CINXE.COM

All Papers

<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <link href="/css/bootstrap/css/bootstrap.min.css" rel="stylesheet"> <script src="/css/bootstrap/js/bootstrap.bundle.min.js"></script> <title>All Papers</title> <link rel="stylesheet" href="/css/iacrcc.css"> <link rel="icon" type="image/png" href="/favicon.ico"> </head> <body> <noscript> <h1 class="text-center">What a lovely hat</h1> <h4 class="text-center">Is it made out of <a href="https://iacr.org/tinfoil.html">tin foil</a>?</h4> </noscript> <div class="pageTop d-flex justify-content-md-around justify-content-between align-items-center"> <a href="https://iacr.org"><img id="logo" class="d-none d-lg-block ms-5" src="/images/iacrlogo_small.png" title="International Association for Cryptologic Research" alt="IACR logo"></a> <span class="headerTitle d-none d-md-block">Communications in Cryptology</span> <span class="headerTitle d-md-none">IACR CiC</span> <div class="dropdown ps-lg-2 me-5"> <button class="btn border-0" type="button" id="dropdownMenuButton1" data-bs-toggle="dropdown" aria-expanded="true"> <img src="/images/search.svg" class="searchIcon" alt="Search Button" style="width:33px;"> </button> <div id="searchDd" class="dropdown-menu dropdown-menu-end bg-transparent border-0" aria-labelledby="dropdownMenuButton1" data-bs-popper="none"> <form action="/search" method="GET" class="me-3"> <div class="input-group"> <input id="searchbox" name="q" type="search" class="form-control shadow-none" autocomplete="off" > <input type="hidden" name="d" value="/var/www/wsgi/cicjournal/webapp/search_index/xapian.db"> <button class="btn btn-outline-dark border border-dark input-group-append"> Search </button> </div> </form> <div id="results" class="bg-light"></div> </div> </div> </div> <nav id="sitenav" class="navbar navbar-expand-md"> <div class="container"> <button class="navbar-toggler" type="button" data-bs-toggle="collapse" data-bs-target="#collapseContent" aria-controls="collapseContent" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="collapse navbar-collapse" id="collapseContent"> <ul class="navbar-nav nav-fill w-100 justify-content-between"> <li class="nav-item"> <a class="nav-link active" aria-current="page" href="/">Home</a> </li> <li class="nav-item"> <a class="nav-link" href="/contents">Papers</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" role="button" data-bs-toggle="dropdown" aria-expanded="false"> Submissions </a> <ul class="dropdown-menu ms-3 ms-lg-5"> <li><a class="dropdown-item" href="/callforpapers">Call for papers</a></li> <li><a class="dropdown-item" href="/ethics">Publication ethics</a></li> <li><a class="dropdown-item" href="/irregular">Irregular submissions</a></li> <li><a class="dropdown-item" href="/conflicts">Conflict of interest</a></li> <li><a class="dropdown-item" href="/retraction">Retraction policy</a></li> </ul> </li> <li class="nav-item"> <a class="nav-link" href="/faq">FAQ</a> </li> <li class="nav-item"> <a class="nav-link" href="/contact">Contact</a> </li> <li class="nav-item"> <a class="nav-link" href="/board">Editorial board</a> </li> <li class="nav-item dropdown"> <a href="#" class="ms-md-5 nav-link dropdown-toggle" data-bs-toggle="dropdown"><img alt="Login" src="/images/user.svg"></a> <ul class="dropdown-menu"> <li><a href="/login" class="dropdown-item">Admin login</a></li> </ul> </li> </ul> </div> </div> </nav> <main id="mainContent" class="container"> <div class="row mt-3"> <div class="col-md-7 col-12 order-last order-md-first"> <h3 class="mb-3">All papers</h3> <h4 id="issue-1-1">Volume 1, Issue 1</h4> <p> <strong><a href="/p/1/1/8">On the Efficiency of Generic, Quantum Cryptographic Constructions</a></strong> <br><span class="fst-italic">Keita Xagawa</span> </p> <p> <strong><a href="/p/1/1/4">Impossibility of Post-Quantum Shielding Black-Box Constructions of CCA from CPA</a></strong> <br><span class="fst-italic">Loïs Huguenin-Dumittan, Serge Vaudenay</span> </p> <p> <strong><a href="/p/1/1/9">Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs</a></strong> <br><span class="fst-italic">Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López</span> </p> <p> <strong><a