
Cryptology ePrint Archive
For more than 20 years, the Cryptology ePrint Archive has been publishing pre-print papers relevant to the field of cryptology. You can read more about our goals and history, see our acceptance and …
About the Cryptology ePrint Archive - IACR
The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the …
Operations of the Cryptology ePrint Archive - IACR
In this respect, the papers in the Cryptology ePrint Archive have the status of technical reports. Papers submitted may be author versions of published papers if the copyright holder allows such posting.
Efficient Pseudorandom Correlation Generators for Any Finite Field
Feb 5, 2025 · Note: Acknowledgement Updated. We've noticed a recent work (https://eprint.iacr.org/2025/892) that claims to break QA-SD assumptions under serveal parameter …
Lova: Lattice-Based Folding Scheme from Unstructured Lattices
Dec 4, 2024 · Existing post-quantum folding schemes (Boneh, Chen, ePrint 2024/257) based on lattice assumptions instead are secure under structured lattice assumptions, such as the Module Short …
Browse by year and category - IACR
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.
WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification
Oct 7, 2024 · We introduce WHIR, a new IOP of proximity that offers small query complexity and exceptionally fast verification time. The WHIR verifier typically runs in a few hundred microseconds, …
Faster Signatures from MPC-in-the-Head - IACR Cryptology ePrint …
Feb 15, 2024 · We revisit the construction of signature schemes using the MPC-in-the-head paradigm. We obtain two main contributions: – We observe that previous signatures in the MPC-in-the-head …
Evasive LWE Assumptions: Definitions, Classes, and Counterexamples
Dec 11, 2024 · The evasive LWE assumption, proposed by Wee [Eurocrypt'22 Wee] for constructing a lattice-based optimal broadcast encryption, has shown to be a powerful assumption, adopted by …
SQISignHD: New Dimensions in Cryptography - IACR Cryptology ePrint …
Mar 25, 2023 · We introduce SQIsignHD, a new post-quantum digital signature scheme inspired by SQIsign. SQIsignHD exploits the recent algorithmic breakthrough underlying the attack on SIDH, …