Cryptology ePrint Archive: Listing for 2015

2015/1257 ( -- withdrawn -- )
Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
Jiawei Yuan
2015/1256 ( PDF )
Mitigating Multi-Target Attacks in Hash-based Signatures
Andreas Hülsing and Joost Rijneveld and Fang Song
2015/1255 ( PDF )
Functional Encryption for Inner Product with Full Function Privacy
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/1254 ( PDF )
Identity-based Hierarchical Key-insulated Encryption without Random Oracles
Yohei Watanabe and Junji Shikata
2015/1253 ( PDF )
Non-Malleable Functions and Their Applications
Yu Chen and Baodong Qin and Jiang Zhang and Yi Deng and Sherman S. M. Chow
2015/1252 ( PDF )
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability
Sayandeep Saha and Rajat Subhra Chakraborty and Srinivasa Shashank Nuthakki and Anshul and Debdeep Mukhopadhyay
2015/1251 ( PDF )
Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
Zhengjun Cao and Zhenfu Cao
2015/1250 ( PDF )
Adaptively Secure Garbled Circuits from One-Way Functions
Brett Hemenway and Zahra Jafargholi and Rafail Ostrovsky and Alessandra Scafuro and Daniel Wichs
2015/1249 ( PDF )
Trap Me If You Can -- Million Dollar Curve
Thomas Baignères and Cécile Delerablée and Matthieu Finiasz and Louis Goubin and Tancrède Lepoint and Matthieu Rivain
2015/1248 ( PDF )
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Janaka Alawatugoda
2015/1247 ( PDF )
Missing a trick: Karatsuba variations
Mike Scott
2015/1246 ( PDF )
Universally Composable Direct Anonymous Attestation
Jan Camenisch and Manu Drijvers and Anja Lehmann
2015/1245 ( PDF )
Variation of GGH15 Multilinear Maps
Gu Chunsheng
2015/1244 ( PDF )
On values of vectorial Boolean functions and related problems in APN functions
George Shushuev
2015/1243 ( PDF )
Verifiable ASICs
Riad S. Wahby and Max Howald and Siddharth Garg and abhi shelat and Michael Walfish
2015/1242 ( PDF )
Quantum Cryptography Beyond Quantum Key Distribution
Anne Broadbent and Christian Schaffner
2015/1241 ( PDF )
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir
2015/1240 ( -- withdrawn -- )
Exploiting PUF Unreliability to Secure Wireless Sensing
Yansong Gao, Hua Ma, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1239 ( PDF )
Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality
Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1238 ( PDF )
Asynchronous Secure Multiparty Computation in Constant Time
Ran Cohen
2015/1237 ( PDF )
On the Security of One Password Authenticated Key Exchange Protocol
Stanislav V. Smyshlyaev and Igor B. Oshkin and Evgeniy K. Alekseev and Liliya R. Ahmetzyanova
2015/1236 ( PDF )
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks
Liron David and Avishai Wool
2015/1235 ( PDF )
Constant-round Leakage-resilient Zero-knowledge from Collision Resistance
Susumu Kiyoshima
2015/1234 ( PDF )
On Cryptographic Anonimity and Unpredicatbility in Secret Sharing
Ruxandra Olimid and Anat Paskin-Cherniavsky
2015/1233 ( PDF )
Degenerate Curve Attacks
Samuel Neves and Mehdi Tibouchi
2015/1232 ( PDF )
Extend FHEW to General Case
Zhou Tanping*, Liu Longfei, Yang Xiaoyuan, Han Yiliang
2015/1231 ( PDF )
When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack
Hassan Jameel Asghar and Mohamed Ali Kaafar
2015/1230 ( PDF )
Indistinguishable Proofs of Work or Knowledge
Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2015/1229 ( PDF )
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Jintai Ding and Momonari Kudo and Shinya Okumura and Tsuyoshi Takagi and Chengdong Tao
2015/1228 ( PDF )
Privacy protection in electronic education based on polymorphic pseudonymization
Eric R. Verheul
2015/1227 ( PDF )
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Akshima and Donghoon Chang and Mohona Ghosh and Aarushi Goel and Somitra Kumar Sanadhya
2015/1226 ( PDF )
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation
Oleg Mazonka and Nektarios Georgios Tsoutsos and Michail Maniatakos
2015/1225 ( PDF )
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p)
Debapriya Basu Roy and Poulami Das and Debdeep Mukhopadhyay
2015/1224 ( PDF )
Twisted Polynomials and Forgery Attacks on GCM
Mohamed Ahmed Abdelraheem and Peter Beelen and Andrey Bogdanov and Elmar Tischhauser
2015/1223 ( PDF )
Chosen-Ciphertext Security from Subset Sum
Sebastian Faust; Daniel Masny; Daniele Venturi
2015/1222 ( PDF )
On the Asymptotic Complexity of Solving LWE
Gottfried Herold and Elena Kirshanova and Alexander May
2015/1221 ( -- withdrawn -- )
Unclonable encryption revisited ($4 \times 2 = 8$)
Boris Skoric
2015/1220 ( PDF )
Two-Round Man-in-the-Middle Security from LPN
David Cash and Eike Kiltz and Stefano Tessaro
2015/1219 ( PDF )
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
Michel Abdalla and Sonia Belaïd and David Pointcheval and Sylvain Ruhault and Damien Vergnaud
2015/1218 ( PDF )
Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Anissa Sghaier and Medien Zeghid and Belgacem Bouallegue and Adel Baganne and Mohsen Machhout
2015/1217 ( PDF )
Two-faced processes and existence of RNG with proven properties
Boris Ryabko
2015/1216 ( PDF )
Non-Transferable Proxy Re-Encryption
Hui Guo and Zhenfeng Zhang and Jing Xu
2015/1215 ( PDF )
Simpler, Faster, and More Robust T-test Based Leakage Detection
A. Adam Ding and Cong Chen and Thomas Eisenbarth
2015/1214 ( PDF )
Speeding: On Low-Latency Key Exchange
Britta Hale and Tibor Jager and Sebastian Lauer and Jörg Schwenk
2015/1213 ( PDF )
Footprint scheduling for Dining-Cryptographer networks
Anna Krasnova, Moritz Neikes, and Peter Schwabe
2015/1212 ( PDF )
Choosing and generating parameters for low level pairing implementation on BN curves
Sylvain Duquesne and Nadia El Mrabet and Safia Haloui and Franck Rondepierre
2015/1211 ( PDF )
Log Analysis of Estonian Internet Voting 2013--2015
Sven Heiberg and Arnis Parsovs and Jan Willemson
2015/1210 ( PDF )
Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
Ehsan Ebrahimi Targhi and Dominique Unruh
2015/1209 ( PDF )
Fast Optimistically Fair Cut-and-Choose 2PC
Alptekin Kupcu and Payman Mohassel
2015/1208 ( PDF )
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE
Zheng Yuan,Zhen Peng,Haiwen Ou
2015/1207 ( PDF )
Comment on Demonstrations of Shor's Algorithm in the Past Decades
Zhengjun Cao and Zhenfu Cao and Lihua Liu
2015/1206 ( PDF )
Simple Photonic Emission Attack with Reduced Data Complexity
Elad Carmon and Jean-Pierre Seifert and Avishai Wool
2015/1205 ( PDF )
Deniable Functional Encryption
Angelo De Caro and Vincenzo Iovino and Adam O'Neill
2015/1204 ( PDF )
Constructing secret, verifiable auction schemes from election schemes
Elizabeth A. Quaglia and Ben Smyth
2015/1203 ( PDF )
The graph of minimal distances of bent functions and its properties
Nikolay Kolomeec
2015/1202 ( PDF )
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park and Moti Yung
2015/1201 ( PDF )
A Star-based Independent Biclique Attack on Full Rounds SQUARE
Zheng Yuan, and Zhen Peng, and Ming Mao
2015/1200 ( PDF )
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/1199 ( PDF )
A compression method for homomorphic ciphertexts
S. Carpov and R. Sirdey
2015/1198 ( PDF )
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption
Mihir Bellare and Anna Lysyanskaya
2015/1197 ( PDF )
On-the-fly Homomorphic Batching/Unbatching
Yarkın Doröz and Berk Sunar and Gizem S. Çetin
2015/1196 ( PDF )
Secure Distributed Computation on Private Inputs
Geoffroy Couteau and Thomas Peters and David Pointcheval
2015/1195 ( PDF )
Gizem S. Cetin and Yarkin Doroz and Berk Sunar and William J. Martin
2015/1194 ( PDF )
Gizem S. Çetin and Wei Dai and Yarkın Doröz and Berk Sunar
2015/1193 ( PDF )
Collision Attacks against CAESAR Candidates -- Forgery and Key-Recovery against AEZ and Marble
Thomas Fuhr and Gaëtan Leurent and Valentin Suder
2015/1192 ( PDF )
A Guide to Fully Homomorphic Encryption
Frederik Armknecht and Colin Boyd and Christopher Carr and Kristian Gjøsteen and Angela Jäschke and Christian A. Reuter and Martin Strand
2015/1191 ( PDF )
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
Chester Rebeiro and Debdeep Mukhopadhyay
2015/1190 ( PDF )
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption
Yuval Ishal and Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky
2015/1189 ( PDF )
Invariant Subspace Attack Against Full Midori64
Jian Guo and Jérémy Jean and Ivica Nikolić and Kexin Qiao and Yu Sasaki and Siang Meng Sim
2015/1188 ( PDF )
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/1187 ( PDF )
On an almost-universal hash function family with applications to authentication and secrecy codes
Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and László Tóth
2015/1186 ( PDF )
Restricted linear congruences
Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and Roberto Tauraso and László Tóth
2015/1185 ( PDF )
Efficient Pseudorandom Functions via On-the-Fly Adaptation
Nico Doettling and Dominique Schröder
2015/1184 ( PDF )
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems
Alan Szepieniec and Jintai Ding and Bart Preneel
2015/1183 ( PDF )
Authenticated Range \& Closest Point Queries in Zero-Knowledge
Esha Ghosh and Olga Ohrimenko and Roberto Tamassia
2015/1182 ( PDF )
Chaskey: a MAC Algorithm for Microcontrollers -- Status Update and Proposal of Chaskey-12 --
Nicky Mouha
2015/1181 ( PDF )
Construction of Transition Matrices for Binary FCSRs
Zhiqiang Lin, Dingyi Pei and Dongdai Lin
2015/1180 ( PDF )
Secure Comparator: a ZKP-Based Authentication System
Ignat Korchagin and Eugene Pilyankevich
2015/1179 ( PDF )
A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}
Kenichiro Hayasaka and Kazumaro Aoki and Tetsutaro Kobayashi and Tsuyoshi Takagi
2015/1178 ( PDF )
Textbook Non-Malleable Commitments
Vipul Goyal and Omkant Pandey and Silas Richelson
2015/1177 ( PDF )
On the CCA (in)security of MTProto
Jakob Jakobsen and Claudio Orlandi
2015/1176 ( PDF )
On the Efficiency of FHE-based Private Queries
Myungsun Kim and Hyung Tae Lee and San Ling and Huaxiong Wang
2015/1175 ( PDF )
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
Bhanu Prakash Gopularam and Nalini. N
2015/1174 ( PDF )
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Goutam Paul and Souvik Ray
2015/1173 ( PDF )
Secure Multiparty Computation with General Interaction Patterns
Shai Halevi and Yuval Ishai and Abhishek Jain and Eyal Kushilevitz and Tal Rabin
2015/1172 ( -- withdrawn -- )
An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem
Jingwei Hu and Ray C.C. Cheung
2015/1171 ( -- withdrawn -- )
On the Security of a access polynomial based self-healing key management schemes in wireless sensor networks
Yandong Zheng, Hua Guo
2015/1170 ( PDF )
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security
Takanori Yasuda and Xavier Dahan and Kouichi Sakurai
2015/1169 ( PDF )
Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud
Marc Green and Thomas Eisenbarth
2015/1168 ( -- withdrawn -- )
SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains
Loi Luu and Viswesh Narayanan and Kunal Baweja and Chaodong Zheng and Seth Gilbert and Prateek Saxena
2015/1167 ( PDF )
Constraining Pseudorandom Functions Privately
Dan Boneh and Kevin Lewi and David J. Wu
2015/1166 ( PDF )
Ceremonies for End-to-End Verifiable Elections
Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2015/1165 ( PDF )
Meet-in-the-Middle Attacks on Reduced-Round Midori-64
Li Lin and Wenling Wu
2015/1164 ( PDF )
Beyond Bitcoin - Part I: A critical look at blockchain-based systems
Pasquale Forte and Diego Romano and Giovanni Schmid
2015/1163 ( PDF )
A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher
Mehmet Özen and Mustafa Çoban and Ferhat Karakoç
2015/1162 ( PDF )
The Moral Character of Cryptographic Work
Phillip Rogaway
2015/1161 ( PDF )
Cyber and Physical Access Control in Legacy System Using Passwords
Jia Xu and Jianying Zhou and Liming Lu
2015/1160 ( PDF )
Cryptanalysis of multi-HFE
Yasufumi Hashimoto
2015/1159 ( PDF )
Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation
Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste
2015/1158 ( PDF )
A note on the optimality of frequency analysis vs. $\ell_p$-optimization
Marie-Sarah Lacharité and Kenneth G. Paterson
2015/1157 ( PDF )
From Identification to Signatures, Tightly: A Framework and Generic Transforms
Mihir Bellare and Bertram Poettering and Douglas Stebila
2015/1156 ( PDF )
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
Dipanjan Das and Priyanka Bose and S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
2015/1155 ( PDF )
Cross Processor Cache Attacks
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/1154 ( PDF )
NORX8 and NORX16: Authenticated Encryption for Low-End Systems
Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves
2015/1153 ( PDF )
Obliv-C: A Language for Extensible Data-Oblivious Computation
Samee Zahur and David Evans
2015/1152 ( PDF )
Privacy-preserving Friendship-based Recommender Systems
Qiang Tang and Jun Wang
2015/1151 ( PDF )
Fully Leakage-Resilient Codes
Antonio Faonio and Jesper Buus Nielsen
2015/1150 ( PDF )
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
Colin Boyd and Britta Hale and Stig Frode Mjølsnes and Douglas Stebila
2015/1149 ( PDF )
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
Takahiro Matsuda and Goichiro Hanaoka
2015/1148 ( PDF )
An Inverse-free Single-Keyed Tweakable Enciphering Scheme
Ritam Bhaumik and Mridul Nandi
2015/1147 ( -- withdrawn -- )
Collusion Resistant Aggregation from Convertible Tags
Iraklis Leontiadis and Ming Li
2015/1146 ( PDF )
libgroupsig: An extensible C library for group signatures
Jesus Diaz and David Arroyo and Francisco B. Rodriguez
2015/1145 ( PDF )
Lattice Attacks on the DGHV Homomorphic Encryption Scheme
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/1144 ( PDF )
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Olivier Blazy and Céline Chevalier and Damien Vergnaud
2015/1143 ( PDF )
A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE
Zhigang Chen and Xinxia Song
2015/1142 ( PDF )
Midori: A Block Cipher for Low Energy (Extended Version)
Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Kyoji Shibutani and Harunaga Hiwatari and Toru Akishita and Francesco Regazzoni
2015/1141 ( PDF )
Amplifying Side Channels Through Performance Degradation
Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom
2015/1140 ( PDF )
Modular Inversion Hidden Number Problem- A Lattice Approach
Pranjal Dutta
2015/1139 ( PDF )
Secret Sharing Schemes with General Access Structures (Full version)
Jian Liu, Sihem Mesnager, and Lusheng Chen
2015/1138 ( PDF )
Lightweight CRC-based Authentication
Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist
2015/1137 ( PDF )
A New Factoring Attack on Multi-Prime RSA with Small Prime Difference
Mengce Zheng and Honggang Hu
2015/1136 ( PDF )
Multi-Input Functional Encryption for Unbounded Arity Functions
Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai
2015/1135 ( PDF )
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks
Hiraku Morita and Jacob C.N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata
2015/1134 ( PDF )
$\Lambda \circ \lambda$: Functional Lattice Cryptography
Eric Crockett and Chris Peikert
2015/1133 ( PDF )
Comment on ``Realization of a scalable Shor algorithm"
Zhengjun Cao and Lihua Liu
2015/1132 ( PDF )
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders
Katsuyuki Takashima and Atsushi Takayasu
2015/1131 ( PDF )
On the Usability of Two-Factor Authentication
Ding Wang and Ping Wang
2015/1130 ( PDF )
A Note on Perfect Correctness by Derandomization
Nir Bitansky and Vinod Vaikuntanathan
2015/1129 ( PDF )
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS
Martin R. Albrecht and Kenneth G. Paterson
2015/1128 ( PDF )
New directions in nearest neighbor searching with applications to lattice sieving
Anja Becker and Léo Ducas and Nicolas Gama and Thijs Laarhoven
2015/1127 ( PDF )
Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups
Mikhail Anokhin
2015/1126 ( PDF )
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence
Daniel S. Roche and Adam J. Aviv and Seung Geol Choi
2015/1125 ( PDF )
Practical Order-Revealing Encryption with Limited Leakage
Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu
2015/1124 ( PDF )
A Linear Code and its Application into Secret Sharing
Juan Carlos Ku-Cauich and Guillermo Morales-Luna
2015/1123 ( PDF )
Practical, Predictable Lattice Basis Reduction
Daniele Micciancio and Michael Walter
2015/1122 ( -- withdrawn -- )
Schnorr Signatures in the Multi-User Setting
Eike Kiltz and Daniel Masny and Jiaxin Pan
2015/1121 ( PDF )
On the First Fall Degree of Summation Polynomials
Stavros Kousidis and Andreas Wiemers
2015/1120 ( PDF )
Even More Practical Key Exchanges for the Internet using Lattice Cryptography
Vikram Singh and Arjun Chopra
2015/1119 ( PDF )
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
Rosario Giustolisi and Vincenzo Iovino and Peter B. Rønne
2015/1118 ( PDF )
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers
Zhenzhen Bao and Peng Luo and Dongdai Lin
2015/1117 ( PDF )
Efficient implementation of AND, OR and NOT operators for ABCs
Antonio de la Piedra
2015/1116 ( PDF )
CHf-ORAM: A Constant Communication ORAM without Homomorphic Encryption
Tarik Moataz and Erik-Oliver Blass and Travis Mayberry
2015/1115 ( PDF )
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters
Avishek Adhikari and Kirill Morozov and Satoshi Obana and Partha Sarathi Roy and Kouichi Sakurai and Rui Xu
2015/1114 ( PDF )
Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension
Michał Wroński
2015/1113 ( PDF )
Multi-Input Functional Encryption with Unbounded-Message Security
Vipul Goyal and Aayush Jain and Adam O' Neill
2015/1112 ( PDF )
Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles
Prastudy Fauzi and Helger Lipmaa
2015/1111 ( -- withdrawn -- )
Comparison of TERO-cell implementations and characterisation on SRAM FPGAs
Cedric Marchand and Lilian Bossuet and AbdelKarim Cherkaoui
2015/1110 ( PDF )
Privacy-Aware Authentication in the Internet of Things
Hannes Gross and Marko Hölbl and Daniel Slamanig and Raphael Spreitzer
2015/1109 ( PDF )
Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems
Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2015/1108 ( PDF )
Recommender Systems and their Security Concerns
Jun Wang and Qiang Tang
2015/1107 ( PDF )
Concurrent Secure Computation via Non-Black Box Simulation
Vipul Goyal and Divya Gupta and Amit Sahai
2015/1106 ( PDF )
POPE: Partial Order Preserving Encoding
Daniel S. Roche and Daniel Apon and Seung Geol Choi and Arkady Yerukhimovich
2015/1105 ( PDF )
Selene: Voting with Transparent Verifiability and Coercion-Mitigation
Peter Y A Ryan andPeter B Roenne and Vincenzo Iovino
2015/1104 ( PDF )
Computing Jacobi's \theta in quasi-linear time
Hugo Labrande
2015/1103 ( PDF )
Linear codes with few weights from weakly regular bent functions based on a generic construction
Sihem Mesnager
2015/1102 ( PDF )
A Practical Cryptanalysis of the Algebraic Eraser
Adi Ben-Zvi and Simon R. Blackburn and Boaz Tsaban
2015/1101 ( PDF )
Virtual Smart Cards: How to Sign with a Password and a Server
Jan Camenisch and Anja Lehmann and Gregory Neven and Kai Samelin
2015/1100 ( PDF )
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves.