href="/p/1/1/2">Proximity Testing with Logarithmic Randomness</a></strong> <br><span class="fst-italic">Benjamin E. Diamond, Jim Posen</span> </p> <p> <strong><a href="/p/1/1/6">Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures</a></strong> <br><span class="fst-italic">Marloes Venema, Leon Botros</span> </p> <p> <strong><a href="/p/1/1/3">Verifiable Encryption from MPC-in-the-Head</a></strong> <br><span class="fst-italic">Akira Takahashi, Greg Zaverucha</span> </p> <p> <strong><a href="/p/1/1/7">A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation</a></strong> <br><span class="fst-italic">Dan Boneh, Benedikt Bünz, Ben Fisch</span> </p> <p> <strong><a href="/p/1/1/5">Optimizations and Practicality of High-Security CSIDH</a></strong> <br><span class="fst-italic">Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers</span> </p> <p> <strong><a href="/p/1/1/1">Bit Security as Cost to Demonstrate Advantage</a></strong> <br><span class="fst-italic">Keewoo Lee</span> </p> <p> <strong><a href="/p/1/1/10">A Prime-Order Group with Complete Formulas from Even-Order Elliptic Curves</a></strong> <br><span class="fst-italic">Thomas Pornin</span> </p> <p> <strong><a href="/p/1/1/11">CCA Security with Short AEAD Tags</a></strong> <br><span class="fst-italic">Mustafa Khairallah</span> </p> <p> <strong><a href="/p/1/1/12">Computing isogenies between finite Drinfeld modules</a></strong> <br><span class="fst-italic">Benjamin Wesolowski</span> </p> <p> <strong><a href="/p/1/1/13">Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers</a></strong> <br><span class="fst-italic">Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin</span> </p> <p> <strong><a href="/p/1/1/14">Understanding binary-Goppa decoding</a></strong> <br><span class="fst-italic">Daniel J. Bernstein</span> </p> <p> <strong><a href="/p/1/1/15">Simple Two-Message OT in the Explicit Isogeny Model</a></strong> <br><span class="fst-italic">Emmanuela Orsini, Riccardo Zanotto</span> </p> <p> <strong><a href="/p/1/1/16">Feldman&#39;s Verifiable Secret Sharing for a Dishonest Majority</a></strong> <br><span class="fst-italic">Yi-Hsiu Chen, Yehuda Lindell</span> </p> <p> <strong><a href="/p/1/1/17">Post-Quantum Ready Key Agreement for Aviation</a></strong> <br><span class="fst-italic">Marcel Tiepelt, Christian Martin, Nils Maeurer</span> </p> <p> <strong><a href="/p/1/1/18">Broadcast Encryption using Sum-Product decomposition of Boolean functions</a></strong> <br><span class="fst-italic">Aurélien Dupin, Simon Abelard</span> </p> <p> <strong><a href="/p/1/1/19">How to Make Rational Arguments Practical and Extractable</a></strong> <br><span class="fst-italic">Matteo Campanelli, Chaya Ganesh, Rosario Gennaro</span> </p> <p> <strong><a href="/p/1/1/20">Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space</a></strong> <br><span class="fst-italic">Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira</span> </p> <p> <strong><a href="/p/1/1/21">X-Wing The Hybrid KEM You&#39;ve Been Looking For</a></strong> <br><span class="fst-italic">Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karolin Varner, Bas Westerbaan</span> </p> <p> <strong><a href="/p/1/1/22">New Attacks on LowMC Using Partial Sets in the Single-Data Setting</a></strong> <br><span class="fst-italic">Subhadeep Banik, Andrea Caforio, Serge Vaudenay</span> </p> <p> <strong><a href="/p/1/1/23">A provably masked implementation of BIKE Key Encapsulation Mechanism</a></strong> <br><span class="fst-italic">Loïc Demange, Mélissa Rossi</span> </p> <p> <strong><a href="/p/1/1/24">Verifiable FHE via Lattice-based SNARKs</a></strong> <br><span class="fst-italic">Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens</span> </p> <p> <strong><a href="/p/1/1/25">Simple Three-Round Multiparty Schnorr Signing with Full Simulatability</a></strong> <br><span class="fst-italic">Yehuda Lindell</span> </p> <p> <strong><a href="/p/1/1/26">Computing 2-isogenies between Kummer lines</a></strong> <br><span class="fst-italic">Damien Robert, Nicolas Sarkis</span> </p> <p> <strong><a href="/p/1/1/27">On the Two-sided Permutation Inversion Problem</a></strong> <br><span