Faster Lookup Table Evaluation with Application to Secure LLM Inference

X Hou, J Liu, J Li, J Zhang, K Ren - Cryptology ePrint Archive, 2024 - eprint.iacr.org
As large language models (LLMs) continue to gain popularity, concerns about user privacy
are amplified, given that the data submitted by users for inference may contain sensitive …

A closer look at HMAC

K Pietrzak - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Abstract Bellare, Canetti and Krawczyk~\cite {FOCS: BelCanKra96} show that cascading an
$\eps $-secure (fixed input length) PRF gives an $ O (\eps nq) $-secure (variable input …

FLUTE: fast and secure lookup table evaluations

A Brüggemann, R Hundt, T Schneider… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The concept of using Lookup Tables (LUTs) instead of Boolean circuits is well-known and
been widely applied in a variety of applications, including FPGAs, image processing, and …

[PDF][PDF] Efficient Client Puzzles based on Repeated-Squaring

G Karame, S Capkun - Proceedings of IACR Cryptology ePrint Archive, 2009 - Citeseer
In this paper, we propose a new, nonparallelizable verification-efficient client puzzle. Our
puzzle is based on repeated-squaring and enables efficient verification of the puzzle …

Efficient Generic Arithmetic for KKW: Practical Linear MPC-in-the-Head NIZK on Commodity Hardware Without Trusted Setup

D Heath, V Kolesnikov, J Lu - International Symposium on Cyber Security …, 2021 - Springer
Abstract Katz et al., CCS 2018 (KKW) is a popular and efficient MPC-in-the-head non-
interactive ZKP (NIZK) scheme, which is the technical core of the post-quantum signature …

New optimization techniques for PlonK's arithmetization

M Ambrona, AL Schmitt, RR Toledo… - Cryptology ePrint …, 2022 - eprint.iacr.org
PlonK is a universal and updatable zk-SNARK for general circuit satisfiability that allows a
verifier to check the validity of a certain NP statement very efficiently, optionally in zero …

The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK

O Ciobotaru, M Peter, V Velichkov - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract The Fiat-Shamir transform [1] is a well-known and widely employed technique for
converting sound public-coin interactive protocols into sound non-interactive protocols. Even …

TaSSLE: Lasso for the commitment-phobic

D Dore - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We present TaSSLE, a new lookup argument for decomposable tables with minimal
commitment costs. The construction generalizes techniques introduced in Lasso …

Epistle: Elastic Succinct Arguments for Plonk Constraint System

S Zhang, D Cai, Y Li, H Kan, L Zhang - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We study elastic SNARKs, a concept introduced by the elegant work of Gemini
(EUROCRYPTO 2022). The prover of elastic SNARKs has multiple configurations with …

The last mile: High-assurance and high-speed cryptographic implementations

JB Almeida, M Barbosa, G Barthe… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We develop a new approach for building cryptographic implementations. Our approach
goes the last mile and delivers assembly code that is provably functionally correct, protected …