Cryptology ePrint Archive: Listing for 2014
-
2014/1029 ( PDF )
- On the Cryptographic Hardness of Finding a Nash Equilibrium
- Nir Bitansky and Omer Paneth and Alon Rosen
-
2014/1028 ( PDF )
- Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
- Payal Chaudhari and Manik Lal Das and Anish Mathuria
-
2014/1027 ( PDF )
- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
- Vadim Lyubashevsky and Daniel Wichs
-
2014/1026 ( PDF )
- Lattices with Symmetry
- H. W. Lenstra, Jr. and A. Silverberg
-
2014/1025 ( PDF )
- XPIR: Private Information Retrieval for Everyone
- Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian
-
2014/1024 ( PDF )
- Cryptanalysis of the Co-ACD Assumption
- Pierre-Alain Fouque and Moon Sung Lee and Tancrède Lepoint and Mehdi Tibouchi
-
2014/1023 ( PDF )
- How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search
- Nathan E. Price and Alan T. Sherman
-
2014/1022 ( PDF )
- Topology-Hiding Computation
- Tal Moran and Ilan Orlov and Silas Richelson
-
2014/1021 ( PDF )
- Tightly-Secure Signatures from Chameleon Hash Functions
- Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan
-
2014/1020 ( PDF )
- Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
-
2014/1019 ( -- withdrawn -- )
- Related-Key Differential Cryptanalysis of Reduced-Round ITUBee
- Xiaoming Tang and Weidong Qiu and Zheng Gong and Zheng Huang and Jie Guo
-
2014/1018 ( PDF )
- Algebraic Algorithms for LWE
- Martin R. Albrecht and Carlos Cid and Jean-Charles Faugère and Ludovic Perret
-
2014/1017 ( PDF )
- Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
- Foteini Baldimtsi and Olga Ohrimenko
-
2014/1016 ( -- withdrawn -- )
- Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security
- GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL
-
2014/1015 ( PDF )
- Compact Accumulator using Lattices
- Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini
-
2014/1014 ( PDF )
- Double-and-Add with Relative Jacobian Coordinates
- Björn Fay
-
2014/1013 ( PDF )
- Computational Independence
- Björn Fay
-
2014/1012 ( PDF )
- The Boomerang Attacks on BLAKE and BLAKE2
- Yonglin Hao
-
2014/1011 ( PDF )
- Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
- Alex Biryukov and Ivan Pustogarov
-
2014/1010 ( PDF )
- On Continuous After-the-Fact Leakage-Resilient Key Exchange
- Mohsen Toorani
-
2014/1009 ( PDF )
- A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
- Christopher D. Nguyen and Dhananjay S. Phatak and Steven D. Houston and Alan T. Sherman
-
2014/1008 ( PDF )
- DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS
- Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
-
2014/1007 ( PDF )
- Fair Multiple-bank E-cash in the Standard Model
- Jiangxiao Zhang and Yanwu Gao and Chunhui Feng and Hua Guo and Zhoujun Li
-
2014/1006 ( PDF )
- Simple composition theorems of one-way functions -- proofs and presentations
- Jaime Gaspar and Eerke Boiten
-
2014/1005 ( PDF )
- A pure block chain based decentralized exchange.
- Harsh Patel
-
2014/1004 ( PDF )
- CONIKS: Bringing Key Transparency to End Users
- Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
-
2014/1003 ( PDF )
- COFFE: Ciphertext Output Feedback Faithful Encryption
- Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel
-
2014/1002 ( PDF )
- Experiments in Encrypted and Searchable Network Audit Logs
- Bhanu Prakash Gopularam and Sashank Dara and Nalini N
-
2014/1001 ( -- withdrawn -- )
- Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE
- Xiaopeng Yang, Wenping Ma, and Chengli Zhang
-
2014/1000 ( PDF )
- Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
- Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri
-
2014/999 ( PDF )
- First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
- Yongdae Kim and Hyunsoo Yoon
-
2014/998 ( PDF )
- Hierarchical deterministic Bitcoin wallets that tolerate key leakage
- Gus Gutoski and Douglas Stebila
-
2014/997 ( PDF )
- Constants Count: Practical Improvements to Oblivious RAM
- Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas
-
2014/996 ( PDF )
- Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
- Maike Massierer
-
2014/995 ( PDF )
- Partial Garbling Schemes and Their Applications
- Yuval Ishai and Hoeteck Wee
-
2014/994 ( PDF )
- Two novel applications of bilinear groups to ABE encryption
- Riccardo Longo and Chiara Marcolla and Massimiliano Sala
-
2014/993 ( PDF )
- How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
- Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer
-
2014/992 ( PDF )
- Incentivized Outsourced Computation Resistant to Malicious Contractors
- Alptekin Kupcu
-
2014/991 ( PDF )
- Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
- Kai-Min Chung and Huijia Lin and Rafael Pass
-
2014/990 ( PDF )
- Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
- Pille Pullonen and Sander Siim
-
2014/989 ( PDF )
- Controlled Homomorphic Encryption: Definition and Construction
- Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti
-
2014/988 ( PDF )
- Armadillo: a compilation chain for privacy preserving applications
- Sergiu Carpov and Paul Dubrulle and Renaud Sirdey
-
2014/987 ( PDF )
- Cryptanalysis of Full PRIDE Block Cipher
- Yibin Dai and Shaozhen Chen
-
2014/986 ( PDF )
- Related-Key Differential Attack on Round Reduced RECTANGLE-80
- Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma
-
2014/985 ( PDF )
- Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
- Bartosz Zoltak
-
2014/984 ( PDF )
- Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel
- Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert
-
2014/983 ( PDF )
- Public Verification of Private Effort
- Giulia Alberini and Tal Moran and Alon Rosen
-
2014/982 ( PDF )
- Outlier Privacy
- Edward Lui and Rafael Pass
-
2014/981 ( PDF )
- Publicly Verifiable Non-Interactive Arguments for Delegating Computation
- Omer Paneth and Guy N. Rothblum
-
2014/980 ( PDF )
- A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors
- Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
-
2014/979 ( PDF )
- The Chaining Lemma and its application
- Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
-
2014/978 ( PDF )
- Improved Differential Analysis of Block Cipher PRIDE
- Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma
-
2014/977 ( PDF )
- A Survey on Lightweight Entity Authentication with Strong PUFs
- Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede
-
2014/976 ( PDF )
- Geppetto: Versatile Verifiable Computation
- Craig Costello and Cédric Fournet and Jon Howell and Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and Bryan Parno and Samee Zahur
-
2014/975 ( PDF )
- Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2014/974 ( -- withdrawn -- )
- Non-Linearity and Affine Equivalence of Permutations
- P R Mishra, Indivar Gupta and N Rajesh Pillai
-
2014/973 ( PDF )
- Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
- Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma
-
2014/972 ( PDF )
- A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
- Haining Fan
-
2014/971 ( PDF )
- Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
- Y. Wei and E. Pasalic and F. Zhang and W. Wu
-
2014/970 ( PDF )
- Jackpot Stealing Information From Large Caches via Huge Pages
- Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2014/969 ( PDF )
- Privacy-Preserving Face Recognition with Outsourced Computation
- Can Xiang and Chunming Tang
-
2014/968 ( PDF )
- Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
- Jorge Munilla and Mike Burmester and Albert Peinado
-
2014/967 ( PDF )
- A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
- Maciej Skorski
-
2014/966 ( PDF )
- Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
- Kan Yang and Xiaohua Jia and Kuan Zhang and Xuemin (Sherman) Shen
-
2014/965 ( PDF )
- Predicate Encryption for Multi-Dimensional Range Queries from Lattices
- Romain Gay and Pierrick Méaux and Hoeteck Wee
-
2014/964 ( PDF )
- On two windows multivariate cryptosystem depending on random parameters
- Urszula Romańczuk-Polubiec, Vasyl Ustimenko
-
2014/963 ( PDF )
- Malicious-Client Security in Blind Seer: A Scalable Private DBMS
- Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
-
2014/962 ( PDF )
- Solving Polynomial Systems with Noise over F_2: Revisited
- Zhenyu Huang and Dongdai Lin
-
2014/961 ( PDF )
- When are Fuzzy Extractors Possible?
- Benjamin Fuller and Adam Smith and Leonid Reyzin
-
2014/960 ( PDF )
- Non-Interactive Secure Multiparty Computation
- Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin-Cherniavsky
-
2014/959 ( PDF )
- Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
- Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul
-
2014/958 ( PDF )
- Authenticated Encryption: How Reordering can Impact Performance
- Basel Alomair
-
2014/957 ( PDF )
- Black Box Separations for Differentially Private Protocols
- Dakshita Khurana and Hemanta K. Maji and Amit Sahai
-
2014/956 ( PDF )
- Tamper Detection and Continuous Non-Malleable Codes
- Zahra Jafargholi and Daniel Wichs
-
2014/955 ( PDF )
- On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme
- Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
-
2014/954 ( PDF )
- Algebraic Fault Analysis of Katan
- Frank Quedenfeld
-
2014/953 ( PDF )
- The Related-Key Security of Iterated Even-Mansour Ciphers
- Pooya Farshim and Gordon Procter
-
2014/952 ( PDF )
- Balanced Encoding to Mitigate Power Analysis: A Case Study
- Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye
-
2014/951 ( PDF )
- Modified Alternating Step Generators with Non-Linear Scrambler
- Robert Wicik and Tomasz Rachwalik and Rafał Gliwa
-
2014/950 ( PDF )
- Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
- Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda
-
2014/949 ( PDF )
- Simplification/complication of the basis of prime Boolean ideal
- Alexander Rostovtsev and Anna Shustrova
-
2014/948 ( PDF )
- Lattice Point Enumeration on Block Reduced Bases
- Michael Walter
-
2014/947 ( PDF )
- The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2014/946 ( PDF )
- On a new fast public key cryptosystem
- Samir Bouftass
-
2014/945 ( PDF )
- Boomerang Attack on Step-Reduced SHA-512
- Hongbo Yu, Dongxia Bai
-
2014/944 ( PDF )
- EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes
- Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
-
2014/943 ( PDF )
- HaTCh: A Formal Framework of Hardware Trojan Design and Detection
- Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk
-
2014/942 ( PDF )
- Public-Coin Differing-Inputs Obfuscation and Its Applications
- Yuval Ishai, Omkant Pandey, Amit Sahai
-
2014/941 ( PDF )
- Garbled RAM From One-Way Functions
- Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro
-
2014/940 ( PDF )
- Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2014/939 ( PDF )
- Security Analysis of an Authentication Scheme Using Smart Cards
- Gaurav Tiwari and Amit K. Awasthi and Neha Shukla
-
2014/938 ( PDF )
- Trapdoor Computational Fuzzy Extractors
- Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
-
2014/937 ( PDF )
- Analysis of Lewko-Sahai-Waters Revocation System
- Zhengjun Cao and Lihua Liu
-
2014/936 ( PDF )
- Outsourcing Secure Two-Party Computation as a Black Box
- Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
-
2014/935 ( PDF )
- Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
- Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia
-
2014/934 ( PDF )
- Efficient Generic Zero-Knowledge Proofs from Commitments
- Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias
-
2014/933 ( PDF )
- Certificateless Proxy Re-Encryption Without Pairing: Revisited
- Akshayaram Srinivasan and C. Pandu Rangan
-
2014/932 ( PDF )
- Bicliques with Minimal Data and Time Complexity for AES (Extended Version)
- Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
-
2014/931 ( PDF )
- Cryptanalysis of JAMBU
- Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang
-
2014/930 ( PDF )
- Immunizing Multilinear Maps Against Zeroizing Attacks
- Dan Boneh and David J. Wu and Joe Zimmerman
-
2014/929 ( PDF )
- Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero
- Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai
-
2014/928 ( PDF )
- Implementing Candidate Graded Encoding Schemes from Ideal Lattices
- Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois
-
2014/927 ( PDF )
- Physical functions : the common factor of side-channel and fault attacks ?
- Bruno Robisson and Hélène Le Bouder
-
2014/926 ( PDF )
- Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
- Keita Emura and Takuya Hayashi
-
2014/925 ( PDF )
- Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
- Venkata Koppula and Allison Bishop Lewko and Brent Waters
-
2014/924 ( PDF )
- Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
- Antoine Joux and Cécile Pierrot
-
2014/923 ( -- withdrawn -- )
- New Cryptosystem Using The CRT And The Jordan Normal Form
- Hemlata Nagesh and Birendra Kumar Sharma
-
2014/922 ( PDF )
- Differential Analysis of Block Ciphers SIMON and SPECK
- Alex Biryukov and Arnab Roy and Vesselin Velichkov
-
2014/921 ( PDF )
- Batch NFS
- Daniel J. Bernstein and Tanja Lange
-
2014/920 ( PDF )
- Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
- Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert
-
2014/919 ( PDF )
- Experimenting with Shuffle Block Cipher and SMT Solvers
- Martin Stanek
-
2014/918 ( PDF )
- Web Tap Payment Authentication and Encryption With Zero Customer Effort
- Henry Ng
-
2014/917 ( PDF )
- From Selective to Adaptive Security in Functional Encryption
- Prabhanjan Ananth and Zvika Brakerski and Gil Segev and Vinod Vaikuntanathan
-
2014/916 ( PDF )
- Adaptively Secure Fully Homomorphic Signatures Based on Lattices
- Xavier Boyen and Xiong Fan and Elaine Shi
-
2014/915 ( PDF )
- The Security of the Hanser-Slamanig Signature Scheme Revisited
- Yanbin Pan
-
2014/914 ( PDF )
- Cryptography with One-Way Communication
- Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
-
2014/913 ( PDF )
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
- Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
-
2014/912 ( PDF )
- Low-Cost Concurrent Error Detection for GCM and CCM
- Xiaofei Guo and Ramesh Karri
-
2014/911 ( PDF )
- A Denial of Service Attack against Fair Computations using Bitcoin Deposits
- Jethro Beekman
-
2014/910 ( PDF )
- Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model
- Vanishree Rao
-
2014/909 ( PDF )
- Robust Secret Sharing Schemes Against Local Adversaries
- Allison Bishop Lewko and Valerio Pastro
-
2014/908 ( PDF )
- Practical UC security with a Global Random Oracle
- Ran Canetti and Abhishek Jain and Alessandra Scafuro
-
2014/907 ( PDF )
- Finding shortest lattice vectors faster using quantum search
- Thijs Laarhoven and Michele Mosca and Joop van de Pol
-
2014/906 ( PDF )
- Cryptanalysis of the Multilinear Map over the Integers
- Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehle
-
2014/905 ( PDF )
- Primary-Secondary-Resolver Membership Proof Systems
- Moni Naor and Asaf Ziv
-
2014/904 ( PDF )
- How Secure is TextSecure?
- Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz
-
2014/903 ( PDF )
- Falcon Codes: Fast, Authenticated LT Codes
- Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos
-
2014/902 ( PDF )
- The Power of Negations in Cryptography
- Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen
-
2014/901 ( PDF )
- A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
- Kenneth G. Paterson and Mario Strefler
-
2014/900 ( PDF )
- Some Security Results of the RC4+ Stream Cipher
- Subhadeep Banik and Sonu Jha
-
2014/899 ( PDF )
- Side Channel Power Analysis of an AES-256 Bootloader
- Colin O'Flynn and Zhizhang Chen
-
2014/898 ( PDF )
- A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
- Eduardo Morais and Ricardo Dahab
-
2014/897 ( PDF )
- Leveled Fully Homomorphic Signatures from Standard Lattices
- Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs
-
2014/896 ( PDF )
- Efficiently Making Secure Two-Party Computation Fair
- Handan Kılınç and Alptekin Küpçü
-
2014/895 ( PDF )
- Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
- Kerry A. McKay and Poorvi L. Vora
-
2014/894 ( PDF )
- THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS
- Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan
-
2014/893 ( PDF )
- Advanced Algebraic Attack on Trivium
- Frank Quedenfeld and Christopher Wolf
-
2014/892 ( PDF )
- Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014
- Georg Fuchsbauer
-
2014/891 ( PDF )
- Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
- Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi
-
2014/890 ( PDF )
- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures
- Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek
-
2014/889 ( PDF )
- Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
- Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak
-
2014/888 ( PDF )
- Distance Lower Bounding
- Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi
-
2014/887 ( PDF )
- Hardware Implementation of Secure Shamir's Secret Sharing Scheme
- Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
-
2014/886 ( PDF )
- Accountable Storage
- Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia
-
2014/885 ( PDF )
- Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
- Marios O. Choudary and Markus G. Kuhn
-
2014/884 ( -- withdrawn -- )
- Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
- Pei Luo and Yunsi Fei
-
2014/883 ( PDF )
- Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
- Pei Luo and Yunsi Fei
-
2014/882 ( PDF )
- Obfuscation of Probabilistic Circuits and Applications
- Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan
-
2014/881 ( PDF )
- Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
- Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
-
2014/880 ( PDF )
- Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
- Joppe W. Bos and Michael Naehrig and Joop van de Pol
-
2014/879 ( PDF )
- Watch your Constants: Malicious Streebog
- Riham AlTawy and Amr M. Youssef
-
2014/878 ( PDF )
- Protecting obfuscation against arithmetic attacks
- Eric Miles and Amit Sahai and Mor Weiss
-
2014/877 ( PDF )
- CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
- Daniel R. L. Brown
-
2014/876 ( PDF )
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
- Mihir Bellare and Viet Tung Hoang
-
2014/875 ( PDF )
- Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
- Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding
-
2014/874 ( PDF )
- Accelerating Bliss: the geometry of ternary polynomials
- Léo Ducas
-
2014/873 ( PDF )
- Bootstrapping for HElib
- Shai Halevi and Victor Shoup
-
2014/872 ( PDF )
- Recent Results in Scalable Multi-Party Computation
- Jared Saia and Mahdi Zamani
-
2014/871 ( PDF )
- An algorithm for MD5 single-block collision attack using high-performance computing cluster
- Anton A. Kuznetsov
-
2014/870 ( PDF )
- Dynamic Behavior of RS latches using FIB processing and probe connection
- Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto
-
2014/869 ( PDF )
- Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
- Werner Schindler
-
2014/868 ( PDF )
- Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
- Ilan Komargodski and Gil Segev and Eylon Yogev
-
2014/867 ( PDF )
- Random-Oracle Uninstantiability from Indistinguishability Obfuscation
- Christina Brzuska and Pooya Farshim and Arno Mittelbach
-
2014/866 ( -- withdrawn -- )
- Self-Destruct Non-Malleability
- Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
-
2014/865 ( PDF )
- Impossibility of Black-Box Simulation Against Leakage Attacks
- Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
-
2014/864 ( PDF )
- How to Choose Interesting Points for Template Attacks More Effectively
- Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
-
2014/863 ( PDF )
- A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
- Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou
-
2014/862 ( PDF )
- Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -
- Miroslav Knezevic, Ventzislav Nikov, and Peter Rombouts
-
2014/861 ( PDF )
- Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
- İhsan Haluk Akın
-
2014/860 ( PDF )
- Differential Factors: Improved Attacks on SERPENT
- Cihangir Tezcan and Ferruh Özbudak
-
2014/859 ( -- withdrawn -- )
- Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system
- SK Hafizul Islam; G. P. Biswas
-
2014/858 ( PDF )
- Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds
- Dana Dachman-Soled and Jonathan Katz and Vanishree Rao
-
2014/857 ( PDF )
- Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
- Jonathan Katz and Andrew Miller and Elaine Shi
-
2014/856 ( PDF )
- Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware
- Dana Dachman-Soled and Feng-Hao Liu and Hong-Sheng Zhou
-
2014/855 ( PDF )
- Relating Undisturbed Bits to Other Properties of Substitution Boxes
- Rusydi H. Makarim and Cihangir Tezcan
-
2014/854 ( PDF )
- Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
- Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
-
2014/853 ( PDF )
- Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
- David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătălin Roşu and Michael Steiner
-
2014/852 ( PDF )
- Faster ECC over $\mathbb{F}_{2^{521}-1}$
- Robert Granger and Michael Scott
-
2014/851 ( PDF )
- Near Optimal Rate Homomorphic Encryption for Branching Programs
- Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang
-
2014/850 ( PDF )
- BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates
- Markku-Juhani O. Saarinen
-
2014/849 ( PDF )
- A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks
- Ryotaro Hayashi and Tatsuyuki Matsushita
-
2014/848 ( PDF )
- Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
- Nicolas T. Courtois and Pinar Emirdag and Filippo Valsorda
-
2014/847 ( PDF )
- Reflections on Slide with a Twist Attacks
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2014/846 ( PDF )
- Verifiable computation using multiple provers
- Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish
-
2014/845 ( PDF )
- Adaptively Secure Two-party Computation From Indistinguishability Obfuscation
- Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya
-
2014/844 ( PDF )
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Sanjam Garg and Antigoni Polychroniadou
-
2014/843 ( PDF )
- Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
- Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng
-
2014/842 ( PDF )
- A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
- Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
-
2014/841 ( PDF )
- Explicit Non-malleable Codes Resistant to Permutations and Perturbations
- Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
-
2014/840 ( PDF )
- Constrained PRFs for Unbounded Inputs
- Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
-
2014/839 ( PDF )
- A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
- Koji Nuida and Naoto Itakura and Kaoru Kurosawa
-
2014/838 ( PDF )
- SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
- Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan
-
2014/837 ( PDF )
- True Random Number Generators Secure in a Changing Environment: Improved Security Bounds
- Maciej Skorski
-
2014/836 ( PDF )
- A Tight Transformation between HILL and Metric Conditional Pseudoentropy
- Maciej Skorski
-
2014/835 ( PDF )
- Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
- David Galindo and Johann Großschädl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek
-
2014/834 ( PDF )
- Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
- Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman
-
2014/833 ( PDF )
- Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability
- Essam Ghadafi
-
2014/832 ( PDF )
- Requirements for Standard Elliptic Curves
- Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
-
2014/831 ( PDF )
- Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
- Jérémy Jean and Ivica Nikolić and Thomas Peyrin
-
2014/830 ( PDF )
- Adaptively Secure UC Constant Round Multi-Party Computation
- Ivan Damgård and Antigoni Polychroniadou and Vanishree Rao
-
2014/829 ( PDF )
- Additively Homomorphic UC commitments with Optimal Amortized Overhead
- Ignacio Cascudo and Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti
-
2014/828 ( PDF )
- Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
- Zhengjun Cao and Zhenfu Cao and Lihua Liu
-
2014/827 ( PDF )
- Interactive Coding for Interactive Proofs
- Yevgeniy Dodis and Allison Bishop Lewko
-
2014/826 ( PDF )
- Learning with Errors in the Exponent
- Ozgur Dagdelen and Sebastian Gajek and Florian Gopfert
-
2014/825 ( -- withdrawn -- )
- Towards Optimal Bounds for Implicit Factorization Problem
- Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin
-
2014/824 ( PDF )
- Accountable Tracing Signatures
- Markulf Kohlweiss and Ian Miers
-
2014/823 ( PDF )
- On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
- Rafael Dowsley and Anderson C. A. Nascimento
-
2014/822 ( PDF )
- Ballot secrecy with malicious bulletin boards
- David Bernhard and Ben Smyth
-
2014/821 ( PDF )
- Non-malleable Reductions and Applications
- Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski
-
2014/820 ( PDF )
- Operational Signature Schemes
- Michael Backes and Ozgur Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schröder
-
2014/819 ( PDF )
- Riding on Asymmetry: Efficient ABE for Branching Programs
- Sergey Gorbunov and Dhinakaran Vinayagamurthy
-
2014/818 ( -- withdrawn -- )
- Circulant Matrices and Differential Privacy
- Jalaj Upadhyay
-
2014/817 ( PDF )
- Optimized Karatsuba Squaring on 8-bit AVR Processors
- Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
-
2014/816 ( PDF )
- FHEW: Bootstrapping Homomorphic Encryption in less than a second
- Léo Ducas and Daniele Micciancio
-
2014/815 ( PDF )
- A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves
- Palash Sarkar and Shashank Singh
-
2014/814 ( PDF )
- Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing
- Lisa Bromberg and Vladimir Shpilrain and Alina Vdovina
-
2014/813 ( PDF )
- Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
- Dario Catalano and Dario Fiore
-
2014/812 ( PDF )
- Search-and-compute on Encrypted Data
- Jung Hee Cheon and Miran Kim and Myungsun Kim
-
2014/811 ( PDF )
- A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
- Jean-Charles Faugere and Danilo Gligoroski and Ludovic Perret and Simona Samardjiska and Enrico Thomae
-
2014/810 ( PDF )
- Simulation-Based Secure Functional Encryption in the Random Oracle Model
- Vincenzo Iovino and Karol Zebrowski
-
2014/809 ( PDF )
- Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
- Ignacio Cascudo and Ivan Damgård and Oriol Farràs and Samuel Ranellucci
-
2014/808 ( PDF )
- Online/Off-line Ring Signature Scheme with Provable Security
- Jayaprakash Kar
-
2014/807 ( PDF )
- Leakage-resilient non-malleable codes
- Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
-
2014/806 ( PDF )
- Summation polynomial algorithms for elliptic curves in characteristic two
- Steven D. Galbraith and Shishay W. Gebregiyorgis
-
2014/805 ( PDF )
- Dual-System Simulation-Soundness with Applications to UC-PAKE and More
- Charanjit S. Jutla and Arnab Roy
-
2014/804 ( PDF )
- Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
- Jacob Alperin-Sheriff
-
2014/803 ( PDF )
- A Decentralized Public Key Infrastructure with Identity Retention
- Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
-
2014/802 ( PDF )
- Physical Characterization of Arbiter PUFs
- Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
-
2014/801 ( PDF )
- Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties
- Georgi Ivanov and Nikolay Nikolov and Svetla Nikova
-
2014/800 ( PDF )
- Efficient Pairings and ECC for Embedded Systems
- Thomas Unterluggauer and Erich Wenger
-
2014/799 ( PDF )
- Verifiable Random Functions from Weaker Assumptions
- Tibor Jager
-
2014/798 ( PDF )
- Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
- Michael Clear and Ciarán McGoldrick
-
2014/797 ( PDF )
- Tightly-Secure Authenticated Key Exchange
- Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li
-
2014/796 ( PDF )
- Distributed Cryptography Based on the Proofs of Work
- Marcin Andrychowicz and Stefan Dziembowski
-
2014/795 ( PDF )
- SPHINCS: practical stateless hash-based signatures
- Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Michael Schneider and Peter Schwabe and Zooko Wilcox-O'Hearn
-
2014/794 ( PDF )
- Efficient Identity-Based Encryption over NTRU Lattices
- Léo Ducas and Vadim Lyubashevsky and Thomas Prest
-
2014/793 ( PDF )
- Robust Authenticated-Encryption: AEZ and the Problem that it Solves
- Viet Tung Hoang and Ted Krovetz and Phillip Rogaway
-
2014/792 ( PDF )
- General Overview of the First-Round CAESAR Candidates for Authenticated Encryption
- {Farzaneh Abed, Christian Forler, Stefan Lucks
-
2014/791 ( PDF )
- Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof
- Dongdai Lin and Yujuan Quan and Jian Weng and Jun Yan
-
2014/790 ( PDF )
- Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
- Sarani Bhattacharya and Debdeep Mukhopadhyay
-
2014/789 ( PDF )
- Statistical Properties of the Square Map Modulo a Power of Two
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
-
2014/788 ( PDF )
- Tuning GaussSieve for Speed
- Robert Fitzpatrick and Christian Bischof and Johannes Buchmann and Ozgur Dagdelen and Florian Gopfert and Artur Mariano and Bo-Yin Yang
-
2014/787 ( PDF )
- Another Tor is possible
- Amadou Moctar Kane
-
2014/786 ( PDF )
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Chun Guo and Dongdai Lin
-
2014/785 ( PDF )
- Divisible E-Cash Made Practical
- Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
-
2014/784 ( PDF )
- Weak Instances of PLWE
- Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter
-
2014/783 ( PDF )
- Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
- Raghavan Kumar and Philipp Jovanovic and Wayne Burleson and Ilia Polian
-
2014/782 ( PDF )
- Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis
- Raghavan Kumar and Philipp Jovanovic and Ilia Polian
-
2014/781 ( PDF )
- Tally-based simple decoders for traitor tracing and group testing
- Boris Skoric
-
2014/780 ( PDF )
- Deterministic Public-Key Encryption under Continual Leakage
- Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters
-
2014/779 ( PDF )
- Implementing Cryptographic Program Obfuscation
- Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
-
2014/778 ( PDF )
- Anonymous IBE from Quadratic Residuosity with Improved Performance
- Michael Clear and Hitesh Tewari and Ciarán McGoldrick
-
2014/777 ( PDF )
- (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces
- Koji Nuida and Kaoru Kurosawa
-
2014/776 ( PDF )
- How to Obfuscate Programs Directly
- Joe Zimmerman
-
2014/775 ( PDF )
- Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation
- Artur Mariano, Shahar Timnat and Christian Bischof
-
2014/774 ( PDF )
- Automated Analysis and Synthesis of Block-Cipher Modes of Operation
- Alex J. Malozemoff and Jonathan Katz and Matthew D. Green
-
2014/773 ( PDF )
- Obfuscating Low-Rank Matrix Branching Programs
- Amit Sahai and Mark Zhandry
-
2014/772 ( PDF )
- Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps
- Nuttapong Attrapadung
-
2014/771 ( PDF )
- Succinct Randomized Encodings and their Applications
- Nir Bitansky and Sanjam Garg and Sidharth Telang
-
2014/770 ( PDF )
- AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation
- Takaaki Mizuki and Yu-ichi Hayashi
-
2014/769 ( PDF )
- Indistinguishability Obfuscation of Iterated Circuits and RAM Programs
- Ran Canetti and Justin Holmgren and Abhishek Jain and Vinod Vaikuntanathan
-
2014/768 ( PDF )
- Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation
- Han Jiang and Xiaochao Wei and Chuan Zhao and Qiuliang Xu
-
2014/767 ( PDF )
- Algebraic Attacks on Human Identification Protocols
- Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk
-
2014/766 ( PDF )
- Succinct Garbling Schemes and Applications
- Huijia Lin and Rafael Pass
-
2014/765 ( PDF )
- The Bitcoin Backbone Protocol: Analysis and Applications
- Juan Garay and Aggelos Kiayias and Nikos Leonardos
-
2014/764 ( PDF )
- One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
- Jens Groth and Markulf Kohlweiss
-
2014/763 ( PDF )
- On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
- Arthur Gervais and Ghassan O. Karame and Damian Gruber and Srdjan Capkun
-
2014/762 ( PDF )
- Access Control in Publicly Verifiable Outsourced Computation
- James Alderman and Christian Janson and Carlos Cid and Jason Crampton
-
2014/761 ( PDF )
- Cryptanalysis of Reduced-round SIMON32 and SIMON48
- Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo
-
2014/760 ( PDF )
- Montgomery Modular Multiplication on ARM-NEON Revisited
- Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, and Howon Kim
-
2014/759 ( PDF )
- How to Efficiently Evaluate RAM Programs with Malicious Security
- Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
-
2014/758 ( PDF )
- Cryptographic Reverse Firewalls
- Ilya Mironov and Noah Stephens-Davidowitz
-
2014/757 ( PDF )
- Adaptively Secure Broadcast Encryption with Small System Parameters
- Mark Zhandry
-
2014/756 ( PDF )
- Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
- Samee Zahur and Mike Rosulek and David Evans
-
2014/755 ( PDF )
- Computing Mod Without Mod
- Mark A. Will and Ryan K. L. Ko
-
2014/754 ( PDF )
- Bilinear Entropy Expansion from the Decisional Linear Assumption
- Lucas Kowalczyk and Allison Bishop Lewko
-
2014/753 ( PDF )
- Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
- Alonso Gonzalez-Ulloa and Alejandro Hevia
-
2014/752 ( PDF )
- Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
- Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci
-
2014/751 ( PDF )
- Higher-Order Threshold Implementations
- Begül Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
-
2014/750 ( PDF )
- Hardware Trojan Horses in Cryptographic IP Cores
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage
-
2014/749 ( PDF )
- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM
- Daniel E. Holcomb and Kevin Fu
-
2014/748 ( PDF )
- Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
- Mehmet Sabır Kiraz and Osmanbey Uzunkol
-
2014/747 ( PDF )
- Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
- Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
-
2014/746 ( PDF )
- Decoy-based information security
- Vladimir Shpilrain
-
2014/745 ( PDF )
- Universal Signature Aggregators
- Susan Hohenberger and Venkata Koppula and Brent Waters
-
2014/744 ( PDF )
- Sieving for shortest vectors in lattices using angular locality-sensitive hashing
- Thijs Laarhoven
-
2014/743 ( PDF )
- Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
- Benoit Libert and Marc Joye and Moti Yung and Thomas Peters
-
2014/742 ( PDF )
- A survey of Fault Attacks in Pairing Based Cryptography
- Nadia El Mrabet and Jacques J.A. Fournier and Louis Goubin and Ronan Lashermes
-
2014/741 ( PDF )
- Eliminating Leakage in Reverse Fuzzy Extractors
- André Schaller, Boris Skoric, Stefan Katzenbeisser
-
2014/740 ( -- withdrawn -- )
- Non-existence of [n; 5] type Generalized Bent function.
