Watermarking PRFs and PKE Against Quantum Adversaries Fuyuki KitagawaRyo Nishimaki Research Article 26 April 2024 Article: 22
Cryptographic Primitives with Hinting Property Navid AlamatiSikhar Patranabis Research Article 23 April 2024 Article: 21
Analysis of Multivariate Encryption Schemes: Application to Dob and \({C}^{*}\) Morten ØygardenPatrick FelkeHåvard Raddum Research Article 18 April 2024 Article: 20
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery Qianqian YangLing SongJian Weng Research Article 10 April 2024 Article: 19
Bitcoin as a Transaction Ledger: A Composable Treatment Christian BadertscherUeli MaurerVassilis Zikas Research Article Open access 04 April 2024 Article: 18
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates Aggelos KiayiasFeng-Hao LiuYiannis Tselekounis Research Article Open access 03 April 2024 Article: 17
Bandwidth-Hard Functions: Reductions and Lower Bounds Jeremiah BlockiPeiyuan LiuSamson Zhou Research Article 12 March 2024 Article: 16
The COLM Authenticated Encryption Scheme Elena AndreevaAndrey BogdanovKan Yasuda Research Article 07 March 2024 Article: 15
Collision Resistance from Multi-collision Resistance Ron D. RothblumPrashant Nalini Vasudevan Research Article Open access 06 March 2024 Article: 14
Entropy Computation for Oscillator-based Physical Random Number Generators David LubiczViktor Fischer Research Article Open access 29 February 2024 Article: 13
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting Dennis HofheinzJessica KochChristoph Striecks Research Article Open access 29 February 2024 Article: 12
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm Dmitrii Koshelev Research Article 27 February 2024 Article: 11
Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions AkshimaSiyao GuoQipeng Liu Research Article 13 February 2024 Article: 10
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3 Marc FischlinFelix GüntherChristian Janson Research Article Open access 30 January 2024 Article: 9
(Inner-Product) Functional Encryption with Updatable Ciphertexts Valerio CiniSebastian RamacherErkan Tairi Research Article Open access 15 December 2023 Article: 8
Cryptographic Competitions Daniel J. Bernstein Research Article Open access 08 December 2023 Article: 7
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation Gabrielle De MicheliPierrick GaudryCécile Pierrot Research Article 04 December 2023 Article: 6
Masking the GLP Lattice-Based Signature Scheme at Any Order Gilles BartheSonia BelaïdMehdi Tibouchi Research Article 29 November 2023 Article: 5
Lattice-Based Programmable Hash Functions and Applications Jiang ZhangYu ChenZhenfeng Zhang Research Article 29 November 2023 Article: 4
BLEACH: Cleaning Errors in Discrete Computations Over CKKS Nir DruckerGuy MoshkowichHayim Shaul Research Article 01 November 2023 Article: 3
Breaking the \(O(\sqrt{n})\)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party Elette BoyleRan CohenAarushi Goel Research Article 27 October 2023 Article: 2
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation Yuval IshaiAlexis KorbAmit Sahai Research Article Open access 18 October 2023 Article: 1
Rinocchio: SNARKs for Ring Arithmetic Chaya GaneshAnca NitulescuEduardo Soria-Vazquez Research Article 13 October 2023 Article: 41
Non-malleable Vector Commitments via Local Equivocability Lior RotemGil Segev Research Article 26 September 2023 Article: 40
Topology-Hiding Communication from Minimal Assumptions Marshall BallElette BoyleTal Moran OriginalPaper 12 September 2023 Article: 39
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs Valence CristianiMaxime LecomtePhilippe Maurine Research Article 23 August 2023 Article: 38
Compact Structure-Preserving Signatures with Almost Tight Security Masayuki AbeDennis HofheinzJiaxin Pan Research Article Open access 10 August 2023 Article: 37
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version) Thomas AttemaSerge FehrMichael Klooß Research Article Open access 08 August 2023 Article: 36
A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model Marten van DijkChenglu Jin Research Article Open access 03 August 2023 Article: 35
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires Raine NieminenThomas Schneider Research Article Open access 03 August 2023 Article: 34
Fine-Grained Secure Attribute-Based Encryption Yuyu WangJiaxin PanYu Chen Research Article 03 August 2023 Article: 33
Cover Attacks for Elliptic Curves over Cubic Extension Fields Song Tian Research Article 20 July 2023 Article: 32
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic Mariya Georgieva BelorgeySergiu CarpovMohsen Mohammadi Research Article 11 July 2023 Article: 31
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation Arpita PatraDivya Ravi Original Paper 29 June 2023 Article: 30
Unbounded Predicate Inner Product Functional Encryption from Pairings Uddipana DowerahSubhranil DuttaTapas Pal Research Article Open access 13 June 2023 Article: 29
Parameter Optimization and Larger Precision for (T)FHE Loris BergeratAnas BoudiSamuel Tap Research Article 09 June 2023 Article: 28
Candidate iO from Homomorphic Encryption Schemes Zvika BrakerskiNico DöttlingGiulio Malavolta Research Article Open access 08 June 2023 Article: 27
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model Carmit HazayYuval IshaiMuthuramakrishnan Venkitasubramaniam Research Article 08 June 2023 Article: 26
On the Power of an Honest Majority in Three-Party Computation Without Broadcast Bar AlonRan CohenTom Suad Research Article 07 June 2023 Article: 25
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious Bar AlonEran Omri Research Article 07 June 2023 Article: 24
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors Benoît LibertSan LingHuaxiong Wang Research Article Open access 25 May 2023 Article: 23
MPClan: Protocol Suite for Privacy-Conscious Computations Nishat KotiShravani PatilAjith Suresh Research Article Open access 24 May 2023 Article: 22
High-Throughput Secure Three-Party Computation with an Honest Majority Jun FurukawaYehuda LindellOr Weinstein Research Article 22 May 2023 Article: 21
Must the Communication Graph of MPC Protocols be an Expander? Elette BoyleRan CohenPavel Hubáček Research Article 10 May 2023 Article: 20
Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning Sayandeep SahaManaar AlamPallab Dasgupta Research Article 09 May 2023 Article: 19
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró Murilo CoutinhoIago PassosFábio Borges Research Article 01 May 2023 Article: 18
I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups Cyril BouvierGuilhem CastagnosFabien Laguillaumie Research Article 26 April 2023 Article: 17
Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries Ananya AppanAnirudh ChandramouliAshish Choudhury Research Article 24 April 2023 Article: 16
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries Koji ChidaKoki HamadaAriel Nof Research Article 18 April 2023 Article: 15
NIZK from SNARGs Fuyuki KitagawaTakahiro MatsudaTakashi Yamakawa Research Article 08 April 2023 Article: 14