Journal: IACR Commun. Cryptol.

Volume 2, Issue 2

1 -- 0Arantxa Zapico, Ariel Gabizon, Dmitry Khovratovich, Mary Maller, Carla Ràfols. Baloo: Algebraic Lookup Arguments
2 -- 0Andrew Mendelsohn, Charles Grover, Cong Ling 0001. On the Security of Group Ring Learning with Errors
3 -- 0Anisha Mukherjee, Sujoy Sinha Roy. Revisiting Module Lattice-based Homomorphic Encryption and Application to Secure-MPC
4 -- 0Lucas Piske, Jeroen van de Graaf, Anderson C. A. Nascimento, Ni Trieu. Shared OT and Its Applications
5 -- 0Venkata Koppula, Abhinav Kumar, Mahesh Sreekumar Rajasree, Harihar Swaminathan. Incompressible Encryption Beyond CPA/CCA Security
6 -- 0Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay. Highly Scalable Searchable Symmetric Encryption for Boolean Queries from NTRU Lattice Trapdoors
7 -- 0Dennis Faut, Valerie Fetzer, Jörn Müller-Quade, Markus Raiber, Andy Rupp. POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics
8 -- 0Jean-Philippe Bossuat, Anamaria Costache, Christian Mouchet, Lea Nürnberger, Juan Ramón Troncoso-Pastoriza. Accurate and Composable Noise Estimates for CKKS with Application to Exact HE Computation
9 -- 0Alessandro Budroni, Jesús-Javier Chi-Domínguez, Ermes Franch. Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action
10 -- 0Zehou Wu. Circular Insecure Encryption: from Long Cycles to Short Cycles
11 -- 0Ashwin Jha 0001. On TRP-RF Switch in the Quantum Query Model
12 -- 0Koki Matsui, Shoma Kanzaki, Wakaha Ogata, Keitaro Hashimoto. Round-Optimal Authenticated Key Exchange with Full Forward Privacy
13 -- 0Karim Baghery, Navid Ghaedi Bardeh, Shahram Khazaei, Mahdi Rahimi 0003. On Round-Optimal Computational VSS
14 -- 0Andrea Lesavourey, Kazuhide Fukushima, Thomas Plantard, Arnaud Sipasseuth. Diagonally dominant matrices for cryptography
15 -- 0Deng Tang, Anupam Chattopadhyay, Manmatha Roy, Bimal Mandal, Subhamoy Maitra. Construction of Maiorana-McFarland type cryptographically significant Boolean functions with good implementation properties
16 -- 0Yanbo Chen. Round-Efficient Adaptively Secure Threshold Signatures with Rewinding
17 -- 0Jaehyung Kim 0002, Taeyeong Noh. Modular Reduction in CKKS
18 -- 0Yincen Chen, Qinggan Fu, Ning Zhao, Jiahao Zhao, Ling Song 0001, Qianqian Yang 0003. A Holistic Framework for Impossible Boomerang Attacks
19 -- 0Juliane Krämer, Patrick Struck, Maximiliane Weishäupl. Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC
20 -- 0Daniël M. H. van Gent, Ludo N. Pulles. HAWK: Having Automorphisms Weakens Key
21 -- 0Sébastien Canard, Nathan Papon, Duong Hieu Phan. Public Traceability in Threshold Decryption
22 -- 0Maiara F. Bollauf, Roberto Parisella, Janno Siim. Revisiting Discrete Logarithm Reductions
23 -- 0Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, Pascal Benoit. Cracking the Mask: SASCA Against Local-Masked NTT for CRYSTALS-Kyber
24 -- 0John Kelsey, Nathalie Lang, Stefan Lucks. Turning Hash-Based Signatures into Distributed Signatures and Threshold Signatures: Delegate Your Signing Capability, and Distribute it Among Trustees
25 -- 0Ye Xu, Takashi Nishide. Lattice-based Multi-key Homomorphic Signatures Forward-unforgeable against Signing Key Leakage
26 -- 0Nicolas Vallet, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Vincent Grosso. Optimizing Key Recovery in Classic McEliece: Advanced Error Correction for Noisy Side-Channel Measurements
27 -- 0Shihui Fu. Improved Constant-Sized Polynomial Commitment Schemes Without Trusted Setup
28 -- 0Nilanjan Datta, Avijit Dutta, Sougata Mandal, Hrithik Nandi. Sequential Indifferentiability of STH and EDM
29 -- 0Giacomo Pope, Krijn Reijnders, Damien Robert 0001, Alessandro Sferlazza, Benjamin Smith 0003. Simpler and Faster Pairings from the Montgomery Ladder