- Shashi Kant Pandey and P.R Mishra and B.K Dass
-
2014/739 ( PDF )
- SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers
- Smile Markovski and Aleksandra Mileva and Vesna Dimitrova
-
2014/738 ( PDF )
- A Very Compact FPGA Implementation of LED and PHOTON
- N. Nalla Anandakumar and Thomas Peyrin and Axel Poschmann
-
2014/737 ( -- withdrawn -- )
- Design and analysis of one-round certificateless authenticated group key agreement protocol with bilinear pairings
- SK Hafizul Islam and Abhishek Singh
-
2014/736 ( PDF )
- Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
- Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
-
2014/735 ( PDF )
- Dealer-Leakage Resilient Verifiable Secret Sharing
- Ruxandra F. Olimid
-
2014/734 ( PDF )
- S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
- Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedra and Dominik Sisejkovic
-
2014/733 ( PDF )
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann
-
2014/732 ( PDF )
- Resizable Tree-Based Oblivious RAM
- Tarik Moataz and Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
-
2014/731 ( PDF )
- Secure modular password authentication for the web using channel bindings
- Mark Manulis and Douglas Stebila and Nick Denham
-
2014/730 ( PDF )
- Differentially Private Linear Algebra in the Streaming Model
- Jalaj Upadhyay
-
2014/729 ( PDF )
- Faster Binary-Field Multiplication and Faster Binary-Field MACs
- Daniel J. Bernstein and Tung Chou
-
2014/728 ( PDF )
- Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
- Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson
-
2014/727 ( PDF )
- The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves
- Benjamin Smith
-
2014/726 ( -- withdrawn -- )
- CIARP: A RISC Processor For Cryptography Applications
- Nima Karimpour Darav and Reza Ebrahimi Atani and Erfan Aghaei and Ahmad Tahmasivand and Mahsa Rahmani and Mina Moazzam Jazi
-
2014/725 ( PDF )
- Efficient Software Implementation of Ring-LWE Encryption
- Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
-
2014/724 ( PDF )
- Protecting Encrypted Cookies from Compression Side-Channel Attacks
- Janaka Alawatugoda and Douglas Stebila and Colin Boyd
-
2014/723 ( PDF )
- Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
- Yalin Chen and Jue-Sam Chou*
-
2014/722 ( PDF )
- Differential Cryptanalysis of SipHash
- Christoph Dobraunig and Florian Mendel and Martin Schläffer
-
2014/721 ( PDF )
- On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers
- Zhengjun Cao and Zhenfu Cao
-
2014/720 ( PDF )
- Adaptively Secure Constrained Pseudorandom Functions
- Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters
-
2014/719 ( PDF )
- Bivariate Polynomials Modulo Composites and their Applications
- Dan Boneh and Henry Corrigan-Gibbs
-
2014/718 ( PDF )
- Square Span Programs with Applications to Succinct NIZK Arguments
- George Danezis and Cedric Fournet and Jens Groth and Markulf Kohlweiss
-
2014/717 ( PDF )
- How to Split a Secret into Unknown Shares
- Ruxandra F. Olimid
-
2014/716 ( PDF )
- Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
- Amir Moradi
-
2014/715 ( PDF )
- Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment'
- Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
-
2014/714 ( PDF )
- A comprehensive empirical comparison of parallel ListSieve and GaussSieve
- Artur Mariano and Ozgur Dagdelen and Christian Bischof
-
2014/713 ( PDF )
- Co-Location-Resistant Clouds
- Yossi Azar and Seny Kamara and Ishai Menache and Mariana Raykova and Bruce Shepherd
-
2014/712 ( PDF )
- Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
- Mohammad Wazid
-
2014/711 ( PDF )
- New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$
- Masao KASAHARA
-
2014/710 ( PDF )
- An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
- Yehuda Lindell
-
2014/709 ( PDF )
- A Note on Quantum Security for Post-Quantum Cryptography
- Fang Song
-
2014/708 ( PDF )
- Formal Treatment of Privacy-Enhancing Credential Systems
- Jan Camenisch and Stephan Krenn and Anja Lehmann and Gert Læssøe Mikkelsen and Gregory Neven and Michael Østergaard Pedersen
-
2014/707 ( PDF )
- Analysis Of Variance and CPA in SCA
- Sebastien Tiran and Guillaume Reymond and Jean-Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles Ducharme and Philippe Maurine
-
2014/706 ( PDF )
- The Feasibility of Outsourced Database Search in the Plain Model
- Carmit Hazay and Hila Zarosim
-
2014/705 ( PDF )
- Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
- Christian Hanser and Daniel Slamanig
-
2014/704 ( PDF )
- A 128-bit Block Cipher Based on Three Group Arithmetics
- Shenghui Su and Shuwang Lü and Daqiang Dong
-
2014/703 ( PDF )
- Linearity Measures for MQ Cryptography
- Simona Samardjiska and Danilo Gligoroski
-
2014/702 ( PDF )
- Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques
- Benoit Feix and Hugues Thiebeauld
-
2014/701 ( -- withdrawn -- )
- A Practical Iterative Side Channel Cube Attack on AES-128/256
- Erfan Aghaee and Majid Rahimi and Hamed Yusefi
-
2014/700 ( PDF )
- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
- Ahto Buldas and Risto Laanoja and Peeter Laud and Ahto Truu
-
2014/699 ( PDF )
- Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
- Christina Boura and María Naya-Plasencia and Valentin Suder
-
2014/698 ( PDF )
- HIMMO - A lightweight collusion-resistant key predistribution scheme
- Oscar Garcia-Morchon and Domingo Gomez-Perez and Jaime Gutierrez and Ronald Rietman and Berry Schoenmakers and Ludo Tolhuizen
-
2014/697 ( PDF )
- A Fully Homomorphic Encryption Scheme with Better Key Size
- Zhigang Chen, Jian Wang, ZengNian Zhang , Xinxia Song
-
2014/696 ( PDF )
- Security Proofs for the BLT Signature Scheme
- Ahto Buldas and Risto Laanoja and Ahto Truu
-
2014/695 ( PDF )
- Proof of Proximity of Knowledge
- Serge Vaudenay
-
2014/694 ( PDF )
- Malicious Hashing: Eve's Variant of SHA-1
- Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schläffer
-
2014/693 ( PDF )
- Optimal Proximity Proofs
- Ioana Boureanu and Serge Vaudenay
-
2014/692 ( PDF )
- Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead
- Enrique Larraia
-
2014/691 ( PDF )
- Integration of hardware tokens in the Idemix library
- Antonio de la Piedra
-
2014/690 ( PDF )
- Efficient Interval Check in the Presence of Malicious Adversaries
- Genqiang Wu and Yeping He and Yi Lu and Liping Ding
-
2014/689 ( PDF )
- Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
- Ahto Buldas and Risto Laanoja and Ahto Truu
-
2014/688 ( PDF )
- Analytic Toolbox for White-Box Implementations: Limitation and Perspectives
- Chung Hun Baek and Jung Hee Cheon and Hyunsook Hong
-
2014/687 ( PDF )
- Reducing the Complexity of Normal Basis Multiplication
- Omer Egecioglu and Cetin Kaya Koc
-
2014/686 ( PDF )
- A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications
- Ming Li and Dongdai Lin
-
2014/685 ( PDF )
- Bit Security of the CDH Problems over Finite Field
- Mingqiang Wang and Tao Zhan and Haibin Zhang
-
2014/684 ( PDF )
- Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
- Antonio de la Piedra and Jaap-Henk Hoepman and Pim Vullers
-
2014/683 ( PDF )
- Error-Tolerant Algebraic Side-Channel Attacks Using BEE
- Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao
-
2014/682 ( PDF )
- A Unified Formalism for Physical Attacks
- Hélène Le Bouder, Ronan Lashermes , Yanis Linge , Bruno Robisson and Assia Tria
-
2014/681 ( PDF )
- Improved Linear Cryptanalysis of Reduced-round SIMON
- Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, and Martin M. Lauridsen
-
2014/680 ( PDF )
- Remarks on the Cryptographic Primitive of Attribute-based Encryption
- Zhengjun Cao and Lihua Liu
-
2014/679 ( PDF )
- A Note on the Bellare-Rivest Protocol for Translucent Cryptography
- Zhengjun Cao and Lihua Liu
-
2014/678 ( PDF )
- A Counterexample to the Chain Rule for Conditional HILL Entropy
- Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia and Daniel Wichs
-
2014/677 ( PDF )
- Attacks in Stream Ciphers: A Survey
- Gustavo Banegas
-
2014/676 ( PDF )
- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
- Zhen Liu and Zhenfu Cao and Duncan S. Wong
-
2014/675 ( PDF )
- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
- Jian Guo and Jérémy Jean and Gaëtan Leurent and Thomas Peyrin and Lei Wang
-
2014/674 ( PDF )
- Efficient RAM and control flow in verifiable outsourced computation
- Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
-
2014/673 ( PDF )
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
-
2014/672 ( PDF )
- Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
- Xiao Wang and Hubert Chan and Elaine Shi
-
2014/671 ( PDF )
- SCORAM: Oblivious RAM for Secure Computation
- Xiao Shaun Wang and Yan Huang and T-H. Hubert Chan and abhi shelat and Elaine Shi
-
2014/670 ( PDF )
- DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
- Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
-
2014/669 ( PDF )
- On the Communication Complexity of Secure Function Evaluation with Long Output
- Pavel Hubacek and Daniel Wichs
-
2014/668 ( PDF )
- Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation
- Ran Cohen and Yehuda Lindell
-
2014/667 ( PDF )
- Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings
- Yehuda Lindell and Ben Riva
-
2014/666 ( PDF )
- Fully Secure Functional Encryption without Obfuscation
- Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
-
2014/665 ( PDF )
- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
- Julien Bringer and Claude Carlet and Hervé Chabanne and Sylvain Guilley and Houssem Maghrebi
-
2014/664 ( PDF )
- On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves
- William R. Trost and Guangwu Xu
-
2014/663 ( PDF )
- Locally Decodable and Updatable Non-Malleable Codes and Their Applications
- Dana Dachman-Soled and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
-
2014/662 ( PDF )
- Outsourced Pattern Matching
- Sebastian Faust and Carmit Hazay and Daniele Venturi
-
2014/661 ( PDF )
- One-Round Deniable Key Exchange with Perfect Forward Security
- Weiqiang Wen and Libin Wang and Min Xie
-
2014/660 ( PDF )
- Interactive Proofs under Continual Memory Leakage
- Prabhanjan Ananth and Vipul Goyal and Omkant Pandey
-
2014/659 ( PDF )
- On the Primitivity of Trinomials over Small Finite Fields
- YUjuan Li and Jinhua Zhao and Huaifu Wang
-
2014/658 ( PDF )
- A Class of FSRs and Their Adjacency Graphs
- Ming Li and Dongdai Lin
-
2014/657 ( PDF )
- On the cycle decomposition of the WG-NLFSR
- YUjuan Li and Wnehua Shen and Huaifu Wang and Peipei Zhou
-
2014/656 ( PDF )
- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
- Itai Dinur
-
2014/655 ( PDF )
- Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
- Bo Zhu and Xinxin Fan and Guang Gong
-
2014/654 ( PDF )
- Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
- Prakash Dey and Abhishek Chakraborty and Avishek Adhikari and Debdeep Mukhopadhyay
-
2014/653 ( PDF )
- Mersenne factorization factory
- Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra
-
2014/652 ( PDF )
- A Dynamic Cube Attack on $105$ round Grain v1
- Subhadeep Banik
-
2014/651 ( PDF )
- A note on CCA2-protected McEliece Cryptosystem with a systematic public key
- Pavol Zajac
-
2014/650 ( PDF )
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk
-
2014/649 ( PDF )
- FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
- Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar
-
2014/648 ( PDF )
- An Equivalent Condition on the Switching Construction of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function
- Xi Chen, Yazhi Deng, Min Zhu and Longjiang Qu
-
2014/647 ( PDF )
- Universally Composable Secure Group Communication
- Youliang Tian and Changgen Peng
-
2014/646 ( PDF )
- High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems
- Donald Donglong Chen and Nele Mentens and Frederik Vercauteren and Sujoy Sinha Roy and Ray C.C. Cheung and Derek Pao and Ingrid Verbauwhede
-
2014/645 ( PDF )
- Graph-Induced Multilinear Maps from Lattices
- Craig Gentry and Sergey Gorbunov and Shai Halevi
-
2014/644 ( PDF )
- Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
- Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai
-
2014/643 ( PDF )
- On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'
- Ashok Kumar Das
-
2014/642 ( PDF )
- Balanced permutations Even-Mansour ciphers
- Shoni Gilboa and Shay Gueron
-
2014/641 ( PDF )
- The Multiple Number Field Sieve with Conjugation Method
- Cécile Pierrot
-
2014/640 ( PDF )
- Revocation in Publicly Verifiable Outsourced Computation
- James Alderman and Christian Janson and Carlos Cid and Jason Crampton
-
2014/639 ( PDF )
- Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines
- Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
-
2014/638 ( PDF )
- Substring-Searchable Symmetric Encryption
- Melissa Chase and Emily Shen
-
2014/637 ( PDF )
- Generic Hardness of the Multiple Discrete Logarithm Problem
- Aaram Yun
-
2014/636 ( PDF )
- Improved Timing Attacks on ECDSA
- Vikram Singh
-
2014/635 ( PDF )
- Type 2 Structure-Preserving Signature Schemes Revisited
- Sanjit Chatterjee and Alfred Menezes
-
2014/634 ( PDF )
- Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP
- Hongda Li, Qihua Niu, Guifang Huang
-
2014/633 ( PDF )
- Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity
- Ran Canetti and Abhishek Jain and Omer Paneth
-
2014/632 ( PDF )
- Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge
- Esha Ghosh and Olga Ohrimenko and Roberto Tamassia
-
2014/631 ( PDF )
- Zipf’s Law in Passwords
- Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
-
2014/630 ( PDF )
- Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation
- Peeter Laud
-
2014/629 ( PDF )
- Two-factor authentication for the Bitcoin protocol
- Christopher Mann and Daniel Loebenberger
-
2014/628 ( PDF )
- An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency
- Partha Sarathi Roy and Avishek Adhikari and Rui Xu and Kirill Morozov and Kouichi Sakurai
-
2014/627 ( PDF )
- On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
- Debrup Chakraborty and Palash Sarkar
-
2014/626 ( PDF )
- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
- Daniel Genkin and Itamar Pipman and Eran Tromer
-
2014/625 ( PDF )
- Pretty Understandable Democracy 2.0
- Stephan Neumann and Christian Feier and Perihan Sahin and Sebastian Fach
-
2014/624 ( PDF )
- KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
- Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao
-
2014/623 ( PDF )
- Privacy with Imperfect Randomness
- Yevgeniy Dodis and Yanqing Yao
-
2014/622 ( PDF )
- Fully Secure Attribute Based Encryption from Multilinear Maps
- Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
-
2014/621 ( PDF )
- (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
- Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi
-
2014/620 ( PDF )
- The M3dcrypt Password Hashing Function
- Isaiah Makwakwa
-
2014/619 ( PDF )
- THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER
- Mohammad Sadegh Nemati Nia, Ali Payandeh
-
2014/618 ( PDF )
- Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
- Florian Böhl and Simon Greiner and Patrik Scheidecker
-
2014/617 ( PDF )
- ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
- Michael Backes and Manuel Barbosa and Dario Fiore and Raphael M. Reischuk
-
2014/616 ( PDF )
- Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
- Zhen Liu and Duncan S. Wong
-
2014/615 ( PDF )
- Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality
- Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ostrovsky and Vassilis Zikas
-
2014/614 ( PDF )
- Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version)
- Zhiquan Lv and Cheng Hong and Min Zhang and Dengguo Feng
-
2014/613 ( PDF )
- A Security Analysis of the Composition of ChaCha20 and Poly1305
- Gordon Procter
-
2014/612 ( PDF )
- Attribute-Based Encryption Optimized for Cloud Computing
- Máté Horváth
-
2014/611 ( PDF )
- Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation
- Shlomi Dolev and Niv Gilboa and Ximing Li
-
2014/610 ( PDF )
- Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation
- Craig Gentry
-
2014/609 ( PDF )
- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/608 ( PDF )
- Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps
- Ferucio Laurentiu Tiplea and Constantin Catalin Dragan
-
2014/607 ( PDF )
- Adding Controllable Linkability to Pairing-Based Group Signatures For Free
- Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer
-
2014/606 ( PDF )
- A Multi-Function Provable Data Possession Scheme in Cloud Computing
- Xiaojun Yu and Qiaoyan Wen
-
2014/605 ( PDF )
- On the Possibilities and Limitations of Computational Fuzzy Extractors
- Kenji Yasunaga and Kosuke Yuzawa
-
2014/604 ( PDF )
- Private Web Search with Constant Round Efficiency
- Bolam Kang and Sung Cheol Goh and Myungsun Kim
-
2014/603 ( PDF )
- Recursive Trees for Practical ORAM
- Tarik Moataz and Erik-Oliver Blass and Guevara Noubir
-
2014/602 ( PDF )
- A Cryptographic Study of Tokenization Systems
- Sandra Diaz-Santiago and Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
-
2014/601 ( PDF )
- Adaptive versus Static Security in the UC Model
- Ivan Damgård and Jesper Buus Nielsen
-
2014/600 ( -- withdrawn -- )
- DTKI: a new formalized PKI with no trusted parties
- Jiangshan Yu and Vincent Cheval and Mark Ryan
-
2014/599 ( PDF )
- Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
- Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila
-
2014/598 ( PDF )
- Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
- Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi
-
2014/597 ( PDF )
- Invisible Adaptive Attacks
- Jesper Buus Nielsen and Mario Strefler
-
2014/596 ( PDF )
- Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification
- Marina Blanton and Siddharth Saraph
-
2014/595 ( PDF )
- Scalable Zero Knowledge via Cycles of Elliptic Curves
- Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
-
2014/594 ( PDF )
- Oblivious Parallel RAM and Applications
- Elette Boyle and Kai-Min Chung and Rafael Pass
-
2014/593 ( PDF )
- Improved Exponential-time Algorithms for Inhomogeneous-SIS
- Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield
-
2014/592 ( PDF )
- Multiprecision multiplication on AVR revisited
- Michael Hutter and Peter Schwabe
-
2014/591 ( PDF )
- Compact and Side Channel Secure Discrete Gaussian Sampling
- Sujoy Sinha Roy and Oscar Reparaz and Frederik Vercauteren and Ingrid Verbauwhede
-
2014/590 ( PDF )
- Automated algebraic analysis of structure-preserving signature schemes
- Joeri de Ruiter
-
2014/589 ( PDF )
- Authenticated Key Exchange from Ideal Lattices
- Jiang Zhang and Zhenfeng Zhang and Jintai Ding and Michael Snook and Özgür Dagdelen
-
2014/588 ( PDF )
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Brent Waters
-
2014/587 ( PDF )
- Non-interactive zero-knowledge proofs in the quantum random oracle model
- Dominique Unruh
-
2014/586 ( PDF )
- An Algebraic Approach to Non-Malleability
- Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald
-
2014/585 ( PDF )
- The SPEKE Protocol Revisited
- Feng Hao and Siamak F. Shahandashti
-
2014/584 ( PDF )
- Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2014/583 ( PDF )
- Template Attacks Based On Priori Knowledge
- Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
-
2014/582 ( PDF )
- NSEC5: Provably Preventing DNSSEC Zone Enumeration
- Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv
-
2014/581 ( PDF )
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Olivier Blazy and Eike Kiltz and Jiaxin Pan
-
2014/580 ( PDF )
- The Hunting of the SNARK
- Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer
-
2014/579 ( -- withdrawn -- )
- Scan Based Side Channel Attack on Grain v1
- Sonu Kumar Jha
-
2014/578 ( PDF )
- The Exact PRF-Security of NMAC and HMAC
- Peter Gaži and Krzysztof Pietrzak and Michal Rybár
-
2014/577 ( PDF )
- Reducing Communication Overhead of the Subset Difference Scheme
- Sanjay Bhattacherjee and Palash Sarkar
-
2014/576 ( PDF )
- Vernam Two
- Dan P. Milleville
-
2014/575 ( PDF )
- Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
- Markku-Juhani O. Saarinen
-
2014/574 ( PDF )
- Security Analysis of Multilinear Maps over the Integers
- Hyung Tae Lee and Jae Hong Seo
-
2014/573 ( PDF )
- A new public key system based on Polynomials over finite fields GF(2)
- Gurgen Khachatrian
-
2014/572 ( PDF )
- On the Optimality of Differential Fault Analyses on CLEFIA
- Juliane Krämer and Anke Stüber and Ágnes Kiss
-
2014/571 ( PDF )
- How to manipulate curve standards: a white paper for the black hat
- Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
-
2014/570 ( PDF )
- Deja Q: Using Dual Systems to Revisit q-Type Assumptions
- Melissa Chase and Sarah Meiklejohn
-
2014/569 ( PDF )
- Fast Lattice Point Enumeration with Minimal Overhead
- Daniele Micciancio and Michael Walter
-
2014/568 ( PDF )
- New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC
- Masao KASAHARA
-
2014/567 ( -- withdrawn -- )
- Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation
- Hiroaki Anada and Seiko Arita and Kouichi Sakurai
-
2014/566 ( PDF )
- Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
- Daniel Augot and Matthieu Finiasz
-
2014/565 ( PDF )
- Kangaroos in Side-Channel Attacks
- Tanja Lange and Christine van Vredendaal and Marnix Wakker
-
2014/564 ( -- withdrawn -- )
- A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
- Massoud Hadian Dehkordi and Reza Ghasemi
-
2014/563 ( PDF )
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Aleksandar Kircanski
-
2014/562 ( PDF )
- hHB: a Harder HB+ Protocol
- Ka Ahmad Khoureich
-
2014/561 ( PDF )
- Performance Increasing Approaches For Binary Field Inversion
- Vladislav Kovtun and Maria Bulakh
-
2014/560 ( PDF )
- Towards Forward Security Properties for PEKS and IBE
- Qiang Tang
-
2014/559 ( PDF )
- Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
- Pablo Rauzy and Sylvain Guilley
-
2014/558 ( PDF )
- Double shielded Public Key Cryptosystems
- Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang
-
2014/557 ( PDF )
- Round-Efficient Black-Box Construction of Composable Multi-Party Computation
- Susumu Kiyoshima
-
2014/556 ( PDF )
- Securing Cloud Data in the New Attacker Model
- Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
-
2014/555 ( PDF )
- General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
- Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges
-
2014/554 ( PDF )
- On Virtual Grey Box Obfuscation for General Circuits
- Nir Bitansky and Ran Canetti and Yael Tauman-Kalai and Omer Paneth
-
2014/553 ( PDF )
- A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
- Ran Canetti and Asaf Cohen and Yehuda Lindell
-
2014/552 ( PDF )
- Efficient Record-Level Keyless Signatures for Audit Logs
- Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards
-
2014/551 ( PDF )
- Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
- Daniel Augot and Pierre-Alain Fouque and Pierre Karpman
-
2014/550 ( PDF )
- Function-Private Functional Encryption in the Private-Key Setting
- Zvika Brakerski and Gil Segev
-
2014/549 ( PDF )
- New Attacks on the RSA Cryptosystem
- Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig
-
2014/548 ( PDF )
- Implicit factorization of unbalanced RSA moduli
- Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin
-
2014/547 ( PDF )
- Authentication Codes Based on Resilient Boolean Maps
- Juan Carlos Ku-Cauich and Guillermo Morales-Luna
-
2014/546 ( PDF )
- Anonymous and Publicly Linkable Reputation Systems
- Johannes Blömer and Jakob Juhnke and Christina Kolb
-
2014/545 ( PDF )
- Solving closest vector instances using an approximate shortest independent vectors oracle
- Chengliang Tian and Wei Wei and Dongdai Lin
-
2014/544 ( PDF )
- Secure Mutual Testing Strategy for Cryptographic SoCs
- Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede
-
2014/543 ( PDF )
- A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
- Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
-
2014/542 ( PDF )
- On the Multi-output Filtering Model and Its Applications
- Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu
-
2014/541 ( PDF )
- EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
- Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto Nagata and Takafumi Aoki
-
2014/540 ( PDF )
- Optimized Architecture for AES
- Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey
-
2014/539 ( PDF )
- Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption
- Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang
-
2014/538 ( -- withdrawn -- )
- A Secure Cloud-based NFC Mobile Payment Protocol
- pardis pourghomi and muhammad qasim saeed and george ghinea
-
2014/537 ( PDF )
- Constrained Verifiable Random Functions
- Georg Fuchsbauer
-
2014/536 ( PDF )
- On Decomposition of an NFSR into a Cascade Connection of Two Smaller
- Tian Tian and Wen-Feng Qi
-
2014/535 ( PDF )
- On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
- Massimo Chenal and Qiang Tang
-
2014/534 ( PDF )
- Differential Power Analysis of a McEliece Cryptosystem
- Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
-
2014/533 ( PDF )
- Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions
- Jaiganesh Balasundaram
-
2014/532 ( -- withdrawn -- )
- On the Pitfalls of using Arbiter-PUFs as Building Blocks
- Georg T. Becker
-
2014/531 ( PDF )
- Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
- Paolo Palmieri and Luca Calderoni and Dario Maio
-
2014/530 ( PDF )
- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
- Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap
-
2014/529 ( PDF )
- Leakage-Resilient Signatures with Graceful Degradation
- Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
-
2014/528 ( PDF )
- Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups
- Xiaofeng Wang and Chen Xu and Guo Li and Hanling Lin
-
2014/527 ( PDF )
- Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
- Annelie Heuser and Olivier Rioul and Sylvain Guilley
-
2014/526 ( PDF )
- Curve41417: Karatsuba revisited
- Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
-
2014/525 ( PDF )
- Differential Analysis on Block Cipher PRIDE
- Jingyuan Zhao and Xiaoyun Wang and Meiqin Wang and Xiaoyang Dong
-
2014/524 ( PDF )
- Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
- Chunming Tang and Yanfeng Qi
-
2014/523 ( PDF )
- Fully Secure and Fast Signing from Obfuscation
- Kim Ramchen and Brent Waters
-
2014/522 ( PDF )
- Constrained Pseudorandom Functions: Verifiable and Delegatable
- Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
-
2014/521 ( PDF )
- Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
- Susan Hohenberger and Venkata Koppula and Brent Waters
-
2014/520 ( PDF )
- Squares of Random Linear Codes
- Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Zémor
-
2014/519 ( PDF )
- Realizing Pico: Finally No More Passwords!
