default search action
IACR Communications in Cryptology, Volume 1
Volume 1, Number 1, 2024
- Keewoo Lee:
Bit Security as Cost to Demonstrate Advantage. 1 - Benjamin E. Diamond, Jim Posen:
Proximity Testing with Logarithmic Randomness. 2 - Akira Takahashi, Greg Zaverucha:
Verifiable Encryption from MPC-in-the-Head. 3 - Loïs Huguenin-Dumittan, Serge Vaudenay:
Impossibility of Post-Quantum Shielding Black-Box Constructions of CCA from CPA. 4 - Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers:
Optimizations and Practicality of High-Security CSIDH. 5 - Marloes Venema, Leon Botros:
Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures. 6 - Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation. 7 - Keita Xagawa:
On the Efficiency of Generic, Quantum Cryptographic Constructions. 8 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López:
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs. 9 - Thomas Pornin:
A Prime-Order Group with Complete Formulas from Even-Order Elliptic Curves. 10 - Mustafa Khairallah:
CCA Security with Short AEAD Tags. 11 - Benjamin Wesolowski:
Computing isogenies between finite Drinfeld modules. 12 - Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers. 13 - Daniel J. Bernstein:
Understanding binary-Goppa decoding. 14 - Emmanuela Orsini, Riccardo Zanotto:
Simple Two-Message OT in the Explicit Isogeny Model. 15 - Yi-Hsiu Chen, Yehuda Lindell:
Feldman's Verifiable Secret Sharing for a Dishonest Majority. 16 - Marcel Tiepelt, Christian Martin, Nils Mäurer:
Post-Quantum Ready Key Agreement for Aviation. 17 - Aurélien Dupin, Simon Abelard:
Broadcast Encryption using Sum-Product decomposition of Boolean functions. 18 - Matteo Campanelli, Chaya Ganesh, Rosario Gennaro:
How to Make Rational Arguments Practical and Extractable. 19 - Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira:
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space. 20 - Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karoline Varner, Bas Westerbaan:
X-Wing. 21 - Subhadeep Banik, Andrea Caforio, Serge Vaudenay:
New Attacks on LowMC Using Partial Sets in the Single-Data Setting. 22 - Loïc Demange, Mélissa Rossi:
A provably masked implementation of BIKE Key Encapsulation Mechanism. 23 - Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens:
Verifiable FHE via Lattice-based SNARKs. 24 - Yehuda Lindell:
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability. 25 - Damien Robert, Nicolas Sarkis:
Computing 2-isogenies between Kummer lines. 26 - Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi:
On the Two-sided Permutation Inversion Problem. 27 - Gabrielle De Micheli, Nadia Heninger:
Survey: Recovering cryptographic keys from partial information, by example. 28 - Jules Maire, Damien Vergnaud:
Secure Multi-Party Linear Algebra with Perfect Correctness. 29 - Charles Bouillaguet, Julia Sauvage:
Preliminary Cryptanalysis of the Biscuit Signature Scheme. 30 - Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang:
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation. 31 - Samuel Bouaziz-Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu:
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions. 32
Volume 1, Number 2, 2024
- Vincent Hwang:
A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems. 1 - Gil Segev, Liat Shapira:
An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures. 2 - Ky Nguyen, David Pointcheval, Robert Schädlich:
Decentralized Multi-Client Functional Encryption with Strong Security. 3 - Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, François-Xavier Standaert:
Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue. 4 - Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Sahin, Muhammed Said Gündogan:
Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers? 5 - Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier:
A Comprehensive Survey on Post-Quantum TLS. 6 - Sean Murphy, Rachel Player:
A Central Limit Approach for Ring-LWE Noise Analysis. 7 - Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay:
Compact Key Function Secret Sharing with Non-linear Decoder. 8 - Guilhèm Assael, Philippe Elbaz-Vincent:
Provably Secure and Area-Efficient Modular Addition over Boolean Shares. 9 - Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl:
Communication-Efficient Multi-Party Computation for RMS Programs. 10 - Yi-Hsiu Chen, Yehuda Lindell:
Optimizing and Implementing Fischlin's Transform for UC-Secure Zero Knowledge. 11 - Scott Griffy, Anna Lysyanskaya:
PACIFIC: Privacy-preserving automated contact tracing featuring integrity against cloning. 12 - Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai:
Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom Generators. 13 - Décio Luiz Gazzoni Filho, Tomás S. R. Silva, Julio López:
Efficient isochronous fixed-weight sampling with applications to NTRU. 14 - Ji Luo:
Ad Hoc Broadcast, Trace, and Revoke: Plus Time-Space Trade-Offs for Attribute-Based Encryption. 15 - Qinyi Li, Xavier Boyen:
Public-Key Authenticated Encryption with Keyword Search Made Easy. 16 - Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin:
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers. 17 - Camille Mutschler, Laurent Imbert, Thomas Roche:
Inspector Gadget: A Toolbox for Fair Comparison of Masking Gadgets, Application to Crystals-Kyber Compression. 18 - Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak:
Synchronous Distributed Key Generation without Broadcasts. 19 - Jianhua Wang, Tao Huang, Shuang Wu, Zilong Liu:
Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication. 20 - Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal:
FEDT: Forkcipher-based Leakage-resilient Beyond-birthday-secure AE. 21 - Anis Bkakria, Malika Izabachène:
Efficient Post-Quantum Pattern Matching on Encrypted Data. 22
Volume 1, Number 3, 2024
- Yi-Fu Lai:
Capybara and Tsubaki: Verifiable Random Functions from Group Actions and Isogenies. 1 - Aron van Baarsen, Marc Stevens:
Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting. 2 - Diego F. Aranha, Georgios Fotiadis, Aurore Guillevic:
A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level. 3 - Ritam Bhaumik, André Chailloux, Paul Frixons, Bart Mennink, María Naya-Plasencia:
Block Cipher Doubling for a Post-Quantum World. 4 - Jonathan Komada Eriksen, Antonin Leroux:
Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications. 5 - Samuel Jaques:
Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions. 6 - Jinzheng Cao, Qingfeng Cheng, Jian Weng:
Optimizing c-sum BKW and Faster Quantum Variant for LWE. 7 - Chunzhi Zhao, Junqi Zhang, Jinzheng Cao, Qingfeng Cheng, Fushan Wei:
Implicit Factorization with Shared Any Bits. 8 - André Schrottenloher, Marc Stevens:
Quantum Procedures for Nested Search Problems: with Applications in Cryptanalysis. 9 - Carsten Baum, Jens Berlips, Walther Chen, Ivan Bjerre Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. 10 - Laurent-Stéphane Didier, Nadia El Mrabet, Léa Glandus, Jean-Marc Robert:
Truncated multiplication and batch software SIMD AVX512 implementation for faster Montgomery multiplications and modular exponentiation. 11 - Ruize Wang, Kalle Ngo, Joel Gärtner, Elena Dubrova:
Unpacking Needs Protection: A Single-Trace Secret Key Recovery Attack on Dilithium. 12 - Liu Zhang, Zilong Wang, Baocang Wang:
Improving Differential-Neural Cryptanalysis. 13 - Soichiro Kobayashi, Rei Ueno, Yosuke Todo, Naofumi Homma:
Side-Channel Linearization Attack on Unrolled Trivium Hardware. 14 - Jeongeun Park, Barry Van Leeuwen, Oliver Zajonc:
FINALLY: A Multi-Key FHE Scheme Based on NTRU and LWE. 15 - Franklin Harding, Jiayu Xu:
Unforgeability of Blind Schnorr in the Limited Concurrency Setting. 16 - Aleksei Udovenko:
Cryptanalysis of TS-Hash. 17 - Anne Broadbent, Martti Karvonen, Sébastien Lord:
Uncloneable Quantum Advice. 18 - Ruixiao Li, Hayato Yamana:
Non-interactive Private Multivariate Function Evaluation using Homomorphic Table Lookup. 19 - Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek:
Plaintext-based Side-channel Collision Attack. 20 - Qian Guo, Erik Mårtensson, Adrian Åström:
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber. 21 - Debasmita Chakraborty, Mridul Nandi:
Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash. 22 - Haetham Al Aswad, Emmanuel Thomé, Cécile Pierrot:
Discrete Logarithm Factory. 23 - Benjamin Hansen Mortensen, Mathias Karsrud Nordal, Martin Strand:
Matching radar signals and fingerprints with MPC. 24 - Douglas Wikström:
Special Soundness Revisited. 25 - Douglas Wikström:
Special Soundness in the Random Oracle Model. 26 - Xavier Bonnetain, Virginie Lallemand:
A Note on Related-Tweakey Impossible Differential Attacks. 27 - Sebastian Kolby, Elena Pagnin, Sophia Yakoubov:
Multi Designated Verifier Ring Signatures. 28 - Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA. 29 - Sebastian Kolby, Divya Ravi, Sophia Yakoubov:
Constant-Round YOSO MPC Without Setup. 30 - Balthazar Bauer, Pooya Farshim, Patrick Harasser, Markulf Kohlweiss:
The Uber-Knowledge Assumption: A Bridge to the AGM. 31 - Rustem Takhanov:
Almost pairwise independence and resilience to deep learning attacks. 32 - Ward Beullens, Pierre Briaud, Morten Øygarden:
A Security Analysis of Restricted Syndrome Decoding Problems. 33 - Rebecca Hay, Elisabeth Oswald:
Key Rank Estimation Methods: Comparisons and Practical Considerations. 34 - Nima Mahdion, Elisabeth Oswald:
Efficiently Detecting Masking Flaws in Software Implementations. 35 - Damien Vidal, Claire Delaplace, Sorina Ionica:
An analysis of the Crossbred Algorithm for the MQ Problem. 36 - Robin Geelen:
Revisiting the Slot-to-Coefficient Transformation for BGV and BFV. 37 - Alexander Bille, Elmar Tischhauser:
Efficient Algorithm for Generating Optimal Inequality Candidates for MILP Modeling of Boolean Functions. 38 - Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Francisco Rodríguez-Henríquez:
Finding Practical Parameters for Isogeny-based Cryptography. 39 - Ida Bruhns, Sebastian Berndt, Jonas Sander, Thomas Eisenbarth:
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge. 40 - Lichao Wu, Azade Rezaeezade, Amir Alipour, Guilherme Perin, Stjepan Picek:
Leakage Model-flexible Deep Learning-based Side-channel Analysis. 41 - Sougata Mandal:
Tweakable ForkCipher from Ideal Block Cipher. 42 - Thomas Decru, Tako Boris Fouotsa, Paul Frixons, Valerie Gilchrist, Christophe Petit:
Attacking trapdoors from matrix products. 43 - Dina Kamel, François-Xavier Standaert, Olivier Bronchain:
Information Theoretic Evaluation of Raccoon's Side-Channel Leakage. 44 - Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, Hansol Ryu:
Analysis of Layered ROLLO-I: A BII-LRPC code-based KEM. 45 - Aein Rezaei Shahmirzadi, Michael Hutter:
Efficient Boolean-to-Arithmetic Mask Conversion in Hardware. 46 - Avishek Majumder, Sayantan Mukherjee:
Reinventing BrED: A Practical Construction: Formal Treatment of Broadcast Encryption with Dealership. 47 - Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu:
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH. 48
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.