Cryptology ePrint Archive: Listing for 2012
-
2012/733 ( PDF )
- Reusable Garbled Circuits and Succinct Functional Encryption
- Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich
-
2012/732 ( PDF )
- Non-Interactive Key Exchange
- Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson
-
2012/731 ( PDF )
- Time-memory Trade-offs for Near-collisions
- Gaëtan Leurent
-
2012/730 ( PS PS.GZ PDF )
- Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
- Dalin Chu and Johann Gro{\ss}sch{\"a}dl and Zhe Liu and Volker M{\"u}ller and Yang Zhang
-
2012/729 ( PDF )
- On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
- Nir Bitansky and Omer Paneth
-
2012/728 ( PDF )
- Defensive Leakage Camouflage
- E. Brier and Q. Fortier and R. Korkikian and K. W. Magld and D. Naccache and G. Ozari de Almeida and A. Pommellet and A. H. Ragab and J. Vuillemin
-
2012/727 ( PDF )
- On the Impossibility of Sender-Deniable Public Key Encryption
- Dana Dachman-Soled
-
2012/726 ( PDF )
- Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
- Marc Obrador and Paz Morillo and Sandra Guasch
-
2012/725 ( PDF )
- Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
- Qingfeng Cheng
-
2012/724 ( PDF )
- A Coding-Theoretic Approach to Recovering Noisy RSA Keys
- Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn
-
2012/723 ( PDF )
- Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks
- Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov and Avraham Entelis
-
2012/722 ( PDF )
- Hardness Preserving Reductions via Cuckoo Hashing
- Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
-
2012/721 ( PDF )
- On the (In)security of Fischlin's Paradigm
- Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao
-
2012/720 ( PDF )
- Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields
- Antoine Joux
-
2012/719 ( PDF )
- An ideal multi-secret sharing scheme based on minimal privileged coalitions
- Yun Song , Zhihui Li
-
2012/718 ( PDF )
- Succinct Non-Interactive Arguments via Linear Interactive Proofs
- Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth
-
2012/717 ( PDF )
- Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
- Jan Camenisch and Anna Lysyanskaya and Gregory Neven
-
2012/716 ( PDF )
- Attribute-Based Functional Encryption on Lattices
- Xavier Boyen
-
2012/715 ( PDF )
- New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$
- Jingyuan Zhao and Meiqin Wang and Jiazhe Chen and Yuliang Zheng
-
2012/714 ( PDF )
- Discrete Gaussian Leftover Hash Lemma over Infinite Domains
- Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai
-
2012/713 ( PDF )
- Systematic Treatment of Remote Attestation
- Aurelien Francillon and Quan Nguyen and Kasper B. Rasmussen and Gene Tsudik
-
2012/712 ( PDF )
- On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis
- Farzaneh Abed and Eik List and Stefan Lucks
-
2012/711 ( PDF )
- Unprovable Security of Two-Message Zero Knowledge
- Kai-Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass
-
2012/710 ( PDF )
- Non Observability in the Random Oracle Model
- Prabhanjan Ananth and Raghav Bhaskar
-
2012/709 ( PDF )
- Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
- Qun-Xiong Zheng and Wen-Feng Qi
-
2012/708 ( PDF )
- Calling out Cheaters: Covert Security With Public Verifiability
- Gilad Asharov and Claudio Orlandi
-
2012/707 ( PDF )
- Cryptanalysis of WIDEA
- Gaëtan Leurent
-
2012/706 ( PDF )
- On the (In)security of the Fiat-Shamir Paradigm, Revisited
- Dana Dachman-Soled and Abhishek Jain and Yael Tauman Kalai and Adriana Lopez-Alt
-
2012/705 ( PDF )
- Why "Fiat-Shamir for Proofs" Lacks a Proof
- Nir Bitansky and Sanjam Garg and Daniel Wichs
-
2012/704 ( PDF )
- On the Non-malleability of the Fiat-Shamir Transform
- Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi
-
2012/703 ( PDF )
- Profiled Model Based Power Simulator for Side Channel Evaluation
- Nicolas Debande and Maël Berthier and Yves Bocktaels and Thanh-Ha Le
-
2012/702 ( PDF )
- Cryptanalysis of RAPP, an RFID Authentication Protocol
- Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
-
2012/701 ( PDF )
- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
- Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu
-
2012/700 ( PDF )
- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
- Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong-Sheng Zhou
-
2012/699 ( PDF )
- Is Public-Key Encryption Based on LPN Practical?
- Ivan Damg{\aa}rd and Sunoo Park
-
2012/698 ( PDF )
- 5PM: Secure Pattern Matching
- Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler
-
2012/697 ( PDF )
- Verifiable Elections That Scale for Free
- Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
-
2012/696 ( PDF )
- Cryptanalysis of RAKAPOSHI Stream Cipher
- Lin Ding and Jie Guan
-
2012/695 ( PDF )
- Automated Analysis and Synthesis of Padding-Based Encryption Schemes
- Gilles Barthe and Juan Manuel Crespo and Benjamin Grégoire and César Kunz and Yassine Lakhnech and Santiago Zanella-Béguelin
-
2012/694 ( PDF )
- Cryptanalysis of matrix conjugation schemes
- A. D. Myasnikov and A. Ushakov
-
2012/693 ( PDF )
- Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
- Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters
-
2012/692 ( PDF )
- Integrated PKE and PEKS - Stronger Security Notions and New Constructions
- Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin
-
2012/691 ( PDF )
- Root Optimization of Polynomials in the Number Field Sieve
- Shi Bai and Richard P. Brent and Emmanuel Thom\'e
-
2012/690 ( PDF )
- The Weakness of Integrity Protection for LTE
- Teng Wu and Guang Gong
-
2012/689 ( PDF )
- Cryptography Using CAPTCHA Puzzles
- Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia
-
2012/688 ( PDF )
- A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
- Jintai Ding, Xiaodong Lin
-
2012/687 ( PDF )
- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
- Karyn Benson and Hovav Shacham and Brent Waters
-
2012/686 ( PDF )
- Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Gr{\o}stl
- Jian Zou and Wenling Wu and Shuang Wu and Le Dong
-
2012/685 ( PDF )
- Square root computation over even extension fields
- Gora Adj and Francisco Rodr\'iguez-Henr\'iquez
-
2012/684 ( PDF )
- Generic Related-key Attacks for HMAC
- Thomas Peyrin and Yu Sasaki and Lei Wang
-
2012/683 ( PDF )
- Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster
- Gildas Avoine and Adrien Bourgeois and Xavier Carpent
-
2012/682 ( PDF )
- Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud
- Jiawei Yuan and Shucheng Yu
-
2012/681 ( PDF )
- Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations
- Guang Gong and Mark Aagaard and Xinxin Fan
-
2012/680 ( PDF )
- Natural Generalizations of Threshold Secret Sharing
- Oriol Farras,Carles Padro,Chaoping Xing, and An Yang
-
2012/679 ( PDF )
- Hiding the Input-Size in Secure Two-Party Computation
- Yehuda Lindell and Kobbi Nissim and Claudio Orlandi
-
2012/678 ( PDF )
- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
- Benedikt Gierlichs and Jorn-Marc Schmidt and Michael Tunstall
-
2012/677 ( PDF )
- What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher
- Jialin Huang and Xuejia Lai
-
2012/676 ( PDF )
- Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan
- Julia Borghoff
-
2012/675 ( PDF )
- Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA
- Yoshinori Aono
-
2012/674 ( PDF )
- Lecture Notes in Secret Sharing
- Carles Padro
-
2012/673 ( PDF )
- Robust Encryption, Revisited
- Pooya Farshim and Benoît Libert and Kenneth G. Paterson and Elizabeth A. Quaglia
-
2012/672 ( PDF )
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Itai Dinur and Orr Dunkelman and Adi Shamir
-
2012/671 ( PDF )
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- Tatsuaki Okamoto and Katsuyuki Takashima
-
2012/670 ( PDF )
- Fast Cryptography in Genus 2
- Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
-
2012/669 ( PDF )
- Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption
- Zhen Liu and Zhenfu Cao and Duncan S. Wong
-
2012/668 ( PDF )
- Construction of Differential Characteristics in ARX Designs -- Application to Skein
- Gaetan Leurent
-
2012/667 ( PDF )
- False Negative probabilities in Tardos codes
- Antonino Simone and Boris Skoric
-
2012/666 ( PS PS.GZ PDF )
- Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem
- Chenglian Liu and Ziwei Ye
-
2012/665 ( PDF )
- Uniform Compression Functions Can Fail to Preserve “Full” Entropy
- Daniel R. L. Brown
-
2012/664 ( PDF )
- PRE- Stronger Security Notion and Efficient Construction with New Property
- Jiang Zhang and Zhenfeng Zhang and Yu Chen
-
2012/663 ( PDF )
- Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?
- Alexander Rostovtsev
-
2012/662 ( PDF )
- Asynchronous Physical Unclonable Functions – AsyncPUF
- Julian Murphy
-
2012/661 ( PDF )
- Breaking Another Quasigroup-Based Cryptographic Scheme
- Markus Dichtl and Pascale B\"offgen
-
2012/660 ( PDF )
- Design of Secure Image Transmission in MANET using Number Theory Based Image Compression and Quasigroup Encryption (NTICQE) Algorithm
- Munivel E and Rajeswari Mukesh
-
2012/659 ( PDF )
- Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks
- Hassan Jameel Asghar and Shujun Li and Ron Steinfeld and Josef Pierpzyk
-
2012/658 ( PDF )
- Digital Signatures with Minimal Overhead
- Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy
-
2012/657 ( PDF )
- Fixed Argument Pairing Inversion on Elliptic Curves
- Sungwook Kim and Jung Hee Cheon
-
2012/656 ( PDF )
- Security Evaluation of Rakaposhi Stream Cipher
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
-
2012/655 ( PDF )
- Privacy Preserving Revocable Predicate Encryption Revisited
- Kwangsu Lee and Intae Kim and Seong Oun Hwang
-
2012/654 ( PDF )
- Refine the Concept of Public Key Encryption with Delegated Search
- Qiang Tang and Yuanjie Zhao and Xiaofeng Chen and Hua Ma
-
2012/653 ( PDF )
- How powerful are the DDH hard groups?
- Periklis A. Papakonstantinou and Charles W. Rackoff and Yevgeniy Vahlis
-
2012/652 ( PDF )
- Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
- Vipul Goyal and Huijia Lin and Omkant Pandey and Rafael Pass and Amit Sahai
-
2012/651 ( PDF )
- TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems
- Kan Yang and Zhen Liu and Zhenfu Cao and Xiaohua Jia and Duncan S. Wong and Kui Ren
-
2012/650 ( PDF )
- Formal analysis of privacy in Direct Anonymous Attestation schemes
- Ben Smyth and Mark D. Ryan and Liqun Chen
-
2012/649 ( PDF )
- A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
- Yannick Seurin and Joana Treger
-
2012/648 ( PDF )
- Search in Encrypted Data: Theoretical Models and Practical Applications
- Qiang Tang
-
2012/647 ( PDF )
- A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions
- Daniel Smith-Tone and Cristina Tone
-
2012/646 ( PS PS.GZ PDF )
- Galindo-Garcia Identity-Based Signature Revisited
- Sanjit Chatterjee and Chethan Kamath and Vikas Kumar
-
2012/645 ( PDF )
- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
- Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
-
2012/644 ( PDF )
- Impossibility Results for Indifferentiability with Resets
- Atul Luykx and Elena Andreeva and Bart Mennink and Bart Preneel
-
2012/643 ( PDF )
- Protocols for Multiparty Coin Toss With Dishonest Majority
- Amos Beimel and Eran Omri and Ilan Orlov
-
2012/642 ( PDF )
- Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
- Ivan Damgard and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart
-
2012/641 ( PDF )
- A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure
- Bin Wang
-
2012/640 ( PDF )
- Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function
- Gaoli Wang and Yanzhao Shen
-
2012/639 ( PDF )
- Coarse-grained integer - Smooth? Rough? Both!