- Jens Hermans and Roel Peeters
-
2014/518 ( PDF )
- Cryptography from Compression Functions: The UCE Bridge to the ROM
- Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
-
2014/517 ( PDF )
- On the Connection between Leakage Tolerance and Adaptive Security
- Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
-
2014/516 ( PDF )
- On the Classification of Finite Boolean Functions up to Fairness
- Nikolaos Makriyannis
-
2014/515 ( -- withdrawn -- )
- Ideal Social Secret Sharing Using Birkhoff Interpolation Method
- Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian
-
2014/514 ( PDF )
- On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
- Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili
-
2014/513 ( PDF )
- RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
- Noboru Kunihiro and Junya Honda
-
2014/512 ( PDF )
- Rmind: a tool for cryptographically secure statistical analysis
- Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk
-
2014/511 ( PDF )
- Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
- Johannes Blömer and Gennadij Liske
-
2014/510 ( PDF )
- A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
- Pratish Datta and Dibyendu Roy and Sourav Mukhopadhyay
-
2014/509 ( PDF )
- Privacy preserving delegated word search in the cloud
- Kaoutar Elkhiyaoui and Melek Onen and Refik Molva
-
2014/508 ( PDF )
- Reversing Stealthy Dopant-Level Circuits
- Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino
-
2014/507 ( PDF )
- How to Generate and use Universal Samplers
- Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry
-
2014/506 ( PDF )
- Finding Roots in GF(p^n) with the Successive Resultant Algorithm
- Christophe Petit
-
2014/505 ( PDF )
- On the quaternion $\ell$-isogeny path problem
- David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
-
2014/504 ( PDF )
- A Provable Security Analysis of Intel's Secure Key RNG
- Thomas Shrimpton and R. Seth Terashima
-
2014/503 ( PDF )
- Efficient Hidden Vector Encryption with Constant-Size Ciphertext
- Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo
-
2014/502 ( PDF )
- What's the Gist? Privacy-Preserving Aggregation of User Profiles
- Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun
-
2014/501 ( PDF )
- WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time
- Markku--Juhani O. Saarinen and Billy Bob Brumley
-
2014/500 ( -- withdrawn -- )
- Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
- Can Xiang and Chunming Tang
-
2014/499 ( PDF )
- Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
- Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş
-
2014/498 ( PDF )
- Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix
- Souvik Kolay and Debdeep Mukhopadhyay
-
2014/497 ( PDF )
- NREPO:Normal Basis Recomputing with Permuted Operands
- Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin and Ramesh Karri
-
2014/496 ( PDF )
- Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo
-
2014/495 ( PDF )
- Improved Short Lattice Signatures in the Standard Model
- Léo Ducas and Daniele Micciancio
-
2014/494 ( PDF )
- Hardness of k-LWE and Applications in Traitor Tracing
- San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld
-
2014/493 ( PDF )
- Arithmetic on Abelian and Kummer Varieties
- David Lubicz and Damien Robert
-
2014/492 ( PDF )
- Fault attacks on pairing-based protocols revisited
- Sanjit Chatterjee and Koray Karabina and Alfred Menezes
-
2014/491 ( PDF )
- Bootstrappable Identity-Based Fully Homomorphic Encryption
- Michael Clear and Ciarán McGoldrick
-
2014/490 ( PDF )
- Universally Composable secure TNC protocol based on IF-T binding to TLS
- Shijun Zhao and Qianying Zhang and Yu Qin and Dengguo Feng
-
2014/489 ( PDF )
- A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge
- Dan Ding and Guizhen Zhu and Xiaoyun Wang
-
2014/488 ( PDF )
- Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
- Michel Abdalla and Fabrice Benhamouda and Alain Passelègue and Kenneth G. Paterson
-
2014/487 ( PDF )
- GGHLite: More Efficient Multilinear Maps from Ideal Lattices
- Adeline Langlois and Damien Stehle and Ron Steinfeld
-
2014/486 ( PDF )
- Binary Elligator Squared
- Diego F. Aranha and Pierre-Alain Fouque and Chen Qian and Mehdi Tibouchi and Jean-Christophe Zapalowicz
-
2014/485 ( PDF )
- An Improved Truncated Differential Cryptanalysis of KLEIN
- Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref
-
2014/484 ( PDF )
- Sealing the Leak on Classical NTRU Signatures
- Carlos Aguilar Melchor and Xavier Boyen and Jean-Christophe Deneuville and Philippe Gaborit
-
2014/483 ( PDF )
- Disjunctions for Hash Proof Systems: New Constructions and Applications
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/482 ( PDF )
- Differentially Private Data Aggregation with Optimal Utility
- Fabienne Eigner and Aniket Kate and Matteo Maffei and Francesca Pampaloni and Ivan Pryvalov
-
2014/481 ( PDF )
- Universally Composable Non-Interactive Key Exchange
- Eduarda S.V. Freire and Julia Hesse and Dennis Hofheinz
-
2014/480 ( PDF )
- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
- Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
-
2014/479 ( PDF )
- Even more practical secure logging: Tree-based Seekable Sequential Key Generators
- Giorgia Azzurra Marson and Bertram Poettering
-
2014/478 ( PDF )
- Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
- Benny Applebaum and Eyal Widder
-
2014/477 ( PDF )
- Relaxed Two-to-one Recoding Schemes
- Omkant Pandey and Kim Ramchen and Brent Waters
-
2014/476 ( PDF )
- Simon's Circuit
- Paul Baecher
-
2014/475 ( PDF )
- A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
- Imran Erguler
-
2014/474 ( PDF )
- Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
- Alex Biryukov and Charles Bouillaguet and Dmitry Khovratovich
-
2014/473 ( -- withdrawn -- )
- An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
- Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
-
2014/472 ( PDF )
- How to Watermark Cryptographic Functions
- Ryo Nishimaki
-
2014/471 ( -- withdrawn -- )
- Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
- Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
-
2014/470 ( PDF )
- PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
- Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Au
-
2014/469 ( PDF )
- Homomorphic Signatures with Efficient Verification for Polynomial Functions
- Dario Catalano, Dario Fiore, and Bogdan Warinschi
-
2014/468 ( PDF )
- Privacy-Preserving Auditing for Attribute-Based Credentials
- Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
-
2014/467 ( PDF )
- Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
- Daniel Demmler and Thomas Schneider and Michael Zohner
-
2014/466 ( PDF )
- On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.
- Samir Bouftass and Abdelhak Azhari
-
2014/465 ( PDF )
- Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
- Jie Chen and Hoeteck Wee
-
2014/464 ( PDF )
- Providing Root of Trust for ARM TrustZone using On-Chip SRAM
- Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng
-
2014/463 ( PDF )
- (Leveled) Fully Homomorphic Signatures from Lattices
- Sergey Gorbunov and Vinod Vaikuntanathan
-
2014/462 ( PDF )
- Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps
- Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
-
2014/461 ( -- withdrawn -- )
- Provably secure and efficient certificateless signature in the standard model
- Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
-
2014/460 ( PDF )
- FleXOR: Flexible garbling for XOR gates that beats free-XOR
- Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek
-
2014/459 ( PDF )
- Template Attacks on Different Devices
- Omar Choudary and Markus G. Kuhn
-
2014/458 ( PDF )
- Automated Analysis of Cryptographic Assumptions in Generic Group Models
- Gilles Barthe and Edvard Fagerholm and Dario Fiore and John Mitchell and Andre Scedrov and Benedikt Schmidt
-
2014/457 ( PDF )
- Transcript Secure Signatures Based on Modular Lattices
- Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte
-
2014/456 ( PDF )
- Verified Implementations for Secure and Verifiable Computation
- José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Guillaume Davy and François Dupressoir and Benjamin Grégoire and Pierre-Yves Strub
-
2014/455 ( PDF )
- Single-shot security for one-time memories in the isolated qubits model
- Yi-Kai Liu
-
2014/454 ( PDF )
- Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
- Amir Moradi and Vincent Immler
-
2014/453 ( PDF )
- Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version
- Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yalçın
-
2014/452 ( PDF )
- Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake
- Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld
-
2014/451 ( PDF )
- Leveled Fully Homomorphic Signatures from Standard Lattices
- Daniel Wichs
-
2014/450 ( -- withdrawn -- )
- Optimized Implementation of General Secret Sharing Scheme
- Lein Harn and Ching-Fang Hsu*
-
2014/449 ( -- withdrawn -- )
- Related Key Secure PKE from Hash Proof Systems
- Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
-
2014/448 ( PDF )
- Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
- Ning Wang and Xiaoyun Wang and Keting Jia and Jingyuan Zhao
-
2014/447 ( PDF )
- Faster Private Set Intersection based on OT Extension
- Benny Pinkas and Thomas Schneider and Michael Zohner
-
2014/446 ( PDF )
- 4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes
- Valerie Nachef and Jacques Patarin and Emmanuel Volte
-
2014/445 ( PDF )
- Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
- Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Ràfols and Andy Rupp
-
2014/444 ( PDF )
- RPKI vs ROVER: Comparing the Risks of BGP Security Solutions
- Aanchal Malhotra and Sharon Goldberg
-
2014/443 ( PDF )
- Minimizing the Two-Round Even-Mansour Cipher
- Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger
-
2014/442 ( PDF )
- Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix
- Xing Hu and Chunming Tang
-
2014/441 ( PDF )
- Improved Generic Attacks Against Hash-based MACs and HAIFA
- Itai Dinur and Gaëtan Leurent
-
2014/440 ( PDF )
- Double Level Montgomery Cox-Rower Architecture, New Bounds
- Jean-Claude Bajard and Nabil Merkiche
-
2014/439 ( PDF )
- Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions
- Chunming Tang, Yuenai Chen
-
2014/438 ( PDF )
- Security of Symmetric Encryption against Mass Surveillance
- Mihir Bellare and Kenneth Paterson and Phillip Rogaway
-
2014/437 ( PDF )
- Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
- Jingguo Bi and Jean-Sébastien Coron and Jean-Charles Faugère and Phong Q. Nguyen and Guénaël Renault and Rina Zeitoun
-
2014/436 ( PDF )
- Synthesis of Fault Attacks on Cryptographic Implementations
- Gilles Barthe and Francois Dupressoir and Pierre-Alain Fouque and Benjamin Gregoire and Jean-Christophe Zapalowicz
-
2014/435 ( PDF )
- Wait a minute! A fast, Cross-VM attack on AES
- Gorka Irazoqui and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
-
2014/434 ( PDF )
- Just a Little Bit More
- Joop van de Pol and Nigel P. Smart and Yuval Yarom
-
2014/433 ( PDF )
- A Statistical Model for Higher Order DPA on Masked Devices
- A. Adam Ding and Liwei Zhang and Yunsi Fei and Pei Luo
-
2014/432 ( PDF )
- Universally Composable Authentication and Key-exchange with Global PKI
- Ran Canetti and Daniel Shahaf and Margarita Vald
-
2014/431 ( PDF )
- Tiny ORAM: A Low-Latency, Low-Area Hardware ORAM Controller
- Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten Van Dijk and Emil Stefanov and Srinivas Devadas
-
2014/430 ( PDF )
- Revisiting the Gentry-Szydlo Algorithm
- H. W. Lenstra and A. Silverberg
-
2014/429 ( PDF )
- Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
- Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven
-
2014/428 ( PDF )
- Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
- Nuttapong Attrapadung
-
2014/427 ( PDF )
- Fast point multiplication algorithms for binary elliptic curves with and without precomputation
- Thomaz Oliveira and Diego F. Aranha and Julio López and Francisco Rodríguez-Henríquez
-
2014/426 ( PDF )
- Towards Optimally Efficient Secret-Key Authentication from PRG
- Ivan Damgård and Sunoo Park
-
2014/425 ( PDF )
- Note of Multidimensional MITM Attack on 25-Round TWINE-128
- Long Wen and Meiqin Wang and Andrey Bogdanov and Huaifeng Chen
-
2014/424 ( PDF )
- Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants
- Craig Costello and Alyson Deines-Schartz and Kristin Lauter and Tonghai Yang
-
2014/423 ( PDF )
- The Hash Function "Fugue"
- Shai Halevi and William E. Hall and Charanjit S. Jutla
-
2014/422 ( PDF )
- System-level non-interference for constant-time cryptography
- Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Carlos Luna and David Pichardie
-
2014/421 ( PDF )
- FNR : Arbitrary length small domain block cipher proposal
- Sashank Dara, Scott Fluhrer
-
2014/420 ( PDF )
- Bounded Fully Homomorphic Signature Schemes
- Xiang Xie and Rui Xue
-
2014/419 ( PDF )
- FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve
- Jérémie Detrey
-
2014/418 ( PDF )
- A Simple Recursive Tree Oblivious RAM
- Benny Pinkas and Tzachy Reinman
-
2014/417 ( PDF )
- Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions
- Inna Polak, Adi Shamir
-
2014/416 ( PDF )
- Adaptive Security of Constrained PRFs
- Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao
-
2014/415 ( PDF )
- Virtual Proofs of Reality
- Ulrich Rührmair
-
2014/414 ( PDF )
- A Security Proof of KCDSA using an extended Random Oracle Model
- Vikram Singh
-
2014/413 ( PDF )
- On the Cost of Lazy Engineering for Masked Software Implementations
- Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and François-Xavier Standaert
-
2014/412 ( PDF )
- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
- François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Jean-Baptiste Mairy and Yves Deville
-
2014/411 ( PDF )
- Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)
- Vincent Grosso and Romain Poussier and François-Xavier Standaert and Lubos Gaspar
-
2014/410 ( PDF )
- Soft Analytical Side-Channel Attacks
- Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
-
2014/409 ( PDF )
- Moments-Correlating DPA
- Amir Moradi and François-Xavier Standaert
-
2014/408 ( PDF )
- Bootstrapping BGV Ciphertexts With A Wider Choice of p and q.