class="fst-italic">Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi</span> </p> <p> <strong><a href="/p/1/1/28">Survey: Recovering cryptographic keys from partial information, by example</a></strong> <br><span class="fst-italic">Gabrielle De Micheli, Nadia Heninger</span> </p> <p> <strong><a href="/p/1/1/29">Secure Multi-Party Linear Algebra with Perfect Correctness</a></strong> <br><span class="fst-italic">Jules Maire, Damien Vergnaud</span> </p> <p> <strong><a href="/p/1/1/30">Preliminary Cryptanalysis of the Biscuit Signature Scheme</a></strong> <br><span class="fst-italic">Charles Bouillaguet, Julia Sauvage</span> </p> <p> <strong><a href="/p/1/1/31">New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation</a></strong> <br><span class="fst-italic">Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang</span> </p> <p> <strong><a href="/p/1/1/32">Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions</a></strong> <br><span class="fst-italic">Samuel Bouaziz–Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu</span> </p> <hr class="my-4"> <h4 id="issue-1-2">Volume 1, Issue 2</h4> <p> <strong><a href="/p/1/2/1">A Survey of Polynomial Multiplications for Lattice-Based Cryptosystems</a></strong> <br><span class="fst-italic">Vincent Hwang</span> </p> <p> <strong><a href="/p/1/2/2">An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures</a></strong> <br><span class="fst-italic">Gil Segev, Liat Shapira</span> </p> <p> <strong><a href="/p/1/2/3">Decentralized Multi-Client Functional Encryption with Strong Security</a></strong> <br><span class="fst-italic">Ky Nguyen, David Pointcheval, Robert Schädlich</span> </p> <p> <strong><a href="/p/1/2/4">Randomness Generation for Secure Hardware Masking – Unrolled Trivium to the Rescue</a></strong> <br><span class="fst-italic">Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, François-Xavier Standaert</span> </p> <p> <strong><a href="/p/1/2/5">Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?</a></strong> <br><span class="fst-italic">Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan</span> </p> <p> <strong><a href="/p/1/2/6">A Comprehensive Survey on Post-Quantum TLS</a></strong> <br><span class="fst-italic">Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier</span> </p> <p> <strong><a href="/p/1/2/7">A Central Limit Approach for Ring-LWE Noise Analysis</a></strong> <br><span class="fst-italic">Sean Murphy, Rachel Player</span> </p> <p> <strong><a href="/p/1/2/8">Compact Key Function Secret Sharing with Non-linear Decoder</a></strong> <br><span class="fst-italic">Chandan Kumar, Sikhar Patranabis, Debdeep Mukhopadhyay</span> </p> <p> <strong><a href="/p/1/2/9">Provably Secure and Area-Efficient Modular Addition over Boolean Shares</a></strong> <br><span class="fst-italic">Guilhèm Assael, Philippe Elbaz-Vincent</span> </p> <p> <strong><a href="/p/1/2/10">Communication-Efficient Multi-Party Computation for RMS Programs</a></strong> <br><span class="fst-italic">Thomas Attema, Aron van Baarsen, Stefan van den Berg, Pedro Capitão, Vincent Dunning, Lisa Kohl</span> </p> <p> <strong><a href="/p/1/2/11">Optimizing and Implementing Fischlin&#39;s Transform for UC-Secure Zero Knowledge</a></strong> <br><span class="fst-italic">Yi-Hsiu Chen, Yehuda Lindell</span> </p> <p> <strong><a href="/p/1/2/12">PACIFIC Privacy-preserving automated contact tracing featuring integrity against cloning</a></strong> <br><span class="fst-italic">Scott Griffy, Anna Lysyanskaya</span> </p> <p> <strong><a href="/p/1/2/13">Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom Generators</a></strong> <br><span class="fst-italic">Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai</span> </p> <p> <strong><a href="/p/1/2/14">Efficient isochronous fixed-weight sampling with applications to NTRU</a></strong> <br><span class="fst-italic">Décio Luiz Gazzoni Filho, Tomás S. R. Silva, Julio López</span> </p> <p> <strong><a href="/p/1/2/15">Ad Hoc Broadcast, Trace, and Revoke Plus Time-Space Trade-Offs for Attribute-Based Encryption</a></strong> <br><span class="fst-italic">Ji Luo</span> </p> <p> <strong><a href="/p/1/2/16">Public-Key Authenticated Encryption with Keyword