Cryptology ePrint Archive: Search Results

2016/542 ( PDF )
MPC-Friendly Symmetric Key Primitives
Lorenzo Grassi and Christian Rechberger and Dragos Rotaru and Peter Scholl and Nigel P. Smart
2016/541 ( PDF )
Big Key Symmetric Encryption: Resisting Key Exfiltration
Mihir Bellare and Daniel Kane and Phillip Rogaway
2016/540 ( PDF )
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
Alberto Battistello and Jean-Sebastien Coron and Emmanuel Prouff and Rina Zeitoun
2016/539 ( PDF )
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version)
Léo Perrin, Aleksei Udovenko and Alex Biryukov
2016/538 ( PDF )
How to prove knowledge of small secrets
Carsten Baum and Ivan Damgård and Kasper Larsen and Michael Nielsen
2016/537 ( PDF )
A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm
Palash Sarkar and Shashank Singh
2016/536 ( PDF )
Position-Based Cryptography and Multiparty Communication Complexity
Joshua Brody and Stefan Dziembowski and Sebastian Faust and Krzysztof Pietrzak
2016/535 ( PDF )
Impossible Differential Cryptanalysis of Midori
Chen Zhan and Wang Xiaoyun
2016/534 ( PDF )
Damaging, Simplifying, and Salvaging p-OMD
Tomer Ashur and Bart Mennink
2016/533 ( PDF )
New Insights on AES-like SPN Ciphers
Bing Sun and Meicheng Liu and Jian Guo and Longjiang Qu and Vincent Rijmen
2016/532 ( PDF )
Cryptanalysis of GOST2
Tomer Ashur and Achiya Bar-On and Orr Dunkelman
2016/531 ( PDF )
Reducing number field defining polynomials: An application to class group computations
Alexandre Gélin and Antoine Joux
2016/530 ( PDF )
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou
2016/529 ( PDF )
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
Antonio Faonio and Daniele Venturi
2016/528 ( PDF )
Adaptive precision LLL and Potential-LLL reductions with Interval arithmetic
Thomas Espitau and Antoine Joux
2016/527 ( PDF )
Secure Outsourcing of Circuit Manufacturing
Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi
2016/526 ( PDF )
Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree
Jinhyuck Jeong and Taechan Kim
2016/525 ( PDF )
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
Benoît Cogliati and Yannick Seurin
2016/524 ( PDF )
Unifying Security Notions of Functional Encryption
Sanjam Garg and Akshayaram Srinivasan
2016/523 ( PDF )
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Jiang Zhang and Yu Chen and Zhenfeng Zhang
2016/522 ( PDF )
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)
Daisuke Fujimoto and Shivam Bhasin and Makoto Nagata and Jean-Luc Danger
2016/521 ( PDF )
SAT-based cryptanalysis of ACORN
Frédéric Lafitte and Liran Lerman and Olivier Markowitch and Dirk Van Heule
2016/520 ( PDF )
Universally Composable Two-Server PAKE
Franziskus Kiefer and Mark Manulis
2016/519 ( PDF )
On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings
Benny Applebaum; Pavel Raykov
2016/518 ( PDF )
Attribute-based Key Exchange with General Policies
Vladimir Kolesnikov and Hugo Krawczyk and Yehuda Lindell and Alex J. Malozemoff and Tal Rabin
2016/517 ( PDF )
ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab
David McCann, Carolyn Whitnall and Elisabeth Oswald
2016/516 ( PDF )
Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited
Ferucio Laurentiu Tiplea and George Teseleanu and Sorin Iftene and Anca-Maria Nica
2016/515 ( PDF )
RSA Weak Public Keys available on the Internet
Mihai Barbulescu and Adrian Stratulat and Vlad Traista-Popescu and Emil Simion
2016/514 ( PDF )
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
Yu Yu and Jiang Zhang
2016/513 ( PDF )
Applying TVLA to Public Key Cryptographic Algorithms
Michael Tunstall and Gilbert Goodwill
2016/512 ( PDF )