- Daniel Loebenberger and Michael Nüsken
-
2012/638 ( PDF )
- Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme
- Cai-xue Zhou
-
2012/637 ( PDF )
- Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification
- Aviad Kipnis and Eliphaz Hibshoosh
-
2012/636 ( PDF )
- On the Complexity of the BKW Algorithm on LWE
- Martin R. Albrecht and Carlos Cid and Jean-Charles Faugčre and Robert Fitzpatrick and Ludovic Perret
-
2012/635 ( -- withdrawn -- )
- Secure Outsourced Attribute-based Encryption
- Jin Li and Jingwei Li and Xiaofeng Chen and Chunfu Jia and Duncan S. Wong
-
2012/634 ( PDF )
- Cryptanalysis of Double-Block-Length Hash Mode MJH
- Deukjo Hong and Daesung Kwon
-
2012/633 ( PDF )
- New Preimage Attack on MDC-4
- Deukjo Hong and Daesung Kwon
-
2012/632 ( PDF )
- Pairings on Generalized Huff Curves
- Abdoul Aziz Ciss and Djiby Sow
-
2012/631 ( PDF )
- Message-Locked Encryption and Secure Deduplication
- Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart
-
2012/630 ( PDF )
- On the Security of TLS Renegotiation
- Florian Giesen and Florian Kohlar and Douglas Stebila
-
2012/629 ( PDF )
- SCAPI: The Secure Computation Application Programming Interface
- Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell
-
2012/628 ( PDF )
- Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems
- Muhammad Yasir Malik
-
2012/627 ( PDF )
- Efficient Group Signatures in the Standard Model
- Laila El Aimani and Olivier Sanders
-
2012/626 ( PDF )
- Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis
- Xi Xiong and Haining Fan
-
2012/625 ( PDF )
- Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
- Alexandra Boldyreva and Nathan Chenette and Adam O’Neill
-
2012/624 ( PDF )
- Order-Preserving Symmetric Encryption
- Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O’Neill
-
2012/623 ( PDF )
- Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes
- David McGrew
-
2012/622 ( PDF )
- Resolving the conflict between generality and plausibility in verified computation
- Srinath Setty and Benjamin Braun and Victor Vu and Andrew J. Blumberg and Bryan Parno and Michael Walfish
-
2012/621 ( PDF )
- Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
- Kitae Jeong and HyungChul Kang and Changhoon Lee and Jaechul Sung and Seokhie Hong
-
2012/620 ( PDF )
- Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction
- Claus P. Schnorr and Taras Shevchenko
-
2012/619 ( PDF )
- Asynchronous Computational VSS with Reduced Communication Complexity
- Michael Backes and Amit Datta and Aniket Kate
-
2012/618 ( PDF )
- Towards fully collusion-resistant ID-based establishment of pairwise keys
- Oscar Garcia Morchon and Ludo Tolhuizen and Domingo Gomez and Jaime Gutierrez
-
2012/617 ( PDF )
- Security Analysis of an Open Car Immobilizer Protocol Stack
- Stefan Tillich and Marcin Wójcik
-
2012/616 ( PDF )
- Hardness Preserving Constructions of Pseudorandom Functions, Revisited
- Nishanth Chandran and Sanjam Garg
-
2012/615 ( PDF )
- Polynomial time solutions of computational problems in noncommutative-algebraic cryptography
- Boaz Tsaban
-
2012/614 ( PDF )
- An arithmetic intersection formula for denominators of Igusa class polynomials
- Kristin Lauter and Bianca Viray
-
2012/613 ( PDF )
- Resource-Restricted Indifferentiability
- Grégory Demay and Peter Gaži and Martin Hirt and Ueli Maurer
-
2012/612 ( PDF )
- Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff
- Byoung-Il Kim and Jin Hong
-
2012/611 ( PDF )
- A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
- Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay
-
2012/610 ( PDF )
- Candidate Multilinear Maps from Ideal Lattices
- Sanjam Garg and Craig Gentry and Shai Halevi
-
2012/609 ( PDF )
- A New Approach to Discrete Logarithm Problem with Auxiliary Inputs
- Taechan Kim and Jung Hee Cheon
-
2012/608 ( PDF )
- On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting
- Marina Blanton and Mehrdad Aliasgari
-
2012/607 ( PDF )
- Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem
- Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber
-
2012/606 ( PDF )
- Quantum-Secure Message Authentication Codes
- Dan Boneh and Mark Zhandry
-
2012/605 ( PDF )
- Secure Outsourced Attribute-Based Signatures
- Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
-
2012/604 ( PDF )
- Leakage-Resilient Cryptography from Minimal Assumptions
- Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs
-
2012/603 ( PDF )
- Collecting Data while Preserving Individuals' Privacy: A Case Study
- Alexis Bonnecaze and Robert Rolland
-
2012/602 ( PDF )
- A note on invariant linear transformations in multivariate public key cryptography
- Andreas Wiemers
-
2012/601 ( PS PS.GZ PDF )
- How to Garble RAM Programs
- Steve Lu and Rafail Ostrovsky
-
2012/600 ( PDF )
- The LED Block Cipher
- Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw
-
2012/599 ( PDF )
- On the coefficients of the polynomial in the number field sieve
- Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
-
2012/598 ( PDF )
- Taking proof-based verified computation a few steps closer to practicality (extended version)
- Srinath Setty and Victor Vu and Nikhil Panpalia and Benjamin Braun and Muqeet Ali and Andrew J. Blumberg and Michael Walfish
-
2012/597 ( PDF )
- A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA
- Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj
-
2012/596 ( PDF )
- Evaluating User Privacy in Bitcoin
- Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun
-
2012/595 ( PDF )
- Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes
- Oriol Farrŕs and Carles Padró
-
2012/594 ( PDF )
- Improved Impossible Differential Attack on Reduced Version of Camellia-192/256
- Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li
-
2012/593 ( PDF )
- Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps
- Tomoko Yonemura and Taichi Isogai and Hirofumi Muratani and Yoshikazu Hanatani
-
2012/592 ( PDF )
- Attribute-Based Encryption for Circuits from Multilinear Maps
- Amit Sahai and Brent Waters
-
2012/591 ( PDF )
- Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers
- Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
-
2012/590 ( -- withdrawn -- )
- --withdrawn--
- --withdrawn--
-
2012/589 ( -- withdrawn -- )
- --withdrawn--
- --withdrawn--
-
2012/588 ( PDF )
- Breaking Public Keys - How to Determine an Unknown RSA Public Modulus
- Hans-Joachim Knobloch
-
2012/587 ( PDF )
- Symbolic computation in block cipher with application to PRESENT
- Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
-
2012/586 ( PDF )
- SHADE: Secure HAmming DistancE computation from oblivious transfer
- Julien Bringer and Herve Chabanne and Alain Patey
-
2012/585 ( PDF )
- ON PROVABLY SECURE CODE-BASED SIGNATURE AND SIGNCRYPTION SCHEME
- Preetha Mathew K and Sachin Vasant and C Pandu Rangan
-
2012/584 ( PDF )
- Quantitative Analysis of the Full Bitcoin Transaction Graph
- Dorit Ron and Adi Shamir
-
2012/583 ( PDF )
- New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
- Yannis Rouselakis and Brent Waters
-
2012/582 ( PS PS.GZ PDF )
- Using Randomizers for Batch Verification of ECDSA Signatures
- Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury
-
2012/581 ( PDF )
- On the (in)security of some smart-card-based password authentication schemes for WSN
- Ding Wang and Chun-guang Ma
-
2012/580 ( PDF )
- Cryptanalysis of the OKH Authenticated Encryption Scheme
- Peng Wang and Wenling Wu and Liting Zhang
-
2012/579 ( PDF )
- Defending Against the Unknown Enemy: Applying FlipIt to System Security
- Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos
-
2012/578 ( PDF )
- Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
- Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
-
2012/577 ( PDF )
- A Framework for Unique Ring Signatures
- Matthew Franklin and Haibin Zhang
-
2012/576 ( PDF )
- Concurrent Signature without Random Oracles
- Xiao Tan and Qiong Huang and Duncan S. Wong
-
2012/575 ( PDF )
- Nanoelectronic Solutions for Hardware Security
- Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki
-
2012/574 ( PDF )
- Quantum algorithm for the discrete logarithm problem for matrices over finite group rings
- A. D. Myasnikov and A. Ushakov
-
2012/573 ( PDF )
- Limits on the Usefulness of Random Oracles
- Iftach Haitner and Eran Omri and Hila Zarosim
-
2012/572 ( PDF )
- On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption
- Divya Gupta and Amit Sahai
-
2012/571 ( PDF )
- Improved side channel attack on the block cipher NOEKEON
- Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
-
2012/570 ( PDF )
- Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock
- Hadi Soleimany and Kaisa Nyberg
-
2012/569 ( PDF )
- Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
- San Ling and Khoa Nguyen and Damien Stehle and Huaxiong Wang
-
2012/568 ( PDF )
- On Transaction Pseudonyms with Implicit Attributes
- Stefan G. Weber
-
2012/567 ( PDF )
- Leakage Squeezing of Order Two
- Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi
-
2012/566 ( PDF )
- Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes
- Joep de Groot and Boris Skoric and Niels de Vreede and Jean-Paul Linnartz
-
2012/565 ( PDF )
- Packed Ciphertexts in LWE-based Homomorphic Encryption
- Zvika Brakerski and Craig Gentry and Shai Halevi
-
2012/564 ( PDF )
- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
- Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
-
2012/563 ( PDF )
- Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions
- Kai-Min Chung and Huijia Lin and Rafael Pass
-
2012/562 ( PDF )
- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
- Kwangsu Lee and Dong Hoon Lee and Moti Yung
-
2012/561 ( PDF )
- An Attack on a Fully Homomorphic Encryption Scheme
- Hu Yupu, Wang Fenghe
-
2012/560 ( PDF )
- Computational Soundness of Coinductive Symbolic Security under Active Attacks
- Mohammad Hajiabadi, Bruce M. Kapron
-
2012/559 ( PDF )
- Plaintext Awareness in Identity-Based Key Encapsulation
- Mark Manulis and Bertram Poettering and Douglas Stebila
-
2012/558 ( PDF )
- Domain-Specific Pseudonymous Signatures for the German Identity Card
- Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
-
2012/557 ( PDF )
- PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)
- Stefan Katzenbeisser, Ünal Kocabas, Vladimir Rožic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede and Christian Wachsmann
-
2012/556 ( PDF )
- Resource-based Corruptions and the Combinatorics of Hidden Diversity
- Juan Garay and David Johnson and Aggelos Kiayias and Moti Yung
-
2012/555 ( PDF )
- New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation
- Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai
-
2012/554 ( PDF )
- Security weakness in the Proof of Storage with Deduplication
- Youngjoo Shin, Junbeom Hur, Kwangjo Kim
-
2012/553 ( PDF )
- Bellcore attack in practice
- Andrey Sidorenko and Joachim van den Berg and Remko Foekema and Michiel Grashuis and Jaap de Vos
-
2012/552 ( PDF )
- Provably Secure Concurrent Error Detection Against Differential Fault Analysis
- Xiaofei Guo, Debdeep Mukhopadhyay and Ramesh Karri
-
2012/551 ( PDF )
- Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists
- Liangze Li and Hongfeng Wu and Fan Zhang
-
2012/550 ( PDF )
- Dynamic Proofs of Retrievability via Oblivious RAM
- David Cash and Alptekin Kupcu and Daniel Wichs
-
2012/549 ( PDF )
- Faster batch forgery identification
- Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk
-
2012/548 ( PDF )
- New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments
- Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
-
2012/547 ( PDF )
- Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity
- Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta
-
2012/546 ( PDF )
- Rotational cryptanalysis of round-reduced Keccak
- Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny
-
2012/545 ( PDF )
- A Versatile Multi-Input Multiplier over Finite Fields
- Haibo Yi, Shaohua Tang, Lingling Xu
-
2012/544 ( PDF )
- Differential Analysis of the LED Block Cipher
- Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici
-
2012/543 ( PDF )
- Enhanced Chosen-Ciphertext Security and Applications
- Dana Dachman-Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill
-
2012/542 ( PDF )
- Salus: A System for Server-Aided Secure Function Evaluation
- Seny Kamara and Payman Mohassel and Ben Riva
-
2012/541 ( -- withdrawn -- )
- 2048XKS - A Software Oriented High Security Block Cipher
- Dieter Schmidt
-
2012/540 ( PDF )
- A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms
- Ga Won Lee and Jin Hong
-
2012/539 ( PDF )
- Efficient Implementation of RSA Algorithm with MKE
- Sami A. Nagar and Dr. Saad Alshamma
-
2012/538 ( PDF )
- Private Top-k Aggregation Protocols
- Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim
-
2012/537 ( PDF )
- Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens
- Özgür Dagdelen and Marc Fischlin
-
2012/536 ( PDF )
- Secret Sharing and Secure Computing from Monotone Formulae
- Ivan Bjerre Damgĺrd and Jonas Kölker and Peter Bro Miltersen
-
2012/535 ( PDF )
- A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Gr{\o}stl
- Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
-
2012/534 ( PDF )
- A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes
- Maura B. Paterson and Douglas R. Stinson
-
2012/533 ( PDF )
- Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems
- Thijs Laarhoven and Joop van de Pol and Benne de Weger
-
2012/532 ( PDF )
- Pairing computation on Edwards curves with high-degree twists
- Liangze Li and Hongfeng Wu and Fan Zhang
-
2012/531 ( PDF )
- Generic Construction of Trace and Revoke Schemes
- Murat Ak and Aggelos Kiayias and Serdar Pehlivanoglu and Ali Aydin Selcuk
-
2012/530 ( PS PS.GZ PDF )
- Dynamic Searchable Symmetric Encryption
- Seny Kamara and Charalampos Papamanthou and Tom Roeder
-
2012/529 ( PDF )
- PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version)
- Julia Borghoff and Anne Canteaut and Tim Güneysu and Elif Bilge Kavun and Miroslav Knežević and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and Sřren S. Thomsen and Tolga Yalçın
-
2012/528 ( PDF )
- An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption
- Graham Enos and Yuliang Zheng
-
2012/527 ( PDF )
- Cryptanalysis of a recent two factor authentication scheme
- Michael Scott
-
2012/526 ( PDF )
- Invertible Polynomial Representation for Private Set Operations
- Hyung Tae Lee and Hyunsook Hong and Jung Hee Cheon
-
2012/525 ( PDF )
- Computing endomorphism rings of abelian varieties of dimension two
- Gaetan Bisson
-
2012/524 ( PDF )
- Tahoe – The Least-Authority Filesystem
- Zooko Wilcox-O'Hearn and Brian Warner
-
2012/523 ( PDF )
- The Curious Case of Non-Interactive Commitments
- Mohammad Mahmoody and Rafael Pass
-
2012/522 ( PDF )
- False Positive probabilities in q-ary Tardos codes: comparison of attacks
- A. Simone and B. Skoric
-
2012/521 ( PDF )
- Functional Encryption with Bounded Collusions via Multi-Party Computation
- Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
-
2012/520 ( PDF )
- Optimizing Segment Based Document Protection (Corrected Version)
- Miroslaw Kutylowski and Maciej Gebala
-
2012/519 ( PDF )
- Faster implementation of scalar multiplication on Koblitz curves
- Diego F. Aranha and Armando Faz-Hernández and Julio López and Francisco Rodríguez-Henríquez
-
2012/518 ( PDF )
- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
- Kwangsu Lee and Dong Hoon Lee and Moti Yung
-
2012/517 ( PDF )
- Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity
- Ashish Choudhury and Martin Hirt and Arpita Patra
-
2012/516 ( PDF )
- Garbling XOR Gates ``For Free'' in the Standard Model
- Benny Applebaum
-
2012/515 ( PDF )
- Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
- Mihir Bellare and Adam O'Neill
-
2012/514 ( PDF )
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Mihir Bellare and Kenneth G. Paterson and Susan Thomson
-
2012/513 ( PS PS.GZ PDF )
- Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
- Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes
-
2012/512 ( PDF )
- Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
- Ivan Damgard and Sarah Zakarias
-
2012/511 ( PDF )
- Entangled Cloud Storage
- Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi
-
2012/510 ( PDF )
- Enabling 3-share Threshold Implementations for any 4-bit S-box
- Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann
-
2012/509 ( PDF )
- On 3-share Threshold Implementations for 4-bit S-boxes
- Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang
-
2012/508 ( PDF )
- On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs
- Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung
-
2012/507 ( PDF )
- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
- Josep Balasch and Baris Ege and Thomas Eisenbarth and Benoit Gérard and Zheng Gong and Tim Güneysu and Stefan Heyse and Stéphanie Kerckhof and François Koeune and Thomas Plos and Thomas Pöppelmann and Francesco Regazzoni and François-Xavier Standaert and Gilles Van Assche and Ronny Van Keer and Loďc van Oldeneel tot Oldenzeel and Ingo von Maurich
-
2012/506 ( PDF )
- Succinct Malleable NIZKs and an Application to Compact Shuffles
- Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
-
2012/505 ( PDF )
- On pseudorandomization of information-theoretically secure schemes without hardness assumptions
- Koji Nuida
-
2012/504 ( PDF )
- Scalable Deniable Group Key Establishment
- Kashi Neupane and Rainer Steinwandt and Adriana Suarez Corona
-
2012/503 ( PDF )
- Hierarchical Identity-Based (Lossy) Trapdoor Functions
- Alex Escala and Javier Herranz and Benoit Libert and Carla Rafols
-
2012/502 ( PDF )
- Are We Compromised? Modelling Security Assessment Games
- Viet Pham and Carlos Cid
-
2012/501 ( PS PS.GZ PDF )
- Privacy Amplification with Asymptotically Optimal Entropy Loss
- Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin
-
2012/500 ( PDF )
- Constant Ciphertext Length in CP-ABE
- Nishant Doshi and Devesh Jinwala
-
2012/499 ( PDF )
- Authenticity, Integrity and Proof of Existence for Long-Term Archiving: a Survey
- Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann
-
2012/498 ( PDF )
- On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation
- Meicheng Liu and Yin Zhang and Dongdai Lin
-
2012/497 ( PDF )
- The low-call diet: Authenticated Encryption for call counting HSM users
- Mike Bond and George French and Nigel P. Smart and Gaven J. Watson
-
2012/496 ( PDF )
- Updating attribute in CP-ABE: A New Approach
- Nishant Doshi and Devesh Jinwala
-
2012/495 ( PDF )
- "Metaproofs" (and their Cryptographic Applications)
- Alfredo De Santis and Moti Yung
-
2012/494 ( PDF )
- Format-Transforming Encryption: More than Meets the DPI
- Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton
-
2012/493 ( PDF )
- Efficient Query Integrity for Outsourced Dynamic Databases
- Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
-
2012/492 ( PDF )
- A Method for Generating Full Cycles by a Composition of NLFSRs
- Elena Dubrova
-
2012/491 ( PDF )
- On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown
- Lidong Han and Wei Wei and Mingjie Liu
-
2012/490 ( PS PS.GZ PDF )
- Desynchronization Attack on RAPP Ultralightweight Authentication Protocol
- Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref
-
2012/489 ( PDF )
- Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
- Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
-
2012/488 ( PDF )
- Designated Verifier Threshold Proxy Signature Scheme without Random Oracles
- Mohammad Beheshti-Atashgah \and Majid Bayat \and Mahmoud Gardeshi \and Mohammad Reza Aref
-
2012/487 ( PDF )
- Short communication: An interpretation of the Linux entropy estimator
- Benjamin Pousse
-
2012/486 ( PDF )
- Computational Soundness without Protocol Restrictions
- Michael Backes and Ankit Malik and Dominique Unruh
-
2012/485 ( PDF )
- Exploiting Collisions in Addition Chain-based Exponentiation Algorithms
- Neil Hanley and HeeSeok Kim and Michael Tunstall
-
2012/484 ( PS PS.GZ )
- Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture
- Ding Wang, Chun-guang Ma, De-li Gu and Zhen-shan Cui
-
2012/483 ( PS PS.GZ PDF )
- An Efficient Signcryption Scheme from q-Diffie-Hellman Problems
- Jayaprakash Kar
-
2012/482 ( PDF )
- Approaches for the Parallelization of Software Implementation of Integer Multiplication
- Vladislav Kovtun and Andrew Okhrimenko
-
2012/481 ( PDF )
- Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance
- John Steinberger
-
2012/480 ( PDF )
- Short Signatures From Diffie-Hellman: Realizing Short Public Key
- Jae Hong Seo
-
2012/479 ( PDF )
- Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles
- Mohammad Reza Reyhanitabar and Willy Susilo
-
2012/478 ( PDF )
- Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol
- Wang Qinglong, Xu Li
-
2012/477 ( PDF )
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean
-
2012/476 ( PDF )
- A j-lanes tree hashing mode and j-lanes SHA-256
- Shay Gueron
-
2012/475 ( PDF )
- Efficient Signatures of Knowledge and DAA in the Standard Model
- David Bernhard and Georg Fuchsbauer and Essam Ghadafi
-
2012/474 ( PDF )
- On the Semantic Security of Functional Encryption Schemes
- Manuel Barbosa and Pooya Farshim
-
2012/473 ( PDF )
- Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
- Zhengan Huang and Shengli Liu and Baodong Qin
-
2012/472 ( PDF )
- On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme –
- Amir Moradi and Oliver Mischke
-
2012/471 ( PDF )
- A Quasigroup Based Random Number Generator for Resource Constrained Environments
- Matthew Battey and Abhishek Parakh
-
2012/470 ( PDF )
- Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime
- Sorin Iftene
-
2012/469 ( PDF )
- Perfect Keyword Privacy in PEKS Systems
- Mototsugu Nishioka
-
2012/468 ( PDF )
- Functional Encryption: New Perspectives and Lower Bounds
- Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
-
2012/467 ( PDF )
- New results on nonexistence of generalized bent functions
- Yupeng Jiang and Yingpu Deng
-
2012/466 ( PDF )
- Computational Entropy and Information Leakage
- Benjamin Fuller and Leonid Reyzin
-
2012/465 ( PDF )
- T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags
- Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
-
2012/464 ( PDF )
- Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
- Carles Padro and Leonor Vazquez and An Yang
-
2012/463 ( PDF )
- Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
- Xiang Xie and Rui Xue and Rui Zhang
-
2012/462 ( PDF )
- Perfect Ambiguous Optimistic Fair Exchange
- Yang Wang and Man Ho Au and Willy Susilo
-
2012/461 ( PDF )
- Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits
- Nir Bitansky and Alessandro Chiesa
-
2012/460 ( PDF )
- Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
- Yohei Watanabe and Takenobu Seito and Junji Shikata
-
2012/459 ( PDF )
- Barriers in Cryptography with Weak, Correlated and Leaky Sources
- Daniel Wichs
-
2012/458 ( PDF )
- Computing small discrete logarithms faster
- Daniel J. Bernstein and Tanja Lange
-
2012/457 ( PDF )
- Hush Functions Extended to Any Size Input versus Any Size Output
- Gideon Samid
-
2012/456 ( PDF )
- Crowd-Blending Privacy
- Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass
-
2012/455 ( PDF )
- Must you know the code of f to securely compute f?
