1 | -- | 0 | Daniele Micciancio. Fully Composable Homomorphic Encryption |
2 | -- | 0 | Sanjay Bhattacherjee, Julio César Hernández Castro, Jack Moyler. A Greedy Global Framework for Lattice Reduction Using Deep Insertions |
3 | -- | 0 | Alex B. Grilo, Philippe Lamontagne 0001. The Round Complexity of Proofs in the Bounded Quantum Storage Model |
4 | -- | 0 | Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, Abdul Rahman Taleb. SoK: A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations |
5 | -- | 0 | Vipul Goyal, Giulio Malavolta, Bhaskar Roberts. Unconditional Quantum Cryptography with a Bounded Number of Keys |
6 | -- | 0 | Arthur Herlédan Le Merdy, Benjamin Wesolowski. The supersingular endomorphism ring problem given one endomorphism |
7 | -- | 0 | Thomas Lavaur, Jérôme Lacan. Boomy: Batch Opening Of Multivariate polYnomial commitment |
8 | -- | 0 | Jonathan Katz, Antoine Urban. Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures |
9 | -- | 0 | Kamil Kluczniak, Giacomo Santato. On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption |
10 | -- | 0 | Alishah Chator, Matthew Green 0001, Pratyush Ranjan Tiwari. SoK: Privacy-Preserving Signatures |
11 | -- | 0 | Iftach Haitner, Gil Segev 0001. Tighter Concrete Security for the Simplest OT |
12 | -- | 0 | Ruth Ng, Alexander Hoover 0001, David Cash, Eileen Ee. Structured Encryption for Indirect Addressing |
13 | -- | 0 | Justin Drake, Dmitry Khovratovich, Mikhail A. Kudinov, Benedikt Wagner. Hash-Based Multi-Signatures for Post-Quantum Ethereum |
14 | -- | 0 | Lior Rotem. Goldreich-Krawczyk Revisited: A Note on the Zero Knowledge of Proofs of Knowledge |
15 | -- | 0 | Christophe Levrat, Tanguy Medevielle, Jade Nardi. A divide-and-conquer sumcheck protocol |
16 | -- | 0 | Gil Segev 0001. Bulletproofs for R1CS: Bridging the Completeness-Soundness Gap and a ZK Extension |
17 | -- | 0 | Quentin Edme, Pierre-Alain Fouque, André Schrottenloher. Faster Quantum Algorithms for MQ2 and Applications |
18 | -- | 0 | Victor Shoup. The many faces of Schnorr: a toolkit for the modular design of threshold Schnorr signatures |
19 | -- | 0 | Falko Strenzke, Johannes Roth. Legacy Encryption Downgrade Attacks against LibrePGP and CMS |
20 | -- | 0 | Chris Brzuska, Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, Renaud Sirdey. Relations Among New CCA Security Notions for Approximate FHE |
21 | -- | 0 | Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, Radu Titiu. Designs for practical SHE schemes based on Ring-LWR |
22 | -- | 0 | Aloni Cohen, David Bruce Cousins, Nicholas Genise, Erik Kline, Yuriy Polyakov, Saraswathy RV. HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security |
23 | -- | 0 | Michele Orrù, George Kadianakis, Mary Maller, Greg Zaverucha. Beyond the Circuit: How to minimize foreign arithmetic in ZKP circuits |
24 | -- | 0 | Chen Lotan, Moni Naor. Adversarially Robust Bloom Filters: Monotonicity and Betting |
25 | -- | 0 | Kyungbae Jang, Anubhab Baksi, HyunJi Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay. Quantum Analysis of AES |
26 | -- | 0 | Krishna Sai Tarun Ramapragada, Utsav Banerjee. Fast Plaintext-Ciphertext Matrix Multiplication from Additively Homomorphic Encryption |
27 | -- | 0 | Chengyu Lin 0001, Zeyu Liu 0004, Peihan Miao 0001, Max Tromanhauser. Finding Balance in Unbalanced PSI: A New Construction from Single-Server PIR |
28 | -- | 0 | Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay. Fully Collusion Resistant Traceable Identity-Based Inner Product Functional Encryption |
29 | -- | 0 | Pierrick Méaux, Qingju Wang 0001. Towards a Generalization of the Algebraic Attack on Stream Ciphers: A Study of the Case with Only Extremal-Degree Monomials |
30 | -- | 0 | David Jacquemin, Anisha Mukherjee, Ahmet Can Mert, Sujoy Sinha Roy. Accelerating Isogeny Walks for VDF Evaluation |
31 | -- | 0 | Charles Bouillaguet, Claire Delaplace, Mickaël Hamdad. The May-Ozerov Algorithm for Syndrome Decoding is "Galactic" |
32 | -- | 0 | Dorian Llavata, Eleonora Cagli, Rémi Eyraud, Vincent Grosso, Lilian Bossuet. Unsupervised Horizontal Attacks against Public-Key Primitives with DCCA: - From Deep Canonical Correlation Analysis to Deep Collision Correlation Attacks - |
33 | -- | 0 | Martin Ekerå, Joel Gärtner. A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography |
34 | -- | 0 | Vincent Grosso, François-Xavier Standaert. Algebraic Side-Channel Attacks against ISAP's Re-Keying: one Ascon Round May not be Enough for Serial Implementations |
35 | -- | 0 | Simon-Philipp Merz, Kenneth G. Paterson, Àlex Rodríguez García. Breaking BASS |
36 | -- | 0 | Jean Belo Klamti, M. Anwarul Hasan, Koray Karabina. Efficient Methods for Simultaneous Homomorphic Inversion |
37 | -- | 0 | Sonu Jha, Shun Li 0004, Danilo Gligoroski. Construction of Hadamard-based MixColumns Matrices Resistant to Related-Differential Cryptanalysis |
38 | -- | 0 | Zachary Espiritu, Seny Kamara, Tarik Moataz. Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Cryptography |
39 | -- | 0 | Sonia Belaïd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphné Trama, Nicolas Ye. Further Improvements in AES Execution over TFHE |
40 | -- | 0 | Viet Sang Nguyen, Vincent Grosso, Pierre-Louis Cayrel. Practical Persistent Fault Attacks on AES with Instruction Skip |