Anissa Sghaier and Loubna Ghammam and Medyen Zeghid and Sylvain Duquesne and Mohsen Machhout
2015/1099 ( PDF )
Device-Enhanced Password Protocols with Optimal Online-Offline Protection
Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena
2015/1098 ( PDF )
Ring Signature Confidential Transactions for Monero
Shen Noether
2015/1097 ( PDF )
On the Communication required for Unconditionally Secure Multiplication
Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou and Michael Raskin
2015/1096 ( PDF )
Watermarking Cryptographic Capabilities
Aloni Cohen and Justin Holmgren and Ryo Nishimaki and Vinod Vaikuntanathan and Daniel Wichs
2015/1095 ( PDF )
Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures
Vipul Goyal and Aayush Jain and Dakshita Khurana
2015/1094 ( PDF )
Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification
Divesh Aggarwal and Kaave Hosseini and Shachar Lovett
2015/1093 ( PDF )
C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs
Ahmed Kosba and Zhichao Zhao and Andrew Miller and Yi Qian and Hubert Chan and Charalampos Papamanthou and Rafael Pass and abhi shelat and Elaine Shi
2015/1092 ( PDF )
Post-quantum key exchange - a new hope
Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe
2015/1091 ( -- withdrawn -- )
Construction for de Bruijn Sequences with Large Orders
Junwu Dong and Dingyi Pei
2015/1090 ( PDF )
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
Vipul Goyal and Dakshita Khurana and Ilya Mironov and Omkant Pandey and Amit Sahai
2015/1089 ( PDF )
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Ronald Cramer and Ivan Bjerre Damgård and Nico Döttling and Serge Fehr and Gabriele Spini
2015/1088 ( PDF )
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015
Eiichiro Fujisaki and Keita Xagawa
2015/1087 ( -- withdrawn -- )
Efficient Signature Schemes from R-LWE
Ting Wang and Jianping Yu and Guoqiang Han and Peng Zhang
2015/1086 ( PDF )
Chicken or the Egg - Computational Data Attacks or Physical Attacks
Julien Allibert and Benoit Feix and Georges Gagnerot and Ismael Kane and Hugues Thiebeauld and Tiana Razafindralambo
2015/1085 ( PDF )
Malicious Keccak
Pawel Morawiecki
2015/1084 ( PDF )
Patchable Obfuscation
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/1083 ( PDF )
Implementation Attacks on Post-Quantum Cryptographic Schemes
Mostafa Taha and Thomas Eisenbarth
2015/1082 ( PDF )
Delegating RAM Computations with Adaptive Soundness and Privacy
Prabhanjan Ananth and Yu-Chi Chen and Kai-Min Chung and Huijia Lin and Wei-Kai Lin
2015/1081 ( PDF )
NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture
Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, and Howon Kim
2015/1080 ( PDF )
Variations to the cryptographics algorithms AES and TWOFISH
P. Freyre, N. Díaz and O. Cuellar
2015/1079 ( PDF )
De Bruijn Sequences from Symmetric Shift Registers
Ming Li and Mingxing Wang and Dongdai Lin
2015/1078 ( PDF )
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
2015/1077 ( PDF )
Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn
Dibyendu Roy and Sourav Mukhopadhyay
2015/1076 ( PDF )
An appendix for a recent paper of Kim
Razvan Barbulescu
2015/1075 ( PDF )
Cybersecurity in an era with quantum computers: will we be ready?
Michele Mosca
2015/1074 ( PDF )
Succinct Adaptive Garbled RAM
Ran Canetti and Yilei Chen and Justin Holmgren and Mariana Raykova
2015/1073 ( PDF )
Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs
David Derler and Daniel Slamanig
2015/1072 ( PDF )
Quantum One-Time Memories from Stateless Hardware
Anne Broadbent and Sevag Gharibian and Hong-Sheng Zhou
2015/1071 ( PDF )
Revisiting Secure Two-Party Computation with Rational Players
Arpita Maitra, Goutam Paul and Asim K. Pal
2015/1070 ( PDF )
Barriers to Black-Box Constructions of Traitor Tracing Systems
Bo Tang and Jiapeng Zhang
2015/1069 ( PDF )
Indifferentiability of 8-Round Feistel Networks
Yuanxi Dai and John Steinberger
2015/1068 ( PDF )
Black-Box Parallel Garbled RAM
Steve Lu and Rafail Ostrovsky
2015/1067 ( PDF )
Public Verifiability in the Covert Model (Almost) for Free
Vladimir Kolesnikov and Alex J. Malozemoff
2015/1066 ( PDF )
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential
Haipeng Qu, Peng Shang, Xi-Jun Lin, and Lin Sun
2015/1065 ( PDF )
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM
Christopher Fletcher and Muhammad Naveed and Ling Ren and Elaine Shi and Emil Stefanov
2015/1064 ( PDF )
Déjà Q: Encore! Un Petit IBE
Hoeteck Wee
2015/1063 ( PDF )
Optimal Computational Split-state Non-malleable Codes
Divesh Aggarwal; Shashank Agrawal; Divya Gupta; Hemanta K. Maji; Omkant Pandey; Manoj Prabhakaran
2015/1062 ( PDF )
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Mohammad Mahmoody; Ameer Mohammed; Soheil Nematihaji; Rafael Pass; abhi shelat
2015/1061 ( PDF )
On Basing Private Information Retrieval on NP-Hardness
Tianren Liu and Vinod Vaikuntanathan
2015/1060 ( PDF )
Complete addition formulas for prime order elliptic curves
Joost Renes and Craig Costello and Lejla Batina
2015/1059 ( PDF )
A General Framework for Redactable Signatures and New Constructions
David Derler and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2015/1058 ( PDF )
Rational Sumchecks
Siyao Guo; Pavel Hubacek; Alon Rosen; Margarita Vald
2015/1057 ( PDF )
The Complexity of Computing the Optimal Composition of Differential Privacy
Jack Murtagh, Salil Vadhan
2015/1056 ( PDF )
Information-theoretic Local Non-malleable Codes and their Applications
Nishanth Chandran; Bhavana Kanukurthi; Srinivasan Raghuraman
2015/1055 ( PDF )
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits
Yuval Ishai; Mor Weiss; Guang Yang
2015/1054 ( PDF )
Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS
HUI ZHAO and Kouichi Sakurai
2015/1053 ( PDF )
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
Binyi Chen; Huijia Lin; Stefano Tessaro
2015/1052 ( PDF )
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management
Chenglu Jin and Xiaolin Xu and Wayne Burleson and Ulrich Rührmair and Marten van Dijk
2015/1051 ( PDF )
Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme
Jayaprakash Kar
2015/1050 ( PDF )
Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem
Thuraya M. Qaradaghi and Newroz N. Abdulrazaq
2015/1049 ( PDF )
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Thomas Peyrin and Yannick Seurin
2015/1048 ( PDF )
Verifiable Random Functions from Standard Assumptions
Dennis Hofheinz; Tibor Jager
2015/1047 ( PDF )
Reconfigurable Cryptography: A flexible approach to long-term security
Julia Hesse and Dennis Hofheinz and Andy Rupp
2015/1046 ( PDF )
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
Benny Applebaum and Pavel Raykov
2015/1045 ( PDF )
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs
Gefei Li and Yuval Yarom and Damith C. Ranasinghe
2015/1044 ( PDF )
Homomorphic evaluation requires depth
Andrej Bogdanov and Chin Ho Lee
2015/1043 ( PDF )
The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle
Subhamoy Maitra
2015/1042 ( PDF )
ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM
Andreas Hülsing and Joost Rijneveld and Peter Schwabe
2015/1041 ( PDF )
The Number of Boolean Functions with Multiplicative Complexity 2
Magnus Gausdal Find and Daniel Smith-Tone and Meltem Sonmez Turan
2015/1040 ( PDF )
Fully Homomorphic Encryption with Composite Number Modulus
Masahiro Yagisawa
2015/1039 ( PDF )
Maturity and Performance of Programmable Secure Computation
David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen
2015/1038 ( PDF )
Revisiting LEGOs: Optimizations, Analysis, and their Limit
Yan Huang and Ruiyu Zhu
2015/1037 ( PDF )
Cryptanalysis of GGH15 Multilinear Maps
Jean-Sebastien Coron and Moon Sung Lee and Tancrede Lepoint and Mehdi Tibouchi
2015/1036 ( PDF )
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound
Selcuk Kavut and Subhamoy Maitra
2015/1035 ( PDF )
CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
Britta Hale and Christopher Carr and Danilo Gligoroski
2015/1034 ( PDF )
Real time detection of cache-based side-channel attacks using Hardware Performance Counters
Marco Chiappetta and Erkay Savas and Cemal Yilmaz
2015/1033 ( PDF )
The Ultimate Transposition Cipher (UTC)
Gideon Samid
2015/1032 ( PDF )
Essentially Optimal Robust Secret Sharing with Maximal Corruptions
Allison Bishop and Valerio Pastro and Rajmohan Rajaraman and Daniel Wichs
2015/1031 ( PDF )
Secure Dating with Four or Fewer Cards
Antonio Marcedone and Zikai Wen and Elaine Shi
2015/1030 ( PDF )
Vadim N.Tsypyschev
2015/1029 ( PDF )
The Energy Budget for Wireless Security: Extended Version
Dave Singelée and Stefaan Seys and Lejla Batina and Ingrid Verbauwhede
2015/1028 ( PDF )
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3
Hristina Mihajloska and Danilo Gligoroski and Simona Samardjiska
2015/1027 ( PDF )
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case
Taechan Kim and Razvan Barbulescu
2015/1026 ( PDF )
Hardness Estimation of LWE via Band Pruning
Yoshinori Aono and Le Trieu Phong and Lihua Wang
2015/1025 ( PDF )
PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers
Dieter Schmidt
2015/1024 ( -- withdrawn -- )
Parallel Implementation of Number Theoretic Transform
Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Taehwan Park and Howon Kim
2015/1023 ( PDF )
Indistinguishability Obfuscation with Constant Size Overhead
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/1022 ( PDF )
Recent progress on the elliptic curve discrete logarithm problem
Steven D. Galbraith and Pierrick Gaudry
2015/1021 ( PDF )
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application
Katsuyuki Takashima
2015/1020 ( PDF )
Attacking the Network Time Protocol
Aanchal Malhotra and Isaac E. Cohen and Erik Brakke and Sharon Goldberg
2015/1019 ( PDF )
Speed-Security Tradeoffs in Blockchain Protocols
Aggelos Kiayias and Giorgos Panagiotakos
2015/1018 ( PDF )
A Riddle Wrapped in an Enigma
Neal Koblitz and Alfred Menezes
2015/1017 ( PDF )
Functional Encryption: Decentralised and Delegatable
Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
2015/1016 ( PDF )
One-Key Compression Function Based MAC with Security beyond Birthday Bound
Avijit Dutta and Mridul Nandi and Goutam Paul
2015/1015 ( PDF )
On Bitcoin as a public randomness source
Joseph Bonneau and Jeremy Clark and Steven Goldfeder
2015/1014 ( PDF )
Fast Fourier Orthogonalization
Léo Ducas and Thomas Prest
2015/1013 ( PDF )
Inception Makes Non-malleable Codes Stronger
Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
2015/1012 ( PDF )
An Efficient Multiple PKG Compatible Identity Based Authenticated Key Agreement protocol
Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
2015/1011 ( PDF )
Hierarchical Functional Encryption
Zvika Brakerski and Gil Segev
2015/1010 ( PDF )
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
2015/1009 ( PDF )
Applications of Key Recovery Cube-attack-like
Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
2015/1008 ( PDF )
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
2015/1007 ( PDF )
How to Vote Privately Using Bitcoin
Zhichao Zhao and T-H. Hubert Chan
2015/1006 ( PDF )
Confidential Benchmarking based on Multiparty Computation
Ivan Damgård and Kasper Damgård and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
2015/1005 ( PDF )
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
Wenbin Zhang and Chik How Tan
2015/1004 ( PDF )
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
2015/1003 ( PDF )
Results on polynomial interpolation with mixed modular operations and unknown moduli
Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
2015/1002 ( PDF )
got HW crypto? On the (in)security of a Self-Encrypting Drive series
Gunnar Alendal and Christian Kison and modg
2015/1001 ( PDF )
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
2015/1000 ( PDF )
Factoring as a Service
Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
2015/999 ( PDF )
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves
2015/998 ( PDF )
All or Nothing at All
Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
2015/997 ( PDF )
Incremental Program Obfuscation
Sanjam Garg and Omkant Pandey
2015/996 ( PDF )
Multi-user Schnorr security, revisited
Daniel J. Bernstein
2015/995 ( PDF )
Updates on Sorting of Fully Homomorphic Encrypted Data
Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed
2015/994 ( -- withdrawn -- )
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/993 ( PDF )
Bi-Deniable Inner Product Encryption from LWE
Daniel Apon and Xiong Fan and Feng-Hao Liu
2015/992 ( PDF )
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
Jinsu Kim and Sungwook Kim and Jae Hong Seo
2015/991 ( PDF )
Ed3363 (HighFive) -- An alternative Elliptic Curve
Mike Scott
2015/990 ( PDF )
Encryption Switching Protocols
Geoffroy Couteau and Thomas Peters and David Pointcheval
2015/989 ( PDF )
Fast Oblivious AES\\A dedicated application of the MiniMac protocol
Ivan Damgård and Rasmus Winther Zakarias
2015/988 ( PDF )
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram
2015/987 ( PDF )
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
Yehuda Lindell and Ben Riva
2015/986 ( PDF )
Bit Coincidence Mining Algorithm
Koh-ichi Nagao
2015/985 ( PDF )
Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
Koh-ichi Nagao
2015/984 ( PDF )
Complexity of ECDLP under the First Fall Degree Assumption
Koh-ichi Nagao
2015/983 ( PDF )
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
Ping Ngai Chung and Craig Costello and Benjamin Smith
2015/982 ( PDF )
A note on constructions of bent functions from involutions
Sihem Mesnager
2015/981 ( PDF )
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
Ayantika Chatterjee and Indranil Sengupta
2015/980 ( PDF )
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
2015/979 ( PDF )
Guidelines for Using the CryptDB System Securely
Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
2015/978 ( PDF )
The OPTLS Protocol and TLS 1.3
Hugo Krawczyk and Hoeteck Wee
2015/977 ( PDF )
Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³)
Michał Wroński
2015/976 ( PDF )
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Alex Biryukov and Léo Perrin
2015/975 ( PDF )
Extended Functionality in Verifiable Searchable Encryption
James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick
2015/974 ( PDF )
The Conjoined Microprocessor
Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and Rémi Géraud David Naccache and Jean Vuillemin
2015/973 ( PDF )
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
Ashwin Jha and Mridul Nandi
2015/972 ( PDF )
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
David Pointcheval and Olivier Sanders and Jacques Traoré
2015/971 ( PDF )
Attacks on Search RLWE
Hao Chen, Kristin Lauter, and Katherine E. Stange
2015/970 ( -- withdrawn -- )
Multilinear Maps over the Integers Using Modulus Switching
Gu Chunsheng
2015/969 ( PDF )
Zero-Knowledge Interactive Proof Systems for New Lattice Problems
Claude Crepéau and Raza Ali Kazmi
2015/968 ( PDF )
Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning
Gaëtan Leurent
2015/967 ( PDF )
Freestart collision for full SHA-1
Marc Stevens and Pierre Karpman and Thomas Peyrin
2015/966 ( PDF )
Vulnerabilities of ``McEliece in the World of Escher"
Dustin Moody and Ray Perlner
2015/965 ( PDF )
Private Genome Analysis through Homomorphic Encryption
Miran Kim and Kristin Lauter
2015/964 ( PDF )
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
Danping Shi and Lei Hu and Siwei Sun and Ling Song
2015/963 ( PDF )
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
Houda Ferradi and Rémi Géraud and David Naccache and Assia Tria
2015/962 ( PDF )
Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
2015/961 ( PDF )
Short Structure-Preserving Signatures
Essam Ghadafi
2015/960 ( PDF )
More Efficient Secure Outsourcing Methods for Bilinear Maps
Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol
2015/959 ( PDF )
Cryptanalysis of the Round-Reduced Kupyna Hash Function
Jian Zou, Le Dong
2015/958 ( PDF )
Building Single-Key Beyond Birthday Bound Message Authentication Code
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
2015/957 ( PDF )
Delegating RAM Computations
Yael Tauman Kalai and Omer Paneth
2015/956 ( PDF )
Analysis of the Kupyna-256 Hash Function
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/955 ( PDF )
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
Mridul Nandi and Tapas Pandit
2015/954 ( PDF )
Online-Offline Homomorphic Signatures for Polynomial Functions
Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/953 ( PDF )
Gaussian Sampling Precision in Lattice Cryptography
Markku-Juhani O. Saarinen
2015/952 ( PDF )
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
2015/951 ( PDF )
Nearly Optimal Robust Secret Sharing