- Mike Rosulek
-
2012/454 ( PDF )
- A Probabilistic Quantum Key Transfer Protocol
- Abhishek Parakh
-
2012/453 ( PDF )
- New Leakage Resilient CCA-Secure Public Key Encryption
- Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
-
2012/452 ( PDF )
- EPiC: Efficient Privacy-Preserving Counting for MapReduce
- Erik-Oliver Blass and Guevara Noubir and Triet D. Vo-Huu
-
2012/451 ( PS PS.GZ PDF )
- Stam's Conjecture and Threshold Phenomena in Collision Resistance
- John Steinberger, Xiaoming Sun, Zhe Yang
-
2012/450 ( PDF )
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Will Landecker and Thomas Shrimpton and R. Seth Terashima
-
2012/449 ( PDF )
- Long Term Confidentiality: a Survey
- Johannes Braun and Johannes Buchmann and Ciaran Mullan and Alex Wiesmaier
-
2012/448 ( PDF )
- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
- Goichiro Hanaoka and Takahiro Matsuda and Jacob C.N. Schuldt
-
2012/447 ( PDF )
- Multi-receiver Homomorphic Authentication Codes for Network Coding
- Zhaohui Tang and Hoon Wei Lim
-
2012/446 ( PS PS.GZ PDF )
- Differential Fault Analysis of AES: Towards Reaching its Limits
- Sk Subidh Ali , Debdeep Mukhopadhyay, and Michael Tunstall
-
2012/445 ( PDF )
- A note on ‘An efficient certificateless aggregate signature with constant pairing computations’
- Debiao He, Jianhua Chen, Miaomiao Tian
-
2012/444 ( PDF )
- Factorization of a 1061-bit number by the Special Number Field Sieve
- Greg Childers
-
2012/443 ( PDF )
- Improved CRT Algorithm for Class Polynomials in Genus 2
- Kristin Lauter and Damien Robert
-
2012/442 ( PDF )
- Group Signatures with Almost-for-free Revocation
- Benoit Libert and Thomas Peters and Moti Yung
-
2012/441 ( PDF )
- Adaptively Secure Multi-Party Computation with Dishonest Majority
- Sanjam Garg and Amit Sahai
-
2012/440 ( PDF )
- New Preimage Attacks Against Reduced SHA-1
- Simon Knellwolf and Dmitry Khovratovich
-
2012/439 ( PDF )
- Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
- Ding Wang, Chun-guang Ma, Ping Wang ang Zhong Chen
-
2012/438 ( PDF )
- Breaking and Repairing GCM Security Proofs
- Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu
-
2012/437 ( PDF )
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Amit Sahai and Hakan Seyalioglu and Brent Waters
-
2012/436 ( PDF )
- Secure Database Commitments and Universal Arguments of Quasi Knowledge
- Melissa Chase and Ivan Visconti
-
2012/435 ( PS PS.GZ PDF )
- Differential Privacy with Imperfect Randomness
- Yevgeniy Dodis and Adriana Lopez-Alt and Ilya Mironov and Salil Vadhan
-
2012/434 ( PDF )
- Algebraic (Trapdoor) One Way Functions and their Applications
- Dario Catalano and Dario Fiore and Rosario Gennaro and Konstantinos Vamvourellis
-
2012/433 ( PDF )
- Impossibility Results for Static Input Secure Computation
- Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti
-
2012/432 ( PDF )
- TorScan: Tracing Long-lived Connections and Differential Scanning Attacks
- Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
-
2012/431 ( PDF )
- On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
- Yusuke Sakai and Jacob C.N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta
-
2012/430 ( PDF )
- A formal study of two physical countermeasures against side channel attacks
- Sébastien Briais and Sylvain Guilley and Jean-Luc Danger
-
2012/429 ( PDF )
- Simple construction of epsilon-biased distribution
- Long Hoang Nguyen and Andrew William Roscoe
-
2012/428 ( PDF )
- Rational authentication protocols and their use in financial transactions
- Long Hoang Nguyen
-
2012/427 ( PDF )
- Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian
- Robert Drylo
-
2012/426 ( PDF )
- A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes
- Ed Kendall and Michelle Kendall and Wilfrid S. Kendall
-
2012/425 ( PS PS.GZ PDF )
- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
- Gautham Sekar
-
2012/424 ( PDF )
- Scalable Group Signatures with Revocation
- Benoit Libert and Thomas Peters and Moti Yung
-
2012/423 ( PDF )
- Programmable encryption and key-dependent messages
- Dominique Unruh
-
2012/422 ( PDF )
- Biclique Cryptanalysis of TWINE
- Mustafa \c{C}oban and Ferhat Karako\c{c} and \"{O}zkan Bozta\c{s}
-
2012/421 ( PDF )
- Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
- Ekawat Homsirikamol and Pawel Morawiecki and Marcin Rogawski and Marian Srebrny
-
2012/420 ( PDF )
- A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers
- Denise Demirel and Jeroen van de Graaf
-
2012/419 ( PDF )
- DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
- Kan Yang and Xiaohua Jia and Kui Ren
-
2012/418 ( PDF )
- Weaknesses of an Improvement Authentication Scheme using
- Rafael Martínez-Peláez and Francisco Rico-Novella
-
2012/417 ( PDF )
- Efficient Padding Oracle Attacks on Cryptographic Hardware
- Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay
-
2012/416 ( PDF )
- Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
- Cas Cremers and Michčle Feltz
-
2012/415 ( PDF )
- Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion
- Jialin Huang and Xuejia Lai
-
2012/414 ( PDF )
- Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials
- Yin Li and Gong-liang Chen and Xiao-ning Xie
-
2012/413 ( PDF )
- Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation
- Mukund Kalyanaraman and Michael Orshansky
-
2012/412 ( PDF )
- Probabilistic Infinite Secret Sharing
- Laszlo Csirmaz
-
2012/411 ( PDF )
- Infinite Secret Sharing -- Examples
- Alexander Dibert and Laszlo Csirmaz
-
2012/410 ( PDF )
- Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme
- Qingfeng Cheng
-
2012/409 ( PDF )
- MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes
- Rafael Misoczki and Jean-Pierre Tillich and Nicolas Sendrier and Paulo S. L. M. Barreto
-
2012/408 ( PDF )
- Efficient Implementation of Bilinear Pairings on ARM Processors
- Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, and David Jao
-
2012/407 ( PDF )
- Cross-Unlinkable Hierarchical Group Signatures
- Julien Bringer and Herve Chabanne and Alain Patey
-
2012/406 ( PDF )
- Comments on four multi-server authentication protocols using smart card
- *Jue-Sam Chou 1, Yalin Chen2, Chun-Hui Huang 3, Yu-Siang Huang4
-
2012/405 ( PDF )
- Secure Computation on Floating Point Numbers
- Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele
-
2012/404 ( PDF )
- Secret Sharing Schemes for Very Dense Graphs
- Amos Beimel and Oriol Farrŕs and Yuval Mintz
-
2012/403 ( PDF )
- Fully Private Revocable Predicate Encryption
- Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and Dongdong Sun
-
2012/402 ( PDF )
- Forward-Secure Hierarchical Predicate Encryption
- Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and Dongdong Sun
-
2012/401 ( PDF )
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
- Martin Albrecht and Gregor Leander
-
2012/400 ( PDF )
- An Algebraic Fault Attack on the LED Block Cipher
- Philipp Jovanovic and Martin Kreuzer and Ilia Polian
-
2012/399 ( PDF )
- Differential Fault Analysis on Block Cipher Piccolo
- Kitae Jeong
-
2012/398 ( PDF )
- PIRMAP: Efficient Private Information Retrieval for MapReduce
- Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
-
2012/397 ( PDF )
- Cross-Domain Password-Based Authenticated Key Exchange Revisited
- Liqun Chen and Hoon Wei Lim and Guomin Yang
-
2012/396 ( PDF )
- On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$
- Brajesh Kumar Singh
-
2012/395 ( PDF )
- A New Efficient Authenticated ID-Based Group Key Agreement Protocol
- Morteza Arifi and Mahmoud Gardeshi and Mohammad Sabzinejad Farash
-
2012/394 ( PDF )
- An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks
- Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari
-
2012/393 ( PDF )
- A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings
- Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat
-
2012/392 ( PDF )
- ID Based Signcryption Scheme in Standard Model
- S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan
-
2012/391 ( PDF )
- Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
- Shaohui Wang,Sujuan Liu,Danwei Chen
-
2012/390 ( PDF )
- Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three
- Chol-Sun Sin
-
2012/389 ( PDF )
- Wide Strong Private RFID Identification based on Zero-Knowledge
- Roel Peeters and Jens Hermans
-
2012/388 ( PDF )
- The Arithmetic Codex
- Ignacio Cascudo and Ronald Cramer and Chaoping Xing
-
2012/387 ( PDF )
- New cryptographic constructions using generalized learning with errors problem
- Jintai ding
-
2012/386 ( PDF )
- Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards
- Rafael Martínez-Peláez and Francisco Rico-Novella
-
2012/385 ( PDF )
- CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing
- Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen
-
2012/384 ( PDF )
- Functional Encryption for Regular Languages
- Brent Waters
-
2012/383 ( PDF )
- Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited
- Junji Shikata
-
2012/382 ( PDF )
- On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
- Afonso Arriaga and Manuel Barbosa and Pooya Farshim
-
2012/381 ( PDF )
- A Strongly Secure Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles
- Zheng Yang
-
2012/380 ( PDF )
- Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
- Ioana Boureanu and Serge Vaudenay
-
2012/379 ( PDF )
- A Framework for Efficient Fully-Equipped UC Commitments
- Eiichiro Fujisaki
-
2012/378 ( PDF )
- Multiparty Proximity Testing with Dishonest Majority from Equality Testing
- Ran Gelles and Rafail Ostrovsky and Kina Winoto
-
2012/377 ( PDF )
- Distributed Key Generation in the Wild
- Aniket Kate and Yizhou Huang and Ian Goldberg
-
2012/376 ( PDF )
- Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem
- Colleen M. Swanson and Douglas R. Stinson
-
2012/375 ( PDF )
- How to Store some Secrets
- Reto E. Koenig and Rolf Haenni
-
2012/374 ( PDF )
- Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
- Omar Choudary and Felix Grobert and Joachim Metz
-
2012/373 ( PDF )
- Optimal Lower Bound for Differentially Private Multi-Party Aggregation
- T-H. Hubert Chan and Elaine Shi and Dawn Song
-
2012/372 ( -- withdrawn -- )
- New Preimage Attacks on Hash Modes of AES-256
- Deukjo Hong and Dong-Chan Kim and Daesung Kwon
-
2012/371 ( PDF )
- Simultaneous hashing of multiple messages
- Shay Gueron and Vlad Krasnov
-
2012/370 ( PDF )
- Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
- Renaud Dubois and Aurore Guillevic and Marine Sengelin Le Breton
-
2012/369 ( PDF )
- Factorisation of RSA-704 with CADO-NFS
- Shi Bai and Emmanuel Thom\'e and Paul Zimmermann
-
2012/368 ( PDF )
- Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs
- Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski and Rabia Shahid and Malik Umar Sharif
-
2012/367 ( PDF )
- On Continual Leakage of Discrete Log Representations
- Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs
-
2012/366 ( PDF )
- Securing Circuits Against Constant-Rate Tampering
- Dana Dachman-Soled and Yael Tauman Kalai
