Pub Date : 2023-08-03DOI: 10.1007/s00145-023-09472-4
Raine Nieminen, T. Schneider
{"title":"Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires","authors":"Raine Nieminen, T. Schneider","doi":"10.1007/s00145-023-09472-4","DOIUrl":"https://doi.org/10.1007/s00145-023-09472-4","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44751650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.1007/s00145-023-09464-4
Mariya Georgieva Belorgey, Sergiu Carpov, Kevin Deforth, Dimitar Jetchev, A. Sae-Tang, Marius Vuille, Nicolas Gama, Jonathan Katz, Iraklis Leontiadis, Mohsen Mohammadi
{"title":"Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic","authors":"Mariya Georgieva Belorgey, Sergiu Carpov, Kevin Deforth, Dimitar Jetchev, A. Sae-Tang, Marius Vuille, Nicolas Gama, Jonathan Katz, Iraklis Leontiadis, Mohsen Mohammadi","doi":"10.1007/s00145-023-09464-4","DOIUrl":"https://doi.org/10.1007/s00145-023-09464-4","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42814289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-09DOI: 10.1007/s00145-023-09463-5
Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, D. Ligier, J. Orfila, Samuel Tap
{"title":"Parameter Optimization and Larger Precision for (T)FHE","authors":"Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, D. Ligier, J. Orfila, Samuel Tap","doi":"10.1007/s00145-023-09463-5","DOIUrl":"https://doi.org/10.1007/s00145-023-09463-5","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44693358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.1007/s00145-023-09456-4
Barash Alon, Ran Cohen, Eran Omri, Tom Suad
{"title":"On the Power of an Honest Majority in Three-Party Computation Without Broadcast","authors":"Barash Alon, Ran Cohen, Eran Omri, Tom Suad","doi":"10.1007/s00145-023-09456-4","DOIUrl":"https://doi.org/10.1007/s00145-023-09456-4","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45650464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-22DOI: 10.1007/s00145-023-09461-7
Jun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein
{"title":"High-Throughput Secure Three-Party Computation with an Honest Majority","authors":"Jun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein","doi":"10.1007/s00145-023-09461-7","DOIUrl":"https://doi.org/10.1007/s00145-023-09461-7","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"36 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42055219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-09DOI: 10.1007/s00145-023-09462-6
Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, P. Dasgupta
{"title":"Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning","authors":"Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, P. Dasgupta","doi":"10.1007/s00145-023-09462-6","DOIUrl":"https://doi.org/10.1007/s00145-023-09462-6","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"36 1","pages":"1-51"},"PeriodicalIF":3.0,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48027688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.1007/s00145-023-09455-5
M. Coutinho, Iago Passos, Juan C. Grados Vásquez, Santanu Sarkar, F. L. L. de Mendonça, R. D. de Sousa, Fábio Borges
{"title":"Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró","authors":"M. Coutinho, Iago Passos, Juan C. Grados Vásquez, Santanu Sarkar, F. L. L. de Mendonça, R. D. de Sousa, Fábio Borges","doi":"10.1007/s00145-023-09455-5","DOIUrl":"https://doi.org/10.1007/s00145-023-09455-5","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"36 1","pages":"1-57"},"PeriodicalIF":3.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43560497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-26DOI: 10.1007/s00145-023-09459-1
C. Bouvier, Guilhem Castagnos, L. Imbert, Fabien Laguillaumie
{"title":"I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups","authors":"C. Bouvier, Guilhem Castagnos, L. Imbert, Fabien Laguillaumie","doi":"10.1007/s00145-023-09459-1","DOIUrl":"https://doi.org/10.1007/s00145-023-09459-1","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":" ","pages":"1-31"},"PeriodicalIF":3.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47850598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries","authors":"Ananya Appan, Anirudh Chandramouli, Ashish Choudhury","doi":"10.1007/s00145-023-09457-3","DOIUrl":"https://doi.org/10.1007/s00145-023-09457-3","url":null,"abstract":"","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"36 1","pages":"1-94"},"PeriodicalIF":3.0,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47667889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}