, Greedy-search - New Unified Key Recovery Framework of Impossible Boomerang Attacks: Full-round Attack on ARADI. 56 - Bhargav Nagaraja Bhatt, Fatemeh Shirazi, Alistair Stewart:
Trustless Bridges via Random Sampling Light Clients. 57 - Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger:
Skyscraper: Fast Hashing on Big Primes. 58 - Hossein Hafezi, Aditi Partap, Sourav Das, Joseph Bonneau:
Fair Signature Exchange. 59 - Shuang Sun, Eleftheria Makri:
SoK: Multiparty Computation in the Preprocessing Model. 60 - Thibauld Feneuil, Matthieu Rivain:
CAPSS: A Framework for SNARK-Friendly Post-Quantum Signatures. 61 - Kathrin Hövelmanns, Mikhail A. Kudinov:
Treating dishonest ciphertexts in post-quantum KEMs - explicit vs. implicit rejection in the FO transform. 62 - Yibo Cao, Shiyuan Xu, Gang Xu, Xiu-Bo Chen, Tao Shang, Yuling Chen, Zongpeng Li:
PunSearch: Enabling Puncturable Encrypted Search over Lattice for Cloud Storage Systems. 63 - Faxing Wang, Shaanan Cohney, Joseph Bonneau:
SoK: Trusted setups for powers-of-tau strings. 64 - Lev Soukhanov, Yaroslav Rebenko:
Morgana: a laconic circuit builder. 65 - Jaehyung Kim:
Efficient Homomorphic Integer Computer from CKKS. 66 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Constant latency and finality for dynamically available DAG. 67 - Jonas Nick, Liam Eagen, Robin Linus:
Shielded CSV: Private and Efficient Client-Side Validation. 68 - Oskar Goldhahn:
On Composing Generic Voting Schemes for Improved Privacy. 69 - Andrew Lewis-Pye, Tim Roughgarden:
Beyond Optimal Fault-Tolerance. 70 - Hossein Abdinasibfar, Camille Nuoskala, Antonis Michalas:
The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption. 71 - Nirajan Koirala, Jonathan Takeshita, Jeremy Stevens, Sam Martin, Taeho Jung:
PSMT: Private Segmented Membership Test for Distributed Record Linkage. 72 - Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Xichao Hu, Linchun Wan, Hongwei Sun, Qi Su:
Conditional Constant Function Problem and Its Quantum Solutions: Attacking Feistel Ciphers. 73 - Chao Niu, Zhicong Huang, Zhaomin Yang, Yi Chen, Liang Kong, Cheng Hong, Tao Wei:
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering. 74 - Sonia Belaïd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphné Trama, Nicolas Ye:
Further Improvements in AES Execution over TFHE: Towards Breaking the 1 sec Barrier. 75 - Vojtech Suchanek, Vladimir Sedlacek, Marek Sýs:
Decompose and conquer: ZVP attacks on GLV curves. 76 - Eri Nakajima, Keisuke Hara, Kyosuke Yamashita:
On Multi-Key FuncCPA Secure Encryption Schemes. 77 - Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Thomas Prest, Rolfe Schmidt:
Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol. 78 - Upasana Mandal, Shubhi Shukla, Nimish Mishra, Sarani Bhattacharya, Paritosh Saxena, Debdeep Mukhopadhyay:
Uncovering Security Vulnerabilities in Intel Trust Domain Extensions. 79 - Véronique Cortier, Alexandre Debant, Pierrick Gaudry:
Breaking verifiability and vote privacy in CHVote. 80 - Iftach Haitner, Yehuda Lindell, Nikolaos Makriyannis:
Integer Commitments, Old and New Tools. 81 - Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong:
Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer. 82 - Tiantian Gong, Gustavo Franco Camilo, Kartik Nayak, Andrew Lewis-Pye, Aniket Kate:
Recover from Excessive Faults in Partially-Synchronous BFT SMR. 83 - Yijia Chang, Songze Li:
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity. 84 - Michele Battagliola, Giacomo Borin, Giovanni Di Crescenzo, Alessio Meneghetti, Edoardo Persichetti:
Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements. 85 - Ahmed Alharbi, Charles Bouillaguet:
Artificial Results From Hardware Synthesis. 86 - Maiara F. Bollauf, Maja Lie, Cong Ling:
On Gaussian Sampling for q-ary Lattices and Linear Codes with Lee Weight. 87 - Aydin Abadi, Amirreza Sarencheh, Henry Skeoch, Thomas Zacharias:
ICT: Insured Cryptocurrency Transactions. 88 - Hayder Tirmazi, Tien Phuoc Tran:
An Introduction to Protein Cryptography. 89 - Fangan-Yssouf Dosso, Nadia El Mrabet, Nicolas Méloni, François Palma, Pascal Véron:
Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System. 90 - Ruslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi:
poqeth: Efficient, post-quantum signature verification on Ethereum. 91 - Jake Doliskani:
Public-Key Quantum Money From Standard Assumptions (In The Generic Model). 92 - Indranil Thakur, Angshuman Karmakar, Chaoyun Li, Bart Preneel:
A Survey on Transciphering and Symmetric Ciphers for Homomorphic Encryption. 93 - Geoffroy Couteau, Lalita Devadas, Aditya Hegde, Abhishek Jain, Sacha Servan-Schreiber:
Multi-Key Homomorphic Secret Sharing. 94 - Elette Boyle, Lalita Devadas, Sacha Servan-Schreiber:
Non-Interactive Distributed Point Functions. 95 - Elette Boyle, Abhishek Jain, Sacha Servan-Schreiber, Akshayaram Srinivasan:
Simultaneous-Message and Succinct Secure Computation. 96 - Mingfei Zhang, Rujia Li, Xueqian Lu, Sisi Duan:
Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake. 97 - Maxence Brugeres, Victor Languille, Petr Kuznetsov, Hamza Zarfaoui:
Fast, private and regulated payments in asynchronous networks. 98 - Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng:
Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus. 99 - Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng:
Zero-Knowledge Proofs of Quantumness. 100 - Mateusz Lesniak, Michal Wronski, Ewa Syta, Miroslaw Kutylowski:
Unveiling Privacy Risks in Quantum Optimization Services. 101 - Antoine Bak:
A practical distinguisher on the full Skyscraper permutation. 102 - Zihao Wei, Siwei Sun, Fengmei Liu, Lei Hu, Zhiyu Zhang:
Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes. 103 - Nir Bitansky, Saroja Erabelli, Rachit Garg:
Additive Randomized Encodings from Public Key Encryption. 104 - Srinath T. V. Setty, Justin Thaler:
Twist and Shout: Faster memory checking arguments via one-hot addressing and increments. 105 - Joo Woo, Jonghyun Kim, Ga Hee Hong, Seungwoo Lee, Minkyu Kim, Hochang Lee, Jong Hwan Park:
NTRU+Sign: Compact NTRU-Based Signatures Using Bimodal Distributions. 106 - Fabio Campos, Andreas Hellenbrand, Michael Meyer, Krijn Reijnders:
dCTIDH: Fast & Deterministic CTIDH. 107 - Samir Bouftass:
Subset sum, a new insight. 108 - Wasilij Beskorovajnov, Sarai Eilebrecht, Yufan Jiang, Jörn Müller-Quade:
A Formal Treatment of Homomorphic Encryption Based Outsourced Computation in the Universal Composability Framework. 109 - Gaspard Anthoine, Daniele Cozzo, Dario Fiore:
Verification-efficient Homomorphic Signatures for Verifiable Computation over Data Streams. 110 - Alain Couvreur, Rakhi Pratihar, Nihan Tanisali, Ilaria Zappatore:
On the structure of the Schur squares of Twisted Generalized Reed-Solomon codes and application to cryptanalysis. 111 - Marija Mikic, Mihajlo Srbakoski, Strahinja Praska:
Post-Quantum Stealth Address Protocols. 112 - James Hsin-Yu Chiang, Ivan Damgård, William R. Duro, Sunniva Engan, Sebastian Kolby, Peter Scholl:
Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. 113 - Cyrius Nugier, Jean-Christophe Deneuville:
Better Codes for the HQC Cryptosystem. 114 - Keitaro Hashimoto, Wakaha Ogata, Yusuke Sakai:
Signatures with Tight Adaptive Corruptions from Search Assumptions. 115 - Jonas Schupp, Georg Sigl:
A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). 116 - Martin R. Albrecht, Nicolas Gama, James Howe, Anand Kumar Narayanan:
Post-Quantum Online/Offline Signatures. 117 - Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov:
How to Prove False Statements: Practical Attacks on Fiat-Shamir. 118 - Nouri Alnahawi, David Haas, Erik Mauß, Alexander Wiesmaier:
SoK: PQC PAKEs - Cryptographic Primitives, Design and Security. 119 - Katharina Boudgoust, Hannah Keller:
Module Learning with Errors with Truncated Matrices. 120 - Vasyl Ustimenko:
On symbolic computations over arbitrary commutative rings and cryptography with the temporal Jordan-Gauss graphs. 121 - Yunhao Wang, Fan Zhang:
Qelect: Lattice-based Single Secret Leader Election Made Practical. 122 - Thomas Pornin:
Falcon on ARM Cortex-M4: an Update. 123 - Ali Sah Özcan, Erkay Savas:
GPU Implementations of Three Different Key-Switching Methods for Homomorphic Encryption Schemes. 124 - Hayder Tirmazi:
A Privacy Model for Classical & Learned Bloom Filters. 125 - Chang Chen, Guoyu Yang, Qi Chen, Wei Wang, Jin Li:
Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding. 126 - Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini:
A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures. 127 - Ivan Bjerre Damgård, Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen:
Asynchronous YOSO a la Paillier. 128 - Benedikt Bünz, Tushar Mopuri, Alireza Shirzad, Sriram Sridhar:
DewTwo: a transparent PCS with quasi-linear prover, logarithmic verifier and 4.5KB proofs from falsifiable assumptions. 129 - Neekon Vafa, Vinod Vaikuntanathan:
Symmetric Perceptrons, Number Partitioning and Lattices. 130 - Xavier Bultel, Charles Olivier-Anclin:
On the Anonymity of Linkable Ring Signatures. 131 - Ryan Lehmkuhl, Alexandra Henzinger, Henry Corrigan-Gibbs:
Distributional Private Information Retrieval. 132 - Henry Bambury, Phong Q. Nguyen:
Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms. 133 - Minghang Li, Qianhong Wu, Zhipeng Wang, Bo Qin, Bohang Wei, Hang Ruan, Shihong Xiong, Zhenyang Ding:
TockOwl: Asynchronous Consensus with Fault and Network Adaptability. 134 - Andrea Basso, Giacomo Borin, Wouter Castryck, Maria Corte-Real Santos, Riccardo Invernizzi, Antonin Leroux, Luciano Maino, Frederik Vercauteren, Benjamin Wesolowski:
PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies. 135 - Pierrick Gaudry, Julien Soumier, Pierre-Jean Spaenlehauer:
Isogeny-based Cryptography using Isomorphisms of Superspecial Abelian Surfaces. 136 - Jonas Bertels, Hilder V. L. Pereira, Ingrid Verbauwhede:
FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs. 137 - Jeremiah Blocki, Seunghoon Lee:
Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM. 138 - Rabiah Alnashwan, Benjamin Dowling, Bhagya Wimalasiri:
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers. 139 - Yevgeniy Dodis, Jiaxin Guan, Peter Hall, Alison Lin:
HELP: Everlasting Privacy through Server-Aided Randomness. 140 - Nico Döttling, Jesko Dujmovic, Antoine Joux:
Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials. 141 - Karthikeyan Bhargavan, Maxime Buyse, Lucas Franceschino, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters:
hax: Verifying Security-Critical Rust Software using Multiple Provers. 142 - Simon Holmgaard Kamp:
A New Way to Achieve Round-Efficient Asynchronous Byzantine Agreement. 143 - George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz:
KZH-Fold: Accountable Voting from Sublinear Accumulation. 144 - Reuven Yakar, Avishai Wool, Eyal Ronen:
Breaking RSA with Overclocking-induced GPU Faults. 145 - Jinyi Qiu, Aydin Aysu:
SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis. 146 - Maria Corte-Real Santos, Craig Costello, Sam Frengley:
Efficient algorithms for the detection of (N,N)-splittings and endomorphisms. 147 - Vincent Diemunsch, Lucca Hirschi, Steve Kremer:
A Comprehensive Formal Security Analysis of OPC UA. 148 - Hanwen Feng, Yingzi Gao, Yuan Lu, Qiang Tang, Jing Xu:
Practical Asynchronous Distributed Key Reconfiguration and Its Applications. 149 - Craig Costello, Gaurish Korpal:
On pairs of primes with small order reciprocity. 150 - Alex B. Grilo, Ramis Movassagh:
Quantum function secret sharing. 151 - Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay:
Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World. 152 - Sarah Arpin, Jun Bo Lau, Ray A. Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur:
Error floor prediction with Markov models for QC-MDPC codes. 153 - Phillip Gajland, Vincent Hwang, Jonas Janneck:
Shadowfax: Combiners for Deniability. 154 - Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan:
Cycles and Cuts in Supersingular L-Isogeny Graphs. 155 - Athish Pranav Dharmalingam, Sai Venkata Krishnan, K. R. Sivaramakrishnan, N. S. Narayanaswamy:
TallyGuard: Privacy Preserving Tallied-as-cast Guarantee. 156 - Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek:
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis. 157 - Jianing Zhang, Haoyang Wang:
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool. 158 - Yincen Chen, Qinggan Fu, Ning Zhao, Jiahao Zhao, Ling Song, Qianqian Yang:
A Holistic Framework for Impossible Boomerang Attacks. 159 - Claude Carlet, Palash Sarkar:
The Nonlinear Filter Model of Stream Cipher Redivivus. 160 - Foteini Baldimtsi, Julia Kastner, Julian Loss, Omar Renawi:
Secure Showing of Partial Attributes. 161 - Francesca Falzon, Tianxin Tang:
Learning from Functionality Outputs: Private Join and Compute in the Real World. 162 - Olivier Bernard, Marc Joye:
Bootstrapping (T)FHE Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys. 163 - Rishab Goyal, Saikumar Yadugiri:
Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions. 164 - Jiacheng Gao, Yuan Zhang, Sheng Zhong:
Shuffle Shamir Secret Shares Uniformly with Linear Online Communication. 165 - Abhraneel Dutta, Emrah Karagoz, Edoardo Persichetti, Pakize Sanal:
Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography. 166 - Mahdi Soleimani, Grace Jia, In Gim, Seung-Seob Lee, Anurag Khandelwal:
Wiretapping LLMs: Network Side-Channel Attacks on Interactive LLM Services. 167 - Oriol Farràs, Miquel Guiot:
Revisiting Beimel-Weinreb Weighted Threshold Secret Sharing Schemes. 168 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
Efficient Pseudorandom Correlation Generators for Any Finite Field. 169 - Mohamed Abdelmonem, Lukas Holzbaur, Håvard Raddum, Alexander Zeh:
Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. 170 - Alex Charlès, Aleksei Udovenko:
A light white-box masking scheme using Dummy Shuffled Secure Multiplication. 171 - Junkai Liang, Daqi Hu, Pengfei Wu, Yunbo Yang, Qingni Shen, Zhonghai Wu:
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice. 172 - Nick Aquina, Bruno Cimoli, Soumya Das, Kathrin Hövelmanns, Fiona Johanna Weber, Chigo Okonkwo, Simon Rommel, Boris Skoric, Idelfonso Tafur Monroy, Sebastian R. Verschoor:
A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography. 173 - Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Sri Aravinda Krishnan Thyagarajan:
VITARIT: Paying for Threshold Services on Bitcoin and Friends. 174 - Joël Alwen, Georg Fuchsbauer, Marta Mularczyk:
Updatable Public-Key Encryption, Revisited. 175 - Aniket Kate, Easwar Vivek Mangipudi, Charan Nomula, Raghavendra Ramesh, Athina Terzoglou, Joshua Tobkin:
HyperLoop: Rationally secure efficient cross-chain bridge. 176 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
On the Power of Sumcheck in Secure Multiparty Computation. 177 - Chao Niu, Muzhou Li, Jifu Zhang, Meiqin Wang:
Improved Differential and Linear Cryptanalysis on Round-Reduced SIMON. 178 - Vahid Jahandideh, Bart Mennink, Lejla Batina:
Higher-Order Deterministic Masking with Application to Ascon. 179 - Di Wu, Shoupeng Ren, Yuman Bai, Lipeng He, Jian Liu, Wu Wen, Kui Ren, Chun Chen:
On the Atomicity and Efficiency of Blockchain Payment Channels. 180 - Max Duparc, Mounir Taha:
Improved NTT and CRT-based RNR Blinding for Side-Channel and Fault Resistant Kyber. 181 - Zhiyuan An, Fangguo Zhang:
Deny Whatever You Want: Dual-Deniable Public-Key Encryption. 182 - Apostolos Mavrogiannakis, Xian Wang, Ioannis Demertzis, Dimitrios Papadopoulos, Minos N. Garofalakis:
OBLIVIATOR: Oblivious Parallel Joins and other Operators in Shared Memory Environments. 183 - Orfeas Stefanos Thyfronitis Litos, Zhaoxuan Wu, Alfredo Musumeci, Songyun Hu, James Helsby, Michael Breza, William Knottenbelt:
NodeChain: Cheap Data Integrity Without Consensus. 184 - Marcel Nageler, Shibam Ghosh, Marlene Jüttler, Maria Eichlseder:
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions. 185 - Maher Mamah:
Computing Quaternion Embeddings and Endomorphism rings of Supersingular Oriented Elliptic curves. 186 - Huck Bennett, Drisana Bhatia, Jean-François Biasse, Medha Durisheti, Lucas LaBuff, Vincenzo Pallozzi Lavorante, Phillip Waitkevich:
Asymptotic improvements to provable algorithms for the code equivalence problem. 187 - Nan Wang, Qianhui Wang, Dongxi Liu, Muhammed F. Esgin, Alsharif Abuadbba:
BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. 188 - Madhurima Mukhopadhyay:
Experimentally studying path-finding problem between conjugates in supersingular isogeny graphs: Optimizing primes and powers to speed-up cycle finding. 189 - Jad Silbak, Daniel Wichs:
Binary Codes for Error Detection and Correction in a Computationally Bounded World. 190 - Cruz Barnum, David Heath:
Adaptive Distributional Security: A Framework for Input-Adaptive Cryptography. 191 - Shivam Bhasin, Dirmanto Jap, Marina Krcek, Stjepan Picek, Prasanna Ravi:
Practical Electromagnetic Fault Injection on Intel Neural Compute Stick 2. 192 - Julien Béguinot, Loïc Masure:
On the Average Random Probing Model. 193 - Sarisht Wadhwa, Julian Ma, Thomas Thiery, Barnabé Monnot, Luca Zanolini, Fan Zhang, Kartik Nayak:
AUCIL: An Inclusion List Design for Rational Parties. 194 - Paco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin:
Finding a polytope: A practical fault attack against Dilithium. 195 - Dimitri Koshelev, Antonio Sanso:
Endomorphisms for Faster Cryptography on Elliptic Curves of Moderate CM Discriminants, II. 196 - Tim Beyne, Michiel Verbauwhede:
Cryptanalysis of a nonlinear filter-based stream cipher. 197 - Song Bian, Haowen Pan, Jiaqi Hu, Zhou Zhang, Yunhao Fu, Jiafeng Hua, Yi Chen, Bo Zhang, Yier Jin, Jin Dong, Zhenyu Guan:
Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption. 198 - Mi-Ying Miryam Huang, Xinyu Mao, Jiapeng Zhang:
Sublinear Proofs over Polynomial Rings. 199 - Hao Guo, Liqiang Peng, Haiyang Xue, Li Peng, Weiran Liu, Zhe Liu, Lei Hu:
Improved Secure Two-party Computation from a Geometric Perspective. 200 - Hyeonhak Kim, Donghoe Heo, Seokhie Hong:
Search and Verify Isogeny-Based Quantum Money with Rational Points. 201 - Alex B. Grilo, Ami Paz, Mor Perry:
Distributed Non-Interactive Zero-Knowledge Proofs. 202 - Intak Hwang, Seonhong Min, Yongsoo Song:
Ciphertext-Simulatable HE from BFV with Randomized Evaluation. 203 - Guilherme Rito, Christopher Portmann, Chen-Da Liu-Zhang:
Simpler and Stronger Models for Deniable Authentication. 204 - Arad Kotzer, Bence Ladóczki, János Tapolcai, Ori Rottenstreich:
Addressing Scalability Issues of Blockchains with Hypergraph Payment Networks. 205 - Xinhai Wang, Lin Ding, Zhengting Li, Jiang Wan, Bin Hu:
Revisiting the Differential-Linear Attacks on ChaCha from IEEE TIT and INDOCRYPT 2024 (Extended Abstract). 206 - Jian Guo, Wenjie Nan:
Efficient Mixed Garbling from Homomorphic Secret Sharing and GGM-Tree. 207 - Mahdi Cheraghchi, Nikhil Shagrithaya, Alexandra Veliche:
Reductions Between Code Equivalence Problems. 208 - Ahmet Ramazan Agirtas, James Ball, Michael Belegris, Gustave Charles-Saigne:
NovaTEE: Private Clearing and Settlement on Trusted Execution Hardware. 209 - Meng Hao, Weiran Liu, Liqiang Peng, Cong Zhang, Pengfei Wu, Lei Zhang, Hongwei Li, Robert H. Deng:
Practical Keyword Private Information Retrieval from Key-to-Index Mappings. 210 - Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Prior-Based Label Differential Privacy via Secure Two-Party Computation. 211 - Zhenyu Huang, Fuxin Zhang, Dongdai Lin:
Constructing Quantum Implementations with the Minimal T-depth or Minimal Width and Their Applications. 212 - Jiang Yu:
An Innovative Lightweight Symmetric Encryption Algorithm Integrating NeoAlzette ARX S-box and XCR CSPRNG. 213 - Yuanyuan Zhou, Weijia Wang, Yiteng Sun, Yu Yu:
Rejected Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks. 214 - Daniël M. H. van Gent:
A note on the genus of the HAWK lattice. 215 - Intak Hwang, Seonhong Min, Yongsoo Song:
Practical Circuit Privacy/Sanitization for TFHE. 216 - Erik-Oliver Blass, Guevara Noubir:
Assumption-Free Fuzzy PSI via Predicate Encryption. 217 - Hayder Tirmazi:
LSM Trees in Adversarial Environments. 218 - János Tapolcai, Bence Ladóczki, Dániel A. Nagy:
Slot a la carte: Centralization Issues in Ethereum's Proof-of-Stake Protocol. 219 - Nico Döttling, Alexander Koch, Sven Maier, Jeremias Mechler, Anne Müller, Jörn Müller-Quade, Marcel Tieplet:
The Quantum Decoherence Model: Everlasting Composable Secure Computation and More. 220 - Brandon Goodell, Rigo Salazar, Freeman Slaughter:
Uniformly Most Powerful Tests for Ad Hoc Transactions in Monero. 221 - Tim Beyne, Yu Long Chen, Michiel Verbauwhede:
A Robust Variant of ChaCha20-Poly1305. 222 - Yael Eisenberg, Christopher Havens, Alexis Korb, Amit Sahai:
Building Hard Problems by Combining Easy Ones: Revisited. 223 - Jian Liu, Kui Ren, Chun Chen:
Lightweight Single-Server PIR with Oλ(n1/3) Communication. 224 - Jiajun Xin, Dimitrios Papadopoulos:
"Check-Before-you-Solve": Verifiable Time-lock Puzzles. 225 - Jesús-Javier Chi-Domínguez:
Improved Subfield Curve Search For Specific Field Characteristics. 226 - Alessandro Budroni, Andre Esser, Ermes Franch, Andrea Natale:
Two Is All It Takes: Asymptotic and Concrete Improvements for Solving Code Equivalence. 227 - Simon Holmgaard Kamp, Julian Loss, Jesper Buus Nielsen:
Network agnostic consensus in constant time. 228 - Cas Cremers, Esra Günsay, Vera Wesselkamp, Mang Zhao:
ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420. 229 - Amik Raj Behera, Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Privately Constrained PRFs from DCR: Puncturing and Bounded Waring Rank. 230 - Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki:
NoIC: PAKE from KEM without Ideal Ciphers. 231 - Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu:
Authenticated BitGC for Actively Secure Rate-One 2PC. 232 - Davide Carnemolla, Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Anamorphic Resistant Encryption: the Good, the Bad and the Ugly. 233 - Joseph Bonneau, Jessica Chen, Miranda Christ, Ioanna Karantaidou:
Merkle Mountain Ranges are Optimal: On witness update frequency for cryptographic accumulators. 234 - Wei-Kai Lin, Ethan Mook, Daniel Wichs:
Doubly Efficient Cryptography: Commitments, Arguments and RAM MPC. 235 - Sora Suegami, Enrico Bottazzi:
Diamond iO: A Straightforward Construction of Indistinguishability Obfuscation from Lattices. 236 - Jiayu Xu:
UC-Security of Encrypted Key Exchange: A Tutorial. 237 - Matteo Campanelli, Mario Carrillo, Ignacio Cascudo, Dario Fiore, Danilo Francati, Rosario Gennaro:
On the Power of Polynomial Preprocessing: Proving Computations in Sublinear Time, and More. 238 - Amirreza Sarencheh, Hamidreza Khoshakhlagh, Alireza Kavousi, Aggelos Kiayias:
DART: Decentralized, Anonymous, and Regulation-friendly Tokenization. 239 - Michele Ciampi, Lorenzo Magliocco, Daniele Venturi, Yu Xia:
Robust Non-Interactive Zero-Knowledge Combiners. 240 - Peyman Momeni, Fig Smith:
IBE-IBE: Intent-Based Execution through Identity-Based Encryption and Auctions. 241 - Tiantian Gong, Zeyu Liu:
Rational Secret Sharing with Competition. 242 - Wonseok Choi, Xiangyu Liu, Lirong Xia, Vassilis Zikas:
K-Linkable Ring Signatures and Applications in Generalized Voting. 243 - Jianwei Li:
Provable Speedups for SVP Approximation Under Random Local Blocks. 244 - Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Silent Circuit Relinearisation: Sublinear-Size (Boolean and Arithmetic) Garbled Circuits from DCR. 245 - Fatima Elsheimy, Julian Loss, Charalampos Papamanthou:
Towards Optimal Early Stopping Agreement Protocols. 246 - Dan Boneh, Binyi Chen:
LatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems. 247 - Hanbeom Shin, Seonkyu Kim, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong:
New Exchanged Boomerang Distinguishers for 5-Round AES. 248 - Wenqian Li, Hanyu Wei, Shiyu Shen, Hao Yang, Wangchen Dai, Yunlei Zhao:
cuFalcon: An Adaptive Parallel GPU Implementation for High-Performance Falcon Acceleration. 249 - Rohit Chatterjee, Xiao Liang, Omkant Pandey, Takashi Yamakawa:
The Round Complexity of Black-Box Post-Quantum Secure Computation. 250 - Abtin Afshar, Rishab Goyal:
Verifiable Streaming Computation and Step-by-Step Zero-Knowledge. 251 - Florian Hirner, Florian Krieger, Sujoy Sinha Roy:
Chiplet-Based Techniques for Scalable and Memory-Aware Multi-Scalar Multiplication. 252 - Weidan Ji, Zhedong Wang, Lin Lyu, Dawu Gu:
Adaptively Secure IBE from Lattices with Asymptotically Better Efficiency. 253 - Liqiang Liu, Tianren Liu, Bo Peng:
Garbled Lookup Tables from Homomorphic Secret Sharing. 254 - Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang:
Tighter Security Notions for a Modular Approach to Private Circuits. 255 - Daniel Alabi, Lav R. Varshney:
Inaccessible Entropy for Watermarking Generative Agents. 256 - Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap:
TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic. 257 - Marc Rivinius:
MPC with Publicly Identifiable Abort from Pseudorandomness and Homomorphic Encryption. 258 - Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Maël Hostettler, Morten Øygarden, Håvard Raddum:
Improved Resultant Attack against Arithmetization-Oriented Primitives. 259 - Yujin Oh, Kyungbae Jang, Hwajeong Seo:
Quantum Security Evaluation of ASCON. 260 - Fengrun Liu, Haofei Liang, Tianyu Zhang, Yuncong Hu, Xiang Xie, Haisheng Tan, Yu Yu:
HasteBoots: Proving FHE Bootstrapping in Seconds. 261 - Fuyuki Kitagawa, Ryo Nishimaki, Nikhil Pappu:
PKE and ABE with Collusion-Resistant Secure Key Leasing. 262 - Yuanju Wei, Xinxuan Zhang, Yi Deng:
Transparent SNARKs over Galois Rings. 263 - Yanbo Chen:
Dazzle: Improved Adaptive Threshold Signatures from DDH. 264 - Fuyuki Kitagawa, Ryo Nishimaki:
White-Box Watermarking Signatures against Quantum Adversaries and Its Applications. 265 - Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang:
Memory-Efficient BKW Algorithm for Solving the LWE Problem. 266 - Sander Q. Dijkhuis:
Authentication and sole control at a high level of assurance on widespread smartphones with threshold signatures. 267 - Geoffroy Couteau, Carmit Hazay, Aditya Hegde, Naman Kumar:
휔(1/휆)-Rate Boolean Garbling Scheme from Generic Groups. 268 - Geoffroy Couteau, Naman Kumar:
10-Party Sublinear Secure Computation from Standard Assumptions. 269 - Vahid Jahandideh, Bart Mennink, Lejla Batina:
A Decomposition Approach for Evaluating Security of Masking. 270 - Arthur Herlédan Le Merdy, Benjamin Wesolowski:
Unconditional foundations for supersingular isogeny-based cryptography. 271 - Lukas Aumayr, Zeta Avarikioti, Iosif Salem, Stefan Schmid, Michelle Yeo:
X-Transfer: Enabling and Optimizing Cross-PCN Transactions. 272 - Vahid Jahandideh, Jan Schoone, Lejla Batina:
Clustering Approach for Higher-Order Deterministic Masking. 273 - Veronika Kuchta, Jason T. LeGrow, Edoardo Persichetti:
Post-Quantum Blind Signatures from Matrix Code Equivalence. 274 - Nigel P. Smart, Michael Walter:
Error-Simulatable Sanitization for TFHE and Applications. 275 - Julius Hermelink, Kai-Chun Ning, Richard Petri:
Finding and Protecting the Weakest Link: On Side-Channel Attacks on Masked ML-DSA. 276 - Sara Montanari, Riccardo Longo, Alessio Meneghetti:
Tighter Control for Distributed Key Generation: Share Refreshing and Expressive Reconstruction Policies. 277 - Sonia Belaïd, Matthieu Rivain, Mélissa Rossi:
New Techniques for Random Probing Security and Application to Raccoon Signature Scheme. 278 - Dan Boneh, Benedikt Bünz, Kartik Nayak, Lior Rotem, Victor Shoup:
Context-Dependent Threshold Decryption and its Applications. 279 - Bill Allombert, Alice Pellet-Mary, Wessel P. J. van Woerden:
Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes. 280 - Anasuya Acharya, Karen Azari, Mirza Ahad Baig, Dennis Hofheinz, Chethan Kamath:
Securely Instantiating 'Half Gates' Garbling in the Standard Model. 281 - Jules Baudrin, Sonia Belaïd, Nicolas Bon, Christina Boura, Anne Canteaut, Gaëtan Leurent, Pascal Paillier, Léo Perrin, Matthieu Rivain, Yann Rotella, Samuel Tap:
Transistor: a TFHE-friendly Stream Cipher. 282 - Yifan Song, Xiaxi Ye:
Honest Majority MPC with Õ(|C|) Communication in Minicrypt. 283 - Ali Dogan, Sermin Kocaman:
S2DV: Scalable and Secure DAO Voting. 284 - Mohammed Barhoush, Ryo Nishimaki, Takashi Yamakawa:
MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations. 285 - Ignacio Cascudo, Anamaria Costache, Daniele Cozzo, Dario Fiore, Antonio Guimarães, Eduardo Soria-Vazquez:
Verifiable Computation for Approximate Homomorphic Encryption Schemes. 286 - Clémence Chevignard, Guilhem Mureau, Thomas Espitau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet:
A reduction from Hawk to the principal ideal problem in a quaternion algebra. 287 - David Gérault, Anna Hambitzer, Eyal Ronen, Adi Shamir:
How to Securely Implement Cryptography in Deep Neural Networks. 288 - Sabyasachi Dey, Subhamoy Maitra, Santanu Sarkar, Nitin Kumar Sharma:
Significantly Improved Cryptanalysis of Salsa20 With Two-Round Criteria. 289 - Ky Nguyen, David Pointcheval, Robert Schädlich:
Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security. 290 - Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree:
A Note on Adaptive Security in Hierarchical Identity-Based Encryption. 291 - Tamar Ben David, Anat Paskin-Cherniavsky:
Tight Lower Bounds and New Upper Bounds For Evolving CDS. 292 - Yevgeniy Dodis, Eli Goldin:
Anamorphic-Resistant Encryption; Or Why the Encryption Debate is Still Alive. 293 - Wilson D. Nguyen, Srinath T. V. Setty:
Neo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments. 294 - Vladimir Kolesnikov, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal:
Stationary Syndrome Decoding for Improved PCGs. 295 - Yuncong Hu, Pratyush Mishra, Xiao Wang, Jie Xie, Kang Yang, Yu Yu, Yuwen Zhang:
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers. 296 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer:
Practical Zero-Trust Threshold Signatures in Large-Scale Dynamic Asynchronous Networks. 297 - Ruben Gonzalez:
Stateless Hash-Based Signatures for Post-Quantum Security Keys. 298 - Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz, Fabrizio Sisinni:
(Un)breakable curses - re-encryption in the Fujisaki-Okamoto transform. 299 - Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi, Bo Peng:
Pseudorandom Functions with Weak Programming Privacy and Applications to Private Information Retrieval. 300 - Kazuma Wariki, Atsushi Fujioka, Akira Nagai, Kan Yasuda:
Making Protocol FSU Revocable. 301 - Xinxuan Zhang, Ruida Wang, Zeyu Liu, Binwu Xiang, Yi Deng, Xianhui Lu:
FHE-SNARK vs. SNARK-FHE: From Analysis to Practical Verifiable Computation. 302 - Ittai Abraham, Eli Chouatt, Ivan Damgård, Yossi Gilad, Gilad Stern, Sophia Yakoubov:
Asynchronous Algorand: Reaching Agreement with Near Linear Communication and Constant Expected Time. 303 - Koen de Boer, Wessel P. J. van Woerden:
Lattice-based Cryptography: A survey on the security of the lattice-based NIST finalists. 304 - Gennaro Avitabile, Vincenzo Botta, Emanuele Giunta, Marcin Mielniczuk, Francesco Migliaro:
The Malice of ELFs: Practical Anamorphic-Resistant Encryption without Random Oracles. 305 - Antoine Joux, Julian Loss, Giacomo Santato:
Dimensional eROSion: Improving the ROS Attack with Decomposition in Higher Bases. 306 - Yaohua Ma, Chenxin Dai, Elaine Shi:
Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications. 307 - Yanis Belkheyar, Patrick Derbez, Shibam Ghosh, Gregor Leander, Silvia Mella, Léo Perrin, Shahram Rasoolzadeh, Lukas Stennes, Siwei Sun, Gilles Van Assche, Damian Vizár:
ChiLow and ChiChi: New Constructions for Code Encryption. 308 - Wonseok Choi, Daniel Collins, Xiangyu Liu, Vassilis Zikas:
A Unified Treatment of Anamorphic Encryption. 309 - Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr:
Non-Interactive Key Exchange: New Notions, New Constructions, and Forward Security. 310 - Suvradip Chakraborty, Dennis Hofheinz, Roman Langrehr, Jesper Buus Nielsen, Christoph Striecks, Daniele Venturi:
Malleable SNARKs and Their Applications. 311 - Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Verifiable Random Functions. 312 - Lizhen Zhang, Shang Gao, Bin Xiao:
Lattice-based Σ-Protocols for Polynomial Relations with Standard Soundness. 313 - Yu Long Chen, Avijit Dutta, Ashwin Jha, Mridul Nandi:
Towards Optimally Secure Deterministic Authenticated Encryption Schemes. 314 - Antonio Flórez-Gutiérrez, Eran Lambooij, Gaëtan Leurent, Håvard Raddum, Tyge Tiessen, Michiel Verbauwhede:
Cryptanalysis of Full SCARF. 315 - Albert Garreta, Hendrik Waldner, Katerina Hristova, Luca Dall'Ava:
Zinc: Succinct Arguments with Small Arithmetization Overheads from IOPs of Proximity to the Integers. 316 - Nico Döttling, Jesko Dujmovic, Julian Loss, Maciej Obremski:
Minicrypt PIR for Big Batches. 317 - Karim Baghery, Ehsan Ebrahimi, Omid Mirzamohammadi, Mahdi Sedaghat:
Traceable Verifiable Secret Sharing and Applications. 318 - Jinyi Qiu:
Single Trace Side-Channel Vulnerabilities Discovery Using Statistical Leakage Simulator. 319 - Shan Chen, Vukasin Karadzic:
Committing Authenticated Encryption: Generic Transforms with Hash Functions. 320 - Roberto Avanzi, Orr Dunkelman, Shibam Ghosh:
Differential Cryptanalysis of the Reduced Pointer Authentication Code Function used in Arm's FEAT_PACQARMA3 Feature. 321 - William J. Buchanan, Hisham Ali:
Partial and Fully Homomorphic Matching of IP Addresses Against Blacklists for Threat Analysis. 322 - Yao-Ching Hsieh, Brent Waters, David J. Wu:
A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model. 323 - Josh Alman, Yizhi Huang, Kevin Yeo:
Fine-Grained Complexity in a World without Cryptography. 324 - Mark Zhandry:
On Quantum Money and Evasive Obfuscation. 325 - Anasuya Acharya, Karen Azari, Chethan Kamath:
On the Adaptive Security of Free-XOR-based Garbling Schemes in the Plain Model. 326 - Gil Segev:
Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension. 327 - Amit Deo, Benoît Libert:
Fully Asymmetric Anamorphic Homomorphic Encryption from LWE. 328 - Gal Arnon, Eylon Yogev:
Towards a White-Box Secure Fiat-Shamir Transformation. 329 - Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai:
(Multi-Input) FE for Randomized Functionalities, Revisited. 330 - Hengcheng Zhou:
Private Multi-Party Neural Network Training over ℤ2k via Galois Rings. 331 - Daniel Collins, Simone Colombo, Sina Schaeffler:
Towards Leakage-Resilient Ratcheted Key Exchange. 332 - Lena Heimberger, Daniel Kales, Riccardo Lolato, Omid Mir, Sebastian Ramacher, Christian Rechberger:
Leap: A Fast, Lattice-based OPRF With Application to Private Set Intersection. 333 - Benny Applebaum, Eliran Kachlon:
How to Share an NP Statement or Combiners for Zero-Knowledge Proofs. 334 - Calvin Abou Haidar, Dipayan Das, Anja Lehmann, Cavit Özbay, Octavio Perez-Kempner:
Privacy-Preserving Multi-Signatures: Generic Techniques and Constructions Without Pairings. 335 - Damiano Abram, Giulio Malavolta, Lawrence Roy:
Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits. 336 - Sebastian Faust, Loïc Masure, Elena Micheli, Hai Hoang Nguyen, Maximilian Orlt, François-Xavier Standaert:
Efficient IP Masking with Generic Security Guarantees under Minimum Assumptions. 337 - Zhiyuan Zhang, Gilles Barthe:
CT-LLVM: Automatic Large-Scale Constant-Time Analysis. 338 - Damiano Abram, Giulio Malavolta, Lawrence Roy:
Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More. 339 - Martin R. Albrecht, Benjamin Bencina, Russell W. F. Lai:
Hollow LWE: A New Spin, Unbounded Updatable Encryption from LWE and PCE. 340 - Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, Hussien Othman:
CCA-Secure Traceable Threshold (ID-based) Encryption and Application. 341 - Jan Bormet, Jonas Hofmann, Hussien Othman:
Traceable Threshold Encryption without Trusted Dealer. 342 - Lewis Glabush, Kathrin Hövelmanns, Douglas Stebila:
Tight Multi-challenge Security Reductions for Key Encapsulation Mechanisms. 343 - Liang Zhang, Dongliang Cai, Tao Liu, Haibin Kan, Jiheng Zhang, Haibin Zhang, Sisi Duan:
Publicly Verifiable Generalized Secret Sharing and Its Application in Building Decentralized Exchange. 344 - Tao Liu, Liang Zhang, Haibin Kan, Jiheng Zhang:
Publicly Verifiable Threshold Proxy Re-encryption and Its Application in Data Rights Confirmation. 345 - Dan Boneh, Jaehyung Kim:
Homomorphic Encryption for Large Integers from Nested Residue Number Systems. 346 - Yansong Zhang, Xiaojun Chen, Qinghui Zhang, Ye Dong, Xudong Chen:
Helix: Scalable Multi-Party Machine Learning Inference against Malicious Adversaries. 347 - Nora Trapp, Diego Ongaro:
Juicebox Protocol: Distributed Storage and Recovery of Secrets Using Simple PIN Authentication. 348 - Chen-Da Liu-Zhang, Elisaweta Masserova, João Ribeiro, Pratik Soni, Sri Aravinda Krishnan Thyagarajan:
Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once. 349 - Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang:
Bootstrapping with RMFE for Fully Homomorphic Encryption. 350 - Xiuhan Lin, Shiduo Zhang, Yang Yu, Weijia Wang, Qidi You, Ximing Xu, Xiaoyun Wang:
Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure. 351 - Michele Ciampi, Ivan Visconti:
Efficient NIZK Arguments with Straight-Line Simulation and Extraction. 352 - Anja Lehmann, Phillip Nazarian, Cavit Özbay:
Stronger Security for Threshold Blind Signatures. 353 - Michele Ciampi, Jure Sternad, Yu Xia:
Delayed-Input Multi-Party Computation. 354 - Anja Lehmann, Cavit Özbay:
Commit-and-Prove System for Vectors and Applications to Threshold Signing. 355 - Adrien Dubois, Michael Klooß, Russell W. F. Lai, Ivy K. Y. Woo:
Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions. 356 - Hayder Tirmazi:
Random Number Generation from Pulsars. 357 - Elette Boyle, Ilan Komargodski, Neekon Vafa:
The Complexity of Memory Checking with Covert Security. 358 - Shai Levin:
A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol. 359 - Kalle Jyrkinen, Russell W. F. Lai:
Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials. 360 - Yuejun Wang, Baocang Wang, Qiqi Lai, Huaxiong Wang:
Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality. 361 - Jeongsu Kim, Aaram Yun:
Adaptively Secure Fully Homomorphic Message Authentication Code with Pre-processable Verification. 362 - Haruhisa Kosuge, Keita Xagawa:
The Security of Hash-and-Sign with Retry against Superposition Attacks. 363 - Xuan Thanh Do, Dang Truong Mac, Ky Nguyen, Duong Hieu Phan, Quoc-Huy Vu:
Traitor Tracing in Multi-sender Setting (sfTMCFE: Traceable Multi-client Functional Encryption). 364 - Joël Alwen, Georg Fuchsbauer, Marta Mularczyk, Doreen Riepel:
Lattice-Based Updatable Public-Key Encryption for Group Messaging. 365 - Amin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim:
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY. 366 - Martin R. Albrecht, Russell W. F. Lai, Oleksandra Lapiha, Ivy K. Y. Woo:
Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally. 367 - Amos Beimel, Oriol Farràs, Adriana Moya:
Polynomial Secret Sharing Schemes and Algebraic Matroids. 368 - Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Zhusen Liu:
Higher Residuosity Attacks on Small RSA Subgroup Decision Problems. 369 - Shalini Banerjee, Tapas Pal, Andy Rupp, Daniel Slamanig:
Simple Public Key Anamorphic Encryption and Signature using Multi-Message Extensions. 370 - Aydin Abadi, Mohammad Naseri:
Functional Oblivious Transfer with Applications in Privacy-Preserving Machine Learning. 371 - Wouter Castryck, Thomas Decru, Péter Kutas, Abel Laval, Christophe Petit, Yan Bo Ti:
KLPT²: Algebraic Pathfinding in Dimension Two and Applications. 372 - Sanjam Garg, Aarushi Goel, Dimitris Kolonelos, Sina Shiehian, Rohit Sinha:
Split Prover Zero-Knowledge SNARKs. 373 - Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Vinod Vaikuntanathan:
Simple and General Counterexamples for Private-Coin Evasive LWE. 374 - Shweta Agrawal, Anuja Modi, Anshu Yadav, Shota Yamada:
Evasive LWE: Attacks, Variants & Obfustopia. 375 - Paul Frixons, Valerie Gilchrist, Péter Kutas, Simon-Philipp Merz, Christophe Petit:
Another Look at the Quantum Security of the Vectorization Problem with Shifted Inputs. 376 - Han Chen, Tao Huang, Phuong Pham, Shuang Wu:
HiAE: A High-Throughput Authenticated Encryption Algorithm for Cross-Platform Efficiency. 377 - Sönke Jendral, Elena Dubrova:
Side-Channel and Fault Injection Attacks on VOLEitH Signature Schemes: A Case Study of Masked FAEST. 378 - Marius A. Aardal, Andrea Basso, Luca De Feo, Sikhar Patranabis, Benjamin Wesolowski:
A Complete Security Proof of SQIsign. 379 - Michel Seck, Oumar Niang, Djiby Sow:
A New Generalized Attack on RSA-like Cryptosystems. 380 - Qi Zhang, Mingqiang Wang, Xiaopeng Cheng:
Faster FHEW Bootstrapping with Adaptive Key Update. 381 - Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song:
On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols. 382 - Ritam Bhaumik, Jean Paul Degabriele:
Pencil: A Domain-Extended PRF with Full n-bit Security \\ for Strengthening GCM and More. 383 - Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani:
Optimizing Final Exponentiation for Pairing-Friendly Elliptic Curves with Odd Embedding Degrees Divisible by 3. 384 - Liam Eagen, Ariel Gabizon:
MERCURY: A multilinear Polynomial Commitment Scheme with constant proof size and no prover FFTs. 385 - Chenhao Jia, Tingting Cui, Qing Ling, Yan He, Kai Hu, Yu Sun, Meiqin Wang:
How Small Can S-boxes Be. 386 - Nathalie Lang, Jannis Leuther, Stefan Lucks:
Generic Composition: From Classical to Quantum Security. 387 - Ruben Baecker, Paul Gerhart, Jonathan Katz, Dominique Schröder:
Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures. 388 - Thomas Prévost, Bruno Martin, Olivier Alibart:
An ETSI GS QKD compliant TLS implementation. 389 - Yao-Ching Hsieh, Aayush Jain, Huijia Lin:
Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions). 390 - Shafik Nassar, Brent Waters, David J. Wu:
Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity. 391 - Gewu Bu, Bilel Zaghdoudi, Maria Potop-Butucaru, Serge Fdida:
Blockchain-based Secure D2D localisation with adaptive precision. 392 - Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager:
An Efficient Quantum Oblivious Transfer Protocol. 393 - Barbara Jiabao Benedikt:
Reducing the Number of Qubits in Solving LWE. 394 - Intak Hwang, Yisol Hwang, Miran Kim, Dongwon Lee, Yongsoo Song:
Provably Secure Approximate Computation Protocols from CKKS. 395 - Thomas Peyrin, Quan Quan Tan, Hongyi Zhang, Chunning Zhou:
Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers. 396 - Dung Hoang Duong, Thanh Xuan Khuc, Youming Qiao, Willy Susilo, Chuanqi Zhang:
Blind Signatures from Cryptographic Group Actions. 397 - Tenma Edamura, Atsushi Takayasu:
Tight Adaptive Simulation Security for Identity-based Inner-Product FE in the (Quantum) Random Oracle Model. 398 - Sayantan Ganguly, Shion Samadder Chaudhury:
Computational Quantum Anamorphic Encryption and Anamorphic Secret Sharing. 399 - Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Tang Gang, Yanbin Pan, Xiaoyun Wang:
Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions. 400 - Pierrick Dartois, Jonathan Komada Eriksen, Tako Boris Fouotsa, Arthur Herlédan Le Merdy, Riccardo Invernizzi, Damien Robert, Ryan Rueger, Frederik Vercauteren, Benjamin Wesolowski:
PEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogenies. 401 - Chengcheng Chang, Kai Hu, Muzhou Li, Meiqin Wang:
Related-Key Differential and Boomerang Cryptanalysis in the Fixed-Key Model. 402 - Kai Hu, Chi Zhang, Chengcheng Chang, Jiashu Zhang, Meiqin Wang, Thomas Peyrin:
Periodic Table of Cryptanalysis: Geometric Approach with Different Bases. 403 - Johannes Reinhart, Erik-Oliver Blass, Björn Annighöfer:
SNARKs for Stateful Computations on Authenticated Data. 404 - Ramses Fernandez:
Withdrawable signatures in Fiat-Shamir with aborts constructions. 405 - Liang Zhang, Tao Liu, Zhanrong Ou, Haibin Kan, Jiheng Zhang:
AsyRand: fast asynchronous distributed randomness beacon with reconfiguration. 406 - Rishab Goyal, Saikumar Yadugiri:
Delegatable ABE with Full Security from Witness Encryption. 407 - Felix Günther, Michael Rosenberg, Douglas Stebila, Shannon Veitch:
Hybrid Obfuscated Key Exchange and KEMs. 408 - Hiroki Okada, Tsuyoshi Takagi:
Low Communication Threshold FHE from Standard (Module-)LWE. 409 - Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan:
TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security. 410 - Nathalie Lang, Stefan Lucks, Bart Mennink, Suprita Talnikar:
Security of the Ascon Authenticated Encryption Mode in the Presence of Quantum Adversaries. 411 - Rishab Goyal, Saikumar Yadugiri:
Multi-Authority Functional Encryption: Corrupt Authorities, Dynamic Collusion, Lower Bounds, and More. 412 - Mohammad Hashemi, Shahin Tajik, Fatemeh Ganji:
Garblet: Multi-party Computation for Protecting Chiplet-based Systems. 413 - Mohsin Belam:
Deimos Cipher: A High-Entropy, Secure Encryption Algorithm with Strong Diffusion and Key Sensitivity. 414 - Miguel Cueto Noval, Simon-Philipp Merz, Patrick Stählin, Akin Ünal:
On the Soundness of Algebraic Attacks against Code-based Assumptions. 415 - Damiano Abram, Giulio Malavolta, Lawrence Roy:
Trapdoor Hash Functions and PIR from Low-Noise LPN. 416 - William J. Buchanan, Hisham Ali:
Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using Homomorphic Encryption. 417 - Ross Evans, Matthew McKague, Douglas Stebila:
ProofFrog: A Tool For Verifying Game-Hopping Proofs. 418 - Chaya Ganesh, Sikhar Patranabis, Nitin Singh:
Samaritan: Linear-time Prover SNARK from New Multilinear Polynomial Commitments. 419 - Ojaswi Acharya, Suvasree Biswas, Weiqi Feng, Adam O'Neill, Arkady Yerukhimovich:
Non-Interactive Verifiable Aggregation. 420 - Tzu-Hsiang Huang, Wei-Hsiang Hung, Shota Yamada:
A Note on Obfuscation-based Attacks on Private-coin Evasive LWE. 421 - Kyoohyung Han, Seongkwang Kim, Yongha Son:
Private Computation on Common Fuzzy Records. 422 - Subhranil Dutta, Aikaterini Mitrokotsa, Tapas Pal, Jenit Tomy:
Multi-Client Attribute-Based Unbounded Inner Product Functional Encryption, and More. 423 - Neha Jawalkar, Nishanth Chandran, Divya Gupta, Rahul Sharma, Arkaprava Basu:
Matchmaker: Fast Secure Inference across Deployment Scenarios. 424 - Lucjan Hanzlik:
A Note on the Blindness of the Scheme from ePrint 2025/397. 425 - Keitaro Hashimoto, Shuichi Katsumata, Guillermo Pascual-Perez:
Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable. 426 - Marc Fischlin, Aikaterini Mitrokotsa, Jenit Tomy:
BUFFing Threshold Signature Schemes. 427 - Nitin Kumar Sharma, Sabyasachi Dey, Santanu Sarkar, Subhamoy Maitra:
On Improved Cryptanalytic Results against ChaCha for Reduced Rounds ≥ 7. 428 - Seonhong Min, Joon-Woo Lee, Yongsoo Song:
Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation. 429 - Foteini Baldimtsi, Lucjan Hanzlik, Quan Nguyen, Aayush Yadav:
Non-interactive Anonymous Tokens with Private Metadata Bit. 430 - Hengyi Luo, Kaijie Jiang, Yanbin Pan, Anyu Wang:
Commitment Schemes Based on Module-LIP. 431 - Vincenzo Botta, Michele Ciampi, Emmanuela Orsini, Luisa Siniscalchi, Ivan Visconti:
Black-Box (and Fast) Non-Malleable Zero Knowledge. 432 - Akashdeep Saha, Siddhartha Chowdhury, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
MIDAS: an End-to-end CAD Framework for Automating Combinational Logic Locking. 433 - Shuai Han, Shengli Liu, Xiangyu Liu, Dawu Gu:
Fine-Grained Verifier NIZK and Its Applications. 434 - Thomas Pornin:
Constant-Time Code: The Pessimist Case. 435 - Chenzhi Zhu, Stefano Tessaro:
The Algebraic One-More MISIS Problem and Applications to Threshold Signatures. 436 - Antonio Flórez-Gutiérrez, Yosuke Todo:
Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing. 437 - Gideon Samid:
Transmitting Secrets by Transmitting only Plaintext. 438 - Zhongyi Zhang, Chengan Hou, Meicheng Liu:
Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials. 439 - Mohamed Malhou, Ludovic Perret, Kristin E. Lauter:
AI for Code-based Cryptography. 440 - Matthias Trannoy:
High-Order Masking of BIKE. 441 - Yuval Ishai, Hanjun Li, Huijia Lin:
A Unified Framework for Succinct Garbling from Homomorphic Secret Sharing. 442 - Alireza Kavousi, István András Seres:
Homomorphic Signature-based Witness Encryption and Applications. 443 - David Heath, Vladimir Kolesnikov, Varun Narayanan, Rafail Ostrovsky, Akash Shah:
Multiparty Garbling from OT with Linear Scaling and RAM Support. 444 - Gao Ming:
A proof of P≠NP (New symmetric encryption algorithm against any linear attacks and differential attacks). 445 - Tiantian Gong, Aniket Kate, Hemanta K. Maji, Hai H. Nguyen:
Disincentivize Collusion in Verifiable Secret Sharing. 446 - Yuval Ishai, Yifan Song:
Protecting Computations Against Continuous Bounded-Communication Leakage. 447 - Jai Hyun Park:
Ciphertext-Ciphertext Matrix Multiplication: Fast for Large Matrices. 448 - Feng Han, Xiao Lan, Weiran Liu, Lei Zhang, Hao Ren, Lin Qu, Yuan Hong:
Concretely Efficient Correlated Oblivious Permutation. 449 - Lewis Glabush, Felix Günther, Kathrin Hövelmanns, Douglas Stebila:
Verifiable Decapsulation: Recognizing Faulty Implementations of Post-Quantum KEMs. 450 - Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Eyal Ronen, Igors Stepanovs:
Analysis of the Telegram Key Exchange. 451 - Gideon Samid:
Polar Lattice Cryptography. 452 - Xiangyu Kong, Min Zhang, Yu Chen:
Verifiable Secret Sharing Based on Fully Batchable Polynomial Commitment for Privacy-Preserving Distributed Computation. 453 - Huinan Chen, Binbin Cai, Fei Gao, Song Lin:
Quantum circuit for implementing AES S-box with low costs. 454 - Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar:
StaMAC: Fault Protection via Stable-MAC Tags. 455 - Thomas Prévost, Bruno Martin, Olivier Alibart:
A Democratic Distributed Post-Quantum Certificateless Encryption Scheme. 456 - Thomas Prévost, Bruno Martin:
A 10-bit S-box generated by Feistel construction from cellular automata. 457 - Kathrin Hövelmanns, Andreas Hülsing, Mikhail A. Kudinov, Silvia Ritsch:
CAKE requires programming - On the provable post-quantum security of (O)CAKE. 458 - Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Kaishuo Cheng, Luís Esquível:
Revisiting the Security and Privacy of FIDO2. 459 - Truong Son Nguyen, Yi Ren, Guangyu Nie, Ni Trieu:
Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training. 460 - Thomas Haines, Rajeev Goré, Mukesh Tiwari:
Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth. 461 - Jianqiang Ni, Yingxin Li, Fukang Liu, Gaoli Wang:
Practical Key Collision on AES and Kiasu-BC. 462 - Sebastian Becker, Christoph Bösch, Benjamin Hettwer, Thomas Hoeren, Merlin Rombach, Sven Trieflinger, Hossein Yalame:
Multi-Party Computation in Corporate Data Processing: Legal and Technical Insights. 463 - Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson:
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields. 464 - Donghwan Oh, Semin Han, Jihye Kim, Hyunok Oh, Jiyeal Chung, Jieun Lee, Hee-jun Yoo, Tae wan Kim:
zkAML: Zero-knowledge Anti Money Laundering in Smart Contracts with whitelist approach. 465 - Jan Dolejs, Martin Jurecek:
Algebraic Cryptanalysis of Small-Scale Variants of Stream Cipher E0. 466 - Fangan-Yssouf Dosso, Sylvain Duquesne, Nadia El Mrabet, Emma Gautier:
PMNS arithmetic for elliptic curve cryptography. 467 - Leila Ben Abdelghani, Nadia El Mrabet, Loubna Ghammam, Lina Mortajine:
Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation. 468 - Alex Davidson, Luiza Soezima, Fernando Virdia:
Practical Semi-Open Chat Groups for Secure Messaging Applications. 469 - Rune Fiedler, Roman Langrehr:
On Deniable Authentication against Malicious Verifiers. 470 - Sengim Karayalcin, Marina Krcek, Stjepan Picek:
A Practical Tutorial on Deep Learning-based Side-channel Analysis. 471 - Zhenqiang Li, Shuqin Fan, Fei Gao, Yonglin Hao, Hongwei Sun, Xichao Hu, Dandan Li:
Quantum Attacks on Sum of Even-Mansour Construction Utilizing Online Classical Queries. 472 - Faneela, Jawad Ahmad, Baraq Ghaleb, Sana Ullah Jan, William J. Buchanan:
Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE. 473 - Michele Ciampi, Ankit Kumar Misra, Rafail Ostrovsky, Akash Shah:
Black-Box Constant-Round Secure 2PC with Succinct Communication. 474 - Felice Manganiello, Freeman Slaughter:
HammR: A ZKP Protocol for Fixed Hamming-Weight Restricted-Entry Vectors. 475 - Zhengjun Cao, Lihua Liu:
A note on "industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training". 476 - Krijn Reijnders:
A Note on the Advanced Use of the Tate Pairing. 477 - Mustafa Khairallah, Trevor Yap:
Attacking Single-Cycle Ciphers on Modern FPGAs featuring Explainable Deep Learning. 478 - Denis Berger, Mouad Lemoudden, William J. Buchanan:
Post Quantum Migration of Tor. 479 - Jiseung Kim, Changmin Lee, Yongha Son:
Worst-case Analysis of Lattice Enumeration Algorithm over Modules. 480 - Julien Juaneda, Marina Dehez-Clementi, Jean-Christophe Deneuville, Jérôme Lacan:
RHQC: post-quantum ratcheted key exchange from coding assumptions. 481 - Arinjita Paul, Sabyasachi Dutta, Kouichi Sakurai, C. Pandu Rangan:
An Efficient Sequential Aggregate Signature Scheme with Lazy Verification. 482 - Stanislaw Jarecki, Phillip Nazarian:
Adaptively Secure Threshold Blind BLS Signatures and Threshold Oblivious PRF. 483 - Rui Guo, M. Sazadur Rahman, Jingbo Zhou, Hadi Mardani Kamali, Fahim Rahman, Farimah Farahmandi, Mark Tehranipoor:
EvoLUTe+: Fine-Grained Look-Up-Table-based RTL IP Redaction. 484 - Motonari Ohtsuka, Takahiro Ishimaru, Rei Iseki, Shingo Kukita, Kohtaro Watanabe:
Key reconstruction for QC-MDPC McEliece from imperfect distance spectrum. 485 - Omri Shmueli, Mark Zhandry:
On One-Shot Signatures, Quantum vs Classical Binding, and Obfuscating Permutations. 486 - Thomas Buchsteiner, Karl W. Koch, Dragos Rotaru, Christian Rechberger:
webSPDZ: Versatile MPC on the Web. 487 - Philippe Chartier, Michel Koskas, Mohammed Lemou:
Exploring General Cyclotomic Rings in Torus-Based Fully Homomorphic Encryption: Part I - Prime Power Instances. 488 - Eli Goldin, Mark Zhandry:
Translating Between the Common Haar Random State Model and the Unitary Model. 489 - Hilal Asi, Vitaly Feldman, Hannah Keller, Guy N. Rothblum, Kunal Talwar:
PREAMBLE: Private and Efficient Aggregation of Block Sparse Vectors and Applications. 490 - Eugene Frimpong, Bin Liu, Camille Nuoskala, Antonis Michalas:
Blind Brother: Attribute-Based Selective Video Encryption. 491 - J. Dharani, K. Sundarakantham, Kunwar Singh, Mercy Shalinie Selvaraj:
Endorser Peer Anonymization in Hyperledger Fabric for Consortium of Organizations. 492 - Iftach Haitner, Gil Segev:
Tighter Concrete Security for the Simplest OT. 493 - Nilupulee Anuradha Gunathilake, Owen Lo, William J. Buchanan, Ahmed Yassin Al-Dubai:
Electromagnetic Side-Channel Analysis of PRESENT Lightweight Cipher. 494 - Zhengjun Cao, Lihua Liu:
A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks, Revisited. 495 - Weizhe Wang, Pierrick Méaux, Deng Tang:
Shortcut2Secrets: A Table-based Differential Fault Attack Framework. 496 - Jing Tian, Yaodong Wei, Dejun Xu, Kai Wang, Anyu Wang, Zhiyuan Qiu, Fu Yao, Guang Zeng:
Fast Scloud+: A Fast Hardware Implementation for the Unstructured LWE-based KEM - Scloud+. 497 - Nathan Rousselot, Karine Heydemann, Loïc Masure, Vincent Migairou:
Scoop: An Optimizer for Profiling Attacks against Higher-Order Masking. 498 - Dev Mehta, Trey Marcantino, Mohammad Hashemi, Sam Karkache, Dillibabu Shanmugam, Patrick Schaumont, Fatemeh Ganji:
SCAPEgoat: Side-channel Analysis Library. 499 - Jiahui Gao, Yagaagowtham Palanikuma, Dimitris Mouris, Duong Tung Nguyen, Ni Trieu:
SecurED: Secure Multiparty Edit Distance for Genomic Sequences. 500 - Hong-Wei Sun, Fei Gao, Rong-Xue Xu, Dan-Dan Li, Zhen-Qiang Li, Kejia Zhang:
Quantum Key-Recovery Attacks on Permutation-Based Pseudorandom Functions. 501 - Jesko Dujmovic, Giulio Malavolta, Wei Qi:
Registration-Based Encryption in the Plain Model. 502 - Nicolas David, Eric Garrido:
Max Bias Analysis: A New Approach on Computing the Entropy of Free Ring-Oscillator. 503 - Alexandru-Valentin Basaga, Sorin Iftene:
Ideal Compartmented Secret Sharing Scheme Based on the Chinese Remainder Theorem for Polynomial Rings. 504 - Charanjit S. Jutla, Arnab Roy:
Capitalized Bitcoin Fork for National Strategic Reserve. 505 - Shymaa M. Arafat:
On the Estonian Internet Voting System, IVXV, SoK and Suggestions. 506 - Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang:
Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning. 507 - Vipul Goyal, Junru Li, Rafail Ostrovsky, Yifan Song:
Towards Building Scalable Constant-Round MPC from Minimal Assumptions via Round Collapsing. 508 - Hoeteck Wee:
Almost Optimal KP and CP-ABE for Circuits from Succinct LWE. 509 - Jakub Kacper Szelag, Ji-Jian Chin, Sook-Chin Yip:
Adaptive Adversaries in Byzantine-Robust Federated Learning: A survey. 510 - Ifteher Alom, Sudip Bhujel, Yang Xiao:
VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials. 511 - Hyunjun Kim, Hwajeong Seo:
Optimizing AES-GCM on ARM Cortex-M4: A Fixslicing and FACE-Based Approach. 512 - Rutchathon Chairattana-Apirom, Franklin Harding, Anna Lysyanskaya, Stefano Tessaro:
Server-Aided Anonymous Credentials. 513 - Juraj Belohorec, Pavel Dvorák, Charlotte Hoffmann, Pavel Hubácek, Kristýna Masková, Martin Pastyrík:
On Extractability of the KZG Family of Polynomial Commitment Schemes. 514 - Yuxi Xue, Tianyu Zheng, Shang Gao, Bin Xiao, Man Ho Au:
Compressed Sigma Protocols: New Model and Aggregation Techniques. 515 - Alessandro Budroni, Jesús-Javier Chi-Domínguez, Ermes Franch:
Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action. 516 - Gal Arnon, Jesko Dujmovic, Yuval Ishai:
Designated-Verifier SNARGs with One Group Element. 517 - Amos Beimel:
Secret-Sharing Schemes for General Access Structures: An Introduction. 518 - Brieuc Balon, Lorenzo Grassi, Pierrick Méaux, Thorben Moos, François-Xavier Standaert, Matthias Johann Steiner:
mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software. 519 - Thibauld Feneuil, Matthieu Rivain, Auguste Warmé-Janville:
Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework. 520 - Katherine E. Stange:
Division polynomials for arbitrary isogenies. 521 - Bar Alon, Benjamin Saldman, Eran Omri:
New Techniques for Analyzing Fully Secure Protocols: A Case Study of Solitary Output Secure Computation. 522 - Emil Lenngren:
Assembly optimised Curve25519 and Curve448 implementations for ARM Cortex-M4 and Cortex-M33. 523 - The-Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau:
Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More. 524 - Ran Canetti, Ivan Damgård, Sebastian Kolby, Divya Ravi, Sophia Yakoubov:
Deniable Secret Sharing. 525 - Atharv Singh Patlan, Peiyao Sheng, S. Ashwin Hebbar, Prateek Mittal, Pramod Viswanath:
AI Agents in Cryptoland: Practical Attacks and No Silver Bullet. 526 - Daniel Aronoff, Adithya Bhat, Panagiotis Chatzigiannis, Mohsen Minaei, Srinivasan Raghuraman, Robert M. Townsend, Nicolas Xuan-Yi Zhang:
SoK: Fully-homomorphic encryption in smart contracts. 527 - Yue Zhou, Sid Chi-Kin Chau:
VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and More. 528 - Zhengjun Cao, Lihua Liu:
On the Anonymity in "A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments". 529 - Ramses Fernandez:
Lattice-based extended withdrawable signatures. 530 - Axel Lemoine, Rocco Mora, Jean-Pierre Tillich:
Understanding the new distinguisher of alternant codes at degree 2. 531 - Boris Alexeev, Colin Percival, Yan X. Zhang:
Chunking Attacks on File Backup Services using Content-Defined Chunking. 532 - Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au:
JesseQ: Efficient Zero-Knowledge Proofs for Circuits over Any Field. 533 - Pengfei Zhu:
Plonkify: R1CS-to-Plonk transpiler. 534 - Tiancheng Xie, Tao Lu, Zhiyong Fang, Siqi Wang, Zhenfei Zhang, Yongzheng Jia, Dawn Song, Jiaheng Zhang:
zkPyTorch: A Hierarchical Optimized Compiler for Zero-Knowledge Machine Learning. 535 - Alessandro Chiesa, Michele Orrù:
A Fiat-Shamir Transformation From Duplex Sponges. 536 - Rui-Tao Su, Jiong-Jiong Ren, Shao-Zhen Chen:
Improved Framework of Related-key Differential Neural Distinguisher and Applications to the Standard Ciphers. 537 - Anna P. Y. Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs:
Efficient Proofs of Possession for Legacy Signatures. 538 - Gweonho Jeong, Jaewoong Lee, Minhae Kim, Byeongkyu Han, Jihye Kim, Hyunok Oh:
Aegis: Scalable Privacy-preserving CBDC Framework with Dynamic Proof of Liabilities. 539 - Gweonho Jeong, Myeongkyun Moon, Geonho Yoon, Hyunok Oh, Jihye Kim:
Tangram: Encryption-friendly SNARK framework under Pedersen committed engines. 540 - Dipayan Saha, Jingbo Zhou, Farimah Farahmandi:
Physical Design-Aware Power Side-Channel Leakage Assessment Framework using Deep Learning. 541 - Adrian Perez Keilty, Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez:
That's AmorE: Amortized Efficiency for Pairing Delegation. 542 - Razvan Barbulescu, Damien Robert, Nicolas Sarkis:
Models of Kummer lines and Galois representations. 543 - Théophile Brézot, Chloé Hébant, Paola de Perthuis, David Pointcheval:
Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. 544 - Michele Battagliola, Giuseppe D'Alconzo, Andrea Gangemi, Chiara Spadafora:
Enhancing E-Voting with Multiparty Class Group Encryption. 545 - Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Farimah Farahmandi:
BugWhisperer: Fine-Tuning LLMs for SoC Hardware Vulnerability Detection. 546 - Abhishek Kumar, Amit Kumar Chauhan, Somitra Kumar Sanadhya:
Improved Cryptanalysis of FEA-1 and FEA-2 using Square Attacks. 547 - Julien Devevey, Morgane Guerreau, Thomas Legavre, Ange Martinelli, Thomas Ricosset:
Breaking HuFu with 0 Leakage: A Side-Channel Analysis. 548 - Andrea Flamini, Silvio Ranise, Giada Sciarretta, Mario Scuro, Nicola Smaniotto, Alessandro Tomasi:
Public Key Accumulators for Revocation of Non-Anonymous Credentials. 549 - Alex Biryukov, Baptiste Lambin, Aleksei Udovenko:
Exact Formula for RX-Differential Probability through Modular Addition for All Rotations. 550 - Aniket Kate, Pratyay Mukherjee, Hamza Saleem, Pratik Sarkar, Bhaskar Roberts:
ANARKey: A New Approach to (Socially) Recover Keys. 551 - Wei-Kai Lin, Ethan Mook, Daniel Wichs:
Black Box Crypto is Useless for Doubly Efficient PIR. 552 - Aritra Dasgupta, Sudipta Paria, Swarup Bhunia:
HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction. 553 - Joseph Jaeger, Akshaya Kumar:
Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix. 554 - Changsong Jiang, Chunxiang Xu, Guomin Yang, Li Duan, Jing Wang:
Strong Federated Authentication With Password-based Credential Against Identity Server Corruption. 555 - Lena Heimberger, Christopher Patton, Bas Westerbaan:
Private SCT Auditing, Revisited. 556 - Weihan Li, Zongyang Zhang, Yun Li, Pengfei Zhu, Cheng Hong, Jianwei Liu:
Soloist: Distributed SNARKs for Rank-One Constraint System. 557 - Kien Tuong Truong, Simon-Philipp Merz, Matteo Scarlata, Felix Günther, Kenneth G. Paterson:
Breaking and Fixing Content-Defined Chunking. 558 - Yanning Ji, Elena Dubrova, Ruize Wang:
Is Your Bluetooth Chip Leaking Secrets via RF Signals? 559 - Abraham Basurto-Becerra, Azade Rezaeezade, Stjepan Picek:
Jump, It Is Easy: JumpReLU Activation Function in Deep Learning-based Side-channel Analysis. 560 - Dipayan Saha, Hasan Al Shaikh, Shams Tarek, Farimah Farahmandi:
ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification. 561 - Zhengjun Cao, Lihua Liu:
Analysis of One Certificateless Authentication and Key Agreement Scheme for Wireless Body Area Network. 562 - YoungBeom Kim, Seog Chung Seo:
An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes. 563 - Linus Mainka, Kostas Papagiannopoulos:
Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V. 564 - Lydia Garms, Michael Livesey:
Attacking soundness for an optimization of the Gemini Polynomial Commitment Scheme. 565 - Subhadeep Banik, Hailun Yan:
Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities. 566 - Nikita Polyanskii, Sebastian Mueller, Ilya Vorobyev:
Starfish: A high throughput BFT protocol on uncertified DAG with linear amortized communication complexity. 567 - pcy Sluys, Lennert Wouters, Benedikt Gierlichs, Ingrid Verbauwhede:
An in-depth security evaluation of the Nintendo DSi gaming console. 568 - Yunwen Liu, Bo Wang, Ren Zhang:
Solving Data Availability Limitations in Client-Side Validation with UTxO Binding. 569 - pcy Sluys, Lennert Wouters, Benedikt Gierlichs, Ingrid Verbauwhede:
Partial Key Overwrite Attacks in Microcontrollers: a Survey. 570 - Shuya Hanai, Keisuke Tanaka, Masayuki Tezuka, Yusuke Yoshida:
Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange. 571 - Zhantong Xue, Pingchuan Ma, Zhaoyu Wang, Shuai Wang:
Zinnia: An Expressive and Efficient Tensor-Oriented Zero-Knowledge Programming Framework. 572 - Denis Firsov, Jakub Janku:
Forking Lemma in EasyCrypt. 573 - Riccardo Taiello, Clémentine Gritti, Melek Önen, Marco Lorenzi:
Buffalo: A Practical Secure Aggregation Protocol for Asynchronous Federated Learning. 574 - Léo Ducas, Lynn Engelberts, Johanna Loyer:
Wagner's Algorithm Provably Runs in Subexponential Time for SIS∞. 575 - Karim Baghery, Noah Knapen, Georgio Nicolas, Mahdi Rahimi:
Pre-Constructed Publicly Verifiable Secret Sharing and Applications. 576 - Woohyuk Chung, Seongha Hwang, Seongkwang Kim, Byeonghak Lee, Jooyoung Lee:
Making GCM Great Again: Toward Full Security and Longer Nonces. 577 - Wei-Kai Lin, Zhenghao Lu, Hong-Sheng Zhou:
Efficient Garbled Pseudorandom Functions and Lookup Tables from Minimal Assumption. 578 - Xihan Xiong, Michael Huth, William Knottenbelt:
REGKYC: Supporting Privacy and Compliance Enforcement for KYC in Blockchains. 579 - Takumi Nishimura, Atsushi Takayasu:
Efficient Revocable Identity-Based Encryption from Middle-Product LWE. 580 - Jung Hee Cheon, Hyeongmin Choe, Seunghong Kim, Yongdong Yeo:
Reusable Dynamic Multi-Party Homomorphic Encryption. 581 - Zheng Liu, An Wang, Congming Wei, Yaoling Ding, Jingqi Zhang, Annyu Liu, Liehuang Zhu:
Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on Dilithium. 582 - Jean Paul Degabriele, Alessandro Melloni, Jean-Pierre Münch, Martijn Stam:
Counter Galois Onion (CGO) for Tor: Fast Non-Malleable Onion Encryption. 583 - S. P. Prahlad:
The Singularity Random Number Generator: Bridging Determinism and Unpredictability to Redefine Randomness, Secure Systems, and Adaptive Intelligence. 584 - Jeffrey Champion, Brent Waters, David J. Wu:
Adaptively-Secure Big-Key Identity-Based Encryption. 585 - Geng Wang, Wenwen Xia, Dawu Gu:
Heuristic Algorithm for Solving Restricted SVP and its Applications. 586 - Gideon Samid:
Lifeboats on the Titanic Cryptography. 587 - Chenyu Li, Ren Zhang, Xiaorui Gong:
A Place for Everyone vs Everyone in its Place: Measuring and Attacking the Ethereum Global Network. 588 - Quentin Forcioli, Sumanta Chaudhuri, Jean-Luc Danger:
Defeating AutoLock: From Simulation to Real-World Cache-Timing Exploits against TrustZone. 589 - Siddharth Kapoor, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
emGraph: Efficient Multiparty Secure Graph Computation. 590 - Victor I. Kolobov, Avihu M. Levy, Moni Naor:
ColliderVM: Stateful Computation on Bitcoin without Fraud Proofs. 591 - Brandon Ramsay:
DSM: Decentralized State Machine - The Missing Trust Layer of the Internet. 592 - Ananya Appan, David Heath:
Oblivious Immutable Memory. 593 - Tianyi Liu, Yupeng Zhang:
Efficient SNARKs for Boolean Circuits via Sumcheck over Tower Fields. 594 - Yuki Seto, Hiroki Furue, Atsushi Takayasu:
Partial Key Exposure Attacks on UOV and Its Variants. 595 - Alain Couvreur, Christophe Levrat:
Highway to Hull: An Algorithm for Solving the General Matrix Code Equivalence Problem. 596 - Joel Samper, Bernardo Ferreira:
SoK: Self-Generated Nudes over Private Chats: How Can Technology Contribute to a Safer Sexting? 597 - Markus Krabbe Larsen, Carsten Schürmann:
Nominal State-Separating Proofs. 598 - Zhengjun Cao, Lihua Liu:
Insecurity of One Decentralized Attribute-based Signature Scheme for Social Co-governance. 599 - Dor Minzer, Kai Zhe Zheng:
Improved Round-by-round Soundness IOPs via Reed-Muller Codes. 600 - Antonio Ras, Antoine Loiseau, Mikaël Carmona, Simon Pontié, Guénaël Renault, Benjamin Smith, Emanuele Valea:
PHOENIX: Crypto-Agile Hardware Sharing for ML-KEM and HQC. 601 - Sebastian Clermont, Samed Düzlü, Christian Janson, Laurens Porzenheim, Patrick Struck:
Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More. 602 - Bo Pan, Maria Potop-Butucaru:
Mobile Byzantine Agreement in a Trusted World. 603 - Aymeric Hiltenbrand, Julien Eynard, Romain Poussier:
On the success rate of simple side-channel attacks against masking with unlimited attack traces. 604 - Rishabh Bhadauria, Nico Döttling, Carmit Hazay, Chuanwei Lin:
Laconic Cryptography with Preprocessing. 605 - Paco Azevedo Oliveira, Jordan Beraud, Louis Goubin:
An attack on ML-DSA using an implicit hint. 606 - Riccardo Bernardini:
Analytic and Simulation Results of a Gaussian Physically Unclonable Constant Based on Resistance Dispersion. 607 - Juan Jesús León, Vicente Muñoz:
On some non-linear recurrences over finite fields linked to isogeny graphs. 608 - Yevgeniy Dodis, Eli Goldin, Peter Hall:
Random Oracle Combiners: Merkle-Damgård Style. 609 - John M. Schanck:
Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice. 610 - Vineet Nair, Justin Thaler, Michael Zhu:
Proving CPU Executions in Small Space. 611 - Ga Hee Hong, Joo Woo, Jonghyun Kim, Minkyu Kim, Hochang Lee, Jong Hwan Park:
More NTRU+Sign Signatures from Cyclotomic Trinomials. 612 - Onur Günlü, Maciej Skorski, H. Vincent Poor:
Low-Latency Rate-Distortion-Perception Trade-off: A Randomized Distributed Function Computation Application. 613 - Yi Liu, Junzuo Lai, Peng Yang, Anjia Yang, Qi Wang, Siu-Ming Yiu, Jian Weng:
Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound. 614 - Pierrick Méaux:
From at Least n/3 to at Most $3\sqrt{n}$: Correcting the Algebraic Immunity of the Hidden Weight Bit Function. 615 - Juan A. Garay, Aggelos Kiayias, Yu Shen:
State Machine Replication Among Strangers, Fast and Self-Sufficient. 616 - Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Rubén Salvador:
Multi-Screaming-Channel Attacks: Frequency Diversity for Enhanced Attacks. 617 - Jayamine Alupotha, Mariarosaria Barbaraci, Ioannis Kaklamanis, Abhimanyu Rawat, Christian Cachin, Fan Zhang:
Anonymous Self-Credentials and their Application to Single-Sign-On. 618 - Nicolas Desmoulins, Antoine Dumanois, Seyni Kane, Jacques Traoré:
Making BBS Anonymous Credentials eIDAS 2.0 Compliant. 619 - Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt Bünz, Ramesh Karri, Siddharth Garg, Brandon Reagen:
Need for zkSpeed: Accelerating HyperPlonk for Zero-Knowledge Proofs. 620 - Sanjay Deshpande, Yongseok Lee, Cansu Karakuzu, Jakub Szefer, Yunheung Paek:
SPHINCSLET: An Area-Efficient Accelerator for the Full SPHINCS+ Digital Signature Algorithm. 621 - Yackolley Amoussou-Guenou, Lionel Beltrando, Maurice Herlihy, Maria Potop-Butucaru:
Byzantine Reliable Broadcast and Tendermint Consensus with trusted components. 622 - Tomer Keniagin, Eitan Yaakobi, Ori Rottenstreich:
CertainSync: Rateless Set Reconciliation with Certainty. 623 - Anand Kumar Narayanan:
Trapdoor one-way functions from tensors. 624 - Song Bian, Yunhao Fu, Dongxu Zhao, Haowen Pan, Yuexiang Jin, Jiayue Sun, Hui Qiao, Zhenyu Guan:
FHECAP: An Encrypted Control System with Piecewise Continuous Actuation. 625 - Hyunjun Kim, Sejin Lim, Kyungbae Jang, Siyi Wang, Anubhab Baksi, Anupam Chattopadhyay, Hwajeong Seo:
Tree-based Quantum Carry-Save Adder. 626 - Yimeng He, San Ling, Khai Hanh Tang, Huaxiong Wang:
Everlasting Fully Dynamic Group Signatures. 627 - Pierre-Augustin Berthet, Justine Paillet, Cédric Tavernier, Lilian Bossuet, Brice Colombier:
Improving the Masked Division for the FALCON Signature. 628 - Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Audience Injection Attacks: A New Class of Attacks on Web-Based Authorization and Authentication Standards. 629 - Cong Zhang, Liqiang Peng, Weiran Liu, Shuaishuai Li, Meng Hao, Lei Zhang, Dongdai Lin:
Charge Your Clients: Payable Secure Computation and Its Applications. 630 - Aniket Kate, Pratyay Mukherjee, Samipa Samanta, Pratik Sarkar:
Dyna-hinTS: Silent Threshold Signatures for Dynamic Committees. 631 - Lorenz Panny:
On breaking McEliece keys using brute force. 632 - Andreas Hülsing, Mikhail A. Kudinov, Christian Majenz:
Hybrid-query bounds with partial input control - framework and application to tight M-eTCR. 633 - Sneha Mohanty, Christian Schindelhauer:
Cryptography based on 2D Ray Tracing. 634 - Daniel Escudero, Elisaweta Masserova, Antigoni Polychroniadou:
Towards Scalable YOSO MPC via Packed Secret-Sharing. 635 - Nobuyuki Sugio:
Impossible Differential Attack on SAND-64. 636 - Shymaa M. Arafat:
A Study of Blockchain Consensus Protocols. 637 - Yanbo Chen:
Round-Efficient Adaptively Secure Threshold Signatures with Rewinding. 638 - Longcheng Li, Qian Li, Xingjian Li, Qipeng Liu:
Cryptomania v.s. Minicrypt in a Quantum World. 639 - Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai, Yang Cao:
Multi-Party Private Set Operations from Predicative Zero-Sharing. 640 - Jordi Herrera-Joancomartí, Cristina Pérez-Solà, Toni Mateos:
Scalable Non-Fungible Tokens on Bitcoin. 641 - Bruno Pasqualotto Cavalar, Eli Goldin, Matthew Gray, Peter Hall:
A Meta-Complexity Characterization of Quantum Cryptography. 642 - Yulian Sun, Vedant Bonde, Li Duan, Yong Li:
Obfuscation for Deep Neural Networks against Model Extraction: Attack Taxonomy and Defense Optimization. 643 - Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Rubén Salvador:
Attacking at non-harmonic frequencies in screaming-channel attacks. 644 - Alberto Garoffolo, Dmytro Kaidalov, Roman Oliynykov, Daniele Di Tullio, Mariia Rodinko:
GIGA Protocol: Unlocking Trustless Parallel Computation in Blockchains. 645 - Caicai Chen, Yuval Ishai, Tamer Mour, Alon Rosen:
Secret-Key PIR from Random Linear Codes. 646 - Rosario Giustolisi, Mohammadamin Rakeei, Gabriele Lenzini:
Anamorphic Voting: Ballot Freedom Against Dishonest Authorities. 647 - Marco Baldi, Sebastian Bitzer, Nicholas Lilla, Paolo Santini:
HQC Beyond the BSC: Towards Error Structure-Aware Decoding. 648 - Ying Cai, Chengyi Qin, Mingqiang Wang:
Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience. 649 - Yadi Zhong:
ADC-BE: Optimizing Worst-Case Bandwidth in Broadcast Encryption with Boolean Functions. 650 - Jean-Sébastien Coron, Robin Köstler:
Low-Latency Bootstrapping for CKKS using Roots of Unity. 651 - Andreas Brüggemann, Nishat Koti, Varsha Bhat Kukkala, Thomas Schneider:
MultiCent: Secure and Scalable Centrality Measures on Multilayer Graphs. 652 - Mehmet Ugurbil, Dimitris Mouris, Manuel B. Santos, José Cabrero-Holgueras, Miguel de Vega, Shubho Sengupta:
Fission: Distributed Privacy-Preserving Large Language Model Inference. 653 - William J. Buchanan, Jamie Gilchrist, Keir Finlow-Bates:
ECDSA Cracking Methods. 654 - Lucas David Meier, Felipe Valencia, Cristian-Alexandru Botocan, Damian Vizár:
Taking AI-Based Side-Channel Attacks to a New Dimension. 655 - Xiaohan Wan, Yang Wang, Haiyang Xue, Mingqiang Wang:
Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWE-Based Optimization. 656 - Matilda Backendal, Sebastian Clermont, Marc Fischlin, Felix Günther:
Key Derivation Functions Without a Grain of Salt. 657 - Jonathan Bootle, Vadim Lyubashevsky, Antonio Merino-Gallardo:
Efficient Verifiable Mixnets from Lattices, Revisited. 658 - Dennis Faut, Julia Hesse, Lisa Kohl, Andy Rupp:
Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions. 659 - Víctor Duarte Melo, William J. Buchanan:
Eccfrog512ck2: An Enhanced 512-bit Weierstrass Elliptic Curve. 660 - Danilo Gligoroski, Mayank Raikwar, Sonu Kumar Jha:
An LLM Framework For Cryptography Over Chat Channels. 661 - Liang Zhang, Xingyu Wu, Qiuling Yue, Haibin Kan, Jiheng Zhang:
Attribute-Based Publicly Verifiable Secret Sharing. 662 - Mihir Bellare, Doreen Riepel, Laura Shea:
Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters. 663 - Liang Zhang, Dongliang Cai, Tao Liu, Haibin Kan, Jiheng Zhang:
Publicly Verifiable Generalized Secret Sharing Schemes and Their Applications. 664 - Varun Thakore, Saravanan Vijayakumaran:
MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero. 665 - Andrej Bogdanov, Alon Rosen, Neekon Vafa, Vinod Vaikuntanathan:
Adaptive Robustness of Hypergrid Johnson-Lindenstrauss. 666 - Vir Nath Pathak, Sushmita Ruj, Ron van der Meyden:
Vector Commitment Design, Analysis, and Applications: A Survey. 667 - Yongcheng Song, Rongmao Chen, Fangguo Zhang, Xinyi Huang, Jian Weng, Huaxiong Wang:
(Interleaved) Extended Gabidulin Codes and Their Applications to RQC. 668 - Chao Niu, Benqiang Wei, Zhicong Huang, Zhaomin Yang, Cheng Hong, Meiqin Wang, Tao Wei:
SoK: FHE-Friendly Symmetric Ciphers and Transciphering. 669 - Jianming Lin, Damien Robert, Chang-An Zhao, Yuhao Zheng:
Biextensions in pairing-based cryptography. 670 - Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu:
A Dilithium-like Multisignature in Fully Split Ring and Quantum Random Oracle Model. 671 - Giacomo Pope, Krijn Reijnders, Damien Robert, Alessandro Sferlazza, Benjamin Smith:
Simpler and Faster Pairings from the Montgomery Ladder. 672 - Can Aknesil, Elena Dubrova, Niklas Lindskog, Jakob Sternby, Håkan Englund:
Hybrid Fingerprinting for Effective Detection of Cloned Neural Networks. 673 - Kirill V. Vedenev:
On the Security of Two IKKR-type Code-Based Cryptosystems. 674 - Antonín Dufka, Semjon Kravtsenko, Peeter Laud, Nikita Snetkov:
Trilithium: Efficient and Universally Composable Distributed ML-DSA Signing. 675 - Daichong Chao, Liehuang Zhu, Dawei Xu, Tong Wu, Chuan Zhang, Fuchun Guo:
Onion Encryption Revisited: Relations Among Security Notions. 676 - Nobuyuki Sugio:
Impossible Differential Attack on SAND-128. 677 - Donggeun Kwon, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning. 678 - Rishub Nagpal, Vedad Hadzic, Robert Primas, Stefan Mangard:
Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM. 679 - Jiayi Kang, Leonard Schild:
Pirouette: Query Efficient Single-Server PIR. 680 - Qun Liu, Haoyang Wang, Jinliang Wang, Boyun Li, Meiqin Wang:
Quantum Periodic Distinguisher Construction: Symbolization Method and Automated Tool. 681 - Nicolas Bon, Céline Chevalier, Guirec Lebrun, Ange Martinelli:
SUMAC: an Efficient Administrated-CGKA Using Multicast Key Agreement. 682 - Bar Alon, Amos Beimel:
On the Definition of Malicious Private Information Retrieval. 683 - Benjamin Bencina, Benjamin Dowling, Varun Maram, Keita Xagawa:
Post-quantum Cryptographic Analysis of SSH. 684 - Ilan Komargodski, Itamar Schen, Omri Weinstein:
Proofs of Useful Work from Arbitrary Matrix Multiplication. 685 - Antonio Guimarães, Hilder V. L. Pereira:
Fast amortized bootstrapping with small keys and polynomial noise overhead. 686 - Darya Kaviani, Deevashwer Rathee, Bhargav Annem, Raluca Ada Popa:
Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging. 687 - Seyedmohammad Nouraniboosjin, Fatemeh Ganji:
Uncertainty Estimation in Neural Network-enabled Side-channel Analysis and Links to Explainability. 688 - José Luis Crespo, Jaime Gutierrez, Angel Valle:
Neural network design options for RNG's verification. 689 - Li Lin, Tian Qiu, Xin Wang, Hailong Wang, Changzheng Wei, Ying Yan, Wei Wang, Wenbiao Zhao:
Zero-Knowledge Protocol for Knowledge of Known Discrete Logarithms: Applications to Ring Confidential Transactions and Anonymous Zether. 690 - Jesús-Javier Chi-Domínguez, Eduardo Ochoa-Jiménez, Ricardo Neftali Pontaza Rodas:
Let us walk on the 3-isogeny graph: efficient, fast, and simple. 691 - Jonas Nick, Tim Ruffing, Yannick Seurin:
DahLIAS: Discrete Logarithm-Based Interactive Aggregate Signatures. 692 - Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Luca Zanolini:
Accountable Liveness. 693 - Ashley Fraser, Steve Schneider:
A Formal Security Analysis of Hyperledger AnonCreds. 694 - Miguel Ambrona, Denis Firsov, Iñigo Querejeta-Azurmendi:
Efficient Foreign-Field Arithmetic in PLONK. 695 - Thales B. Paiva, Gabrielle De Micheli, Syed Mahbub Hafiz, Marcos A. Simplício Jr., Bahattin Yildiz:
Faster amortized bootstrapping using the incomplete NTT for free. 696 - Xue Yuan, Qichun Wang:
A Multi-Differential Approach to Enhance Related-Key Neural Distinguishers. 697 - Mattia Napoli, Alberto Leporati, Stjepan Picek, Luca Mariot:
Mind the Grammar: Side-Channel Analysis driven by Grammatical Evolution. 698 - Carl Bootland, Kelong Cong, Daniel Demmler, Tore Kasper Frederiksen, Benoit Libert, Jean-Baptiste Orfila, Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Samuel Tap, Michael Walter:
Threshold (Fully) Homomorphic Encryption. 699 - Janik Huth, Antoine Joux, Giacomo Santato:
Fherret: Proof of FHE Correct-and-Honest Evaluation with Circuit Privacy from MPCitH. 700 - Tung Le, Thang Hoang:
Hermes: Efficient and Secure Multi-Writer Encrypted Database. 701 - Srinivasan Raghuraman, Peter Rindal, Harshal Shah:
Two Party Secret Shared Joins. 702 - Alireza Aghabagherloo, Roozbeh Sarenche, Maryam Zarezadeh, Bart Preneel, Stefan Köpsell:
Priv-PFL: A Privacy-Preserving and Efficient Personalized Federated Learning Approach. 703 - Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak:
Reducing Honest Re-Encryption Attack to Chosen Ciphertext Attack. 704 - Jamie Gilchrist, William J. Buchanan, Keir Finlow-Bates:
Breaking ECDSA with Two Affinely Related Nonces. 705 - Aashika Khanal, Navjot Kaur:
The Role of Quantum Computing in Enhancing Encryption Security: A Review. 706 - William J. Buchanan:
Post Quantum Cryptography (PQC) Signatures Without Trapdoors. 707 - Anand Kumar Narayanan:
Strong keys for tensor isomorphism cryptography. 708 - Hongbo Wen, Hanzhi Liu, Jingyu Ke, Yanju Chen, Dahlia Malkhi, Yu Feng:
Thunderbolt: A Formally Verified Protocol for Off-Chain Bitcoin Transfers. 709 - Michael Mirkin, Hongyin Chen, Ohad Eitan, Gal Granot, Ittay Eyal:
Arbigraph: Verifiable Turing-Complete Execution Delegation. 710 - Krishna Sai Tarun Ramapragada, Utsav Banerjee:
Fast Plaintext-Ciphertext Matrix Multiplication from Additively Homomorphic Encryption. 711 - Zvika Brakerski, Offir Friedman, Avichai Marmor, Dolev Mutzari, Yuval Spiizer, Ni Trieu:
Threshold FHE with Efficient Asynchronous Decryption. 712 - Kevin Nam, Youyeon Joo, Dongju Lee, Seungjin Ha, Hyunyoung Oh, Hyungon Moon, Yunheung Paek:
LOHEN: Layer-wise Optimizations for Neural Network Inferences over Encrypted Data with High Performance or Accuracy. 713 - Bingqing Li, Ling Sun:
Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks (Full Version). 714 - Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak:
USpt: Updatable Signature with Public Tokens. 715 - Kanav Gupta, Nishanth Chandran, Divya Gupta, Jonathan Katz, Rahul Sharma:
Shark: Actively Secure Inference using Function Secret Sharing. 716 - Yuncong Hu, Chongrong Li, Zhi Qiu, Tiancheng Xie, Yue Ying, Jiaheng Zhang, Zhenfei Zhang:
GKR for Boolean Circuits with Sub-linear RAM Operations. 717 - Bill Fefferman, Soumik Ghosh, Makrand Sinha, Henry Yuen:
The Hardness of Learning Quantum Circuits and its Cryptographic Applications. 718 - Yuanju Wei, Kaixuan Wang, Binwu Xiang, Xinxuan Zhang, Yi Deng, Hailong Wang, Xudong Zhu:
Packed Sumcheck over Fields of Small Characteristic with Application to Verifiable FHE. 719 - Jung Hee Cheon, Minsik Kang, Jai Hyun Park:
Towards Lightweight CKKS: On Client Cost Efficiency. 720 - Hangyu Bai, Fan Huang, Xiaolin Duan, Honggang Hu:
Efficient Key Recovery via Correlation Power Analysis on Scloud⁺. 721 - Foteinos Mergoupis-Anagnou:
One-Step Schnorr Threshold Identification. 722 - Krzysztof Pietrzak, Pengxiang Wang:
Time-Space Tradeoffs of Truncation with Preprocessing. 723 - Daniel Alabi, Sainyam Galhotra, Shagufta Mehnaz, Zeyu Song, Eugene Wu:
Privacy and Security in Distributed Data Markets. 724 - Jiangshan Long, Changhai Ou, Yukun Cheng, Kexin Qiao, Wei Cheng, Fan Zhang:
Side-Channel Analysis Revisited and Evaluated. 725 - Alper Çakan, Vipul Goyal, Omri Shmueli:
Public-Key Quantum Fire and Key-Fire From Classical Oracles. 726 - Atsuki Momose, Kailun Qin, Ao Sakurai, Mona Vij:
Securing Nested Attestation of Confidential Serverless Computing without Intra-Enclave Isolation. 727 - Ole Hylland Spjeldnæs:
SNAIL: Verifiable Computation within 30% of Native Speed. 728 - Jaeseon Kim, Jeongeun Park, Hyewon Sung:
Private Information Retrieval based on Homomorphic Encryption, Revisited. 729 - Gennaro Avitabile, Vincenzo Botta, Dario Fiore:
Tetris! Traceable Extendable Threshold Ring Signatures and More. 730 - Gorjan Alagic, Joseph Carolan, Christian Majenz, Saliha Tokat:
The Sponge is Quantum Indifferentiable. 731 - Alex B. Grilo, Álvaro Yángüez:
Quantum pseudoresources imply cryptography. 732 - Hemin Rahimi, Amir Moradi:
One More Motivation to Use Evaluation Tools, This Time for Hardware Multiplicative Masking of AES. 733 - Vicent Esteve Voltes:
Universal Blind and Verifiable Delegated Quantum Computation with Classical Clients. 734 - Katharina Boudgoust, Anamaria Costache:
Improved Rényi Arguments for Lattice-Based Threshold Encryption. 735 - Max Duparc:
Superglue: Fast formulae for (2,2) gluing isogenies. 736 - Anubhav Baweja, Pratyush Mishra, Tushar Mopuri, Matan Shtepel:
FICS and FACS: Fast IOPPs and Accumulation via Code-Switching. 737 - Alexandru Cojocaru, Minki Hhan, Qipeng Liu, Takashi Yamakawa, Aaram Yun:
Quantum Lifting for Invertible Permutations and Ideal Ciphers. 738 - Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura, Shigenori Uchiyama:
An Extended Rectangular MinRank Attack against UOV and Its Variants. 739 - Xin Wang, Xiao Sui, Sisi Duan:
Otter: Scalable Sharding-Based Atomic Broadcast with Abortable Fork Detection. 740 - Weiqing Deng, Jianing Zhang, Haoyang Wang:
Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo (Full Version). 741 - Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Federico Valbusa:
Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-Rest. 742 - Vasyl Ustimenko, Tymoteusz Chojecki:
On graph based pseudo quadratic multivariate maps of prescribed degree as instruments of key establishment. 743 - Zhuang Shan, Leyou Zhang, Fuchun Guo, Yong Yu:
Candidate Matchmaking Encryption from Attribute-Based Encryption Schemes. 744 - Krishnendu Chatterjee, Seth Gilbert, Stefan Schmid, Jakub Svoboda, Michelle Yeo:
When is liquid democracy possible? On the manipulation of variance. 745 - Alexey S. Zelenetsky, Peter G. Klyucharev:
Zemlyanika - Module-LWE based KEM with the power-of-two modulus, explicit rejection and revisited decapsulation failures. 746 - Wen Wu, Jiankuo Dong, Zhen Xu, Zhenjiang Dong, Dung Duong, Fu Xiao, Jingqiang Lin:
Symphony of Speeds: Harmonizing Classic McEliece Cryptography with GPU Innovation. 748 - Ruihao Dai, Jiankuo Dong, Mingrui Qiu, Zhenjiang Dong, Fu Xiao, Jingqiang Lin:
GOLF: Unleashing GPU-Driven Acceleration for FALCON Post-Quantum Cryptography. 749 - Gustaf Ahlgren, Onur Günlü:
Secure Rate-Distortion-Perception Trade-off Over Channels: A Randomized Distributed Function Computation (RDFC) Application. 750 - Eyal Kushnir, Hayim Shaul:
Improved Range Searching And Range Emptiness Under FHE Using Copy-And-Recurse. 751 - Gulshan Kumar, Rahul Saha, Mauro Conti, William J. Buchanan:
LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. 752 - Benedikt Bünz, Alessandro Chiesa, Giacomo Fenzi, William Wang:
Linear-Time Accumulation Schemes. 753 - Vasyl Ustimenko, Tymoteusz Chojecki:
On graph based pseudo quadratic multivariate maps of prescribed degree as instruments of key establishment. 754 - Zhengjun Cao, Lihua Liu:
A Note on "CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid". 755 - Xue Yang, Ruida Wang, Depan Peng, Kun Liu, Xianhui Lu, Xiaohu Tang:
PIRCOR: Communication-Optimal Hintless Single-Server PIR via Homomorphic Rotation. 756 - Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud:
Threshold Niederreiter: Chosen-Ciphertext Security and Improved Distributed Decoding. 757 - Panos Kampanakis, Shai Halevi, Nevine Maurice Ebeid, Matt Campagna:
Blockcipher-Based Key Commitment for Nonce-Derived Schemes. 758 - Santiago Arranz-Olmos, Gilles Barthe, Benjamin Grégoire, Jan Jancar, Vincent Laporte, Tiago Oliveira, Peter Schwabe:
Let's DOIT: Using Intel's Extended HW/SW Contract for Secure Compilation of Crypto Code. 759 - Mojtaba Fadavi, Seyyed Arash Azimi, Sabyasachi Karati, Samuel Jaques:
DGSP: An Efficient Scalable Fully Dynamic Group Signature Scheme Using $\rm{SPHINCS}^+$. 760 - Chandan Kumar, Nimish Mishra, Suvradip Chakraborty, Satrajit Ghosh, Debdeep Mukhopadhyay:
TERRA : Trojan-Resilient Reverse-Firewall for Cryptographic Applications. 761 - Mahdi Rahimi:
MALARIA: Management of Low-Latency Routing Impact on Mix Network Anonymity (Extended Version). 762 - Axel Lemoine:
The Tangent Space Attack. 763 - Alex B. Grilo, Lucas Hanouz, Anne Marin:
Security of a secret sharing protocol on the Qline. 764 - Muyang Li, Yueteng Yu, Bangyan Wang, Xiong Fan, Shuwen Deng:
ZKPoG: Accelerating WitGen-Incorporated End-to-End Zero-Knowledge Proof on GPU. 765 - Nicholas Brandt:
Unbiasable Verifiable Random Functions from Generic Assumptions. 766 - Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad S. Wahby, Paul Grubbs:
ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs. 767 - Syed Mahbub Hafiz, Bahattin Yildiz, Marcos A. Simplício Jr., Thales B. Paiva, Henrique S. Ogawa, Gabrielle De Micheli, Eduardo Lopes Cominetti:
Incompleteness in Number-Theoretic Transforms: New Tradeoffs and Faster Lattice-Based Cryptographic Applications. 768 - Fukang Liu, Vaibhav Dixit, Santanu Sarkar, Willi Meier, Takanori Isobe:
Finding the Inverse of some Shift Invariant Transformations. 769 - Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong, Tao Wei, Wenguang Chen:
ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations. 770 - Weizhe Wang, Deng Tang:
Differential Fault Attacks on TFHE-friendly cipher sfFRAST. 771 - San Ling, Chan Nam Ngo, Khai Hanh Tang, Huaxiong Wang:
Publicly Auditable Garbled Circuit. 772 - Martin Zbudila, Aysajan Abidin, Bart Preneel:
Exploring Adversarial Attacks on the MaSTer Truncation Protocol. 773 - Léo Ducas, Ludo N. Pulles, Marc Stevens:
Towards a Modern LLL Implementation. 774 - Osman Biçer, Ali Ajorian:
AuthOr: Lower Cost Authenticity-Oriented Garbling of Arbitrary Boolean Circuits. 775 - Ekrem Bal, Lukas Aumayr, Atacan Iyidogan, Giulia Scaffino, Hakan Karakus, Cengiz Eray Aslan, Orfeas Stefanos Thyfronitis Litos:
Clementine: A Collateral-Efficient, Trust-Minimized, and Scalable Bitcoin Bridge. 776 - Rostin Shokri, Nektarios Georgios Tsoutsos:
Seamless Switching Between PBS and WoPBS for Scalable TFHE. 777 - Pouria Fallahpour, Alex B. Grilo, Garazi Muguruza, Mahshid Riahinia:
Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond. 778 - Thomas Locher, Victor Shoup:
Improving the Round Complexity of MiniCast. 779 - David Kühnemann, Adam Polak, Alon Rosen:
The Planted Orthogonal Vectors Problem. 780 - Anmoal Porwal, Anna Baumeister, Violetta Weger, Antonia Wachter-Zeh, Pierre Loidreau:
Generalizing the Augot-Finiasz PKE to Other Code Classes. 781 - Daphné Trama, Aymen Boudguiga, Renaud Sirdey:
AES Is Not Enough: the Block Ciphers Zoo Goes Homormorphic (over TFHE). 782 - Itai Dinur, Nathan Keller, Avichai Marmor:
Non-Adaptive Cryptanalytic Time-Space Lower Bounds via a Shearer-like Inequality for Permutations. 783 - Jung Hee Cheon, Guillaume Hanrot, Jongmin Kim, Damien Stehlé:
SHIP: A Shallow and Highly Parallelizable CKKS Bootstrapping Algorithm. 784 - Shay Gueron, Thomas Ristenpart:
DNDK: Combining Nonce and Key Derivation for Fast and Scalable AEAD. 785 - Tzu-Shen Wang, Jimmy Dani, Juan Garay, Soamar Homsi, Nitesh Saxena:
Robust and Verifiable MPC with Applications to Linear Machine Learning Inference. 786 - Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof:
Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer. 787 - Nabanita Chakraborty, Ratna Dutta:
Identity-Based Ring Signature from Quantum Token. 788 - Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl:
Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations. 789 - Jiahui Gao, Son Nguyen, Marina Blanton, Ni Trieu:
PULSE: Parallel Private Set Union for Large-Scale Entities. 790 - Zhengjun Cao, Lihua Liu:
Analysis of One Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism. 791 - Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Scrutinizing the Security of AES-based Hashing and One-way Functions. 792 - Shuhei Nakamura:
Solving systems of polynomial equations via Macaulay matrices. 793 - Martin R. Albrecht, Benjamin Dowling, Daniel Jones:
Formal Analysis of Multi-Device Group Messaging in WhatsApp. 794 - Ali Raya, Vikas Kumar, Sugata Gangopadhyay, Aditi Kar Gangopadhyay:
Efficient Noncommutative KEMs from Twisted Dihedral Group Ring. 795 - Sanjay Deshpande, Yongseok Lee, Mamuri Nawan, Kashif Nawaz, Ruben Niederhagen, Yunheung Paek, Jakub Szefer:
Unified MEDS Accelerator. 796 - Giulio Berra:
WEBCAT: Web-based Code Assurance and Transparency. 797 - Arsalan Ali Malik, Harshvadan Mihir, Aydin Aysu:
CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon. 798 - John Gaspoz, Siemen Dhooghe:
Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY. 799 - Uma Girish, Alex May, Leo Orshansky, Chris Waddell:
Comparing classical and quantum conditional disclosure of secrets. 800 - Dennis Faut, Valerie Fetzer, Jörn Müller-Quade, Markus Raiber, Andy Rupp:
POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics. 801 - Nicolas Vallet, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Vincent Grosso:
Optimizing Key Recovery in Classic McEliece: Advanced Error Correction for Noisy Side-Channel Measurements. 802 - Lyudmila Kovalchuk, Bingsheng Zhang, Andrii Nastenko, Zeyuan Yin, Roman Oliynykov, Mariia Rodinko:
Universally Composable On-Chain Quadratic Voting for Liquid Democracy. 803 - Christoph U. Günther, Krzysztof Pietrzak:
Putting Sybils on a Diet: Securing Distributed Hash Tables using Proofs of Space. 804 - Fredrik Meisingseth, Christian Rechberger, Fabian Schmid:
Accelerating Multiparty Noise Generation Using Lookups. 805 - Fiona Fuchs, Felix Walter, Florian Tschorsch:
BERMUDA: A BPSec-Compatible Key Management Scheme for DTNs. 806 - Xinrui Yang, Yijian Zhang, Ying Gao, Jie Chen:
Registered ABE for Circuits from Evasive Lattice Assumptions. 807 - Viktória I. Villányi, Vladimir Bozovic:
Partially Registered Type of Multi-authority Attribute-based Encryption. 808 - Thomas de Ruijter, Jan-Pieter D'Anvers, Ingrid Verbauwhede:
Don't be mean: Reducing Approximation Noise in TFHE through Mean Compensation. 809 - Seunghwan Lee, Jaesang Noh, Taejeong Kim, Dohyuk Kim, Dong-Joon Shin:
Actively Secure MPC in the Dishonest Majority Setting: Achieving Constant Complexity in Online Communication, Computation Per Gate, Rounds, and Private Input Size. 810 - Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek:
Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4. 811 - Nouri Alnahawi, Melissa Azouaoui, Joppe W. Bos, Gareth T. Davies, SeoJeong Moon, Christine van Vredendaal, Alexander Wiesmaier:
Post-Quantum Cryptography in eMRTDs: Evaluating PAKE and PKI for Travel Documents. 812 - Christodoulos Pappas, Dimitrios Papadopoulos, Charalampos Papamanthou:
HydraProofs: Optimally Computing All Proofs in a Vector Commitment (with applications to efficient zkSNARKs over data from multiple users). 813 - Luca Campa, Arnab Roy:
Groebner Basis Cryptanalysis of Anemoi. 814 - Yaobin Shen, Lei Wang, Dawu Gu:
Security Analysis of NIST Key Derivation Using Pseudorandom Functions. 815 - Xufeng Zhang, Baohan Huang, Sisi Duan, Haibin Zhang:
Randomized vs. Deterministic? Practical Randomized Synchronous BFT in Expected Constant Time. 816 - Fredrik Meisingseth, Christian Rechberger:
Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes. 817 - Aviv Frenkel, Dmitry Kogan:
An Attack on TON's ADNL Secure Channel Protocol. 818 - Renas Bacho, Alireza Kavousi:
SoK: Dlog-based Distributed Key Generation. 819 - Simon Damm, Nicolai Kraus, Alexander May, Julian Nowakowski, Jonas Thietke:
One Bit to Rule Them All - Imperfect Randomness Harms Lattice Signatures. 820 - Robert Schädlich:
Multi-Client Attribute-Based and Predicate Encryption, Revisited. 821 - Momonari Kudo, Kazuhiro Yokoyama:
Generalization of semi-regular sequences: Maximal Gröbner basis degree, variants of genericness, and related conjectures. 822 - Zoë Ruha Bell, Anvith Thudi:
Sampling Arbitrary Discrete Distributions for RV Commitment Schemes Using the Trimmed-Tree Knuth-Yao Algorithm. 823 - Christoph Graebnitz, Nicolas Buchmann, Martin Seiffert, Marian Margraf:
A Specification of an Anonymous Credential System Using BBS+ Signatures with Privacy-Preserving Revocation and Device Binding. 824 - Ahmet Malal:
High-Performance FPGA Implementations of Lightweight ASCON-128 and ASCON-128a with Enhanced Throughput-to-Area Efficiency. 825 - Pierre Civit, Muhammad Ayaz Dzulfikar, Seth Gilbert, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira:
Repeated Agreement is Cheap! On Weak Accountability and Multishot Byzantine Agreement. 826 - Binbin Tu, Yujie Bai, Cong Zhang, Yang Cao, Yu Chen:
Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios. 827 - Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Haiyang Xue, Mei Wang, Shuchao Wang, Mengling Liu:
Bandwidth-Efficient Robust Threshold ECDSA in Three Rounds. 828 - Kelong Cong, Emmanuela Orsini, Erik Pohle, Oliver Zajonc:
Row Reduction Techniques for n-Party Garbling. 829 - Anisha Mukherjee, Maciej Czuprynko, David Jacquemin, Péter Kutas, Sujoy Sinha Roy:
Simple Power Analysis Attack on SQIsign. 830 - Teodora Ljubevska, Alexander Zeh, Donjete Elshani Rama, Ken Tindell:
Worst-Case Time Analysis of Key Agreement Protocols in 10BASE-T1S Automotive Networks. 831 - Fatna Kouider, Anisha Mukherjee, David Jacquemin, Péter Kutas:
Constant-time Integer Arithmetic for SQIsign. 832 - Theophilus Agama:
A note on closed addition chains and complete numbers. 833 - Zhengjun Cao, Lihua Liu:
A Note on "CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT". 834 - Carsten Baum, Bernardo David, Elena Pagnin, Akira Takahashi:
Universally Composable Interactive and Ordered Multi-Signatures. 835 - Tapas Pal, Robert Schädlich:
Registered Functional Encryption for Attribute-Weighted Sums with Access Control. 836 - Insung Kim, Seonggyeom Kim, Sunyeop Kim, Donggeun Kwon, Hanbeom Shin, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Towards Optimal Differential Attacks on FLY and PIPO. 837 - Dmitry Astakhin:
KeyJoin: Privacy-Focused CoinJoin Protocol for Bitcoin. 838 - Maciej Czuprynko, Anisha Mukherjee, Sujoy Sinha Roy:
Correlation power analysis of LESS and CROSS. 839 - Renas Bacho, Benedikt Wagner:
T-Spoon: Tightly Secure Two-Round Multi-Signatures with Key Aggregation. 840 - Daniel Rausch, Nicolas Huber, Ralf Küsters:
Verifiable E-Voting with a Trustless Bulletin Board. 841 - Pierre Varjabedian:
Improvements on the schemes VOX and QR UOV When minus is a plus. 842 - Raphael Heitjohann, Jonas von der Heyden, Tibor Jager:
Rerandomizable Garbling, Revisited. 843 - Riddhi Ghosal, Aayush Jain, Paul Lou, Amit Sahai, Neekon Vafa:
Post-Quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich's LPN. 844 - Lei Tian, Chenke Wang, Yu Long, Xian Xu, Mingchao Wan, Chunmiao Li, Shifeng Sun, Dawu Gu:
Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols. 845 - Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak:
Full-Authority Data Sharing Systems: Ciphertext-Dependent Proxy Re-Encryption with Dynamic Key Generation. 846 - Marc Houben:
Deterministic algorithms for class group actions. 847 - Hamza Abusalah:
On Graphs of Incremental Proofs of Sequential Work. 848 - Rafaël Del Pino, Shuichi Katsumata, Guilhem Niot, Michael Reichle, Kaoru Takemure:
Unmasking TRaccoon: A Lattice-Based Threshold Signature with An Efficient Identifiable Abort Protocol. 849 - George Lu, Shafik Nassar, Brent Waters:
Succinct Computational Secret Sharing for Monotone Circuits. 850 - James Bell-Clark, Adrià Gascón, Baiyu Li, Mariana Raykova, Amrita Roy Chowdhury:
Vεrity: Verifiable Local Differential Privacy. 851 - Liu Zhang, Yiran Yao, Danping Shi, Dongchen Chai, Jian Guo, Zilong Wang:
Neural-Inspired Advances in Integral Cryptanalysis. 852 - Guilhem Niot:
Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay. 853 - Matthias Probst, Alexander Wiesent, Michael Gruber, Georg Sigl:
ProbeNav - Fast, precise and repeatable positioning of electromagnetic probes for local Side-Channel Attacks. 854 - Tsz Hon Yuen, Ying-Teng Chen, Shimin Pan, Jiangshan Yu, Joseph K. Liu:
Posterior Security: Anonymity and Message Hiding of Standard Signatures. 855 - Elias Riesinger, Jürgen Fuß:
Testing the Tests - Opportunities for Corrections and Improvements in NIST SP 800-22r1a and its Reference Code. 856 - Yaoling Ding, Haotong Xu, Annyu Liu, An Wang, Jingqi Zhang, Jing Yu, Liehuang Zhu:
Classify Directly: A Dynamic Time SPA Classification Method Based on DTW. 857 - Fabrice Benhamouda, Caicai Chen, Shai Halevi, Yuval Ishai, Hugo Krawczyk, Tamer Mour, Tal Rabin, Alon Rosen:
Encrypted Matrix-Vector Products from Secret Dual Codes. 858 - Hongyuan Qu, Guangwu Xu:
On the Provable Dual Attack for LWE by Modulus Switching. 859 - Debajyoti Das, Jeongeun Park:
sPAR: (Somewhat) Practical Anonymous Router. 860 - Mahdi Rahimi:
MOCHA: Mixnet Optimization Considering Honest Client Anonymity. 861 - Gopal Singh:
Distinguishing Full-Round AES-256 in a Ciphertext-Only Setting via Hybrid Statistical Learning. 862 - Gaëtan Cassiers, Siemen Dhooghe, Thorben Moos, Sayandeep Saha, François-Xavier Standaert:
Fly Away: Lifting Fault Security through Canaries and the Uniform Random Fault Model. 863 - Hiroki Okada, Rachel Player, Simon Pohmann:
Fheanor: a new, modular FHE library for designing and optimising schemes. 864 - Yanpei Guo, Alex Luoyuan Xiong, Wenjie Qu, Jiaheng Zhang:
Data Availability for Thousands of Nodes. 865 - Weishen Zou, Bruno Martin, Thomas Prévost:
Public-key Cryptography Attacks Using Adiabatic Quantum Computer. 866 - Baraq Ghaleb, William J. Buchanan:
Side Channel Analysis in Homomorphic Encryption. 867 - Sicheng Wei, Jingwei Hu:
Delegated PSI from Homomorphic Encryptions. 868 - Michal Wronski, Lukasz Dzierzkowski, Mateusz Lesniak, Ewa Syta:
One for All, All for One: Universal semi-agnostic quantum circuit for solving (Standard) Abelian Hidden Subgroup Problems. 869 - Yiwen Gao, Dongliang Cai, Yang Xu, Haibin Kan:
From List-Decodability to Proximity Gaps. 870 - Rafaël Del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest:
Simple and Efficient Lattice Threshold Signatures with Identifiable Aborts. 871 - Rafaël Del Pino, Guilhem Niot:
Finally! A Compact Lattice-Based Threshold Signature. 872 - Vladimir Sarde, Nicolas Debande:
Improvement of Side-Channel Attacks on Mitaka. 873 - Jiaqi Liu, Yan Wang, Fang-Wei Fu:
Decentralized Multi-Authority Attribute-Based Inner-Product Functional Encryption: Noisy and Evasive Constructions from Lattices. 874 - Mohammed Rahmani, Abderrahmane Nitaj:
Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve. 875 - Jake Januzelli, Mike Rosulek, Lawrence Roy:
Lower Bounds for Garbled Circuits from Shannon-Type Information Inequalities. 876 - Nibesh Shrestha, Aniket Kate:
Towards Improving Throughput and Scalability of DAG-based BFT SMR. 877 - Fabrice Benhamouda, Shai Halevi, Panos Kampanakis, Hugo Krawczyk:
Blockcipher-Based Key Derivation without PRP/PRF Switching. 878 - Michal Osadnik, Darya Kaviani, Valerio Cini, Russell W. F. Lai, Giulio Malavolta:
Papercraft: Lattice-based Verifiable Delay Function Implemented. 879 - Bin Hu, Jianwei Liu, Zhenliang Lu, Qiang Tang, Zhuolun Xiang, Zongyang Zhang:
Optimistic Asynchronous Dynamic-committee Proactive Secret Sharing. 880 - Mahdi Mahdavi, Helena Rifà-Pous:
One-Way Homomorphic Encryption: A Composite Group Approach. 881 - Mahdi Mahdavi, Ehsan Meamari, Emad Heydari Beni, Maryam Sheikhi:
Leveled Homomorphic Encryption over Composite Groups. 882 - Oguz Yayla, Yunus Emre Yilmaz:
A Fast, Efficient, Platform-Adaptive, and AIS-20/31 Compliant PLL-Based True Random Number Generator on an SoC FPGA. 883 - Min Zhang, Yu Chen, Xiyuan Fu, Zhiying Cui:
k-out-of-n Proofs and Application to Privacy-Preserving Cryptocurrencies. 884 - Cong Zhang, Yu Chen, Yang Cao, Yujie Bai, Shuaishuai Li, Juntong Lin, Anyu Wang, Xiaoyun Wang:
Fast Fuzzy PSI from Symmetric-Key Techniques. 885 - Jean-Sébastien Coron, Tim Seuré:
PaCo: Bootstrapping for CKKS via Partial CoeffToSlot. 886 - Xiangyu Su, Yuma Tamagawa, Mario Larangeira, Keisuke Tanaka:
Adaptively Secure Blockchain-Aided Decentralized Storage Networks: Formalization and Generic Construction. 887 - Jaehyung Kim:
Bootstrapping GBFV with CKKS. 888 - Dmitry Khovratovich, Mikhail A. Kudinov, Benedikt Wagner:
At the Top of the Hypercube - Better Size-Time Tradeoffs for Hash-Based Signatures. 889 - Christina Boura, Patrick Derbez, Baptiste Germon, Rachelle Heim Boissier, María Naya-Plasencia:
SPEEDY: Caught at Last. 890 - Mi-Ying (Miryam) Huang, Er-Cheng Tang:
Obfuscation of Unitary Quantum Programs. 891 - Charles Bouillaguet, Claire Delaplace, Mickaël Hamdad, Damien Vergnaud:
Practical cryptanalysis of pseudorandom correlation generators based on quasi-Abelian syndrome decoding. 892 - Charlotte Lefevre, Mario Marhuenda Beltrán:
MacaKey: Full-State Keyed Sponge Meets the Summation-Truncation Hybrid. 893 - Marina Checri, Pierre-Emmanuel Clet, Marc Renard, Renaud Sirdey:
Achieving "beyond CCA1" security for linearly homomorphic encryption, without SNARKs? 894 - Charles Bouillaguet, Thibauld Feneuil, Jules Maire, Matthieu Rivain, Julia Sauvage, Damien Vergnaud:
Blinding Post-Quantum Hash-and-Sign Signatures. 895 - Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan:
InstaRand: Instantly Available and Instantly Verifiable On-chain Randomness. 896 - Kohei Nakagawa, Hiroshi Onuki:
SQIsign2DPush: Faster Signature Scheme Using 2-Dimensional Isogenies. 897 - Youlong Ding, Aayush Jain, Ilan Komargodski:
A New Approach for LPN-based Pseudorandom Functions: Low-Depth and Key-Homomorphic. 898 - Akshit Aggarwal, Yang Li, Srinibas Swain:
Improved Noise Bound in BFV Homomorphic Encryption and Its Application to Multiplication. 899 - Michael Meyer, Patrick Struck, Maximiliane Weishäupl:
Exclusive Ownership of Fiat-Shamir Signatures: ML-DSA, SQIsign, LESS, and More. 900 - Behzad Abdolmaleki, John Clark, Mohammad Foroutani, Shahram Khazaei, Sajjad Nasirzadeh:
A Generic Framework for Practical Lattice-Based Non-interactive Publicly Verifiable Secret Sharing. 901 - Alessandro Chiesa, Ziyi Guan, Christian Knabenhans, Zihan Yu:
On the Fiat-Shamir Security of Succinct Arguments from Functional Commitments. 902 - Seyedmohammad Nouraniboosjin, Fatemeh Ganji:
Rock and a Hard Place: Attack Hardness in Neural Network-assisted Side Channel Analysis. 903 - Haruhisa Kosuge, Keita Xagawa:
The Security of ML-DSA against Fault-Injection Attacks. 904 - John W. C. Chan:
Authenticated Key Exchange Protocol with Remote Randomness. 905 - Matthew Jagielski, Rahul Rachuri, Daniel Escudero, Peter Scholl:
Covert Attacks on Machine Learning Training in Passively Secure MPC. 906 - Dung Bui, Gayathri Garimella, Peihan Miao, Van Long Phuoc Pham:
New Framework for Structure-Aware PSI From Distributed Function Secret Sharing. 907 - Nitin Singh, Sikhar Patranabis:
SubLogarithmic Linear Time SNARKs from Compressed Sum-Check. 908 - J. Cameron Patterson, William J. Buchanan, Callum Turino:
Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices. 909 - Guofeng Tang, Haiyang Xue:
Robust Threshold ECDSA with Online-Friendly Design in Three Rounds. 910 - Aron van Baarsen, Sihang Pu:
Fuzzy Private Set Intersection from VOLE. 911 - Federico Barbacovi, Enrique Larraia:
Enforcing arbitrary constraints on Bitcoin transactions. 912 - Yi-Fu Lai, Jonas Meers, Julian Nowakowski:
Hidden Number Problems in Fiat-Shamir based Post-Quantum Signatures. 913 - Bishwajit Chakraborty, Abishanka Saha:
Tweakable Permutation-based Luby-Rackoff Constructions. 914 - Tim Beyne, Addie Neyt:
Improved differential cryptanalysis of SPEEDY. 915 - Jon Stephens, Shankara Pailoor, Isil Dillig:
Automated Verification of Consistency in Zero-Knowledge Proof Circuits. 916 - Tamir Hemo, Kevin Jue, Eugene Rabinovich, Gyumin Roh, Ron D. Rothblum:
Jagged Polynomial Commitments (or: How to Stack Multilinears). 917 - Alex Evans, Guillermo Angeris:
The Accidental Computer: Polynomial Commitments from Data Availability. 918 - Marcel Keller:
Rep3 Reloaded: On the Cost of Function-Dependent Preprocessing in Semi-Honest 3PC with Honest Majority. 919 - Zheng Xu, Kaizhan Lin, Chang-An Zhao, Yi Ouyang:
SQIsign2D2: New SQIsign2D Variant by Leveraging Power Smooth Isogenies in Dimension One. 920 - Kostas Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang, Aayush Yadav:
Zero-knowledge Authenticator for Blockchain: Policy-private and Obliviously Updateable. 921 - Lizhen Zhang, Shang Gao, Bin Xiao:
HyperWolf: Efficient Polynomial Commitment Schemes from Lattices. 922 - Marco Baldi, Michele Battagliola, Rahmi El Mechri, Paolo Santini, Riccardo Schiavoni, Davide De Zuane:
SPECK: Signatures from Permutation Equivalence of Codes and Kernels. 923 - Koji Nuida:
Card-Based Protocol Counting Connected Components of Graphs. 924 - Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wen-Feng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
SCMAC and LOL2.0: An AEAD Design Framework and A New Version of LOL Stream Cipher Design Framework. 925 - Jincheol Ha, Seongha Hwang, Jooyoung Lee, Seungmin Park, Mincheol Son:
Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues (Full Version). 926 - Qiangqiang Liu, Qian Huang, Frank Fan, Haishan Wu, Xueyan Tang:
Enhancing Meme Token Market Transparency: A Multi-Dimensional Entity-Linked Address Analysis for Liquidity Risk Evaluation. 927 - Daniël M. H. van Gent, Ludo N. Pulles:
HAWK: Having Automorphisms Weakens Key. 928 - Josh Benaloh, Michael Naehrig, Olivier Pereira:
The DROP Protocol: Dispute Resolution via Observation in Public for Verifiable, In-Person Voting. 929 - Henri Dohmen, Robin Hundt, Nora Khayata, Thomas Schneider:
SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation. 930 - Gabriel Dettling, Martin Hirt, Chen-Da Liu-Zhang:
Multivalued Broadcast with Optimal Length. 931 - Tim Beyne, Michiel Verbauwhede:
Integral cryptanalysis in characteristic p. 932 - Liam Eagen, Youssef El Housni, Simon Masson, Thomas Piellard:
Fast elliptic curve scalar multiplications in SN(T)ARK circuits. 933 - Céline Chevalier, Éric Sageloli:
Diving Deep Into UC: Uncovering and Resolving Issues in Universal Composability. 934 - David Santos, Michael Scott:
Side-channel safe conditional moves and swaps. 935 - Yibin Yang:
Justvengers: Batched VOLE ZK Disjunctions in O(R+B+C) Communication. 936 - Antonio Sanso, Giuseppe Vitto:
Attacking Poseidon via Graeffe-Based Root-Finding over NTT-Friendly Fields. 937 - Yohei Watanabe, Kyoichi Asano, Haruka Hirata, Tomoki Ono, Mingyu Yang, Mitsugu Iwamoto, Yang Li, Yuko Hara:
PSYLOCKE: Provably Secure Logic Locking with Practical Efficiency. 938 - Zhengjun Cao, Lihua Liu:
On the security of one certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks. 939 - Guilhem Mureau:
Special Genera of Hermitian Lattices and Applications to HAWK. 940 - Zhuo Wu, Shi Qi, Xinxuan Zhang, Yi Deng, Kun Lai, Hailong Wang:
Proof of Exponentiation: Enhanced Prover Efficiency for Algebraic Statements. 941 - Mirza Ahad Baig, Krzysztof Pietrzak:
On the (in)security of Proofs-of-Space based Longest-Chain Blockchains. 942 - Elizabeth C. Crites, Chelsea Komlo, Mary Maller:
On the Adaptive Security of Key-Unique Threshold Signatures. 943 - Lalita Devadas, Abhishek Jain, Brent Waters, David J. Wu:
Succinct Witness Encryption for Batch Languages and Applications. 944 - Chen Bai, Mehdi Esmaili, Atul Mantri:
Quantum Security Analysis of the Key-Alternating Ciphers. 945 - Lev Soukhanov:
Logup*: faster, cheaper logup argument for small-table indexed lookups. 946 - Alessandro Chiesa, Marcel Dall'Agnol, Zijing Di, Ziyi Guan, Nicholas Spooner:
Quantum Rewinding for IOP-Based Succinct Arguments. 947 - Yijia Chang, Rongmao Chen, Chao Lin, Songze Li, Xinyi Huang:
Resolving the Efficiency-Utility Dilemma of Threshold Linearly Homomorphic Encryption via Message-Space Adapter. 948 - Xiao Liang, Omkant Pandey, Yuhao Tang, Takashi Yamakawa:
Almost-Total Puzzles and Their Applications. 949 - Ziyu Zhao, Jintai Ding:
Breaking Poseidon Challenges with Graeffe Transforms and Complexity Analysis by FFT Lower Bounds. 950 - Woohyuk Chung, Seongha Hwang, Hwigyeom Kim, Jooyoung Lee:
Enhancing Provable Security and Efficiency of Permutation-based DRBGs. 951 - Zijun Zhuang, Yingjie Zhang, Jintai Ding:
A Provably Secure W-OTS+ based on MQ Problem. 952 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Tight Multi-User Security of CCM and Enhancement by Tag-Based Key Derivation Applied to GCM and CCM. 953 - Lorenzo Grassi, Katharina Koschatko, Christian Rechberger:
Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails. 954 - Muzhou Li, Jiamin Cui, Longzheng Cui, Kai Hu, Chao Niu, Meiqin Wang:
Towards Better Integral Distinguishers over 픽p Based on Exact Coefficients of Monomials. 955 - Linru Zhang, Xiangning Wang, Xianhui Lu, Huaxiong Wang, Kwok-Yan Lam:
LEAF: A Low-Latency Evaluation Architecture for Feedforward Block in Privacy-Preserving Transformer Inference. 956 - San Ling, Benjamin Hong Meng Tan, Huaxiong Wang, Allen Siwei Yang:
Laurent Polynomial-Based Linear Transformations for Improved Functional Bootstrapping. 957 - Walid Haddaji, Loubna Ghammam, Nadia El Mrabet, Leila Ben Abdelghani:
Efficient Pairings Final Exponentiation Using Cyclotomic Cubing for Odd Embedding Degrees Curves. 958 - Ilias Cherkaoui, Ciaran Clarke, Jerry Horgan, Indrakshi Dey:
Zero-Trust Post-quantum Cryptography Implementation Using Category Theory. 959 - Patrick Struck, Maximiliane Weishäupl:
A Framework for Advanced Signature Notions. 960 - Yu Sun, Lixuan Wu, Chenhao Jia, Tingting Cui, Kai Hu, Meiqin Wang:
Addendum to How Small Can S-boxes Be? 961 - Thomas Prévost, Bruno Martin, Olivier Alibart:
An almost key-homomorphic post-quantum block cipher with key rotation and security update for long-term secret storage. 962 - Siwei Sun, Shun Li, Zhiyu Zhang, Charlotte Lefevre, Bart Mennink, Zhen Qin, Dengguo Feng:
Permutation-Based Hashing with Stronger (Second) Preimage Resistance - Application to Hash-Based Signature Schemes. 963 - Ariel Futoransky, Fadi Barbàra, Ramses Fernandez, Gabriel Larotonda, Sergio Demian Lerner:
TOOP: A transfer of ownership protocol over Bitcoin. 964 - Robin Jadoul, Barry Van Leeuwen, Oliver Zajonc:
Multiparty FHE Redefined: A Framework for Unlimited Participants. 965 - Geoffroy Couteau, Naman Kumar, Xiaxi Ye:
Multiparty Homomorphic Secret Sharing and More from LPN and MQ. 966 - Tapas Pal, Robert Schädlich, Erkan Tairi:
Registered Functional Encryption for Pseudorandom Functionalities from Lattices: Registered ABE for Unbounded Depth Circuits and Turing Machines, and More. 967 - Yilei Chen, Liheng Ji, Wenjie Li:
Learning with Alternating Moduli, Arora-Ge over Composite Moduli, and Weak PRFs. 968 - Elaine Shi, Rose Silver, Changrui Mu:
Decentralized Data Archival: New Definitions and Constructions. 969 - Giulio Malavolta, Tamer Mour:
How to Verify that a Small Device is Quantum, Unconditionally. 970 - Christoph Coijanovic, Laura Hetz, Kenneth G. Paterson, Thorsten Strufe:
Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels. 971 - Bence Mali:
Generalized BGV, BFV, and CKKS for Homomorphic Encryption over Matrix Rings. 972 - Balthazar Bauer, Georg Fuchsbauer, Fabian Regen:
On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions. 973 - Joshua G. Stern:
OptAttest: Verifying Multi-List Multi-Hop History via a Hybrid Zero-Knowledge Architecture. 974 - Eylon Yogev, Shany Ben-David:
Incompressible Encryption with Everlasting Security. 975 - Roberto Avanzi, Bishwajit Chakraborty, Eik List:
The Large Block Cipher Family Vistrutah. 976 - Xiaolin Duan, Fan Huang, Yaqi Wang, Honggang Hu:
A Novel Leakage Model in OpenSSL's Miller-Rabin Primality Test. 977 - Toomas Krips, Pille Pullonen-Raudvere:
Multi-Party Distributed Point Functions with Polylogarithmic Key Size from Invariants of Matrices. 978 - Zhengrong Lu, Hongbo Yu, Xiaoen Lin, Sitong Yuan:
Collision Attacks on Reduced RIPEMD-128. 979 - Karthikeyan Bhargavan, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters:
Formal Security and Functional Verification of Cryptographic Protocol Implementations in Rust. 980 - Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang:
Algebraic Cryptanalysis of AO Primitives Based on Polynomial Decomposition Applications to Rain and Full AIM-IIIIV. 981 - Hans Heum:
Simulatability SOA Does Not Imply Indistinguishability SOA in the CCA Setting. 982 - Pierre-Alain Jacqmin, Jean Liénardy:
LP2+: a robust symmetric-key AKE protocol with perfect forward secrecy, and an advocacy for thorough security proofs. 983 - Bishwajit Chakraborty, Mridul Nandi, Soumit Pal, Thomas Peyrin, Quan Quan Tan:
AsconAEAD128 Revisited in the Multi-user Setting. 984 - Pouria Fallahpour, Serge Fehr, Yu-Hsuan Huang:
Tighter Quantum Security for Fiat-Shamir-with-Aborts and Hash-and-Sign-with-Retry Signatures. 985 - Cong Ling, Laura Luzzi, Hao Yan:
The Rényi Smoothing Parameter and Its Applications in Lattice-Based Cryptography. 986 - Utkarsh Gupta, Hessam Mahdavifar:
Security of Linear Secret Sharing Schemes with Noisy Side-Channel Leakage. 987 - Bar Alon, Naty Peter:
Dynamic Security: A Realistic Approach to Adaptive Security With Applications to Strong FaF Security. 988 - Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
List Decoding in Private Information Retrieval: Formal Definition and Efficient Constructions. 989 - Reo Eriguchi, Keitaro Hiwatashi:
Lower Bounds on the Bottleneck Complexity of Secure Multiparty Computation. 990 - Linru Zhang, Xiangning Wang, Sim Jun Jie, Zhicong Huang, Jiahao Zhong, Huaxiong Wang, Pu Duan, Kwok-Yan Lam:
MOAI: Module-Optimizing Architecture for Non-Interactive Secure Transformer Inference. 991 - Koji Nuida:
Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction. 992 - Pedro Branco, Giulio Malavolta, Zayd Maradni:
Fully-Homomorphic Encryption from Lattice Isomorphism. 993 - Wilmar Bolaños, Antti Haavikko, Rodrigo Martín Sánchez-Ledesma:
A Fast Multiplication Algorithm and RLWE-PLWE Equivalence for the Maximal Real Subfield of the 2r ps-th Cyclotomic Field. 994 - Benny Applebaum, Eliran Kachlon:
NIZK Amplification via Leakage-Resilient Secure Computation. 995 - Lucas Piske, Jaspal Singh, Ni Trieu, Vladimir Kolesnikov, Vassilis Zikas:
Distance-Aware OT with Application to Fuzzy PSI. 996 - Yanxue Jia, Debajyoti Das, Wenhao Zhang, Aniket Kate:
Kerblam - Anonymous Messaging System Protecting Both Senders and Recipients. 997 - Naman Kumar, Jiayu Xu:
On the UC-(In)Security of PAKE Protocols Without the Random Oracle Model. 998 - Zhengjun Cao, Lihua Liu:
Insecurity of One Ring Signature Scheme with Batch Verification for Applications in VANETs. 999 - Hongxiao Wang, Ron Steinfeld, Markku-Juhani O. Saarinen, Muhammed F. Esgin, Siu-Ming Yiu:
Post-Quantum Multi-Message Public Key Encryption from Extended Reproducible PKE. 1000 - Elizabeth C. Crites, Alistair Stewart:
A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures. 1001 - Alexandr Karenin, Elena Kirshanova, Julian Nowakowski, Eamonn W. Postlethwaite, Fernando Virdia:
Cool + Cruel = Dual. 1002 - Sravya Yandamuri, Nibesh Shrestha, Luca Zanolini, Kartik Nayak:
Low-Latency Dynamically Available Total Order Broadcast. 1003 - Yiming Gao, Yansong Feng, Honggang Hu, Yanbin Pan:
On Factoring and Power Divisor Problems via Rank-3 Lattices and the Second Vector. 1004 - Qinyi Li, Lise Millerjord, Colin Boyd:
TEAKEX: TESLA-Authenticated Group Key Exchange. 1005 - Chun Guo, Kai Hu, Yanhong Fan, Yong Fu, Meiqin Wang:
Adding Feeding Forward Back to the Sponge Construction. 1006 - Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Mingyuan Wang:
Scalable Multiparty Computation from Non-linear Secret Sharing. 1007 - Debajyoti Bera, Santanu Majhi:
Reviving a Grover based Quantum Secret Sharing Scheme. 1008 - Renas Bacho, Sourav Das, Julian Loss, Ling Ren:
Adaptively Secure Three-Round Threshold Schnorr Signatures from DDH. 1009 - Pratima Jana, Ratna Dutta:
UPKE and UKEM Schemes from Supersingular Isogenies. 1010 - Xinyu Mao, Hongxu Yi:
Adaptive TDFs from Injective TDFs. 1011 - Ran Gelles, Christoph Lenzen, Julian Loss, Sravya Yandamuri:
Nearly Optimal Parallel Broadcast in the Plain Public Key Model. 1012 - Vincent Rieder:
Silentium: Implementation of a Pseudorandom Correlation Generator for Beaver Triples. 1013 - George Lu, Brent Waters:
How to Make Any Computational Secret Sharing Scheme Adaptively Secure. 1014 - Benjamin E. Diamond:
Zero-Knowledge Polynomial Commitment in Binary Fields. 1015 - Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak, Sravya Yandamuri:
Leader Election with Poly-logarithmic Communication Per Party. 1016 - Michele Battagliola, Rocco Mora, Paolo Santini:
Using the Schur Product to Solve the Code Equivalence Problem. 1017 - Shekoufeh Neisarian, Elif Bilge Kavun:
MT-TMVP: Modular Tiled TMVP-based Polynomial Multiplication for Post-Quantum Cryptography on FPGAs. 1018 - Margaret Pierce, Saba Eskandarian:
Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions. 1019 - Nico Döttling, Anne Müller, Mahesh Sreekumar Rajasree:
Separating Pseudorandom Codes from Local Oracles. 1020 - Sanjam Garg, Sam Gunn, Mingyuan Wang:
Black-Box Crypto is Useless for Pseudorandom Codes. 1021 - Stefan Dziembowski, Shahriar Ebrahimi, Haniyeh Habibi, Parisa Hassanizadeh, Pardis Toolabi:
Burn Your Vote: Decentralized and Publicly Verifiable Anonymous Voting at Scale. 1022 - Stefan Dziembowski, Shahriar Ebrahimi, Omkar Gavhane, Susil Kumar Mohanty:
Universal Channel Rebalancing: Flexible Coin Shifting in Payment Channel Networks. 1023 - Piotr Mikolajczyk, Parisa Hassanizadeh, Shahriar Ebrahimi:
Towards Trustless Provenance: A Privacy-Preserving Framework for On-chain Media Verification. 1024 - Olive Franzese, Congyu Fang, Radhika Garg, Somesh Jha, Nicolas Papernot, Xiao Wang, Adam Dziedzic:
Secure Noise Sampling for Differentially Private Collaborative Learning. 1025 - Sanjam Garg, Aarushi Goel, Abhishek Jain, Bhaskar Roberts, Sruthi Sekar:
Malicious Security in Collaborative zk-SNARKs: More than Meets the Eye. 1026 - Andrew Huang, Yael Tauman Kalai:
Parallel Repetition for Post-Quantum Arguments. 1027 - Matilda Backendal, David Balbás, Miro Haller:
Group Key Progression: Strong Security for Shared Persistent Data. 1028 - Shuo Peng, Kai Hu, Jiahui He, Meiqin Wang:
Improved Key Recovery Attacks of Ascon. 1029 - Rutchathon Chairattana-Apirom, Nico Döttling, Anna Lysyanskaya, Stefano Tessaro:
Everlasting Anonymous Rate-Limited Tokens. 1030 - Chengcheng Chang, Meiqin Wang, Wei Wang, Kai Hu:
Quasidifferential Saves Infeasible Differential: Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT. 1031 - Junru Li, Yifan Song:
Constant-Round Asynchronous MPC with Optimal Resilience and Linear Communication. 1032 - Liangrong Zhao, Jérémie Decouchant, Joseph K. Liu, Qinghua Lu, Jiangshan Yu:
Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus. 1033 - Liangrong Zhao, Hans Schmiedel, Qi Wang, Jiangshan Yu:
JANUS: Enhancing Asynchronous Common Subset with Trusted Hardware. 1034 - Benedikt Auerbach, Miguel Cueto Noval, Boran Erol, Krzysztof Pietrzak:
Continuous Group-Key Agreement: Concurrent Updates without Pruning. 1035 - Mingyu Gao, Hongren Zheng:
A Critique on Average-Case Noise Analysis in RLWE-Based Homomorphic Encryption. 1036 - Yunqing Sun, Hanlin Liu, Kang Yang, Yu Yu, Xiao Wang, Chenkai Weng:
Committed Vector Oblivious Linear Evaluation and Its Applications. 1037 - Tejas Sharma, Ashish Kundu:
Security of Operations on Random Numbers: A Review. 1038 - Hoeteck Wee, David J. Wu:
Unbounded Distributed Broadcast Encryption and Registered ABE from Succinct LWE. 1039 - Mahdi Soleimani, Grace Jia, Anurag Khandelwal:
Weave: Efficient and Expressive Oblivious Analytics at Scale. 1040 - Linghe Yang, Jian Liu, Jingyi Cui, Guangquan Xu, Yude Bai, Wei Wang:
Rubato: Provably Post-Quantum Secure and Batched Asynchronous Randomness Beacon. 1041 - Calvin Abou Haidar, Quentin Payet, Mehdi Tibouchi:
Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip. 1042 - Alessandro Annechini, Alessandro Barenghi, Gerardo Pelosi, Simone Perriello:
Designing QC-MDPC Public Key Encryption Schemes with Niederreiter's Construction and a Bit Flipping Decoder with Bounded DFR. 1043 - Hien Chu, Khue Do, Lucjan Hanzlik, Sri Aravinda Krishnan Thyagarajan:
When Threshold Meets Anamorphic Signatures: What is Possible and What is Not! 1044 - Nicholas Brandt, Miguel Cueto Noval, Christoph U. Günther, Akin Ünal, Stella Wohnig:
Constrained Verifiable Random Functions Without Obfuscation and Friends. 1045 - Shi Bai, Hansraj Jangir, Elena Kirshanova, Tran Ngo, William Youmans:
A Quasi-polynomial Time Algorithm for the Extrapolated Dihedral Coset Problem over Power-of-Two Moduli. 1046 - Wouter Castryck, Riccardo Invernizzi, Gioella Lorenzon, Jonas Meers, Frederik Vercauteren:
Orient Express: Using Frobenius to Express Oriented Isogenies. 1047 - Stanislav Semenov:
One-way multilinear functions of the second order with linear shifts. 1048 - Rune Fiedler, Felix Günther, Jiaxin Pan, Runzhi Zeng:
XHMQV: Better Efficiency and Stronger Security for Signal's Initial Handshake based on HMQV. 1049 - Christof Beierle, Phil Hebborn, Gregor Leander, Yevhen Perehuda:
Integral Resistance of Block Ciphers with Key Whitening by Modular Addition. 1050 - Anders Lindman:
Synergy: A Lightweight Block Cipher with Variable Bit Rotation Feistel Network. 1051 - Pedro Branco, Matthew Green, Aditya Hegde, Abhishek Jain, Gabriel Kaptchuk:
How to Trace Viral Content in End-to-End Encrypted Messaging. 1052 - Geoffroy Couteau, Carmit Hazay, Aditya Hegde, Naman Kumar:
Breaking the 1/λ-Rate Barrier for Arithmetic Garbling. 1053 - Gennaro Avitabile, Luisa Siniscalchi, Ivan Visconti:
Rewardable Naysayer Proofs. 1054 - Pranav Shriram Arunachalaramanan, Ling Ren:
Single-server Stateful PIR with Verifiability and Balanced Efficiency. 1055 - Haotian Chu, Xiao Wang, Yanxue Jia:
Private Signaling Secure Against Actively Corrupted Servers. 1056 - Wenhao Zhang, Xiao Wang, Chenkai Weng:
Efficient Mixed-Mode Oblivious RAMs. 1057 - Fuyuki Kitagawa, Takahiro Matsuda:
Adaptive TDF from PKE with Randomness Recoverability and Pseudorandom Ciphertext Property. 1058 - Akinori Hosoyamada:
Post-Quantum Security of Keyed Sponge-Based Constructions through a Modular Approach. 1059 - Marshall Ball, Dana Dachman-Soled:
Uniform Black-Box Separations via Non-Malleable Extractors. 1060 - Elizabeth C. Crites, Jonathan Katz, Chelsea Komlo, Stefano Tessaro, Chenzhi Zhu:
On the Adaptive Security of FROST. 1061 - Stefan Dziembowski, Shahriar Ebrahimi, Parisa Hassanizadeh, Susil Kumar Mohanty:
TrafficProof: Privacy-Preserving Reliable Traffic Information Sharing in Social Internet of Vehicles. 1062 - Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Tianwei Zhang, Jin-Song Dong:
MIZAR: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration. 1063 - Lev Stambler:
From Signature-Based Witness Encryption to RAM Obfuscation: Achieving Blockchain-Secured Cryptographic Primitives. 1064 - François Gérard, Morgane Guerreau:
High-Order and Cortex-M4 First-Order Implementations of Masked FrodoKEM. 1065 - Milad Seddigh, Seyed Hamid Baghestani, Mahdi Esfahani:
A New PUF-Based Authenticated Key Establishment Protocol for V2G Networks. 1066 - Megumi Ando, Miranda Christ, Kashvi Gupta, Tal Malkin, Dane Smith:
Full Anonymity in the Asynchronous Setting from Peony Onion Encryption. 1067 - Simon Langowski, Srini Devadas:
Efficient Modular Multiplication Using Vector Instructions on Commodity Hardware. 1068 - Gopal Singh:
PRESENT Full Round Emulation : Structural Flaws and Predictable Outputs. 1069 - JIngyu Liu, Yingjie Xue, Di Wu, Jian Liu, Xuechao Wang:
Zeus: Defending against Fee Stealing and Griefing Attacks in Multi-Hop Payments. 1070 - Aarushi Goel, Peihan Miao, Van Long Phuoc Pham, Satvinder Singh:
PICS: Private Intersection over Committed (and reusable) Sets. 1071 - Mark Zhandry:
How to Model Unitary Oracles. 1072 - Sajjad Alizadeh, Reza Hooshmand:
LAPWN: A Lightweight User-Server Authentication Protocol for Wireless Networks. 1073 - Aarushi Goel, Mingyuan Wang, Zhiheng Wang:
Multiparty Distributed Point Functions. 1074 - Mario Larangeira:
Secure and Practical Cold (and Hot) Staking. 1075 - Anatoliy Zinovyev:
Weight reduction in distributed protocols: new algorithms and analysis. 1076 - Seongkwang Kim, Byeonghak Lee, Mincheol Son:
Shorter VOLE-in-the-Head-based Signatures from Vector Semi-Commitment. 1077 - Delia-Iustina Grigorita:
A Theoretical Perspective on the Formal Verification of IoT Protocols Using LTL and Rewriting Logic in Maude. 1078 - Maiara F. Bollauf, Roberto Parisella, Janno Siim:
Revisiting Discrete Logarithm Reductions. 1079 - Katharina Boudgoust, Oleksandra Lapiha:
Leftover Hash Lemma(s) Over Cyclotomic Rings. 1080 - Zhengyuan Su, Qi Pang, Simon Beyzerov, Wenting Zheng:
FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC. 1081 - Amin Setayesh, Cheran Mahalingam, Emily Chen, Sujaya Maiyya:
Treebeard: A Scalable and Fault Tolerant ORAM Datastore. 1082 - Giulia Gaggero, Elisa Gorla, Daniel Cabarcas:
The complexity of the SupportMinors Modeling for the MinRank Problem. 1083 - Sebastian H. Faller, Julia Hesse:
How to (not) combine Oblivious Pseudorandom Functions. 1084 - Thibauld Feneuil, Matthieu Rivain:
SmallWood: Hash-Based Polynomial Commitments and Zero-Knowledge Arguments for Relatively Small Instances. 1085 - Hao Chung, Elisaweta Masserova, Elaine Shi, Sri Aravinda Krishnan Thyagarajan:
Fairness in the Wild: Secure Atomic Swap with External Incentives. 1086 - Rahul Ilango, Alex Lombardi:
Cryptography meets worst-case complexity: Optimal security and more from iO and worst-case assumptions. 1087 - Kang Hoon Lee, Ji Won Yoon:
Homomorphic Field Trace Revisited : Breaking the Cubic Noise Barrier. 1088 - Nilanjan Datta, Jean Paul Degabriele, Avijit Dutta, Vukasin Karadzic, Hrithik Nandi:
Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security. 1089 - Shuichi Katsumata, Guilhem Niot, Ida Tucker, Thom Wiggers:
Concrete Treatment of Signal Handshake's Deniability: Efficient Post-Quantum Deniable Ring Signature. 1090 - Aws Albarghouthi:
Quantum Computing without the Linear Algebra. 1091 - Pratap Singh, Joshua Gancher, Bryan Parno:
OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries. 1092 - Rutchathon Chairattana-Apirom, Stefano Tessaro:
On the Concrete Security of BBS/BBS+ Signatures. 1093 - Tobias Guggemos, Farzin Renan:
Key Updatable Identity-Based-Signature Schemes. 1094 - Clémence Chevignard, Guilhem Mureau:
Ideally HAWKward: How Not to Break Module-LIP. 1095 - Shutong Jin, Shiyu Shen, Hao Yang, Donglong Chen, Wangchen Dai, Ray C. C. Cheung:
CuFDFB: Fast and Private Computation on Non-Linear Functions Using FHE. 1096 - Roberto La Scala, Sharwan K. Tiwari:
Oracle-Based Multistep Strategy for Solving Polynomial Systems Over Finite Fields and Algebraic Cryptanalysis of the Aradi Cipher. 1097 - Marc Houben:
Isogeny-based key exchange from orientations of large discriminant. 1098 - Victor Youdom Kemmoe, Anna Lysyanskaya, Ngoc Khanh Nguyen:
Lattice-Based Accumulator and Application to Anonymous Credential Revocation. 1099 - Lucjan Hanzlik, Yi-Fu Lai, Marzio Mula, Eugenio Paracucchi, Daniel Slamanig, Gang Tang:
Tanuki: New Frameworks for (Concurrently Secure) Blind Signatures from Post-Quantum Groups Actions. 1100 - Zhengjun Cao, Lihua Liu:
A Note on One Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue. 1101 - Sajin Sasy, Aaron Johnson, Ian Goldberg:
TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System. 1102 - Ran Canetti, Megan Chen:
Universally Composable Succinct Vector Commitments and Applications. 1103 - Robin Geelen, Frederik Vercauteren:
Better GBFV Bootstrapping and Faster Encrypted Edit Distance Computation. 1104 - Alex Shafarenko:
Low-cost anonymous reputation update for IoT applications. 1105 - Karl W. Koch, Dragos Rotaru, Christian Rechberger:
b4M: Holistic Benchmarking for MPC. 1106 - Fatima Elsheimy, Simon Holmgaard Kamp, Julian Loss:
Early Stopping is Cheap. 1107 - James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla:
Laconic PSI on Authenticated Inputs and Applications. 1108 - Alexander Ushakov:
Kahrobaei-Koupparis DSS: universal forgery. 1109 - Assimakis A. Kattis, Brian Klatt, Philip Quirk, Logan Allen:
A Framework for Compiling Custom Languages as Efficiently Verifiable Virtual Machines. 1110 - Hao Guo, Zhaoqian Liu, Ximing Fu, Zhusen Liu:
SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference. 1111 - Nibesh Shrestha, Aniket Kate, Kartik Nayak:
Hydrangea: Optimistic Two-Round Partial Synchrony with One-Third Fault Resilience. 1112 - Dustin Ray, Caroline El Jazmi:
Computational Attestations of Polynomial Integrity Towards Verifiable Back-Propagation. 1113 - Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Yaxi Yang, Qiang Liu:
VCR: Fast Private Set Intersection with Improved VOLE and CRT-Batching. 1114 - Sandro Coretti, Matthias Fitzi, Aggelos Kiayias, Giorgos Panagiotakos, Alexander Russell:
High-Throughput Permissionless Blockchain Consensus under Realistic Network Assumptions. 1115 - Andrew Lewis-Pye, Kartik Nayak, Nibesh Shrestha:
The Pipes Model for Latency Analysis. 1116 - Suyash Bagad, Quang Dao, Yuval Domb, Justin Thaler:
Speeding Up Sum-Check Proving. 1117 - Isaac A. Canales-Martínez, David Santos:
Extracting Some Layers of Deep Neural Networks in the Hard-Label Setting. 1118 - Jan Bormet, Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk:
Strong Secret Sharing with Snitching. 1119 - Oriol Farràs, Miquel Guiot:
Traceable Secret Sharing Schemes for General Access Structures. 1120 - Samuel Dittmer, Rafail Ostrovsky:
1-private n-party AND from 5 random bits. 1121 - Markus Krabbe Larsen, Carsten Schürmann:
An Induction Principle for Hybrid Arguments in Nominal-SSProve. 1122 - Ritam Bhaumik, Avijit Dutta, Akiko Inoue, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro:
Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108. 1123 - Christian Cachin, François-Xavier Wicht:
Toxic Decoys: A Path to Scaling Privacy-Preserving Cryptocurrencies. 1124 - Riddhi Ghosal, Ilan Komargodski, Brent Waters:
