copy and paste this google map to your website or blog!
Press copy button and paste into your blog or website.
(Please switch to 'HTML' mode when posting into your blog. Examples: WordPress Example, Blogger Example)
Cryptology ePrint Archive The Cryptology ePrint Archive provides rapid access to recent research in cryptology Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the work seems to be within the scope of cryptology and meets some minimal acceptance criteria and publishing conditions
About the Cryptology ePrint Archive - IACR The name "Cryptology ePrint Archive" reflects the features of this form of publication: electronically distributed, rapidly published, recent work, and immediately accessible
Operations of the Cryptology ePrint Archive - IACR The Cryptology ePrint Archive provides another way to announcing new results This reflects IACR's goals and policies, as confirmed by the IACR Board of Directors meeting on May 2, 1999 in Prague:
Cryptology ePrint Archive - IACR You can view the Cryptology ePrint Archive papers that were added: In the last week In the last month In the last six months In the current calendar year You can also view listings by year, the complete contents, or a compact view If you are looking for a specific paper, use the search bar on the menu at the top of the page
SQISignHD: New Dimensions in Cryptography - IACR Cryptology ePrint Archive We introduce SQIsignHD, a new post-quantum digital signature scheme inspired by SQIsign SQIsignHD exploits the recent algorithmic breakthrough underlying the attack on SIDH, which allows to efficiently represent isogenies of arbitrary degrees as components of a higher dimensional isogeny SQIsignHD overcomes the main drawbacks of SQIsign First, it scales well to high security levels, since
Efficient Pseudorandom Correlation Generators for Any Finite Field Correlated randomness lies at the core of efficient modern secure multi-party computation (MPC) protocols Costs of generating such correlated randomness required for the MPC online phase protocol often constitute a bottleneck in the overall protocol A recent paradigm of {\\em pseudorandom correlation generator} (PCG) initiated by Boyle et al (CCS'18, Crypto'19) offers an appealing solution
Is Your Bluetooth Chip Leaking Secrets via RF Signals? In this paper, we present a side-channel attack on the hardware AES accelerator of a Bluetooth chip used in millions of devices worldwide, ranging from wearables and smart home products to industrial IoT The attack leverages information about AES computations unintentionally transmitted by the chip together with RF signals to recover the encryption key Unlike traditional side-channel attacks
Lova: Lattice-Based Folding Scheme from Unstructured Lattices Existing post-quantum folding schemes (Boneh, Chen, ePrint 2024 257) based on lattice assumptions instead are secure under structured lattice assumptions, such as the Module Short Integer Solution Assumption (MSIS), which also binds them to relatively complex arithmetic
Browse by year and category - IACR Note: In order to protect the privacy of readers, eprint iacr org does not use cookies or embedded third party content