Journal: J. Cryptology

Volume 36, Issue 4

32 -- 0Song Tian. Cover Attacks for Elliptic Curves over Cubic Extension Fields
33 -- 0Yuyu Wang 0001, Jiaxin Pan, Yu Chen 0003. Fine-Grained Secure Attribute-Based Encryption
34 -- 0Raine Nieminen, Thomas Schneider 0003. Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires
35 -- 0Marten van Dijk, Chenglu Jin. A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model
36 -- 0Thomas Attema, Serge Fehr, Michael Klooß. Fiat-Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)
37 -- 0Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan. Compact Structure-Preserving Signatures with Almost Tight Security
38 -- 0Valence Cristiani, Maxime Lecomte, Philippe Maurine. Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs
39 -- 0Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran. Topology-Hiding Communication from Minimal Assumptions
40 -- 0Lior Rotem, Gil Segev 0001. Non-malleable Vector Commitments via Local Equivocability
41 -- 0Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez. Rinocchio: SNARKs for Ring Arithmetic

Volume 36, Issue 3

15 -- 0Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Daniel Genkin, Yehuda Lindell, Ariel Nof. Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
16 -- 0Ananya Appan, Anirudh Chandramouli, Ashish Choudhury. Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries
17 -- 0Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie. I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups
18 -- 0Murilo Coutinho, Iago Passos, Juan C. Grados Vásquez, Santanu Sarkar 0001, Fábio L. L. Mendonça, Rafael Timóteo de Sousa Jr., Fábio Borges. Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró
19 -- 0Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta. Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning
20 -- 0Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubácek. Must the Communication Graph of MPC Protocols be an Expander?
21 -- 0Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Or Weinstein. High-Throughput Secure Three-Party Computation with an Honest Majority
22 -- 0Nishat Koti, Shravani Mahesh Patil, Arpita Patra, Ajith Suresh. MPClan: Protocol Suite for Privacy-Conscious Computations
23 -- 0Benoît Libert, San Ling, Khoa Nguyen 0002, Huaxiong Wang. Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors
24 -- 0Bar Alon, Eran Omri. Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
25 -- 0Bar Alon, Ran Cohen, Eran Omri, Tom Suad. On the Power of an Honest Majority in Three-Party Computation Without Broadcast
26 -- 0Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model
27 -- 0Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta. Candidate iO from Homomorphic Encryption Schemes
28 -- 0Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap. Parameter Optimization and Larger Precision for (T)FHE
29 -- 0Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal. Unbounded Predicate Inner Product Functional Encryption from Pairings
31 -- 0Mariya Georgieva Belorgey, Sergiu Carpov, Kevin Deforth, Dimitar Jetchev, Abson Sae-Tang, Marius Vuille, Nicolas Gama, Jonathan Katz, Iraklis Leontiadis, Mohsen Mohammadi. Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic

Volume 36, Issue 2

4 -- 0David Pointcheval, Nigel P. Smart. Topical Collection on Computing on Encrypted Data
5 -- 0Benny Applebaum, Yoni Moses. Correction: Locally Computable UOWHF with Linear Shrinkage
6 -- 0Pratish Datta, Ilan Komargodski, Brent Waters. 1 from BDH
7 -- 0Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi. Oblivious RAM with Worst-Case Logarithmic Overhead
8 -- 0Jonathan Takeshita, Ryan Karl, Ting Gong, Taeho Jung. SLAP: Simpler, Improved Private Stream Aggregation from Ring Learning with Errors
9 -- 0Susumu Kiyoshima. No-Signaling Linear PCPs
10 -- 0Christian Mouchet, Elliott Bertrand, Jean-Pierre Hubaux. An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption
11 -- 0Ran Cohen, Abhi Shelat, Daniel Wichs. Adaptively Secure MPC with Sublinear Communication Complexity
12 -- 0Robin Geelen, Frederik Vercauteren. Bootstrapping for BGV and BFV Revisited
13 -- 0Ashish Choudhury, Arpita Patra. On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience
14 -- 0Fuyuki Kitagawa, Takahiro Matsuda 0002, Takashi Yamakawa. NIZK from SNARGs

Volume 36, Issue 1

1 -- 0Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen. On the Hardness of Module Learning with Errors with Short Distributions
3 -- 0Yunwen Liu, Zhongfeng Niu, Siwei Sun, Chao Li 0002, Lei Hu. Rotational Differential-Linear Cryptanalysis Revisited