Cryptology ePrint Archive: Listing for 2014

2014/1029 ( PDF )
On the Cryptographic Hardness of Finding a Nash Equilibrium
Nir Bitansky and Omer Paneth and Alon Rosen
2014/1028 ( PDF )
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
Payal Chaudhari and Manik Lal Das and Anish Mathuria
2014/1027 ( PDF )
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Vadim Lyubashevsky and Daniel Wichs
2014/1026 ( PDF )
Lattices with Symmetry
H. W. Lenstra, Jr. and A. Silverberg
2014/1025 ( PDF )
XPIR: Private Information Retrieval for Everyone
Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian
2014/1024 ( PDF )
Cryptanalysis of the Co-ACD Assumption
Pierre-Alain Fouque and Moon Sung Lee and Tancrède Lepoint and Mehdi Tibouchi
2014/1023 ( PDF )
How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search
Nathan E. Price and Alan T. Sherman
2014/1022 ( PDF )
Topology-Hiding Computation
Tal Moran and Ilan Orlov and Silas Richelson
2014/1021 ( PDF )
Tightly-Secure Signatures from Chameleon Hash Functions
Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan
2014/1020 ( PDF )
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
2014/1019 ( -- withdrawn -- )
Related-Key Differential Cryptanalysis of Reduced-Round ITUBee
Xiaoming Tang and Weidong Qiu and Zheng Gong and Zheng Huang and Jie Guo
2014/1018 ( PDF )
Algebraic Algorithms for LWE
Martin R. Albrecht and Carlos Cid and Jean-Charles Faugère and Ludovic Perret
2014/1017 ( PDF )
Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
Foteini Baldimtsi and Olga Ohrimenko
2014/1016 ( -- withdrawn -- )
Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security
2014/1015 ( PDF )
Compact Accumulator using Lattices
Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini
2014/1014 ( PDF )
Double-and-Add with Relative Jacobian Coordinates
Björn Fay
2014/1013 ( PDF )
Computational Independence
Björn Fay
2014/1012 ( PDF )
The Boomerang Attacks on BLAKE and BLAKE2
Yonglin Hao
2014/1011 ( PDF )
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Alex Biryukov and Ivan Pustogarov
2014/1010 ( PDF )
On Continuous After-the-Fact Leakage-Resilient Key Exchange
Mohsen Toorani
2014/1009 ( PDF )
A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
Christopher D. Nguyen and Dhananjay S. Phatak and Steven D. Houston and Alan T. Sherman
2014/1008 ( PDF )
DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS
Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
2014/1007 ( PDF )
Fair Multiple-bank E-cash in the Standard Model
Jiangxiao Zhang and Yanwu Gao and Chunhui Feng and Hua Guo and Zhoujun Li
2014/1006 ( PDF )
Simple composition theorems of one-way functions -- proofs and presentations
Jaime Gaspar and Eerke Boiten
2014/1005 ( PDF )
A pure block chain based decentralized exchange.
Harsh Patel
2014/1004 ( PDF )
CONIKS: Bringing Key Transparency to End Users
Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
2014/1003 ( PDF )
COFFE: Ciphertext Output Feedback Faithful Encryption
Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel
2014/1002 ( PDF )
Experiments in Encrypted and Searchable Network Audit Logs
Bhanu Prakash Gopularam and Sashank Dara and Nalini N
2014/1001 ( -- withdrawn -- )
Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE
Xiaopeng Yang, Wenping Ma, and Chengli Zhang
2014/1000 ( PDF )
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri
2014/999 ( PDF )
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
Yongdae Kim and Hyunsoo Yoon
2014/998 ( PDF )
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
Gus Gutoski and Douglas Stebila
2014/997 ( PDF )
Constants Count: Practical Improvements to Oblivious RAM
Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas
2014/996 ( PDF )
Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
Maike Massierer
2014/995 ( PDF )
Partial Garbling Schemes and Their Applications
Yuval Ishai and Hoeteck Wee
2014/994 ( PDF )
Two novel applications of bilinear groups to ABE encryption
Riccardo Longo and Chiara Marcolla and Massimiliano Sala
2014/993 ( PDF )
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer
2014/992 ( PDF )
Incentivized Outsourced Computation Resistant to Malicious Contractors
Alptekin Kupcu
2014/991 ( PDF )
Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
Kai-Min Chung and Huijia Lin and Rafael Pass
2014/990 ( PDF )
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
Pille Pullonen and Sander Siim
2014/989 ( PDF )
Controlled Homomorphic Encryption: Definition and Construction
Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti
2014/988 ( PDF )
Armadillo: a compilation chain for privacy preserving applications
Sergiu Carpov and Paul Dubrulle and Renaud Sirdey
2014/987 ( PDF )
Cryptanalysis of Full PRIDE Block Cipher
Yibin Dai and Shaozhen Chen
2014/986 ( PDF )
Related-Key Differential Attack on Round Reduced RECTANGLE-80
Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma
2014/985 ( PDF )
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
Bartosz Zoltak
2014/984 ( PDF )
Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel
Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert
2014/983 ( PDF )
Public Verification of Private Effort
Giulia Alberini and Tal Moran and Alon Rosen
2014/982 ( PDF )
Outlier Privacy
Edward Lui and Rafael Pass
2014/981 ( PDF )
Publicly Verifiable Non-Interactive Arguments for Delegating Computation
Omer Paneth and Guy N. Rothblum
2014/980 ( PDF )
A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors
Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
2014/979 ( PDF )
The Chaining Lemma and its application
Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
2014/978 ( PDF )
Improved Differential Analysis of Block Cipher PRIDE
Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma
2014/977 ( PDF )
A Survey on Lightweight Entity Authentication with Strong PUFs
Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede
2014/976 ( PDF )
Geppetto: Versatile Verifiable Computation
Craig Costello and Cédric Fournet and Jon Howell and Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and Bryan Parno and Samee Zahur
2014/975 ( PDF )
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2014/974 ( -- withdrawn -- )
Non-Linearity and Affine Equivalence of Permutations
P R Mishra, Indivar Gupta and N Rajesh Pillai
2014/973 ( PDF )
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma
2014/972 ( PDF )
A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Haining Fan
2014/971 ( PDF )
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
Y. Wei and E. Pasalic and F. Zhang and W. Wu
2014/970 ( PDF )
Jackpot Stealing Information From Large Caches via Huge Pages
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2014/969 ( PDF )
Privacy-Preserving Face Recognition with Outsourced Computation
Can Xiang and Chunming Tang
2014/968 ( PDF )
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
Jorge Munilla and Mike Burmester and Albert Peinado
2014/967 ( PDF )
A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
Maciej Skorski
2014/966 ( PDF )
Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
Kan Yang and Xiaohua Jia and Kuan Zhang and Xuemin (Sherman) Shen
2014/965 ( PDF )
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
Romain Gay and Pierrick Méaux and Hoeteck Wee
2014/964 ( PDF )
On two windows multivariate cryptosystem depending on random parameters
Urszula Romańczuk-Polubiec, Vasyl Ustimenko
2014/963 ( PDF )
Malicious-Client Security in Blind Seer: A Scalable Private DBMS
Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
2014/962 ( PDF )
Solving Polynomial Systems with Noise over F_2: Revisited
Zhenyu Huang and Dongdai Lin
2014/961 ( PDF )
When are Fuzzy Extractors Possible?
Benjamin Fuller and Adam Smith and Leonid Reyzin
2014/960 ( PDF )
Non-Interactive Secure Multiparty Computation
Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin-Cherniavsky
2014/959 ( PDF )
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul
2014/958 ( PDF )
Authenticated Encryption: How Reordering can Impact Performance
Basel Alomair
2014/957 ( PDF )
Black Box Separations for Differentially Private Protocols
Dakshita Khurana and Hemanta K. Maji and Amit Sahai
2014/956 ( PDF )
Tamper Detection and Continuous Non-Malleable Codes
Zahra Jafargholi and Daniel Wichs
2014/955 ( PDF )
On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme
Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
2014/954 ( PDF )
Algebraic Fault Analysis of Katan
Frank Quedenfeld
2014/953 ( PDF )
The Related-Key Security of Iterated Even-Mansour Ciphers
Pooya Farshim and Gordon Procter
2014/952 ( PDF )
Balanced Encoding to Mitigate Power Analysis: A Case Study
Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye
2014/951 ( PDF )
Modified Alternating Step Generators with Non-Linear Scrambler
Robert Wicik and Tomasz Rachwalik and Rafał Gliwa
2014/950 ( PDF )
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda
2014/949 ( PDF )
Simplification/complication of the basis of prime Boolean ideal
Alexander Rostovtsev and Anna Shustrova
2014/948 ( PDF )
Lattice Point Enumeration on Block Reduced Bases
Michael Walter
2014/947 ( PDF )
The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2014/946 ( PDF )
On a new fast public key cryptosystem
Samir Bouftass and Abdelhak Azhari
2014/945 ( PDF )
Boomerang Attack on Step-Reduced SHA-512
Hongbo Yu, Dongxia Bai
2014/944 ( PDF )
EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes
Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
2014/943 ( PDF )
HaTCh: A Formal Framework of Hardware Trojan Design and Detection
Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk
2014/942 ( PDF )
Public-Coin Differing-Inputs Obfuscation and Its Applications
Yuval Ishai, Omkant Pandey, Amit Sahai
2014/941 ( PDF )
Garbled RAM From One-Way Functions
Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro
2014/940 ( PDF )
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2014/939 ( PDF )
Security Analysis of an Authentication Scheme Using Smart Cards
Gaurav Tiwari and Amit K. Awasthi and Neha Shukla
2014/938 ( PDF )
Trapdoor Computational Fuzzy Extractors
Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
2014/937 ( PDF )
Analysis of Lewko-Sahai-Waters Revocation System
Zhengjun Cao and Lihua Liu
2014/936 ( PDF )
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
2014/935 ( PDF )
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia
2014/934 ( PDF )
Efficient Generic Zero-Knowledge Proofs from Commitments
Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias
2014/933 ( PDF )
Certificateless Proxy Re-Encryption Without Pairing: Revisited
Akshayaram Srinivasan and C. Pandu Rangan
2014/932 ( PDF )
Bicliques with Minimal Data and Time Complexity for AES (Extended Version)
Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
2014/931 ( PDF )
Cryptanalysis of JAMBU
Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang
2014/930 ( PDF )
Immunizing Multilinear Maps Against Zeroizing Attacks
Dan Boneh and David J. Wu and Joe Zimmerman
2014/929 ( PDF )
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero
Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai
2014/928 ( PDF )
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois
2014/927 ( PDF )
Physical functions : the common factor of side-channel and fault attacks ?
Bruno Robisson and Hélène Le Bouder
2014/926 ( PDF )
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Keita Emura and Takuya Hayashi
2014/925 ( PDF )
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
Venkata Koppula and Allison Bishop Lewko and Brent Waters
2014/924 ( PDF )
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
Antoine Joux and Cécile Pierrot
2014/923 ( -- withdrawn -- )
New Cryptosystem Using The CRT And The Jordan Normal Form
Hemlata Nagesh and Birendra Kumar Sharma
2014/922 ( PDF )
Differential Analysis of Block Ciphers SIMON and SPECK
Alex Biryukov and Arnab Roy and Vesselin Velichkov
2014/921 ( PDF )
Batch NFS
Daniel J. Bernstein and Tanja Lange
2014/920 ( PDF )
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert
2014/919 ( PDF )
Experimenting with Shuffle Block Cipher and SMT Solvers
Martin Stanek
2014/918 ( PDF )
Web Tap Payment Authentication and Encryption With Zero Customer Effort
Henry Ng
2014/917 ( PDF )
From Selective to Adaptive Security in Functional Encryption
Prabhanjan Ananth and Zvika Brakerski and Gil Segev and Vinod Vaikuntanathan
2014/916 ( PDF )
Adaptively Secure Fully Homomorphic Signatures Based on Lattices
Xavier Boyen and Xiong Fan and Elaine Shi
2014/915 ( PDF )
The Security of the Hanser-Slamanig Signature Scheme Revisited
Yanbin Pan
2014/914 ( PDF )
Cryptography with One-Way Communication
Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2014/913 ( PDF )
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2014/912 ( PDF )
Low-Cost Concurrent Error Detection for GCM and CCM
Xiaofei Guo and Ramesh Karri
2014/911 ( PDF )
A Denial of Service Attack against Fair Computations using Bitcoin Deposits
Jethro Beekman
2014/910 ( PDF )
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model
Vanishree Rao
2014/909 ( PDF )
Robust Secret Sharing Schemes Against Local Adversaries
Allison Bishop Lewko and Valerio Pastro
2014/908 ( PDF )
Practical UC security with a Global Random Oracle
Ran Canetti and Abhishek Jain and Alessandra Scafuro
2014/907 ( PDF )
Finding shortest lattice vectors faster using quantum search
Thijs Laarhoven and Michele Mosca and Joop van de Pol
2014/906 ( PDF )
Cryptanalysis of the Multilinear Map over the Integers
Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehle
2014/905 ( PDF )
Primary-Secondary-Resolver Membership Proof Systems
Moni Naor and Asaf Ziv
2014/904 ( PDF )
How Secure is TextSecure?
Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz
2014/903 ( PDF )
Falcon Codes: Fast, Authenticated LT Codes
Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos
2014/902 ( PDF )
The Power of Negations in Cryptography
Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen
2014/901 ( PDF )
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
Kenneth G. Paterson and Mario Strefler
2014/900 ( PDF )
Some Security Results of the RC4+ Stream Cipher
Subhadeep Banik and Sonu Jha
2014/899 ( PDF )
Side Channel Power Analysis of an AES-256 Bootloader
Colin O'Flynn and Zhizhang Chen
2014/898 ( PDF )
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
Eduardo Morais and Ricardo Dahab
2014/897 ( PDF )
Leveled Fully Homomorphic Signatures from Standard Lattices
Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs
2014/896 ( PDF )
Efficiently Making Secure Two-Party Computation Fair
Handan Kılınç, Alptekin Küpçü
2014/895 ( PDF )
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
Kerry A. McKay and Poorvi L. Vora
2014/894 ( PDF )
Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan
2014/893 ( PDF )
Advanced Algebraic Attack on Trivium
Frank Quedenfeld and Christopher Wolf
2014/892 ( PDF )
Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014
Georg Fuchsbauer
2014/891 ( PDF )
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi
2014/890 ( PDF )
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures
Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek
2014/889 ( PDF )
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak
2014/888 ( PDF )
Distance Lower Bounding
Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi
2014/887 ( PDF )
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
2014/886 ( PDF )
Accountable Storage
Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia
2014/885 ( PDF )
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
Marios O. Choudary and Markus G. Kuhn
2014/884 ( -- withdrawn -- )
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo and Yunsi Fei
2014/883 ( PDF )
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo and Yunsi Fei
2014/882 ( PDF )
Obfuscation of Probabilistic Circuits and Applications
Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan
2014/881 ( PDF )
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2014/880 ( PDF )
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
Joppe W. Bos and Michael Naehrig and Joop van de Pol
2014/879 ( PDF )
Watch your Constants: Malicious Streebog
Riham AlTawy and Amr M. Youssef
2014/878 ( PDF )
Protecting obfuscation against arithmetic attacks
Eric Miles and Amit Sahai and Mor Weiss
2014/877 ( PDF )
CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
Daniel R. L. Brown
2014/876 ( PDF )
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
Mihir Bellare and Viet Tung Hoang
2014/875 ( PDF )
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding
2014/874 ( PDF )
Accelerating Bliss: the geometry of ternary polynomials
Léo Ducas
2014/873 ( PDF )
Bootstrapping for HElib
Shai Halevi and Victor Shoup
2014/872 ( PDF )
Recent Results in Scalable Multi-Party Computation
Jared Saia and Mahdi Zamani
2014/871 ( PDF )
An algorithm for MD5 single-block collision attack using high-performance computing cluster
Anton A. Kuznetsov
2014/870 ( PDF )
Dynamic Behavior of RS latches using FIB processing and probe connection
Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto
2014/869 ( PDF )
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Werner Schindler
2014/868 ( PDF )
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
Ilan Komargodski and Gil Segev and Eylon Yogev
2014/867 ( PDF )
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Christina Brzuska and Pooya Farshim and Arno Mittelbach
2014/866 ( -- withdrawn -- )
Self-Destruct Non-Malleability
Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
2014/865 ( PDF )
Impossibility of Black-Box Simulation Against Leakage Attacks
Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
2014/864 ( PDF )
How to Choose Interesting Points for Template Attacks More Effectively
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/863 ( PDF )
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou
2014/862 ( PDF )
Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -
Miroslav Knezevic, Ventzislav Nikov, and Peter Rombouts
2014/861 ( PDF )
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
İhsan Haluk Akın
2014/860 ( PDF )
Differential Factors: Improved Attacks on SERPENT
Cihangir Tezcan and Ferruh Özbudak
2014/859 ( -- withdrawn -- )
Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system
SK Hafizul Islam; G. P. Biswas
2014/858 ( PDF )
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds
Dana Dachman-Soled and Jonathan Katz and Vanishree Rao
2014/857 ( PDF )
Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
2014/856 ( PDF )
Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware
Dana Dachman-Soled and Feng-Hao Liu and Hong-Sheng Zhou
2014/855 ( PDF )
Relating Undisturbed Bits to Other Properties of Substitution Boxes
Rusydi H. Makarim and Cihangir Tezcan
2014/854 ( PDF )
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
2014/853 ( PDF )
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătălin Roşu and Michael Steiner
2014/852 ( PDF )
Faster ECC over $\mathbb{F}_{2^{521}-1}$
Robert Granger and Michael Scott
2014/851 ( PDF )
Near Optimal Rate Homomorphic Encryption for Branching Programs
Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang
2014/850 ( PDF )
The BRUTUS Automatic Cryptanalytic Framework: Testing CAESAR Authenticated Encryption Candidates for Weaknesses
Markku-Juhani O. Saarinen
2014/849 ( PDF )
A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks
Ryotaro Hayashi and Tatsuyuki Matsushita
2014/848 ( PDF )
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
Nicolas T. Courtois and Pinar Emirdag and Filippo Valsorda
2014/847 ( PDF )
Reflections on Slide with a Twist Attacks
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2014/846 ( PDF )
Verifiable computation using multiple provers
Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish
2014/845 ( PDF )
Adaptively Secure Two-party Computation From Indistinguishability Obfuscation
Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya
2014/844 ( PDF )
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
Sanjam Garg and Antigoni Polychroniadou
2014/843 ( PDF )
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng
2014/842 ( PDF )
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
2014/841 ( PDF )
Explicit Non-malleable Codes Resistant to Permutations and Perturbations
Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
2014/840 ( PDF )
Constrained PRFs for Unbounded Inputs
Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
2014/839 ( PDF )
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
Koji Nuida and Naoto Itakura and Kaoru Kurosawa
2014/838 ( PDF )
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan
2014/837 ( PDF )
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds
Maciej Skorski
2014/836 ( PDF )
A Tight Transformation between HILL and Metric Conditional Pseudoentropy
Maciej Skorski
2014/835 ( PDF )
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
David Galindo and Johann Großschädl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek
2014/834 ( PDF )
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman
2014/833 ( PDF )
Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability
Essam Ghadafi
2014/832 ( PDF )
Requirements for Standard Elliptic Curves
Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
2014/831 ( PDF )
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean and Ivica Nikolić and Thomas Peyrin
2014/830 ( PDF )
Adaptively Secure UC Constant Round Multi-Party Computation
Ivan Damgård and Antigoni Polychroniadou and Vanishree Rao
2014/829 ( PDF )
Additively Homomorphic UC commitments with Optimal Amortized Overhead
Ignacio Cascudo and Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti
2014/828 ( PDF )
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
Zhengjun Cao and Zhenfu Cao and Lihua Liu
2014/827 ( PDF )
Interactive Coding for Interactive Proofs
Yevgeniy Dodis and Allison Bishop Lewko
2014/826 ( PDF )
Learning with Errors in the Exponent
Ozgur Dagdelen and Sebastian Gajek and Florian Gopfert
2014/825 ( -- withdrawn -- )
Towards Optimal Bounds for Implicit Factorization Problem
Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin
2014/824 ( PDF )
Accountable Tracing Signatures
Markulf Kohlweiss and Ian Miers
2014/823 ( PDF )
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Rafael Dowsley and Anderson C. A. Nascimento
2014/822 ( PDF )
Ballot secrecy with malicious bulletin boards
David Bernhard and Ben Smyth
2014/821 ( PDF )
Non-malleable Reductions and Applications
Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski
2014/820 ( PDF )
Operational Signature Schemes
Michael Backes and Ozgur Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schröder
2014/819 ( PDF )
Riding on Asymmetry: Efficient ABE for Branching Programs
Sergey Gorbunov and Dhinakaran Vinayagamurthy
2014/818 ( -- withdrawn -- )
Circulant Matrices and Differential Privacy
Jalaj Upadhyay
2014/817 ( PDF )
Optimized Karatsuba Squaring on 8-bit AVR Processors
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
2014/816 ( PDF )
FHEW: Bootstrapping Homomorphic Encryption in less than a second
Léo Ducas and Daniele Micciancio
2014/815 ( PDF )
A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves
Palash Sarkar and Shashank Singh
2014/814 ( PDF )
Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing
Lisa Bromberg and Vladimir Shpilrain and Alina Vdovina
2014/813 ( PDF )
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
Dario Catalano and Dario Fiore
2014/812 ( PDF )
Search-and-compute on Encrypted Data
Jung Hee Cheon and Miran Kim and Myungsun Kim
2014/811 ( PDF )
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
Jean-Charles Faugere and Danilo Gligoroski and Ludovic Perret and Simona Samardjiska and Enrico Thomae
2014/810 ( PDF )
Simulation-Based Secure Functional Encryption in the Random Oracle Model
Vincenzo Iovino and Karol Zebrowski
2014/809 ( PDF )
Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
Ignacio Cascudo and Ivan Damgård and Oriol Farràs and Samuel Ranellucci
2014/808 ( PDF )
Online/Off-line Ring Signature Scheme with Provable Security
Jayaprakash Kar
2014/807 ( PDF )
Leakage-resilient non-malleable codes
Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
2014/806 ( PDF )
Summation polynomial algorithms for elliptic curves in characteristic two
Steven D. Galbraith and Shishay W. Gebregiyorgis
2014/805 ( PDF )
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
Charanjit S. Jutla and Arnab Roy
2014/804 ( PDF )
Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
Jacob Alperin-Sheriff
2014/803 ( PDF )
A Decentralized Public Key Infrastructure with Identity Retention
Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
2014/802 ( PDF )
Physical Characterization of Arbiter PUFs
Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
2014/801 ( PDF )
Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties
Georgi Ivanov and Nikolay Nikolov and Svetla Nikova
2014/800 ( PDF )
Efficient Pairings and ECC for Embedded Systems
Thomas Unterluggauer and Erich Wenger
2014/799 ( PDF )
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
2014/798 ( PDF )
Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
Michael Clear and Ciarán McGoldrick
2014/797 ( PDF )
Tightly-Secure Authenticated Key Exchange
Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li
2014/796 ( PDF )
Distributed Cryptography Based on the Proofs of Work
Marcin Andrychowicz and Stefan Dziembowski
2014/795 ( PDF )
SPHINCS: practical stateless hash-based signatures
Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Michael Schneider and Peter Schwabe and Zooko Wilcox-O'Hearn
2014/794 ( PDF )
Efficient Identity-Based Encryption over NTRU Lattices
Léo Ducas and Vadim Lyubashevsky and Thomas Prest
2014/793 ( PDF )
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
Viet Tung Hoang and Ted Krovetz and Phillip Rogaway
2014/792 ( PDF )
General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition
Farzaneh Abed and Christian Forler and Stefan Lucks
2014/791 ( PDF )
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof
Dongdai Lin and Yujuan Quan and Jian Weng and Jun Yan
2014/790 ( PDF )
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
Sarani Bhattacharya and Debdeep Mukhopadhyay
2014/789 ( PDF )
Statistical Properties of the Square Map Modulo a Power of Two
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
2014/788 ( PDF )
Tuning GaussSieve for Speed
Robert Fitzpatrick and Christian Bischof and Johannes Buchmann and Ozgur Dagdelen and Florian Gopfert and Artur Mariano and Bo-Yin Yang
2014/787 ( PDF )
Another Tor is possible
Amadou Moctar Kane
2014/786 ( PDF )
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Chun Guo and Dongdai Lin
2014/785 ( PDF )
Divisible E-Cash Made Practical
Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
2014/784 ( PDF )
Weak Instances of PLWE
Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter
2014/783 ( PDF )
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
Raghavan Kumar and Philipp Jovanovic and Wayne Burleson and Ilia Polian
2014/782 ( PDF )
Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis
Raghavan Kumar and Philipp Jovanovic and Ilia Polian
2014/781 ( PDF )
Tally-based simple decoders for traitor tracing and group testing
Boris Skoric
2014/780 ( PDF )
Deterministic Public-Key Encryption under Continual Leakage
Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters
2014/779 ( PDF )
Implementing Cryptographic Program Obfuscation
Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
2014/778 ( PDF )
Anonymous IBE from Quadratic Residuosity with Improved Performance
Michael Clear and Hitesh Tewari and Ciarán McGoldrick
2014/777 ( PDF )
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces
Koji Nuida and Kaoru Kurosawa
2014/776 ( PDF )
How to Obfuscate Programs Directly
Joe Zimmerman
2014/775 ( PDF )
Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation
Artur Mariano, Shahar Timnat and Christian Bischof
2014/774 ( PDF )
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
Alex J. Malozemoff and Jonathan Katz and Matthew D. Green
2014/773 ( PDF )
Obfuscating Low-Rank Matrix Branching Programs
Amit Sahai and Mark Zhandry
2014/772 ( PDF )
Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps
Nuttapong Attrapadung
2014/771 ( PDF )
Succinct Randomized Encodings and their Applications
Nir Bitansky and Sanjam Garg and Sidharth Telang
2014/770 ( PDF )
AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation
Takaaki Mizuki and Yu-ichi Hayashi
2014/769 ( PDF )
Indistinguishability Obfuscation of Iterated Circuits and RAM Programs
Ran Canetti and Justin Holmgren and Abhishek Jain and Vinod Vaikuntanathan
2014/768 ( PDF )
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation
Han Jiang and Xiaochao Wei and Chuan Zhao and Qiuliang Xu
2014/767 ( PDF )
Algebraic Attacks on Human Identification Protocols
Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk
2014/766 ( PDF )
Succinct Garbling Schemes and Applications
Huijia Lin and Rafael Pass
2014/765 ( PDF )
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2014/764 ( PDF )
One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
Jens Groth and Markulf Kohlweiss
2014/763 ( PDF )
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
Arthur Gervais and Ghassan O. Karame and Damian Gruber and Srdjan Capkun
2014/762 ( PDF )
Access Control in Publicly Verifiable Outsourced Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2014/761 ( PDF )
Cryptanalysis of Reduced-round SIMON32 and SIMON48
Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo
2014/760 ( PDF )
Montgomery Modular Multiplication on ARM-NEON Revisited
Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, and Howon Kim
2014/759 ( PDF )
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
2014/758 ( PDF )
Cryptographic Reverse Firewalls
Ilya Mironov and Noah Stephens-Davidowitz
2014/757 ( PDF )
Adaptively Secure Broadcast Encryption with Small System Parameters
Mark Zhandry
2014/756 ( PDF )
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
Samee Zahur and Mike Rosulek and David Evans
2014/755 ( PDF )
Computing Mod Without Mod
Mark A. Will and Ryan K. L. Ko
2014/754 ( PDF )
Bilinear Entropy Expansion from the Decisional Linear Assumption
Lucas Kowalczyk and Allison Bishop Lewko
2014/753 ( PDF )
Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
Alonso Gonzalez-Ulloa and Alejandro Hevia
2014/752 ( PDF )
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci
2014/751 ( PDF )
Higher-Order Threshold Implementations
Begül Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2014/750 ( PDF )
Hardware Trojan Horses in Cryptographic IP Cores
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage
2014/749 ( PDF )
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM
Daniel E. Holcomb and Kevin Fu
2014/748 ( PDF )
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
Mehmet Sabır Kiraz and Osmanbey Uzunkol
2014/747 ( PDF )
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2014/746 ( PDF )
Decoy-based information security
Vladimir Shpilrain
2014/745 ( PDF )
Universal Signature Aggregators
Susan Hohenberger and Venkata Koppula and Brent Waters
2014/744 ( PDF )
Sieving for shortest vectors in lattices using angular locality-sensitive hashing
Thijs Laarhoven
2014/743 ( PDF )
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
Benoit Libert and Marc Joye and Moti Yung and Thomas Peters
2014/742 ( PDF )
A survey of Fault Attacks in Pairing Based Cryptography
Nadia El Mrabet and Jacques J.A. Fournier and Louis Goubin and Ronan Lashermes
2014/741 ( PDF )
Eliminating Leakage in Reverse Fuzzy Extractors
André Schaller, Boris Skoric, Stefan Katzenbeisser
2014/740 ( -- withdrawn -- )
Non-existence of [n; 5] type Generalized Bent function.