Mahdi Cheraghchi
2015/950 ( PDF )
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Shota Goto and Junji Shikata
2015/949 ( PDF )
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali Kaafar
2015/948 ( PDF )
A Provably Secure Short Signature Scheme from Coding Theory
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/947 ( PDF )
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
2015/946 ( PDF )
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem
Alex Biryukov and Dmitry Khovratovich
2015/945 ( PDF )
Secure Set-based Policy Checking and Its Application to Password Registration
Changyu Dong and Franziskus Kiefer
2015/944 ( PDF )
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
Palash Sarkar and Shashank Singh
2015/943 ( PDF )
Sandy2x: New Curve25519 Speed Records
Tung Chou
2015/942 ( PDF )
Secrecy and independence for election schemes
Ben Smyth
2015/941 ( PDF )
Cryptanalysis of the New Multilinear Map over the Integers
Brice Minaud and Pierre-Alain Fouque
2015/940 ( PDF )
Secure Association for the Internet of Things
Almog Benin and Sivan Toledo and Eran Tromer
2015/939 ( PDF )
A Decade of Lattice Cryptography
Chris Peikert
2015/938 ( PDF )
Lattice Based Cryptography for Beginners
Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim
2015/937 ( PDF )
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung
2015/936 ( -- withdrawn -- )
A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
2015/935 ( PDF )
Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity
Céline Blondeau and Kaisa Nyberg
2015/934 ( PDF )
Cryptanalysis of the New CLT Multilinear Maps
Jung Hee Cheon, and Changmin Lee, and Hansol Ryu
2015/933 ( PDF )
Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme
Jayaprakash Kar
2015/932 ( PDF )
Using Tweaks To Design Fault Resistant Ciphers
Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay
2015/931 ( PDF )
Fast and Secure Three-party Computation: The Garbled Circuit Approach
Payman Mohassel and Mike Rosulek and Ye Zhang
2015/930 ( PDF )
Nearly Sparse Linear Algebra and application to Discrete Logarithms Computations
Antoine Joux and Cécile Pierrot
2015/929 ( PDF )
Are you The One to Share? Secret Transfer with Access Structure
Yongjun Zhao and Sherman S.M. Chow
2015/928 ( PDF )
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
Hassan Noura and Damien Couroussé
2015/927 ( PDF )
Rich Queries on Encrypted Data: Beyond Exact Matches
Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner
2015/926 ( PDF )
Vadim N.Tsypyschev and Julia S.Vinogradova
2015/925 ( PDF )
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/924 ( PDF )
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
2015/923 ( PDF )
Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay
2015/922 ( PDF )
Localised Multisecret Sharing
Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
2015/921 ( PDF )
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
Kwangsu Lee and Jong Hwan Park
2015/920 ( PDF )
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese and Antonio Faonio and Seny Kamara
2015/919 ( PDF )
Privacy-preserving computation with trusted computing via Scramble-then-Compute
Hung Dang and Anh Dinh and Ee-Chien Chang and Beng Chin Ooi
2015/918 ( PDF )
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk
2015/917 ( PDF )
Private Proximity Testing on Steroids: An NTRU-based Protocol
Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche
2015/916 ( PDF )
Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/915 ( PDF )
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes
Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
2015/914 ( PDF )
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2015/913 ( PDF )
Functional Signcryption: Notion, Construction, and Applications
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/912 ( PDF )
Extraction of intrinsic structure for Hardware Trojan detection
Maxime Lecomte and Jacques Fournier and Philippe Maurine
2015/911 ( PDF )
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin
2015/910 ( PDF )
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
Alonso González and Alejandro Hevia and Carla Ràfols
2015/909 ( PDF )
On the Impact of Known-Key Attacks on Hash Functions
Bart Mennink, Bart Preneel
2015/908 ( PDF )
Linear Distinguishers in the Key-less Setting: Application to PRESENT
Martin M. Lauridsen and Christian Rechberger
2015/907 ( PDF )
Cryptographic Assumptions: A Position Paper
Shafi Goldwasser and Yael Tauman Kalai
2015/906 ( PDF )
RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors
Adnan Baysal and Suhap Sahin
2015/905 ( PDF )
Mapping the Intel Last-Level Cache
Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser
2015/904 ( PDF )
Almost-tight Identity Based Encryption against Selective Opening Attack
Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen
2015/903 ( PDF )
A Note on the Indifferentiability of the 10-Round Feistel Construction
Yannick Seurin
2015/902 ( PDF )
Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques
Kexin Qiao and Lei Hu and Siwei Sun
2015/901 ( PDF )
A Unified Approach to MPC with Preprocessing using OT
Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl
2015/900 ( PDF )
New Results on Identity-based Encryption from Quadratic Residuosity
Ferucio Laurentiu Tiplea and Emil Simion
2015/899 ( PDF )
Privacy-preserving Attribute Based Searchable Encryption
Payal Chaudhari and Maniklal Das
2015/898 ( PDF )
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/897 ( PDF )
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography
Prosanta Gope
2015/896 ( PDF )
Improved Attacks on Reduced-Round Camellia-128/192/256
Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang
2015/895 ( PDF )
Rogue Decryption Failures: Reconciling AE Robustness Notions
Guy Barwell and Dan Page and Martijn Stam
2015/894 ( PDF )
Comparison of cube attacks over different vector spaces
Richard Winter and Ana Salagean and Raphael C.-W. Phan
2015/893 ( PDF )
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
2015/892 ( PDF )
Security Against Related Randomness Attacks via Reconstructive Extractors
Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee
2015/891 ( PDF )
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy
Sébastien Canard and Viet Cuong Trinh
2015/890 ( PDF )
MI-T-HFE, a New Multivariate Signature Scheme
Wenbin Zhang and Chik How Tan
2015/889 ( PDF )
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
Anamaria Costache and Nigel P. Smart
2015/888 ( PDF )
Tweak-Length Extension for Tweakable Blockciphers
Kazuhiko Minematsu and Tetsu Iwata
2015/887 ( PDF )
Composable Security in the Tamper Proof Hardware Model under Minimal Complexity
Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2015/886 ( PDF )
Applying Cryptographic Acceleration Techniques to Error Correction
Rémi Géraud and Diana-Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion
2015/885 ( PDF )
A New Standard of Ukraine: The Kupyna Hash Function
Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov
2015/884 ( PDF )
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/883 ( -- withdrawn -- )
Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security
Avijit Dutta and Goutam Paul
2015/882 ( PDF )
Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks
Margaux Dugardin and Sylvain Guilley and Martin Moreau and Zakaria Najm and Pablo Rauzy
2015/881 ( PDF )
Generic Security of NMAC and HMAC with Input Whitening
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/880 ( PDF )
Generic Efficient Dynamic Proofs of Retrievability
Mohammad Etemad and Alptekin Küpçü
2015/879 ( PDF )
Computing information on domain parameters from public keys selected uniformly at random
Martin Ekerå
2015/878 ( PDF )
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model
Edward Eaton and Fang Song
2015/877 ( PDF )
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
Christophe Clavier and Julien Francq and Antoine Wurcker
2015/876 ( PDF )
10-Round Feistel is Indifferentiable from an Ideal Cipher
Dana Dachman-Soled and Jonathan Katz and Aishwarya Thiruvengadam
2015/875 ( PDF )
Bent and Semi-bent Functions via Linear Translators
Neşe Koçak, Sihem Mesnager and Ferruh Özbudak
2015/874 ( PDF )
Indifferentiability of 10-Round Feistel Networks
Yuanxi Dai and John Steinberger
2015/873 ( PDF )
On the Diffusion Property of Iterated Functions
Jian Liu, Sihem Mesnager, and Lusheng Chen
2015/872 ( PDF )
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
2015/871 ( PDF )
Photonic Side Channel Analysis of Arbiter PUFs
Shahin Tajik and Enrico Dietz and Sven Frohmann and Helmar Dittrich and Dmitry Nedospasov and Clemens Helfmeier and Jean-Pierre Seifert and Christian Boit and Heinz-Wilhelm Hübers
2015/870 ( PDF )
Gambling, Computational Information and Encryption Security
Mohammad Hajiabadi and Bruce M. Kapron
2015/869 ( PDF )
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs
2015/868 ( PDF )
Optimally Secure Block Ciphers from Ideal Primitives
Stefano Tessaro
2015/867 ( PDF )
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
2015/866 ( PDF )
Graded Encoding, Variations on a Scheme
Shai Halevi
2015/865 ( PDF )
Card-based Cryptographic Protocols Using a Minimal Number of Cards
Alexander Koch and Stefan Walzer and Kevin Härtel
2015/864 ( PDF )
Encryption Performance Improvements of the Paillier Cryptosystem
Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets
2015/863 ( PDF )
Is There an Oblivious RAM Lower Bound?
Elette Boyle and Moni Naor
2015/862 ( PDF )
Idealizing Identity-Based Encryption
Dennis Hofheinz and Christian Matt and Ueli Maurer
2015/861 ( PDF )
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
Chun Guo and Dongdai Lin
2015/860 ( PDF )
Selective Opening Security for Receivers
Carmit Hazay and Arpita Patra and Bogdan Warinschi
2015/859 ( PDF )
Factor Base Discrete Logarithms in Kummer Extensions
Dianyan Xiao and Jincheng Zhuang and Qi Cheng
2015/858 ( PDF )
Skipping the $q$ in Group Signatures
Olivier Blazy and Saqib A. Kakvi
2015/857 ( PDF )
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
Benjamin Fuller and Ariel Hamlin
2015/856 ( PDF )
Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass
2015/855 ( -- withdrawn -- )
A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
2015/854 ( PDF )
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu
2015/853 ( PDF )
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Georg Fuchsbauer and Felix Heuer and Eike Kiltz and Krzysztof Pietrzak
2015/852 ( PDF )
Analysis of a key exchange protocol based on tropical matrix algebra
Matvei Kotov and Alexander Ushakov
2015/851 ( PDF )
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
Benoît Cogliati and Yannick Seurin
2015/850 ( PDF )
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable
Zhen Liu and Duncan S. Wong
2015/849 ( PDF )
Regulating the Pace of von Neumann Correctors
Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, and Amaury de Wargny
2015/848 ( PDF )
The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Meltem Sonmez Turan and Rene Peralta
2015/847 ( PDF )
Exploring Energy Efficiency of Lightweight Block Ciphers
Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
2015/846 ( PDF )
Characterization of Secure Multiparty Computation Without Broadcast
Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem
2015/845 ( PDF )
Cryptanalysis of the Quadratic Zero-Testing of GGH
Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrède Lepoint and Amit Sahai and Mehdi Tibouchi
2015/844 ( PDF )
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2015/843 ( PDF )
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
David Derler and Daniel Slamanig
2015/842 ( PDF )
On Linkability and Malleability in Self-blindable Credentials
Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers
2015/841 ( PDF )
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices
Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
2015/840 ( PDF )
Related-key Impossible Differential Analysis of Full Khudra
Qianqian Yang and Lei Hu and Siwei Sun and Ling Song
2015/839 ( PDF )
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?
David Wong
2015/838 ( PDF )
Offline Witness Encryption
Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
2015/837 ( PDF )
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation
Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA
2015/836 ( PDF )
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
Benjamin Wesolowski and Pascal Junod
2015/835 ( PDF )
On near prime-order elliptic curves with small embedding degrees (Full version)
Duc-Phong Le and Nadia El Mrabet and Chik How Tan
2015/834 ( -- withdrawn -- )
Authentication Using Side-Channel Information
Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata
2015/833 ( PDF )
Efficient Key Authentication Service for Secure End-to-end Communications
Mohammad Etemad and Alptekin Küpçü
2015/832 ( PDF )
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
David McCann, Kerstin Eder, Elisabeth Oswald
2015/831 ( PDF )
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk
2015/830 ( PDF )
Unique Signature with Short Output from CDH Assumption
Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
2015/829 ( PDF )
Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1
Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
2015/828 ( PDF )
State-recovery analysis of Spritz
Ralph Ankele and Stefan Koelbl and Christian Rechberger
2015/827 ( PDF )
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee
2015/826 ( PDF )
Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
Dario Catalano and Dario Fiore and Luca Nizzardo
2015/825 ( PDF )
The Emperor's New Password Creation Policies
Ding Wang and Ping Wang
2015/824 ( PDF )
Efficient Fully Structure-Preserving Signatures for Large Messages
Jens Groth
2015/823 ( PDF )
Efficient (ideal) lattice sieving using cross-polytope LSH
Anja Becker and Thijs Laarhoven
2015/822 ( PDF )
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Akshayaram Srinivasan and C. Pandu Rangan
2015/821 ( PDF )
A general framework for building noise-free homomorphic cryptosystems
Gérald Gavin
2015/820 ( PDF )
Extended Nested Dual System Groups, Revisited
Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang
2015/819 ( PDF )
Improving the Big Mac Attack on Elliptic Curve Cryptography
Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
2015/818 ( PDF )
cuHE: A Homomorphic Encryption Accelerator Library
Wei Dai and Berk Sunar
2015/817 ( PDF )
Secure Multiparty Computation of a Social Network
Varsha Bhat Kukkala and Jaspal Singh Saini and S.R.S. Iyengar
2015/816 ( PDF )
Analysis of Keyless Massive MIMO-based Cryptosystem Security
Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev
2015/815 ( PDF )
On the Power of Hierarchical Identity-Based Encryption
Mohammad Mahmoody and Ameer Mohammed
2015/814 ( PDF )
CLKS: Certificateless Keyword Search on Encrypted Data
Qingji Zheng and Xiangxue Li and Aytac Azgin
2015/813 ( PDF )
Revisiting Turning Online Cipher Off
Ritam Bhaumik and Mridul Nandi
2015/812 ( PDF )
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob
Alex Biryukov and Léo Perrin and Aleksei Udovenko
2015/811 ( PDF )
Key-recovery attacks against the MAC algorithm Chaskey
Chrysanthi Mavromati
2015/810 ( PDF )
Improved OR Composition of Sigma-Protocols
Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2015/809 ( PDF )
New Techniques for Electronic Voting
Alan Szepieniec and Bart Preneel
2015/808 ( PDF )
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
Mihir Bellare and Joseph Jaeger and Daniel Kane
2015/807 ( PDF )
Fair Distributed Computation of Reactive Functions
Juan Garay and Björn Tackmann and Vassilis Zikas
2015/806 ( PDF )
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
2015/805 ( PDF )
A classification of elliptic curves with respect to the GHS attack in odd characteristic
Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
2015/804 ( PDF )
Sumit Chakraborty
2015/803 ( PDF )
Statistical and Algebraic Properties of DES
Stian Fauskanger and Igor Semaev
2015/802 ( PDF )
Ciphertext-only attack on d*d Hill in O(d13^d)
Shahram Khazaei and Siavash Ahmadi
2015/801 ( PDF )
Scalar Blinding on Elliptic Curves based on Primes with Special Structure
Scott Fluhrer
2015/800 ( -- withdrawn -- )
Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
Jihoon Cho, Kyu Young Choi, and Dukjae Moon
2015/799 ( PDF )
Secure Binary Field Multiplication
Hwajeong Seo and Chien-Ning Chen and Zhe Liu and Yasuyuki Nogami and Taehwan Park and Jongseok Choi and Howon Kim
2015/798 ( -- withdrawn -- )
A Stateless Cryptographically-Secure Physical Unclonable Function
Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
2015/797 ( PDF )
What Security Can We Achieve within 4 Rounds?