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"
Lucjan Hanzlik and Kamil Kluczniak
2016/511 ( PDF )
Optimal-Rate Non-Committing Encryption in a CRS Model
Ran Canetti and Oxana Poburinnaya and Mariana Raykova
2016/510 ( PDF )
A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes
Jean-Claude Bajard and Julien Eynard and Anwar Hasan and Vincent Zucca
2016/509 ( PDF )
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Xiaoyang Dong and Xiaoyun Wang
2016/508 ( PDF )
Collapse-binding quantum commitments without random oracles
Dominique Unruh
2016/507 ( PDF )
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction
Aurore Guillevic and François Morain and Emmanuel Thomé
2016/506 ( PDF )
TOR - Didactic pluggable transport
Ioana-Cristina Panait and Cristian Pop and Alexandru Sirbu and Adelina Vidovici and Emil Simion
2016/505 ( PDF )
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
Marcel Keller and Emmanuela Orsini and Peter Scholl
2016/504 ( PDF )
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography
Patrick Longa and Michael Naehrig
2016/503 ( PDF )
MQSAS - A Multivariate Sequential Aggregate Signature Scheme
Rachid El Bansarkhani and Mohamed Saied Emam Mohamed and Albrecht Petzoldt
2016/502 ( PDF )
Key Recovery Attack against 2.5-round pi-Cipher
Christina Boura and Avik Chakraborti and Gaëtan Leurent and Goutam Paul and Dhiman Saha and Hadi Soleimany and Valentin Suder
2016/501 ( PDF )
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience
Libo He, Chen Yuan, Hu Xiong, and Zhiguang Qin
2016/500 ( PDF )
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups
Jong Hwan Park and Kwangsu Lee and Dong Hoon Lee
2016/499 ( PDF )
Drone Targeted Cryptography
Gideon Samid
2016/498 ( PDF )
Towards Tightly Secure Short Signature and IBE
Xavier Boyen and Qinyi Li
2016/497 ( PDF )
Secure Computation from Elastic Noisy Channels
Dakshita Khurana and Hemanta K. Maji and Amit Sahai
2016/496 ( PDF )
All Complete Functionalities are Reversible
Daniel Kraschewski and Dakshita Khurana and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai
2016/495 ( PDF )
Cross&Clean: Amortized Garbled Circuits with Constant Overhead
Jesper Buus Nielsen and Claudio Orlandi
2016/494 ( PDF )
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version)
Bo Yang and Kang Yang and Zhenfeng Zhang and Yu Qin and Dengguo Feng
2016/493 ( PDF )
Partition-Based Trapdoor Ciphers
Arnaud Bannier and Nicolas Bodin and Eric Filiol
2016/492 ( PDF )
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Martin Albrecht and Lorenzo Grassi and Christian Rechberger and Arnab Roy and Tyge Tiessen
2016/491 ( PDF )
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
Daniel P. Martin and Luke Mather and Elisabeth Oswald and Martijn Stam
2016/490 ( PDF )
Truncated, Impossible, and Improbable Differential Analysis of Ascon
Cihangir Tezcan
2016/489 ( PDF )
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol
Nethanel Gelernter and Amir Herzberg and Hemi Leibowitz
2016/488 ( PDF )
Methods for Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE
Husen Wang and Qiang Tang
2016/487 ( PDF )
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems
Amine MRABET, Nadia EL-MRABET, Ronan LASHERMES, Jean Baptiste RIGAUD, Belgacem BOUALLEGUE, Sihem MESNAGER and Mohsen MACHHOUT
2016/486 ( PDF )
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Hannes Gross and Stefan Mangard and Thomas Korak
2016/485 ( PDF )
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm
Palash Sarkar and Shashank Singh
2016/484 ( PDF )
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations
Jung Hee Cheon and HeeWon Chung and Myungsun Kim and Kang-Won Lee
