-
Constant time lattice reduction in dimension 4 with application to SQIsign
ePrint Report: Constant time lattice reduction in dimension 4 with application to SQIsign Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler In this paper we propose a constant time lattice reduction algorithm for integral dimension-4 lattices. Motivated by its application in the SQIsign post-quantum signature scheme, we provide for the first time a…
-
Leveled Functional Bootstrapping via External Product Tree
ePrint Report: Leveled Functional Bootstrapping via External Product Tree Zhihao Li, Xuan Shen, Xianhui Lu, Ruida Wang, Yuan Zhao, Zhiwei Wang, Benqiang Wei Multi-input and large-precision lookup table (LUT) evaluation pose significant challenges in Fully Homomorphic Encryption (FHE). Currently, two modes are employed to address this issue. One is tree-based functional bootstrapping (TFBS), which uses…
-
Cryptography is Rocket Science: Analysis of BPSec
ePrint Report: Cryptography is Rocket Science: Analysis of BPSec Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri Space networking has become an increasing area of development with the advent of commercial satellite networks such as those hosted by Starlink and Kuiper, and increased satellite and space presence by governments around the world. Yet, historically such…
-
Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited
ePrint Report: Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited Olivier Blazy, Emmanuel Conchon, Philippe Gaborit, Philippe Krejci, Cristina Onete Secret handshakes, introduced by Balfanz et al. [3], allow users associated with various groups to determine if they share a common affiliation. These protocols ensure crucial properties such as fairness (all participants…
-
Foundations of Platform-Assisted Auctions
ePrint Report: Foundations of Platform-Assisted Auctions Hao Chung, Ke Wu, Elaine Shi Today, many auctions are carried out with the help of intermediary platforms like Google and eBay. These platforms serve as a rendezvous point for the buyers and sellers, and charge a fee for its service. We refer to such auctions as platform-assisted auctions.…
-
ProbeShooter: A New Practical Approach for Probe Aiming
ePrint Report: ProbeShooter: A New Practical Approach for Probe Aiming Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, Heeseok Kim, Seokhie Hong Electromagnetic side-channel analysis is a powerful method for monitoring processor activity and compromising cryptographic systems in air-gapped environments. As analytical methodologies and target devices evolve, the importance of leakage localization and…
-
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem
ePrint Report: Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem Thomas Johansson, Mustafa Khairallah, Vu Nguyen In this paper, we introduce an oracle version of the Restricted Syndrome Decoding Problem (RSDP) and propose novel authentication protocols based on the hardness of this problem. They follow the basic structure of the HB-family of authentication protocols…
-
CVE-2025-0301 – Online Book Shop Cross Site Scripting (XSS)
CVE ID : CVE-2025-0301 Published : Jan. 7, 2025, 6:15 p.m. | 1 hour, 30 minutes ago Description : A vulnerability, which was classified as problematic, has been found in code-projects Online Book Shop 1.0. Affected by this issue is some unknown functionality of the file /subcat.php. The manipulation of the argument catnm leads to cross site…
-
CVE-2024-40427 – PX4-Autopilot Stack Buffer Overflow
CVE ID : CVE-2024-40427 Published : Jan. 7, 2025, 7:15 p.m. | 30 minutes ago Description : Stack Buffer Overflow in PX4-Autopilot v1.14.3, which allows attackers to execute commands to exploit this vulnerability and cause the program to refuse to execute Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected…
-
CVE-2024-55413 – SUNIX Parallel Driver x64 uninitialized IOCTL Request Vulnerability (Privilege Escalation, Code Execution, Information Disclosure)
CVE ID : CVE-2024-55413 Published : Jan. 7, 2025, 6:15 p.m. | 1 hour, 30 minutes ago Description : A vulnerability exits in driver snxppamd.sys in SUNIX Parallel Driver x64 – 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code…