-
2012/365 ( PDF )
- Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy
- Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
-
2012/364 ( PDF )
- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions
- Ivan Damgard and Adriana Lopez-Alt
-
2012/363 ( PDF )
- A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions
- Anne Canteaut and Thomas Fuhr and Mar\'{i}a Naya-Plasencia and Pascal Paillier and Jean-Ren\'{e} Reinhard and Marion Videau
-
2012/362 ( PDF )
- Achieving Constant Round Leakage-Resilient Zero-Knowledge
- Omkant Pandey
-
2012/361 ( PDF )
- Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
- Michele Mosca and Douglas Stebila and Berkant Ustaoglu
-
2012/360 ( PDF )
- Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics
- Céline Blondeau and Benoît Gérard and Kaisa Nyberg
-
2012/359 ( PDF )
- Another look at non-uniformity
- Neal Koblitz and Alfred Menezes
-
2012/358 ( PDF )
- PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --
- Gilles Piret and Thomas Roche and Claude Carlet
-
2012/357 ( PDF )
- Publicly Verifiable Ciphertexts
- Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila
-
2012/356 ( PDF )
- Fully Anonymous Attribute Tokens from Lattices
- Jan Camenisch and Gregory Neven and Markus Rückert
-
2012/355 ( PDF )
- Never trust a bunny
- Daniel J. Bernstein and Tanja Lange
-
2012/354 ( PDF )
- Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
- Arno Mittelbach
-
2012/353 ( PDF )
- On Reconfigurable Fabrics and Generic Side-Channel Countermeasures
- Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik
-
2012/352 ( PS PS.GZ PDF )
- On Hashing Graphs
- Ashish Kundu, Elisa Bertino
-
2012/351 ( PDF )
- SipHash: a fast short-input PRF
- Jean-Philippe Aumasson and Daniel J. Bernstein
-
2012/350 ( PDF )
- A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption
- Liangliang Xiao and I-Ling Yen
-
2012/349 ( PDF )
- A Differential Fault Attack on Grain-128a using MACs
- Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
-
2012/348 ( PDF )
- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
- Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Gregory Neven
-
2012/347 ( PDF )
- Algebraic Differential Fault Attacks on LED using a Single Fault Injection
- Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji
-
2012/346 ( PS PS.GZ PDF )
- Edwards model of elliptic curves defined over any fields
- Oumar DIAO and Emmanuel FOUOTSA
-
2012/345 ( PDF )
- Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$
- Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi
-
2012/344 ( PDF )
- Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code
- Masao KASAHARA
-
2012/343 ( PDF )
- High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions
- Tamas Gyorfi and Octavian Cret and Guillaume Hanrot and Nicolas Brisebarre
-
2012/342 ( PDF )
- Enhancing Location Privacy for Electric Vehicles (at the right time)
- Joseph Liu and Man Ho Au and Willy Susilo and Jianying Zhou
-
2012/341 ( PDF )
- From Selective to Full Security: Semi-Generic Transformations in the Standard Model
- Michel Abdalla and Dario Fiore and Vadim Lyubashevsky
-
2012/340 ( PDF )
- Deciding Epistemic and Strategic Properties of Cryptographic Protocols
- Henning Schnoor
-
2012/339 ( PDF )
- Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash
- Adi Shamir and Eldad Zinger
-
2012/338 ( PDF )
- Characterizations on Algebraic Immunity for Multi-Output Boolean Functions
- Xiao Zhong and Mingsheng Wang
-
2012/337 ( PDF )
- Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme
- Sanjay Bhattacherjee and Palash Sarkar
-
2012/336 ( PDF )
- RSA modulus generation in the two-party case
- Gerald Gavin
-
2012/335 ( PDF )
- Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition
- Yu Lou and Huiting Han and Chunming Tang and Maozhi Xu
-
2012/334 ( PDF )
- On the Traceability of Tags in SUAP RFID Authentication Protocols
- Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
-
2012/333 ( PDF )
- On the Feasibility of Extending Oblivious Transfer
- Yehuda Lindell and Hila Zarosim
-
2012/332 ( PDF )
- A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
-
2012/331 ( PDF )
- Homomorphic Authentication Codes for Network Coding
- Zhaohui Tang
-
2012/330 ( PDF )
- A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences
- Xu ZiJie and Xu Ke
-
2012/329 ( PDF )
- An Analysis of ZVP-Attack on ECC Cryptosystems
- Claude Crépeau and Raza Ali Kazmi
-
2012/328 ( PS PS.GZ PDF )
- The Multivariate Probabilistic Encryption Scheme MQQ-ENC
- Danilo Gligoroski and Simona Samardjiska
-
2012/327 ( PDF )
- Security Analysis of RAPP An RFID Authentication Protocol based on Permutation
- Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
-
2012/326 ( PDF )
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Allison Lewko and Brent Waters
-
2012/325 ( PDF )
- A note on generalized bent criteria for Boolean functions
- Sugata Gangopadhyay, Enes Pasalic and Pantelimon Stanica
-
2012/324 ( PDF )
- 3D Hardware Canaries
- Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf
-
2012/323 ( PDF )
- ML Confidential: Machine Learning on Encrypted Data
- Thore Graepel and Kristin Lauter and Michael Naehrig
-
2012/322 ( PDF )
- Revisiting Dedicated and Block Cipher based Hash Functions
- Anupam Pattanayak
-
2012/321 ( PDF )
- DECT Security Analysis
- Erik Tews
-
2012/320 ( PDF )
- The Discrete Logarithm Problem in non-representable rings
- Matan Banin and Boaz Tsaban
-
2012/319 ( PDF )
- Bounds on the Threshold Gap in Secret Sharing over Small Fields
- Ignacio Cascudo and Ronald Cramer and Chaoping Xing
-
2012/318 ( PDF )
- Non-uniform cracks in the concrete: the power of free precomputation
- Daniel J. Bernstein and Tanja Lange
-
2012/317 ( PDF )
- A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)
- Markku-Juhani O. Saarinen and Daniel Engels
-
2012/316 ( PDF )
- Computationally Complete Symbolic Attacker in Action
- Gergei Bana and Pedro Adăo and Hideki Sakurada
-
2012/315 ( PDF )
- Using Variance to Analyze Visual Cryptography Schemes
- Teng Guo and Feng Liu and ChuanKun Wu and YoungChang Hou
-
2012/314 ( PDF )
- Generation of Nonlinear Feedback Shift Registers with special-purpose hardware
- Tomasz Rachwalik and Janusz Szmidt and Robert Wicik, and Janusz Zablocki
-
2012/313 ( PDF )
- An anonymous proxy signature scheme without random oracles
- Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
-
2012/312 ( PDF )
- Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
- Debiao He
-
2012/311 ( PDF )
- Tightly Secure Signatures and Public-Key Encryption
- Dennis Hofheinz and Tibor Jager
-
2012/310 ( PDF )
- A mathematical problem for security analysis of hash functions and pseudorandom generators
- Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata
-
2012/309 ( PDF )
- Fast and compact elliptic-curve cryptography
- Mike Hamburg
-
2012/308 ( PDF )
- Verified Security of Redundancy-Free Encryption from Rabin and RSA
- Gilles Barthe and David Pointcheval and Santiago Zanella-Béguelin
-
2012/307 ( PDF )
- Multi-Channel Broadcast Encryption
- Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh
-
2012/306 ( PDF )
- Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
- Marcel Keller and Gert Lćssře Mikkelsen and Andy Rupp
-
2012/305 ( PDF )
- Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography
- Duong Hieu Phan and Viet Cuong Trinh
-
2012/304 ( PDF )
- Actively Secure Two-Party Evaluation of any Quantum Operation
- Fr\'ed\'eric Dupuis and Jesper Buus Nielsen and Louis Salvail
-
2012/303 ( PDF )
- On The Distribution of Linear Biases: Three Instructive Examples
- Mohamed Ahmed Abdelraheem and Martin Aagren and Peter Beelen and Gregor Leander
-
2012/302 ( PDF )
- On instance separation in the UC-framework
- István Vajda
-
2012/301 ( PDF )
- A Public Shuffle without Private Permutations
- Myungsun Kim and Jinsu Kim and Jung Hee Cheon
-
2012/300 ( PDF )
- Threshold Implementations of all 3x3 and 4x4 S-boxes
- B. Bilgin and S.Nikova and V.Nikov and V.Rijmen and G.Stütz
-
2012/299 ( PDF )
- Differential Power Analysis on ZUC Algorithm
- TANG Ming, CHENG PingPan ,QIU ZhenLong
-
2012/298 ( PDF )
- Anonymous Credentials Light
- Foteini Baldimtsi and Anna Lysyanskaya
-
2012/297 ( PDF )
- Tamper and Leakage Resilience in the Split-State Model
- Feng-Hao Liu and Anna Lysyanskaya
-
2012/296 ( PDF )
- In the blink of an eye: There goes your AES key
- Sergei Skorobogatov and Christopher Woods
-
2012/295 ( PDF )
- Broadcast-enhanced Key Predistribution Schemes
- Michelle Kendall and Keith M. Martin and Siaw-Lynn Ng and Maura B. Paterson and Douglas R. Stinson
-
2012/294 ( PDF )
- Two grumpy giants and a baby
- Daniel J. Bernstein and Tanja Lange
-
2012/293 ( PDF )
- New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors
- Wei Wei and Chengliang Tian and Xiaoyun Wang
-
2012/292 ( PDF )
- An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle
- Jon Passki and Tom Ritter
-
2012/291 ( PDF )
- Efficient Dynamic Provable Possession of Remote Data via Update Trees
- Yihua Zhang and Marina Blanton
-
2012/290 ( PDF )
- Fully Homomorphic Message Authenticators
- Rosario Gennaro and Daniel Wichs
-
2012/289 ( PS PS.GZ PDF )
- Ring Group Signatures
- Liqun Chen
-
2012/288 ( PDF )
- Fair Exchange of Short Signatures without Trusted Third Party
- Philippe Camacho
-
2012/287 ( PDF )
- Computationally-Fair Group and Identity-Based Key-Exchange
- Andrew C. Yao and Yunlei Zhao
-
2012/286 ( PS PS.GZ PDF )
- Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis
- Sk Subidh Ali and Debdeep Mukhopadhyay
-
2012/285 ( PDF )
- Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
- Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
-
2012/284 ( PDF )
- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
- Fabrice Ben Hamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2012/283 ( PDF )
- Some properties of q-ary functions based on spectral analysis
- Deep Singh and Maheshanand Bhaintwal
-
2012/282 ( PDF )
- ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY
- Md. Iftekhar Salam and Hoon-Jae Lee
-
2012/281 ( PDF )
- Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications
- Dario Fiore and Rosario Gennaro
-
2012/280 ( PDF )
- Improved ``Partial Sums"-based Square Attack on AES
- Michael Tunstall
-
2012/279 ( PDF )
- Concurrent Zero Knowledge in the Bounded Player Model
- Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti
-
2012/278 ( PS PS.GZ PDF )
- Improved Indifferentiability Security Bound for the JH Mode
- Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
-
2012/277 ( PS PS.GZ PDF )
- Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil
- Rkia Aouinatou (1) Mostafa Belkasmi (2)
-
2012/276 ( PDF )
- Official Arbitration with Secure Cloud Storage Application
- Alptekin Küpçü
-
2012/275 ( PDF )
- Implementing BLAKE with AVX, AVX2, and XOP
- Samuel Neves and Jean-Philippe Aumasson
-
2012/274 ( PDF )
- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
- Aleksandar Kircanski and Amr M. Youssef
-