2016/483 ( PDF )
Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures
Hiroaki Anada and Seiko Arita and Kouichi Sakurai
2016/482 ( PDF )
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
Shashank Agrawal and David J. Wu
2016/481 ( PDF )
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Amir Moradi and Tobias Schneider
2016/480 ( PDF )
Achieving Better Privacy for the 3GPP AKA Protocol
Pierre-Alain Fouque and Cristina Onete and Benjamin Richard
2016/479 ( PDF )
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
Jakub Szefer
2016/478 ( PDF )
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
Erman Ayday and Qiang Tang and Arif Yilmaz
2016/477 ( PDF )
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology
Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai
2016/476 ( PDF )
Groth-Sahai Proofs Revisited Again: A Bug in ``Optimized'' Randomization
Keita Xagawa
2016/475 ( PDF )
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Hanno Böck and Aaron Zauner and Sean Devlin and Juraj Somorovsky and Philipp Jovanovic
2016/474 ( PDF )
T-Proof: Secure Communication via Non-Algorithmic Randomization
Gideon Samid
2016/473 ( PDF )
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Thomas Unterluggauer and Stefan Mangard
2016/472 ( PDF )
Adequate Elliptic Curve for Computing the Product of n Pairings
Loubna Ghammam and Emmanuel Fouotsa
2016/471 ( PDF )
NTRU Modular Lattice Signature Scheme on CUDA GPUs
Wei Dai and John Schanck and Berk Sunar and William Whyte and Zhenfei Zhang
2016/470 ( PDF )
Better Security for Queries on Encrypted Databases
Myungsun Kim and Hyung Tae Lee and San Ling and Shu Qin Ren and Benjamin Hong Meng Tan and Huaxiong Wang
2016/469 ( PDF )
Identity Chains
Andrew Egbert and Brad Chun and Thomas Otte
2016/468 ( PDF )
Chaos Machine: Different Approach to the Application and Significance of Numbers
Maciej A. Czyzewski
2016/467 ( PDF )
Speeding up R-LWE post-quantum key exchange
Shay Gueron and Fabian Schlieker
2016/466 ( PDF )
AnoNotify: A Private Notification Service
Ania Piotrowska and Jamie Hayes and Nethanel Gelernter and George Danezis and Amir Herzberg
2016/465 ( PDF )
Can Large Deviation Theory be Used for Estimating Data Complexity?
Subhabrata Samajder and Palash Sarkar
2016/464 ( PDF )
Beaver: A Decentralized Anonymous Marketplace with Secure Reputation
Kyle Soska and Albert Kwon and Nicolas Christin and Srinivas Devadas
2016/463 ( PDF )
Authenticated Encryption with Variable Stretch
Reza Reyhanitabar and Serge Vaudenay and Damian Vizár
2016/462 ( PDF )
Fully Homomorphic Encryption with Isotropic Elements
Masahiro Yagisawa
2016/461 ( PDF )
NTRU Prime
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Christine van Vredendaal
2016/460 ( PDF )
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys
Kwangsu Lee and Seunghwan Park
2016/459 ( PDF )
Non-Interactive RAM and Batch NP Delegation from any PIR
Zvika Brakerski and Justin Holmgren and Yael Kalai
2016/458 ( PDF )
CompGC: Efficient Offline/Online Semi-honest Two-party Computation
Adam Groce and Alex Ledger and Alex J. Malozemoff and Arkady Yerukhimovich
2016/457 ( PDF )
Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption
Wei Yuan
2016/456 ( PDF )
Secure Protocol Transformations
Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu
2016/455 ( PDF )
Extracting the RC4 secret key of the Open Smart Grid Protocol
Linus Feiten, Matthias Sauer
2016/454 ( PDF )
Analysis of the Blockchain Protocol in Asynchronous Networks
Rafael Pass and Lior Seeman and abhi shelat
2016/453 ( PDF )
SQL on Structurally-Encrypted Databases
Seny Kamara and Tarik Moataz
2016/452 ( PDF )