Reusable Designated Verifier NIZK from Lossy Trapdoor Functions. 1125 - Eshan Chattopadhyay, Jesse Goodman:
Leakage-Resilient Extractors against Number-on-Forehead Protocols. 1126 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More. 1127 - Qian Lu, Yansong Feng, Yanbin Pan:
Solving LWE with Independent Hints about Secret and Errors. 1128 - Valerio Cini, Russell W. F. Lai, Ivy K. Y. Woo:
Lattice-based Obfuscation from NTRU and Equivocal LWE. 1129 - Takuya Kojima, Masaki Morita, Hideki Takase, Hiroshi Nakamura:
An Open-Source Framework for Efficient Side-Channel Analysis on Cryptographic Implementations. 1130 - Akshit Aggarwal, Pulkit Bharti, Yang Li, Srinibas Swain:
Empowering Privacy: A Zero Cost Protocol for Concealing LGBTQ Search Queries. 1131 - Keitaro Hashimoto, Kyosuke Yamashita, Keisuke Hara:
Foundations of Multi-Designated Verifier Signature: Comprehensive Formalization and New Constructions in Subset Simulation. 1132 - Antoine Bak:
A Note on the Rank Defect Phenomena in The Linearization Attack on Elisabeth-4. 1133 - Sana Boussam, Mathieu Carbone, Benoît Gérard, Guénaël Renault, Gabriel Zaid:
Optimal Dimensionality Reduction using Conditional Variational AutoEncoder. 1134 - Sana Boussam, Ninon Calleja Albillos:
Keep It Unsupervised: Horizontal Attacks Meet Simple Classifiers. 1135 - Shanxiang Lyu, Ling Liu, Cong Ling:
Learning Parity with Quantization: Achieving Full-Rate Encryption by Exploiting Quantization Noise in Code-Based Cryptography. 1136 - Yi Jin, Yuansheng Pan, Xiaoou He, Boru Gong, Jintai Ding:
Security Analysis on UOV Families with Odd Characteristics: Using Symmetric Algebra. 1137 - Thierry Emmanuel Minka Mi Nguidjoi, Flavien Serge Mani Onana, Thomas Ndié Djotio:
ZK-NR: A Layered Cryptographic Architecture for Explainable Non-Repudiation. 1138 - Jovan Komatovic, Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Ertem Nusret Tas:
From Permissioned to Proof-of-Stake Consensus. 1139 - Zhen-Hu Ning:
Unconditionally secure encryption algorithm with unified confidentiality and integrity. 1140 - Zhi Lu, Songfeng Lu:
LZKSA: Lattice-Based Special Zero-Knowledge Proofs for Secure Aggregation's Input Verification. 1141 - Yue Chen, Ling Ren:
OnionPIRv2: Efficient Single-Server PIR. 1142 - Lars Ran:
Wedges, oil, and vinegar - An analysis of UOV in characteristic 2. 1143 - Rick Weber, Ryan Orendorff, Ghada Almashaqbeh, Ravital Solomon:
Parasol Compiler: Pushing the Boundaries of FHE Program Efficiency. 1144 - Callum London, Daniel Gardham, Constantin Catalin Dragan:
Dynamic Group Signatures with Verifier-Local Revocation. 1145 - Zibo Zhou, Zongyang Zhang, Feng Hao, Bowen Zheng, Zulkarnaim Masyhur:
QV-net: Decentralized Self-Tallying Quadratic Voting with Maximal Ballot Secrecy. 1146 - Sanjam Garg, Aarushi Goel, Dimitris Kolonelos, Rohit Sinha:
Jigsaw: Doubly Private Smart Contracts. 1147 - Avik Chakraborti, Mridul Nandi, Suprita Talnikar, Kan Yasuda:
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security. 1148 - Yang Yang, Fangguo Zhang:
An Efficient Encryption Scheme Based on (U+V, U+W) Codes. 1149 - Lorenzo Rovida, Alberto Leporati, Simone Basile:
Lightweight Sorting in Approximate Homomorphic Encryption. 1150 - Vojtech Suchanek, Marek Sýs, Lukasz Chmielewski:
Faster signature verification with 3-dimensional decomposition. 1151 - Haoyu Wei, Jingyu Ke, Ruibang Liu, Guoqiang Li:
ZK-ProVer: Proving Programming Verification in Non-Interactive Zero-Knowledge Proofs. 1152 - William J. Buchanan, Jamie Gilchrist, Zakwan Jaroucheh, Dmitri Timosenko, Nanik Ramchandani, Hisham Ali:
Privacy-aware White and Black List Searching for Fraud Analysis. 1153 - Maria Corte-Real Santos, Jonathan Komada Eriksen, Antonin Leroux, Michael Meyer, Lorenz Panny:
Evaluation of Modular Polynomials from Supersingular Elliptic Curves. 1154 - Andrew Mendelsohn, Charles Grover, Cong Ling:
On the Security of Group Ring Learning with Errors. 1155 - Cameron Foreman, Lewis Wooltorton, Kevin Milner, Florian J. Curchod:
An efficient construction of Raz's two-source randomness extractor with improved parameters. 1156 - Klaus Dohmen, Mandy Lange-Geisler:
General Multi-Prime Multi-Power RSA - A Generalization of RSA and CRT-RSA to Regular Integers Modulo n. 1157 - Robin Linus, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Andrea Pelosi, Orfeas Stefanos Thyfronitis Litos, Christos Stefo, David Tse, Alexei Zamyatin:
Bridging Bitcoin to Second Layers via BitVM2. 1158 - Dan Boneh, Trisha Datta, Rex Fernando, Kamilla Nazirkhanova, Alin Tomescu:
DekartProof: Efficient Vector Range Proofs and Their Applications. 1159 - Francesca Falzon, Harjasleen Malvai, Emanuel Opel:
Black-box Approaches to Authenticated Dictionaries: New Constructions and Lower Bounds. 1160 - Patrick Karl, Francesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Georg Sigl:
High-Performance FPGA Accelerator for the Post-quantum Signature Scheme CROSS. 1161 - Dipayan Saha, Shams Tarek, Hasan Al Shaikh, Khan Thamid Hasan, Pavan Sai Nalluri, Md. Ajoad Hasan, Nashmin Alam, Jingbo Zhou, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi:
SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models. 1162 - Alexander Bienstock, Leo de Castro, Daniel Escudero, Antigoni Polychroniadou, Akira Takahashi:
Efficient, Scalable Threshold ML-DSA Signatures: An MPC Approach. 1163 - Nick Aquina, Simon Rommel, Idelfonso Tafur Monroy:
Man-in-the-Middle and Key Recovery Attacks against QP-KEM. 1164 - Stefan Milius, Dominik Paulus, Dominique Schröder, Lutz Schröder, Julian Thomas:
Automated Analysis and Synthesis of Message Authentication Codes. 1165 - Giacomo Borin, Sofía Celi, Rafaël del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest:
Threshold Signatures Reloaded: ML-DSA and Enhanced Raccoon with Identifiable Aborts. 1166 - Mizuki Hayashi, Keita Emura:
Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester. 1167 - Eunchan Park, Taeung Yoon, Hocheol Nam, Deepak Maram, Min Suk Kang:
On Frontrunning Risks in Batch-Order Fair Systems for Blockchains (Extended Version). 1168 - Oleg Fomenko, Anton Levochko:
Understanding Lasso: A Novel Lookup Argument Protocol. 1169 - Seunghu Kim, Eymen Ünay, Ayse Yilmazer-Metin, Hyung Tae Lee:
Optimized Rank Sort for Encrypted Real Numbers. 1170 - Alberto Leporati, Lorenzo Rovida, Wessel van Woerden:
Beyond LWE: a Lattice Framework for Homomorphic Encryption. 1171 - Yevgeniy Dodis, Bernardo Magri, Noah Stephens-Davidowitz, Yiannis Tselekounis:
Guarding the Signal: Secure Messaging with Reverse Firewalls. 1172 - Akasha Shafiq, Abhishek Kesarwani, Dimitrios Vasilopoulos, Paolo Palmieri:
The Effectiveness of Differential Privacy in Real-world Settings: A Metrics-based Framework to help Practitioners Visualise and Evaluate ε. 1173 - Min Xie, Zhengzhou Tu, Man Ho Au, Junbin Fang, Xuan Wang, Zoe Lin Jiang:
Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership Arguments. 1174 - Victor Shoup:
Simple VESS. 1175 - Wenwen Xia, Geng Wang, Dawu Gu:
Solve Approximate CVP via Variants of Nearest-Colattice. 1176 - Sayan Das, Aarav Varshney, Prasanna Ravi, Anupam Chattopadhyay:
Mind the Gap: Securing QKD Interfaces with Post-Quantum Proxies. 1177 - Ilias Cherkaoui, Ciaran Clarke, Indrakshi Dey:
Engel p-adic Supersingular Isogeny-based Cryptography over Laurent series. 1178 - Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault, Abdul Rahman Taleb:
A Tale of Two Worlds, a Formal Story of WireGuard Hybridization. 1179 - Alexander Bille, Elmar Tischhauser:
Cryptanalysis of HiAE. 1180 - Erkan Uslu, Oguz Yayla:
UOV-Based Verifiable Timed Signature Scheme. 1181 - Peihan Miao, Alice Murphy, Akshayaram Srinivasan, Max Tromanhauser:
Pseudorandom Correlation Generators for Multiparty Beaver Triples over 픽2. 1182 - Bart Mennink, Suprita Talnikar:
PA1 Security on Release of Unverified Plaintext in Encrypt-then-MAC AE Schemes. 1183 - Wenjie Qu, Yijun Sun, Xuanming Liu, Tao Lu, Yanpei Guo, Kai Chen, Jiaheng Zhang:
zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference. 1184 - Tomoyuki Morimae, Yuki Shirakawa, Takashi Yamakawa:
From Worst-Case Hardness of NP to Quantum Cryptography via Quantum Indistinguishability Obfuscation. 1185 - Janis Erdmanis:
Unconditional Individual Verifiability with Receipt Freeness via Post-Cast Isolation. 1186 - Andrija Novakovic, Guillermo Angeris:
Ligerito: A Small and Concretely Fast Polynomial Commitment Scheme. 1187 - Kyungbae Jang, Yujin Oh, Hwajeong Seo:
Depth-Optimized Quantum Implementation of CHAM. 1188 - Wenjv Hu, Yanping Ye, Yin Li:
Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF. 1189 - David Selasi Koblah, Dev M. Mehta, Mohammad Hashemi, Fatemeh Ganji, Domenic Forte:
Towards AI-driven Optimization of Robust Probing Model-compliant Masked Hardware Gadgets Using Evolutionary Algorithms. 1190 - Saimon Ahmed:
A Polynomial Public-Key Cryptosystem Based on Jacobian-Preserving Composition. 1191 - Jian Du, Haohao Qian, Shikun Zhang, Wen-jie Lu, Donghang Lu, Yongchuan Niu, Bo Jiang, Yongjun Zhao, Qiang Yan:
PrivacyGo: Privacy-Preserving Ad Measurement with Multidimensional Intersection. 1192 - Thomas Bellebaum:
Non-Homomorphic Key Blinding from Symmetric Primitives. 1193 - Oleg Fomenko:
Private coins extension with verifiable encryption. 1194 - Vasyl Ustimenko:
On symbolic computations and Post Quantum Cryptography with Lie Geometries. 1195 - Mengda Bi, Chenxin Dai, Yaohua Ma:
Limits on the Power of Private Constrained PRFs. 1196 - Alper Çakan, Vipul Goyal:
How to Copy-Protect All Puncturable Functionalities Without Conjectures: A Unified Solution to Quantum Protection. 1197 - Markku-Juhani O. Saarinen:
Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions. 1198 - Kaibin Li, Yihuai Liang, Zhengchun Zhou, Shui Yu:
HypSCA: A Hyperbolic Embedding Method for Enhanced Side-channel Attack. 1199 - Lawrence Lim, Vikas Kalagi, Divyakant Agrawal, Amr El Abbadi:
Tricycle: Private Transformer Inference with Tricyclic Encodings. 1200 - Shuaishuai Li, Liqiang Peng, Weiran Liu, Cong Zhang, Zhen Gu, Dongdai Lin:
BitBatSPIR: Efficient Batch Symmetric Private Information Retrieval from PSI. 1201 - Dina Hesse, Jakob Feldtkeller, Tim Güneysu, Julius Hermelink, Georg Land, Markus Krausz, Jan Richter-Brockmann:
t-Probing (In-)Security - Pitfalls on Noise Assumptions. 1202 - Xichao Hu, Lin Jiao, Dengguo Feng, Yonglin Hao, Senpeng Wang, Yongqiang Li, Xinxin Gong:
Breaking The Authenticated Encryption scheme HiAE. 1203 - Daniël M. H. van Gent, Wessel P. J. van Woerden:
A search to distinguish reduction for the isomorphism problem on direct sum lattices. 1204 - Hao Lin, Mingqiang Wang, Weiqiang Wen, Shi-Feng Sun, Kaitai Liang:
Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations. 1205 - Ivan Damgård, Shravani Patil, Arpita Patra, Lawrence Roy:
New Upper and Lower Bounds for Perfectly Secure MPC. 1206 - Prabhanjan Ananth, Amit Behera, Zikuan Huang:
Copy-Protection from UPO, Revisited. 1207 - Ya-Nan Li, Yaqing Song, Qiang Tang, Moti Yung:
End-to-End Encrypted Git Services. 1208 - Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing. 1209 - Iván Blanco-Chacón, Raúl Durán Díaz, Rodrigo Martín Sánchez-Ledesma:
A Generalized Approach to Root-based Attacks against PLWE. 1210 - Alexandra Boldyreva, Deep Inder Mohan, Tianxin Tang:
May the Force itnot Be with you: Brute-Force Resistant Biometric Authentication and Key Reconstruction. 1211 - Hayder Tirmazi:
All Proof of Work But No Proof of Play. 1212 - Yi-Fan Tseng, Yi-Jiin Lu, Tien-Lin Tsai, Zi-Yuan Liu:
Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model. 1213 - Christodoulos Pappas, Dimitrios Papadopoulos:
Hobbit: Space-Efficient zkSNARK with Optimal Prover Time. 1214 - Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay:
Highly Scalable Searchable Symmetric Encryption for Boolean Queries from NTRU Lattice Trapdoors. 1215 - Debadrita Talapatra, Nimish Mishra, Debdeep Mukhopadhyay:
Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption. 1216 - Alexandre Adomnicai, Wonseok Choi, Yeongmin Lee, Kazuhiko Minematsu, Yusuke Naito:
Cymric: Short-tailed but Mighty. 1217 - Anisha Mukherjee, Sujoy Sinha Roy:
Revisiting Module Lattice-based Homomorphic Encryption and Application to Secure-MPC. 1218 - Fuyuki Kitagawa, Takashi Yamakawa:
Foundations of Single-Decryptor Encryption. 1219 - Michael Klooß, Russell W. F. Lai, Ngoc Khanh Nguyen, Michal Osadnik:
RoK and Roll - Verifier-Efficient Random Projection for Õ(λ)-size Lattice Arguments. 1220 - Avik Chakraborti, Shibam Ghosh, Takanori Isobe, Sajani Kundu:
EWEMrl: A White-Box Secure Cipher with Longevity. 1221 - Patrik Dobias, Azade Rezaeezade, Lukasz Chmielewski, Lukas Malina, Lejla Batina:
SoK: Reassessing Side-Channel Vulnerabilities and Countermeasures in PQC Implementations. 1222 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
Efficient Pseudorandom Correlation Generators over ℤ/pkℤ. 1223 - Kaushik Nath, Palash Sarkar:
An Update to "Polynomial Hashing over Prime Order Fields". 1224 - Corentin Jeudy, Olivier Sanders:
Lattice EPID with Efficient Revocation. 1225 - Michelle Yeo, Haoqian Zhang:
Rational Censorship Attack: Breaking Blockchain with a Blackboard. 1226 - Orr Dunkelman, Shibam Ghosh:
Improved Key-recovery Attacks on ARADI. 1227 - Christopher Battarbee, Christoph Striecks, Ludovic Perret, Sebastian Ramacher, Kevin Verhaeghe:
Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication. 1228 - Honglin Shao, Yuejun Liu, Mingyao Shao, Yongbin Zhou:
NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage. 1229 - Sven Argo, Marloes Venema, Doreen Riepel, Tim Güneysu, Diego F. Aranha:
ABE Cubed: Advanced Benchmarking Extensions for ABE Squared. 1230 - Jaisal Ahmadullah:
Compressing steganographic payloads with LLM assistance. 1231 - Sébastien Canard, Liam Medley, Duy Nguyen, Duong Hieu Phan:
OMIX: Offline Mixing for Scalable Self-Tallying Elections. 1232 - Shihui Fu:
Improved Constant-Sized Polynomial Commitment Schemes Without Trusted Setup. 1233 - Vivian Fang, Emma Dauterman, Akshay Ravoor, Akshit Dewan, Raluca Ada Popa:
LegoLog: A configurable transparency log. 1234 - Han Chen, Tao Huang, Phuong Pham, Shuang Wu:
HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks. 1235 - Timo Glaser:
Exploring Marginal Guesswork with the Theorem of Berry-Esséen. 1236 - Peter Gutmann, Stephan Neuhaus:
Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog. 1237 - Pantelimon Stanica, Ranit Dutta, Bimal Mandal:
Extended c-differential distinguishers of full 9 and reduced-round Kuznyechik cipher. 1238 - Thomas Pornin:
Improved (Again) Key Pair Generation for Falcon, BAT and Hawk. 1239 - Sven Argo, Marloes Venema, Adrian Ackermann, Tim Güneysu:
pracy: A Practical Compiler for Attribute-Based Encryption in Python. 1240 - Evangelos Karatsiolis, Franziskus Kiefer, Juliane Krämer, Mirjam Loiero, Christian Tobias, Maximiliane Weishäupl:
Public Key Linting for ML-KEM and ML-DSA. 1241 - Orr Dunkelman, Eran Lambooij, Gaëtan Leurent:
Note: Full-round distinguisher for Synergy. 1242 - Steven D. Galbraith, Valerie Gilchrist, Damien Robert:
Improving special cases of the computational isogeny problem. 1243 - Manideep Thotakura:
A New Bijective Pairing Alternative for Encoding Natural Numbers. 1244 - Minjoo Sim, Gyeongju Song, Minwoo Lee, Seyoung Yoon, Anubhab Baksi, Hwajeong Seo:
Integrating and Benchmarking KpqC in TLS/X.509. 1245 - Karim Baghery, Navid Ghaedi Bardeh, Shahram Khazaei, Mahdi Rahimi:
On Round-Optimal Computational VSS. 1246 - Antoine Gansel, Juliane Krämer, Tim Schumacher, Patrick Struck, Maximilian Tippmann, Thomas Walther:
Field-Tested Authentication for Quantum Key Distribution and DoS Attacks. 1247 - Qianmei Wu, Sayandeep Saha, Wei Cheng, Fan Zhang, Shivam Bhasin:
Beyond Side-Channels: Evaluating Inner Product Masking Against SIFA. 1248 - Debasmita Chakraborty, Soumya Sahoo, Phuong Hoa Nguyen, Santanu Sarkar:
An Automated Model to Search For Differential Meet-In-The-Middle Attack: Applications to AndRX Ciphers. 1249 - Elena Dubrova, Sönke Jendral, Yanning Ji, Ruize Wang:
The Weighted Sum Correlation Analysis. 1250 - Suvadeep Hajra, Debdeep Mukhopadhyay:
Black Box to Blueprint: Visualizing Leakage Propagation in Deep Learning Models for SCA. 1251 - Tamer Mour, Alon Rosen, Ron Rothblum:
Tree PCPs. 1252 - Weikeng Chen:
BitVM with Succinct On-Chain Cost from AB-LFE, HMAC, or Privacy-Free GC. 1253 - Dan Boneh, Evan Laufer, Ertem Nusret Tas:
Batch Decryption without Epochs and its Application to Encrypted Mempools. 1254 - Intak Hwang, Shinwon Lee, Seonhong Min, Yongsoo Song:
Efficient Full Domain Functional Bootstrapping from Recursive LUT Decomposition. 1255 - Ye Xu, Takashi Nishide:
Lattice-based Multi-key Homomorphic Signatures Forward-unforgeable against Signing Key Leakage. 1256 - Tolun Tosun, Elisabeth Oswald, Erkay Savas:
Non-Profiled Higher-Order Side-Channel Attacks against Lattice-Based Post-Quantum Cryptography. 1257 - Sandro Coretti, Pooya Farshim, Patrick Harasser, Karl Southern:
Multi-Source Randomness Extraction and Generation in the Random-Oracle Model. 1258 - Marcel Nageler, Lorenz Schmid, Maria Eichlseder:
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519. 1259 - Robert Merget, Nurullah Erinola, Marcel Maehren, Lukas Knittel, Sven Hebrok, Marcus Brinkmann, Juraj Somorovsky, Jörg Schwenk:
Opossum Attack: Application Layer Desynchronization using Opportunistic TLS. 1260 - Diego F. Aranha, Johan Degn, Jonathan Eilath, Kent Nielsen, Peter Scholl:
FAEST for Memory-Constrained Devices with Side-Channel Protections. 1261 - Kaushik Nath, Palash Sarkar:
Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields. 1262 - Haseeb Ahmed, Nachiket Rao, Abdelkarim Kati, Florian Kerschbaum, Sujaya Maiyya:
OasisDB: An Oblivious and Scalable System for Relational Data. 1263 - Fuyuki Kitagawa, Takashi Yamakawa:
Copy Protecting Cryptographic Functionalities over Entropic Inputs. 1264 - Christina Boura, Patrick Derbez, Baptiste Germon, Rachelle Heim Boissier, María Naya-Plasencia:
A note on a recent attack against SPEEDY-7-192. 1265 - Tom Godden, Ruben de Smet, Kris Steenhaut, An Braeken:
Efficiently parsing existing eID documents for zero-knowledge proofs. 1266 - Xander Pottier, Jan-Pieter D'Anvers, Thomas de Ruijter, Ingrid Verbauwhede:
SMOOTHIE: (Multi-)Scalar Multiplication Optimizations On TFHE. 1267 - Sayon Duttagupta, Arman Kolozyan, Georgio Nicolas, Bart Preneel, Dave Singelée:
What's the Matter? An In-Depth Security Analysis of the Matter Protocol. 1268 - Noor Athamnah, Noga Ron-Zewi, Ron D. Rothblum:
Linear Prover IOPs in Log Star Rounds. 1269 - Nathan Maillet, Cyrius Nugier, Vincent Migliore, Jean-Christophe Deneuville:
Key Recovery from Side-Channel Power Analysis Attacks on Non-SIMD HQC Decryption. 1270 - Yusuf Ozmis:
Applications Of Zero-Knowledge Proofs On Bitcoin. 1271 - Karthik Garimella, Austin Ebel, Brandon Reagen:
EinHops: Einsum Notation for Expressive Homomorphic Operations on RNS-CKKS Tensors. 1272 - Ahmet Ramazan Agirtas, Emircan Çelik, Oguz Yayla:
Threshold Structure-Preserving Signatures with Randomizable Key. 1273 - Seunghu Kim, Seongbong Choi, Hyung Tae Lee:
Improved Matrix Inversion with Packed Ciphertexts using Fully Homomorphic Encryption. 1274 - Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Elena Micheli, Maximilian Orlt, Pajam Pauls, Kathrin Wirschem, Liang Zhao:
Improving the Fault Robustness of Polynomial Masking. 1275 - Suvradip Chakraborty, James Hulett, Dakshita Khurana:
On Weak NIZKs, One-way Functions and Amplification. 1276 - Pierre Civit, Daniel Collins, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Manuel Vidigueira, Pouriya Zarbafian:
Scalable Accountable Byzantine Agreement and Beyond. 1277 - Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel:
In the Vault, But Not Safe: Exploring the Threat of Covert Password Manager Providers. 1278 - George Lu, Brent Waters, David J. Wu:
Multi-Authority Registered Attribute-Based Encryption. 1279 - Kanwal Batool, Saleem Anwar, Zoltán Ádám Mann:
SecFePAS: Secure Facial-Expression-Based Pain Assessment with Deep Learning at the Edge. 1280 - Mengce Zheng, Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques. 1281 - Mengce Zheng, Abderrahmane Nitaj:
A Novel Partial Key Exposure Attack on Common Prime RSA. 1282 - Hao Cheng, Georgios Fotiadis, Johann Großschädl, Daniel Page:
Fast AVX-512 Implementation of the Optimal Ate Pairing on BLS12-381. 1283 - Tianrui Wang, Anyu Wang, Kang Yang, Hanlin Liu, Yu Yu, Jun Zhang, Xiaoyun Wang:
A Hybrid Algorithm for the Regular Syndrome Decoding Problem. 1284 - Hua Xu, Mariana Gama, Emad Heydari Beni, Jiayi Kang:
FRIttata: Distributed Proof Generation of FRI-based SNARKs. 1285 - Zvika Brakerski, Nir Magrafta, Tomer Solomon:
State-Based Classical Shadows. 1286 - Felix Uhle, Nicolai Müller, Amir Moradi:
Fault Injection Evaluation with Statistical Analysis - How to Deal with Nearly Fabricated Large Circuits. 1287 - Heming Liao, Jiangxia Ge, Shujiao Cao, Rui Xue:
New Proof for Plain OAEP: Post-Quantum Security without Parameter Restrictions or Collision-Resistance. 1288 - Yufan Jiang, Maryam Zarezadeh, Tianxiang Dai, Stefan Köpsell:
AlphaFL: Secure Aggregation with Malicious2 Security for Federated Learning against Dishonest Majority. 1289 - Oriol Farràs, Vincent Grosso, Miquel Guiot, Carlos Andres Lara-Nino:
Improving the Selection Rule of Correlation Attacks for Remote Power Analysis. 1290 - Ariel Futoransky, Gabriel Larotonda, Fadi Barbàra:
A note on the security of the BitVM3 garbling scheme. 1291 - Anmoal Porwal, Antonia Wachter-Zeh, Pierre Loidreau:
Improved Key Attack on the MinRank Encryption Scheme based on Matrix Codes. 1292 - Vojtech Suchanek, Jan Jancar, Jan Kvapil, Petr Svenda, Lukasz Chmielewski:
ECTester: Reverse-engineering side-channel countermeasures of ECC implementations. 1293 - Jieyi Long:
Interstellar: GKR Protocol based Low Prover Cost Folding Scheme for Circuit Satisfiability. 1294 - Eda Kirimli, Chloe Martindale:
The computational refined Humbert invariant problem is equivalent to the computational isogeny problem. 1295 - Rahul Ilango:
Gödel in Cryptography: Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup, and Perfect Soundness. 1296 - Takeshi Yoshida, Keita Emura:
On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. 1297 - Jung Hee Cheon, Jihwan Kim, Yongdong Yeo:
OverModRaise: Reducing Modulus Consumption of CKKS Bootstrapping. 1298 - Décio Luiz Gazzoni Filho, Gora Adj, Slim Bettaieb, Alessandro Budroni, Jorge Chávez-Saab, Francisco Rodríguez-Henríquez:
Sota Voce: Low-Noise Sampling of Sparse Fixed-Weight Vectors. 1299 - Pierre Daix-Moreux, Chengru Zhang:
PlasmaFold: An Efficient and Scalable Layer 2 with Client-Side Proving. 1300 - Jules Dumezy, Andreea Alexandru, Yuriy Polyakov, Pierre-Emmanuel Clet, Olive Chakraborty, Aymen Boudguiga:
Evaluating Larger Lookup Tables using CKKS. 1301 - Janis Adamek, Aikata Aikata, Ahmad Al Badawi, Andreea Alexandru, Armen Arakelov, Philipp Binfet, Victor Correa, Jules Dumezy, Sergey Gomenyuk, Valentina Kononova, Dmitrii Lekomtsev, Vivian Maloney, Chi-Hieu Nguyen, Yuriy Polyakov, Daria Pianykh, Hayim Shaul, Moritz Schulze Darup, Dieter Teichrib, Dmitry Tronin, Gurgen Arakelov:
FHERMA Cookbook: FHE Components for Privacy-Preserving Applications. 1302 - Hugo Beeloo-Sauerbier Couvée, Antonia Wachter-Zeh, Violetta Weger:
Bumpy RYDE: A New Hybrid Technique for Generic Rank-Metric Decoders. 1303 - Anders Lindman:
Cascader: A Recurrence-Based Key Exchange Protocol. 1304 - Keewoo Lee:
Barely Doubly-Efficient SimplePIR. 1305 - Yufei Yuan, Haiyi Xu, Lei Zhang, Wenling Wu:
Rethinking Learning-based Symmetric Cryptanalysis: a Theoretical Perspective. 1306 - Tim Ruffing:
The Post-Quantum Security of Bitcoin's Taproot as a Commitment Scheme. 1307 - Elie Eid, Aurélien Greuet, Nathan Reboud, Rina Zeitoun:
Efficient High-Order Masking of FrodoKEM's CDT-Based Gaussian Sampler. 1308 - Sengim Karayalcin, Marina Krcek, Stjepan Picek:
SoK: Deep Learning-based Side-channel Analysis Trends and Challenges. 1309 - El Hadji Mamadou Dia, Walid Arabi, Anis Bkakria, Reda Yaich:
A Comprehensive Survey of Privacy-Preserving Decision Trees Based on Homomorphic Encryption. 1310 - Dimitri Koshelev, Youssef El Housni, Georgios Fotiadis:
Batch subgroup membership testing on pairing-friendly curves. 1311 - Gökçe Düzyol, Muhammed Said Gündogan, Atakan Arslan:
Can FrodoKEM Run in a Millisecond? FPGA Says Yes! 1312 - Shuaishuai Li, Anyu Wang, Cong Zhang, Xiaoyun Wang:
Two-Server Sublinear PIR with Symmetric Privacy and Statistical Security. 1313 - Jianhua Wang, Tao Huang, Guang Zeng, Tianyou Ding, Shuang Wu, Siwei Sun:
THF: Designing Low-Latency Tweakable Block Ciphers. 1314 - Yuntian Chen, Zhanyong Tang, Tianpei Lu, Bingsheng Zhang, Zhiying Shi, Zhiyuan Ning:
CostSphere: A Cost Model-Driven Privacy-Preserving Machine Learning Framework with Network Context Adaptation. 1315 - Julien Béguinot, Olivier Rioul, Loïc Masure, François-Xavier Standaert, Wei Cheng, Sylvain Guilley:
Scalable Information Theoretic Evaluation of the Rank Statistics in Side-Channel Attacks. 1316 - Shokofeh VahidianSadegh, Alberto Ibarrondo, Lena Wiese:
FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church Algorithm (Extended Version). 1317 - Yuval Efron, Ling Ren:
Lifeline: Optimal Byzantine Agreement Under Minimal Synchrony. 1318 - Edward Chen, Fraser Brown, Wenting Zheng:
Bridging Usability and Performance: A Tensor Compiler for Autovectorizing Homomorphic Encryption. 1319 - Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
Picking up the Fallen Mask: Breaking and Fixing the RS-Mask Countermeasure. 1320 - Thi Van Thao Doan, Olivier Pereira, Thomas Peters:
Threshold Receipt-Free Voting with Server-Side Vote Validation. 1321 - Félix Carvalho Rodrigues, Décio Luiz Gazzoni Filho, Gora Adj, Isaac Andrés Canales Martinez, Jorge Chávez-Saab, Julio López, Michael Scott, Francisco Rodríguez-Henríquez:
Generation of Fast Finite Field Arithmetic for Cortex-M4 with ECDH and SQIsign Applications. 1322 - Binyi Chen, Noel Elias, David J. Wu:
Pairing-Based Batch Arguments for NP with a Linear-Size CRS. 1323 - Ahmet Malal, Cihangir Tezcan:
FPGA-Friendly Compact and Efficient AES-like 8x8 S-Box. 1324 - Liam Eagen, Ariel Gabizon:
Revisiting the IPA-sumcheck connection. 1325 - Itai Dinur:
New Techniques for Analyzing Differentials with Application to AES. 1326 - Ananya Appan, David Heath, Ling Ren:
Randomized Agreement, Verifiable Secret Sharing and Multi-Party Computation in Granular Synchrony. 1327 - Foo Yee Yeo, Jason H. M. Ying:
Private Set Intersection and other Set Operations in the Third Party Setting. 1328 - Alessio Caminata, Elisa Gorla, Madison Mabe, Martina Vigorito, Irene Villa:
Cryptanalysis of a multivariate CCZ scheme. 1329 - Jiahui He, Kai Hu, Guowei Liu:
Exploring Core Monomial Prediction Further: Weak-Key Superpoly Recovery for 852-Round Trivium. 1330 - Daniel Lammers, Nicolai Müller, Siemen Dhooghe, Amir Moradi:
Constant-Cycle Hardware Private Circuits. 1331 - Justin Drake, Dmitry Khovratovich, Mikhail A. Kudinov, Benedikt Wagner:
Technical Note: LeanSig for Post-Quantum Ethereum. 1332 - Zachary A Kissel:
Policy-Based Redactable Set Signatures. 1333 - Lucas C. Cardoso, Marcos A. Simplício Jr.:
On the use of ECDSA with hierarchical public key delegation in identity-based scenarios. 1334 - Farzin Renan:
A Compact Post-quantum Strong Designated Verifier Signature Scheme from Isogenies. 1335 - Tung Chou:
Representations of Elementary Vectors in VOLE-in-the-head-based Schemes. 1336 - Nikita Snetkov, Jelizaveta Vakarjuk, Peeter Laud:
sfElectrum: UC Fail-Stop Server-Supported Signatures. 1337 - Roman Langrehr:
Limits on the Power of Constrained PRFs and Identity-based Cryptography. 1338 - Debasmita Chakraborty, Hosein Hadipour, Anup Kumar Kundu, Mostafizar Rahman, Prathamesh Ram, Yu Sasaki, Dilip Sau, Aman Sinha:
Breaking the Twinkle Authenticated Encryption Scheme and Analyzing Its Underlying Permutation. 1339 - Ashrujit Ghoshal, Mingxun Zhou, Bo Peng, Elaine Shi:
Zelda: Efficient Multi-server Preprocessing PIR with Unconditional Security. 1340 - Pierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone:
Practical Attack on All Parameters of the HPPC Signature Scheme. 1341 - Ke Ma, Jiabo Wang, Shanxiang Lyu, Junzuo Lai, Zsolt Lángi:
Simultaneous Diophantine Approximation for Compact Discrete Gaussian Sampling. 1342 - Jelle Vos, Stanislaw Jarecki, Christopher A. Wood, Cathie Yun, Steve Myers, Yannick Sierra:
A Hybrid Asymmetric Password-Authenticated Key Exchange in the Random Oracle Model. 1343 - Guillaume Goy, Maxime Spyropoulos, Nicolas Aragon, Philippe Gaborit, Renaud Pacalet, Fabrice Perion, Laurent Sauvage, David Vigilant:
Side-Channel Sensitivity Analysis on HQC: Towards a Fully Masked Implementation. 1344 - Brandon Goodell, Rigo Salazar, Freeman Slaughter, Luke Szramowski:
SLVer Bullet: Straight-Line Verification for Bulletproofs. 1345 - Antoine Bak, Shibam Ghosh, Fukang Liu, Jianqiang Ni, Willi Meier, Léo Perrin:
Cryptanalysis of TFHE-friendly Cipher FRAST. 1346 - Sébastien Canard, Nathan Papon, Duong Hieu Phan:
Public Traceability in Threshold Decryption. 1347 - Thierry Emmanuel Minka Mi Nguidjoi, Flavien Serge Mani Onana, Thomas Ndié Djotio:
The CRO Trilemma : a formal incompatibility between Confidentiality, Reliability and legal Opposability in Post-Quantum proof systems. 1348 - Yuanzhuo Yu, Mengling Liu, Yuncong Zhang, Shifeng Sun, Tianyi Ma, Man Ho Au, Dawu Gu:
HyperFond: A Transparent and Post-Quantum Distributed SNARK with Polylogarithmic Communication. 1349 - Zhongxiang Zheng, Anyu Wang, Chunhuan Zhao, Guangwu Xu, Zhengtao Jiang, Sibo Feng, Zhichen Yan, Shuang Sun, Xiaoyun Wang:
Rhyme: A Fiat-Shamir Lattice-based Signature with 3C Sampling. 1350 - Lili Tang, Yao Sun, Xiaorui Gong:
Revisiting the Generalized Birthday Problem and Equihash: Single or K Lists? 1351 - Rasoul Akhavan Mahdavi, Sarvar Patel, Joon Young Seo, Kevin Yeo:
InsPIRe: Communication-Efficient PIR with Silent Preprocessing. 1352 - Bruno M. F. Ricardo, Lucas C. Cardoso, Leonardo T. Kimura, Paulo S. L. M. Barreto, Marcos A. Simplício Jr.:
Introducing two ROS attack variants: breaking one-more unforgeability of BZ blind signatures. 1353 - Weihan Li, Zongyang Zhang, Sherman S. M. Chow, Yanpei Guo, Boyuan Gao, Xuyang Song, Yi Deng, Jianwei Liu:
Shred-to-Shine Metamorphosis in Polynomial Commitment Evolution. 1354 - Soumik Ghosh, Sathyawageeswar Subramanian, Wei Zhan:
Unconditional Pseudorandomness against Shallow Quantum Circuits. 1355 - Yuto Imura, Keita Emura:
Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption. 1356 - Alper Çakan, Vipul Goyal:
How to Copy-Protect Malleable-Puncturable Cryptographic Functionalities Under Arbitrary Challenge Distributions. 1357 - Feng Zhou, Hua Chen, Limin Fan, Junhuai Yang:
Domain-Oriented Masking Revisited: More Efficient AES Implementations with Arbitrary Protection Order. 1358 - Décio Luiz Gazzoni Filho, Rafael G. Flores e Silva, Alessandro Budroni, Marco Palumbi, Gora Adj:
Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU. 1359 - Mojtaba Rfiee:
Towards more secure constructions of private set operation schemes. 1360 - Sebastiano Boscardin, Sebastian A. Spindler:
Exploring Kaneko's bound: On multi-edges, loops and the diameter of the supersingular ℓ-isogeny graph. 1361 - Daniel Smith-Tone, Cristian Valenzuela:
Cryptanalysis of the best HFE-LL' Constructions. 1362 - Paul Gerhart, Daniel Rausch, Dominique Schröder:
Universally Composable Adaptor Signatures. 1363 - Sanjam Garg, Mohammad Hajiabadi, Dimitris Kolonelos, Abhiram Kothapalli, Guru-Vamsi Policharla:
A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications. 1364 - Wenxuan Zeng, Tianshi Xu, Yi Chen, Yifan Zhou, Mingzhe Zhang, Jin Tan, Cheng Hong, Meng Li:
Towards Efficient Privacy-Preserving Machine Learning: A Systematic Review from Protocol, Model, and System Perspectives. 1365 - Zachary DeStefano, Jeff J. Ma, Joseph Bonneau, Michael Walfish:
NOPE: Strengthening domain authentication with succinct proofs. 1366 - Hannah Mahon, Shane Kosieradzki:
Encrypted Matrix Multiplication Using 3-Dimensional Rotations. 1367 - Foteini Baldimtsi, Konstantinos Chalkias, Arnab Roy:
Post-Quantum Readiness in EdDSA Chains. 1368 - Mohammad Vaziri, Vesselin Velichkov:
Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences (Full Version). 1369 - Onur Günlü:
Randomized Distributed Function Computation (RDFC): Ultra-Efficient Semantic Communication Applications to Privacy. 1370 - Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
Securing Credential Sequence Verification. 1371 - Bruno Woltzenlogel Paleo, Luca D'Angelo, Mohammad Shaheer, Giselle Reis:
Gluon W: A Cryptocurrency Stabilization Protocol. 1372 - Mladen Kovacevic, Tatjana Grbic, Darko Capko, Nemanja Nedic, Srdan Vukmirovic:
A Zero-Knowledge Proof for the Syndrome Decoding Problem in the Lee Metric. 1373 - Lourenço Abecasis, Paulo Mateus, Chrysoula Vlachou:
An Attack to Universally Composable Commitments from Malicious Physically Uncloneable Functions and how to Avoid it. 1374 - Danai Balla, Pyrros Chaidos:
On the (strong) linkability of Linkable Ring Signatures. 1375 - Franciele C. Silva, Maja Lie, Cong Ling:
On Hull Attacks on the Module Lattice Isomorphism Problem. 1376 - Huu Ngoc Duc Nguyen, Shujie Cui, Shangqi Lai, Tsz Hon Yuen, Joseph K. Liu:
More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression. 1377 - Wei Qi:
Tight Lower Bound on Witness Update Frequency in Additive Positive Accumulators. 1378 - David Perez, Sengim Karayalcin, Stjepan Picek, Servio Paguada:
Enhancing Scale and Shift Invariance in Deep Learning-based Side-channel Attacks through Equivariant Convolutional Neural Networks. 1379 - Thierry Emmanuel Minka Mi Nguidjoi, Flavien Serge Mani Onana, Thomas Ndié Djotio, Thomas Bouétou Bouétou:
Quantum Composable and Contextual Security Infrastructure (Q2CSI) : A Modular Architecture for Legally Explainable Cryptographic Signatures. 1380 - Guang Yang, Peter Trinh, Alma Nkemla, Amuru Serikyaku, Edward Tatchim, Osman Sharaf:
Blockchain-Based Decentralized Domain Name System. 1381 - Andrea Basso, Joppe W. Bos, Jan-Pieter D'Anvers, Angshuman Karmakar, Jose Maria Bermudo Mera, Joost Renes, Sujoy Sinha Roy, Frederik Vercauteren, Peng Wang, Yuewu Wang, Shicong Zhang, Chenxin Zhong:
Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms. 1382 - Animesh Singh, Ayantika Chatterjee, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization. 1383 - Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner:
Silent Threshold Encryption with One-Shot Adaptive Security. 1384 - Pengxu Zhu, Lei Wang:
Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage. 1385 - Ian McQuoid, Mike Rosulek, Jiayu Xu:
How to Tolerate Typos in Strong Asymmetric PAKE. 1386 - Senegue Gomez Nyamsi, Emmanuel Fouotsa, Calvin Tcheka:
Fast Final Exponentiation on BW and BLS Curves with Even Embedding Degrees at 128 bits security. 1387 - Zhiyong Fang, Sanjam Garg, Bhaskar Roberts, Wenxuan Wu, Yupeng Zhang:
Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size. 1388 - Joshua Luberisse:
Verification Cost Asymmetry in Cognitive Warfare: A Complexity-Theoretic Framework. 1389 - Mehdi Beriane, Muhammed Ali Bingöl:
Optimizing Backend Verification in zk-Rollup Architectures. 1390 - Mikhail Suslov:
Inverse Discrete Logarithm - Post-Quantum take on a classical problem. 1391 - Sergio Demian Lerner, Ariel Futoransky:
FLEX - Capital-Efficient Optimistic Bridges with On-Demand Security Bonds for Bitcoin. 1392 - Michael Schaller:
Polynomial Lattices for the BIKE Cryptosystem. 1393 - Gilad Asharov, Anirudh Chandramouli, Ran Cohen, Yuval Ishai:
Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries. 1394 - Dariush Abbasinezhad-Mood:
A Security Comment on "A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid". 1395 - George Teseleanu:
A Generalized Wiener-type Attack Against a Family RSA-like Cryptosystem. 1396 - Deirdre Connolly, Kathrin Hövelmanns, Andreas Hülsing, Stavros Kousidis, Matthias Meijers:
Starfighters - on the general applicability of X-Wing. 1397 - Halil Ibrahim Kaplan:
General Review of Hash-Based Signatures. 1398 - Afonso Arriaga, Manuel Barbosa, Stanislaw Jarecki:
Tempo: ML-KEM to PAKE Compiler Resilient to Timing Attacks. 1399 - Maxim Orlovsky:
RGB I.0: Scalable consensus for client-side validated smart contracts. 1400 - Mohammad Vaziri:
Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory Complexity (Full Version). 1401 - Freja Elbro, Violetta Weger:
Can we Speed up Information Set Decoding by Using Extension Field Structure? 1402 - Lianglin Yan, Pengfei Zeng, Peizhe Song, Mingsheng Wang:
Faster Bootstrapping for CKKS with Less Modulus Consumption. 1403 - Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen:
Optimistic Message Dissemination. 1404 - Michele Ciampi, Yun Lu, Rafail Ostrovsky, Vassilis Zikas:
Two-Tier Black-box Blockchains and Application to Instant Layer-1 Payments. 1405 - Yifan Song, Xiaxi Ye:
Scalable Secure Multiparty Computation with Perfect Security from Preprocessing. 1406 - Florian Krieger, Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy:
A Flexible Hardware Design Tool for Fast Fourier and Number-Theoretic Transformation Architectures. 1407 - Vincenzo Botta, Simone Bottoni, Matteo Campanelli, Emanuele Ragnoli, Alberto Trombetta:
qedb: Expressive and Modular Verifiable Databases (without SNARKs). 1408 - Sofiane Azogagh, Zelma Aubin Birba, Sébastien Gambs, Marc-Olivier Killijian:
Oblivious (Un)Learning of Extremely Randomized Trees. 1409 - Mirza Ahad Baig, Christoph U. Günther, Krzysztof Pietrzak:
Nakamoto Consensus from Multiple Resources. 1410 - Yalan Wang, Bryan Kumara, Harsh Kasyap, Liqun Chen, Sumanta Sarkar, Christopher J. P. Newton, Carsten Maple, Ugur-Ilker Atmaca:
BACON: An Improved Vector Commitment Construction with Applications to Signatures. 1411 - Yalan Wang, Liqun Chen, Yangguang Tian, Long Meng, Christopher J. P. Newton:
AVPEU: Anonymous Verifiable Presentations with Extended Usability. 1412 - Matteo Campanelli, Dario Fiore, Mahak Pancholi:
When Can We Incrementally Prove Computations of Arbitrary Depth? 1413 - Dan Boneh, Joachim Neu, Valeria Nikolaenko, Aditi Partap:
Data Availability Sampling with Repair. 1414 - Seyoung Yoon, Gyeongju Song, Kyungbae Jang, Sangmin Cha, Hwajeong Seo:
Quantum Implementation of SHA-1. 1415 - Juliane Krämer, Patrick Struck, Maximiliane Weishäupl:
A Note on the Binding Properties of KEM Combiners. 1416 - Joshua Limbrey, Andrew Mendelsohn:
A Note on the Post-Quantum Security of the Inverse Discrete Logarithm Problem. 1417 - Nick Aquina, Simon Rommel, Idelfonso Tafur Monroy:
Note: Shared Key Recovery Attack on Cascader Key Exchange Protocol. 1418 - Jan Bormet, Arka Rai Choudhuri, Sebastian Faust, Sanjam Garg, Hussien Othman, Guru-Vamsi Policharla, Ziyan Qu, Mingyuan Wang:
BEAST-MEV: Batched Threshold Encryption with Silent Setup for MEV prevention. 1419 - Sebastian Angel, Sofía Celi, Elizabeth Margolin, Pratyush Mishra, Martin Sander, Jess Woods:
Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs. 1420 - Divesh Aggarwal, Pranjal Dutta, Saswata Mukherjee, Satyajeet Nagargoje, Maciej Obremski:
Efficient randomized strong 2-source non-malleable extractor for any linear min-entropy. 1421 - Thierry Emmanuel Minka Mi Nguidjoi, Flavien Serge Mani Onana, Thomas Ndié Djotio, Atsa Etoundi Roger:
Design ZK-NR: A Post-Quantum Layered Protocol for Legally Explainable Zero-Knowledge Non-Repudiation Attestation. 1422 - Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak:
Collusion-Safe Proxy Re-Encryption. 1423 - Luke Beckwith, Andre Esser, Edoardo Persichetti, Paolo Santini, Floyd Zweydinger:
LESS is Even More: Optimizing Digital Signatures from Code Equivalence. 1424 - Jiping Yu, Kun Chen, Xiaoyu Fan, Yunyi Chen, Xiaowei Zhu, Wenguang Chen:
Lodia: Towards Optimal Sparse Matrix-Vector Multiplication for Batched Fully Homomorphic Encryption. 1425 - Simone Colombo, Damian Vizár:
(Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks and Key Exfiltration. 1426 - Jintong Yu, Yuxuan Wang, Shipei Qu, Yubo Zhao, Yipeng Shi, Pei Cao, Xiangjun Lu, Chi Zhang, Dawu Gu, Cheng Hong:
End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces. 1427 - Zhuo Cai:
Strategic Mining in Proof-of-Stake with Practical Random Election. 1428 - Liheng Ji, Yilei Chen:
Public-Key Encryption and Injective Trapdoor Functions from LWE with Large Noise Rate. 1429 - Huina Li, Le He, Weidong Qiu:
Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode. 1430 - Sven Argo, Henk Corporaal, Alejandro Garza, Marc Geilen, Manil Dev Gomony, Tim Güneysu, Adrian Marotzke, Fouwad Jamil Mir, Christian Larmann, Jan Richter-Brockmann, Jeffrey Smith, Mottaqiallah Taouil, Said Hamdioui:
Multi-Partner Project: Securing Future Edge-AI Processors in Practice (CONVOLVE). 1431 - Theophilus Agama:
Brauer and certain class of Hansen chain are closed addition chains. 1432 - Ruben Baecker, Paul Gerhart, Daniel Rausch, Dominique Schröder:
A Fully-Adaptive Threshold Partially-Oblivious PRF. 1433 - Manuel B. Santos, Dimitris Mouris, Xiang Xie, Miguel de Vega, Andrei Lapets:
TLShare: Private Authenticated MPC and FHE Inputs Over TLS. 1434 - Alessio Meneghetti, Federica Zanetti:
Weak Keys in QC-MDPC-based cryptosystems via the Extended Euclidean Algorithm. 1435 - Michele Battagliola, Laura Mattiuz, Alessio Meneghetti:
VOLE-in-the-Head Signatures Based on the Linear Code Equivalence Problem. 1436 - Daniel Collins, Paul Rösler:
GURKE: Group Unidirectional Ratcheted Key Exchange. 1437 - Shanuja Sasi, Asaf Cohen, Onur Günlü:
Secure Protocols for Best Arm Identification Using Secret Sharing Schemes. 1438 - Malte Andersch, Cezary Pilaszewicz, Marian Margraf:
A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups. 1439 - Jaehyung Kim:
Faster Homomorphic Integer Computer. 1440 - Yu Zhang, Zongbin Wang:
DIMSEPP: A Decentralized Identity Management System with Enhanced Privacy Protection. 1441 - Nir Bitansky, Saroja Erabelli, Rachit Garg, Yuval Ishai:
Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions. 1442 - Emanuele Bellini, Rocco Brunelli, David Gérault, Anna Hambitzer, Marco Pedicini:
Generic Partial Decryption as Feature Engineering for Neural Distinguishers. 1443 - Gorjan Alagic, Fahran Bajaj, Aybars Kocoglu:
The Best of Both KEMs: Securely Combining KEMs in Post-Quantum Hybrid Schemes. 1444 - Mojtaba Rfiee, Mehdi Abri:
Forgery Attack on a Secure Data Sharing for Industrial IoT. 1445 - Giacomo Fenzi, Yuwen Zhang:
zip: Reducing Proof Sizes for Hash-Based SNARGs. 1446 - Tianpei Lu, Bingsheng Zhang, Hao Li, Kui Ren:
A New Paradigm for Privacy-Preserving Decision Tree Evaluation. 1447 - Cong Ling, Andrew Mendelsohn, Christian Porter:
Number Field Algorithms for Quaternion Ideal-SVP. 1448 - Zvika Brakerski, Offir Friedman, Daniel Golan, Alon Gurny, Dolev Mutzari, Ohad Sheinfeld:
REFHE: Fully Homomorphic ALU. 1449 - Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan:
Single-round Lattice-based Multisignatures. 1450 - Ivan Tjuawinata, Yann Fraboni, Ziyao Liu, Jun Zhao, Pu Duan, Kwok-Yan Lam:
MUSE-VFL: Multi-party Unified System for Private and Communication Efficient Backpropagation in Vertical Federated Learning. 1451 - Christof Beierle, Patrick Felke:
Not Easy to Prepare a Pesto: Cryptanalysis of a Multivariate Public-Key Scheme from CCZ Equivalence. 1452 - Ruben Baecker, Paul Gerhart, Dominique Schröder:
Password-Hardened Encryption Revisited. 1453 - Maxim Jourenko, Marcus Völker:
Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. 1454 - Yuval Efron, Joachim Neu, Toniann Pitassi:
Fully-Fluctuating Participation in Sleepy Consensus. 1455 - Jeremiah Blocki, Nathan Smearsoll:
Provably Memory-Hard Proofs of Work With Memory-Easy Verification. 1456 - Yin Li, Sharad Mehrota, Shantanu Sharma, Komal Kumari:
DOC★: Access Control for Information-Theoretically Secure Key-Document Stores. 1457 - Hyeonhak Kim, Seokhie Hong, Suhri Kim:
INKE: Fast Isogeny-Based PKE using Intermediate Curves. 1458 - Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Shogo Shiraki, Takanori Isobe:
Not in The Prophecies: Practical Attacks on Nostr. 1459 - Clemens Krüger, Bhavinkumar Moriya, Dominik Schoop:
A Performance Comparison of the Homomorphic Encryption Schemes CKKS and TFHE. 1460 - Christopher Battarbee, Arman Darbinyan, Delaram Kahrobaei:
Hard Instances of Discrete Logarithm Problem and Cryptographic Applications. 1461 - Erik Mulder, Bruno Sterner, Wessel van Woerden:
Large smooth twins from short lattice vectors. 1462 - Yuyu Wang:
Leakage-Resilient Circuits against NC1, Revisited. 1463 - Bernardo David, Arup Mondal, Rahul Satish:
Rumors MPC: GOD for Dynamic Committees, Low Communication via Constant-Round Chat. 1464 - Felix Dörre, Marco Liebel, Jeremias Mechler, Jörn Müller-Quade:
CoRReCt: Compute, Record, Replay, Compare to Secure Computations on Untrusted Systems. 1465 - Weidan Ji, Zhedong Wang, Lin Lyu, Dawu Gu:
Revisiting Adaptively Secure IBE from Lattices with Smaller Modulus: A Conceptually Simple Framework with Low Overhead. 1466 - Randy Kuang:
Optimized HPPK Cryptography for Post-Quantum Security. 1467 - Sam Buxbaum, Lucas M. Tassis, Lucas Boschelli, Giovanni Comarela, Mayank Varia, Mark Crovella, Dino P. Christenson:
Privacy-Preserving Machine Learning on Web Browsing for Public Opinion. 1468 - Andrej Bogdanov, Alon Rosen, Kel Zin Tan:
Sample Efficient Search to Decision for kLIN. 1469 - Dung Bui, Kelong Cong:
Efficient Fuzzy Labeled PSI from Vector Ring-OLE. 1470 - Jakub Mielczarek, Malgorzata Zajecka:
NTWR Prime - redundant security based on NTRU Prime and LWR problems. 1471 - Katharina Boudgoust, Corentin Jeudy, Erkan Tairi, Weiqiang Wen:
Hardness of M-LWE with General Distributions and Applications to Leaky Variants. 1472 - Anubhav Baweja, Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, Pratyush Mishra, Tushar Mopuri, Andrew Zitek-Estrada:
Time-Space Trade-Offs for Sumcheck. 1473 - Jonas Janneck, Jonas Meers, Massimo Ostuzzi, Doreen Riepel:
Snake Mackerel: An Isogeny-Based AKEM Leveraging Randomness Reuse. 1474 - Michael Adjedj, Geoffroy Couteau, Arik Galansky, Nikolaos Makriyannis, Oren Yomtov:
Stateless 2PC Signatures for Internet-Scale Authentication and Authorization. 1475 - Hanlin Liu, Xiao Wang, Kang Yang, Longhui Yin, Yu Yu:
AGB 2.0: Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications. 1476 - Sourav Das, Ling Ren, Ziling Yang:
Adaptively Secure Threshold ElGamal Decryption from DDH. 1477 - Paul Gerhart, Davide Li Calsi, Luigi Russo, Dominique Schröder:
Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH. 1478 - Tianyao Gu, Afonso Tinoco, Sri Harish G. Rajan, Elaine Shi:
PicoGRAM: Practical Garbled RAM from Decisional Diffie-Hellman. 1479 - Ting-Yun Yeh:
SoK: Kleptographic Attacks. 1480 - Gopal Anantharaman, Jintai Ding:
A Camera Zoom-based Paper-Pencil Cipher Encryption Scheme atop Merkle-Hellman Knapsack Cryptosystem. 1481 - Charlotte Bonte, Georgio Nicolas, Nigel P. Smart:
Complex Elections via Threshold (Fully) Homomorphic Encryption. 1482 - Yue Huang, Xin Wang, Haibin Zhang, Sisi Duan:
Cross-Consensus Reliable Broadcast and its Applications. 1483 - Krishnendu Chatterjee, Jan Matyás Kristan, Stefan Schmid, Jakub Svoboda, Michelle Yeo:
Boosting Payment Channel Network Liquidity with Topology Optimization and Transaction Selection. 1484 - Liam Eagen:
Glock: Garbled Locks for Bitcoin. 1485 - Avik Chakraborti, Bishwajit Chakraborty, Nilanjan Datta, Avijit Dutta, Ashwin Jha, Sougata Mandal, Hrithik Nandi, Mridul Nandi, Abishanka Saha:
Naor-Reingold goes Beyond-the-Birthday-Bound. 1486 - Anasuya Acharya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran:
Towards Building Efficient SCALES Protocols. 1487 - Ittai Abraham, Gilad Asharov:
ABEL: Perfect Asynchronous Byzantine Extension from List-Decoding. 1488 - Shlomi Dolev, Avraham Yagudaev, Moti Yung:
PQ-STAR: Post-Quantum Stateless Auditable Rekeying. 1489 - Sharath Pendyala, Rahul Magesh, Elif Bilge Kavun, Aydin Aysu:
Outrunning the Millennium FALCON: Speed Records for FALCON on FPGAs. 1490 - Arka Rai Choudhuri, Aarushi Goel, Aditya Hegde, Abhishek Jain:
Homomorphic Secret Sharing with Verifiable Evaluation. 1491 - Cong Ling:
Comment on On Gaussian sampling, smoothing parameter and application to lattice signatures. 1492 - Yao Sun, Ting Li:
Improving the Circuit Implementation of the AES Linear Layer by Improving Boyar-Peralta's Algorithm and Using Sub-graph Reconstruction. 1493 - Haoyu Liao, Qingbin Luo:
Quantum Circuit Synthesis for AES with Low DW-cost. 1494 - Tim Beyne, Gregor Leander, Immo Schütt:
Pairwise independence of AES-like block ciphers. 1495 - Julius Hermelink, Erik Mårtensson, Maggie Tran:
Noise-Tolerant Plaintext-Checking Oracle Attacks - A Soft-Analytic Approach Applied to ML-KEM. 1496 - Yanyi Liu, Rafael Pass:
Hardness Along the Boundary: Towards One-Way Functions from the Worst-case Hardness of Time-Bounded Kolmogorov Complexity. 1497 - Yimeng Sun, Jiamin Cui, Shiyao Chen, Meiqin Wang, Longzheng Cui, Chao Niu:
One More Pair, More Information Gained: Improved Attacks on LowMC with Full S-box Layers Using Two Plaintext/Ciphertext Pairs. 1498 - Qi Cheng, Hongru Cao, Sian-Jheng Lin, Nenghai Yu, Yunghsiang S. Han, Xianhong Xie:
A Construction of Evolving k-threshold Secret Sharing Scheme over A Polynomial Ring. 1499 - Dmitry Khovratovich, Mikhail Vladimirov, Benedikt Wagner:
Data Matching in Unequal Worlds and Applications to Smart Contracts. 1500 - Riddhi Ghosal, Isaac M. Hair, Aayush Jain, Amit Sahai:
Using the Planted Clique Conjecture for Cryptography: Public-Key Encryption from Planted Clique and Noisy k-LIN Over Expanders. 1501 - Sayon Duttagupta, Dave Singelée, Xavier Carpent, Volkan Guler, Takahito Yoshizawa, Seyed Farhad Aghili, Aysajan Abidin, Bart Preneel:
CARPOOL: Secure And Reliable Proof of Location. 1502 - Jens Groth, Harjasleen Malvai, Andrew Miller, Yi-Nuo Zhang:
Constraint-Friendly Map-to-Elliptic-Curve-Group Relations and Their Applications. 1503 - Hyun Ji Kwag, Jonghyun Kim, Changmin Lee, Jong Hwan Park:
On the γ-Spreadness of Average-Case to Worst-Case Transformations. 1504 - Marie Bolzer, Sébastien Duval, Marine Minier:
A New Tool to Find Lightweight (AND, XOR) Implementations of Quadratic Vectorial Boolean Functions up to Dimension 9. 1505 - Carlos Cid, David Elkouss, Manuel Goulão:
Superposition Attacks Against LPN-Based Authentication Protocols. 1506 - Yu-Yuan Chou, Wen-Ching Wu, Jue-Sam Chou:
A Novel Quantum Voting System Based on Quantum Blind Signature without Entanglement. 1507 - Yubo Zeng, Kang Yang, Dengguo Feng, Min Zhang:
Ion: Concretely Efficient Submaximal-Fluid MPC with Linear Communication. 1508 - Yu Zhang, Xianhui Lu, Yijian Liu, Yongjian Yin, Kunpeng Wang:
LEAP: High-Performance Lattice-Based Pseudorandom Number Generator. 1509 - Ke Cheng, Yuheng Xia, Anxiao Song, Jiaxuan Fu, Wenjie Qu, Yulong Shen, Jiaheng Zhang:
Mosformer: Maliciously Secure Three-Party Inference Framework for Large Transformers. 1510 - Dennis Dayanikli, Anja Lehmann:
Updatable aPAKE: Security Against Bulk Precomputation Attacks. 1511 - Dennis Dayanikli, Laura Holz, Anja Lehmann:
Virtual End-to-End Encryption: Analysis of the Doctolib Protocol. 1512 - sowle:
d/v-CLSAG: Extension for Concise Linkable Spontaneous Anonymous Group Signatures. 1513 - Koen de Boer, Alice Pellet-Mary, Benjamin Wesolowski:
Rigorous Methods for Computational Number Theory. 1514 - Anish Chakraborty, Nektarios Georgios Tsoutsos:
Privacy-Preserving Federated Inference for Genomic Analysis with Homomorphic Encryption. 1515 - Xinxin Xing, Yizhong Liu, Boyang Liao, Jianwei Liu, Bin Hu, Xun Lin, Yuan Lu, Tianwei Zhang:
GoSSamer: Lightweight and Linear-Communication Asynchronous (Dynamic Proactive) Secret Sharing and the Applications. 1516 - Maxim Jourenko, Xiangyu Su, Adam Blatchley Hansen, Mario Larangeira:
Universally Composable Treatment of Multi-Party Isomorphic State Channels. 1517 - Nilanjan Datta, Avijit Dutta, Sougata Mandal, Hrithik Nandi:
Sequential Indifferentiability of STH and EDM. 1518 - Jiayu Xu:
Does the UC-Security Notion for PAKE Imply Game-Based Security? 1519 - Yijian Liu, Yu Zhang, Xianhui Lu, Yao Cheng, Yongjian Yin:
DAWN: Smaller and Faster NTRU Encryption via Double Encoding. 1520 - Jiahao Liu, Yi Wang, Rongmao Chen, Xinyi Huang, Jinshu Su, Moti Yung:
Universally Composable Subversion-Resilient Authenticated Key Exchange. 1521 - Omid Mir, Octavio Perez-Kempner, Sebastian Ramacher, Daniel Slamanig:
Constant-Size Inner Product Arguments for Group-Scalar Relations, Dynamic Threshold VRFs, and More. 1522 - Freja Elbro, Paolo Santini:
Decoupling Support Enumeration and Value Discovery in Non-Binary ISD. 1523 - Pedro Moreno-Sanchez, Mohsen Minaei, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Duc Viet Le:
AUPCH: Auditable Unlinkable Payment Channel Hubs. 1524 - Eshika Saxena, Alberto Alfarano, François Charton, Zeyuan Allen-Zhu, Emily Wenger, Kristin E. Lauter:
Making Hard Problems Easier with Custom Data Distributions and Loss Regularization: A Case Study in Modular Arithmetic. 1525 - Claude Carlet, Deng Tang:
A general secondary construction of Boolean functions including the indirect sum and its generalizations. 1526 - Michele Ciampi, Aggelos Kiayias, Yu Shen:
Universally Composable Transaction Order Fairness: Refined Definitions and Adaptive Security. 1527 - Parisa Hassanizadeh, Shahriar Ebrahimi, Stefan Dziembowski, Janusz Szczepanski:
Trustless Delegation of Vector Commitment Construction in Resource-Constrained Settings. 1528 - Thierry Emmanuel Minka Mi Nguidjoi:
UC-Security of the ZK-NR Protocol under Contextual Entropy Constraints: A Composable Zero-Knowledge Attestation Framework. 1529 - Zachary Espiritu, Seny Kamara, Tarik Moataz, Andrew Park:
PolySys: an Algebraic Leakage Attack Engine. 1530 - Zhuolong Zhang, Muzhou Li, Haoyang Wang, Shiqi Hou, Wei Wang, Meiqin Wang:
Improved Semi-Free-Start Collision Attacks on RIPEMD-160 (Full Version). 1531 - Tianshi Xu, Wen-jie Lu, Jiangrui Yu, Yi Chen, Chenqi Lin, Runsheng Wang, Meng Li:
Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC. 1532 - Mahdi Rahimi:
PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks (Extended Version). 1533 - Zhaomin Yang, Chao Niu, Benqiang Wei, Zhicong Huang, Cheng Hong, Tao Wei:
RBOOT: Accelerating Homomorphic Neural Network Inference by Fusing ReLU within Bootstrapping. 1534 - Iftach Haitner, Nikolaos Makriyannis:
Tight Bounds on Uniform-Challenge Black-Box Reductions from Sigma Protocols. 1535 - Shihui Fu:
Inner-Product Commitments Over Integers With Applications to Succinct Arguments. 1536 - Qingyu Mo, Wenyuan Wu, Jingwei Chen:
Privacy-Preserving Two-Party RBF Kernel SVM Training Based on Neat and Accurate Secure Exponentiation. 1537 - Peter Schwarz, Erik Pohle, Aysajan Abidin, Bart Preneel:
Evaluating Ascon in Secure Multi-Party Computation using Reverse Multiplication-Friendly Embeddings. 1538 - Hillel Avni, Shlomi Dolev, Komal Kumari, Stav Perle Elbar, Shantanu Sharma, Jeffrey D. Ullman, Moti Yung:
EvH: Randomized Symmetric Cipher Paradigm with Holographic Storage and Parallelism, Compression, & Erasure Recovery Integration. 1539 - Haikuo Yu, Jiahui Hou, Suyuan Liu, Lan Zhang, Xiang-Yang Li:
A Fine-Grained and Real-Time Functional Video Encryption and Sharing Scheme. 1540 - David Lim, Yan Bo Ti:
Adaptive Attack on Static POKÉ Keys. 1541 - Guozhen Liu, Shun Li, Huina Li, Weidong Qiu, Siwei Sun:
SAT-Based Space Partitioning and Applications to Ascon-Hash256. 1542 - Elena Andreeva, Amit Singh Bhati, Andreas Weninger:
Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs. 1543 - Baofeng Wu, Wen Kong, Dewei Kong, Hailun Yan:
MDS Diffusion Layers for Arithmetization-Oriented Symmetric Ciphers: The Rotational-Add Construction. 1544 - Gideon Samid:
Non-Trivial Ciphertexts. 1545 - Pratish Datta, Abhishek Jain, Zhengzhong Jin, Alexis Korb, Surya Mathialagan, Amit Sahai:
Incrementally Verifiable Computation for NP from Standard Assumptions. 1546 - Brent Waters, David J. Wu:
Silent Threshold Cryptography from Pairings: Expressive Policies in the Plain Model. 1547 - Susan Hohenberger, Brent Waters, David J. Wu:
Pairing-Based Aggregate Signatures without Random Oracles. 1548 - Subeen Cho, Yulim Hyoung, Hagyeong Kim, Minjoo Sim, Anupam Chattopadhyay, Hwajeong Seo, Hyunji Kim:
Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection. 1549 - Jian Guo, Wenjie Nan, Yiran Yao:
Revisiting Time-Space Tradeoffs in Collision Search and Decision Problems. 1550 - Ye Dong, Wen-jie Lu, Xiaoyang Hou, Kang Yang, Jian Liu:
M&M: Secure Two-Party Machine Learning through Efficient Modulus Conversion and Mixed-Mode Protocols. 1551 - Patrick Derbez, Marie Euler:
Minimalist Model for Impossible Differentials. 1552 - Anne Canteaut, Merlin Fruchon:
Understanding Unexpected Fixed-Key Differential Behaviours: How to Avoid Major Weaknesses in Lightweight Designs (Extended Version). 1553 - Chenke Wang, Yu Long, Xian Xu, Shi-Feng Sun, Yiqi Liu, Dawu Gu:
UniCross: A Universal Cross-Chain Payment Protocol with On-demand Privacy and High Scalability. 1554 - Ashish Choudhury, Ivan Damgård, Shravani Patil, Arpita Patra:
Information-theoretic MPC with Constant Communication Overhead. 1555 - Wei Ao, Vishnu Naresh Boddeti:
CryptoFace: End-to-End Encrypted Face Recognition. 1556 - Anasuya Acharya, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
On Achieving "Best-in-the-Multiverse" MPC. 1557 - Hamza Abusalah, Gaspard Anthoine, Gennaro Avitabile, Emanuele Giunta:
Lower Bounding Update Frequency in Short Accumulators and Vector Commitments. 1558 - Michel Seck, Abdoul Aziz Ciss:
A New Generalized Lattice Attack Against a Family of RSA-Like Cryptosystems. 1559 - Yuhang Zeng, Zhixin Dong, Xian Xu:
On the Termination of the HotStuff Protocol Within the Universally Composable Framework. 1560 - Maria Leslie, Ratna Dutta:
A Traceable Threshold Asmuth-Bloom Secret Sharing Scheme. 1561 - Manuel Barbosa, Matthias J. Kannwischer, Thing-Han Lim, Peter Schwabe, Pierre-Yves Strub:
Formally Verified Correctness Bounds for Lattice-Based Cryptography. 1562 - Taehun Kang, Donghoe Heo, Jeonghwan Lee, Suhri Kim, Changmin Lee:
Optimized Constant-Time Implementation of terSIDH. 1563 - Aleck Nash, Christian Eduardo Terron Garcia, Henry Chimal-Dzul, Kim-Kwang Raymond Choo:
SoK: Blockchain Consensus in the Quantum Age. 1564 - Karla Friedrichs, Anja Lehmann, Cavit Özbay:
Game Changer: A Modular Framework for OPRF Security. 1565 - Sebastian Faller, Guilhem Niot, Michael Reichle:
Lattice-based Threshold Blind Signatures. 1566 - Feixiang Zhao, Shixin Chen, Man Ho Au, Jian Weng, Huaxiong Wang, Jian Guo:
Bootstrappable Fully Homomorphic Attribute-Based Encryption with Unbounded Circuit Depth. 1567 - Tsai Yi-Ju:
Montgomery Curves: Exact Enumeration and Probabilistic Analysis. 1568 - François Dupressoir, Andreas Hülsing, Cameron Low, Matthias Meijers, Charlotte Mylog, Sabine Oechsner:
How Hard Can It Be to Formalize a Proof? Lessons from Formalizing CryptoBox Three Times in EasyCrypt. 1569 - Sayatan Ganguly, Shion Samadder Chaudhury:
Multi-Message Quantum Broadcast with Fine-Grained Access Control. 1570 - Sayatan Ganguly, Shion Samadder Chaudhury:
Attribute-based Quantum Broadcast Encryption with Composite Policies via Symmetric Unitary t-Designs. 1571 - Sangmin Cha, Gyeongju Song, Seyoung Yoon, Hwajeong Seo:
Quantum Implementation of MD5. 1572 - Yashvanth Kondi, Ian McQuoid, Kelsey Melissaris, Claudio Orlandi, Lawrence Roy, LaKyah Tyner:
OneTwoPAKE: Two-Round Strong Asymmetric PAKE with Ideal Security. 1573 - Sebastian Kolby, Lawrence Roy, Jure Sternad, Sophia Yakoubov:
Information-Theoretic Random-Index PIR. 1574 - Ioannis Alexopoulos, Zeta Avarikioti, Paul Gerhart, Matteo Maffei, Dominique Schröder:
BitPriv: A Privacy-Preserving Protocol for DeFi Applications on Bitcoin. 1575 - Gustavo Banegas, Anaëlle Le Dévéhat, Benjamin Smith:
Compressed verification for post-quantum signatures with long-term public keys. 1576 - Sedric Nkotto:
A Template SCA Attack on the Kyber/ML-KEM Pair-Pointwise Multiplication. 1577 - Victor Shoup:
Back to the future: simple threshold decryption secure against adaptive corruptions. 1578 - Varun Madathil, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou:
TACITA: Threshold Aggregation without Client Interaction. 1579 - Hossein Hafezi, Alireza Shirzad, Benedikt Bünz, Joseph Bonneau:
IronDict: Transparent Dictionaries from Polynomial Commitments. 1580 - Shuo Peng, Jiahui He, Kai Hu, Zhongfeng Niu, Shahram Rasoolzadeh, Meiqin Wang:
Cryptanalysis of ChiLow with Cube-Like Attacks. 1581 - Mahimna Kelkar, Aadityan Ganesh, Aditi Partap, Joseph Bonneau, S. Matthew Weinberg:
Breaking Omertà: On Threshold Cryptography, Smart Collusion, and Whistleblowing. 1582 - Shuiyin Liu, Amin Sakzad:
Compact Lattice-Coded (Multi-Recipient) Kyber without CLT Independence Assumption. 1583 - Yang Yang, Guomin Yang, Yingjiu Li, Pengfei Wu, Rui Shi, Minming Huang, Jian Weng, HweeHwa Pang, Robert H. Deng:
PriSrv+: Privacy and Usability-Enhanced Wireless Service Discovery with Fast and Expressive Matchmaking Encryption. 1584 - Yi-Fu Lai, Edoardo Persichetti:
LEAF: Compact and Efficient Blind Signature from Code-based Assumptions. 1585 - Ritam Bhaumik, Avijit Dutta, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro:
A Note on Feedback-PRF Mode of KDF from NIST SP 800-108. 1586 - Nakul Khambhati, Joonwon Lee, Gary Song, Rafail Ostrovsky, Sam Kumar:
Secure Agents. 1587 - Anubhav Baweja, Pratyush Mishra, Tushar Mopuri, Matan Shtepel:
Query-Optimal IOPPs for Linear-Time Encodable Codes. 1588 - Kaveh Dastouri:
A Symmetric Group-Based Public-Key Cryptosystem with Secret Partition-Dependent Decryption. 1589 - Thierry Emmanuel Minka Mi Nguidjoi:
The AIIP Problem: Toward a Post-Quantum Hardness Assumption from Affine Iterated Inversion over Finite Fields. 1590 - Thomas Schneider, Huan-Chih Wang, Hossein Yalame:
HE-SecureNet: An Efficient and Usable Framework for Model Training via Homomorphic Encryption. 1591 - Gilad Asharov, Eliran Eiluz, Ilan Komargodski, Wei-Kai Lin:
MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM. 1592 - Gökçe Düzyol, Kamil Otal:
Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions. 1593 - Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Practical Dense-Key Bootstrapping with Subring Secret Encapsulation. 1594 - Vipul Goyal, Xiao Liang, Omkant Pandey, Yuhao Tang, Takashi Yamakawa:
Round-Efficient Composable Two-Party Quantum Computation. 1595 - Daniel Römer, Gero Knoblauch, Alexander Wiesmaier:
On GPU acceleration of PQC algorithms. 1596 - Dounia M'foukh, María Naya-Plasencia, Patrick Neumann:
The State-Test Technique on Differential Attacks: a 26-Round Attack on CRAFT and Other Applications. 1597 - Wasilij Beskorovajnov, Jörn Müller-Quade:
How to kickstart Secure Message Transfer with Short Authentication Strings and Out-Of-Band Communication. 1598 - Hiroshi Amagasa, Rei Ueno, Naofumi Homma:
AVX2 Implementation of QR-UOV for Modern x86 Processors. 1599 - Utkarsh Sahai, Arijit Saha, Ramprasad Sarkar, Mriganka Mandal:
Adaptively-Secure Unbounded Optimal DBE from Lattice Assumptions. 1600 - Eran Lambooij, Patrick Neumann, Michiel Verbauwhede:
Meet-in-the-Middle Attacks on Full ChiLow-32. 1601 - Kohei Nakagawa, Hiroshi Onuki:
Attacks on PRISM-id via Torsion over Small Extension Fields. 1602 - Jyotirmoy Basak, Ritam Bhaumik, Amit Kumar Chauhan, Ravindra Jejurikar, Ashwin Jha, Anandarup Roy, André Schrottenloher, Suprita Talnikar:
Post-quantum Security of Key-Alternating Feistel Ciphers. 1603 - Giacomo Borin, Maria Corte-Real Santos, Jonathan Komada Eriksen, Riccardo Invernizzi, Marzio Mula, Sina Schaeffler, Frederik Vercauteren:
Qlapoti: Simple and Efficient Translation of Quaternion Ideals to Isogenies. 1604 - Eda Kirimli, Gaurish Korpal:
Refined Humbert Invariants in Supersingular Isogeny Degree Analysis. 1605 - Shaurya Pratap Singh, Bhupendra Singh, Alok Mishra:
Collatz Hash: Cryptographic Hash Algorithm Using 3X+1 Conjecture. 1606 - José Bacelar Almeida, Gustavo Xavier Delerue Marinho Alves, Manuel Barbosa, Gilles Barthe, Luís Esquível, Vincent Hwang, Tiago Oliveira, Hugo Pacheco, Peter Schwabe, Pierre-Yves Strub:
Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt. 1607 - Haiyue Dong, Qian Guo:
Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates. 1608 - Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo:
Many-time Linkable Ring Signatures. 1609 - Rujia Li, Mingfei Zhang, Xueqian Lu, Wenbo Xu, Ying Yan, Sisi Duan:
BunnyFinder: Finding Incentive Flaws for Ethereum Consensus. 1610 - Marc Fischlin, Moritz Huppert, Sam A. Markelon:
Probabilistic Skipping-Based Data Structures with Robust Efficiency Guarantees. 1611 - Onur Günlü, Maciej Skorski, H. Vincent Poor:
Low-Latency Rate-Distortion-Perception Trade-offs Through Randomized Distributed Function Computations. 1612 - Shuai Han, Hongxu Yi, Shengli Liu, Dawu Gu:
Tightly Secure Inner-Product Functional Encryption Revisited: Compact, Lattice-based, and More. 1613 - Michele Ciampi, Divya Ravi, Luisa Siniscalchi, Yu Xia:
Broadcast-Optimal Secure Computation From Black-Box Oblivious Transfer. 1614 - Thierry Emmanuel Minka Mi Nguidjoi:
The Chaotic Entropic Expansion (CEE): A Transparent Post-Quantum Data Confidentiality Primitive via Entropic Chaotic Maps. 1615 - Nouhou Abdou Idris, Yunusa Simpa Abdulsalam, Mustapha Hedabou:
Transforming the POKE public key Protocol into a Key Encapsulation Mechanism. 1616 - Forest Zhang, Ke Wu:
Game-Theoretically Fair Coin Toss with Arbitrary Preferences. 1617 - Tabitha Ogilvie:
IND-CPA-D and KR-D Security With Reduced Noise from the HintLWE Problem. 1618 - Lea Thiemt, Paul Rösler, Alexander Bienstock, Rolfe Schmidt, Yevgeniy Dodis:
Generic Anonymity Wrapper for Messaging Protocols. 1619 - Danilo Francati, Yevin Nikhel Goonatilake, Shubham Pawar, Daniele Venturi, Giuseppe Ateniese:
The Coding Limits of Robust Watermarking for Generative Models. 1620 - Francesca Falzon, Zichen Gui, Michael Reichle:
Page-efficient Encrypted Multi-Maps: New Techniques for Optimal Search Bandwidth. 1621 - Fredrik Meisingseth, Christian Rechberger, Fabian Schmid:
General Modularity Lemmata about Random Variable Commitment Schemes, and a Certified Laplace Mechanism. 1622 - Ruida Wang, Jikang Bai, Xuan Shen, Xianhui Lu, Zhihao Li, Binwu Xiang, Zhiwei Wang, Hongyu Wang, Lutan Zhao, Kunpeng Wang, Rui Hou:
Tetris: Versatile TFHE LUT and Its Application to FHE Instruction Set Architecture. 1623 - Sven Schäge, Marc Vorstermans:
New Limits for Homomorphic Encryption. 1624 - Véronique Cortier, Alexandre Debant, Olivier Esseiva, Pierrick Gaudry, Audhild Høgåsen, Chiara Spadafora:
A Practical and Fully Distributed E-Voting Protocol for the Swiss Context. 1625 - Kigen Fukuda, Shin'ichiro Matsuo:
Post-Quantum Blockchain: Transition Landscape Amidst Evolving Complexity. 1626 - Zeyu Liu, Yunhao Wang, Ben Fisch:
IND-CPA-D of Relaxed Functional Bootstrapping: A New Attack, A General Fix, and A Stronger Model. 1627 - Pratish Datta, Junichi Tomida, Nikhil Vanjani:
Fully Adaptive Decentralized MA-ABE: Simplified, Optimized, ASP Supported. 1628 - Simon Damm, Asja Fischer, Alexander May, Soundes Marzougui, Leander Schwarz, Henning Seidler, Jean-Pierre Seifert, Jonas Thietke, Vincent Quentin Ulitzsch:
Solving Concealed ILWE and its Application for Breaking Masked Dilithium. 1629 - Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, Daniel Pöllmann, Yifan Song:
Velox: Scalable Fair Asynchronous MPC from Lightweight Cryptography. 1630 - Akhil Bandarupalli, Xiaoyu Ji, Soham Jog, Aniket Kate, Chen-Da Liu-Zhang, Yifan Song:
Computationally and Communication Efficient Batched Asynchronous DPSS from Lightweight Cryptography. 1631 - Cheng Che, Tian Tian:
Enhancing the DATF Technique in Differential-Linear Cryptanalysis. 1632 - Sohyun Jeon, Calvin Abou Haidar, Mehdi Tibouchi:
LastRings: Lattice-based Scalable Threshold Ring Signatures. 1633 - Chi Feng, Lei Fan:
BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques. 1634 - Alex Charlès, Aleksei Udovenko:
Haystack ciphers: White-box countermeasures as Symmetric encryption. 1635 - Daniel Pöllman, Tianxin Tang:
Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost? 1636 - Sebastian Hasler, Pascal Reisert, Ralf Küsters:
Pseudorandom Correlation Functions from Ring-LWR. 1637 - Mario Yaksetig, Pedro M. F. Pereira, Stephen Yang, Mahdi Nejadgholi, Jiayu Xu:
Rayls II: Fast, Private, and Compliant CBDCs. 1638 - Mario Yaksetig, Jiayu Xu:
Rayls: A Novel Design for CBDCs. 1639 - Artyom Kuninets, Anton Leevik, Ekaterina Malygina, Evgeniy Melnichuk, Denis Nabokov:
On the construction of Barnes-Wall lattices and their application in cryptography. 1640 - Jiangxia Ge, Kang Yang, Yang Yu, Yu Yu:
Fujisaki-Okamoto Transformation under Average-Case Decryption Error: Tighter and More General Proofs with Applications to PQC. 1641 - Furkan Kerim Çabas, Oguz Yayla:
Mixed Arithmetic-Binary Circuits in Fluid MPC Against Honest Majority of 4-Party and Its Applications Against Semi-Honest Adversary. 1642 - Wenquan Zhou, An Wang, Yaoling Ding, Annv Liu, Jingqi Zhang, Jiakun Li, Liehuang Zhu:
SCA-GPT: Generation-Plan-Tool Assisted LLM Agent for Full-Automated Side-Channel Analysis on Cryptosystems. 1643 - Lennart Braun, Geoffroy Couteau, Kelsey Melissaris, Mahshid Riahinia, Elahe Sadeghi:
Fast Pseudorandom Correlation Functions from Sparse LPN. 1644 - Gustavo Banegas, Andreas Hellenbrand, Matheus Saldanha:
Hardened CTIDH: Dummy-Free and Deterministic CTIDH. 1645 - Mingshu Cong, Sherman S. M. Chow, Siu Ming Yiu, Tsz Hon Yuen:
Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning. 1646 - Behzad Abdolmaleki, Ruben Baecker, Paul Gerhart, Mike Graf, Mojtaba Khalili, Daniel Rausch, Dominique Schröder:
Universally Composable Password-Hardened Encryption. 1647 - Jian Guo, Shichang Wang, Tianyu Zhang:
Breaking Full ChiLow-32. 1648 - Won Kim, Jeonghwan Lee, Hyeonhak Kim, Changmin Lee:
SQIsign with Fixed-Precision Integer Arithmetic. 1649 - Ariel Futoransky, Ramses Fernandez, Emilio Garcia, Gabriel Larotonda, Sergio Demian Lerner:
WISCH: Efficient data signing via correlated signatures. 1650 - Maxence Jauberty, Pierrick Méaux:
On the Cardinality of the Walsh Support of a Boolean Function. 1651 - Yuhao Zheng, Jianming Lin, Chang-An Zhao:
Computing Pairings on Elliptic Curves with Embedding Degree Two via Biextensions. 1652 - Zesheng Li, Dongliang Cai, Yimeng Tian, Yihang Du, Xinxuan Zhang, Yi Deng:
Distributed SNARK via folding schemes. 1653 - Yanqi Gu, Stanislaw Jarecki, Phillip Nazarian, Apurva Rai:
Security without Trusted Third Parties: VRF-based Authentication with Short Authenticated Strings. 1654 - Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang:
Lattice-based Multi-message Multi-recipient KEM/PKE with Malicious Security. 1655 - Suvradip Chakraborty, Sebastian H. Faller, Dennis Hofheinz, Kristina Hostáková:
Forgetful Encryption. 1656 - Eli Baum, Sam Buxbaum, Nitin Mathai, Muhammad Faisal, Vasiliki Kalavri, Mayank Varia, John Liagouris:
ORQ: Complex Analytics on Private Data with Strong Security Guarantees. 1657 - Bowen Zhang, Hao Cheng, Johann Großschädl, Peter Y. A. Ryan:
High-Throughput EdDSA Verification on Intel Processors with Advanced Vector Extensions. 1658 - Zonglun Li, Wangze Ni, Shuhao Zheng, Junliang Luo, Weijie Sun, Lei Chen, Xue Liu, Tianhang Zheng, Zhan Qin, Kui Ren:
Hurricane Mixer: The Eye in the Storm - Embedding Regulatory Oversight into Cryptocurrency Mixing Services. 1659 - Xiaojie Guo, Hanlin Liu, Zhicong Huang, Hongrui Cui, Wenhao Zhang, Cheng Hong, Xiao Wang, Kang Yang, Yu Yu:
Dory: Streaming PCG with Small Memory. 1660 - Andreas Wiemers:
A Note on the Goppa Code Distinguishing Problem. 1661 - Thierry Emmanuel Minka Mi Nguidjoi:
The Affine One-Wayness (AOW): A Transparent Post-Quantum Temporal Verification via Polynomial Iteration. 1662 - Mary Maller, Nicolas Mohnblatt, Arantxa Zapico:
IVC in the Open-and-sign Random Oracle Model. 1663 - Tarun Yadav, Shweta Singh, Sudha Yadav:
Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization. 1664 - Chris Brzuska, Michael Klooß, Ivy K. Y. Woo:
Threshold Public-Key Encryption: Definitions, Relations and Constructions. 1665 - Hila Dahari-Garbian, Ariel Nof, Luke Parker:
Trout: Two-Round Threshold ECDSA from Class Groups. 1666 - Xinxin Gong, Qingju Wang, Yonglin Hao, Lin Jiao, Xichao Hu:
Persistence of Hourglass(-like) Structure: Improved Differential-Linear Distinguishers for Several ARX Ciphers. 1667 - Obianuju Egbuagha, Emmanuel Ikwunna:
Post-Quantum Cryptography in Practice: A Literature Review of Protocol-Level Transitions and Readiness. 1668 - Feng Hao, Luke Harrison, Saverio Veltri, Irene Pugliatti, Chris Sinclair, Gareth Nixon:
Experience from UNITA Elections: Reconciling Revote, E2E Verifiability and Low Coercion. 1669 - Zhengting Li, Lin Ding, Xinhai Wang, Jiang Wan:
Mixderive: A New Framework of Deriving Linear Approximations and Improved Differential-Linear Distinguishers for ChaCha. 1670 - Kathrin Hövelmanns, Daan Planken, Christian Schaffner, Sebastian R. Verschoor:
QKD Oracles for Authenticated Key Exchange. 1671 - Théophile Brézot, Chloé Hébant:
All Paths Lead to the Root. 1672 - Hiroki Minamide, Keisuke Tanaka, Masayuki Tezuka:
Strong Designated Verifier Signatures with Non-delegatability from CSIDH. 1673 - Gustaf Ahlgren, Onur Günlü:
Secure Rate-Distortion-Perception Trade-Off with Side Information. 1674 - Rosario Giustolisi, Maryam Sheikhi Garjan, Peter B. Rønne:
Surtr: Transparent Verification with Simple yet Strong Coercion Mitigation. 1675 - Junru Li, Yifan Song:
Honest Majority Constant-Round MPC with Linear Communication from One-Way Functions. 1676 - Dung Hoang Duong, Youming Qiao, Chuanqi Zhang:
Diffie-Hellman Key Exchange from Commutativity to Group Laws. 1677 - Shreya Dey, Avijit Dutta, Kazuhiko Minematsu:
Two-Key Variant of the Four-Round Cascading LRW1. 1678 - Martin Zbudila, Ajith Suresh, Hossein Yalame, Omid Mirzamohammadi, Aysajan Abidin, Bart Preneel:
SoK: Connecting the Dots in Privacy-Preserving ML - Systematization of MPC Protocols and Conversions Between Secret Sharing Schemes. 1679 - Dmitrii A. Gerasimov:
ChipmunkRing: A Practical Post-Quantum Ring Signature Scheme for Blockchain Applications. 1680 - Trey Li:
Modular Forms and Hecke Operators for Post-Quantum Cryptography. 1681 - Orestis Alpos, Bernardo David, Jakov Mitrovski, Odysseas Sofikitis, Dionysis Zindros:
pod: An Optimal-Latency, Censorship-Free, and Accountable Generalized Consensus Layer. 1682 - Benedikt Wagner, Arantxa Zapico:
Proving the Security of PeerDAS without the AGM. 1683 - B. Pradeep Kumar Reddy, Sameeksha Goyal, Ruchika Meel, Ayantika Chatterjee:
FHEMaLe: Framework for Homomorphic Encrypted Machine Learning. 1684 - Lucien K. L. Ng, Vladimir Kolesnikov:
Toss: Garbled PIR from Table-Only Stacking. 1685 - Ole Martin Edstrøm, Kristian Gjøsteen, Hans Heum, Sjouke Mauw, Felix Stutz:
Honest Users Make Honest Mistakes: A Framework for Analysing eID Protocols. 1686 - Easwar Vivek Mangipudi, Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Mohsen Minaei, Mainack Mondal:
Web3 Recovery Mechanisms and User Preferences. 1687 - Yuange Li, Xiong Fan:
SUMMER: Recursive Zero-Knowledge Proofs for Scalable RNN Training. 1688 - Frank Denis:
IPCrypt: Optimal, Practical Encryption of IP Addresses for Privacy and Measurement. 1689 - Xavier Bonnetain, Johanna Loyer, André Schrottenloher, Yixin Shen:
A Tight Quantum Algorithm for Multiple Collision Search. 1690 - Valerio Cini, Russell W. F. Lai, Ivy K. Y. Woo:
Pilvi: Lattice Threshold PKE with Small Decryption Shares and Improved Security. 1691 - Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
Combined Stability: Protecting against Combined Attacks. 1692 - Dimitri Koshelev:
Quasi-perfect (de)compression of elliptic curve points in the highly 2-adic scenario. 1693 - Léo Ducas, Johanna Loyer:
Lattice Reduction via Dense Sublattices: A Cryptanalytic No-Go. 1694 - Shengnan Zhao, Junyu Lu, Yuchen Huang, Dongdong Miao, Chuan Zhao:
Mk-PIR: Multi-Keyword Private Information Retrieval. 1695 - Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Xudong Deng:
Threshold ECDSA in Two Rounds. 1696 - Zoushaojie Jiang, An Wang, Yaoling Ding, Annv Liu, Zheng Liu, Jing Yu, Liehuang Zhu:
Extract Discriminative Features: Profiled Side-Channel Analysis for Cryptosystems Based on Supervised Contrastive Learning. 1697 - Rishabh Bhadauria, Alexander R. Block, Prantar Ghosh, Justin Thaler:
SNARK Lower Bounds via Communication Complexity. 1698 - Ran Gelles, Carmit Hazay, Manuj Mukherjee, Jaspal Singh, Arun Yeragudipati, Vassilis Zikas:
A Constant-Rate Compiler for MPC over Noisy Networks. 1699 - Stefan Dziembowski, Grzegorz Fabianski, Daniele Micciancio, Rafal Stefanski:
Computationally-Sound Symbolic Cryptography in Lean. 1700 - Xisen Tian, Paul Westland:
BPSec-MLS: Asynchronous Key Agreement for Space Communications. 1701 - Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo:
Lattice-Based Group Signatures in the Standard Model, Revisited. 1702 - Haotian Yin, Jie Zhang, Wanxin Li, Yuji Dong, Eng Gee Lim, Dominik Wojtczak:
Updatable Signature from Lattices. 1703 - David Garvin, Mattia Fiorentini, Oleksiy Kondratyev, Marco Paini:
Data Anonymisation with the Density Matrix Classifier. 1704 - Karen Azari, Cecilia Boschini, Kristina Hostáková, Michael Reichle:
Security Amplification of Threshold Signatures in the Standard Model. 1705 - Tomoki Moriya:
Kani's lemma from Clifford algebra. 1706 - Ran Cohen, Pouyan Forghani, Juan Garay, Rutvik Patel, Vassilis Zikas:
Is It Even Possible? On the Parallel Composition of Asynchronous MPC Protocols. 1707 - Thierry Emmanuel Minka Mi Nguidjoi:
The Semantic Holder (SH): Algebraic Extraction for Legal Opposability. 1708 - Yunus Gürlek, Kadircan Bozkurt:
The zkVot Protocol: A Distributed Computation Protocol for Censorship Resistant Anonymous Voting. 1709 - Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Information-Theoretic Broadcast-Optimal MPC. 1710 - Han Wang, Ming Luo, Han Xia, Mingsheng Wang, Hanxu Hou:
Accelerating FHEW-like Bootstrapping via New Configurations of the Underlying Cryptosystems. 1711 - Russell Okamoto:
The Syndrome-Space Lens: A Complete Resolution of Proximity Gaps for Reed-Solomon Codes. 1712 - Ilyas Zhaisenbayev:
Ilyazh-Web3E2E: A Post-Quantum Hybrid Protocol for Forward-Secure Decentralized Messaging. 1713 - Mayank Rathee, Keewoo Lee, Raluca Ada Popa:
Verifiable PIR with Small Client Storage. 1714 - Zonglun Li, Hong Kang, Xue Liu:
UltraMixer: A Compliant Zero-Knowledge Privacy Layer for Tokenized Real-World Assets. 1715 - Adrian Neal:
Beyond Shannon: Operational Perfect Secrecy as a Generalised Model for Information-Theoretic Security. 1716 - Kuiyuan Duan, Hongbo Li, Dengfa Liu, Guangsheng Ma:
Large-Plaintext Functional Bootstrapping in FHE with Small Bootstrapping Keys. 1717 - Hart Montgomery, Sikhar Patranabis:
Indistinguishability Obfuscation from Ring Key-Homomorphic Weak PRFs. 1718 - Bence Soóki-Tóth, István András Seres, Kamilla Kara, Ábel Nagy, Balázs Pejó, Gergely Biczók:
Bribers, Bribers on The Chain, Is Resisting All in Vain? Trustless Consensus Manipulation Through Bribing Contracts. 1719 - Sergio Demian Lerner, Ariel Futoransky:
BATTLE - Bonded Adversarial TournamenT with Logarithmic Escalation. 1720 - Adrian Neal:
Q-Stream: A Practical System for Operational Perfect Secrecy. 1721 - Jack Doerner, Iftach Haitner, Yuval Ishai, Nikolaos Makriyannis:
From OT to OLE with Subquadratic Communication. 1722 - Jesko Dujmovic, Christoph U. Günther, Krzysztof Pietrzak:
Space-Deniable Proofs. 1723 - Rebekah Mercer, Kaoutar Elkhiyaoui, Angelo De Caro, Elli Androulaki:
Efficient Aggregate Anonymous Credentials for Decentralized Identity. 1724 - Navid Abapour, Amir Goharshady, Catalin Dragan, Mahdi Mahdavi:
Blockchain-based Economic Voting with Posterior Security from Lattices. 1725 - Elif Ozbay Gurler, Patrick Struck:
How (not) to Build Identity-Based Encryption from Isogenies. 1726 - Armando Faz-Hernández:
Rhizomes and the Roots of Efficiency - Improving Prio. 1727 - Arsalan Ali Malik, Furkan Aydin, Aydin Aysu:
Precision Strike: Targeted Misclassification of Accelerated CNNs with a Single Clock Glitch. 1728 - Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
GuardianMPC: Backdoor-resilient Neural Network Computation. 1729 - Damiano Abram, Serge Fehr, Maciej Obremski, Peter Scholl:
On the Impossibility of Actively Secure Distributed Samplers. 1730 - Víctor Duarte Melo, William J. Buchanan:
ECCFROG522PP: An Enhanced 522-bit Weierstrass Elliptic Curve. 1731 - Arman Riasi, Haodi Wang, Rouzbeh Behnia, Viet Vo, Thang Hoang:
Zero-Knowledge AI Inference with High Precision. 1732 - Jeremiah Blocki, Seunghoon Lee, Brayan Sebastián Yepes Garcia:
Differentially Private Compression and the Sensitivity of LZ77. 1733

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.