2012/273 ( PDF )
- Public-Key Cryptography from New Multivariate Quadratic Assumptions
- Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang
-
2012/272 ( PS PS.GZ PDF )
- Passive Corruption in Statistical Multi-Party Computation
- Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub
-
2012/271 ( -- withdrawn -- )
- Homomorphic Signature for Identity Authentication in Cloud Computing
- Zhiwei Wang, Guozi Sun and Danwei Chen
-
2012/270 ( PDF )
- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings
- Enrico Thomae
-
2012/269 ( PDF )
- Quantifying Side-Channel Information Leakage from Web Applications
- Luke Mather and Elisabeth Oswald
-
2012/268 ( PDF )
- On a CCA2-secure variant of McEliece in the standard model
- Edoardo Persichetti
-
2012/267 ( PDF )
- Self-pairings on Hyperelliptic Curves
- Steven D. Galbraith and Chang-An Zhao
-
2012/266 ( PDF )
- Compilation Techniques for Efficient Encrypted Computation
- Christopher Fletcher and Marten van Dijk and Srinivas Devadas
-
2012/265 ( PDF )
- Foundations of Garbled Circuits
- Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
-
2012/264 ( PDF )
- On the (In)Security of IDEA in Various Hashing Modes
- Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang
-
2012/263 ( PDF )
- One-way Functions from Chebyshev Polynomials
- Kai-Yuen Cheong
-
2012/262 ( PDF )
- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
- I. Damgard and M. Keller and E. Larraia and C. Miles and N.P. Smart
-
2012/261 ( PDF )
- Dual Form Signatures: An Approach for Proving Security from Static Assumptions
- Michael Gerbush and Allison Lewko and Adam O'Neill and Brent Waters
-
2012/260 ( PDF )
- Transposition of AES Key Schedule
- Jialin Huang, Xuejia Lai
-
2012/259 ( PDF )
- A Novel Strong Designated Verifier Signature Scheme without Random Oracles
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
-
2012/258 ( PDF )
- Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols
- José Bacelar Almeida and Manuel Barbosa and Endre Bangerter and Gilles Barthe and Stephan Krenn and Santiago Zanella Béguelin
-
2012/257 ( -- withdrawn -- )
- The Transformation from the Galois NLFSR to the Fibonacci Configuration
- Lin Zhiqiang
-
2012/256 ( PDF )
- The myth of generic DPA...and the magic of learning
- Carolyn Whitnall and Elisabeth Oswald and Fran\c{c}ois-Xavier Standaert
-
2012/255 ( PDF )
- How to Garble Arithmetic Circuits
- Benny Applebaum and Yuval Ishai and Eyal Kushilevitz
-
2012/254 ( PDF )
- FastPRP: Fast Pseudo-Random Permutations for Small Domains
- Emil Stefanov and Elaine Shi
-
2012/253 ( PDF )
- Cryptanalysis of pairing-free certificateless authenticated key agreement protocol
- Zhian Zhu
-
2012/252 ( PDF )
- Fair Private Set Intersection with a Semi-trusted Arbiter
- Changyu Dong and Liqun Chen and Jan Camenisch and Giovanni Russello
-
2012/251 ( PDF )
- The Linux Pseudorandom Number Generator Revisited
- Patrick Lacharme and Andrea Röck and Vincent Strubel and Marion Videau
-
2012/250 ( PDF )
- New Identity Based Encryption And Its Proxy Re-encryption
- Xu An Wang and Xiaoyuan Yang
-
2012/249 ( PDF )
- Binary and q-ary Tardos codes, revisited
- Boris Skoric and Jan-Jaap Oosterwijk
-
2012/248 ( PDF )
- Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
- Ghassan O. Karame and Elli Androulaki and Srdjan Capkun
-
2012/247 ( PDF )
- On Efficient Pairings on Elliptic Curves over Extension Fields
- Xusheng Zhang and Kunpeng Wang and Dongdai Lin
-
2012/246 ( PDF )
- A Secret Sharing Scheme Based on Group Presentations and the Word Problem
- Maggie Habeeb and Delaram Kahrobaei and Vladimir Shpilrain
-
2012/245 ( PDF )
- On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes
- Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen
-
2012/244 ( PDF )
- Cryptography from tensor problems
- Leonard J. Schulman
-
2012/243 ( PDF )
- COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES
- MYUNGSUN KIM and JIHYE KIM and AND JUNG HEE CHEON
-
2012/242 ( PDF )
- Less is More: Relaxed yet Composable Security Notions for Key Exchange
- C. Brzuska and M. Fischlin and N.P. Smart and B. Warinschi and S. Williams
-
2012/241 ( PDF )
- Key distribution system and attribute-based encryption
- Masahiro Yagisawa
-
2012/240 ( PDF )
- Ring Switching in BGV-Style Homomorphic Encryption
- Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart
-
2012/239 ( PDF )
- Zero-Knowledge for Multivariate Polynomials
- Valerie Nachef and Jacques Patarin and Emmanuel Volte
-
2012/238 ( PDF )
- The Boomerang Attacks on the Round-Reduced Skein-512
- Hongbo Yu and Jiazhe Chen and XIaoyun Wang
-
2012/237 ( PS PS.GZ PDF )
- In the point of view security, An efficient scheme in IBE with random oracle
- Rkia Aouinatou1, Mostafa Belkasmi2
-
2012/236 ( PDF )
- On Necessary and Sufficient Conditions for Private Ballot Submission
- D. Bernhard and O. Pereira and B. Warinschi
-
2012/235 ( PDF )
- Ring-LWE in Polynomial Rings
- Leo Ducas and Alain Durmus
-
2012/234 ( PDF )
- SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
- Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
-
2012/233 ( PDF )
- A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis
- Qi Chai and Guang Gong
-
2012/232 ( PDF )
- Implementing Pairings at the 192-bit Security Level
- Diego F. Aranha and Laura Fuentes-Castańeda and Edward Knapp and Alfred Menezes and Francisco Rodríguez-Henríquez
-
2012/231 ( PDF )
- A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT
- Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin and Pengwei Wang
-
2012/230 ( PDF )
- On Ideal Lattices and Learning with Errors Over Rings
- Vadim Lyubashevsky and Chris Peikert and Oded Regev
-
2012/229 ( PDF )
- Languages with Efficient Zero-Knowledge PCP's are in SZK
- Mohammad Mahmoody and David Xiao
-
2012/228 ( PDF )
- Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
- Marten van Dijk and Ulrich Rührmair
-
2012/227 ( -- withdrawn -- )
- Secure password-based remote user authentication scheme with non-tamper resistant smart cards
- Ding Wang and Chun-guang Ma and Peng Wu
-
2012/226 ( PDF )
- ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
- Sarah Meiklejohn and C. Chris Erway and Alptekin Küpçü and Theodora Hinkle and Anna Lysyanskaya
-
2012/225 ( PDF )
- When Homomorphism Becomes a Liability
- Zvika Brakerski
-
2012/224 ( PDF )
- Shorter Identity-Based Encryption via Asymmetric Pairings
- Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee
-
2012/223 ( PDF )
- A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes
- Enrico Thomae
-
2012/222 ( PDF )
- A secret sharing scheme of prime numbers based on hardness of factorization
- Kai-Yuen Cheong
-
2012/221 ( PDF )
- Almost-Everywhere Secure Computation with Edge Corruptions
- Nishanth Chandran and Juan Garay and Rafail Ostrovsky
-
2012/220 ( PDF )
- Hedged Public-key Encryption: How to Protect against Bad Randomness
- Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek
-
2012/219 ( PDF )
- Private Fingerprint Matching
- Siamak F. Shahandashti and Reihaneh Safavi-Naini and Philip Ogunbona
-
2012/218 ( PDF )
- Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
- T-H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu
-
2012/217 ( PDF )
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2012/216 ( PDF )
- Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
- Duong-Hieu Phan and David Pointcheval and Siamak F. Shahandashti and Mario Strefler
-
2012/215 ( PDF )
- Quadratic Span Programs and Succinct NIZKs without PCPs
- Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova
-
2012/214 ( PDF )
- Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version)
- Shengbao Wu and Mingsheng Wang
-
2012/213 ( PDF )
- Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
- Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
-
2012/212 ( PDF )
- Perfect Algebraic Immune Functions
- Meicheng Liu and Yin Zhang and Dongdai Lin
-
2012/211 ( PDF )
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama
-
2012/210 ( PDF )
- On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks
- Yusong Du, and Fangguo Zhang
-
2012/209 ( PS PS.GZ PDF )
- Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications
- Donghoon Chang and Moti Yung
-
2012/208 ( PDF )
- A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER
- Jay Shah and Ayan Mahalanobis
-
2012/207 ( -- withdrawn -- )
- Cryptanalysis of Hummingbird-2
- Kai Zhang, Lin Ding and Jie Guan
-
2012/206 ( PDF )
- (Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others (Extended Version)
- Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou
-
2012/205 ( PDF )
- Information-flow control for programming on encrypted data
- J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman
-
2012/204 ( PDF )
- Unique Group Signatures
- Matthew Franklin and Haibin Zhang
-
2012/203 ( PDF )
- Robust biometric-based user authentication scheme for wireless sensor networks
- Debiao He
-
2012/202 ( PDF )
- Secure Similarity Coefficients Computation with Malicious Adversaries
- Bo Zhang and Fangguo Zhang
-
2012/201 ( PDF )
- Comment an Anonymous Multi-receiver Identity-based Encryption Scheme
- J.H.Zhang, Y.B.Cui
-
2012/200 ( PDF )
- Aggregate Signcryption
- Alexander W. Dent
-
2012/199 ( PDF )
- Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm
- Jean-Charles Faugčre and Pierrick Gaudry and Louise Huot and Guénaël Renault
-
2012/198 ( PDF )
- Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
- Jae Hong Seo and Jung Hee Cheon
-
2012/197 ( PDF )
- On The Security of One-Witness Blind Signature Schemes
- Foteini Baldimtsi and Anna Lysyanskaya
-
2012/196 ( PS PS.GZ PDF )
- Multi-Instance Security and its Application to Password-Based Cryptography
- Mihir Bellare and Thomas Ristenpart and Stefano Tessaro
-
2012/195 ( PDF )
- The BlueJay Ultra-Lightweight Hybrid Cryptosystem
- Markku-Juhani O. Saarinen
-
2012/194 ( PDF )
- A Multivariate based Threshold Ring Signature Scheme
- Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
-
2012/193 ( PDF )
- An Efficient Homomorphic Encryption Protocol for Multi-User Systems
- Liangliang Xiao and Osbert Bastani and I-Ling Yen
-
2012/192 ( PDF )
- Extending Order Preserving Encryption for Multi-User Systems
- Liangliang Xiao and I-Ling Yen and Dung T. Huynh
-
2012/191 ( PDF )
- Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes
- Liangliang Xiao and I-Ling Yen
-
2012/190 ( PDF )
- On the Security of an Improved Password Authentication Scheme Based on ECC
- Ding Wang and Chun-guang Ma
-
2012/189 ( PDF )
- Universally Composable Key-Management
- Steve Kremer and Robert Künnemann and Graham Steel
-
2012/188 ( PS PS.GZ PDF )
- Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification
- Xin Li
-
2012/187 ( PDF )
- SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)
- Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann
-
2012/186 ( PDF )
- Third-order nonlinearities of some biquadratic monomial Boolean functions
- Brajesh Kumar Singh
-
2012/185 ( PDF )
- Replay attacks that violate ballot secrecy in Helios