Secure Logging Schemes and Certificate Transparency
Benjamin Dowling and Felix Günther and Udyani Herath and Douglas Stebila
2016/451 ( PDF )
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
Wacław Banasik and Stefan Dziembowski and Daniel Malinowski
2016/450 ( PDF )
A Provably Secure Code-based Concurrent Signature Scheme
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Mohammad Reza Aref
2016/449 ( PDF )
Loop-Abort Faults on Lattice-Based Fiat–Shamir and Hash-and-Sign Signatures
Thomas Espitau and Pierre-Alain Fouque and Benoît Gérard and Mehdi Tibouchi
2016/448 ( PDF )
A Note on ``Outsourcing Large Matrix Inversion Computation to a Public Cloud"
Zhengjun Cao and Lihua Liu
2016/447 ( PDF )
Theoretical Attacks on E2E Voting Systems
Peter Hyun-Jeen Lee and Siamak F. Shahandashti
2016/446 ( PDF )
Quantum key distribution with combined conjugate coding and information overloading
Boris Skoric
2016/445 ( PDF )
SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme
Alhassan Khedr and Glenn Gulak
2016/444 ( PDF )
The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
Roberto Avanzi
2016/443 ( PDF )
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography
Simon Cogliani and Houda Ferradi and Rémi Géraud and David Naccache
2016/442 ( PDF )
Blind Password Registration for Verifier-based PAKE
Franziskus Kiefer and Mark Manulis
2016/441 ( PDF )
Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA
Durga Prasad Sahoo and Sikhar Patranabis and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty
2016/440 ( PDF )
Function-Hiding Inner Product Encryption is Practical
Sam Kim and Kevin Lewi and Avradip Mandal and Hart Montgomery and Arnab Roy and David J. Wu
2016/439 ( PDF )
A Measure Version of Gaussian Heuristic
Hao Chen
2016/438 ( PDF )
sElect: A Lightweight Verifiable Remote Voting System
Ralf Kuesters and Johannes Mueller and Enrico Scapin and Tomasz Truderung
2016/437 ( PDF )
Observations on the LPN Solving Algorithm from Eurocrypt'16
Sonia Bogos and Serge Vaudenay
2016/436 ( PDF )
Cryptanalysis of Reduced NORX
Nasour Bagheri and Tao Huang and Keting Jia and Florian Mendel and Yu Sasaki
2016/435 ( PDF )
The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs
Rafael del Pino and Vadim Lyubashevsky and David Pointcheval
2016/434 ( PDF )
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not
Cong Chen and Mohammad Farmani and Thomas Eisenbarth
2016/433 ( PDF )
Analysis of Key Wrapping APIs: Generic Policies, Computational Security
Guillaume Scerri and Ryan Stanley-Oakes
2016/432 ( PDF )
Two-Input Functional Encryption for Inner Products from Bilinear Maps
Kwangsu Lee and Dong Hoon Lee
2016/431 ( PDF )
Security Proofs for Participation Privacy and Stronger Veri ability for Helios
David Bernhard, Oksana Kulyk, Melanie Volkamer
2016/430 ( PDF )
Partially homomorphic encryption schemes over finite fields
Jian Liu and Lusheng Chen and Sihem Mesnager
2016/429 ( PDF )
Information-Theoretical Analysis of Two Shannon's Ciphers
Boris Ryabko
2016/428 ( PDF )
An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function
Phuong Ha Nguyen and Durga Prasad Sahoo
2016/427 ( PDF )
Network Deprived SNA : An Alternative To Anonymization
Varsha Bhat Kukkala and Jaspal Singh Saini and S.R.S. Iyengar
2016/426 ( PDF )
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
Fahad Shaon and Murat Kantarcioglu
2016/425 ( PDF )
Multi-Input Inner-Product Functional Encryption from Pairings
Michel Abdalla and Mariana Raykova and Hoeteck Wee
2016/424 ( PDF )
Computational Security of Quantum Encryption
Gorjan Alagic and Anne Broadbent and Bill Fefferman and Tommaso Gagliardoni and Christian Schaffner and Michael St. Jules
