default search action
IACR Communications in Cryptology, Volume 1
Volume 1, Number 1, 2024
- Keewoo Lee:
Bit Security as Cost to Demonstrate Advantage. 1 - Benjamin E. Diamond, Jim Posen:
Proximity Testing with Logarithmic Randomness. 2 - Akira Takahashi, Greg Zaverucha:
Verifiable Encryption from MPC-in-the-Head. 3 - Loïs Huguenin-Dumittan, Serge Vaudenay:
Impossibility of Post-Quantum Shielding Black-Box Constructions of CCA from CPA. 4 - Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers:
Optimizations and Practicality of High-Security CSIDH. 5 - Marloes Venema, Leon Botros:
Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures. 6 - Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation. 7 - Keita Xagawa:
On the Efficiency of Generic, Quantum Cryptographic Constructions. 8 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López:
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs. 9 - Thomas Pornin:
A Prime-Order Group with Complete Formulas from Even-Order Elliptic Curves. 10 - Mustafa Khairallah:
CCA Security with Short AEAD Tags. 11 - Benjamin Wesolowski:
Computing isogenies between finite Drinfeld modules. 12 - Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers. 13 - Daniel J. Bernstein:
Understanding binary-Goppa decoding. 14 - Emmanuela Orsini, Riccardo Zanotto:
Simple Two-Message OT in the Explicit Isogeny Model. 15 - Yi-Hsiu Chen, Yehuda Lindell:
Feldman's Verifiable Secret Sharing for a Dishonest Majority. 16 - Marcel Tiepelt, Christian Martin, Nils Mäurer:
Post-Quantum Ready Key Agreement for Aviation. 17 - Aurélien Dupin, Simon Abelard:
Broadcast Encryption using Sum-Product decomposition of Boolean functions. 18 - Matteo Campanelli, Chaya Ganesh, Rosario Gennaro:
How to Make Rational Arguments Practical and Extractable. 19 - Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira:
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space. 20 - Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karoline Varner, Bas Westerbaan:
X-Wing. 21 - Subhadeep Banik, Andrea Caforio, Serge Vaudenay:
New Attacks on LowMC Using Partial Sets in the Single-Data Setting. 22 - Loïc Demange, Mélissa Rossi:
A provably masked implementation of BIKE Key Encapsulation Mechanism. 23 - Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens:
Verifiable FHE via Lattice-based SNARKs. 24 - Yehuda Lindell:
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability. 25 - Damien Robert, Nicolas Sarkis:
Computing 2-isogenies between Kummer lines. 26 - Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi:
On the Two-sided Permutation Inversion Problem. 27 - Gabrielle De Micheli, Nadia Heninger:
Survey: Recovering cryptographic keys from partial information, by example. 28 - Jules Maire, Damien Vergnaud:
Secure Multi-Party Linear Algebra with Perfect Correctness. 29 - Charles Bouillaguet, Julia Sauvage:
Preliminary Cryptanalysis of the Biscuit Signature Scheme. 30 - Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang:
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation. 31 - Samuel Bouaziz-Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu:
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions. 32
Volume 1, Number 2, 2024
- Vincent Hwang:
A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems. 1 - Gil Segev, Liat Shapira:
An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures. 2 - Ky Nguyen, David Pointcheval, Robert Schädlich:
Decentralized Multi-Client Functional Encryption with Strong Security. 3 - Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, François-Xavier Standaert:
Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue. 4 - Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Sahin, Muhammed Said Gündogan:
Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers? 5 - Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier:
A Comprehensive Survey on Post-Quantum TLS. 6 - Sean Murphy, Rachel Player:
A Central Limit Approach for Ring-LWE Noise Analysis. 7 - Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay:
Compact Key Function Secret Sharing with Non-linear Decoder. 8 - Guilhèm Assael, Philippe Elbaz-Vincent:
Provably Secure and Area-Efficient Modular Addition over Boolean Shares. 9 - Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl:
Communication-Efficient Multi-Party Computation for RMS Programs. 10 - Yi-Hsiu Chen, Yehuda Lindell:
Optimizing and Implementing Fischlin's Transform for UC-Secure Zero Knowledge. 11 - Scott Griffy, Anna Lysyanskaya:
PACIFIC: Privacy-preserving automated contact tracing featuring integrity against cloning. 12 - Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai:
Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom Generators. 13 - Décio Luiz Gazzoni Filho, Tomás S. R. Silva, Julio López:
Efficient isochronous fixed-weight sampling with applications to NTRU. 14 - Ji Luo:
Ad Hoc Broadcast, Trace, and Revoke: Plus Time-Space Trade-Offs for Attribute-Based Encryption. 15 - Qinyi Li, Xavier Boyen:
Public-Key Authenticated Encryption with Keyword Search Made Easy. 16 - Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin:
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers. 17 - Camille Mutschler, Laurent Imbert, Thomas Roche:
Inspector Gadget: A Toolbox for Fair Comparison of Masking Gadgets, Application to Crystals-Kyber Compression. 18 - Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak:
Synchronous Distributed Key Generation without Broadcasts. 19 - Jianhua Wang, Tao Huang, Shuang Wu, Zilong Liu:
Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication. 20 - Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal:
FEDT: Forkcipher-based Leakage-resilient Beyond-birthday-secure AE. 21 - Anis Bkakria, Malika Izabachène:
Efficient Post-Quantum Pattern Matching on Encrypted Data. 22
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.