Search Made Easy</a></strong> <br><span class="fst-italic">Qinyi Li, Xavier Boyen</span> </p> <p> <strong><a href="/p/1/2/17">A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers</a></strong> <br><span class="fst-italic">Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin</span> </p> <p> <strong><a href="/p/1/2/18">Inspector Gadget</a></strong> <br><span class="fst-italic">Camille Mutschler, Laurent Imbert, Thomas Roche</span> </p> <p> <strong><a href="/p/1/2/19">Synchronous Distributed Key Generation without Broadcasts</a></strong> <br><span class="fst-italic">Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak</span> </p> <p> <strong><a href="/p/1/2/20">Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication</a></strong> <br><span class="fst-italic">Jianhua Wang, Tao Huang, Shuang Wu, Zilong Liu</span> </p> <p> <strong><a href="/p/1/2/21">FEDT: Forkcipher-based Leakage-resilient Beyond-birthday-secure AE</a></strong> <br><span class="fst-italic">Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal</span> </p> <p> <strong><a href="/p/1/2/22">Efficient Post-Quantum Pattern Matching on Encrypted Data</a></strong> <br><span class="fst-italic">Anis Bkakria, Malika Izabachène</span> </p> <hr class="my-4"> <h4 id="issue-1-3">Volume 1, Issue 3</h4> <p> <strong><a href="/p/1/3/1">Capybara and Tsubaki: Verifiable Random Functions from Group Actions and Isogenies</a></strong> <br><span class="fst-italic">Yi-Fu Lai</span> </p> <p> <strong><a href="/p/1/3/2">Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting</a></strong> <br><span class="fst-italic">Aron van Baarsen, Marc Stevens</span> </p> <p> <strong><a href="/p/1/3/3">A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level</a></strong> <br><span class="fst-italic">Diego F. Aranha, Georgios Fotiadis, Aurore Guillevic</span> </p> <p> <strong><a href="/p/1/3/4">Block Cipher Doubling for a Post-Quantum World</a></strong> <br><span class="fst-italic">Ritam Bhaumik, André Chailloux, Paul Frixons, Bart Mennink, María Naya-Plasencia</span> </p> <p> <strong><a href="/p/1/3/5">Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications</a></strong> <br><span class="fst-italic">Jonathan Komada Eriksen, Antonin Leroux</span> </p> <p> <strong><a href="/p/1/3/6">Memory adds no cost to lattice sieving for computers in 3 or more spatial dimensions</a></strong> <br><span class="fst-italic">Samuel Jaques</span> </p> <p> <strong><a href="/p/1/3/7">Optimizing $c$-sum BKW and Faster Quantum Variant for LWE</a></strong> <br><span class="fst-italic">Jinzheng Cao, Qingfeng Cheng, Jian Weng</span> </p> <p> <strong><a href="/p/1/3/8">Implicit Factorization with Shared Any Bits</a></strong> <br><span class="fst-italic">Chunzhi Zhao, Junqi Zhang, Jinzheng Cao, Qingfeng Cheng, Fushan Wei</span> </p> <p> <strong><a href="/p/1/3/9">Quantum Procedures for Nested Search Problems with Applications in Cryptanalysis</a></strong> <br><span class="fst-italic">André Schrottenloher, Marc Stevens</span> </p> <p> <strong><a href="/p/1/3/10">Efficient Maliciously Secure Oblivious Exponentiations</a></strong> <br><span class="fst-italic">Carsten Baum, Jens Berlips, Walther Chen, Ivan B. Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu</span> </p> <p> <strong><a href="/p/1/3/11">Truncated multiplication and batch software SIMD AVX512 implementation for faster Montgomery multiplications and modular exponentiation</a></strong> <br><span class="fst-italic">Laurent-Stéphane Didier, Nadia El Mrabet, Léa Glandus, Jean-Marc Robert</span> </p> <p> <strong><a href="/p/1/3/12">Unpacking Needs Protection A Single-Trace Secret Key Recovery Attack on Dilithium</a></strong> <br><span class="fst-italic">Ruize Wang, Kalle Ngo, Joel Gärtner, Elena Dubrova</span> </p> <p> <strong><a href="/p/1/3/13">Improving Differential-Neural Cryptanalysis</a></strong> <br><span class="fst-italic">Liu Zhang, Zilong Wang, Baocang Wang</span> </p> <p> <strong><a href="/p/1/3/14">Side-Channel Linearization Attack on Unrolled Trivium Hardware</a></strong> <br><span class="fst-italic">Soichiro Kobayashi, Rei Ueno, Yosuke Todo, Naofumi Homma</span> </p> <p> <strong><a href="/p/1/3/15">FINALLY: A Multi-Key FHE Scheme Based on NTRU and LWE</a></strong> <br><span class="fst-italic">Jeongeun Park, Barry van Leeuwen, Oliver Zajonc</span> </p> <p> <strong><a href="/p/1/3/16">Unforgeability of Blind Schnorr in the Limited Concurrency Setting</a></strong> <br><span class="fst-italic">Franklin Harding, Jiayu Xu</span> </p> <p> <strong><a href="/p/1/3/17">Cryptanalysis of TS-Hash</a></strong> <br><span class="fst-italic">Aleksei Udovenko</span> </p> <p> <strong><a href="/p/1/3/18">Uncloneable Quantum Advice</a></strong> <br><span class="fst-italic">Anne Broadbent, Martti Karvonen, Sébastien Lord</span> </p> <p> <strong><a href="/p/1/3/19">Non-interactive Private Multivariate Function Evaluation using Homomorphic Table Lookup</a></strong> <br><span class="fst-italic">Ruixiao Li, Hayato Yamana</span> </p> <p> <strong><a href="/p/1/3/20">Plaintext-based Side-channel Collision Attack</a></strong> <br><span class="fst-italic">Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek</span> </p> <p> <strong><a href="/p/1/3/21">The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber</a></strong> <br><span class="fst-italic">Qian Guo, Erik Mårtensson, Adrian Åström</span> </p> <p> <strong><a href="/p/1/3/22">Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash</a></strong> <br><span class="fst-italic">Debasmita Chakraborty, Mridul Nandi</span> </p> <p> <strong><a href="/p/1/3/23">Discrete Logarithm Factory</a></strong> <br><span class="fst-italic">Haetham Al Aswad, Emmanuel Thomé, Cécile Pierrot</span> </p> <p> <strong><a href="/p/1/3/24">Matching radar signals and fingerprints with MPC</a></strong> <br><span class="fst-italic">Benjamin Hansen Mortensen, Mathias Karsrud Nordal, Martin Strand</span> </p> <p> <strong><a href="/p/1/3/25">Special Soundness Revisited</a></strong> <br><span class="fst-italic">Douglas Wikström</span> </p> <p> <strong><a href="/p/1/3/26">Special Soundness in the Random Oracle Model</a></strong> <br><span class="fst-italic">Douglas Wikström</span> </p> <p> <strong><a href="/p/1/3/27">A Note on Related-Tweakey Impossible Differential Attacks</a></strong> <br><span class="fst-italic">Xavier Bonnetain, Virginie Lallemand</span> </p> <p> <strong><a href="/p/1/3/28">Multi Designated Verifier Ring Signatures</a></strong> <br><span class="fst-italic">Sebastian Kolby, Elena Pagnin, Sophia Yakoubov</span> </p> <p> <strong><a href="/p/1/3/29">Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA</a></strong> <br><span class="fst-italic">Yansong Feng, Abderrahmane Nitaj, Yanbin Pan</span> </p> <p> <strong><a href="/p/1/3/30">Constant-Round YOSO MPC Without Setup</a></strong> <br><span class="fst-italic">Sebastian Kolby, Divya Ravi, Sophia Yakoubov</span> </p> <p> <strong><a href="/p/1/3/31">The Uber-Knowledge Assumption: A Bridge to the AGM</a></strong> <br><span class="fst-italic">Balthazar Bauer, Pooya Farshim, Patrick Harasser, Markulf Kohlweiss</span> </p> <p> <strong><a href="/p/1/3/32">Almost pairwise independence and resilience to deep learning attacks</a></strong> <br><span class="fst-italic">Rustem Takhanov</span> </p> <p> <strong><a href="/p/1/3/33">A Security Analysis of Restricted Syndrome Decoding Problems</a></strong> <br><span class="fst-italic">Ward Beullens, Pierre Briaud, Morten Øygarden</span> </p> <p> <strong><a href="/p/1/3/34">Key Rank Estimation Methods: Comparisons and Practical Considerations</a></strong> <br><span class="fst-italic">Rebecca Hay, Elisabeth Oswald</span> </p> <p> <strong><a href="/p/1/3/35">Efficiently Detecting Masking Flaws in Software Implementations</a></strong> <br><span class="fst-italic">Nima Mahdion, Elisabeth Oswald</span> </p> <p> <strong><a href="/p/1/3/36">An analysis of the Crossbred Algorithm for the MQ Problem</a></strong> <br><span class="fst-italic">Damien Vidal, Claire Delaplace, Sorina Ionica</span> </p> <p> <strong><a href="/p/1/3/37">Revisiting the Slot-to-Coefficient Transformation for BGV and BFV</a></strong> <br><span class="fst-italic">Robin Geelen</span> </p> <p> <strong><a href="/p/1/3/38">Efficient Algorithm for Generating Optimal Inequality Candidates for MILP Modeling of Boolean Functions</a></strong> <br><span