2016/423 ( PDF )
Modeling Random Oracles under Unpredictable Queries
Pooya Farshim and Arno Mittelbach
2016/422 ( PDF )
A deeper understanding of the XOR count distribution in the context of lightweight cryptography
Sumanta Sarkar and Siang Meng Sim
2016/421 ( PDF )
Floating-Point Homomorphic Encryption
Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song
2016/420 ( PDF )
A note on the security of threshold implementations with $d+1$ input shares
Santos Merino Del Pozo and François-Xavier Standaert
2016/419 ( PDF )
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing
Yi LU and Yvo DESMEDT
2016/418 ( PDF )
Shorter Circuit Obfuscation in Challenging Security Models
Zvika Brakerski and Or Dagmi
2016/417 ( PDF )
New Tools for Multi-Party Computation
Lisa Kohl
2016/416 ( PDF )
A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval
Rémi Bazin and Alexander Schaub and Omar Hasan and Lionel Brunie
2016/415 ( PDF )
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
Nina Bindel and Johannes Buchmann and Juliane Krämer
2016/414 ( PDF )
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version)
Li Lin and Wenling Wu and Yafei Zheng
2016/413 ( PDF )
Efficient algorithms for supersingular isogeny Diffie-Hellman
Craig Costello and Patrick Longa and Michael Naehrig
2016/412 ( PDF )
Solving Quadratic Equations with XL on Parallel Architectures - extended version
Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, and Bo-Yin Yang
2016/411 ( PDF )
Polymorphic Encryption and Pseudonymisation for Personalised Healthcare
Eric Verheul and Bart Jacobs and Carlo Meijer and Mireille Hildebrandt and Joeri de Ruiter
2016/410 ( PDF )
Efficient quantum-resistant trust Infrastructure based on HIMMO
Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Sauvik Bhattacharya and Maarten Bodlaender
2016/409 ( PDF )
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}
Alex Biryukov; Vesselin Velichkov; Yann Le Corre
2016/408 ( PDF )
Towards Bitcoin Payment Networks
Patrick McCorry and Malte Möser and Siamak F. Shahandashti and Feng Hao
2016/407 ( PDF )
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck
Kai Fu; Meiqin Wang; Yinghua Guo; Siwei Sun; Lei Hu
2016/406 ( PDF )
On the Construction of Lightweight Circulant Involutory MDS Matrices
Yongqiang Li and Mingsheng Wang
2016/405 ( PDF )
Multiple Differential Cryptanalysis: A Rigorous Analysis
Subhabrata Samajder and Palash Sarkar
2016/404 ( PDF )
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
Subhabrata Samajder and Palash Sarkar
2016/403 ( PDF )
On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
Sanjit Chatterjee and Alfred Menezes and Francisco Rodriguez-Henriquez
2016/402 ( PDF )
Fully Homomorphic Encryption for Point Numbers
Seiko Arita and Shota Nakasato
2016/401 ( PDF )
Tower Number Field Sieve Variant of a Recent Polynomial Selection Method
Palash Sarkar and Shashank Singh
2016/400 ( PDF )
Towards Secure Quadratic Voting
Sunoo Park and Ronald L. Rivest
2016/399 ( PDF )
Slow Motion Zero Knowledge Identifying With Colliding Commitments
Houda Ferradi and Rémi Géraud and David Naccache
2016/398 ( PDF )
Algebraic Insights into the Secret Feistel Network (Full version)
Léo Perrin and Aleksei Udovenko
2016/397 ( PDF )
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model
Ronald Cramer and Ivan Damgård and Nico Döttling and Irene Giacomelli and Chaoping Xing
2016/396 ( PDF )
Cryptanalysis of Haraka
Jérémy Jean
2016/395 ( PDF )
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2016/394 ( PDF )
Strengthening the Known-Key Security Notion for Block Ciphers
Benoît Cogliati and Yannick Seurin