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/796 ( PDF )
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi
2015/795 ( PDF )
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman
2015/794 ( PDF )
Safe-Errors on SPA Protected implementations with the Atomicity Technique
Pierre-Alain Fouque and Sylvain Guilley and Cédric Murdica and David Naccache
2015/793 ( PDF )
Algorithmic Information Theory for Obfuscation Security
Rabih Mohsen and Alexandre Miranda Pinto
2015/792 ( PDF )
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz and Vanishree Rao and Daniel Wichs
2015/791 ( PDF )
On the Equivalence of Obfuscation and Multilinear Maps
Omer Paneth and Amit Sahai
2015/790 ( PDF )
On weak and strong 2^k-bent Boolean functions
Pantelimon Stanica
2015/789 ( PDF )
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator
Gangqiang Yang and Mark D. Aagaard and Guang Gong
2015/788 ( PDF )
Cracking-Resistant Password Vaults using Natural Language Encoders
Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart
2015/787 ( PDF )
Backtracking-Assisted Multiplication
Houda Ferradi and Rémi Géraud and Diana Maimut and David Naccache and Hang Zhou
2015/786 ( PDF )
Buying AES Design Resistance with Speed and Energy
Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto
2015/785 ( PDF )
Double-Speed Barrett Moduli
Rémi Géraud and Diana Maimut and David Naccache
2015/784 ( PDF )
Threshold FlipThem: When the winner does not need to take all
David Leslie and Chris Sherfield and Nigel P. Smart
2015/783 ( PDF )
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
Ivan Tjuawinata and Tao Huang and Hongjun Wu
2015/782 ( PDF )
Secure two-party computation in applied pi-calculus: models and verification
Sergiu Bursuc
2015/781 ( PDF )
Twisted Hessian curves
Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange
2015/780 ( PDF )
Multilinear Maps from Obfuscation
Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson
2015/779 ( PDF )
A Simple Scheme, for Strengthening Product-sum Type PKC
2015/778 ( -- withdrawn -- )
Modular Inversion Hidden Number Problem -- Correction and Improvements
Santanu Sarkar
2015/777 ( -- withdrawn -- )
Arithmetic Walsh Transform of Boolean Functions with Linear Structures
Qinglan Zhao and Dong Zheng and Xiangxue Li and Xiaoli Dong
2015/776 ( PDF )
Functional Encryption for Turing Machines
Prabhanjan Ananth and Amit Sahai
2015/775 ( PDF )
Efficient MDS Diffusion Layers Through Decomposition of Matrices
S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo
2015/774 ( PDF )
Revisiting Prime Power RSA
Santanu Sarkar
2015/773 ( PDF )
Distinguishing a truncated random permutation from a random function
Shoni Gilboa and Shay Gueron
2015/772 ( PDF )
Non-Malleable Encryption: Simpler, Shorter, Stronger
Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
2015/771 ( PDF )
A SAT-based Public Key Cryptography Scheme
Sebastian E. Schmittner
2015/770 ( PDF )
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
Michele Ciampi and Giuseppe Persiano and Luisa Siniscalchi and Ivan Visconti
2015/769 ( PDF )
On the Hardness of Learning with Rounding over Small Modulus
Andrej Bogdanov and Siyao Guo and Daniel Masny and Silas Richelson and Alon Rosen
2015/768 ( PDF )
Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar
2015/767 ( PDF )
Dual EC: A Standardized Back Door
Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen
2015/766 ( PDF )
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng
2015/765 ( PDF )
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Victoria Fehr and Marc Fischlin
2015/764 ( PDF )
On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2})
Jincheng Zhuang and Qi Cheng
2015/763 ( PDF )
Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and Takafumi Aoki
2015/762 ( PDF )
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef
2015/761 ( PDF )
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
William Diehl
2015/760 ( PDF )
Investigating SRAM PUFs in large CPUs and GPUs
Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen
2015/759 ( PDF )
Cryptanalysis of Gu's ideal multilinear map
Alice Pellet-Mary and Damien Stehle
2015/758 ( PDF )
Ring-LWE Cryptography for the Number Theorist
Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
2015/757 ( PDF )
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks
Matthias Hamann and Matthias Krause
2015/756 ( PDF )
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/755 ( PDF )
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen and Peter Schwabe
2015/754 ( PDF )
Related-Key Attack on Full-Round PICARO
Anne Canteaut and Virginie Lallemand and María Naya-Plasencia
2015/753 ( PDF )
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen
2015/752 ( PDF )
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov and Gil Segev
2015/751 ( PDF )
Fast Garbling of Circuits Under Standard Assumptions
Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
2015/750 ( PDF )
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki and Daniel Wichs and Mark Zhandry
2015/749 ( PDF )
Affine Equivalence and its Application to Tightening Threshold Implementations
Pascal Sasdrich and Amir Moradi and Tim Güneysu
2015/748 ( PDF )
A More Cautious Approach to Security Against Mass Surveillance
Jean Paul Degabriele and Pooya Farshim and Bertram Poettering
2015/747 ( PDF )
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du
2015/746 ( PDF )
A 2^{70} Attack on the Full MISTY1
Achiya Bar-On
2015/745 ( PDF )
Faster ECC over F2571 (feat. PMULL)
Hwajeong Seo
2015/744 ( PDF )
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
Ege Gulcan and Aydin Aysu and Patrick Schaumont
2015/743 ( PDF )
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Benoit Libert and Thomas Peters and Moti Yung
2015/742 ( PDF )
A Matrix Decomposition Method for Optimal Normal Basis Multiplication
Can Kızılkale and Ömer Eǧecioǧlu and Çetin Kaya Koç
2015/741 ( PDF )
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
2015/740 ( PDF )
Predictable Arguments of Knowledge
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2015/739 ( PDF )
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang
2015/738 ( PDF )
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
Kazuhiko Minematsu
2015/737 ( PDF )
New multilinear maps from ideal lattices
Gu Chunsheng
2015/736 ( -- withdrawn -- )
Solving LWE via List Decoding
Mingqiang Wang and Xiaoyun Wang and Kunxian Xia and Jincheng Zhuang
2015/735 ( PDF )
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Ilan Komargodski and Mark Zhandry
2015/734 ( -- withdrawn -- )
On the Security of Extended Generalized Feistel Networks
Manoj Kumar and Saibal K. Pal and Anupama Panigrahi
2015/733 ( PDF )
Fully Homomorphic Encryption on Octonion Ring
Masahiro Yagisawa
2015/732 ( PDF )
Compact Implementations of LEA Block Cipher for Low-End Microprocessors
Hwajeong Seo and Zhe Liu and Jongseok Choi and Taehwan Park and and Howon Kim
2015/731 ( PDF )
Same Value Analysis on Edwards Curves
Rodrigo Abarzúa and Santi Martínez and Valeria Mendoza
2015/730 ( PDF )
Indistinguishability Obfuscation from Functional Encryption for Simple Functions
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/729 ( PDF )
Provably-Secure Remote Memory Attestation to Prevent Heap Overflow Attacks
Alexandra Boldyreva and Taesoo Kim and Richard Lipton and Bogdan Warinschi
2015/728 ( PDF )
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas
2015/727 ( PDF )
DPA, Bitslicing and Masking at 1 GHz
Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede
2015/726 ( PDF )
Compositions of linear functions and applications to hashing
Vladimir Shpilrain and Bianca Sosnovski
2015/725 ( PDF )
The self-blindable U-Prove scheme from FC'14 is forgeable
Eric Verheul and Sietse Ringers and Jaap-Henk Hoepman
2015/724 ( PDF )
A masked ring-LWE implementation
Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2015/723 ( PDF )
Cryptanalysis of Feistel Networks with Secret Round Functions
Alex Biryukov and Gaëtan Leurent and Léo Perrin
2015/722 ( PDF )
Oblivious Substring Search with Updates
Tarik Moataz and Erik-Oliver Blass
2015/721 ( PDF )
KDM-Security via Homomorphic Smooth Projective Hashing
Hoeteck Wee
2015/720 ( PDF )
Output-Compressing Randomized Encodings and Applications
Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang
2015/719 ( PDF )
Consolidating masking schemes
Oscar Reparaz and Begül Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede
2015/718 ( PDF )
Efficient Asynchronous Accumulators for Distributed PKI
Leonid Reyzin and Sophia Yakoubov
2015/717 ( PDF )
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/716 ( PDF )
Linear Cryptanalysis of Reduced-Round SIMECK Variants
Nasour Bagheri
2015/715 ( PDF )
New Circular Security Counterexamples from Decision Linear and Learning with Errors
Allison Bishop and Susan Hohenberger and Brent Waters
2015/714 ( PDF )
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
2015/713 ( -- withdrawn -- )
Light-hHB: A New Version of hHB with Improved Session Key Exchange
Ka Ahmad Khoureich
2015/712 ( PDF )
Adaptive Proofs have Straightline Extractors (in the Random Oracle Model)
David Bernhard and Bogdan Warinschi and Ngoc Khanh Nguyen
2015/711 ( PDF )
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)
Anne Canteaut and Sébastien Duval and Gaëtan Leurent
2015/710 ( PDF )
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Bernardo Ferreira and João Rodrigues and João Leitão and Henrique Domingos
2015/709 ( PDF )
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
Luka Malisa and Kari Kostiainen and Srdjan Capkun
2015/708 ( PDF )
Choosing Parameters for NTRUEncrypt
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2015/707 ( PDF )
Reconciling User Privacy and Implicit Authentication for Mobile Devices
Siamak F. Shahandashti and Reihaneh Safavi-Naini and Nashad Ahmed Safa
2015/706 ( PDF )
A Brief Comparison of Simon and Simeck
Stefan Kölbl and Arnab Roy
2015/705 ( PDF )
Linear Overhead Optimally-resilient Robust MPC Using Preprocessing
Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
2015/704 ( PDF )
Indistinguishability Obfuscation: from Approximate to Exact
Nir Bitansky and Vinod Vaikuntanathan
2015/703 ( PDF )
Point-Function Obfuscation: A Framework and Generic Constructions
Mihir Bellare and Igors Stepanovs
2015/702 ( PDF )
Demystifying incentives in the consensus computer
Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena
2015/701 ( PDF )
Differential Privacy in distribution and instance-based noise mechanisms
Sébastien Canard and Baptiste Olivier
2015/700 ( PDF )
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
Jimmy Jose and Dipanwita RoyChowdhury
2015/699 ( PDF )
FURISC: FHE Encrypted URISC Design
Ayantika Chatterjee and Indranil Sengupta
2015/698 ( PDF )
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa
Subhamoy Maitra
2015/697 ( PDF )
On the Security of a Self-healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/696 ( PDF )
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
Miguel Morales Sandoval and Arturo Diaz Perez
2015/695 ( PDF )
Cliptography: Clipping the Power of Kleptographic Attacks
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou
2015/694 ( PDF )
On the Complexity of Additively Homomorphic UC Commitments
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
2015/693 ( PDF )
Foundations of Reactive Garbling Schemes
Jesper Buus Nielsen and Samuel Ranellucci
2015/692 ( PDF )
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
2015/691 ( PDF )
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth
2015/690 ( PDF )
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/689 ( PDF )
Counting Keys in Parallel After a Side Channel Attack
Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam
2015/688 ( PDF )
Binary Field Multiplication on ARMv8
Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
2015/687 ( PDF )
Classical Cryptographic Protocols in a Quantum World
Sean Hallgren and Adam Smith and Fang Song
2015/686 ( PDF )
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
Azeem Irshad and Muhammad Sher and Shahzad Ashraf and Shahzad faisal and Mahmood Ul Hassan
2015/685 ( PDF )
On the discrete logarithm problem in finite fields of fixed characteristic
Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
2015/684 ( PDF )
A One-time Stegosystem and Applications to Efficient Covert Communication
Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha Shashidhar
2015/683 ( PDF )
Security of Linear Secret-Sharing Schemes against Mass Surveillance
Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci
2015/682 ( PDF )
Integral Cryptanalysis on Full MISTY1
Yosuke Todo
2015/681 ( PDF )
ANONIZE: A Large-Scale Anonymous Survey System
Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat
2015/680 ( PDF )
Indifferentiability of Confusion-Diffusion Networks
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/679 ( PDF )
Another Look at Normal Approximations in Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/678 ( PDF )
Optimizing MAKWA on GPU and CPU
Thomas Pornin
2015/677 ( PDF )
EdDSA for more curves
Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang
2015/676 ( PDF )
Quantum Cryptanalysis of NTRU
Scott Fluhrer
2015/675 ( PDF )
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
2015/674 ( PDF )
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
Roman Jagomägis and Peeter Laud and Alisa Pankova
2015/673 ( PDF )
Decaf: Eliminating cofactors through point compression
Mike Hamburg
2015/672 ( PDF )
Function-Hiding Inner Product Encryption
Allison Bishop and Abhishek Jain and Lucas Kowalczyk
2015/671 ( PDF )
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data
Peeter Laud and Alisa Pankova
2015/670 ( PDF )
Smart Security Management in Secure Devices
Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
2015/669 ( PDF )
GMU Hardware API for Authenticated Ciphers
Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj
2015/668 ( PDF )
The Fallacy of Composition of Oblivious RAM and Searchable Encryption
Muhammad Naveed
2015/667 ( PDF )
De Bruijn Sequences from Nonlinear Feedback Shift Registers
Ming Li and Dongdai Lin
2015/666 ( PDF )
Improved Linear Hull Attack on Round-Reduced \textsc{Simon} with Dynamic Key-guessing Techniques
Huaifeng Chen and Xiaoyun Wang
2015/665 ( PDF )
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption.