- Emmanuela Orsini and Joop van de Pol and Nigel P. Smart
-
2014/407 ( PDF )
- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
- Fu-Kuo Tseng and Rong-Jaye Chen and Bao-Shuh Paul Lin
-
2014/406 ( PDF )
- New Generic Attacks Against Hash-based MACs
- Gaëtan Leurent and Thomas Peyrin and Lei Wang
-
2014/405 ( PDF )
- Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
- Christina Brzuska and Arno Mittelbach
-
2014/404 ( PDF )
- Large-Scale Secure Computation
- Elette Boyle and Kai-Min Chung and Rafael Pass
-
2014/403 ( PDF )
- Generic Universal Forgery Attack on Iterative Hash-based MACs
- Thomas Peyrin and Lei Wang
-
2014/402 ( PDF )
- On the Existence of Extractable One-Way Functions
- Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
-
2014/401 ( PDF )
- Software implementation of an Attribute-Based Encryption scheme
- Eric Zavattoni and Luis J. Dominguez Perez and Shigeo Mitsunari and Ana H. Sánchez-Ramírez and Tadanori Teruya and Francisco Rodríguez-Henríquez
-
2014/400 ( PDF )
- Composable Oblivious Extended Permutations
- Peeter Laud and Jan Willemson
-
2014/399 ( PDF )
- An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
- Dustin Moody and Ray Perlner and Daniel Smith-Tone
-
2014/398 ( PDF )
- Differential Properties of the HFE Cryptosystem
- Taylor Daniels and Daniel Smith-Tone
-
2014/397 ( PDF )
- Cofactorization on Graphics Processing Units
- Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra
-
2014/396 ( PDF )
- Efficient Short Adaptive NIZK for NP
- Helger Lipmaa
-
2014/395 ( PDF )
- Lightweight and Privacy-Preserving Delegatable Proofs of Storage
- Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong
-
2014/394 ( PDF )
- Relational Hash
- Avradip Mandal and Arnab Roy
-
2014/393 ( PDF )
- (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
- Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
-
2014/392 ( PDF )
- The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
- Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
-
2014/391 ( PDF )
- MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
- Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
-
2014/390 ( PDF )
- Black-Box Non-Black-Box Zero Knowledge
- Vipul Goyal and Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti
-
2014/389 ( PDF )
- Accelerating NTRU based Homomorphic Encryption using GPUs
- Wei Dai and Yarkın Doröz and Berk Sunar
-
2014/388 ( PDF )
- Finding collisions for MD4 hash algorithm using hybrid algorithm
- Marko Carić
-
2014/387 ( PDF )
- New candidates for multivariate trapdoor functions
- Jaiberth Porras, John B. Baena, Jintai Ding
-
2014/386 ( PDF )
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
- Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede
-
2014/385 ( PDF )
- Jacobian Coordinates on Genus 2 Curves
- Huseyin Hisil and Craig Costello
-
2014/384 ( PDF )
- Yao's millionaires' problem and decoy-based public key encryption by classical physics
- Dima Grigoriev and Vladimir Shpilrain
-
2014/383 ( PDF )
- Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
- Younsung Choi, Dongho Won
-
2014/382 ( PDF )
- Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
- Felix Günther and Mark Manulis and Andreas Peter
-
2014/381 ( PDF )
- Using Indistinguishability Obfuscation via UCEs
- Christina Brzuska and Arno Mittelbach
-
2014/380 ( PDF )
- Efficient Adaptively Secure IBBE from Standard Assumptions
- Somindu C. Ramanna and Palash Sarkar
-
2014/379 ( PDF )
- Hyper-and-elliptic-curve cryptography
- Daniel J. Bernstein and Tanja Lange
-
2014/378 ( PDF )
- Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps
- SK Hafizul Islam
-
2014/377 ( PDF )
- Logic Synthesis based Public Key Scheme
- Boaz Shahar
-
2014/376 ( PDF )
- How Secure is Deterministic Encryption?
- Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi
-
2014/375 ( PDF )
- Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)
- Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
-
2014/374 ( PDF )
- Optimal Contracts for Outsourced Computation
- Viet Pham and MHR. Khouzani and Carlos Cid
-
2014/373 ( PDF )
- Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
- Philipp Jovanovic and Atul Luykx and Bart Mennink
-
2014/372 ( PDF )
- Fully secure constrained pseudorandom functions using random oracles
- Dennis Hofheinz
-
2014/371 ( PDF )
- On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
- Christophe Doche
-
2014/370 ( PDF )
- Compact VSS and Efficient Homomorphic UC Commitments
- Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen
-
2014/369 ( PDF )
- On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness
- Michèle Feltz and Cas Cremers
-
2014/368 ( PDF )
- Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster
- Erich Wenger and Paul Wolfger
-
2014/367 ( PDF )
- Redefining the Transparency Order
- Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff
-
2014/366 ( PDF )
- Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
- Younsung Choi and Dongho Won
-
2014/365 ( PDF )
- Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
- Luke Mather and Elisabeth Oswald and Carolyn Whitnall
-
2014/364 ( PDF )
- Deleting Secret Data with Public Verifiability
- Feng Hao and Dylan Clarke and Avelino Francisco Zorzo
-
2014/363 ( PDF )
- Forging Attacks on two Authenticated Encryptions COBRA and POET
- Mridul Nandi
-
2014/362 ( PDF )
- Nothing is for Free: Security in Searching Shared & Encrypted Data
- Qiang Tang
-
2014/361 ( PDF )
- New Results in the Linear Cryptanalysis of DES
- Igor Semaev
-
2014/360 ( PDF )
- McEliece in the world of Escher
- Danilo Gligoroski and Simona Samardjiska and Håkon Jacobsen and Sergey Bezzateev
-
2014/359 ( PDF )
- Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations
- Eduardo Ruiz Duarte and Octavio Páez Osuna
-
2014/358 ( PDF )
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Kim-Kwang Raymond Choo and Junghyun Nam and Dongho Won
-
2014/357 ( PDF )
- Simulatable Leakage: Analysis, Pitfalls, and new Constructions
- J. Longo Galea and D. Martin and E. Oswald and D. Page and M. Stam and and M. Tunstall
-
2014/356 ( PDF )
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
- Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy
-
2014/355 ( PDF )
- Graph-theoretic design and analysis of key predistribution schemes
- Michelle Kendall and Keith M. Martin
-
2014/354 ( PDF )
- Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
- Ray Perlner
-
2014/353 ( PDF )
- Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups
- Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
-
2014/352 ( PDF )
- Multi-Vendor PayWord with Payment Approval
- Andrea Huszti
-
2014/351 ( PDF )
- Secret and Verifiable Delegated Voting for Wide Representation
- Yefim Leifman
-
2014/350 ( PDF )
- Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
- Franziskus Kiefer and Mark Manulis
-
2014/349 ( PDF )
- Zerocash: Decentralized Anonymous Payments from Bitcoin
- Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza
-
2014/348 ( PDF )
- A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
- Helger Lipmaa
-
2014/347 ( PDF )
- One-Way Functions and (Im)perfect Obfuscation
- Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev
-
2014/346 ( PDF )
- Time-Memory Trade-offs for Index Calculus in Genus 3
- Kim Laine and Kristin Lauter
-
2014/345 ( PDF )
- Private Database Access With HE-over-ORAM Architecture
- Craig Gentry and Shai Halevi and Charanjit Jutla and Mariana Raykova
-
2014/344 ( PDF )
- Toward Robust Hidden Volumes using Write-Only Oblivious RAM
- Erik-Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu
-
2014/343 ( PDF )
- Solving Linear Equations Modulo Unknown Divisors: Revisited
- Yao Lu and Rui Zhang and Liqiang Peng and Dongdai Lin
-
2014/342 ( PDF )
- Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
- Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
-
2014/341 ( PDF )
- Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2014/340 ( PDF )
- A Strong and Efficient Certificateless Digital Signature Scheme
- Mohammed Alfateh Hassouna and Mohsin Hashim
-
2014/339 ( -- withdrawn -- )
- Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds
- Yi Deng
-
2014/338 ( PDF )
- A Tamper and Leakage Resilient von Neumann Architecture
- Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
-
2014/337 ( PDF )
- Related Randomness Attacks for Public Key Encryption
- Kenneth G. Paterson and Jacob C.N. Schuldt and Dale L. Sibborn
-
2014/336 ( PDF )
- Private Predictive Analysis on Encrypted Medical Data
- Joppe W. Bos and Kristin Lauter and Michael Naehrig
-
2014/335 ( PDF )
- SHADOW NUMBERS PUBLIC KEY ENCRYPTION
- John Almeida
-
2014/334 ( PDF )
- LCPR: High Performance Compression Algorithm for Lattice-Based Signatures
- Rachid El~Bansarkhani and Johannes Buchmann
-
2014/333 ( PDF )
- An optimal representation for the trace zero subgroup
- Elisa Gorla and Maike Massierer
-
2014/332 ( PDF )
- How to Choose Interesting Points for Template Attacks?
- Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng
-
2014/331 ( PDF )
- Machine Learning Classification over Encrypted Data
- Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser
-
2014/330 ( PDF )
- PoS Cryptocurrency wtih No Blockchain
- qianxiaochao
-
2014/329 ( PDF )
- Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
- Berry Schoenmakers
-
2014/328 ( PDF )
- Affine-evasive Sets Modulo a Prime
- Divesh Aggarwal
-
2014/327 ( PDF )
- An Optimal Strong Password Authentication Protocol with USB Sticks
- Vikram D
-
2014/326 ( PDF )
- FeW: A Lightweight Block Cipher
- Manoj Kumar and Saibal K Pal and Anupama Panigrahi
-
2014/325 ( PDF )
- A practical forgery and state recovery attack on the authenticated cipher PANDA-s
- Xiutao FENG, Fan ZHANG and Hui WANG
-
2014/324 ( PDF )
- From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
- Sandro Coretti and Ueli Maurer and Björn Tackmann and Daniele Venturi
-
2014/323 ( PDF )
- Some Remarks on Honeyword Based Password-Cracking Detection
- Imran Erguler
-
2014/322 ( PDF )
- Coding Theoretic Construction of Quantum Ramp Secret Sharing
- Ryutaroh Matsumoto
-
2014/321 ( PDF )
- Efficient Quantum-Immune Keyless Signatures with Identity
- Ahto Buldas and Risto Laanoja and Ahto Truu
-
2014/320 ( PDF )
- Improved Differential Cryptanalysis of Round-Reduced Speck
- Itai Dinur
-
2014/319 ( PDF )
- Preimage attacks on Reduced-round Stribog
- Riham AlTawy and Amr M. Youssef
-
2014/318 ( PDF )
- Index calculus in the trace zero variety
- Elisa Gorla and Maike Massierer
-
2014/317 ( PDF )
- Analysis of NORX: Investigating Differential and Rotational Properties
- Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves
-
2014/316 ( PDF )
- Explicit Non-Malleable Codes Resistant to Permutations
- Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
-
2014/315 ( PDF )
- Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R
- Bartosz Zoltak
-
2014/314 ( PDF )
- Improved Leakage Model Based on Genetic Algorithm
- Zhenbin Zhang and Liji Wu and An Wang and Zhaoli Mu
-
2014/313 ( PDF )
- On the Complexity of Finding Low-Level Solutions
- Bjoern Grohmann
-
2014/312 ( PDF )
- Structure-Preserving Signatures from Type II Pairings
- Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
-
2014/311 ( PDF )
- Exponent-inversion Signatures and IBE under Static Assumptions
- Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu
-
2014/310 ( PDF )
- Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
- Yu Chen and Qiong Huang and Zongyang Zhang
-
2014/309 ( PDF )
- Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
- Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters
-
2014/308 ( PDF )
- The Locality of Searchable Symmetric Encryption
- David Cash and Stefano Tessaro
-
2014/307 ( PDF )
- Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
- Alessandro Barenghi and Gerardo Pelosi and Francesco Regazzoni
-
2014/306 ( PDF )
- Publicly Evaluable Pseudorandom Functions and Their Applications
- Yu Chen and Zongyang Zhang
-
2014/305 ( PDF )
- Collision Attack on 5 Rounds of Grøstl
- Florian Mendel and Vincent Rijmen and Martin Schläffer
-
2014/304 ( PDF )
- Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead
- Dai Ikarashi and Ryo Kikuchi and Koki Hamada and Koji Chida
-
2014/303 ( -- withdrawn -- )
- On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems
- SK Hafizul Islam
-
2014/302 ( PDF )
- Branching Heuristics in Differential Collision Search with Applications to SHA-512
- Maria Eichlseder and Florian Mendel and Martin Schläffer
-
2014/301 ( PDF )
- How to Avoid Obfuscation Using Witness PRFs
- Mark Zhandry
-
2014/300 ( PDF )
- On the Powers of 2
- Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
-
2014/299 ( PDF )
- Optimality of Non-Adaptive Strategies: The Case of Parallel Games
- Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
-
2014/298 ( PDF )
- Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
- Ignacio Cascudo and Ronald Cramer and Chaoping Xing
-
2014/297 ( PDF )
- Pipelineable On-Line Encryption
- Farzaneh Abed and Scott Fluhrer and Christian Forler and Eik List and Stefan Lucks and David McGrew and Jakob Wenzel
-
2014/296 ( PDF )
- Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding
- Andris Ambainis and Ansis Rosmanis and Dominique Unruh
-
2014/295 ( PDF )
- ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
- Nir Bitansky and Omer Paneth
-
2014/294 ( PDF )
- The M3lcrypt Password Based Key Derivation Function
- Isaiah Makwakwa
-
2014/293 ( -- withdrawn -- )
- An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol
- Xi-Jun Lin and Lin Sun
-
2014/292 ( PDF )
- Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256
- Leibo Li and Keting Jia
-
2014/291 ( PDF )
- Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗
- Antonio Sanso
-
2014/290 ( PDF )
- Reliable Broadcast with Respect to Topology Knowledge
- Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
-
2014/289 ( PDF )
- An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
- Ivan Damgaard and Rasmus Lauritsen, and Tomas Toft
-
2014/288 ( PDF )
- Resilient Aggregation in Simple Linear Sensor Networks
- Kevin J. Henry and Douglas R. Stinson
-
2014/287 ( PDF )
- Active and Passive Side-Channel Attacks on Delay Based PUF Designs
- Georg T, Becker and Raghavan Kumar
-
2014/286 ( PDF )
- Weaknesses of Password Authentication Scheme Based on Geometric Hashing
- Martin Stanek
-
2014/285 ( PDF )
- Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
- David Derler and Christian Hanser and Daniel Slamanig
-
2014/284 ( PDF )
- Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way
- Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam
-
2014/283 ( PDF )
- Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
- Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie
-
2014/282 ( PDF )
- On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation
- Ivan Damgård and Frédéric Dupuis and Jesper Buus Nielsen
-
2014/281 ( PDF )
- WCFB: a tweakable wide block cipher
- Andrey Jivsov
-
2014/280 ( PDF )
- MSEA: Modified Symmetric Encryption Algorithm
- Rajul Kumar and K. K. Mishra and Ashish Tripathi and Abhinav Tomar and Surendra Singh
-
2014/279 ( PDF )
- Improved Impossible Differential Attacks against Round-Reduced LBlock
- Christina Boura and Marine Minier and María Naya-Plasencia and Valentin Suder
-
2014/278 ( PDF )
- Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
- Essam Ghadafi
-
2014/277 ( PDF )
- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
- Lin Ding and Chenhui Jin and Jie Guan and Chuanda Qi
-
2014/276 ( PDF )
- Design of identity-based digital signature schemes using extended chaotic maps
- SK Hafizul Islam
-
2014/275 ( PDF )
- Identity-based encryption and digital signature schemes using extended chaotic maps
- SK Hafizul Islam
-
2014/274 ( PDF )
- Weak instances of composite order protocols
- Sorina Ionica and Malika Izabachène
-
2014/273 ( PDF )
- Witness Encryption from Instance Independent Assumptions
- Craig Gentry and Allison Bishop Lewko and Brent Waters
-
2014/272 ( PDF )
- Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
- Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
-
2014/271 ( PDF )
- STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
- Markku-Juhani O. Saarinen
-
2014/270 ( PDF )
- Faster Maliciously Secure Two-Party Computation Using the GPU
- Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen
-
2014/269 ( PDF )
- Chosen Ciphertext Security via Point Obfuscation
- Takahiro Matsuda and Goichiro Hanaoka
-
2014/268 ( PDF )
- New bit-parallel Montgomery multiplier for trinomials using squaring operation
- Yin Li and Yiyang Chen
-
2014/267 ( PDF )
- Differential Fault Analysis on the families of SIMON and SPECK ciphers
- Harshal Tupsamudre and Shikha Bisht and Debdeep Mukhopadhyay
-
2014/266 ( PDF )
- ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption
- Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Srebrny and Marcin Wojcik
-
2014/265 ( PDF )
- Dual System Groups and its Applications --- Compact HIBE and More
- Jie Chen and Hoeteck Wee
-
2014/264 ( PDF )
- Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
- Janaka Alawatugoda and Colin Boyd and Douglas Stebila
-
2014/263 ( PDF )
- A Generic Scan Attack on Hardware based eStream Winners
- Sandip Karmakar and Dipanwita Roy Chowdhury
-
2014/262 ( PDF )
- Differential Fault Analysis of MICKEY Family of Stream Ciphers
- Sandip Karmakar and Dipanwita Roy Chowdhury
-
2014/261 ( PDF )
- Fault Analysis of Grain Family of Stream Ciphers
- Sandip Karmakar and Dipanwita Roy Chowdhury
-
2014/260 ( PDF )
- Locally Decodable Codes for edit distance
- Rafail Ostrovsky and Anat Paskin-Cherniavsky
-
2014/259 ( PDF )
- Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
- Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
-
2014/258 ( PDF )
- A realtime key recovery attack on the authenticated cipher FASER128
- Xiutao FENG and Fan ZHANG
-
2014/257 ( PDF )
- Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
- Bruce Kallick
-
2014/256 ( PDF )
- Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
- Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
-
2014/255 ( PDF )
- Certification and Efficient Proofs of Committed Topology Graphs
- Thomas Gross
-
2014/254 ( PDF )
- Enhanced Lattice-Based Signatures on Reconfigurable Hardware
- Thomas Pöppelmann and Léo Ducas and Tim Güneysu
-
2014/253 ( -- withdrawn -- )
- Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems
- Fangquan Cheng and Qian Wang and Kui Ren and Zhiyong Peng
-
2014/252 ( PDF )
- Making RSA-PSS Provably Secure Against Non-Random Faults
- Gilles Barthe and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Mehdi Tibouchi and Jean-Christophe Zapalowicz
-
2014/251 ( PDF )
- Forgery on Stateless CMCC
- Guy Barwell
-
2014/250 ( PDF )
- Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
- Boaz Tsaban and Noam Lifshitz
-
2014/249 ( PDF )
- Linear Extension Cube Attack on Stream Ciphers
- Liren Ding, Yongjuan Wang, Zhufeng Li
-
2014/248 ( PDF )
- Fine grain Cross-VM Attacks on Xen and VMware are possible!
- Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
-
2014/247 ( PDF )
- Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
- Ivan Pryvalov and Aniket Kate
-
2014/246 ( PDF )
- Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
- Kwangsu Lee and Dong Hoon Lee
-
2014/245 ( PDF )
- A practical state recovery attack on the stream cipher Sablier v1
- Xiutao FENG and Fan ZHANG
-
2014/244 ( PDF )
- bitcoin.BitMint: Reconciling Bitcoin with Central Banks
- Gideon Samid
-
2014/243 ( PDF )
- Key Derivation From Noisy Sources With More Errors Than Entropy
- Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam Smith
-
2014/242 ( PDF )
- Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
- Franziskus Kiefer and Mark Manulis
-
2014/241 ( PDF )
- A New Way to Prevent UKS Attacks Using Trusted Computing
- Qianying Zhang and Shijun Zhao and Dengguo Feng
-
2014/240 ( PDF )
- Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
- Martin Pettai and Peeter Laud
-
2014/239 ( PDF )
- Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
- Florian Legendre and Gilles Dequen and Michaël Krajecki
-
2014/238 ( PDF )
- High Parallel Complexity Graphs and Memory-Hard Functions
- Joël Alwen and Vladimir Serbinenko
-
2014/237 ( PDF )
- SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
- Aydin Aysu and Ege Gulcan and Patrick Schaumont
-
2014/236 ( PDF )
- Linear Sequential Circuit Approximation of Acterbahn Stream Cipher
- Shazia Afreen
-
2014/235 ( PDF )
- Efficient Fuzzy Search on Encrypted Data
- Alexandra Boldyreva and Nathan Chenette
-
2014/234 ( PDF )
- Enhancing Oblivious RAM Performance Using Dynamic Prefetching
- Xiangyao Yu and Ling Ren and Christopher Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas
-
2014/233 ( PDF )
- Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
- Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar
-
2014/232 ( PDF )
- Bandwidth Efficient PIR from NTRU
- Yarkın Doröz, Berk Sunar and Ghaith Hammouri
-
2014/231 ( PDF )
- Self-Updatable Encryption with Short Public Parameters and Its Extensions
- Kwangsu Lee
-
2014/230 ( PDF )
- Isogeny graphs with maximal real multiplication
- Sorina Ionica and Emmanuel Thomé
-
2014/229 ( -- withdrawn -- )
- Investigating the Feasibility of LEAP+ in ZigBee Specification
- Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi
-
2014/228 ( PDF )
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban
-
2014/227 ( -- withdrawn -- )
- CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks
- Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi
-
2014/226 ( PDF )
- Weak-Key Analysis of POET
- Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser
-
2014/225 ( PDF )
- Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption
- Tapas Pandit and Rana Barua
-
2014/224 ( PDF )
- Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
- Henry Carter and Charles Lever and Patrick Traynor
-
2014/223 ( PDF )
- Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
- Léo Perrin and Dmitry Khovratovich
-
2014/222 ( PDF )
- Optimizing Obfuscation: Avoiding Barrington's Theorem
- Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai
-
2014/221 ( PDF )
- Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
- Toomas Krips and Jan Willemson
-
2014/220 ( PDF )
- Total Break of Zorro using Linear and Differential Attacks
- Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2014/219 ( PDF )
- Dynamic Searchable Encryption via Blind Storage
- Muhammad Naveed and Manoj Prabhakaran and Carl A. Gunter
-
2014/218 ( PDF )
- A Practical Universal Forgery Attack against PAES-8
- Yu Sasaki and Lei Wang
-
2014/217 ( PDF )
- A Forgery Attack against PANDA-s
- Yu Sasaki and Lei Wang
-
2014/216 ( PDF )
- Implementation and Improvement of the Partial Sum Attack on 6-round AES
- Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala
-
2014/215 ( PDF )
- Attack On the Markov Problem
- James L. Adams
-
2014/214 ( PDF )
- Squaring Algorithms with Delayed Carry Method and Efficient Parallelization
- Vladislav Kovtun and Andrew Okhrimenko
-
2014/213 ( PDF )
- Secret-Sharing for NP
- Ilan Komargodski and Moni Naor and Eylon Yogev
-
2014/212 ( PDF )
- Remarks on the Pocklington and Padró-Sáez Cube Root Algorithm in $\mathbb F_q$
- Geon Heo and Seokhwan Choi and Kwang Ho Lee and Namhun Koo and Soonhak Kwon
-
2014/211 ( PDF )
- Some Randomness Experiments on TRIVIUM
- Subhabrata Samajder and Palash Sarkar
-
2014/210 ( PDF )
- Structural Cryptanalysis of McEliece Schemes with Compact Keys
- Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
-
2014/209 ( PDF )
- A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation
- Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung
-
2014/208 ( PDF )
- Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
- Ding Wang and Ping Wang
-
2014/207 ( PDF )
- Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
- Katsuyuki Takashima
-
2014/206 ( PDF )
- Reconsidering Generic Composition
- Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton
-
2014/205 ( PDF )
- Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness
- Ling Ren and Christopher Fletcher and Xiangyao Yu and Albert Kwon and Marten van Dijk and Srinivas Devadas
-
2014/204 ( PDF )
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
- Colin O'Flynn and Zhizhang (David) Chen
-
2014/203 ( PDF )
- Privacy-Preserving Implicit Authentication
- Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti
-
2014/202 ( PDF )
- Efficiently Verifiable Computation on Encrypted Data
- Dario Fiore and Rosario Gennaro and Valerio Pastro
-
2014/201 ( PDF )
- From Input Private to Universally Composable Secure Multiparty Computation Primitives
- Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen
-
2014/200 ( PDF )
- Automatic Protocol Selection in Secure Two-Party Computations
- Florian Kerschbaum and Thomas Schneider and Axel Schröpfer
-
2014/199 ( PDF )
- Doubly Spatial Encryption from DBDH
- Jie Chen and Hoeteck Wee
-
2014/198 ( PDF )
- Fast GPGPU-Based Elliptic Curve Scalar Multiplication
- Eric M. Mahé and Jean-Marie Chauvet
-
2014/197 ( PDF )
- Breaking POET Authentication with a Single Query
- Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei
-
2014/196 ( -- withdrawn -- )
- Crypto-Multimedia
- Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif Ismaili
-
2014/195 ( PDF )
- Low Overhead Broadcast Encryption from Multilinear Maps
- Dan Boneh and Brent Waters and Mark Zhandry
-
2014/194 ( PDF )
- Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
- Sai Raghu Talluri and Swapnoneel Roy
-
2014/193 ( PDF )
- JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
- Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri
-
2014/192 ( PDF )
- Two-sources Randomness Extractors for Elliptic Curves
- Abdoul Aziz Ciss
-
2014/191 ( PDF )
- Side-Channel Analysis on Blinded Regular Scalar Multiplications
- Benoit Feix and Mylène Roussellet and Alexandre Venelli
-
2014/190 ( PDF )
- The Temperature Side Channel and Heating Fault Attacks
- Michael Hutter and Jörn-Marc Schmidt
-
2014/189 ( PDF )
- Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
- Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
-
2014/188 ( PDF )
- A Second Look at Fischlin's Transformation
- Özgür Dagdelen and Daniele Venturi
-
2014/187 ( PDF )
- FFT-Based Key Recovery for the Integral Attack
- Yosuke Todo
-
2014/186 ( PDF )
- AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
- Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser
-
2014/185 ( PDF )
- Oblivious Data Structures
- Xiao Shaun Wang and Kartik Nayak and Chang Liu and T-H. Hubert Chan and Elaine Shi and Emil Stefanov and Yan Huang
-
2014/184 ( PDF )
- SETUP in Secret Sharing Schemes using Random Values
- Ruxandra F. Olimid
-
2014/183 ( PDF )
- Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
- Tetsu Iwata and Lei Wang
-
2014/182 ( PDF )
- Proving the TLS Handshake Secure (as it is)
- Karthikeyan Bhargavan and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Santiago Zanella-Béguelin
-
2014/181 ( PDF )
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
- Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro
-
2014/180 ( PDF )
- Improving throughput of RC4 algorithm using multithreading techniques in multicore processors
- T.D.B Weerasinghe
-
2014/179 ( PDF )
- Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
- Maura B. Paterson and Douglas R. Stinson
-
2014/178 ( PDF )
- Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
- Qingji Zheng and Shouhuai Xu
-
2014/177 ( PDF )
- Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES
- Valentina Banciu and Elisabeth Oswald
-
2014/176 ( -- withdrawn -- )
- One-Round Witness Indistinguishability from Indistinguishability Obfuscation
- Qihua Niu, Hongda Li, Bei Liang, Fei Tang
-
2014/175 ( PDF )
- Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
- T.D.B Weerasinghe
-
2014/174 ( PDF )
- Analysis of a Modified RC4 Algorithm
- T.D.B Weerasinghe
-
2014/173 ( PDF )
- Continuous Non-malleable Codes
- Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
-
2014/172 ( -- withdrawn -- )
- A novel PUF Scheme
- Jeroen Delvaux
-
2014/171 ( PDF )
- An Effective RC4 Stream Cipher
- T.D.B Weerasinghe
-
2014/170 ( PDF )
- Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
- Shay Gueron
-
2014/169 ( PDF )
- Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms
- Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
-
2014/168 ( PDF )
- Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
- Scott Coull and Kevin Dyer
-
2014/167 ( PDF )
- How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
- Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
-
2014/166 ( PDF )
- Tuple decoders for traitor tracing schemes
- Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
-
2014/165 ( -- withdrawn -- )
- A NEW SCALAR POINT MULTIPLICATION SCHEME IN ECC BASED ON ZECKENDORF REPRESENTATION AND MULTIBASE CONCEPT
- Kirti Chawla and Om Pal Yadav
-
2014/164 ( PDF )
- Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters
- Yuriy Tarannikov
-
2014/163 ( PDF )
- Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices
- Arnaud Dambra and Philippe Gaborit and Mylène Roussellet and Julien Schrek and Nicolas Tafforeau
-
2014/162 ( PDF )
- TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
- Hu Xiong
-
2014/161 ( PDF )
- ``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way
- Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom
-
2014/160 ( PDF )
- TrueSet: Faster Verifiable Set Computations
- Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikos Triandopoulos
-
2014/159 ( PDF )
- Weak-Key Leakage Resilient Cryptography
- Zuoxia Yu and Qiuliang Xu and Yongbin Zhou and Chengyu Hu and Rupeng Yang and Guangjun Fan
-
2014/158 ( PDF )
- Point compression for the trace zero subgroup over a small degree extension field
- Elisa Gorla and Maike Massierer
-
2014/157 ( PDF )
- CLOC: Authenticated Encryption for Short Input
- Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka
-
2014/156 ( PDF )
- Non-Malleable Extractors with Shorter Seeds and Their Applications
- Yanqing Yao and Zhoujun Li
-
2014/155 ( PDF )
- Honey Encryption: Security Beyond the Brute-Force Bound
- Ari Juels and Thomas Ristenpart
-
2014/154 ( -- withdrawn -- )
- Non-Interactive Cryptography in the RAM Model of Computation
- Daniel Apon and Xiong Fan and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
-
2014/153 ( PDF )
- Verifiable Oblivious Storage
- Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam
-
2014/152 ( PDF )
- A Statistics-based Fundamental Model for Side-channel Attack Analysis
- Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang
-
2014/151 ( PDF )
- Security Analysis of Key-Alternating Feistel Ciphers
- Rodolphe Lampe and Yannick Seurin
-
2014/150 ( -- withdrawn -- )
- On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
- Nikolaos Karapanos and Srdjan Capkun
-
2014/149 ( PDF )
- Millions of Millionaires: Multiparty Computation in Large Networks
- Mahdi Zamani and Mahnush Movahedi and Jared Saia
-
2014/148 ( PDF )
- Outsourcing Private RAM Computation
- Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
-
2014/147 ( PDF )
- The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
- Razvan Barbulescu and Cécile Pierrot
-
2014/146 ( PDF )
- Untappable communication channels over optical fibers from quantum-optical noise
- Geraldo A. Barbosa and Jeroen van de Graaf
-
2014/145 ( -- withdrawn -- )
- Calculating Cryptographic Degree of an S-Box
- Prasanna Raghaw Mishra
-
2014/144 ( PDF )
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda
-
2014/143 ( PDF )
- Statistical Concurrent Non-Malleable Zero Knowledge
- Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti
-
2014/142 ( -- withdrawn -- )
- FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm
- Karim M. Abdellatif, R. Chotin-Avot, and H. Mehrez
-
2014/141 ( -- withdrawn -- )
- Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps
- Hao Wang
-
2014/140 ( PDF )
- Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
- Yuval Yarom and Naomi Benger
-
2014/139 ( PDF )
- On the Phase Space of Block-Hiding Strategies
- Assaf Shomer
-
2014/138 ( PDF )
- Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction
- Jae Hong Seo
-
2014/137 ( PDF )
- Efficient, Oblivious Data Structures for MPC
- Marcel Keller and Peter Scholl
-
2014/136 ( PDF )
- Isolated Execution on Many-core Architectures
- Ramya Jayaram Masti and Devendra Rai and Claudio Marforio and Srdjan Capkun
-
2014/135 ( PDF )
- Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
- Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
-
2014/134 ( PDF )
- Kummer strikes back: new DH speed records
- Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe
-
2014/133 ( PDF )
- Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
- Yihua Zhang and Marina Blanton
-
2014/132 ( PDF )
- Efficient Revocable Identity-Based Encryption via Subset Difference Methods
- Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park
-
2014/131 ( PDF )
- Modelling After-the-fact Leakage for Key Exchange
- Janaka Alawatugoda and Douglas Stebila and Colin Boyd
-
2014/130 ( PDF )
- Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
- Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig
-
2014/129 ( PDF )
- How to Use Bitcoin to Design Fair Protocols
- Iddo Bentov and Ranjit Kumaresan
-
2014/128 ( PDF )
- Efficient Three-Party Computation from Cut-and-Choose
- Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas
-
2014/127 ( PDF )
- Algebraic Properties of Modular Addition Modulo a Power of Two
- S. M. Dehnavi and Alireza Rahimipour
-
2014/126 ( -- withdrawn -- )
- Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
- Hui Cui \and Yi Mu \and Man Ho Au
-
2014/125 ( PDF )
- Removing Erasures with Explainable Hash Proof Systems
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/124 ( PDF )
- On the Information Ratio of Non-Perfect Secret Sharing Schemes
- Oriol Farràs and Torben Hansen and Tarik Kaced and Carles Padró
-
2014/123 ( PDF )
- FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes
- Mohammad Sadeq Dousti and Rasool Jalili
-
2014/122 ( PDF )
- New Way to Construct Cryptographic Hash Function
- WANGYong
-
2014/121 ( PDF )
- Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation
- Koki Hamada and Dai Ikarashi and Koji Chida and Katsumi Takahashi
-
2014/120 ( PDF )
- Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)
- Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
-
2014/119 ( PDF )
- Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$)
- Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
-
2014/118 ( PDF )
- Quantum position verification in the random oracle model
- Dominique Unruh
-
2014/117 ( PDF )
- An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems
- Bjoern Grohmann
-
2014/116 ( PDF )
- Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model
- Ronald Cramer and Carles Padró and Chaoping Xing
-
2014/115 ( PDF )
- Comments on a novel user authentication and key agreement scheme
- Jia-Lun Tsai
-
2014/114 ( PDF )
- Prover Anonymous and Deniable Distance-Bounding Authentication
- Sebastien Gambs and Cristina Onete and Jean-Marc Robert
-
2014/113 ( PDF )
- Secure Compression: Theory \& Practice
- James Kelley and Roberto Tamassia
-
2014/112 ( PDF )
- Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
- Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich
-
2014/111 ( PDF )
- A Note on the CLRW2 Tweakable Block Cipher Construction
- Gordon Procter
-
2014/110 ( PDF )
- Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box
- Sourav Das
-
2014/109 ( PDF )
- Diffusion Programmable Device : The device to prevent reverse engineering
- Mitsuru Shiozaki, Ryohei Hori and Takeshi Fujino
-
2014/108 ( PDF )
- MJH: A Faster Alternative to MDC-2
- Jooyoung Lee and Martijn Stam
-
2014/107 ( PDF )
- Key-Indistinguishable Message Authentication Codes
- Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
-
2014/106 ( PDF )
- Algorithms in HElib
- Shai Halevi and Victor Shoup
-
2014/105 ( PDF )
- Reducing the Overhead of MPC over a Large Population
- Ashish Choudhury and Arpita Patra and Nigel P. Smart
-
2014/104 ( PDF )
- Space-efficient, byte-wise incremental and perfectly private encryption schemes
- Kévin Atighehchi
-
2014/103 ( PDF )
- SHipher: Families of Block Ciphers based on SubSet-Sum Problem
- Xiali Hei and Binheng Song
-
2014/102 ( PDF )
- Actively Secure Private Function Evaluation
- Payman Mohassel and Saeed Sadeghian and Nigel P. Smart
-
2014/101 ( PDF )
- Dishonest Majority Multi-Party Computation for Binary Circuits
- Enrique Larraia and Emmanuela Orsini and Nigel P. Smart
-
2014/100 ( PDF )
- Improved Slender-set Linear Cryptanalysis
- Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi
-
2014/099 ( PDF )
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
- Christina Brzuska and Pooya Farshim and Arno Mittelbach
-
2014/098 ( PDF )
- Towards Characterizing Complete Fairness in Secure Two-Party Computation
- Gilad Asharov
-
2014/097 ( PDF )
- A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups
- Koji Nuida
-
2014/096 ( PDF )
- Tight security bounds for multiple encryption
- Yuanxi Dai, John Steinberger
-
2014/095 ( PDF )
- Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
- Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
-
2014/094 ( PDF )
- Faster Bootstrapping with Polynomial Error
- Jacob Alperin-Sheriff and Chris Peikert
-
2014/093 ( PDF )
- The Related-Key Analysis of Feistel Constructions
- Manuel Barbosa and Pooya Farshim
-
2014/092 ( PDF )
- A new class of system oriented PKC, K(I)SOPKC.
- Masao KASAHARA
-
2014/091 ( PDF )
- On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2014/090 ( PDF )
- Cryptanalysis of KLEIN (Full version)
- Virginie Lallemand and María Naya-Plasencia
-
2014/089 ( PDF )
- Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)
- Anne Canteaut and Thomas Fuhr and Henri Gilbert and María Naya-Plasencia and Jean-René Reinhard
-
2014/088 ( PDF )
- A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
- Himanshu Tyagi and Shun Watanabe
-
2014/087 ( PDF )
- AnoA: A Framework For Analyzing Anonymous Communication Protocols
- Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi
-
2014/086 ( PDF )
- Randomized and Efficient Authentication in Mobile Environments
- Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
-
2014/085 ( PDF )
- Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer
- Aleksandra Mileva
-
2014/084 ( PDF )
- RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
- Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
-
2014/083 ( PDF )
- Garbled RAM Revisited, Part II
- Steve Lu and Rafail Ostrovsky
-
2014/082 ( PDF )
- Garbled RAM Revisited, Part I
- Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
-
2014/081 ( PDF )
- Efficient Round Optimal Blind Signatures
- Sanjam Garg and Divya Gupta
-
2014/080 ( PDF )
- A Full Characterization of Completeness for Two-party Randomized Function Evaluation
- Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai
-
2014/079 ( PDF )
- Unifying Leakage Models: from Probing Attacks to Noisy Leakage
- Alexandre Duc and Stefan Dziembowski and Sebastian Faust
-
2014/078 ( PDF )
- Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
- Ahmad Boorghany and Rasool Jalili
-
2014/077 ( PDF )
- Mixcoin: Anonymity for Bitcoin with accountable mixes
- Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten
-
2014/076 ( PDF )
- Certified Bitcoins
- Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros
-
2014/075 ( PDF )
- Publicly Auditable Secure Multi-Party Computation
- Carsten Baum and Ivan Damgård and Claudio Orlandi
-
2014/074 ( PDF )
- New and Improved Key-Homomorphic Pseudorandom Functions
- Abhishek Banerjee and Chris Peikert
-
2014/073 ( PDF )
- Anonymous Authentication with Shared Secrets
- Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
-
2014/072 ( PDF )
- Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
- Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser and Sebastian Biedermann
-
2014/071 ( PDF )
- Implementing Pairing-Based Cryptosystems in USB Tokens
- Zhaohui Cheng
-
2014/070 ( PDF )
- Lattice Cryptography for the Internet
- Chris Peikert
-
2014/069 ( PDF )
- One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
- Manoj Ranjan Mishra, Jayaprakash Kar and Banshidhar Majhi
-
2014/068 ( PDF )
- Some security bounds for the DGHV scheme
- Franca Marinelli and Riccardo Aragona and Chiara Marcolla and Massimiliano Sala
-
2014/067 ( PDF )
- Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
- Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey
-
2014/066 ( PDF )
- A Subexponential Construction of Graph Coloring for Multiparty Computation
- Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, and Ron Steinfeld
-
2014/065 ( PDF )
- Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case
- Palash Sarkar and Shashank Singh
-
2014/064 ( PDF )
- A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems
- Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan
-
2014/063 ( PDF )
- Cryptanalysis on “Secure untraceable off-line electronic cash system”
- Yalin Chen and Jue-Sam Chou*
-
2014/062 ( PDF )
- A Comparison of the Homomorphic Encryption Schemes FV and YASHE
- Tancrède Lepoint and Michael Naehrig
-
2014/061 ( PDF )
- Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
- Stefano Tessaro and David A. Wilson
-
2014/060 ( PDF )
- Verifiable Computation in Multiparty Protocols with Honest Majority
- Peeter Laud and Alisa Pankova
-
2014/059 ( PDF )
- Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
- John Tromp
-
2014/058 ( PDF )
- Cryptanalysis of FIDES
- Itai Dinur and Jérémy Jean
-
2014/057 ( PDF )
- Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma
- Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
-
2014/056 ( PDF )
- Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
- Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang
-
2014/055 ( PDF )
- Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
- Younsung Choi
-
2014/054 ( PDF )
- The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
- Sugata Gangopadhyay and Pantelimon Stanica
-
2014/053 ( PDF )
- Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
- Sonia Belaïd, and Vincent Grosso and François-Xavier Standaert
-
2014/052 ( PDF )
- DAA-related APIs in TPM2.0 Revisited
- Li Xi
-
2014/051 ( PDF )
- An Equivalence-Preserving Transformation of Shift Registers
- Elena Dubrova
-
2014/050 ( PDF )
- Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication
- Daniel R. L. Brown
-
2014/049 ( PDF )
- Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography
- Neha tirthani and Ganesan
-
2014/048 ( PDF )
- When a Boolean Function can be Expressed as the Sum of two Bent Functions
- Longjiang Qu and Shaojing Fu and Qingping Dai and Chao Li
-
2014/047 ( PDF )
- Down the Rabbit Hole: Revisiting the Shrinking Method
- Vivien Dubois
-
2014/046 ( PDF )
- Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
- Yalin Chen1 and Jue-Sam Chou*2
-
2014/045 ( PDF )
- Human Assisted Randomness Generation Using Video Games
- Mohsen Alimomeni and Reihaneh Safavi-Naini
-
2014/044 ( PDF )
- rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval
- Lichun Li and Michael Militzer and Anwitaman Datta
-
2014/043 ( PDF )
- Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
- Mehdi Tibouchi
-
2014/042 ( PDF )
- A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem
- Jintai Ding, Chengdong Tao
-
2014/041 ( PDF )
- Cryptanalysis via algebraic spans
- Adi Ben-Zvi and Arkadius Kalka and Boaz Tsaban
-
2014/040 ( PDF )
- A Fast Modular Reduction Method
- Zhengjun Cao and Ruizhong Wei and Xiaodong Lin
-
2014/039 ( PDF )
- Homomorphic AES Evaluation using NTRU
- Yarkin Doroz and Yin Hu and Berk Sunar
-
2014/038 ( PDF )
- Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
- Ralf Kuesters and Enrico Scapin and Tomasz Truderung and Juergen Graf
-
2014/037 ( PDF )
- On the Security of the Pre-Shared Key Ciphersuites of TLS
- Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk
-
2014/036 ( PDF )
- A Secure Text Messaging Protocol
- Gary Belvin
-
2014/035 ( PDF )
- A new attack on RSA with a composed decryption exponent
- Abderrahmane Nitaj and Mohamed Ould Douh
-
2014/034 ( PDF )
- Authenticated Encryption with SPECK
- Chase Manny
-
2014/033 ( PDF )
- Lattice-based Group Signature Scheme with Verifier-local Revocation
- Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang
-
2014/032 ( PDF )
- Scale-Invariant Fully Homomorphic Encryption over the Integers
- Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi
-
2014/031 ( PDF )
- On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results
- Yongge Wang
-
2014/030 ( PDF )
- Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
- Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simplicio Jr.
-
2014/029 ( PDF )
- General Impossibility of Group Homomorphic Encryption in the Quantum World
- Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter
-
2014/028 ( PDF )
- Channel Equalization for Side Channel Attacks
- Colin O'Flynn and Zhizhang (David) Chen
-
2014/027 ( PDF )
- Twisting Edwards curves with isogenies
- Mike Hamburg
-
2014/026 ( PDF )
- Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
- Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger and Mélanie Favre and Tarik Graba
-
2014/025 ( PDF )
- Side-Channel Leakage through Static Power – Should We Care about in Practice? –
- Amir Moradi
-
2014/024 ( PDF )
- An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
- Ivan Damgård and Jesper Buus Nielsen
-
2014/023 ( PDF )
- Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle
- Gengran Hu and Yanbin Pan and Feng Zhang
-
2014/022 ( PDF )
- Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR
- Sourav Das
-
2014/021 ( PDF )
- Online/Offline Attribute-Based Encryption
- Susan Hohenberger and Brent Waters
-
2014/020 ( PDF )
- (De-)Constructing TLS
- Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi
-
2014/019 ( PDF )
- Lazy Modulus Switching for the BKW Algorithm on LWE
- Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
-
2014/018 ( PDF )
- Completeness for Symmetric Two-Party Functionalities - Revisited
- Yehuda Lindell and Eran Omri and Hila Zarosim
-
2014/017 ( -- withdrawn -- )
- Two-round password-only authenticated key exchange in the three-party setting
- Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
-
2014/016 ( PDF )
- Triple and Quadruple Encryption: Bridging the Gaps
- Bart Mennink and Bart Preneel
-
2014/015 ( PDF )
- Tight Security Bounds for Triple Encryption
- Jooyoung Lee
-
2014/014 ( PDF )
- Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
- Felix Günther and Bertram Poettering
-
2014/013 ( -- withdrawn -- )
- A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs
- Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol
-
2014/012 ( PDF )
- Maximal Information Coefficient Analysis
- Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
-
2014/011 ( PDF )
- Construction of New Families of MDS Diffusion Layers
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
-
2014/010 ( PDF )
- A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
- Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
-
2014/009 ( PDF )
- Characterization of EME with Linear Mixing
- Nilanjan Datta and Mridul Nandi
-
2014/008 ( PDF )
- A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
- Annelie Heuser and Olivier Rioul and Sylvain Guilley
-
2014/007 ( PDF )
- One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.
- Ethan Heilman
-
2014/006 ( PDF )
- Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
- Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
-
2014/005 ( -- withdrawn -- )
- The analysis of the Keccak with the new method called parity
- Ghanei yakhdan.mostafa
-
2014/004 ( PDF )
- MaxMinMax problem and sparse equations over finite fields
- Igor Semaev
-
2014/003 ( PDF )
- $GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials
- Xi Xiong and Haining Fan
-
2014/002 ( PDF )
- Pseudorandom Generator Based on Hard Lattice Problem
- Kuan Cheng
-
2014/001 ( PDF )
- Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
- Yalin Chen and Jue-Sam Chou
[ Cryptology ePrint archive ]