- Ben Smyth
-
2012/184 ( PDF )
- Asymptotic fingerprinting capacity in the Combined Digit Model
- Dion Boesten and Boris Skoric
-
2012/183 ( PDF )
- Differentially Private Smart Metering with Battery Recharging
- Michael Backes and Sebastian Meiser
-
2012/182 ( PDF )
- How to Construct Quantum Random Functions
- Mark Zhandry
-
2012/181 ( PDF )
- Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange
- Nils Fleischhacker and Mark Manulis and Amir Azodi
-
2012/180 ( PDF )
- Yet Another SHA-3 Round 3 FPGA Results Paper
- Brian Baldwin and William P. Marnane
-
2012/179 ( PDF )
- Billion-Gate Secure Computation with Malicious Adversaries
- Benjamin Kreuter and abhi shelat and Chih-hao Shen
-
2012/178 ( PDF )
- Eperio: Mitigating Technical Complexity in Cryptographic Election Verification
- Aleksander Essex and Jeremy Clark and Urs Hengartner and Carlisle Adams
-
2012/177 ( PDF )
- Everlasting Quantum Security
- Unruh, Dominique
-
2012/176 ( PS PS.GZ PDF )
- Improvements of Algebraic Attacks Based on Structured Gaussian Elimination
- Satrajit Ghosh and Abhijit Das
-
2012/175 ( PDF )
- Optimal First-Order Masking with Linear and Non-Linear Bijections
- Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY and Jean-Luc DANGER
-
2012/174 ( PDF )
- Zero Knowledge with Rubik's Cubes and Non-Abelian Groups
- Emmanuel VOLTE and Jacques PATARIN and Valérie NACHEF
-
2012/173 ( PS PS.GZ PDF )
- Automatically Verified Mechanized Proof of One-Encryption Key Exchange
- Bruno Blanchet
-
2012/172 ( PDF )
- Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
- Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz
-
2012/171 ( PS PS.GZ PDF )
- Quantum Money from Hidden Subspaces
- Scott Aaronson and Paul Christiano
-
2012/170 ( PDF )
- Approaches for the performance increasing of software implementation of integer multiplication in prime fields
- Vladislav Kovtun and Andrew Okhrimenko
-
2012/169 ( PDF )
- Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers
- Xiaopei Guo, Kejian Xu, Tongsen Sun and Xiubin Fan
-
2012/168 ( PDF )
- A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes
- Val\'erie Gauthier and Ayoub Otmani and Jean-Pierre Tillich
-
2012/167 ( PDF )
- Pairing-based methods for genus 2 jacobians with maximal endomorphism ring
- Sorina Ionica
-
2012/166 ( PDF )
- A List of Maximum Period NLFSRs
- Elena Dubrova
-
2012/165 ( PDF )
- Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy
- Cristina Onete
-
2012/164 ( PDF )
- On Secure Two-party Integer Division
- Morten Dahl, Chao Ning, Tomas Toft
-
2012/163 ( PDF )
- Differential propagation analysis of Keccak
- Joan Daemen and Gilles Van Assche
-
2012/162 ( PS PS.GZ PDF )
- Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network
- Jayaprakash Kar
-
2012/161 ( PDF )
- New Constructions of Low Correlation Sequences with High Linear Complexity
- Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
-
2012/160 ( -- withdrawn -- )
- New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set
- Hai Xiong, Longjiang Qu, Chao Li
-
2012/159 ( PDF )
- Hybrid Encryption in the Multi-User Setting
- G.M. Zaverucha
-
2012/158 ( PDF )
- Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
- Peter Gazi and Stefano Tessaro
-
2012/157 ( PDF )
- Attack on Fully Homomorphic Encryption over the Integers
- Gu Chunsheng
-
2012/156 ( PDF )
- Fast Embedded Software Hashing
- Dag Arne Osvik
-
2012/155 ( PS PS.GZ PDF )
- Toward Practical Group Encryption
- Laila El Aimani and Marc Joye
-
2012/154 ( PS PS.GZ PDF )
- The Joint Signature and Encryption Revisited
- Laila El Aimani
-
2012/153 ( PDF )
- A Framework for the Cryptographic Verification of Java-like Programs
- Ralf Kuesters and Tomasz Truderung and Juergen Graf
-
2012/152 ( PDF )
- On security of a Certificateless Aggregate Signature Scheme
- Limin Shen, Yinxia Sun
-
2012/151 ( PDF )
- On Boolean Ideals and Varieties with Application to Algebraic Attacks
- Alexander Rostovtsev and Alexey Mizyukin
-
2012/150 ( PDF )
- Circular chosen-ciphertext security with compact ciphertexts
- Dennis Hofheinz
-
2012/149 ( PDF )
- Attacking Scrambled Burrows-Wheeler Transform
- Martin Stanek
-
2012/148 ( PDF )
- Replacing Username/Password with Software-Only Two-Factor Authentication
- Michael Scott
-
2012/147 ( PDF )
- On Security Arguments of the Second Round SHA-3 Candidates
- Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger
-
2012/146 ( PDF )
- On Polynomial Systems Arising from a Weil Descent
- Christophe Petit and Jean-Jacques Quisquater
-
2012/145 ( PDF )
- Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
- Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryou Fujita
-
2012/144 ( PDF )
- Somewhat Practical Fully Homomorphic Encryption
- Junfeng Fan and Frederik Vercauteren
-
2012/143 ( PDF )
- Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
- Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
-
2012/142 ( PDF )
- Identity-Based Encryption with Master Key-Dependent Message Security and Applications
- David Galindo and Javier Herranz and Jorge Villar
-
2012/141 ( PDF )
- Bicliques for permutations: collision and preimage attacks in stronger settings
- Dmitry Khovratovich
-
2012/140 ( PDF )
- Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors
- Selcuk Baktir and Erkay Savas
-
2012/139 ( PDF )
- Formal verication of secure ad-hoc network routing protocols using deductive model-checking
- Ta Vinh Thong
-
2012/138 ( PDF )
- An Improved Differential Attack on Full GOST
- Nicolas T. Courtois
-
2012/137 ( PDF )
- Usable assembly language for GPUs: a success story
- Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
-
2012/136 ( PDF )
- Adaptive Key Protection in Complex Cryptosystems with Attributes
- Zilong Wang and Danfeng (Daphne) Yao and Rongquan Feng
-
2012/135 ( PDF )
- David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token
- Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade
-
2012/134 ( PDF )
- A Digital Signature Scheme for Long-Term Security
- Dimitrios Poulakis and Robert Rolland
-
2012/133 ( PDF )
- Toward Practical Private Access to Data Centers via Parallel ORAM
- Jacob R. Lorch and Bryan Parno and James Mickens and Mariana Raykova and Joshua Schiffman
-
2012/132 ( PDF )
- CFS Software Implementation
- Gregory Landais and Nicolas Sendrier
-
2012/131 ( PDF )
- Security of Feistel Schemes with New and Various Tools
- Rodolphe LAMPE and Jacques PATARIN
-
2012/130 ( PDF )
- Broadcast-Efficient Secure Multiparty Computation
- Juan Garay and Clint Givens and Rafail Ostrovsky
-
2012/129 ( PDF )
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
- Nelly Fazio and Irippuge Milinda Perera
-
2012/128 ( PDF )
- Provably Secure Distance-Bounding: an Analysis of Prominent Protocols
- Marc Fischlin and Cristina Onete
-
2012/127 ( PDF )
- Additive autocorrelation of some classes of cubic semi-bent Boolean functions
- Deep Singh and Maheshanand Bhaintwal
-
2012/126 ( PDF )
- Compact Implementation of Threefish and Skein on FPGA
- Nuray At and Jean-Luc Beuchat and Ismail San
-
2012/125 ( -- withdrawn -- )
- Short and Efficient Expressive Attribute-Based Signature in the Standard Model
- Aijun Ge and Cheng Chen and Chuangui Ma and Zhenfeng Zhang
-
2012/124 ( PS PS.GZ PDF )
- On Securing Communication From Profilers
- Sandra Diaz-Santiago and Debrup Chakraborty
-
2012/123 ( PDF )
- Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-
- A. Dehbaoui and J.M. Dutertre and B. Robisson and P. Orsatelli and P. Maurine and A. Tria
-
2012/122 ( PDF )
- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three
- Reza R. Farashahi and Hongfeng Wu and Chang-An Zhao
-
2012/121 ( PDF )
- An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps
- Mitra Fatemi and Taraneh Eghlidos and Mohammadreza Aref
-
2012/120 ( PDF )
- Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks
- Yongge Wang
-
2012/119 ( PDF )
- Accelerating the Final Exponentiation in the Computation of the Tate Pairings
- Taechan Kim, Sungwook Kim, Jung Hee Cheon
-
2012/118 ( PDF )
- Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks
- S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
-
2012/117 ( PDF )
- Universally Composable Security With Local Adversaries
- Ran Canetti and Margarita Vald
-
2012/116 ( PDF )
- Clash Attacks on the Verifiability of E-Voting Systems
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2012/115 ( PDF )
- Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing
- XU Chun-xiang and HE Xiao-hu and Daniel Abraha
-
2012/114 ( PDF )
- On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives
- Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
-
2012/113 ( PDF )
- On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model
- Bart Mennink
-
2012/112 ( PDF )
- On The Nonlinearity of Maximum-length NFSR Feedbacks
- Meltem Sonmez Turan
-
2012/111 ( PDF )
- On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks
- Yin Zhang and Meicheng Liu and Dongdai Lin
-
2012/110 ( PDF )
- Finding Optimal Formulae for Bilinear Maps
- Razvan Barbulescu and Jérémie Detrey and Nicolas Estibals and Paul Zimmermann
-
2012/109 ( -- withdrawn -- )
- Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model
- Yang Cui and Kirill Morozov
-
2012/108 ( PDF )
- On the Optimality of Lattices for the Coppersmith Technique
- Yoshinori Aono and Manindra Agrawal and Takakazu Satoh and Osamu Watanabe
-
2012/107 ( PDF )
- Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
- Guilin Wang and Jiangshan Yu and Qi Xie
-
2012/106 ( PDF )
- More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents
- Santanu Sarkar and Subhamoy Maitra
-
2012/105 ( PDF )
- Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited
- Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
-
2012/104 ( PDF )
- Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
- Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
-
2012/103 ( PDF )
- FlipIt: The Game of "Stealthy Takeover"
- Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest
-
2012/102 ( PDF )
- On the Circular Security of Bit-Encryption
- Ron Rothblum
-
2012/101 ( -- withdrawn -- )
- Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)>=3"
- Zhihui Ou
-
2012/100 ( PDF )
- Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
- Shahram Khazaei and Bj{\"o}rn Terelius and Douglas Wikstr{\"o}m
-
2012/099 ( PDF )
- Homomorphic Evaluation of the AES Circuit
- Craig Gentry and Shai Halevi and Nigel P. Smart
-
2012/098 ( PS PS.GZ PDF )
- Combined Attacks on the AES Key Schedule
- François Dassance and Alexandre Venelli
-
2012/097 ( PDF )
- An algorithm for factoring integers
- Yingpu Deng and Yanbin Pan
-
2012/096 ( PDF )
- The Collision Security of MDC-4
- Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel
-
2012/095 ( PDF )
- Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data
- Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer
-
2012/094 ( PDF )
- Algebraic attack on lattice based cryptosystems via solving equations over real numbers.