class="fst-italic">Alexander Bille, Elmar Tischhauser</span> </p> <p> <strong><a href="/p/1/3/39">Finding Practical Parameters for Isogeny-based Cryptography</a></strong> <br><span class="fst-italic">Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Francisco Rodríguez-Henríquez</span> </p> <p> <strong><a href="/p/1/3/40">Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge</a></strong> <br><span class="fst-italic">Ida Bruhns, Sebastian Berndt, Jonas Sander, Thomas Eisenbarth</span> </p> <p> <strong><a href="/p/1/3/41">Leakage Model-flexible Deep Learning-based Side-channel Analysis</a></strong> <br><span class="fst-italic">Lichao Wu, Azade Rezaeezade, Amir Ali-pour, Guilherme Perin, Stjepan Picek</span> </p> <p> <strong><a href="/p/1/3/42">Tweakable ForkCipher from Ideal Block Cipher</a></strong> <br><span class="fst-italic">Sougata Mandal</span> </p> <p> <strong><a href="/p/1/3/43">Attacking trapdoors from matrix products</a></strong> <br><span class="fst-italic">Thomas Decru, Tako Boris Fouotsa, Paul Frixons, Valerie Gilchrist, Christophe Petit</span> </p> <p> <strong><a href="/p/1/3/44">Information Theoretic Evaluation of Raccoon&#39;s Side-Channel Leakage</a></strong> <br><span class="fst-italic">Dinal Kamel, François-Xavier Standaert, Olivier Bronchain</span> </p> <p> <strong><a href="/p/1/3/45">Analysis of Layered ROLLO-I: A BII-LRPC code-based KEM</a></strong> <br><span class="fst-italic">Seongtaek Chee, Kyung Chul Jeong, Tanja Lange, Nari Lee, Alex Pellegrini, Hansol Ryu</span> </p> <p> <strong><a href="/p/1/3/46">Efficient Boolean-to-Arithmetic Mask Conversion in Hardware</a></strong> <br><span class="fst-italic">Aein Rezaei Shahmirzadi, Michael Hutter</span> </p> <p> <strong><a href="/p/1/3/47">Reinventing BrED: A Practical Construction Formal Treatment of Broadcast Encryption with Dealership</a></strong> <br><span class="fst-italic">Avishek Majumder, Sayantan Mukherjee</span> </p> <p> <strong><a href="/p/1/3/48">Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH</a></strong> <br><span class="fst-italic">Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu</span> </p> <hr class="my-4"> <h4 id="issue-1-4">Volume 1, Issue 4</h4> <p> <strong><a href="/p/1/4/1">Lattice-based Multi-Authority/Client Attribute-based Encryption for Circuits</a></strong> <br><span class="fst-italic">Valerio Cini, Russell W. F. Lai, Ivy K. Y. Woo</span> </p> <p> <strong><a href="/p/1/4/2">Simulation-Secure Threshold PKE from LWE with Polynomial Modulus</a></strong> <br><span class="fst-italic">Daniele Micciancio, Adam Suhl</span> </p> <p> <strong><a href="/p/1/4/3">Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications</a></strong> <br><span class="fst-italic">Nicolas Alhaddad, Mayank Varia, Ziling Yang</span> </p> <p> <strong><a href="/p/1/4/4">Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies</a></strong> <br><span class="fst-italic">Giacomo Borin, Yi-Fu Lai, Antonin Leroux</span> </p> <p> <strong><a href="/p/1/4/5">A New Paradigm for Server-Aided MPC</a></strong> <br><span class="fst-italic">Alessandra Scafuro, Tanner Verber</span> </p> <p> <strong><a href="/p/1/4/6">HELP: Everlasting Privacy through Server-Aided Randomness</a></strong> <br><span class="fst-italic">Yevgeniy Dodis, Jiaxin Guan, Peter Hall, Alison Lin</span> </p> <p> <strong><a href="/p/1/4/7">Fault-tolerant Verifiable Dynamic SSE with Forward and Backward Privacy</a></strong> <br><span class="fst-italic">Bibhas Chandra Das, Nilanjan Datta, Avishek Majumder, Subhabrata Samajder</span> </p> <p> <strong><a href="/p/1/4/8">Proximity Gaps in Interleaved Codes</a></strong> <br><span class="fst-italic">Benjamin E. Diamond, Angus Gruen</span> </p> <p> <strong><a href="/p/1/4/9">Masked Computation of the Floor Function and Its Application to the FALCON Signature</a></strong> <br><span class="fst-italic">Pierre-Augustin Berthet, Justine Paillet, Cédric Tavernier, Lilian Bossuet, Brice Colombier</span> </p> <p> <strong><a href="/p/1/4/10">More Efficient Lattice-Based Electronic Voting from NTRU</a></strong> <br><span class="fst-italic">Patrick Hough, Caroline Sandsbråten, Tjerand Silde</span> </p> <p> <strong><a