Search
Search Results
-
Gene Tree Parsimony in the Presence of Gene Duplication, Loss, and Incomplete Lineage Sorting
Inferring species trees from multi-locus data needs to account for gene tree discordance due to various biological processes, including incomplete... -
Generating Supersingular Elliptic Curves over \(\mathbb {F}_p\) with Unknown Endomorphism Ring
A number of supersingular isogeny based cryptographic protocols require the endomorphism ring of the initial elliptic curve to be either unknown or... -
PURED: A Unified Framework for Resource-Hard Functions
Algorithm hardness can be described by 5 categories: hardness in computation, in sequential computation, in memory, in energy consumption (or... -
Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm
The first contribution of this work is a generalisation of Stern’s information set decoding (ISD) algorithm. Stern’s algorithm, a variant of Stern’s... -
Patent Landscape in the field of Hash-Based Post-Quantum Signatures
Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization... -
Kummer and Hessian Meet in the Field of Characteristic 2
One can compute scalar multiplication on an ordinary short Weierstrass curve defined over a binary field. Also, one can move to the associated binary... -
Massive Superpoly Recovery with a Meet-in-the-Middle Framework
The cube attack extracts the information of secret key bits by recovering the coefficient called superpoly in the output bit with respect to a subset... -
Pauli Manipulation Detection Codes and Applications to Quantum Communication over Adversarial Channels
We introduce and explicitly construct a quantum error-detection code we coin a “Pauli Manipulation Detection” code (or PMD), which detects every... -
Bootstrap** Bits with CKKS
The Cheon–Kim–Kim–Song (CKKS) fully homomorphic encryption scheme is designed to efficiently perform computations on real numbers in an encrypted... -
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions
An important consideration in the context of distributed ledger protocols is fairness in terms of transaction ordering. Recent work [Crypto 2020]... -
Leakage-Tolerant Circuits
A leakage-resilient circuit for \(f:\{0,1\}^n\rightarrow \{0,1\}^m\)... -
Symmetric Signcryption and E2EE Group Messaging in Keybase
We introduce a new cryptographic primitive called symmetric signcryption, which differs from traditional signcryption because the sender and... -
A Holistic Security Analysis of Monero Transactions
Monero is a popular cryptocurrency with strong privacy guarantees for users’ transactions. At the heart of Monero’s privacy claims lies a complex... -
Pseudorandom Isometries
We introduce a new notion called \({\mathcal {Q}}\)... -
From Random Probing to Noisy Leakages Without Field-Size Dependence
Side channel attacks are devastating attacks targeting cryptographic implementations. To protect against these attacks, various countermeasures have... -
Fuzzy Private Set Intersection with Large Hyperballs
Traditional private set intersection (PSI) involves a receiver and a sender holding sets X and Y, respectively, with the receiver learning only the... -
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing
We optimise the verification of the SQIsign signature scheme. By using field extensions in the signing procedure, we are able to significantly... -
Diving Deep into the Preimage Security of AES-Like Hashing
Since the seminal works by Sasaki and Aoki, Meet-in-the-Middle (MITM) attacks are recognized as an effective technique for preimage and collision... -
Accelerating BGV Bootstrap** for Large p Using Null Polynomials over \(\mathbb {Z}_{p^e}\)
The BGV scheme is one of the most popular FHE schemes for computing homomorphic integer arithmetic. The bootstrap** technique of BGV is necessary... -
Twinkle: Threshold Signatures from DDH with Full Adaptive Security
Sparkle is the first threshold signature scheme in the pairing-free discrete logarithm setting (Crites, Komlo, Maller, Crypto 2023) to be proven...