Romain Gay and Iordanis Kerenidis and Hoeteck Wee
2015/664 ( PDF )
Secure Multi-Party Shuffling
Mahnush Movahedi and Jared Saia and Mahdi Zamani
2015/663 ( PDF )
Analyzing the Efficiency of Biased-Fault Based Attacks
Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
2015/662 ( PDF )
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves
Ryutaroh Matsumoto
2015/661 ( PDF )
Cryptanalysis of a modern rotor machine in a multicast setting
Shane Kepley and David Russo and Rainer Steinwandt
2015/660 ( -- withdrawn -- )
A Hybrid Gaussian Sampler for Lattices over Rings
Léo Ducas and Thomas Prest
2015/659 ( PDF )
Diversity and Transparency for ECC
Jean-Pierre Flori and Jérôme Plût and Jean-René Reinhard and Martin Ekerå
2015/658 ( PDF )
Single-Cycle Implementations of Block Ciphers
Pieter Maene and Ingrid Verbauwhede
2015/657 ( PDF )
Randomizing the Montgomery Powering Ladder
Duc-Phong Le, Chik How Tan and Michael Tunstall
2015/656 ( PDF )
Cryptanalysis of a Markov Chain Based User Authentication Scheme
Ruhul Amin and G.P. Biswas
2015/655 ( PDF )
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
2015/654 ( PDF )
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng
2015/653 ( -- withdrawn -- )
Homomorphic Signature Schemes - A survey
Giulia Traverso and Denise Demirel and Johannes Buchmann
2015/652 ( PDF )
Modelling ciphersuite and version negotiation in the TLS protocol
Benjamin Dowling and Douglas Stebila
2015/651 ( PDF )
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller
2015/650 ( PDF )
A New Encryption Standard of Ukraine: The Kalyna Block Cipher
Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov and Ruslan Mordvinov and Dmytro Kaidalov
2015/649 ( PDF )
On the Hardness of Proving CCA-security of Signed ElGamal
David Bernhard and Marc Fischlin and Bogdan Warinschi
2015/648 ( PDF )
Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard and Marc Fischlin and Bogdan Warinschi
2015/647 ( PDF )
Efficient ephemeral elliptic curve cryptographic keys
Andrea Miele and Arjen K. Lenstra
2015/646 ( PDF )
Decomposition attack on SASASASAS
Alex Biryukov and Dmitry Khovratovich
2015/645 ( -- withdrawn -- )
New Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Clémentine Gritti, Rongmao Chen, Willy Susilo and Thomas Plantard
2015/644 ( PDF )
The Pythia PRF Service
Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart
2015/643 ( PDF )
Short Accountable Ring Signatures Based on DDH
Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit
2015/642 ( PDF )
A New Partial Key Exposure Attack on Multi-power RSA
Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol
2015/641 ( PDF )
Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Jing Li, Licheng Wang
2015/640 ( PDF )
Very-efficient simulatable flipping of many coins into a well
Luís T. A. N. Brandão
2015/639 ( PDF )
Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings
Hao Chen
2015/638 ( PDF )
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta
2015/637 ( PDF )
A Novel Cyberspace-Oriented Access Control Model
Fenghua Li and Yanchao Wang and Rongna Xie and Jinbo Xiong and Fangfang Shan
2015/636 ( PDF )
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes
Matthias Krause
2015/635 ( PDF )
Microcash: Efficient Off-Line Small Payments
Chris Pavlovski and Colin Boyd
2015/634 ( PDF )
Phasing: Private Set Intersection using Permutation-based Hashing
Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner
2015/633 ( PDF )
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/632 ( PDF )
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji
2015/631 ( PDF )
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
Thomas Pöppelmann and Michael Naehrig and Andrew Putnam and Adrian Macias
2015/630 ( PDF )
Unconditionally Secure Computation with Reduced Interaction
Ivan Damgård and Jesper Buus Nielsen and Rafail Ostovsky and Adi Rosen
2015/629 ( PDF )
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme
Pyrros Chaidos and Véronique Cortier and Georg Fuchsbauer and David Galindo
2015/628 ( PDF )
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
Daniel Cabarcas and Denise Demirel and Florian Göpfert and Jean Lancrenon and Thomas Wunderer
2015/627 ( PDF )
On Necessary Padding with IO
Justin Holmgren
2015/626 ( PDF )
Practical Round-Optimal Blind Signatures in the Standard Model
Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
2015/625 ( PDF )
Ed448-Goldilocks, a new elliptic curve
Mike Hamburg
2015/624 ( PDF )
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff
2015/623 ( PDF )
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand
2015/622 ( PDF )
Random Digit Representation of Integers
Nicolas Méloni and M. Anwar Hasan
2015/621 ( PDF )
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
Sarani Bhattacharya, Debdeep Mukhopadhyay
2015/620 ( PDF )
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions
Susumu Kiyoshima
2015/619 ( PDF )
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
Seher Tutdere and Osmanbey Uzunkol
2015/618 ( PDF )
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
Juan Carlos Ku-Cauich  Guillermo Morales-Luna  Horacio Tapia-Recillas
2015/617 ( PDF )
Generalised tally-based decoders for traitor tracing and group testing
Boris Skoric and Wouter de Groot
2015/616 ( PDF )
The leaking battery: A privacy analysis of the HTML5 Battery Status API
Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia Diaz
2015/615 ( PDF )
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati
2015/614 ( PDF )
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
Fangguo Zhang
2015/613 ( PDF )
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei
2015/612 ( PDF )
The Simeck Family of Lightweight Block Ciphers
Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong
2015/611 ( PDF )
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Shijun Zhao and Qianying Zhang
2015/610 ( PDF )
McBits: fast constant-time code-based cryptography
Daniel J. Bernstein and Tung Chou and Peter Schwabe
2015/609 ( PDF )
Experimental Study of DIGIPASS GO3 and the Security of Authentication
Igor Semaev
2015/608 ( PDF )
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Shweta Agrawal and Benoit Libert and Damien Stehle
2015/607 ( PDF )
Netcoin - A Traceable P2P Electronic Cash System
Hitesh Tewari and Eamon O Nuallain
2015/606 ( PDF )
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon
2015/605 ( PDF )
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm
Steven D. Galbraith and Ping Wang and Fangguo Zhang
2015/604 ( PDF )
Structure-Preserving Signatures from Standard Assumptions, Revisited
Eike Kiltz and Jiaxin Pan and Hoeteck Wee
2015/603 ( PDF )
Complementary Dual Codes for Counter-measures to Side-Channel Attacks
Claude Carlet and Sylvain Guilley
2015/602 ( PDF )
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhay
2015/601 ( PDF )
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
Mei Wang, Zheng Yuan,Xiao Feng
2015/600 ( PDF )
Predictive Models for Min-Entropy Estimation
John Kelsey and Kerry A. McKay and Meltem Sonmez Turan
2015/599 ( PDF )
The Chain Rule for HILL Pseudoentropy, Revisited
Krzysztof Pietrzak and Maciej Skorski
2015/598 ( PDF )
Combining Differential Privacy and Secure Multiparty Computation
Martin Pettai and Peeter Laud
2015/597 ( PDF )
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
Amir Moradi and Alexander Wild
2015/596 ( PDF )
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations
Jean-Sebastien Coron and Craig Gentry and Shai Halevi and Tancrede Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi
2015/595 ( -- withdrawn -- )
Differential Fault Intensity Analysis
Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa Taha and Patrick Schaumont
2015/594 ( PDF )
Disk Encryption: Do We Need to Preserve Length?
Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
2015/593 ( PDF )
A Physical Approach for Stochastic Modeling of TERO-based TRNG
Patrick HADDAD and Viktor FISCHER and Florent BERNARD and Jean NICOLAI
2015/592 ( PDF )
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel
2015/591 ( PDF )
How much randomness can be extracted from memoryless Shannon entropy sources?
Maciej Skorski
2015/590 ( PDF )
TriviA: A Fast and Secure Authenticated Encryption Scheme
Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
2015/589 ( PDF )
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
A.-M. Leventi-Peetz and J.-V. Peetz
2015/588 ( PDF )
An analysis of the $C$ class of bent functions
Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic
2015/587 ( PDF )
Trupil Limbasiya and Nishant Doshi
2015/586 ( -- withdrawn -- )
SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System
Yuan Zhang and Chunxiang Xu and Shui Yu and Hongwei Li and Xiaojun Zhang
2015/585 ( PDF )
SIMON and SPECK: Block Ciphers for the Internet of Things
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2015/584 ( PDF )
How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Denise Demirel and Jean Lancrenon
2015/583 ( PDF )
Secure Key Generation from Biased PUFs
Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems
2015/582 ( PDF )
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita-Rotaru
2015/581 ( PDF )
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation
Christina Brzuska and Arno Mittelbach
2015/580 ( PDF )
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss
2015/579 ( PDF )
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
Mridul Nandi
2015/578 ( PDF )
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun
2015/577 ( PDF )
Twist Insecurity
Manfred Lochter, Andreas Wiemers
2015/576 ( PDF )
The Carnac protocol -- or how to read the contents of a sealed envelope
Michael Scott and Brian Spector
2015/575 ( PDF )
Known-key Distinguisher on Full PRESENT
Céline Blondeau and Thomas Peyrin and Lei Wang
2015/574 ( PDF )
Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
2015/573 ( PDF )
Last fall degree, HFE, and Weil descent attacks on ECDLP
Ming-Deh A. Huang and Michiel Kosters and Sze Ling Yeo
2015/572 ( PDF )
On Public Key Encryption from Noisy Codewords
Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi
2015/571 ( PDF )
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order - Extended Version
Tobias Schneider and Amir Moradi and Tim Güneysu
2015/570 ( PDF )
Constant Communication ORAM with Small Blocksize
Tarik Moataz and Travis Mayberry and Erik-Oliver Blass
2015/569 ( PDF )
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2015/568 ( PDF )
Cryptanalysis of Reduced-Round Whirlwind (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2015/567 ( PDF )
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
Henri Gilbert and Jérôme Plût and Joana Treger
2015/566 ( PDF )
A Framework for Identity-Based Encryption with Almost Tight Security
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/565 ( PDF )
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
Craig Costello and Patrick Longa
2015/564 ( PDF )
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Victor Costan and Ilia Lebedev and Srinivas Devadas
2015/563 ( PDF )
Privacy in the Genomic Era
Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang
2015/562 ( PDF )
PUDA – Privacy and Unforgeability for Data Aggregation
Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/561 ( PDF )
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J. Longo and E. De Mulder and D. Page and M. Tunstall
2015/560 ( PDF )
Generic Construction of UC-Secure Oblivious Transfer
Olivier Blazy and Céline Chevalier
2015/559 ( PDF )
Concurrent Secure Computation with Optimal Query Complexity
Ran Canetti and Vipul Goyal and Abhishek Jain
2015/558 ( PDF )
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
2015/557 ( PDF )
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
Takanori Isobe and Kyoji Shibutani
2015/556 ( PDF )
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates
Sujoy Sinha Roy and Kimmo Järvinen and Ingrid Verbauwhede
2015/555 ( PDF )
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
Tapas Pandit and Sumit Kumar Pandey and Rana Barua
2015/554 ( PDF )
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
2015/553 ( PDF )
Round-Optimal Black-Box Two-Party Computation
Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro
2015/552 ( PDF )
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
Paul Kirchner and Pierre-Alain Fouque
2015/551 ( PDF )
Quantum homomorphic encryption for circuits of low $T$-gate complexity
Anne Broadbent and Stacey Jeffery
2015/550 ( PDF )
Upending Stock Market Structure Using Secure Multi-Party Computation
Charanjit S. Jutla
2015/549 ( PDF )
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices
Amir Hassani Karbasi, Reza Ebrahimi Atani
2015/548 ( PDF )
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
2015/547 ( PDF )
Secure Computation of MIPS Machine Code
Xiao Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz
2015/546 ( PDF )
Actively Secure OT Extension with Optimal Overhead
Marcel Keller and Emmanuela Orsini and Peter Scholl
2015/545 ( PDF )
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
Qinglong Zhang and Zongbin Liu and and Cunqing Ma and Changting Li and Jiwu Jing
2015/544 ( PDF )
Alternative cubics' rules with an algebraic appeal
Daniel R. L. Brown
2015/543 ( PDF )
Bloom Filters in Adversarial Environments
Moni Naor and Eylon Yogev
2015/542 ( PDF )
Improved Side-Channel Analysis of Finite-Field Multiplication
Sonia Belaïd and Jean-Sébastien Coron and Pierre-Alain Fouque and Benoît Gérard and Jean-Gabriel Kammerer and Emmanuel Prouff
2015/541 ( PDF )
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Bart Mennink and Reza Reyhanitabar and Damian Vizár
2015/540 ( -- withdrawn -- )
PICO: An Ultra lightweight and Low power encryption design for pervasive computing
Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil
2015/539 ( PDF )
Tweaking Even-Mansour Ciphers
Benoît Cogliati and Rodolphe Lampe and Yannick Seurin
2015/538 ( PDF )
Pairing Based Mutual Healing in Wireless Sensor Networks
Sarita Agrawal and Jay Patel and Manik Lal Das
2015/537 ( PDF )
Towards Easy Leakage Certification
François Durvaux and François-Xavier Standaert and Santos Merino Del Pozo,
2015/536 ( PDF )
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
François Durvaux and François-Xavier Standaert
2015/535 ( PDF )
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Vincent Grosso and François-Xavier Standaert
2015/534 ( PDF )
Problems, solutions and experience of the first international student's Olympiad in cryptography
Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia Tokareva and Valeria Vitkup
2015/533 ( PDF )
Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
Xiaoshuang Ma and Kexin Qiao
2015/531 ( PDF )
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
Mohammad Hajiabadi, Bruce M. Kapron
2015/530 ( PDF )
Practical Free-Start Collision Attacks on 76-step SHA-1
Pierre Karpman and Thomas Peyrin and Marc Stevens
2015/529 ( PDF )
Power Analysis Attacks against IEEE 802.15.4 Nodes
Colin O'Flynn and Zhizhang Chen
2015/528 ( PDF )
SpaceMint: A Cryptocurrency Based on Proofs of Space
Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gaži
2015/527 ( PDF )
Robust Profiling for DPA-Style Attacks
Carolyn Whitnall and Elisabeth Oswald
2015/526 ( PDF )
Generic Key Recovery Attack on Feistel Scheme
Takanori Isobe and Kyoji Shibutani
2015/525 ( PDF )
Short Randomizable Signatures
David Pointcheval and Olivier Sanders
2015/524 ( PDF )
Secure Key Exchange Protocol based on Virtual Proof of Reality
Yansong Gao
2015/523 ( PDF )
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai
2015/522 ( PDF )
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search
Anja Becker, Nicolas Gama, Antoine Joux
2015/521 ( PDF )
Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency
Sergey Gorbunov and Silvio Micali
2015/520 ( PDF )
A Constant Time, Single Round Attribute-Based Authenticated Key Exchange in Random Oracle Model
Suvradip Chakraborty and Y. Sreenivasarao and C. Pandu Rangan and Srinivasan Raghuraman
2015/519 ( PDF )
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
Yongge Wang
2015/518 ( PDF )
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
Ren Zhang and Bart Preneel
2015/517 ( PDF )
Subversion-Resilient Signatures: Definitions, Constructions and Applications
Giuseppe Ateniese and Bernardo Magri and Daniele Venturi
2015/516 ( PDF )
Key-Recovery Attacks on ASASA
Brice Minaud and Patrick Derbez and Pierre-Alain Fouque and Pierre Karpman
2015/515 ( PDF )
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
Thomas Espitau and Pierre-Alain Fouque and Pierre Karpman
2015/514 ( PDF )
Time-Lock Puzzles from Randomized Encodings
Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters
2015/513 ( PDF )
Computing Individual Discrete Logarithms Faster in $GF(p^n)$
Aurore Guillevic
2015/512 ( PDF )
Key Extraction from the Primary Side of a Switched-Mode Power Supply
Sami Saab and Andrew Leiserson and Michael Tunstall
2015/511 ( PDF )
Near Collision Side Channel Attacks
Baris Ege and Thomas Eisenbarth and Lejla Batina
2015/510 ( PDF )
Equivoe-T: Transposition Equivocation Cryptography
Gideon Samid
2015/509 ( PDF )
A flaw in a theorem about Schnorr signatures
Daniel R. L. Brown
2015/508 ( PDF )
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra
2015/507 ( PDF )
Decomposing the ASASA Block Cipher Construction
Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander
2015/506 ( PDF )
Strong Non-Interference and Type-Directed Higher-Order Masking
Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub and Rébecca Zucchini
2015/505 ( PDF )
The Tower Number Field Sieve
Razvan Barbulescu and Pierrick Gaudry and Thorsten Kleinjung
2015/504 ( PDF )
The Iterated Random Permutation Problem with Applications to Cascade Encryption
Brice Minaud and Yannick Seurin
2015/503 ( PDF )
The Norwegian Internet Voting Protocol: A new Instantiation
Kristian Gjøsteen and Anders Smedstuen Lund
2015/502 ( PDF )
Centrally Banked Cryptocurrencies
George Danezis and Sarah Meiklejohn
2015/501 ( PDF )
Multi-Prover Commitments Against Non-Signaling Attacks
Serge Fehr and Max Fillinger
2015/500 ( PDF )
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure
Alberto Battistello and Christophe Giraud
2015/499 ( PDF )
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
Dennis Hofheinz
2015/498 ( PDF )
Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Jiajun Zhang and Haining Fan
2015/497 ( PDF )
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost
Zhangxiang Hu and Payman Mohassel and Mike Rosulek
2015/496 ( PDF )
Quantifying Location Privacy Leakage from Transaction Prices
Arthur Gervais and Hubert Ritzdorf and Mario Lucic and Srdjan Capkun
2015/495 ( PDF )
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
Sondre Rønjom
2015/494 ( -- withdrawn -- )
Cryptanalysis of the LSH and SHA-V Hash Functions
Yonglin Hao and Hongbo Yu
2015/493 ( PDF )
Fault Tolerant Infective Countermeasure for AES
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay
2015/492 ( PDF )
Masking vs. Multiparty Computation: How Large is the Gap for AES?