Shashi Kant Pandey and P.R Mishra and B.K Dass
2014/739 ( PDF )
SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers
Smile Markovski and Aleksandra Mileva and Vesna Dimitrova
2014/738 ( PDF )
A Very Compact FPGA Implementation of LED and PHOTON
N. Nalla Anandakumar and Thomas Peyrin and Axel Poschmann
2014/737 ( -- withdrawn -- )
Design and analysis of one-round certificateless authenticated group key agreement protocol with bilinear pairings
SK Hafizul Islam and Abhishek Singh
2014/736 ( PDF )
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
2014/735 ( PDF )
Dealer-Leakage Resilient Verifiable Secret Sharing
Ruxandra F. Olimid
2014/734 ( PDF )
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedra and Dominik Sisejkovic
2014/733 ( PDF )
Augmented Learning with Errors: The Untapped Potential of the Error Term
Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann
2014/732 ( PDF )
Resizable Tree-Based Oblivious RAM
Tarik Moataz and Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
2014/731 ( PDF )
Secure modular password authentication for the web using channel bindings
Mark Manulis and Douglas Stebila and Nick Denham
2014/730 ( PDF )
Differentially Private Linear Algebra in the Streaming Model
Jalaj Upadhyay
2014/729 ( PDF )
Faster Binary-Field Multiplication and Faster Binary-Field MACs
Daniel J. Bernstein and Tung Chou
2014/728 ( PDF )
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson
2014/727 ( PDF )
The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves
Benjamin Smith
2014/726 ( -- withdrawn -- )
CIARP: A RISC Processor For Cryptography Applications
Nima Karimpour Darav and Reza Ebrahimi Atani and Erfan Aghaei and Ahmad Tahmasivand and Mahsa Rahmani and Mina Moazzam Jazi
2014/725 ( PDF )
Efficient Software Implementation of Ring-LWE Encryption
Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2014/724 ( PDF )
Protecting Encrypted Cookies from Compression Side-Channel Attacks
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2014/723 ( PDF )
Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
Yalin Chen and Jue-Sam Chou*
2014/722 ( PDF )
Differential Cryptanalysis of SipHash
Christoph Dobraunig and Florian Mendel and Martin Schläffer
2014/721 ( PDF )
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers
Zhengjun Cao and Zhenfu Cao
2014/720 ( PDF )
Adaptively Secure Constrained Pseudorandom Functions
Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters
2014/719 ( PDF )
Bivariate Polynomials Modulo Composites and their Applications
Dan Boneh and Henry Corrigan-Gibbs
2014/718 ( PDF )
Square Span Programs with Applications to Succinct NIZK Arguments
George Danezis and Cedric Fournet and Jens Groth and Markulf Kohlweiss
2014/717 ( PDF )
How to Split a Secret into Unknown Shares
Ruxandra F. Olimid
2014/716 ( PDF )
Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
Amir Moradi
2014/715 ( PDF )
Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment'
Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
2014/714 ( PDF )
A comprehensive empirical comparison of parallel ListSieve and GaussSieve
Artur Mariano and Ozgur Dagdelen and Christian Bischof
2014/713 ( PDF )
Co-Location-Resistant Clouds
Yossi Azar and Seny Kamara and Ishai Menache and Mariana Raykova and Bruce Shepherd
2014/712 ( PDF )
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
Mohammad Wazid
2014/711 ( PDF )
New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$
2014/710 ( PDF )
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
Yehuda Lindell
2014/709 ( PDF )
A Note on Quantum Security for Post-Quantum Cryptography
Fang Song
2014/708 ( PDF )
Formal Treatment of Privacy-Enhancing Credential Systems
Jan Camenisch and Stephan Krenn and Anja Lehmann and Gert Læssøe Mikkelsen and Gregory Neven and Michael Østergaard Pedersen
2014/707 ( PDF )
Analysis Of Variance and CPA in SCA
Sebastien Tiran and Guillaume Reymond and Jean-Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles Ducharme and Philippe Maurine
2014/706 ( PDF )
The Feasibility of Outsourced Database Search in the Plain Model
Carmit Hazay and Hila Zarosim
2014/705 ( PDF )
Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
Christian Hanser and Daniel Slamanig
2014/704 ( PDF )
A 128-bit Block Cipher Based on Three Group Arithmetics
Shenghui Su and Shuwang Lü and Daqiang Dong
2014/703 ( PDF )
Linearity Measures for MQ Cryptography
Simona Samardjiska and Danilo Gligoroski
2014/702 ( PDF )
Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques
Benoit Feix and Hugues Thiebeauld
2014/701 ( -- withdrawn -- )
A Practical Iterative Side Channel Cube Attack on AES-128/256
Erfan Aghaee and Majid Rahimi and Hamed Yusefi
2014/700 ( PDF )
Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
Ahto Buldas and Risto Laanoja and Peeter Laud and Ahto Truu
2014/699 ( PDF )
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
Christina Boura and María Naya-Plasencia and Valentin Suder
2014/698 ( PDF )
HIMMO - A lightweight collusion-resistant key predistribution scheme
Oscar Garcia-Morchon and Domingo Gomez-Perez and Jaime Gutierrez and Ronald Rietman and Berry Schoenmakers and Ludo Tolhuizen
2014/697 ( PDF )
A Fully Homomorphic Encryption Scheme with Better Key Size
Zhigang Chen, Jian Wang, ZengNian Zhang , Xinxia Song
2014/696 ( PDF )
Security Proofs for the BLT Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2014/695 ( PDF )
Proof of Proximity of Knowledge
Serge Vaudenay
2014/694 ( PDF )
Malicious Hashing: Eve's Variant of SHA-1
Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schläffer
2014/693 ( PDF )
Optimal Proximity Proofs
Ioana Boureanu and Serge Vaudenay
2014/692 ( PDF )
Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead
Enrique Larraia
2014/691 ( PDF )
Integration of hardware tokens in the Idemix library
Antonio de la Piedra
2014/690 ( PDF )
Efficient Interval Check in the Presence of Malicious Adversaries
Genqiang Wu and Yeping He and Yi Lu and Liping Ding
2014/689 ( PDF )
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
Ahto Buldas and Risto Laanoja and Ahto Truu
2014/688 ( PDF )
Analytic Toolbox for White-Box Implementations: Limitation and Perspectives
Chung Hun Baek and Jung Hee Cheon and Hyunsook Hong
2014/687 ( PDF )
Reducing the Complexity of Normal Basis Multiplication
Omer Egecioglu and Cetin Kaya Koc
2014/686 ( -- withdrawn -- )
A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications
Ming Li and Dongdai Lin
2014/685 ( PDF )
Bit Security of the CDH Problems over Finite Field
Mingqiang Wang and Tao Zhan and Haibin Zhang
2014/684 ( PDF )
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
Antonio de la Piedra and Jaap-Henk Hoepman and Pim Vullers
2014/683 ( PDF )
Error-Tolerant Algebraic Side-Channel Attacks Using BEE
Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao
2014/682 ( PDF )
A Unified Formalism for Physical Attacks
Hélène Le Bouder, Ronan Lashermes , Yanis Linge , Bruno Robisson and Assia Tria
2014/681 ( PDF )
Improved Linear Cryptanalysis of Reduced-round SIMON
Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, and Martin M. Lauridsen
2014/680 ( PDF )
Remarks on the Cryptographic Primitive of Attribute-based Encryption
Zhengjun Cao and Lihua Liu
2014/679 ( PDF )
A Note on the Bellare-Rivest Protocol for Translucent Cryptography
Zhengjun Cao and Lihua Liu
2014/678 ( PDF )
A Counterexample to the Chain Rule for Conditional HILL Entropy
Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia and Daniel Wichs
2014/677 ( PDF )
Attacks in Stream Ciphers: A Survey
Gustavo Banegas
2014/676 ( PDF )
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
Zhen Liu and Zhenfu Cao and Duncan S. Wong
2014/675 ( PDF )
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
Jian Guo and Jérémy Jean and Gaëtan Leurent and Thomas Peyrin and Lei Wang
2014/674 ( PDF )
Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
2014/673 ( PDF )
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
2014/672 ( PDF )
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Xiao Wang and Hubert Chan and Elaine Shi
2014/671 ( PDF )
SCORAM: Oblivious RAM for Secure Computation
Xiao Shaun Wang and Yan Huang and T-H. Hubert Chan and abhi shelat and Elaine Shi
2014/670 ( PDF )
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
2014/669 ( PDF )
On the Communication Complexity of Secure Function Evaluation with Long Output
Pavel Hubacek and Daniel Wichs
2014/668 ( PDF )
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation
Ran Cohen and Yehuda Lindell
2014/667 ( PDF )
Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings
Yehuda Lindell and Ben Riva
2014/666 ( PDF )
Fully Secure Functional Encryption without Obfuscation
Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
2014/665 ( PDF )
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
Julien Bringer and Claude Carlet and Hervé Chabanne and Sylvain Guilley and Houssem Maghrebi
2014/664 ( PDF )
On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves
William R. Trost and Guangwu Xu
2014/663 ( PDF )
Locally Decodable and Updatable Non-Malleable Codes and Their Applications
Dana Dachman-Soled and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2014/662 ( PDF )
Outsourced Pattern Matching
Sebastian Faust and Carmit Hazay and Daniele Venturi
2014/661 ( PDF )
One-Round Deniable Key Exchange with Perfect Forward Security
Weiqiang Wen and Libin Wang and Min Xie
2014/660 ( PDF )
Interactive Proofs under Continual Memory Leakage
Prabhanjan Ananth and Vipul Goyal and Omkant Pandey
2014/659 ( PDF )
On the Primitivity of Trinomials over Small Finite Fields
YUjuan Li and Jinhua Zhao and Huaifu Wang
2014/658 ( PDF )
The Adjacency Graphs of Some Feedback Shift Registers
Ming Li and Yupeng Jiang and Dongdai Lin
2014/657 ( PDF )
On the cycle decomposition of the WG-NLFSR
YUjuan Li and Wnehua Shen and Huaifu Wang and Peipei Zhou
2014/656 ( PDF )
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
Itai Dinur
2014/655 ( PDF )
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
Bo Zhu and Xinxin Fan and Guang Gong
2014/654 ( PDF )
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
Prakash Dey and Abhishek Chakraborty and Avishek Adhikari and Debdeep Mukhopadhyay
2014/653 ( PDF )
Mersenne factorization factory
Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra
2014/652 ( PDF )
A Dynamic Cube Attack on $105$ round Grain v1
Subhadeep Banik
2014/651 ( PDF )
A note on CCA2-protected McEliece Cryptosystem with a systematic public key
Pavol Zajac
2014/650 ( PDF )
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk
2014/649 ( PDF )
FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar
2014/648 ( PDF )
An Equivalent Condition on the Switching Construction of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function
Xi Chen, Yazhi Deng, Min Zhu and Longjiang Qu
2014/647 ( PDF )
Universally Composable Secure Group Communication
Youliang Tian and Changgen Peng
2014/646 ( PDF )
High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems
Donald Donglong Chen and Nele Mentens and Frederik Vercauteren and Sujoy Sinha Roy and Ray C.C. Cheung and Derek Pao and Ingrid Verbauwhede
2014/645 ( PDF )
Graph-Induced Multilinear Maps from Lattices
Craig Gentry and Sergey Gorbunov and Shai Halevi
2014/644 ( PDF )
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai
2014/643 ( PDF )
On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'
Ashok Kumar Das
2014/642 ( PDF )
Balanced permutations Even-Mansour ciphers
Shoni Gilboa and Shay Gueron
2014/641 ( PDF )
The Multiple Number Field Sieve with Conjugation Method
Cécile Pierrot
2014/640 ( PDF )
Revocation in Publicly Verifiable Outsourced Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2014/639 ( PDF )
Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines
Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
2014/638 ( PDF )
Substring-Searchable Symmetric Encryption
Melissa Chase and Emily Shen
2014/637 ( PDF )
Generic Hardness of the Multiple Discrete Logarithm Problem
Aaram Yun
2014/636 ( PDF )
Improved Timing Attacks on ECDSA
Vikram Singh
2014/635 ( PDF )
Type 2 Structure-Preserving Signature Schemes Revisited
Sanjit Chatterjee and Alfred Menezes
2014/634 ( PDF )
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP
Hongda Li, Qihua Niu, Guifang Huang
2014/633 ( PDF )
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity
Ran Canetti and Abhishek Jain and Omer Paneth
2014/632 ( PDF )
Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge
Esha Ghosh and Olga Ohrimenko and Roberto Tamassia
2014/631 ( PDF )
Zipf’s Law in Passwords
Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
2014/630 ( PDF )
Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation
Peeter Laud
2014/629 ( PDF )
Two-factor authentication for the Bitcoin protocol
Christopher Mann and Daniel Loebenberger
2014/628 ( PDF )
An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency
Partha Sarathi Roy and Avishek Adhikari and Rui Xu and Kirill Morozov and Kouichi Sakurai
2014/627 ( PDF )
On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
Debrup Chakraborty and Palash Sarkar
2014/626 ( PDF )
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
Daniel Genkin and Itamar Pipman and Eran Tromer
2014/625 ( PDF )
Pretty Understandable Democracy 2.0
Stephan Neumann and Christian Feier and Perihan Sahin and Sebastian Fach
2014/624 ( PDF )
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao
2014/623 ( PDF )
Privacy with Imperfect Randomness
Yevgeniy Dodis and Yanqing Yao
2014/622 ( PDF )
Fully Secure Attribute Based Encryption from Multilinear Maps
Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
2014/621 ( PDF )
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi
2014/620 ( PDF )
The M3dcrypt Password Hashing Function
Isaiah Makwakwa
2014/619 ( PDF )
Mohammad Sadegh Nemati Nia, Ali Payandeh
2014/618 ( PDF )
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
Florian Böhl and Simon Greiner and Patrik Scheidecker
2014/617 ( PDF )
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
Michael Backes and Manuel Barbosa and Dario Fiore and Raphael M. Reischuk
2014/616 ( PDF )
Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Zhen Liu and Duncan S. Wong
2014/615 ( PDF )
Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality
Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ostrovsky and Vassilis Zikas
2014/614 ( PDF )
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version)
Zhiquan Lv and Cheng Hong and Min Zhang and Dengguo Feng
2014/613 ( PDF )
A Security Analysis of the Composition of ChaCha20 and Poly1305
Gordon Procter
2014/612 ( PDF )
Attribute-Based Encryption Optimized for Cloud Computing
Máté Horváth
2014/611 ( PDF )
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation
Shlomi Dolev and Niv Gilboa and Ximing Li
2014/610 ( PDF )
Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation
Craig Gentry
2014/609 ( PDF )
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/608 ( PDF )
Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps
Ferucio Laurentiu Tiplea and Constantin Catalin Dragan
2014/607 ( PDF )
Adding Controllable Linkability to Pairing-Based Group Signatures For Free
Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer
2014/606 ( PDF )
A Multi-Function Provable Data Possession Scheme in Cloud Computing
Xiaojun Yu and Qiaoyan Wen
2014/605 ( PDF )
On the Possibilities and Limitations of Computational Fuzzy Extractors
Kenji Yasunaga and Kosuke Yuzawa
2014/604 ( PDF )
Private Web Search with Constant Round Efficiency
Bolam Kang and Sung Cheol Goh and Myungsun Kim
2014/603 ( PDF )
Recursive Trees for Practical ORAM
Tarik Moataz and Erik-Oliver Blass and Guevara Noubir
2014/602 ( PDF )
A Cryptographic Study of Tokenization Systems
Sandra Diaz-Santiago and Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
2014/601 ( PDF )
Adaptive versus Static Security in the UC Model
Ivan Damgård and Jesper Buus Nielsen
2014/600 ( -- withdrawn -- )
DTKI: a new formalized PKI with no trusted parties
Jiangshan Yu and Vincent Cheval and Mark Ryan
2014/599 ( PDF )
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila
2014/598 ( PDF )
Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi
2014/597 ( PDF )
Invisible Adaptive Attacks
Jesper Buus Nielsen and Mario Strefler
2014/596 ( PDF )
Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification
Marina Blanton and Siddharth Saraph
2014/595 ( PDF )
Scalable Zero Knowledge via Cycles of Elliptic Curves
Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
2014/594 ( PDF )
Oblivious Parallel RAM and Applications
Elette Boyle and Kai-Min Chung and Rafael Pass
2014/593 ( PDF )
Improved Exponential-time Algorithms for Inhomogeneous-SIS
Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield
2014/592 ( PDF )
Multiprecision multiplication on AVR revisited
Michael Hutter and Peter Schwabe
2014/591 ( PDF )
Compact and Side Channel Secure Discrete Gaussian Sampling
Sujoy Sinha Roy and Oscar Reparaz and Frederik Vercauteren and Ingrid Verbauwhede
2014/590 ( PDF )
Automated algebraic analysis of structure-preserving signature schemes
Joeri de Ruiter
2014/589 ( PDF )
Authenticated Key Exchange from Ideal Lattices
Jiang Zhang and Zhenfeng Zhang and Jintai Ding and Michael Snook and Özgür Dagdelen
2014/588 ( PDF )
A Punctured Programming Approach to Adaptively Secure Functional Encryption
Brent Waters
2014/587 ( PDF )
Non-interactive zero-knowledge proofs in the quantum random oracle model
Dominique Unruh
2014/586 ( PDF )
An Algebraic Approach to Non-Malleability
Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald
2014/585 ( PDF )
The SPEKE Protocol Revisited
Feng Hao and Siamak F. Shahandashti
2014/584 ( PDF )
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2014/583 ( PDF )
Template Attacks Based On Priori Knowledge
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/582 ( PDF )
NSEC5: Provably Preventing DNSSEC Zone Enumeration
Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv
2014/581 ( PDF )
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
Olivier Blazy and Eike Kiltz and Jiaxin Pan
2014/580 ( PDF )
The Hunting of the SNARK
Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer
2014/579 ( -- withdrawn -- )
Scan Based Side Channel Attack on Grain v1
Sonu Kumar Jha
2014/578 ( PDF )
The Exact PRF-Security of NMAC and HMAC
Peter Gaži and Krzysztof Pietrzak and Michal Rybár
2014/577 ( PDF )
Reducing Communication Overhead of the Subset Difference Scheme
Sanjay Bhattacherjee and Palash Sarkar
2014/576 ( PDF )
Vernam Two
Dan P. Milleville
2014/575 ( PDF )
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
Markku-Juhani O. Saarinen
2014/574 ( PDF )
Security Analysis of Multilinear Maps over the Integers
Hyung Tae Lee and Jae Hong Seo
2014/573 ( PDF )
A new public key system based on Polynomials over finite fields GF(2)
Gurgen Khachatrian
2014/572 ( PDF )
On the Optimality of Differential Fault Analyses on CLEFIA
Juliane Krämer and Anke Stüber and Ágnes Kiss
2014/571 ( PDF )
How to manipulate curve standards: a white paper for the black hat
Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
2014/570 ( PDF )
Deja Q: Using Dual Systems to Revisit q-Type Assumptions
Melissa Chase and Sarah Meiklejohn
2014/569 ( PDF )
Fast Lattice Point Enumeration with Minimal Overhead
Daniele Micciancio and Michael Walter
2014/568 ( PDF )
New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC
2014/567 ( -- withdrawn -- )
Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation
Hiroaki Anada and Seiko Arita and Kouichi Sakurai
2014/566 ( PDF )
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
Daniel Augot and Matthieu Finiasz
2014/565 ( PDF )
Kangaroos in Side-Channel Attacks
Tanja Lange and Christine van Vredendaal and Marnix Wakker
2014/564 ( -- withdrawn -- )
A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
Massoud Hadian Dehkordi and Reza Ghasemi
2014/563 ( PDF )
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Aleksandar Kircanski
2014/562 ( PDF )
hHB: a Harder HB+ Protocol
Ka Ahmad Khoureich
2014/561 ( PDF )
Performance Increasing Approaches For Binary Field Inversion
Vladislav Kovtun and Maria Bulakh
2014/560 ( PDF )
Towards Forward Security Properties for PEKS and IBE
Qiang Tang
2014/559 ( PDF )
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
Pablo Rauzy and Sylvain Guilley
2014/558 ( PDF )
Double shielded Public Key Cryptosystems
Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang
2014/557 ( PDF )
Round-Efficient Black-Box Construction of Composable Multi-Party Computation
Susumu Kiyoshima
2014/556 ( PDF )
Securing Cloud Data in the New Attacker Model
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
2014/555 ( PDF )
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges
2014/554 ( PDF )
On Virtual Grey Box Obfuscation for General Circuits
Nir Bitansky and Ran Canetti and Yael Tauman-Kalai and Omer Paneth
2014/553 ( PDF )
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
Ran Canetti and Asaf Cohen and Yehuda Lindell
2014/552 ( PDF )
Efficient Record-Level Keyless Signatures for Audit Logs
Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards
2014/551 ( PDF )
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
Daniel Augot and Pierre-Alain Fouque and Pierre Karpman
2014/550 ( PDF )
Function-Private Functional Encryption in the Private-Key Setting
Zvika Brakerski and Gil Segev
2014/549 ( PDF )
New Attacks on the RSA Cryptosystem
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig
2014/548 ( PDF )
Implicit factorization of unbalanced RSA moduli
Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin
2014/547 ( PDF )
Authentication Codes Based on Resilient Boolean Maps
Juan Carlos Ku-Cauich and Guillermo Morales-Luna
2014/546 ( PDF )
Anonymous and Publicly Linkable Reputation Systems
Johannes Blömer and Jakob Juhnke and Christina Kolb
2014/545 ( PDF )
Solving closest vector instances using an approximate shortest independent vectors oracle
Chengliang Tian and Wei Wei and Dongdai Lin
2014/544 ( PDF )
Secure Mutual Testing Strategy for Cryptographic SoCs
Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede
2014/543 ( PDF )
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
2014/542 ( PDF )
On the Multi-output Filtering Model and Its Applications
Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu
2014/541 ( PDF )
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto Nagata and Takafumi Aoki
2014/540 ( PDF )
Optimized Architecture for AES
Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey
2014/539 ( PDF )
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption
Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang
2014/538 ( -- withdrawn -- )
A Secure Cloud-based NFC Mobile Payment Protocol
pardis pourghomi and muhammad qasim saeed and george ghinea
2014/537 ( PDF )
Constrained Verifiable Random Functions
Georg Fuchsbauer
2014/536 ( PDF )
On Decomposition of an NFSR into a Cascade Connection of Two Smaller
Tian Tian and Wen-Feng Qi
2014/535 ( PDF )
On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
Massimo Chenal and Qiang Tang
2014/534 ( PDF )
Differential Power Analysis of a McEliece Cryptosystem
Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
2014/533 ( PDF )
Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions
Jaiganesh Balasundaram
2014/532 ( -- withdrawn -- )
On the Pitfalls of using Arbiter-PUFs as Building Blocks
Georg T. Becker
2014/531 ( PDF )
Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
Paolo Palmieri and Luca Calderoni and Dario Maio
2014/530 ( PDF )
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap
2014/529 ( PDF )
Leakage-Resilient Signatures with Graceful Degradation
Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
2014/528 ( PDF )
Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups
Xiaofeng Wang and Chen Xu and Guo Li and Hanling Lin
2014/527 ( PDF )
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
Annelie Heuser and Olivier Rioul and Sylvain Guilley
2014/526 ( PDF )
Curve41417: Karatsuba revisited
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
2014/525 ( PDF )
Differential Analysis on Block Cipher PRIDE
Jingyuan Zhao and Xiaoyun Wang and Meiqin Wang and Xiaoyang Dong
2014/524 ( PDF )
Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Chunming Tang and Yanfeng Qi
2014/523 ( PDF )
Fully Secure and Fast Signing from Obfuscation
Kim Ramchen and Brent Waters
2014/522 ( PDF )
Constrained Pseudorandom Functions: Verifiable and Delegatable
Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
2014/521 ( PDF )
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
Susan Hohenberger and Venkata Koppula and Brent Waters
2014/520 ( PDF )
Squares of Random Linear Codes
Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Zémor
2014/519 ( PDF )
Realizing Pico: Finally No More Passwords!
