IACR ePrint Updates
@Lhree
unofficial IACR ePrint Updates
[Revised] Raccoon: A Masking-Friendly Signature Proven in the Probing Model (Rafal del Pino and Shuichi Katsumata and Thomas Prest and Mlissa Rossi) ia.cr/2024/1291
[New] Exploring Kanekos bound: On multi-edges, loops and the diameter of the supersingular $\ell$-isogeny graph (Sebastiano Boscardin and Sebastian A. Spindler) ia.cr/2025/1361
[Revised] Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time (Florian Hirner and Florian Krieger and Constantin Piber and Sujoy Sinha Roy) ia.cr/2024/1918
[Revised] On the Multi-User Security of LWE-based NIKE (Roman Langrehr) ia.cr/2023/1401
[Revised] Fast AVX-512 Implementation of the Optimal Ate Pairing on BLS12-381 (Hao Cheng and Georgios Fotiadis and Johann Groschdl and Daniel Page) ia.cr/2025/1283
[Revised] Security Analysis on UOV Families with Odd Characteristics: Using Symmetric Algebra (Yi Jin and Yuansheng Pan and Xiaoou He and Boru Gong and Jintai Ding) ia.cr/2025/1137
[Revised] A Place for Everyone vs Everyone in its Place: Measuring and Attacking the Ethereum Global Network (Chenyu Li and Ren Zhang and Xiaorui Gong) ia.cr/2025/588
[Revised] Revisiting Differential-Linear Attacks via a Boomerang Perspective With Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT (Hosein Hadipour and Patrick Derbez and Maria Eichlseder) ia.cr/2024/255
[Revised] MIFARE Classic: exposing the static encrypted nonce variant (Philippe Teuwen) ia.cr/2024/1275
[Revised] NICE-PAKE: On the Security of KEM-Based PAKE Constructions without Ideal Ciphers (Nouri Alnahawi and Jacob Alperin-Sheriff and Daniel Apon and Gareth T. Davies and Alexander Wiesmaier) ia.cr/2024/1957
[New] A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications (Sanjam Garg and Mohammad Hajiabadi and Dimitris Kolonelos and Abhiram Kothapalli and Guru-Vamsi Policharla) ia.cr/2025/1364
[New] Universally Composable Adaptor Signatures (Paul Gerhart and Daniel Rausch and Dominique Schrder) ia.cr/2025/1363
[New] Cryptanalysis of the best HFE-LL' Constructions (Daniel Smith-Tone and Cristian Valenzuela) ia.cr/2025/1362
[Revised] One-Step Schnorr Threshold Identification (Foteinos Mergoupis-Anagnou) ia.cr/2025/722
[Revised] On the use of ECDSA with hierarchical public key delegation in identity-based scenarios (Lucas C. Cardoso and Marcos A. Simplicio Jr) ia.cr/2025/1334
[Revised] Introducing two ROS attack variants: breaking one-more unforgeability of BZ blind signatures (Bruno M. F. Ricardo and Lucas C. Cardoso and Leonardo T. Kimura and Paulo S. Barreto and Marcos A. Simplicio Jr) ia.cr/2025/1353
[Revised] VITARIT: Paying for Threshold Services on Bitcoin and Friends (Sri AravindaKrishnan Thyagarajan and Easwar Vivek Mangipudi and Lucjan Hanzlik and Aniket Kate and Pratyay Mukherjee) ia.cr/2025/174
[Revised] CAKE requires programming - On the provable post-quantum security of (O)CAKE (Kathrin Hvelmanns and Andreas Hlsing and Mikhail Kudinov and Silvia Ritsch) ia.cr/2025/458
[New] Towards more secure constructions of private set operation schemes (Mojtaba Rfiee) ia.cr/2025/1360
[New] Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU (Dcio Luiz Gazzoni Filho and Rafael G. Flores e Silva and Alessandro Budroni and Marco Palumbi and Gora Adj) ia.cr/2025/1359