Vincent Grosso and François-Xavier Standaert and Sebastian Faust
2015/491 ( PDF )
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
Nishanth Chandran and Melissa Chase and Feng-Hao Liu and Ryo Nishimaki and Keita Xagawa
2015/490 ( PDF )
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Sonam Devgan Kaul and Amit K. Awasthi
2015/489 ( PDF )
Scalable and private media consumption with Popcorn
Trinabh Gupta and Natacha Crooks and Whitney Mulhern and Srinath Setty and Lorenzo Alvisi and Michael Walfish
2015/488 ( PDF )
On Black-Box Complexity of Universally Composable Security in the CRS model
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/487 ( PDF )
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs and Stefano Tessaro
2015/486 ( PDF )
DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, and Cas Cremers
2015/485 ( PDF )
Turning Online Ciphers Off
Elena Andreeva and Guy Barwell and Ritam Bhaumik and Mridul Nandi and Dan Page and Martijn Stam
2015/484 ( PDF )
More Rounds, Less Security?
Jian Guo and Jérémy Jean and Nicky Mouha and Ivica Nikolić
2015/483 ( PDF )
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Shi Bai and Adeline Langlois and Tancrède Lepoint and Amin Sakzad and Damien Stehle and Ron Steinfeld
2015/482 ( PDF )
Extractable Witness Encryption and Timed-Release Encryption from Bitcoin
Jia Liu and Saqib A. Kakvi and Bogdan Warinschi
2015/481 ( PDF )
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers
Theodosis Mourouzis and Guangyan Song and Nicolas Courtois and Michalis Christofii
2015/480 ( PDF )
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
Berry Schoenmakers, Meilof Veeningen, and Niels de Vreede
2015/479 ( PDF )
A Provably Secure Group Signature Scheme from Code-Based Assumptions
Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang
2015/478 ( PDF )
How to Build Time-Lock Encryption
Tibor Jager
2015/477 ( PDF )
Authentication Key Recovery on Galois Counter Mode (GCM)
John Mattsson, Magnus Westerlund
2015/476 ( PDF )
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
Bart Mennink
2015/475 ( PDF )
Randomizing scalar multiplication using exact covering systems of congruences
Eleonora Guerrini and Laurent Imbert and Théo Winterhalter
2015/474 ( PDF )
Fully Homomorphic Encryption without bootstrapping
Masahiro Yagisawa
2015/473 ( PDF )
Mehak Khurana and Meena Kumari
2015/472 ( PDF )
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer
Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart
2015/471 ( PDF )
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott
2015/470 ( PDF )
On the power of Public-key Functional Encryption with Function Privacy
Vincenzo Iovino and Qiang Tang and Karol Żebrowski
2015/469 ( PDF )
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
Andrew Miller and Rob Jansen
2015/468 ( PDF )
Practical Fully Homomorphic Encryption without Noise Reduction
Dongxi Liu
2015/467 ( PDF )
The Oblivious Machine - or: How to Put the C into MPC
Marcel Keller
2015/466 ( PDF )
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang
2015/465 ( PDF )
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
Hwajeong Seo and Zhe Liu and Johann Groschadl and Howon Kim
2015/464 ( PDF )
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Florian Tschorsch and Björn Scheuermann
2015/463 ( -- withdrawn -- )
Multilinear Maps Using Random Matrix
Gu Chunsheng
2015/462 ( PDF )
Accelerating SWHE based PIRs using GPUs
Wei Dai, Yarkın Doröz and Berk Sunar
2015/461 ( PDF )
Approximate Algorithms on Lattices with Small Determinant
Jung Hee Cheon and Changmin Lee
2015/460 ( PDF )
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi
2015/459 ( PDF )
New Observation on Division Property
Bing Sun and Xin Hai and Wenyu Zhang and Lei Cheng and Zhichao Yang
2015/458 ( PDF )
Sheena Sathyan and Shaji R S Professor
2015/457 ( PDF )
Generic Conversions from CPA to CCA secure Functional Encryption
Mridul Nandi and Tapas Pandit
2015/456 ( PDF )
Collateral damage of Facebook Apps: an enhanced privacy scoring model
Iraklis Symeonids, Pagona Tsormpatzoudi and Bart Preneel
2015/455 ( PDF )
Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu and N.Asokan and Benny Pinkas
2015/454 ( PDF )
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO
Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
2015/453 ( PDF )
An Optimization of Gu Map-1
Yupu Hu and Huiwen Jia
2015/452 ( PDF )
Masks will Fall Off -- Higher-Order Optimal Distinguishers
Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul
2015/451 ( PDF )
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
Sihong Su and Xiaohu Tang
2015/450 ( PDF )
Adaptively Secure Computation with Partial Erasures
Carmit Hazay and Yehuda Lindell and Arpita Patra
2015/449 ( PDF )
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions
Ruoxin Zhao and Rui Zhang and Yongqiang Li and Baofeng Wu
2015/448 ( PDF )
A Comment on Gu Map-1
Yupu Hu and Huiwen Jia
2015/447 ( PDF )
A New Model for Error-Tolerant Side-Channel Cube Attacks
Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede
2015/446 ( PDF )
On the Amortized Complexity of Zero-knowledge Protocols
Ronald Cramer and Ivan Damgård and Marcel Keller
2015/445 ( PDF )
XLS is not a Strong Pseudorandom Permutation
Mridul Nandi
2015/444 ( PDF )
Revisiting Security Claims of XLS and COPA
Mridul Nandi
2015/443 ( PDF )
Security Evaluation and Enhancement of Bistable Ring PUFs
Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, and Wayne Burleson
2015/442 ( PDF )
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
2015/441 ( PDF )
FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
Devu Manikantan Shila and Vivek Venugopalan and Cameron D Patterson
2015/440 ( PDF )
Message-Locked Encryption for Lock-Dependent Messages
Martín Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev
2015/439 ( PDF )
On Concurrently Secure Computation in the Multiple Ideal Query Model
Vipul Goyal and Abhishek Jain
2015/438 ( PDF )
A Hybrid Approach for Proving Noninterference of Java Programs
Ralf Kuesters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr
2015/437 ( PDF )
A Note on the Unsoundness of vnTinyRAM's SNARK
Bryan Parno
2015/436 ( PDF )
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks
Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
2015/435 ( PDF )
On the (Fast) Algebraic Immunity of Boolean Power Functions
Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
2015/434 ( PDF )
Dickson Polynomials that are Involutions
Pascale Charpin and Sihem Mesnager and Sumanta Sarkar
2015/433 ( PDF )
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
Wentao Zhang and. Zhenzhen Bao and. Vincent Rijmen and. Meicheng Liu
2015/432 ( -- withdrawn -- )
Non-Repudiable Proofs of Storage in Cloud
Hongyuan Wang and Liehuang Zhu and Yijia Lilong and Chang Xu
2015/431 ( PDF )
Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung and Goichiro Hanaoka and Shota Yamada
2015/430 ( PDF )
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
Alex Biryukov and Daniel Dinu and Dmitry Khovratovich
2015/429 ( PDF )
Cryptanalysis of Round-Reduced LED
Ivica Nikolić and Lei Wang and Shuang Wu
2015/428 ( PDF )
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
Philipp Jovanovic and Samuel Neves
2015/427 ( PDF )
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Mudit Bhargava and Ken Mai
2015/426 ( PDF )
Complementing Feistel Ciphers
Alex Biryukov and Ivica Nikolic
2015/425 ( PDF )
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
Stefan Heyse and Ingo von Maurich and Tim Güneysu
2015/424 ( PDF )
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Begül Bilgin and Andrey Bogdanov and Miroslav Knežević and Florian Mendel and Qingju Wang
2015/423 ( PDF )
On the Implementation of Unified Arithmetic on Binary Huff Curves
Santosh Ghosh, Amit Kumar, Amitabh Das and Ingrid Verbauwhede
2015/422 ( PDF )
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
Marina Blanton and Fattaneh Bayatbabolghani
2015/421 ( PDF )
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism
Zhe Liu and Husen Wang and Johann Großschädl and Zhi Hu and Ingrid Verbauwhede
2015/420 ( PDF )
What Information is Leaked under Concurrent Composition?
Vipul Goyal and Divya Gupta and Abhishek Jain
2015/419 ( PDF )
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava
2015/418 ( PDF )
Optimized Interpolation Attacks on LowMC
Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang
2015/417 ( PDF )
Order-Revealing Encryption and the Hardness of Private Learning
Mark Bun and Mark Zhandry
2015/416 ( PDF )
HETest: A Homomorphic Encryption Testing Framework
Mayank Varia and Sophia Yakoubov and Yang Yang
2015/415 ( PDF )
STRIBOB / WHIRLBOB Security Analysis Addendum
Markku-Juhani O. Saarinen
2015/414 ( PDF )
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
Mridul Nandi
2015/413 ( PDF )
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
Shashank Agrawal and Melissa Chase
2015/412 ( PDF )
Survey on Cryptographic Obfuscation
Máté Horváth
2015/411 ( PDF )
Side-Channel Analysis of MAC-Keccak Hardware Implementations
Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser
2015/410 ( PDF )
Efficient Ring-LWE Encryption on 8-bit AVR Processors
Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Großschädl and Howon Kim and Ingrid Verbauwhede
2015/409 ( PDF )
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
Jie Chen and Romain Gay and Hoeteck Wee
2015/408 ( PDF )
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
Franck Rondepierre
2015/407 ( PDF )
Higher-Order Cryptanalysis of LowMC
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/406 ( PDF )
Cryptography for Parallel RAM from Indistinguishability Obfuscation
Yu-Chi Chen and Sherman S. M. Chow and Kai-Min Chung and Russell W. F. Lai and Wei-Kai Lin and Hong-Sheng Zhou
2015/405 ( PDF )
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schröder
2015/404 ( PDF )
Zero-Knowledge Accumulators and Set Operations
Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos
2015/403 ( PDF )
Sequential Secret Sharing as a New Hierarchical Access Structure
Mehrdad Nojoumian and Douglas R. Stinson
2015/402 ( PDF )
Success through confidence: Evaluating the effectiveness of a side-channel attack
Adrian Thillard and Emmanuel Prouff and Thomas Roche
2015/401 ( PDF )
Simple Chosen-Ciphertext Security from Low-Noise LPN
Eike Kiltz and Daniel Masny and Krzysztof Pietrzak
2015/400 ( PDF )
Expiration and Revocation of Keys for Attribute-based Signatures (Full Version)
Stephen R. Tate and Roopa Vishwanathan
2015/399 ( PDF )
New attacks on RSA with Moduli $N=p^rq$
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/398 ( PDF )
Factoring RSA moduli with weak prime factors
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/397 ( PDF )
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
Peter Gazi and Jooyoung Lee and Yannick Seurin and John Steinberger and Stefano Tessaro
2015/396 ( PDF )
Generalizing Homomorphic MACs for Arithmetic Circuits
Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo
2015/395 ( PDF )
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schröder and Mark Simkin
2015/394 ( PDF )
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
2015/393 ( PDF )
Biclique cryptanalysis of MIBS-80 and PRESENT-80
Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba
2015/392 ( PDF )
Forgery Attacks on round-reduced ICEPOLE-128
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/391 ( PDF )
On the Communication Complexity of Secure Computation
Deepesh Data and Manoj M. Prabhakaran and Vinod M. Prabhakaran
2015/390 ( PDF )
Dual System Encryption Framework in Prime-Order Groups
Nuttapong Attrapadung
2015/389 ( PDF )
Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
2015/388 ( PDF )
Succinct Garbled RAM
Ran Canetti and Justin Holmgren
2015/387 ( PDF )
Method to Protect Passwords in Databases for Web Applications
Scott Contini
2015/386 ( PDF )
Privately Evaluating Decision Trees and Random Forests
David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter
2015/385 ( PDF )
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas
2015/384 ( PDF )
Condensed Unpredictability
Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak
2015/383 ( PDF )
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
Rafael Pass and abhi shelat
2015/382 ( PDF )
High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers
Thomas Pöppelmann and Tobias Oder and Tim Güneysu
2015/381 ( PDF )
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
Sumit Chakraborty
2015/380 ( PDF )
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
Céline Blondeau and Aslí Bay and Serge Vaudenay
2015/379 ( PDF )
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
2015/378 ( PDF )
PAC Learning of Arbiter PUFs
Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
2015/377 ( PDF )
Cluster Computing in Zero Knowledge
Alessandro Chiesa and Eran Tromer and Madars Virza
2015/376 ( PDF )
Cryptography from Post-Quantum Assumptions
Raza Ali Kazmi
2015/375 ( PDF )
Bounds on surmising remixed keys
Daniel R. L. Brown
2015/374 ( PDF )
On the Impossibility of Tight Cryptographic Reductions
Christoph Bader and Tibor Jager and Yong Li and Sven Schäge
2015/373 ( PDF )
Publicly Verifiable Software Watermarking
Aloni Cohen and Justin Holmgren and Vinod Vaikuntanathan
2015/372 ( PDF )
Security Analysis of PRINCE
Jeremy Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu
2015/371 ( PDF )
Constant-Round MPC with Fairness and Guarantee of Output Delivery
S. Dov Gordon and Feng-Hao Liu and Elaine Shi
2015/370 ( PDF )
Financial Cryptography: Discriminatory Pricing Mechanism
Sumit Chakraborty
2015/369 ( PDF )
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
Nir Bitansky and Omer Paneth
2015/368 ( PDF )
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
Evgeny Sidorov
2015/367 ( PDF )
Improved Higher-Order Differential Attacks on MISTY1
Achiya Bar-On
2015/366 ( PDF )
A random zoo: sloth, unicorn, and trx
Arjen K. Lenstra and Benjamin Wesolowski
2015/365 ( PDF )
On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
2015/364 ( PDF )
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
Qiang Tang and Jun Wang
2015/363 ( PDF )
Optimally Secure Tweakable Blockciphers
Bart Mennink
2015/362 ( PDF )
Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem
Claude Crepeau and Raza Ali Kazmi
2015/361 ( PDF )
Computationally binding quantum commitments
Dominique Unruh
2015/360 ( PDF )
Achieving Differential Privacy with Bias-Control Limited Source
Yanqing Yao, Zhoujun Li
2015/359 ( PDF )
Higher-Order Side Channel Security and Mask Refreshing
Jean-Sebastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
2015/358 ( PDF )
On Generalized First Fall Degree Assumptions
Yun-Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi
2015/357 ( PDF )
A Group-theory Method to The Cycle Structures of Feedback Shift Registers
Ming Li, Yupeng Jiang and Dongdai Lin
2015/356 ( PDF )
Succinct Randomized Encodings and their Applications
Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang
2015/355 ( PDF )
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni and Andreas Hülsing and Christian Schaffner
2015/354 ( PDF )
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node
Jacek Samotyja and Kerstin Lemke-Rust and Markus Ullmann
2015/353 ( PDF )
Matrix Computational Assumptions in Multilinear Groups
Paz Morillo and Carla Ràfols and Jorge L. Villar
2015/352 ( PDF )
Broadcast from Minicast Secure Against General Adversaries
Pavel Raykov
2015/351 ( PDF )
Database Outsourcing with Hierarchical Authenticated Data Structures
Mohammad Etemad and Alptekin Küpçü
2015/350 ( PDF )
Improving Local Collisions: New Attacks on Reduced SHA-256
Florian Mendel and Tomislav Nad and Martin Schläffer
2015/349 ( PDF )
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
Chang Liu and Liehuang Zhu and Jinjun Chen
2015/348 ( PDF )
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation
An­dre­as Gor­nik and Amir Mo­ra­di and Jür­gen Oehm and Chris­tof Paar
2015/347 ( PDF )
Fault Analysis of Kuznyechik
Riham AlTawy and Onur Duman and Amr M. Youssef
2015/346 ( PDF )
End-to-End Verifiable Elections in the Standard Model∗
Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2015/345 ( PDF )
Two Round Multiparty Computation via Multi-Key FHE
Pratyay Mukherjee and Daniel Wichs
2015/344 ( PDF )
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
Ryo Nishimaki and Daniel Wichs
2015/343 ( PDF )
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
Michael Düll and Björn Haase and Gesine Hinterwälder and Michael Hutter and Christof Paar and Ana Helena Sánchez and Peter Schwabe
2015/342 ( PDF )
Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext
Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo
2015/341 ( PDF )
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
Gilad Asharov and Gil Segev
2015/340 ( PDF )
A New Distinguisher on Grain v1 for 106 rounds
Santanu Sarkar
2015/339 ( PDF )
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
Sebastiaan de Hoogh and Berry Schoenmakers and Meilof Veeningen
2015/338 ( PDF )
Cryptanalysis of a fair anonymity for the tor network
Amadou Moctar Kane
2015/337 ( PDF )
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
Sujoy Sinha Roy and Kimmo Järvinen and Frederik Vercauteren and Vassil Dimitrov and Ingrid Verbauwhede
2015/336 ( PDF )
Arithmetic Cryptography
Benny Applebaum and Jonathan Avron and Christina Brzuska
2015/335 ( PDF )
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2015/334 ( PDF )
On the Correlation Intractability of Obfuscated Pseudorandom Functions
Ran Canetti and Yilei Chen and Leonid Reyzin
2015/333 ( PDF )
Nearly Optimal Verifiable Data Streaming (Full Version)
Johannes Krupp and Dominique Schröder and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan Nuernberger
2015/332 ( PDF )
Security Intelligence for Broadcast : Threat Analytics
Sumit Chakraborty
2015/331 ( PDF )
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
Megha Agrawal and Donghoon Chang and Somitra Sanadhya