- Jintai Ding and Dieter Schmidt
-
2012/093 ( PDF )
- Recent Results on Balanced Symmetric Boolean Functions
- Yingming Guo and Guangpu Gao and Yaqun Zhao
-
2012/092 ( PDF )
- Tolerant Algebraic Side-Channel Analysis of {AES}
- Yossef Oren and Avishai Wool
-
2012/091 ( -- withdrawn -- )
- Hardness of decision (R)LWE for any modulus
- Adeline Langlois and Damien Stehle
-
2012/090 ( PDF )
- Worst-Case to Average-Case Reductions for Module Lattices
- Adeline Langlois and Damien Stehle
-
2012/089 ( PDF )
- ECM at Work
- Joppe W. Bos and Thorsten Kleinjung
-
2012/088 ( -- withdrawn -- )
- A Lattice-Based Traitor Tracing Scheme
- San Ling and Damien Stehle
-
2012/087 ( PDF )
- Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms
- Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev
-
2012/086 ( -- withdrawn -- )
- Remarks on- An ideal multi-secret sharing scheme based on MSP
- Zhi-hui Li Jing Li
-
2012/085 ( PDF )
- Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery
- Stanislav Bulygin and Michael Walter
-
2012/084 ( PDF )
- Improved Algebraic Side-Channel Attack on AES
- Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter
-
2012/083 ( PDF )
- Optimally Robust Private Information Retrieval
- Casey Devet and Ian Goldberg and Nadia Heninger
-
2012/082 ( PDF )
- Semi-Supervised Template Attack
- Liran Lerman and Stephane Fernandes Medeiros and Nikita Veshchikov and Cedric Meuter and Gianluca Bontempi and Olivier Markowitch
-
2012/081 ( PDF )
- Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification
- Michael Backes and Fabian Bendun and Dominique Unruh
-
2012/080 ( PDF )
- Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model
- S. Sree Vivek and S. Sharmila Deva Selvi and Guhan Balasubramanian and C. Pandu Rangan
-
2012/079 ( PDF )
- Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
- Masao KASAHARA
-
2012/078 ( PDF )
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Zvika Brakerski
-
2012/077 ( PDF )
- MAGNITUDE SQUARED COHERENCE BASED SCA
- Sebastien Tiran and Amine Dehbaoui and Philippe Maurine
-
2012/076 ( PDF )
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- Mark Zhandry
-
2012/075 ( PDF )
- Efficient identity-based threshold decryption scheme from bilinear pairings
- Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang and Guoyan Zhang
-
2012/074 ( PDF )
- Another look at HMAC
- Neal Koblitz and Alfred Menezes
-
2012/073 ( PDF )
- Efficient identity-based threshold signature scheme from bilinear pairings in the standard model
- Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
-
2012/072 ( PDF )
- Particularly Friendly Members of Family Trees
- Craig Costello
-
2012/071 ( PDF )
- Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems
- Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer
-
2012/070 ( PDF )
- Finding ECM-Friendly Curves through a Study of Galois Properties
- Razvan Barbulescu and Joppe W. Bos and Cyril Bouvier and Thorsten Kleinjung and Peter L. Montgomery
-
2012/069 ( PDF )
- Automatic Search of Attacks on round-reduced AES and Applications
- Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque
-
2012/068 ( PDF )
- Extended Security Arguments for (Ring) Signature Schemes
- Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, and Pierre-Louis Cayrel
-
2012/067 ( PDF )
- Parallelizing message schedules to accelerate the computations of hash functions
- Shay Gueron, Vlad Krasnov
-
2012/066 ( PDF )
- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
- Jiqiang Lu and Wen-She Yap and Yongzhuang Wei
-
2012/065 ( PDF )
- Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha”
- Tsukasa Ishiguro
-
2012/064 ( PDF )
- Ron was wrong, Whit is right
- Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter
-
2012/063 ( PDF )
- Randomized Partial Checking Revisited
- Shahram Khazaei and Douglas Wikstr{\"o}m
-
2012/062 ( -- withdrawn -- )
- On the Security of Attribute Based Signature Schemes
- S Sharmila Deva Selvi and Subhashini Venugopalan and C. Pandu Rangan
-
2012/061 ( PDF )
- A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
-
2012/060 ( PDF )
- Improved Security for Linearly Homomorphic Signatures: A Generic Framework
- David Mandell Freeman
-
2012/059 ( PDF )
- Message Authentication, Revisited
- Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs
-
2012/058 ( PS PS.GZ PDF )
- Key recycling in authentication
- Christopher Portmann
-
2012/057 ( PDF )
- (Anonymous) Fully Secure Constant-Size Ciphertext HIBE From Type-3 Pairings
- Somindu C. Ramanna and Palash Sarkar
-
2012/056 ( PDF )
- A New Pseudorandom Generator from Collision-Resistant Hash Functions
- Alexandra Boldyreva and Virendra Kumar
-
2012/055 ( -- withdrawn -- )
- Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks
- Hongbin Tang and Xinsong Liu
-
2012/054 ( PDF )
- On the performance of certain Private Set Intersection protocols
- Emiliano De Cristofaro and Gene Tsudik
-
2012/053 ( PS PS.GZ PDF )
- Beating Shannon requires BOTH efficient adversaries AND non-zero advantage
- Yevgeniy Dodis
-
2012/052 ( PDF )
- Identity-based Encryption with Efficient Revocation
- Alexandra Boldyreva and Vipul Goyal and Virendra Kumar
-
2012/051 ( PDF )
- Eavesdropping on Satellite Telecommunication Systems
- Benedikt Driessen
-
2012/050 ( PDF )
- Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture
- Jeremy Constantin and Andreas Burg and Frank K. Gurkaynak
-
2012/049 ( PDF )
- 2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160
- Yu Sasaki and Lei Wang
-
2012/048 ( PDF )
- Designing Integrated Accelerator for Stream Ciphers with Structural Similarities
- Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid
-
2012/047 ( PDF )
- Incremental Deterministic Public-Key Encryption
- Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev
-
2012/046 ( PDF )
- Modifying Boolean Functions to Ensure Maximum Algebraic Immunity
- Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis
-
2012/045 ( PS PS.GZ PDF )
- Signature Schemes Secure against Hard-to-Invert Leakage
- Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel
-
2012/044 ( PDF )
- PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems
- Jun Zhou, Zhenfu Cao
-
2012/043 ( PDF )
- A novel Group Key Transfer Protocol
- Chingfang Hsu and Bing Zeng and Qi Cheng and Guohua Cui
-
2012/042 ( PDF )
- Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing
- Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi
-
2012/041 ( -- withdrawn -- )
- A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION
- Norziana Jamil and Ramlan Mahmood and Muhammad Reza Z'aba and Nur Izura Udzir and Zuriati Ahmad Zukarnaen
-
2012/040 ( PDF )
- Single-block collision attack on MD5
- Marc Stevens
-
2012/039 ( PDF )
- Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol
- Feng Hao and Dylan Clarke
-
2012/038 ( PDF )
- Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure
- François Durvaux and Mathieu Renauld and François-Xavier Standaert and Loic van Oldeneel tot Oldenzeel and Nicolas Veyrat-Charvillon
-
2012/037 ( PDF )
- Some results on $q$-ary bent functions
- Deep Singh, Maheshanand Bhaintwal and Brajesh Kumar Singh
-
2012/036 ( PS PS.GZ PDF )
- Efficient Leakage-free Authentication of Trees, Graphs and Forests
- Ashish Kundu, Mikhail Atallah, Elisa Bertino
-
2012/035 ( PDF )
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
-
2012/034 ( PDF )
- Automatic Quantification of Cache Side-Channels
- Boris Köpf and Laurent Mauborgne and Martin Ochoa
-
2012/033 ( PDF )
- A note on hyper-bent functions via Dillon-like exponents
- Sihem Mesnager and Jean-Pierre Flori
-
2012/032 ( PS PS.GZ PDF )
- Counterexamples to Hardness Amplification Beyond Negligible
- Yevgeniy Dodis and Abhishek Jain and Tal Moran and Daniel Wichs
-
2012/031 ( PDF )
- An error in "On a new formal proof model for RFID location privacy"
- Da-Zhi Sun
-
2012/030 ( PDF )
- Fault Analysis of the KATAN Family of Block Ciphers
- Shekh Faisal Abdul-Latip and Mohammad Reza Reyhanitabar and Willy Susilo and Jennifer Seberry
-
2012/029 ( PDF )
- On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
- Yannick Seurin
-
2012/028 ( PDF )
- A First-Order Leak-Free Masking Countermeasure
- Houssem MAGHREBI and Emmanuel PROUFF and Sylvain GUILLEY and Jean-Luc DANGER
-
2012/027 ( -- withdrawn -- )
- Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack
- Ali Mackvandi and Maryam Saeed and Mansour Naddafiun
-
2012/026 ( PS PS.GZ PDF )
- Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding
- Anja Becker and Antoine Joux and Alexander May and Alexander Meurer
-
2012/025 ( PDF )
- A new remote data integrity checking scheme for cloud storage
- Xiangtao Yan and Yifa Li
-
2012/024 ( PS PS.GZ PDF )
- Variants of Waters' Dual-System Primitives Using Asymmetric Pairings
- Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar
-
2012/023 ( PS PS.GZ PDF )
- On the security of Lo et al.’s ownership transfer protocol
- Masoumeh Safkhani and Nasour Bagheri and Majid Naderi and Ali Mahani
-
2012/022 ( PS PS.GZ PDF )
- Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity
- Mihir Bellare and Stefano Tessaro
-
2012/021 ( -- withdrawn -- )
- Security Analysis of J-PAKE
- Mohsen Toorani
-
2012/020 ( PDF )
- Dickson polynomials, hyperelliptic curves and hyper-bent functions
- Jean-Pierre Flori and Sihem Mesnager
-
2012/019 ( PDF )
- Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
- Gergei Bana and Hubert Comon-Lundh
-
2012/018 ( PDF )
- Attacks and Security Proofs of EAX-Prime
- Kazuhiko Minematsu and Stefan Lucks and Hiraku Morita and Tetsu Iwata
-
2012/017 ( PDF )
- Secondary constructions on generalized bent functions
- Brajesh Kumar Singh
-
2012/016 ( -- withdrawn -- )
- Efficient Mix-Net Verication by Proofs of Random Blocks
- Denise Demirel and Melanie Volkamer and Hugo Jonker
-
2012/015 ( PS PS.GZ PDF )
- A Cryptographic Treatment of the Wiretap Channel
- Mihir Bellare and Stefano Tessaro and Alexander Vardy
-
2012/014 ( PDF )
- Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
- Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
-
2012/013 ( -- withdrawn -- )
- Higher Order Algebraic Attacks on Stream Ciphers
- Qichun Wang and Thomas Johansson
-
2012/012 ( PDF )
- Malleable Proof Systems and Applications
- Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
-
2012/011 ( PDF )
- Biclique Attack of the Full ARIA-256
- Shao-zhen Chen Tian-min Xu
-
2012/010 ( PDF )
- PayTree: "Amortized Signature" for Flexible Micro-Payments
- Charanjit Jutla and Moti Yung
-
2012/009 ( PDF )
- On the Indifferentiability of the Integrated-Key Hash Functions
- Saif Al-Kuwari
-
2012/008 ( PDF )
- Security proof with dishonest keys
- Hubert Comon-Lundh and Véronique Cortier and Guillaume Scerri
-
2012/007 ( PDF )
- Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures
- Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
-
2012/006 ( PDF )
- Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
- Susan Hohenberger and Allison Lewko and Brent Waters
-
2012/005 ( PS PS.GZ PDF )
- A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
- Benjamin Fuller and Adam O'Neill and Leonid Reyzin
-
2012/004 ( PDF )
- The new SHA-3 software shootout
- Daniel J. Bernstein and Tanja Lange
-
2012/003 ( PDF )
- On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
- Qun-Xiong Zheng, Wen-Feng Qi and Tian Tian
-
2012/002 ( PDF )
- ECC2K-130 on NVIDIA GPUs
- Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
-
2012/001 ( PDF )
- Digital Signatures from Challenge-Divided Sigma-Protocols
- Andrew C. Yao and Yunlei Zhao
[ Cryptology ePrint archive ]