Jens Hermans and Roel Peeters
2014/518 ( PDF )
Cryptography from Compression Functions: The UCE Bridge to the ROM
Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
2014/517 ( PDF )
On the Connection between Leakage Tolerance and Adaptive Security
Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
2014/516 ( PDF )
On the Classification of Finite Boolean Functions up to Fairness
Nikolaos Makriyannis
2014/515 ( -- withdrawn -- )
Ideal Social Secret Sharing Using Birkhoff Interpolation Method
Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian
2014/514 ( PDF )
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili
2014/513 ( PDF )
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
Noboru Kunihiro and Junya Honda
2014/512 ( PDF )
Rmind: a tool for cryptographically secure statistical analysis
Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk
2014/511 ( PDF )
Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
Johannes Blömer and Gennadij Liske
2014/510 ( PDF )
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
Pratish Datta and Dibyendu Roy and Sourav Mukhopadhyay
2014/509 ( PDF )
Privacy preserving delegated word search in the cloud
Kaoutar Elkhiyaoui and Melek Onen and Refik Molva
2014/508 ( PDF )
Reversing Stealthy Dopant-Level Circuits
Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino
2014/507 ( PDF )
How to Generate and use Universal Samplers
Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry
2014/506 ( PDF )
Finding Roots in GF(p^n) with the Successive Resultant Algorithm
Christophe Petit
2014/505 ( PDF )
On the quaternion $\ell$-isogeny path problem
David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
2014/504 ( PDF )
A Provable Security Analysis of Intel's Secure Key RNG
Thomas Shrimpton and R. Seth Terashima
2014/503 ( PDF )
Efficient Hidden Vector Encryption with Constant-Size Ciphertext
Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo
2014/502 ( PDF )
What's the Gist? Privacy-Preserving Aggregation of User Profiles
Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun
2014/501 ( PDF )
WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time
Markku--Juhani O. Saarinen and Billy Bob Brumley
2014/500 ( -- withdrawn -- )
Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
Can Xiang and Chunming Tang
2014/499 ( PDF )
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş
2014/498 ( PDF )
Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix
Souvik Kolay and Debdeep Mukhopadhyay
2014/497 ( PDF )
NREPO:Normal Basis Recomputing with Permuted Operands
Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin and Ramesh Karri
2014/496 ( PDF )
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo
2014/495 ( PDF )
Improved Short Lattice Signatures in the Standard Model
Léo Ducas and Daniele Micciancio
2014/494 ( PDF )
Hardness of k-LWE and Applications in Traitor Tracing
San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld
2014/493 ( PDF )
Arithmetic on Abelian and Kummer Varieties
David Lubicz and Damien Robert
2014/492 ( PDF )
Fault attacks on pairing-based protocols revisited
Sanjit Chatterjee and Koray Karabina and Alfred Menezes
2014/491 ( PDF )
Bootstrappable Identity-Based Fully Homomorphic Encryption
Michael Clear and Ciarán McGoldrick
2014/490 ( PDF )
Universally Composable secure TNC protocol based on IF-T binding to TLS
Shijun Zhao and Qianying Zhang and Yu Qin and Dengguo Feng
2014/489 ( PDF )
A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge
Dan Ding and Guizhen Zhu and Xiaoyun Wang
2014/488 ( PDF )
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue and Kenneth G. Paterson
2014/487 ( PDF )
GGHLite: More Efficient Multilinear Maps from Ideal Lattices
Adeline Langlois and Damien Stehle and Ron Steinfeld
2014/486 ( PDF )
Binary Elligator Squared
Diego F. Aranha and Pierre-Alain Fouque and Chen Qian and Mehdi Tibouchi and Jean-Christophe Zapalowicz
2014/485 ( PDF )
An Improved Truncated Di fferential Cryptanalysis of KLEIN
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref
2014/484 ( PDF )
Sealing the Leak on Classical NTRU Signatures
Carlos Aguilar Melchor and Xavier Boyen and Jean-Christophe Deneuville and Philippe Gaborit
2014/483 ( PDF )
Disjunctions for Hash Proof Systems: New Constructions and Applications
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/482 ( PDF )
Differentially Private Data Aggregation with Optimal Utility
Fabienne Eigner and Aniket Kate and Matteo Maffei and Francesca Pampaloni and Ivan Pryvalov
2014/481 ( PDF )
Universally Composable Non-Interactive Key Exchange
Eduarda S.V. Freire and Julia Hesse and Dennis Hofheinz
2014/480 ( PDF )
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
2014/479 ( PDF )
Even more practical secure logging: Tree-based Seekable Sequential Key Generators
Giorgia Azzurra Marson and Bertram Poettering
2014/478 ( PDF )
Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
Benny Applebaum and Eyal Widder
2014/477 ( PDF )
Relaxed Two-to-one Recoding Schemes
Omkant Pandey and Kim Ramchen and Brent Waters
2014/476 ( PDF )
Simon's Circuit
Paul Baecher
2014/475 ( PDF )
A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
Imran Erguler
2014/474 ( PDF )
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Alex Biryukov and Charles Bouillaguet and Dmitry Khovratovich
2014/473 ( -- withdrawn -- )
An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
2014/472 ( PDF )
How to Watermark Cryptographic Functions
Ryo Nishimaki
2014/471 ( -- withdrawn -- )
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
2014/470 ( PDF )
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Au
2014/469 ( PDF )
Homomorphic Signatures with Efficient Verification for Polynomial Functions
Dario Catalano, Dario Fiore, and Bogdan Warinschi
2014/468 ( PDF )
Privacy-Preserving Auditing for Attribute-Based Credentials
Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
2014/467 ( PDF )
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Daniel Demmler and Thomas Schneider and Michael Zohner
2014/466 ( PDF )
On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.
Samir Bouftass and Abdelhak Azhari
2014/465 ( PDF )
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
Jie Chen and Hoeteck Wee
2014/464 ( PDF )
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng
2014/463 ( PDF )
(Leveled) Fully Homomorphic Signatures from Lattices
Sergey Gorbunov and Vinod Vaikuntanathan
2014/462 ( PDF )
Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps
Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
2014/461 ( -- withdrawn -- )
Provably secure and efficient certificateless signature in the standard model
Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
2014/460 ( PDF )
FleXOR: Flexible garbling for XOR gates that beats free-XOR
Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek
2014/459 ( PDF )
Template Attacks on Different Devices
Omar Choudary and Markus G. Kuhn
2014/458 ( PDF )
Automated Analysis of Cryptographic Assumptions in Generic Group Models
Gilles Barthe and Edvard Fagerholm and Dario Fiore and John Mitchell and Andre Scedrov and Benedikt Schmidt
2014/457 ( PDF )
Transcript Secure Signatures Based on Modular Lattices
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte
2014/456 ( PDF )
Verified Implementations for Secure and Verifiable Computation
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Guillaume Davy and François Dupressoir and Benjamin Grégoire and Pierre-Yves Strub
2014/455 ( PDF )
Single-shot security for one-time memories in the isolated qubits model
Yi-Kai Liu
2014/454 ( PDF )
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
Amir Moradi and Vincent Immler
2014/453 ( PDF )
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version
Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yalçın
2014/452 ( PDF )
Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake
Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld
2014/451 ( PDF )
Leveled Fully Homomorphic Signatures from Standard Lattices
Daniel Wichs
2014/450 ( -- withdrawn -- )
Optimized Implementation of General Secret Sharing Scheme
Lein Harn and Ching-Fang Hsu*
2014/449 ( -- withdrawn -- )
Related Key Secure PKE from Hash Proof Systems
Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
2014/448 ( PDF )
Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
Ning Wang and Xiaoyun Wang and Keting Jia and Jingyuan Zhao
2014/447 ( PDF )
Faster Private Set Intersection based on OT Extension
Benny Pinkas and Thomas Schneider and Michael Zohner
2014/446 ( PDF )
4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes
Valerie Nachef and Jacques Patarin and Emmanuel Volte
2014/445 ( PDF )
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Ràfols and Andy Rupp
2014/444 ( PDF )
RPKI vs ROVER: Comparing the Risks of BGP Security Solutions
Aanchal Malhotra and Sharon Goldberg
2014/443 ( PDF )
Minimizing the Two-Round Even-Mansour Cipher
Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger
2014/442 ( PDF )
Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix
Xing Hu and Chunming Tang
2014/441 ( PDF )
Improved Generic Attacks Against Hash-based MACs and HAIFA
Itai Dinur and Gaëtan Leurent
2014/440 ( PDF )
Double Level Montgomery Cox-Rower Architecture, New Bounds
Jean-Claude Bajard and Nabil Merkiche
2014/439 ( PDF )
Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions
Chunming Tang, Yuenai Chen
2014/438 ( PDF )
Security of Symmetric Encryption against Mass Surveillance
Mihir Bellare and Kenneth Paterson and Phillip Rogaway
2014/437 ( PDF )
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Jingguo Bi and Jean-Sébastien Coron and Jean-Charles Faugère and Phong Q. Nguyen and Guénaël Renault and Rina Zeitoun
2014/436 ( PDF )
Synthesis of Fault Attacks on Cryptographic Implementations
Gilles Barthe and Francois Dupressoir and Pierre-Alain Fouque and Benjamin Gregoire and Jean-Christophe Zapalowicz
2014/435 ( PDF )
Wait a minute! A fast, Cross-VM attack on AES
Gorka Irazoqui and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
2014/434 ( PDF )
Just a Little Bit More
Joop van de Pol and Nigel P. Smart and Yuval Yarom
2014/433 ( PDF )
A Statistical Model for Higher Order DPA on Masked Devices
A. Adam Ding and Liwei Zhang and Yunsi Fei and Pei Luo
2014/432 ( PDF )
Universally Composable Authentication and Key-exchange with Global PKI
Ran Canetti and Daniel Shahaf and Margarita Vald
2014/431 ( PDF )
Tiny ORAM: A Low-Latency, Low-Area Hardware ORAM Controller
Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten Van Dijk and Emil Stefanov and Srinivas Devadas
2014/430 ( PDF )
Revisiting the Gentry-Szydlo Algorithm
H. W. Lenstra and A. Silverberg
2014/429 ( PDF )
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven
2014/428 ( PDF )
Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
Nuttapong Attrapadung
2014/427 ( PDF )
Fast point multiplication algorithms for binary elliptic curves with and without precomputation
Thomaz Oliveira and Diego F. Aranha and Julio López and Francisco Rodríguez-Henríquez
2014/426 ( PDF )
Towards Optimally Efficient Secret-Key Authentication from PRG
Ivan Damgård and Sunoo Park
2014/425 ( PDF )
Note of Multidimensional MITM Attack on 25-Round TWINE-128
Long Wen and Meiqin Wang and Andrey Bogdanov and Huaifeng Chen
2014/424 ( PDF )
Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants
Craig Costello and Alyson Deines-Schartz and Kristin Lauter and Tonghai Yang
2014/423 ( PDF )
The Hash Function "Fugue"
Shai Halevi and William E. Hall and Charanjit S. Jutla
2014/422 ( PDF )
System-level non-interference for constant-time cryptography
Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Carlos Luna and David Pichardie
2014/421 ( PDF )
FNR : Arbitrary length small domain block cipher proposal
Sashank Dara, Scott Fluhrer
2014/420 ( PDF )
Bounded Fully Homomorphic Signature Schemes
Xiang Xie and Rui Xue
2014/419 ( PDF )
FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve
Jérémie Detrey
2014/418 ( PDF )
A Simple Recursive Tree Oblivious RAM
Benny Pinkas and Tzachy Reinman
2014/417 ( PDF )
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions
Inna Polak, Adi Shamir
2014/416 ( PDF )
Adaptive Security of Constrained PRFs
Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao
2014/415 ( PDF )
Virtual Proofs of Reality
Ulrich Rührmair
2014/414 ( PDF )
A Security Proof of KCDSA using an extended Random Oracle Model
Vikram Singh
2014/413 ( PDF )
On the Cost of Lazy Engineering for Masked Software Implementations
Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and François-Xavier Standaert
2014/412 ( PDF )
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Jean-Baptiste Mairy and Yves Deville
2014/411 ( PDF )
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)
Vincent Grosso and Romain Poussier and François-Xavier Standaert and Lubos Gaspar
2014/410 ( PDF )
Soft Analytical Side-Channel Attacks
Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
2014/409 ( PDF )
Moments-Correlating DPA
Amir Moradi and François-Xavier Standaert
2014/408 ( PDF )
Bootstrapping BGV Ciphertexts With A Wider Choice of p and q.
