-
TallyGuard: Privacy Preserving Tallied-as-cast Guarantee
ePrint Report: TallyGuard: Privacy Preserving Tallied-as-cast Guarantee Athish Pranav Dharmalingam, Sai Venkata Krishnan, KC Sivaramakrishnan, N.S. Narayanaswamy This paper presents a novel approach to verifiable vote tallying using additive homomorphism, which can be appended to existing voting systems without modifying the underlying infrastructure. Existing End-to-End Verifiable (E2E-V) systems like Belenios and ElectionGuard rely on distributed…
-
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis
ePrint Report: Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek Physical side-channel analysis (SCA) operates on the foundational assumption of access to known plaintext or ciphertext. However, this assumption can be easily invalidated in various scenarios, ranging from common encryption modes like Cipher Block Chaining…
-
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool
ePrint Report: Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool Jianing Zhang, Haoyang Wang Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al. in 2014, there have been no substantial advancements in the key recovery…
-
Error floor prediction with Markov models for QC-MDPC codes
ePrint Report: Error floor prediction with Markov models for QC-MDPC codes Sarah Arpin, Jun Bo Lau, Ray Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur Quasi-cyclic moderate-density parity check (QC-MDPC) code-based encryption schemes under iterative decoders offer highly-competitive performance in the quantum-resistant space of cryptography, but the decoding-failure rate (DFR) of these algorithms are not well-understood.…
-
Shadowfax: Combiners for Deniability
ePrint Report: Shadowfax: Combiners for Deniability Phillip Gajland, Vincent Hwang, Jonas Janneck As cryptographic protocols transition to post-quantum security, most adopt hybrid solutions combining pre-quantum and post-quantum assumptions. However, this shift often introduces trade-offs in terms of efficiency, compactness, and in some cases, even security. One such example is deniability, which enables users, such as…
-
Quantum function secret sharing
ePrint Report: Quantum function secret sharing Alex B. Grilo, Ramis Movassagh We propose a quantum function secret sharing scheme in which the communication is exclusively classical. In this primitive, a classical dealer distributes a secret quantum circuit $C$ by providing shares to $p$ quantum parties. The parties on an input state $ket{psi}$ and a projection…
-
Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World
ePrint Report: Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay We propose the first $textit{distributed}$ version of a simple, efficient, and provably quantum-safe pseudorandom function (PRF). The distributed PRF (DPRF) supports arbitrary threshold access structures based on the hardness of the well-studied Learning with Rounding…
-
Researcher in Cryptographic Protocols and Key Exchange
Job Posting: Researcher in Cryptographic Protocols and Key Exchange Technology Innovation Institute (TII), Abu Dhabi, UAE We are looking for a permanent researcher to join the Cryptographic Protocols team within the Cryptography Research Center (CRC) at TII. The main task of the team is to conduct applied academic research and assist in product development, spanning…
-
CVE-2025-25066 – Cisco nDPI Stack Buffer Overflow Vulnerability
CVE ID : CVE-2025-25066 Published : Feb. 3, 2025, 6:15 a.m. | 1 hour, 49 minutes ago Description : nDPI through 4.12 has a potential stack-based buffer overflow in ndpi_address_cache_restore in lib/ndpi_cache.c. Severity: 8.1 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more… Go to Source
-
CVE-2024-10395 – Apache HTTP Server Input Validation Vulnerability
CVE ID : CVE-2024-10395 Published : Feb. 3, 2025, 7:15 a.m. | 49 minutes ago Description : No proper validation of the length of user input in http_server_get_content_type_from_extension. Severity: 8.6 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more… Go to Source