2015/330 ( PDF )
Sponge based CCA2 secure asymmetric encryption for arbitrary length message
Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
2015/329 ( PDF )
PAGES - A Family of Block Ciiphers
Dieter Schmidt
2015/328 ( PDF )
Strongly Secure Authenticated Key Exchange from Ideal Lattices
Xiaopeng Yang and Wenping Ma
2015/327 ( PDF )
Some results on Sprout
Subhadeep Banik
2015/326 ( PDF )
Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata
Saeideh Kabirirad and Hamideh Hajiabadi
2015/325 ( PDF )
Secure Multi-Party Computation with Identifiable Abort
Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas
2015/324 ( PDF )
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys
Divesh Aggarwal and Alexander Golovnev
2015/323 ( -- withdrawn -- )
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange
Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan
2015/322 ( PDF )
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers
Peeter Laud and Alisa Pankova
2015/321 ( -- withdrawn -- )
Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles
Paolo D'Arco and Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Clauido Soriente
2015/320 ( PDF )
Hybrid Publicly Verifiable Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2015/319 ( PDF )
Point Decomposition Problem in Binary Elliptic Curves
Koray Karabina
2015/318 ( PDF )
Practical Divisible E-Cash
Patrick Märtens
2015/317 ( PDF )
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti
2015/316 ( PDF )
Non-malleability under Selective Opening Attacks: Implication and Separation
Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen
2015/315 ( PDF )
Query-Complexity Amplification for Random Oracles
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2015/314 ( PDF )
Certificate-Based Encryption Resilient to Key Leakage
Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and Xinyi Huang and Yang Xiang
2015/313 ( PDF )
Recovering Short Generators of Principal Ideals in Cyclotomic Rings
Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev
2015/312 ( PDF )
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
Pierre-Alain Fouque and Thomas Vannet
2015/311 ( PDF )
Tagged One-Time Signatures: Tight Security and Optimal Tag Size
Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo
2015/310 ( PDF )
New algorithm for the discrete logarithm problem on elliptic curves
Igor Semaev
2015/309 ( PDF )
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
2015/308 ( PDF )
Authenticated Key Exchange over Bitcoin
Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao
2015/307 ( PDF )
Black-Box Garbled RAM
Sanjam Garg and Steve Lu and Rafail Ostrovsky
2015/306 ( PDF )
Analysis of VAES3 (FF2)
Morris Dworkin and Ray Perlner
2015/305 ( PDF )
Foundations of Reconfigurable PUFs (Full Version)
Jonas Schneider and Dominique Schröder
2015/304 ( PDF )
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky
2015/303 ( PDF )
The Design Space of Lightweight Cryptography
Nicky Mouha
2015/302 ( PDF )
Boosting OMD for Almost Free Authentication of Associated Data
Reza Reyhanitabar and Serge Vaudenay and Damian Vizár
2015/301 ( PDF )
Cryptanalysis of GGH Map
Yupu Hu and Huiwen Jia
2015/300 ( PDF )
Scalable Divisible E-cash
Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
2015/299 ( PDF )
A Note on the Lindell-Waisbard Private Web Search Scheme
Zhengjun Cao and Lihua Liu
2015/298 ( PDF )
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE
Yongge Wang
2015/297 ( PDF )
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao
2015/296 ( PDF )
The Uniform Distribution of Sequences Generated by Iteration of Polynomials
Emil Lerner
2015/295 ( PDF )
Security Analysis of Re-Encryption RPC Mix Nets
Ralf Kuesters and Tomasz Truderung
2015/294 ( PDF )
Accelerating Somewhat Homomorphic Evaluation using FPGAs
Erdinç Öztürk and Yarkın Doröz and Berk Sunar and Erkay Savaş
2015/293 ( PDF )
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/292 ( PDF )
Secret Shared Random Access Machine
Shlomi Dolev and Yin Li
2015/291 ( PDF )
Two Operands of Multipliers in Side-Channel Attack
Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki
2015/290 ( PDF )
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Joseph A. Akinyele and Christina Garman and Susan Hohenberger
2015/289 ( PDF )
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
Muhammed F. Esgin and Orhun Kara
2015/288 ( PDF )
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
Aydin Aysu and Patrick Schaumont
2015/287 ( PDF )
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world
John M. Schanck and William Whyte and Zhenfei Zhang
2015/286 ( PDF )
Impossible Differential Cryptanalysis of Reduced Round SIMON
Zhan Chen and Ning Wang and Xiaoyun Wang
2015/285 ( PDF )
Improved Linear Trails for the Block Cipher Simon
Tomer Ashur
2015/284 ( PDF )
A Note on Scalar Multiplication Using Division Polynomials
Binglong~Chen, Chuangqiang~Hu and~Chang-An~Zhao
2015/283 ( PDF )
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data
Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia
2015/282 ( PDF )
Non-Interactive Secure Computation Based on Cut-and-Choose
Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva
2015/281 ( PDF )
Secret Sharing and Statistical Zero Knowledge
Vinod Vaikuntanathan and Prashant Nalini Vasudevan
2015/280 ( PDF )
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
Jonathan Katz and Aishwarya Thiruvengadam and Hong-Sheng Zhou
2015/279 ( PDF )
Improved Cryptanalysis of AES-like Permutations
Jérémy Jean and Maria Naya-Plasencia and Thomas Peyrin
2015/278 ( PDF )
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
Sébastien Canard and David Pointcheval and Olivier Sanders
2015/277 ( PDF )
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games
Marco Tomamichel and Serge Fehr and Jędrzej Kaniewski and Stephanie Wehner
2015/276 ( PDF )
An Improvment of the Elliptic Net Algorithm
Binglong Chen and Chang-An Zhao
2015/275 ( PDF )
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems
Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai
2015/274 ( PDF )
Low Depth Circuits for Efficient Homomorphic Sorting
Gizem S. Çetin and Yarkın Doröz and Berk Sunar and Erkay Savaş
2015/273 ( PDF )
Dual System Encryption via Predicate Encodings
Hoeteck Wee
2015/272 ( PDF )
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
Baodong Qin and Shengli Liu
2015/271 ( PDF )
Toward Secure Implementation of McEliece Decryption
Mariya Georgieva and Frédéric de Portzamparc
2015/270 ( PDF )
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk
Markus Dichtl
2015/269 ( PDF )
Ideal Multilinear Maps Based on Ideal Lattices
Gu Chunsheng
2015/268 ( PDF )
Improved Top-Down Techniques in Differential Cryptanalysis
Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir
2015/267 ( PDF )
The Simplest Protocol for Oblivious Transfer
Tung Chou and Claudio Orlandi
2015/266 ( PDF )
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
2015/265 ( PDF )
Password Hashing Competition - Survey and Benchmark
George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas
2015/264 ( PDF )
BlindBox: Deep Packet Inspection over Encrypted Traffic
Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy
2015/263 ( PDF )
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
Ethan Heilman. Alison Kendler, Aviv Zohar, Sharon Goldberg
2015/262 ( PDF )
A look at the PGP ecosystem through the key server data
Hanno Böck
2015/261 ( PDF )
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
2015/260 ( PDF )
Computational Aspects of Correlation Power Analysis
Paul Bottinelli and Joppe W. Bos
2015/259 ( PDF )
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES
Patrick Derbez and Pierre-Alain Fouque
2015/258 ( PDF )
Lightweight MDS Involution Matrices
Siang Meng Sim and Khoongming Khoo and Frédérique Oggier and Thomas Peyrin
2015/257 ( PDF )
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
Vadim Lyubashevsky and Thomas Prest
2015/256 ( PDF )
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
Yang Lu, Quanling Zhang, Jiguo Li
2015/255 ( PDF )
A comprehensive analysis of game-based ballot privacy definitions
David Bernhard and Veronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi
2015/254 ( PDF )
Tornado Attack on RC4 with Applications to WEP and WPA
Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux
2015/253 ( PDF )
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang , Dongdai Lin
2015/252 ( PDF )
Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang, Jianghua Zhong, Dongdai Lin
2015/251 ( PDF )
How to Construct UC-Secure Searchable Symmetric Encryption Scheme
Kaoru Kurosawa and Yasuhiro Ohtaki
2015/250 ( PDF )
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys
Junji Shikata
2015/249 ( PDF )
Improved (Hierarchical) Inner-Product Encryption from Lattices
Keita Xagawa
2015/248 ( PDF )
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
Ryo Nishimaki and Keita Xagawa
2015/247 ( PDF )
Subgroup security in pairing-based cryptography
Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and Geovandro C. C. F. Pereira and Gustavo Zanon
2015/246 ( PDF )
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee
2015/245 ( PDF )
Practical Attacks on the Round-reduced PRINCE
Pawel Morawiecki
2015/244 ( PDF )
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
Jeremy Jean and Ivica Nikolic
2015/243 ( PDF )
Reliable Message Transmission under Partial Knowledge and General Adversaries
Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
2015/242 ( PDF )
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
2015/241 ( PDF )
Espresso: A Stream Cipher for 5G Wireless Communication Systems
Elena Dubrova and Martin Hell
2015/240 ( PDF )
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
Alex Biryukov, Patrick Derbez and Léo Perrin
2015/239 ( PDF )
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
Patrick Derbez and Léo Perrin
2015/238 ( PDF )
One Time Programs with Limited Memory
Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michał Zając
2015/237 ( PDF )
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers
2015/236 ( PDF )
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
Subhamoy Maitra and Santanu Sarkar and Anubhab Baksi and Pramit Dey
2015/235 ( PDF )
Performance and Security Improvements for Tor: A Survey
Mashael AlSabah and Ian Goldberg
2015/234 ( PDF )
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
2015/233 ( PDF )
Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
Ben Smyth and Steven Frink and Michael R. Clarkson
2015/232 ( PDF )
Cryptanalysis of Full Sprout
Virginie Lallemand and María Naya-Plasencia
2015/231 ( PDF )
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
Yonglin Hao
2015/230 ( PDF )
W-SPS: Designing a Wide-Area Secure Positioning System
Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun
2015/229 ( PDF )
Improving GGH Public Key Scheme Using Low Density Lattice Codes
Reza Hooshmand
2015/228 ( PDF )
Leakage-Resilient Cryptography with Key Derived from Sensitive Data
Konrad Durnoga and Tomasz Kazana and Michał Zając and Maciej Zdanowicz
2015/227 ( PDF )
Tradeoff Cryptanalysis of Memory-Hard Functions
Alex Biryukov and Dmitry Khovratovich
2015/226 ( PDF )
Secure Physical Computation using Disposable Circuits
Ben Fisch and Daniel Freund and Moni Naor
2015/225 ( PDF )
Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/224 ( PDF )
GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records
Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder
2015/223 ( PDF )
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers
Anubhab Baksi and Subhamoy Maitra and Santanu Sarkar
2015/222 ( PDF )
Towards Understanding the Known-Key Security of Block Ciphers
Elena Andreeva, Andrey Bogdanov, and Bart Mennink
2015/221 ( PDF )
Tighter, faster, simpler side-channel security evaluations beyond computing power
Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal
2015/220 ( PDF )
Key Homomorphic PRFs and Their Applications
Dan Boneh and Kevin Lewi and Hart Montgomery and Ananth Raghunathan
2015/219 ( PDF )
Efficient Format Preserving Encrypted Databases
Prakruti C, Sashank Dara and V.N. Muralidhara
2015/218 ( PDF )
Efficient k-out-of-n oblivious transfer protocol
wang qinglong
2015/217 ( PDF )
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles
Subhamoy Maitra and Goutam Paul and Willi Meier
2015/216 ( PDF )
Quasi-Adaptive NIZK for Linear Subspaces Revisited
Eike Kiltz and Hoeteck Wee
2015/215 ( PDF )
A revocable anonymity in Tor
Amadou Moctar Kane
2015/214 ( PDF )
GCM Security Bounds Reconsidered
Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata
2015/213 ( PDF )
Attribute-Based Versions of Schnorr and ElGamal
Javier Herranz
2015/212 ( PDF )
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger
2015/211 ( PDF )
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
Thijs Laarhoven and Benne de Weger
2015/210 ( PDF )
Secure and Efficient Initialization and Authentication Protocols for SHIELD
Chenglu Jin and Marten van Dijk
2015/209 ( PDF )
Triathlon of Lightweight Block Ciphers for the Internet of Things
Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Léo Perrin and Johann Großschädl and Alex Biryukov
2015/208 ( PDF )
Towards Secure Distance Bounding
Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay
2015/207 ( PDF )
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
Tobias Schneider and Amir Moradi
2015/206 ( PDF )
Efficient and Secure Delegation of Group Exponentiation to a Single Server
Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain
2015/205 ( PDF )
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
Jooyoung Lee
2015/204 ( PDF )
Leakage-Resilient Symmetric Encryption via Re-keying
Michel Abdalla and Sonia Belaïd and Pierre-Alain Fouque
2015/203 ( PDF )
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim Güneysu
2015/202 ( PDF )
Adaptively Secure Coin-Flipping, Revisited
Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park
2015/201 ( PDF )
Statistical Properties of Multiplication mod $2^n$
A. Mahmoodi Rishakani and S. M. Dehnavi and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
2015/200 ( PDF )
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Alexander Wild and Amir Moradi and Tim Güneysu
2015/199 ( PDF )
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Amir Moradi and Gesine Hinterwälder
2015/198 ( PDF )
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim Güneysu
2015/197 ( PDF )
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
N. Nalla Anandakumar
2015/196 ( PDF )
Tighter Reductions for Forward-Secure Signature Schemes
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2015/195 ( PDF )
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists
Stephanie Bayer and Jens Groth
2015/194 ( PDF )
Practical Homomorphic MACs for Arithmetic Circuits
Dario Catalano and Dario Fiore
2015/193 ( PDF )
Improving Modular Inversion in RNS using the Plus-Minus Method
Karim Bigou and Arnaud Tisserand
2015/192 ( PDF )
Memory-saving computation of the pairing fi nal exponentiation on BN curves
Sylvain DUQUESNE and Loubna GHAMMAM
2015/191 ( PDF )
iDASH Secure Genome Analysis Competition Using ObliVM
Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang and Elaine Shi
2015/190 ( PDF )
Multi-Client Non-Interactive Verifiable Computation
Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid
2015/189 ( PDF )
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Vizár
2015/188 ( PDF )
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2015/187 ( PDF )
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
Juan Garay and Jonathan Katz and Bjoern Tackmann and Vassilis Zikas
2015/186 ( PDF )
Higher Order Differential Analysis of NORX
Sourav Das and Subhamoy Maitra and and Willi Meier
2015/185 ( PDF )
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications
Elena Dubrova and Mats Näslund and Gunnar Carlsson and John Fornehed and Ben Smeets
2015/184 ( PDF )
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
Céline Blondeau and Kaisa Nyberg
2015/183 ( PDF )
New Links Between Differential and Linear Cryptanalysis
Céline Blondeau and Kaisa Nyberg
2015/182 ( PDF )
Tweakable Blockciphers with Asymptotically Optimal Security
Rodolphe Lampe and Yannick Seurin
2015/181 ( PDF )
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda Alkhzaimi and Chao Li
2015/180 ( PDF )
Key-Homomorphic Constrained Pseudorandom Functions
Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens
2015/179 ( PDF )
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
Palash Sarkar and Shashank Singh
2015/178 ( PDF )
How to Incentivize Data-Driven Collaboration Among Competing Parties
Pablo Daniel Azar and Shafi Goldwasser and Sunoo Park
2015/177 ( PDF )
On the Security of an Efficient Group Key Agreement Scheme for MANETs
Purushothama B R and Nishat Koti
2015/176 ( PDF )
Key Recovery for LWE in Polynomial Time
Kim Laine and Kristin Lauter
2015/175 ( PDF )
Trivial Nonce-Misusing Attack on Pure OMD
Tomer Ashur and Bart Mennink
2015/174 ( PDF )
A Practical Chosen Message Power Analysis Approach against the Key Whitening Layers on the Loop Architecture
Chenyang Tu and Lingchen Zhang and Neng Gao and Zeyi Liu and Yuan Ma and Zongbin Liu
2015/173 ( PDF )
Indistinguishability Obfuscation from Compact Functional Encryption
Prabhanjan Ananth and Abhishek Jain
2015/172 ( PDF )
Silent Simon: A Threshold Implementation under 100 Slices
Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth
2015/171 ( PDF )
Authenticated Network Time Synchronization
Benjamin Dowling and Douglas Stebila and Greg Zaverucha
2015/170 ( PDF )
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer
2015/169 ( PDF )
Short Schnorr signatures require a hash function with more than just random-prefix resistance
Daniel R. L. Brown
2015/168 ( PDF )
More PS and H-like bent functions
C. Carlet
2015/167 ( PDF )
Post-Zeroizing Obfuscation: The case of Evasive Circuits
Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry
2015/166 ( PDF )