Emmanuela Orsini and Joop van de Pol and Nigel P. Smart
2014/407 ( PDF )
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
Fu-Kuo Tseng and Rong-Jaye Chen and Bao-Shuh Paul Lin
2014/406 ( PDF )
New Generic Attacks Against Hash-based MACs
Gaëtan Leurent and Thomas Peyrin and Lei Wang
2014/405 ( PDF )
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Christina Brzuska and Arno Mittelbach
2014/404 ( PDF )
Large-Scale Secure Computation
Elette Boyle and Kai-Min Chung and Rafael Pass
2014/403 ( PDF )
Generic Universal Forgery Attack on Iterative Hash-based MACs
Thomas Peyrin and Lei Wang
2014/402 ( PDF )
On the Existence of Extractable One-Way Functions
Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
2014/401 ( PDF )
Software implementation of an Attribute-Based Encryption scheme
Eric Zavattoni and Luis J. Dominguez Perez and Shigeo Mitsunari and Ana H. Sánchez-Ramírez and Tadanori Teruya and Francisco Rodríguez-Henríquez
2014/400 ( PDF )
Composable Oblivious Extended Permutations
Peeter Laud and Jan Willemson
2014/399 ( PDF )
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Dustin Moody and Ray Perlner and Daniel Smith-Tone
2014/398 ( PDF )
Differential Properties of the HFE Cryptosystem
Taylor Daniels and Daniel Smith-Tone
2014/397 ( PDF )
Cofactorization on Graphics Processing Units
Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra
2014/396 ( PDF )
Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs
Helger Lipmaa
2014/395 ( PDF )
Lightweight and Privacy-Preserving Delegatable Proofs of Storage
Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong
2014/394 ( PDF )
Relational Hash
Avradip Mandal and Arnab Roy
2014/393 ( PDF )
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
2014/392 ( PDF )
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
2014/391 ( PDF )
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
2014/390 ( PDF )
Black-Box Non-Black-Box Zero Knowledge
Vipul Goyal and Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti
2014/389 ( PDF )
Accelerating NTRU based Homomorphic Encryption using GPUs
Wei Dai and Yarkın Doröz and Berk Sunar
2014/388 ( PDF )
Finding collisions for MD4 hash algorithm using hybrid algorithm
Marko Carić
2014/387 ( PDF )
New candidates for multivariate trapdoor functions
Jaiberth Porras, John B. Baena, Jintai Ding
2014/386 ( PDF )
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede
2014/385 ( PDF )
Jacobian Coordinates on Genus 2 Curves
Huseyin Hisil and Craig Costello
2014/384 ( PDF )
Yao's millionaires' problem and decoy-based public key encryption by classical physics
Dima Grigoriev and Vladimir Shpilrain
2014/383 ( PDF )
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Younsung Choi, Dongho Won
2014/382 ( PDF )
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
Felix Günther and Mark Manulis and Andreas Peter
2014/381 ( PDF )
Using Indistinguishability Obfuscation via UCEs
Christina Brzuska and Arno Mittelbach
2014/380 ( PDF )
Efficient Adaptively Secure IBBE from Standard Assumptions
Somindu C. Ramanna and Palash Sarkar
2014/379 ( PDF )
Hyper-and-elliptic-curve cryptography
Daniel J. Bernstein and Tanja Lange
2014/378 ( -- withdrawn -- )
Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps
SK Hafizul Islam
2014/377 ( PDF )
Logic Synthesis based Public Key Scheme
Boaz Shahar
2014/376 ( PDF )
How Secure is Deterministic Encryption?
Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi
2014/375 ( PDF )
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2014/374 ( PDF )
Optimal Contracts for Outsourced Computation
Viet Pham and MHR. Khouzani and Carlos Cid
2014/373 ( PDF )
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Philipp Jovanovic and Atul Luykx and Bart Mennink
2014/372 ( PDF )
Fully secure constrained pseudorandom functions using random oracles
Dennis Hofheinz
2014/371 ( PDF )
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
Christophe Doche
2014/370 ( PDF )
Compact VSS and Efficient Homomorphic UC Commitments
Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen
2014/369 ( PDF )
On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness
Michèle Feltz and Cas Cremers
2014/368 ( PDF )
Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster
Erich Wenger and Paul Wolfger
2014/367 ( PDF )
Redefining the Transparency Order
Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff
2014/366 ( PDF )
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
Younsung Choi and Dongho Won
2014/365 ( PDF )
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
Luke Mather and Elisabeth Oswald and Carolyn Whitnall
2014/364 ( PDF )
Deleting Secret Data with Public Verifiability
Feng Hao and Dylan Clarke and Avelino Francisco Zorzo
2014/363 ( PDF )
Forging Attacks on two Authenticated Encryptions COBRA and POET
Mridul Nandi
2014/362 ( PDF )
Nothing is for Free: Security in Searching Shared & Encrypted Data
Qiang Tang
2014/361 ( PDF )
New Results in the Linear Cryptanalysis of DES
Igor Semaev
2014/360 ( PDF )
McEliece in the world of Escher
Danilo Gligoroski and Simona Samardjiska and Håkon Jacobsen and Sergey Bezzateev
2014/359 ( PDF )
Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations
Eduardo Ruiz Duarte and Octavio Páez Osuna
2014/358 ( PDF )
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Kim-Kwang Raymond Choo and Junghyun Nam and Dongho Won
2014/357 ( PDF )
Simulatable Leakage: Analysis, Pitfalls, and new Constructions
J. Longo Galea and D. Martin and E. Oswald and D. Page and M. Stam and and M. Tunstall
2014/356 ( PDF )
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy
2014/355 ( PDF )
Graph-theoretic design and analysis of key predistribution schemes
Michelle Kendall and Keith M. Martin
2014/354 ( PDF )
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
Ray Perlner
2014/353 ( PDF )
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups
Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
2014/352 ( PDF )
Multi-Vendor PayWord with Payment Approval
Andrea Huszti
2014/351 ( PDF )
Secret and Verifiable Delegated Voting for Wide Representation
Yefim Leifman
2014/350 ( PDF )
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
Franziskus Kiefer and Mark Manulis
2014/349 ( PDF )
Zerocash: Decentralized Anonymous Payments from Bitcoin
Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza
2014/348 ( PDF )
A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
Helger Lipmaa
2014/347 ( PDF )
One-Way Functions and (Im)perfect Obfuscation
Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev
2014/346 ( PDF )
Time-Memory Trade-offs for Index Calculus in Genus 3
Kim Laine and Kristin Lauter
2014/345 ( PDF )
Private Database Access With HE-over-ORAM Architecture
Craig Gentry and Shai Halevi and Charanjit Jutla and Mariana Raykova
2014/344 ( PDF )
Toward Robust Hidden Volumes using Write-Only Oblivious RAM
Erik-Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu
2014/343 ( PDF )
Solving Linear Equations Modulo Unknown Divisors: Revisited
Yao Lu and Rui Zhang and Liqiang Peng and Dongdai Lin
2014/342 ( PDF )
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
2014/341 ( PDF )
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2014/340 ( PDF )
A Strong and Efficient Certificateless Digital Signature Scheme
Mohammed Alfateh Hassouna and Mohsin Hashim
2014/339 ( -- withdrawn -- )
Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds
Yi Deng
2014/338 ( PDF )
A Tamper and Leakage Resilient von Neumann Architecture
Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
2014/337 ( PDF )
Related Randomness Attacks for Public Key Encryption
Kenneth G. Paterson and Jacob C.N. Schuldt and Dale L. Sibborn
2014/336 ( PDF )
Private Predictive Analysis on Encrypted Medical Data
Joppe W. Bos and Kristin Lauter and Michael Naehrig
2014/335 ( PDF )
John Almeida
2014/334 ( PDF )
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures
Rachid El~Bansarkhani and Johannes Buchmann
2014/333 ( PDF )
An optimal representation for the trace zero subgroup
Elisa Gorla and Maike Massierer
2014/332 ( PDF )
How to Choose Interesting Points for Template Attacks?
Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng
2014/331 ( PDF )
Machine Learning Classification over Encrypted Data
Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser
2014/330 ( PDF )
PoS Cryptocurrency wtih No Blockchain
2014/329 ( PDF )
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
Berry Schoenmakers
2014/328 ( PDF )
Affine-evasive Sets Modulo a Prime
Divesh Aggarwal
2014/327 ( PDF )
An Optimal Strong Password Authentication Protocol with USB Sticks
Vikram D
2014/326 ( PDF )
FeW: A Lightweight Block Cipher
Manoj Kumar and Saibal K Pal and Anupama Panigrahi
2014/325 ( PDF )
A practical forgery and state recovery attack on the authenticated cipher PANDA-s
Xiutao FENG, Fan ZHANG and Hui WANG
2014/324 ( PDF )
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
Sandro Coretti and Ueli Maurer and Björn Tackmann and Daniele Venturi
2014/323 ( PDF )
Some Remarks on Honeyword Based Password-Cracking Detection
Imran Erguler
2014/322 ( PDF )
Coding Theoretic Construction of Quantum Ramp Secret Sharing
Ryutaroh Matsumoto
2014/321 ( PDF )
Efficient Quantum-Immune Keyless Signatures with Identity
Ahto Buldas and Risto Laanoja and Ahto Truu
2014/320 ( PDF )
Improved Differential Cryptanalysis of Round-Reduced Speck
Itai Dinur
2014/319 ( PDF )
Preimage attacks on Reduced-round Stribog
Riham AlTawy and Amr M. Youssef
2014/318 ( PDF )
Index calculus in the trace zero variety
Elisa Gorla and Maike Massierer
2014/317 ( PDF )
Analysis of NORX: Investigating Differential and Rotational Properties
Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves
2014/316 ( PDF )
Explicit Non-Malleable Codes Resistant to Permutations
Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
2014/315 ( PDF )
Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R
Bartosz Zoltak
2014/314 ( PDF )
Improved Leakage Model Based on Genetic Algorithm
Zhenbin Zhang and Liji Wu and An Wang and Zhaoli Mu
2014/313 ( PDF )
On the Complexity of Finding Low-Level Solutions
Bjoern Grohmann
2014/312 ( PDF )
Structure-Preserving Signatures from Type II Pairings
Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
2014/311 ( PDF )
Exponent-inversion Signatures and IBE under Static Assumptions
Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu
2014/310 ( PDF )
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
Yu Chen and Qiong Huang and Zongyang Zhang
2014/309 ( PDF )
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters
2014/308 ( PDF )
The Locality of Searchable Symmetric Encryption
David Cash and Stefano Tessaro
2014/307 ( PDF )
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
Alessandro Barenghi and Gerardo Pelosi and Francesco Regazzoni
2014/306 ( PDF )
Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen and Zongyang Zhang
2014/305 ( PDF )
Collision Attack on 5 Rounds of Grøstl
Florian Mendel and Vincent Rijmen and Martin Schläffer
2014/304 ( PDF )
Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead
Dai Ikarashi and Ryo Kikuchi and Koki Hamada and Koji Chida
2014/303 ( -- withdrawn -- )
On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems
SK Hafizul Islam
2014/302 ( PDF )
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Maria Eichlseder and Florian Mendel and Martin Schläffer
2014/301 ( PDF )
How to Avoid Obfuscation Using Witness PRFs
Mark Zhandry
2014/300 ( PDF )
On the Powers of 2
Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
2014/299 ( PDF )
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2014/298 ( PDF )
Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
Ignacio Cascudo and Ronald Cramer and Chaoping Xing
2014/297 ( PDF )
Pipelineable On-Line Encryption
Farzaneh Abed and Scott Fluhrer and Christian Forler and Eik List and Stefan Lucks and David McGrew and Jakob Wenzel
2014/296 ( PDF )
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding
Andris Ambainis and Ansis Rosmanis and Dominique Unruh
2014/295 ( PDF )
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
Nir Bitansky and Omer Paneth
2014/294 ( PDF )
The M3lcrypt Password Based Key Derivation Function
Isaiah Makwakwa
2014/293 ( -- withdrawn -- )
An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol
Xi-Jun Lin and Lin Sun
2014/292 ( PDF )
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256
Leibo Li and Keting Jia
2014/291 ( PDF )
Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗
Antonio Sanso
2014/290 ( PDF )
Reliable Broadcast with Respect to Topology Knowledge
Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2014/289 ( PDF )
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
Ivan Damgaard and Rasmus Lauritsen, and Tomas Toft
2014/288 ( PDF )
Resilient Aggregation in Simple Linear Sensor Networks
Kevin J. Henry and Douglas R. Stinson
2014/287 ( PDF )
Active and Passive Side-Channel Attacks on Delay Based PUF Designs
Georg T, Becker and Raghavan Kumar
2014/286 ( PDF )
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
Martin Stanek
2014/285 ( PDF )
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
David Derler and Christian Hanser and Daniel Slamanig
2014/284 ( PDF )
Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way
Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam
2014/283 ( PDF )
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie
2014/282 ( PDF )
On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation
Ivan Damgård and Frédéric Dupuis and Jesper Buus Nielsen
2014/281 ( PDF )
WCFB: a tweakable wide block cipher
Andrey Jivsov
2014/280 ( PDF )
MSEA: Modified Symmetric Encryption Algorithm
Rajul Kumar and K. K. Mishra and Ashish Tripathi and Abhinav Tomar and Surendra Singh
2014/279 ( PDF )
Improved Impossible Differential Attacks against Round-Reduced LBlock
Christina Boura and Marine Minier and María Naya-Plasencia and Valentin Suder
2014/278 ( PDF )
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Essam Ghadafi
2014/277 ( PDF )
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
Lin Ding and Chenhui Jin and Jie Guan and Chuanda Qi
2014/276 ( PDF )
Design of identity-based digital signature schemes using extended chaotic maps
SK Hafizul Islam
2014/275 ( PDF )
Identity-based encryption and digital signature schemes using extended chaotic maps
SK Hafizul Islam
2014/274 ( PDF )
Weak instances of composite order protocols
Sorina Ionica and Malika Izabachène
2014/273 ( PDF )
Witness Encryption from Instance Independent Assumptions
Craig Gentry and Allison Bishop Lewko and Brent Waters
2014/272 ( PDF )
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
2014/271 ( PDF )
STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
Markku-Juhani O. Saarinen
2014/270 ( PDF )
Faster Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen
2014/269 ( PDF )
Chosen Ciphertext Security via Point Obfuscation
Takahiro Matsuda and Goichiro Hanaoka
2014/268 ( PDF )
New bit-parallel Montgomery multiplier for trinomials using squaring operation
Yin Li and Yiyang Chen
2014/267 ( PDF )
Differential Fault Analysis on the families of SIMON and SPECK ciphers
Harshal Tupsamudre and Shikha Bisht and Debdeep Mukhopadhyay
2014/266 ( PDF )
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption
Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Srebrny and Marcin Wojcik
2014/265 ( PDF )
Dual System Groups and its Applications --- Compact HIBE and More
Jie Chen and Hoeteck Wee
2014/264 ( PDF )
Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
Janaka Alawatugoda and Colin Boyd and Douglas Stebila
2014/263 ( PDF )
A Generic Scan Attack on Hardware based eStream Winners
Sandip Karmakar and Dipanwita Roy Chowdhury
2014/262 ( PDF )
Differential Fault Analysis of MICKEY Family of Stream Ciphers
Sandip Karmakar and Dipanwita Roy Chowdhury
2014/261 ( PDF )
Fault Analysis of Grain Family of Stream Ciphers
Sandip Karmakar and Dipanwita Roy Chowdhury
2014/260 ( PDF )
Locally Decodable Codes for edit distance
Rafail Ostrovsky and Anat Paskin-Cherniavsky
2014/259 ( PDF )
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
2014/258 ( PDF )
A realtime key recovery attack on the authenticated cipher FASER128
Xiutao FENG and Fan ZHANG
2014/257 ( PDF )
Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
Bruce Kallick
2014/256 ( PDF )
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
2014/255 ( PDF )
Certification and Efficient Proofs of Committed Topology Graphs
Thomas Gross
2014/254 ( PDF )
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Thomas Pöppelmann and Léo Ducas and Tim Güneysu
2014/253 ( -- withdrawn -- )
Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems
Fangquan Cheng and Qian Wang and Kui Ren and Zhiyong Peng
2014/252 ( PDF )
Making RSA-PSS Provably Secure Against Non-Random Faults
Gilles Barthe and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Mehdi Tibouchi and Jean-Christophe Zapalowicz
2014/251 ( PDF )
Forgery on Stateless CMCC
Guy Barwell
2014/250 ( PDF )
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Boaz Tsaban and Noam Lifshitz
2014/249 ( PDF )
Linear Extension Cube Attack on Stream Ciphers
Liren Ding, Yongjuan Wang, Zhufeng Li
2014/248 ( PDF )
Fine grain Cross-VM Attacks on Xen and VMware are possible!
Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
2014/247 ( PDF )
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
Ivan Pryvalov and Aniket Kate
2014/246 ( PDF )
Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
Kwangsu Lee and Dong Hoon Lee
2014/245 ( PDF )
A practical state recovery attack on the stream cipher Sablier v1
Xiutao FENG and Fan ZHANG
2014/244 ( PDF )
bitcoin.BitMint: Reconciling Bitcoin with Central Banks
Gideon Samid
2014/243 ( PDF )
Reusable Fuzzy Extractors via Digital Lockers
Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam Smith
2014/242 ( PDF )
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
Franziskus Kiefer and Mark Manulis
2014/241 ( PDF )
A New Way to Prevent UKS Attacks Using Trusted Computing
Qianying Zhang and Shijun Zhao and Dengguo Feng
2014/240 ( PDF )
Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
Martin Pettai and Peeter Laud
2014/239 ( PDF )
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
Florian Legendre and Gilles Dequen and Michaël Krajecki
2014/238 ( PDF )
High Parallel Complexity Graphs and Memory-Hard Functions
Joël Alwen and Vladimir Serbinenko
2014/237 ( PDF )
SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
Aydin Aysu and Ege Gulcan and Patrick Schaumont
2014/236 ( PDF )
Linear Sequential Circuit Approximation of Acterbahn Stream Cipher
Shazia Afreen
2014/235 ( PDF )
Efficient Fuzzy Search on Encrypted Data
Alexandra Boldyreva and Nathan Chenette
2014/234 ( PDF )
Enhancing Oblivious RAM Performance Using Dynamic Prefetching
Xiangyao Yu and Ling Ren and Christopher Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas
2014/233 ( PDF )
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar
2014/232 ( PDF )
Bandwidth Efficient PIR from NTRU
Yarkın Doröz, Berk Sunar and Ghaith Hammouri
2014/231 ( PDF )
Self-Updatable Encryption with Short Public Parameters and Its Extensions
Kwangsu Lee
2014/230 ( PDF )
Isogeny graphs with maximal real multiplication
Sorina Ionica and Emmanuel Thomé
2014/229 ( -- withdrawn -- )
Investigating the Feasibility of LEAP+ in ZigBee Specification
Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi
2014/228 ( PDF )
Cryptanalysis of SP Networks with Partial Non-Linear Layers
Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban
2014/227 ( -- withdrawn -- )
CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks
Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi
2014/226 ( PDF )
Weak-Key Analysis of POET
Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser
2014/225 ( PDF )
Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption
Tapas Pandit and Rana Barua
2014/224 ( PDF )
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
Henry Carter and Charles Lever and Patrick Traynor
2014/223 ( PDF )
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
Léo Perrin and Dmitry Khovratovich
2014/222 ( PDF )
Optimizing Obfuscation: Avoiding Barrington's Theorem
Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai
2014/221 ( PDF )
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
Toomas Krips and Jan Willemson
2014/220 ( PDF )
Total Break of Zorro using Linear and Differential Attacks
Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
2014/219 ( PDF )
Dynamic Searchable Encryption via Blind Storage
Muhammad Naveed and Manoj Prabhakaran and Carl A. Gunter
2014/218 ( PDF )
A Practical Universal Forgery Attack against PAES-8
Yu Sasaki and Lei Wang
2014/217 ( PDF )
A Forgery Attack against PANDA-s
Yu Sasaki and Lei Wang
2014/216 ( PDF )
Implementation and Improvement of the Partial Sum Attack on 6-round AES
Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala
2014/215 ( PDF )
Attack On the Markov Problem
James L. Adams
2014/214 ( PDF )
Squaring Algorithms with Delayed Carry Method and Efficient Parallelization
Vladislav Kovtun and Andrew Okhrimenko
2014/213 ( PDF )
Secret-Sharing for NP
Ilan Komargodski and Moni Naor and Eylon Yogev
2014/212 ( PDF )
Remarks on the Pocklington and Padró-Sáez Cube Root Algorithm in $\mathbb F_q$
Geon Heo and Seokhwan Choi and Kwang Ho Lee and Namhun Koo and Soonhak Kwon
2014/211 ( PDF )
Some Randomness Experiments on TRIVIUM
Subhabrata Samajder and Palash Sarkar
2014/210 ( PDF )
Structural Cryptanalysis of McEliece Schemes with Compact Keys
Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
2014/209 ( PDF )
A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation
Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung
2014/208 ( PDF )
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
Ding Wang and Ping Wang
2014/207 ( PDF )
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
Katsuyuki Takashima
2014/206 ( PDF )
Reconsidering Generic Composition
Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton
2014/205 ( PDF )
Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness
Ling Ren and Christopher Fletcher and Xiangyao Yu and Albert Kwon and Marten van Dijk and Srinivas Devadas
2014/204 ( PDF )
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
Colin O'Flynn and Zhizhang (David) Chen
2014/203 ( PDF )
Privacy-Preserving Implicit Authentication
Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti
2014/202 ( PDF )
Efficiently Verifiable Computation on Encrypted Data
Dario Fiore and Rosario Gennaro and Valerio Pastro
2014/201 ( PDF )
From Input Private to Universally Composable Secure Multiparty Computation Primitives
Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen
2014/200 ( PDF )
Automatic Protocol Selection in Secure Two-Party Computations
Florian Kerschbaum and Thomas Schneider and Axel Schröpfer
2014/199 ( PDF )
Doubly Spatial Encryption from DBDH
Jie Chen and Hoeteck Wee
2014/198 ( PDF )
Fast GPGPU-Based Elliptic Curve Scalar Multiplication
Eric M. Mahé and Jean-Marie Chauvet
2014/197 ( PDF )
Breaking POET Authentication with a Single Query
Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei
2014/196 ( -- withdrawn -- )
Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif Ismaili
2014/195 ( PDF )
Low Overhead Broadcast Encryption from Multilinear Maps
Dan Boneh and Brent Waters and Mark Zhandry
2014/194 ( PDF )
Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
Sai Raghu Talluri and Swapnoneel Roy
2014/193 ( PDF )
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri
2014/192 ( PDF )
Two-sources Randomness Extractors for Elliptic Curves
Abdoul Aziz Ciss
2014/191 ( PDF )
Side-Channel Analysis on Blinded Regular Scalar Multiplications
Benoit Feix and Mylène Roussellet and Alexandre Venelli
2014/190 ( PDF )
The Temperature Side Channel and Heating Fault Attacks
Michael Hutter and Jörn-Marc Schmidt
2014/189 ( PDF )
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
2014/188 ( PDF )
A Second Look at Fischlin's Transformation
Özgür Dagdelen and Daniele Venturi
2014/187 ( PDF )
FFT-Based Key Recovery for the Integral Attack
Yosuke Todo
2014/186 ( PDF )
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser
2014/185 ( PDF )
Oblivious Data Structures
Xiao Shaun Wang and Kartik Nayak and Chang Liu and T-H. Hubert Chan and Elaine Shi and Emil Stefanov and Yan Huang
2014/184 ( PDF )
SETUP in Secret Sharing Schemes using Random Values
Ruxandra F. Olimid
2014/183 ( PDF )
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
Tetsu Iwata and Lei Wang
2014/182 ( PDF )
Proving the TLS Handshake Secure (as it is)
Karthikeyan Bhargavan and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Santiago Zanella-Béguelin
2014/181 ( PDF )
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro
2014/180 ( PDF )
Improving throughput of RC4 algorithm using multithreading techniques in multicore processors
T.D.B Weerasinghe
2014/179 ( PDF )
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Maura B. Paterson and Douglas R. Stinson
2014/178 ( PDF )
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
Qingji Zheng and Shouhuai Xu
2014/177 ( PDF )
Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES
Valentina Banciu and Elisabeth Oswald
2014/176 ( -- withdrawn -- )
One-Round Witness Indistinguishability from Indistinguishability Obfuscation
Qihua Niu, Hongda Li, Bei Liang, Fei Tang
2014/175 ( PDF )
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
T.D.B Weerasinghe
2014/174 ( PDF )
Analysis of a Modified RC4 Algorithm
T.D.B Weerasinghe
2014/173 ( PDF )
Continuous Non-malleable Codes
Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
2014/172 ( -- withdrawn -- )
A novel PUF Scheme
Jeroen Delvaux
2014/171 ( PDF )
An Effective RC4 Stream Cipher
T.D.B Weerasinghe
2014/170 ( PDF )
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
Shay Gueron
2014/169 ( PDF )
Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms
Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
2014/168 ( PDF )
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
Scott Coull and Kevin Dyer
2014/167 ( PDF )
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
2014/166 ( PDF )
Tuple decoders for traitor tracing schemes
Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
2014/165 ( -- withdrawn -- )
Kirti Chawla and Om Pal Yadav
2014/164 ( PDF )
Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters
Yuriy Tarannikov
2014/163 ( PDF )
Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices
Arnaud Dambra and Philippe Gaborit and Mylène Roussellet and Julien Schrek and Nicolas Tafforeau
2014/162 ( PDF )
Hu Xiong
2014/161 ( PDF )
``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way
Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom
2014/160 ( PDF )
TrueSet: Faster Veri fiable Set Computations
Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikos Triandopoulos
2014/159 ( PDF )
Weak-Key Leakage Resilient Cryptography
Zuoxia Yu and Qiuliang Xu and Yongbin Zhou and Chengyu Hu and Rupeng Yang and Guangjun Fan
2014/158 ( PDF )
Point compression for the trace zero subgroup over a small degree extension field
Elisa Gorla and Maike Massierer
2014/157 ( PDF )
CLOC: Authenticated Encryption for Short Input
Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka
2014/156 ( PDF )
Non-Malleable Extractors with Shorter Seeds and Their Applications
Yanqing Yao and Zhoujun Li
2014/155 ( PDF )
Honey Encryption: Security Beyond the Brute-Force Bound
Ari Juels and Thomas Ristenpart
2014/154 ( -- withdrawn -- )
Non-Interactive Cryptography in the RAM Model of Computation
Daniel Apon and Xiong Fan and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2014/153 ( PDF )
Verifiable Oblivious Storage
Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam
2014/152 ( PDF )
A Statistics-based Fundamental Model for Side-channel Attack Analysis
Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang
2014/151 ( PDF )
Security Analysis of Key-Alternating Feistel Ciphers
Rodolphe Lampe and Yannick Seurin
2014/150 ( -- withdrawn -- )
On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
Nikolaos Karapanos and Srdjan Capkun
2014/149 ( PDF )
Millions of Millionaires: Multiparty Computation in Large Networks
Mahdi Zamani and Mahnush Movahedi and Jared Saia
2014/148 ( PDF )
Outsourcing Private RAM Computation
Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
2014/147 ( PDF )
The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
Razvan Barbulescu and Cécile Pierrot
2014/146 ( PDF )
Untappable communication channels over optical fibers from quantum-optical noise
Geraldo A. Barbosa and Jeroen van de Graaf
2014/145 ( -- withdrawn -- )
Calculating Cryptographic Degree of an S-Box
Prasanna Raghaw Mishra
2014/144 ( PDF )
How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda
2014/143 ( PDF )
Statistical Concurrent Non-Malleable Zero Knowledge
Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti
2014/142 ( -- withdrawn -- )
FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm
Karim M. Abdellatif, R. Chotin-Avot, and H. Mehrez
2014/141 ( -- withdrawn -- )
Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps
Hao Wang
2014/140 ( PDF )
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
Yuval Yarom and Naomi Benger
2014/139 ( PDF )
On the Phase Space of Block-Hiding Strategies
Assaf Shomer
2014/138 ( PDF )
Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction
Jae Hong Seo
2014/137 ( PDF )
Efficient, Oblivious Data Structures for MPC
Marcel Keller and Peter Scholl
2014/136 ( PDF )
Isolated Execution on Many-core Architectures
Ramya Jayaram Masti and Devendra Rai and Claudio Marforio and Srdjan Capkun
2014/135 ( PDF )
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
2014/134 ( PDF )
Kummer strikes back: new DH speed records
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe
2014/133 ( PDF )
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
Yihua Zhang and Marina Blanton
2014/132 ( PDF )
Efficient Revocable Identity-Based Encryption via Subset Difference Methods
Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park
2014/131 ( PDF )
Modelling After-the-fact Leakage for Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2014/130 ( PDF )
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig
2014/129 ( PDF )
How to Use Bitcoin to Design Fair Protocols
Iddo Bentov and Ranjit Kumaresan
2014/128 ( PDF )
Efficient Three-Party Computation from Cut-and-Choose
Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas
2014/127 ( PDF )
Algebraic Properties of Modular Addition Modulo a Power of Two