Volume 2, Issue 1

1 -- 0Daniele Micciancio. Fully Composable Homomorphic Encryption
2 -- 0Sanjay Bhattacherjee, Julio César Hernández Castro, Jack Moyler. A Greedy Global Framework for Lattice Reduction Using Deep Insertions
3 -- 0Alex B. Grilo, Philippe Lamontagne 0001. The Round Complexity of Proofs in the Bounded Quantum Storage Model
4 -- 0Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, Abdul Rahman Taleb. SoK: A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations
5 -- 0Vipul Goyal, Giulio Malavolta, Bhaskar Roberts. Unconditional Quantum Cryptography with a Bounded Number of Keys
6 -- 0Arthur Herlédan Le Merdy, Benjamin Wesolowski. The supersingular endomorphism ring problem given one endomorphism
7 -- 0Thomas Lavaur, Jérôme Lacan. Boomy: Batch Opening Of Multivariate polYnomial commitment
8 -- 0Jonathan Katz, Antoine Urban. Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures
9 -- 0Kamil Kluczniak, Giacomo Santato. On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption
10 -- 0Alishah Chator, Matthew Green 0001, Pratyush Ranjan Tiwari. SoK: Privacy-Preserving Signatures
11 -- 0Iftach Haitner, Gil Segev 0001. Tighter Concrete Security for the Simplest OT
12 -- 0Ruth Ng, Alexander Hoover 0001, David Cash, Eileen Ee. Structured Encryption for Indirect Addressing
13 -- 0Justin Drake, Dmitry Khovratovich, Mikhail A. Kudinov, Benedikt Wagner. Hash-Based Multi-Signatures for Post-Quantum Ethereum
14 -- 0Lior Rotem. Goldreich-Krawczyk Revisited: A Note on the Zero Knowledge of Proofs of Knowledge
15 -- 0Christophe Levrat, Tanguy Medevielle, Jade Nardi. A divide-and-conquer sumcheck protocol
16 -- 0Gil Segev 0001. Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension
17 -- 0Quentin Edme, Pierre-Alain Fouque, André Schrottenloher. Faster Quantum Algorithms for MQ2 and Applications
18 -- 0Victor Shoup. The many faces of Schnorr: a toolkit for the modular design of threshold Schnorr signatures
19 -- 0Falko Strenzke, Johannes Roth. Legacy Encryption Downgrade Attacks against LibrePGP and CMS
20 -- 0Chris Brzuska, Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, Renaud Sirdey. Relations Among New CCA Security Notions for Approximate FHE
21 -- 0Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, Radu Titiu. Designs for practical SHE schemes based on Ring-LWR
22 -- 0Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, Saraswathy RV. HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security
23 -- 0Michele Orrù, George Kadianakis, Mary Maller, Greg Zaverucha. Beyond the Circuit: How to minimize foreign arithmetic in ZKP circuits
24 -- 0Chen Lotan, Moni Naor. Adversarially Robust Bloom Filters: Monotonicity and Betting
25 -- 0Kyungbae Jang, Anubhab Baksi, HyunJi Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay. Quantum Analysis of AES
26 -- 0Krishna Sai Tarun Ramapragada, Utsav Banerjee. Fast Plaintext-Ciphertext Matrix Multiplication from Additively Homomorphic Encryption
27 -- 0Chengyu Lin 0001, Zeyu Liu 0004, Peihan Miao 0001, Max Tromanhauser. Finding Balance in Unbalanced PSI: A New Construction from Single-Server PIR
28 -- 0Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay. Fully Collusion Resistant Traceable Identity-Based Inner Product Functional Encryption
29 -- 0Pierrick Méaux, Qingju Wang 0001. Towards a Generalization of the Algebraic Attack on Stream Ciphers: A Study of the Case with Only Extremal-Degree Monomials
30 -- 0David Jacquemin, Anisha Mukherjee, Ahmet Can Mert, Sujoy Sinha Roy. Accelerating Isogeny Walks for VDF Evaluation
31 -- 0Charles Bouillaguet, Claire Delaplace, Mickaël Hamdad. The May-Ozerov Algorithm for Syndrome Decoding is "Galactic"
32 -- 0Dorian Llavata, Eleonora Cagli, Rémi Eyraud, Vincent Grosso, Lilian Bossuet. Unsupervised Horizontal Attacks against Public-Key Primitives with DCCA: - From Deep Canonical Correlation Analysis to Deep Collision Correlation Attacks -
33 -- 0Martin Ekerå, Joel Gärtner. A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography
34 -- 0Vincent Grosso, François-Xavier Standaert. Algebraic Side-Channel Attacks against ISAP's Re-Keying: one Ascon Round May not be Enough for Serial Implementations
35 -- 0Simon-Philipp Merz, Kenneth G. Paterson, Àlex Rodríguez García. Breaking BASS
36 -- 0Jean Belo Klamti, M. Anwarul Hasan, Koray Karabina. Efficient Methods for Simultaneous Homomorphic Inversion
37 -- 0Sonu Jha, Shun Li 0004, Danilo Gligoroski. Construction of Hadamard-based MixColumns Matrices Resistant to Related-Differential Cryptanalysis
38 -- 0Zachary Espiritu, Seny Kamara, Tarik Moataz. Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Cryptography
39 -- 0Sonia Belaïd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphné Trama, Nicolas Ye. Further Improvements in AES Execution over TFHE
40 -- 0Viet Sang Nguyen, Vincent Grosso, Pierre-Louis Cayrel. Practical Persistent Fault Attacks on AES with Instruction Skip