href="/p/1/4/11">Scaling Lattice Sieves across Multiple Machines</a></strong> <br><span class="fst-italic">Martin R. Albrecht, Joe Rowell</span> </p> <p> <strong><a href="/p/1/4/12">Folding Schemes with Privacy Preserving Selective Verification</a></strong> <br><span class="fst-italic">Joan Boyar, Simon Erfurth</span> </p> <p> <strong><a href="/p/1/4/13">Authenticity in the Presence of Leakage using a Forkcipher</a></strong> <br><span class="fst-italic">Francesco Berti, François-Xavier Standaert, Itamar Levi</span> </p> <p> <strong><a href="/p/1/4/14">A Key-Recovery Attack on a Leaky SeaSign Variant</a></strong> <br><span class="fst-italic">Shai Levin</span> </p> <p> <strong><a href="/p/1/4/15">On Loopy Belief Propagation for SASCAs An Analysis and Empirical Study of the Inference Problem</a></strong> <br><span class="fst-italic">Rishub Nagpal, Gaëtan Cassiers, Robert Primas, Christian Knoll, Franz Pernkopf, Stefan Mangard</span> </p> <p> <strong><a href="/p/1/4/16">Learning with Errors from Nonassociative Algebras</a></strong> <br><span class="fst-italic">Andrew Mendelsohn, Cong Ling</span> </p> <p> <strong><a href="/p/1/4/17">MAYO Key Recovery by Fixing Vinegar Seeds</a></strong> <br><span class="fst-italic">Sönke Jendral, Elena Dubrova</span> </p> <p> <strong><a href="/p/1/4/18">On Quantum Simulation-Soundness</a></strong> <br><span class="fst-italic">Behzad Abdolmaleki, Céline Chevalier, Ehsan Ebrahimi, Giulio Malavolta, Quoc-Huy Vu</span> </p> <p> <strong><a href="/p/1/4/19">Scalable Nonlinear Sequence Generation using Composite Mersenne Product Registers</a></strong> <br><span class="fst-italic">David Gordon, Arman Allahverdi, Simon Abrelat, Anna Hemingway, Adil Farooq, Isabella Smith, Nitya Arora, Allen Ian Chang, Yongyu Qiang, Vincent John Mooney III</span> </p> <p> <strong><a href="/p/1/4/20">Technology-Dependent Synthesis and Optimization of Circuits for Small S-boxes</a></strong> <br><span class="fst-italic">Zihao Wei, Siwei Sun, Fengmei Liu, Lei Hu, Zhiyu Zhang</span> </p> <p> <strong><a href="/p/1/4/21">Cryptography is Rocket Science Analysis of BPSec</a></strong> <br><span class="fst-italic">Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri</span> </p> <p> <strong><a href="/p/1/4/22">On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash</a></strong> <br><span class="fst-italic">Mingyu Liang, Seung Geol Choi, Dana Dachman-Soled, Linsheng Liu, Arkady Yerukhimovich</span> </p> <p> <strong><a href="/p/1/4/23">Building a BBB Pseudorandom Permutation using Lai-Massey Networks</a></strong> <br><span class="fst-italic">Ritam Bhaumik, Mohammad Amin Raeisi</span> </p> <p> <strong><a href="/p/1/4/24">Zero-Knowledge Proofs of Quantumness</a></strong> <br><span class="fst-italic">Duong Hieu Phan, Weiqiang Wen, Xingyu Yan, Jinwei Zheng</span> </p> <p> <strong><a href="/p/1/4/25">Ultra Low-Latency Block Cipher uLBC</a></strong> <br><span class="fst-italic">Guoxiao Liu, Qingyuan Yu, Liyuan Tang, Shihe Ma, Congming Wei, Keting Jia, Lingyue Qin, Xiaoyang Dong, Yantian Shen</span> </p> <p> <strong><a href="/p/1/4/26">Security Guidelines for Implementing Homomorphic Encryption</a></strong> <br><span class="fst-italic">Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee</span> </p> <p> <strong><a href="/p/1/4/27">XorSHAP: Privacy-Preserving Explainable AI for Decision Tree Models</a></strong> <br><span class="fst-italic">Dimitar Jetchev, Marius Vuille</span> </p> <p> <strong><a href="/p/1/4/28">Perfectly Secure Fluid MPC with Abort and Linear Communication Complexity</a></strong> <br><span class="fst-italic">Alexander Bienstock, Daniel Escudero, Antigoni Polychroniadou</span> </p> <p> <strong><a href="/p/1/4/29">Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH</a></strong> <br><span class="fst-italic">Varun Madathil, Alessandra Scafuro, Tanner Verber</span> </p> <p> <strong><a href="/p/1/4/30">A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography</a></strong> <br><span class="fst-italic">Sam Buxbaum, Mohammad Mahmoody</span> </p> <p> <strong><a href="/p/1/4/31">Publicly-Detectable Watermarking for Language Models</a></strong> <br><span