Naturally Rehearsing Passwords
Jeremiah Blocki and Manuel Blum and Anupam Datta
2015/165 ( PDF )
The Cryptographic Hardness of Random Local Functions -- Survey
Benny Applebaum
2015/164 ( PDF )
Constant Size Ring Signature Without Random Oracle
Priyanka Bose and Dipanjan Das and C. Pandu Rangan
2015/163 ( PDF )
Indistinguishability Obfuscation from Functional Encryption
Nir Bitansky and Vinod Vaikuntanathan
2015/162 ( PDF )
New Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2015/161 ( PDF )
Exploring the Resilience of Some Lightweight Ciphers Against Pro filed Single Trace Attacks
Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
2015/160 ( PDF )
Differential-Linear Cryptanalysis of ICEPOLE
Tao Huang; Ivan Tjuawinata; Hongjun Wu
2015/159 ( PDF )
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
Shengbao Wu; Hongjun Wu; Tao Huang; Mingsheng Wang; Wenling Wu
2015/158 ( PDF )
Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Zvika Brakerski and Ilan Komargodski and Gil Segev
2015/157 ( PDF )
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Nuttapong Attrapadung and Shota Yamada
2015/156 ( PDF )
Building Lossy Trapdoor Functions from Lossy Encryption
Brett Hemenway and Rafail Ostrovsky
2015/155 ( PDF )
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor
2015/154 ( PDF )
Circuits Resilient to Additive Attacks with Applications to Secure Computation
Daniel Genkin and Yuval Ishai and Manoj M. Prabhakaran and Amit Sahai and Eran Tromer
2015/153 ( PDF )
Functional Encryption from (Small) Hardware Tokens
Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou
2015/152 ( PDF )
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults
Ronan Lashermes and Jacques Fournier and Louis Goubin
2015/151 ( PDF )
Bad directions in cryptographic hash functions
Daniel J. Bernstein and Andreas Hülsing and Tanja Lange and Ruben Niederhagen
2015/150 ( PDF )
Insynd: Improved Privacy-Preserving Transparency Logging
Roel Peeters and Tobias Pulls
2015/149 ( PDF )
Cryptanalysis of HMAC/NMAC-Whirlpool
Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu
2015/148 ( PDF )
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann
2015/147 ( PDF )
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
Lionel Rivière and Zakaria Najm and Pablo Rauzy and Jean-Luc Danger and Julien Bringer and Laurent Sauvage
2015/146 ( PDF )
New Attacks on Feistel Structures with Improved Memory Complexities
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2015/145 ( PDF )
Observations on the SIMON block cipher family
Stefan Kölbl and Gregor Leander and Tyge Tiessen
2015/144 ( PDF )
Security of the AES with a Secret S-box
Tyge Tiessen and Lars R. Knudsen and Stefan Kölbl and Martin M. Lauridsen
2015/143 ( PDF )
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs
Erich Wenger and Paul Wolfger
2015/142 ( PDF )
Multi-Client Verifiable Computation with Stronger Security Guarantees
S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2015/141 ( PDF )
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method
Céline Blondeau and Marine Minier
2015/140 ( PDF )
The Random Oracle Model: A Twenty-Year Retrospective
Neal Koblitz and Alfred Menezes
2015/139 ( PDF )
Performance Analysis of Some Password Hashing Schemes
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2015/138 ( PDF )
A Practical Key Exchange for the Internet using Lattice Cryptography
Vikram Singh
2015/137 ( PDF )
Multi-keyword Similarity Search Over Encrypted Cloud Data
Mikhail Strizhov and Indrajit Ray
2015/136 ( PDF )
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs
Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. L. M. Barreto
2015/135 ( PDF )
Generalizing Efficient Multiparty Computation
Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp
2015/134 ( PDF )
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions
Pierre Karpman
2015/133 ( PDF )
Private Computation on Encrypted Genomic Data
Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig
2015/132 ( PDF )
Homomorphic Computation of Edit Distance
Jung Hee Cheon and Miran Kim and Kristin Lauter2
2015/131 ( PDF )
On Lightweight Stream Ciphers with Shorter Internal States
Frederik Armknecht, Vasily Mikhalev
2015/130 ( PDF )
How to Bootstrap Anonymous Communication
Sune K. Jakobsen and Claudio Orlandi
2015/129 ( PDF )
Block-wise Non-Malleable Codes
Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay
2015/128 ( PDF )
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro
2015/127 ( PDF )
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
Ricardo Dahab and Steven Galbraith and Eduardo Morais
2015/126 ( PDF )
Perfect Structure on the Edge of Chaos
Nir Bitansky and Omer Paneth and Daniel Wichs
2015/125 ( PDF )
Multilinear Pseudorandom Functions
Aloni Cohen and Justin Holmgren
2015/124 ( PDF )
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs
Alexander Wild and Amir Moradi and Tim Güneysu
2015/123 ( PDF )
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
Dennis Hofheinz and Jessica Koch and Christoph Striecks
2015/122 ( PDF )
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2015/121 ( PDF )
Multi-Client Oblivious RAM secure against Malicious Servers
Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
2015/120 ( PDF )
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications
Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean-Luc Danger and Debdeep Mukhopadhyay and Xuan Thuy Ngo and Zakaria Najm
2015/119 ( PDF )
Making Masking Security Proofs Concrete or How to Evaluate the Security of any Leaking Device (Extended Version)
Alexandre Duc and Sebastian Faust and François-Xavier Standaert
2015/118 ( PDF )
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
Takahiro Matsuda and Goichiro Hanaoka
2015/117 ( PDF )
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy
Maciej Skorski
2015/116 ( PDF )
Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs
Riadh Brinci and Walid Khmiri and Mefteh Mbarek and Abdellatif Ben Rabâa and Ammar Bouallègue
2015/115 ( PDF )
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors
Muhammad Yasir Malik
2015/114 ( PDF )
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
2015/113 ( PDF )
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancrède Lepoint and María Naya-Plasencia and Pascal Paillier and Renaud Sirdey
2015/112 ( PDF )
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura
2015/111 ( PDF )
The Multivariate Hidden Number Problem
Steven D. Galbraith and Barak Shani
2015/110 ( PDF )
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices
Shijun Zhao and Qianying Zhang
2015/108 ( PDF )
Lucjan Hanzlik and Przemysław Kubiak and Mirosław Kutyłowski
2015/107 ( PDF )
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
Attila A. Yavuz and Jorge Guajardo
2015/106 ( PDF )
Provably weak instances of Ring-LWE
Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
2015/105 ( PDF )
Inner Product Masking Revisited
Josep Balasch and Sebastian Faust and Benedikt Gierlichs
2015/104 ( PDF )
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Rafael Dowsley and Jörn Müller-Quade and Tobias Nilges
2015/103 ( PDF )
Mergeable Functional Encryption
Vincenzo Iovino and Karol Zebrowski
2015/102 ( PDF )
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
Shay Gueron and Yehuda Lindell
2015/101 ( PDF )
Multi-Key Security: The Even-Mansour Construction Revisited
Nicky Mouha and Atul Luykx
2015/100 ( PDF )
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA
Christian Wittke and Zoya Dyka and Peter Langendoerfer
2015/099 ( PDF )
Universally Composable Firewall Architectures using Trusted Hardware
Dirk Achenbach and Jörn Müller-Quade and Jochen Rill
2015/098 ( PDF )
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
Shantian Cheng and Juanyang Zhang
2015/097 ( PDF )
Surreptitiously Weakening Cryptographic Systems
Bruce Schneier and Matthew Fredrikson and Tadayoshi Kohno and Thomas Ristenpart
2015/096 ( PDF )
A Meet in the Middle Attack on Reduced Round Kuznyechik
Riham AlTawy and Amr M. Youssef
2015/095 ( PDF )
Rotational Cryptanalysis of ARX Revisited
Dmitry Khovratovich and Ivica Nikolic and Josef Pieprzyk and Przemyslaw Sokolowski and Ron Steinfeld
2015/094 ( PDF )
Some New Results on Binary Polynomial Multiplication
Murat Cenk and M. Anwar Hasan
2015/093 ( PDF )
Generalization of Statistical Criteria for Sboxes
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
2015/092 ( PDF )
Grasha Jacob, Dr. A. Murugan, Irine Viola
2015/091 ( PDF )
Related-Key Forgeries for Prøst-OTR
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/090 ( PDF )
Structural Evaluation by Generalized Integral Property
Yosuke Todo
2015/089 ( PDF )
On the security margin of MAC striping
Thomas Eisenbarth and Aaron Meyerowitz and Rainer Steinwandt
2015/088 ( PDF )
Structural Weaknesses in the Open Smart Grid Protocol
Klaus Kursawe and Christiane Peters
2015/087 ( PDF )
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
David Derler and Christian Hanser and Daniel Slamanig
2015/086 ( PDF )
Practical Compact E-Cash with Arbitrary Wallet Size
Patrick Märtens
2015/085 ( PDF )
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
Anne Canteaut and Joëlle Roué
2015/084 ( PDF )
On the Disadvantages of Pairing-based Cryptography
Zhengjun Cao and Lihua Liu
2015/083 ( PDF )
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
Massimo Chenal and Qiang Tang
2015/082 ( PDF )
On the Difficulty of Securing Web Applications using CryptDB
İhsan Haluk AKIN and Berk Sunar
2015/081 ( PDF )
Amortizing Garbled Circuits
Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff
2015/080 ( PDF )
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
Feng Hao and Xun Yi and Liqun Chen and Siamak F. Shahandashti
2015/079 ( PDF )
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
Jiqiang Lu
2015/078 ( PDF )
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters
GU Chun-xiang and. Xin Dan and. ZHENG Yong-hui and. KANG Yuan-ji
2015/077 ( PDF )
On the Primary Constructions of Vectorial Boolean Bent Functions
Yuwei Xu and Chuankun Wu
2015/076 ( PDF )
Fully Structure-Preserving Signatures and Shrinking Commitments
Masayuki Abe and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi
2015/075 ( PDF )
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen
2015/074 ( PDF )
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
Gilles Barthe and Juan Manuel Crespo and Yassine Lakhnech and Benedikt Schmidt
2015/073 ( PDF )
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin
2015/072 ( PDF )
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Olivier Blazy and Céline Chevalier and Damien Vergnaud
2015/071 ( PDF )
Factoring N=p^r q^s for Large r and s
Jean-Sebastien Coron and Jean-Charles Faugere and Guenael Renault and Rina Zeitoun
2015/070 ( PDF )
The Sum Can Be Weaker Than Each Part
Gaëtan Leurent and Lei Wang
2015/069 ( PDF )
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
Benoît Cogliati and Yannick Seurin
2015/068 ( PDF )
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
Gregor Leander and Brice Minaud and Sondre Rønjom
2015/067 ( PDF )
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
Susumu Kiyoshima
2015/066 ( PDF )
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
Tobias Schneider and Amir Moradi and Tim Güneysu
2015/065 ( PDF )
A lightweight-friendly modifcation of GOST block cipher
Andrey Dmukh and Denis Dygin and Grigory Marshalko
2015/064 ( PDF )
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
Handan Kılınç and Alptekin Küpçü
2015/063 ( PDF )
CamlCrush: A PKCS\#11 Filtering Proxy
R. Benadjila and T. Calderon and M. Daubignard
2015/062 ( PDF )
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
Yuval Yarom and Gefei Li and Damith C. Ranasinghe
2015/061 ( PDF )
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
2015/060 ( PDF )
Verified Proofs of Higher-Order Masking
Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub
2015/059 ( PDF )
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
2015/058 ( PDF )
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
Berry Schoenmakers and Meilof Veeningen
2015/057 ( PDF )
Cold Boot Attacks in the Discrete Logarithm Setting
Bertram Poettering and Dale L. Sibborn
2015/056 ( PDF )
Better Algorithms for LWE and LWR
Alexandre Duc and Florian Tramèr and Serge Vaudenay
2015/055 ( PDF )
Richer Efficiency/Security Trade-offs in 2PC
Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek
2015/054 ( PDF )
Non-committing encryption from $\Phi$-hiding
Brett Hemenway and Rafail Ostrovsky and Alon Rosen
2015/053 ( PDF )
Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/052 ( PDF )
Interactive Message-Locked Encryption and Secure Deduplication
Mihir Bellare and Sriram Keelveedhi
2015/051 ( PDF )
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
Li Lin, Wenling Wu
2015/050 ( PDF )
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
Carla Ràfols
2015/049 ( PDF )
On Solving Lpn using BKW and Variants
Sonia Bogos and Florian Tramer and Serge Vaudenay
2015/048 ( PDF )
On Obfuscation with Random Oracles
Ran Canetti and Yael Tauman Kalai and Omer Paneth
2015/047 ( PDF )
Linearly Homomorphic Encryption from DDH
Guilhem Castagnos and Fabien Laguillaumie
2015/046 ( PDF )
On the concrete hardness of Learning with Errors
Martin R. Albrecht and Rachel Player and Sam Scott
2015/045 ( PDF )
Reliable Information Extraction for Single Trace Attacks
Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
2015/044 ( PDF )
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
Binanda Sengupta and Abhijit Das
2015/043 ( PDF )
Group Signature with Deniability: How to Disavow a Signature
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka
2015/042 ( PDF )
High Performance Lattice-based CCA-secure Encryption
Rachid El~Bansarkhani and Johannes Buchmann
2015/041 ( PDF )
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP
Artur Mariano and Thijs Laarhoven and Christian Bischof
2015/040 ( PDF )
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/039 ( PDF )
Type-Based Verification of Electronic Voting Protocols
Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling
2015/038 ( PDF )
Aggregate Pseudorandom Functions and Connections to Learning
Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan
2015/037 ( PDF )
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/036 ( PDF )
Faster software for fast endomorphisms
Billy Bob Brumley
2015/035 ( PDF )
Cryptographically Secure CRC for Lightweight Message Authentication
Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist
2015/034 ( PDF )
Suit up! Made-to-Measure Hardware Implementations of Ascon
Hannes Groß and Erich Wenger and Christoph Dobraunig and Christoph Ehrenhöfer
2015/033 ( PDF )
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel
2015/032 ( PDF )
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF
Zvika Brakerski and Vinod Vaikuntanathan
2015/031 ( PDF )
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence
Kai-Min Chung and Rafael Pass
2015/030 ( PDF )
Cryptanalysis of Ascon
Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schläffer
2015/029 ( PDF )
Predicate Encryption for Circuits from LWE
Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2015/028 ( PDF )
Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$)
Jeremy Maitin-Shepard
2015/027 ( PDF )
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption
Adam Smith and Ye Zhang
2015/026 ( PDF )
A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/025 ( PDF )
Obfuscating Circuits via Composite-Order Graded Encoding
Benny Applebaum and Zvika Brakerski
2015/024 ( PDF )
Non-Abelian Analogs of Lattice Rounding
Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan
2015/023 ( PDF )
Multilinear Maps Using Ideal Lattices without Encodings of Zero
Gu Chunsheng
2015/022 ( PDF )
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
Bo Yang and Dengguo Feng and Yu Qin and Yingjun Zhang and Weijin Wang
2015/021 ( PDF )
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification
Xin Li
2015/020 ( PDF )
Simpler Efficient Group Signatures from Lattices
Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang
2015/019 ( PDF )
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Mehdi Tibouchi
2015/018 ( PDF )
2015/017 ( PDF )
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
2015/016 ( PDF )
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Yannis Rouselakis and Brent Waters
2015/015 ( PDF )
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
Florian Bergsma, Tibor Jager, Jörg Schwenk
2015/014 ( PDF )
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based
San Ling and Khoa Nguyen and Huaxiong Wang
2015/013 ( PDF )
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Nico Döttling
2015/012 ( PDF )
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
Tancrède Lepoint and Mehdi Tibouchi
2015/011 ( PDF )
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications
Benjamin Buhrow and Paul Riemer and Mike Shea and Barry Gilbert and Erik Daniel
2015/010 ( PDF )
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
Shengli Liu and Kenneth G. Paterson
2015/009 ( PDF )
Rig: A simple, secure and flexible design for Password Hashing
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2015/008 ( PDF )
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Satrajit Ghosh and Aniket Kate
2015/007 ( PDF )
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Tobias Pulls and Roel Peeters
2015/006 ( PDF )
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Jan Camenisch and Robert R. Enderlein and Gregory Neven
2015/005 ( PDF )
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs
2015/004 ( PDF )
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Carmit Hazay
2015/003 ( PDF )
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen
2015/002 ( PDF )
Characterization of MDS mappings
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/001 ( PDF )
A note on the security of Higher-Order Threshold Implementations
Oscar Reparaz

[ Cryptology ePrint archive ]