S. M. Dehnavi and Alireza Rahimipour
2014/126 ( -- withdrawn -- )
Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
Hui Cui \and Yi Mu \and Man Ho Au
2014/125 ( PDF )
Removing Erasures with Explainable Hash Proof Systems
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/124 ( PDF )
On the Information Ratio of Non-Perfect Secret Sharing Schemes
Oriol Farràs and Torben Hansen and Tarik Kaced and Carles Padró
2014/123 ( PDF )
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes
Mohammad Sadeq Dousti and Rasool Jalili
2014/122 ( PDF )
New Way to Construct Cryptographic Hash Function
2014/121 ( PDF )
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation
Koki Hamada and Dai Ikarashi and Koji Chida and Katsumi Takahashi
2014/120 ( PDF )
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)
Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
2014/119 ( PDF )
Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$)
Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
2014/118 ( PDF )
Quantum position verification in the random oracle model
Dominique Unruh
2014/117 ( PDF )
An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems
Bjoern Grohmann
2014/116 ( PDF )
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model
Ronald Cramer and Carles Padró and Chaoping Xing
2014/115 ( PDF )
Comments on a novel user authentication and key agreement scheme
Jia-Lun Tsai
2014/114 ( PDF )
Prover Anonymous and Deniable Distance-Bounding Authentication
Sebastien Gambs and Cristina Onete and Jean-Marc Robert
2014/113 ( PDF )
Secure Compression: Theory \& Practice
James Kelley and Roberto Tamassia
2014/112 ( PDF )
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich
2014/111 ( PDF )
A Note on the CLRW2 Tweakable Block Cipher Construction
Gordon Procter
2014/110 ( PDF )
Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box
Sourav Das
2014/109 ( PDF )
Diffusion Programmable Device : The device to prevent reverse engineering
Mitsuru Shiozaki, Ryohei Hori and Takeshi Fujino
2014/108 ( PDF )
MJH: A Faster Alternative to MDC-2
Jooyoung Lee and Martijn Stam
2014/107 ( PDF )
Key-Indistinguishable Message Authentication Codes
Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
2014/106 ( PDF )
Algorithms in HElib
Shai Halevi and Victor Shoup
2014/105 ( PDF )
Reducing the Overhead of MPC over a Large Population
Ashish Choudhury and Arpita Patra and Nigel P. Smart
2014/104 ( PDF )
Space-efficient, byte-wise incremental and perfectly private encryption schemes
Kévin Atighehchi
2014/103 ( PDF )
SHipher: Families of Block Ciphers based on SubSet-Sum Problem
Xiali Hei and Binheng Song
2014/102 ( PDF )
Actively Secure Private Function Evaluation
Payman Mohassel and Saeed Sadeghian and Nigel P. Smart
2014/101 ( PDF )
Dishonest Majority Multi-Party Computation for Binary Circuits
Enrique Larraia and Emmanuela Orsini and Nigel P. Smart
2014/100 ( PDF )
Improved Slender-set Linear Cryptanalysis
Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi
2014/099 ( PDF )
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Christina Brzuska and Pooya Farshim and Arno Mittelbach
2014/098 ( PDF )
Towards Characterizing Complete Fairness in Secure Two-Party Computation
Gilad Asharov
2014/097 ( PDF )
Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise
Koji Nuida
2014/096 ( PDF )
Tight security bounds for multiple encryption
Yuanxi Dai, John Steinberger
2014/095 ( PDF )
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
2014/094 ( PDF )
Faster Bootstrapping with Polynomial Error
Jacob Alperin-Sheriff and Chris Peikert
2014/093 ( PDF )
The Related-Key Analysis of Feistel Constructions
Manuel Barbosa and Pooya Farshim
2014/092 ( PDF )
A new class of system oriented PKC, K(I)SOPKC.
2014/091 ( PDF )
On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2014/090 ( PDF )
Cryptanalysis of KLEIN (Full version)
Virginie Lallemand and María Naya-Plasencia
2014/089 ( PDF )
Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version)
Anne Canteaut and Thomas Fuhr and Henri Gilbert and María Naya-Plasencia and Jean-René Reinhard
2014/088 ( PDF )
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
Himanshu Tyagi and Shun Watanabe
2014/087 ( PDF )
AnoA: A Framework For Analyzing Anonymous Communication Protocols
Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi
2014/086 ( PDF )
Randomized and Efficient Authentication in Mobile Environments
Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
2014/085 ( PDF )
Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer
Aleksandra Mileva
2014/084 ( PDF )
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
2014/083 ( PDF )
Garbled RAM Revisited, Part II
Steve Lu and Rafail Ostrovsky
2014/082 ( PDF )
Garbled RAM Revisited, Part I
Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
2014/081 ( PDF )
Efficient Round Optimal Blind Signatures
Sanjam Garg and Divya Gupta
2014/080 ( PDF )
A Full Characterization of Completeness for Two-party Randomized Function Evaluation
Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai
2014/079 ( PDF )
Unifying Leakage Models: from Probing Attacks to Noisy Leakage
Alexandre Duc and Stefan Dziembowski and Sebastian Faust
2014/078 ( PDF )
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Ahmad Boorghany and Rasool Jalili
2014/077 ( PDF )
Mixcoin: Anonymity for Bitcoin with accountable mixes
Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten
2014/076 ( PDF )
Certified Bitcoins
Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros
2014/075 ( PDF )
Publicly Auditable Secure Multi-Party Computation
Carsten Baum and Ivan Damgård and Claudio Orlandi
2014/074 ( PDF )
New and Improved Key-Homomorphic Pseudorandom Functions
Abhishek Banerjee and Chris Peikert
2014/073 ( PDF )
Anonymous Authentication with Shared Secrets
Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
2014/072 ( PDF )
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser and Sebastian Biedermann
2014/071 ( PDF )
Implementing Pairing-Based Cryptosystems in USB Tokens
Zhaohui Cheng
2014/070 ( PDF )
Lattice Cryptography for the Internet
Chris Peikert
2014/069 ( PDF )
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Manoj Ranjan Mishra, Jayaprakash Kar and Banshidhar Majhi
2014/068 ( PDF )
Some security bounds for the DGHV scheme
Franca Marinelli and Riccardo Aragona and Chiara Marcolla and Massimiliano Sala
2014/067 ( PDF )
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey
2014/066 ( PDF )
A Subexponential Construction of Graph Coloring for Multiparty Computation
Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, and Ron Steinfeld
2014/065 ( PDF )
Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case
Palash Sarkar and Shashank Singh
2014/064 ( PDF )
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems
Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan
2014/063 ( PDF )
Cryptanalysis on “Secure untraceable off-line electronic cash system”
Yalin Chen and Jue-Sam Chou*
2014/062 ( PDF )
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
Tancrède Lepoint and Michael Naehrig
2014/061 ( PDF )
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Stefano Tessaro and David A. Wilson
2014/060 ( PDF )
Verifiable Computation in Multiparty Protocols with Honest Majority
Peeter Laud and Alisa Pankova
2014/059 ( PDF )
Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
John Tromp
2014/058 ( PDF )
Cryptanalysis of FIDES
Itai Dinur and Jérémy Jean
2014/057 ( PDF )
Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma
Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
2014/056 ( PDF )
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang
2014/055 ( PDF )
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Younsung Choi
2014/054 ( PDF )
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
Sugata Gangopadhyay and Pantelimon Stanica
2014/053 ( PDF )
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
Sonia Belaïd, and Vincent Grosso and François-Xavier Standaert
2014/052 ( PDF )
DAA-related APIs in TPM2.0 Revisited
Li Xi
2014/051 ( PDF )
An Equivalence-Preserving Transformation of Shift Registers
Elena Dubrova
2014/050 ( PDF )
Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication
Daniel R. L. Brown
2014/049 ( PDF )
Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography
Neha tirthani and Ganesan
2014/048 ( PDF )
When a Boolean Function can be Expressed as the Sum of two Bent Functions
Longjiang Qu and Shaojing Fu and Qingping Dai and Chao Li
2014/047 ( PDF )
Down the Rabbit Hole: Revisiting the Shrinking Method
Vivien Dubois
2014/046 ( PDF )
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
Yalin Chen1 and Jue-Sam Chou*2
2014/045 ( PDF )
Human Assisted Randomness Generation Using Video Games
Mohsen Alimomeni and Reihaneh Safavi-Naini
2014/044 ( PDF )
rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval
Lichun Li and Michael Militzer and Anwitaman Datta
2014/043 ( PDF )
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
Mehdi Tibouchi
2014/042 ( PDF )
A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem
Jintai Ding, Chengdong Tao
2014/041 ( PDF )
Cryptanalysis via algebraic spans
Adi Ben-Zvi and Arkadius Kalka and Boaz Tsaban
2014/040 ( PDF )
A Fast Modular Reduction Method
Zhengjun Cao and Ruizhong Wei and Xiaodong Lin
2014/039 ( PDF )
Homomorphic AES Evaluation using NTRU
Yarkin Doroz and Yin Hu and Berk Sunar
2014/038 ( PDF )
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
Ralf Kuesters and Enrico Scapin and Tomasz Truderung and Juergen Graf
2014/037 ( PDF )
On the Security of the Pre-Shared Key Ciphersuites of TLS
Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk
2014/036 ( PDF )
A Secure Text Messaging Protocol
Gary Belvin
2014/035 ( PDF )
A new attack on RSA with a composed decryption exponent
Abderrahmane Nitaj and Mohamed Ould Douh
2014/034 ( PDF )
Authenticated Encryption with SPECK
Chase Manny
2014/033 ( PDF )
Lattice-based Group Signature Scheme with Verifier-local Revocation
Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang
2014/032 ( PDF )
Scale-Invariant Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi
2014/031 ( PDF )
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results
Yongge Wang
2014/030 ( PDF )
Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simplicio Jr.
2014/029 ( PDF )
General Impossibility of Group Homomorphic Encryption in the Quantum World
Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter
2014/028 ( PDF )
Channel Equalization for Side Channel Attacks
Colin O'Flynn and Zhizhang (David) Chen
2014/027 ( PDF )
Twisting Edwards curves with isogenies
Mike Hamburg
2014/026 ( PDF )
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger and Mélanie Favre and Tarik Graba
2014/025 ( PDF )
Side-Channel Leakage through Static Power – Should We Care about in Practice? –
Amir Moradi
2014/024 ( PDF )
An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
Ivan Damgård and Jesper Buus Nielsen
2014/023 ( PDF )
Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle
Gengran Hu and Yanbin Pan and Feng Zhang
2014/022 ( PDF )
Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR
Sourav Das
2014/021 ( PDF )
Online/Offline Attribute-Based Encryption
Susan Hohenberger and Brent Waters
2014/020 ( PDF )
(De-)Constructing TLS
Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi
2014/019 ( PDF )
Lazy Modulus Switching for the BKW Algorithm on LWE
Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
2014/018 ( PDF )
Completeness for Symmetric Two-Party Functionalities - Revisited
Yehuda Lindell and Eran Omri and Hila Zarosim
2014/017 ( -- withdrawn -- )
Two-round password-only authenticated key exchange in the three-party setting
Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
2014/016 ( PDF )
Triple and Quadruple Encryption: Bridging the Gaps
Bart Mennink and Bart Preneel
2014/015 ( PDF )
Tight Security Bounds for Triple Encryption
Jooyoung Lee
2014/014 ( PDF )
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther and Bertram Poettering
2014/013 ( -- withdrawn -- )
A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs
Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol
2014/012 ( PDF )
Maximal Information Coefficient Analysis
Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
2014/011 ( PDF )
Construction of New Families of ‎MDS‎ Diffusion Layers
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
2014/010 ( PDF )
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
2014/009 ( PDF )
Characterization of EME with Linear Mixing
Nilanjan Datta and Mridul Nandi
2014/008 ( PDF )
A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
Annelie Heuser and Olivier Rioul and Sylvain Guilley
2014/007 ( PDF )
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.
Ethan Heilman
2014/006 ( PDF )
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
2014/005 ( -- withdrawn -- )
The analysis of the Keccak with the new method called parity
Ghanei yakhdan.mostafa
2014/004 ( PDF )
MaxMinMax problem and sparse equations over finite fields
Igor Semaev
2014/003 ( PDF )
$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials
Xi Xiong and Haining Fan
2014/002 ( PDF )
Pseudorandom Generator Based on Hard Lattice Problem
Kuan Cheng
2014/001 ( PDF )
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
Yalin Chen and Jue-Sam Chou

[ Cryptology ePrint archive ]