class="fst-italic">Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang</span> </p> <p> <strong><a href="/p/1/4/32">On the Key-Commitment Properties of Forkcipher-based AEADs</a></strong> <br><span class="fst-italic">Mostafizar Rahman, Samir Kundu, Takanori Isobe</span> </p> <p> <strong><a href="/p/1/4/33">Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice</a></strong> <br><span class="fst-italic">Kamil Kluczniak</span> </p> <p> <strong><a href="/p/1/4/34">Foundations of Data Availability Sampling</a></strong> <br><span class="fst-italic">Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner</span> </p> <p> <strong><a href="/p/1/4/35">An efficient combination of quantum error correction and authentication</a></strong> <br><span class="fst-italic">Yfke Dulek, Garazi Muguruza, Florian Speelman</span> </p> </div> <div class="col-md-5 col-12 order-first order-md-last"> <h3>All issues</h3> <table class="table"> <thead> <tr><th>Volume</th><th>Issue</th></tr> </thead> <tbody> <tr><td>1</td><td><a href="/i/1/1">1 (32 papers)</a></td></tr> <tr><td>1</td><td><a href="/i/1/2">2 (22 papers)</a></td></tr> <tr><td>1</td><td><a href="/i/1/3">3 (48 papers)</a></td></tr> <tr><td>1</td><td><a href="/i/1/4">4 (35 papers)</a></td></tr> </tbody> </table> </div> </div> </main> <div class="container-fluid mt-auto" id="pageFooter"> </div> <footer class="text-center footer py-3"> <small> <a href="https://iacr.org/copyright.html">Copyright © 2025</a> <span class="d-none d-md-inline">by the </span><span class="d-md-none">IACR</span> <span class="d-none d-md-inline">International Association for Cryptologic Research</span> <span class="d-none d-md-inline">• </span><br class="d-md-none"> <a href="https://iacr.org/privacy.html">Privacy Policy</a> </small> </footer> <script id="results-template" type="text/x-handlebars-template"> <div class="p-3 shadow" style="margin-bottom:1rem;max-height:70vh;overflow-y:scroll"> <p>{{estimated_results}} results (if more than 100, then refine your query)</p> <ol> {{#each results}} <li role="presentation"><a href="{{url}}">{{title}}</a><br> {{#each authors }}{{this}}{{#unless @last}}, {{/unless}}{{/each}}</li> {{/each}} </ol> </div> </script> <script src="/static/js/handlebars-v4.7.7.js"></script> <script> var theTemplateScript = document.getElementById('results-template').innerHTML; var resultsTemplate = Handlebars.compile(theTemplateScript); var textinput = document.getElementById('searchbox'); // Returns a function, that, as long as it continues to be invoked, will not // be triggered. The function will be called after it stops being called for // N milliseconds. If `immediate` is passed, trigger the function on the // leading edge, instead of the trailing. function debounce(func, wait, immediate) { var timeout; return function() { var context = this, args = arguments; var later = function() { timeout = null; if (!immediate) func.apply(context, args); }; var callNow = immediate && !timeout; clearTimeout(timeout); timeout = setTimeout(later, wait); if (callNow) func.apply(context, args); }; }; let controller; let signal; var doSearch = debounce(function() { args = {'d': '/var/www/wsgi/cicjournal/webapp/search_index/xapian.db'} if (textinput.value) { args['q'] = textinput.value; if (controller !== undefined) { console.log('killing'); controller.abort(); } controller = new AbortController(); signal = controller.signal; let search_url = "https://cic.iacr.org/api/search" + "?" + new URLSearchParams(args); console.log(search_url); fetch(search_url, {signal}) .then((response) => response.json()) .then((data) => { console.log(data); let elem = document.getElementById('view'); if (elem) {elem.innerHTML = '';} if (data.results.length > 0) { document.getElementById('results').innerHTML = resultsTemplate(data); } else { document.getElementById('results').innerHTML = '<div class="p-3 shadow">no results</div>'; } controller = undefined; }).catch((error) => { console.log('error in fetch'); console.log(error); }); } else { console.log('no query'); } }, 500); // only after 250 ms. document.querySelectorAll('input').forEach((elem) => { elem.addEventListener('input', doSearch); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10