2016/393 ( PDF )
Adjacency Graphs, Irreducible Polynomials and Cyclotomy
Ming Li and Dongdai Lin
2016/392 ( -- withdrawn -- )
Towards a Further Understanding of Bit-Based Division Property
Ling Sun and Meiqin Wang
2016/391 ( PDF )
A Digital Signature Scheme Based on Random Split of St-Gen Codes
Danilo Gligoroski and Simona Samardjiska
2016/390 ( PDF )
Obfuscation without the Vulnerabilities of Multilinear Maps
Sanjam Garg and Pratyay Mukherjee and Akshayaram Srinivasan
2016/389 ( PDF )
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees
Georg Fuchsbauer and Zahra Jafargholi and Krzysztof Pietrzak
2016/388 ( PDF )
Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem
Mojahed Mohamed and Xiaofen Wang and Xiaosong Zhang
2016/387 ( PDF )
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
K. Baghery, B. Abdolmaleki, M. J. Emadi
2016/386 ( PDF )
Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators
Vladimir Rožić and Bohan Yang and Nele Mentens and Ingrid Verbauwhede
2016/385 ( PDF )
A note on Ring-LWE security in the case of Fully Homomorphic Encryption
Guillaume Bonnoron and Caroline Fontaine
2016/384 ( PDF )
Attacks against Filter Generators Exploiting Monomial Mappings
Anne Canteaut and Yann Rotella
2016/383 ( PDF )
Reducing the Key Size of the SRP Encryption Scheme - Extended version
Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi
2016/382 ( PDF )
Faster discrete logarithms on FPGAs
Daniel J. Bernstein and Susanne Engels and Tanja Lange and Ruben Niederhagen and Christof Paar and Peter Schwabe and Ralf Zimmermann
2016/381 ( PDF )
FHE Circuit Privacy Almost For Free
Florian Bourse and Rafaël Del Pino and Michele Minelli and Hoeteck Wee
2016/380 ( PDF )
Parallel Implementation of CVP enumeration for LWE
Elena Kirshanova and Alexander May and Friedrich Wiemer
2016/379 ( PDF )
Two More Efficient Variants of the J-PAKE Protocol
Jean Lancrenon and Marjan Skrobot and Qiang Tang
2016/378 ( PDF )
Using semidirect product of (semi)groups in public key cryptography
Delaram Kahrobaei and Vladimir Shpilrain
2016/377 ( PDF )
Differential Cryptanalysis of Salsa and ChaCha -- An Evaluation with a Hybrid Model
Arka Rai Choudhuri and Subhamoy Maitra
2016/376 ( PDF )
A Systematic Analysis of the Juniper Dual EC Incident
Stephen Checkoway and Shaanan Cohney and Christina Garman and Matthew Green and Nadia Heninger and Jacob Maskiewicz and Eric Rescorla and Hovav Shacham and Ralf-Philipp Weinmann
2016/375 ( PDF )
Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
Alon Rosen and Gil Segev and Ido Shahaf
2016/374 ( PDF )
Analysis of SHA-512/224 and SHA-512/256
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2016/373 ( PDF )
Adaptive partitioning
Dennis Hofheinz
2016/372 ( PDF )
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
Mihir Bellare and Georg Fuchsbauer and Alessandra Scafuro
2016/371 ( PDF )
A Cryptographic Analysis of UMTS/LTE AKA
Stéphanie Alt and Pierre-Alain Fouque and Gilles Macario-rat and Cristina Onete and Benjamin Richard
2016/370 ( PDF )
Malleability of the blockchain’s entropy
Cecile Pierrot and Benjamin Wesolowski
2016/369 ( PDF )
On Multi-Point Local Decoding of Reed-Muller Codes
Ronald Cramer and Chaoping Xing and Chen Yuan
2016/368 ( PDF )
Foundations of Fully Dynamic Group Signatures
Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth
2016/367 ( PDF )
An Analysis of OpenSSL's Random Number Generator
Falko Strenzke
2016/366 ( PDF )
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers
Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina
2016/365 ( PDF )
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
Masahiro Ishii and Jérémie Detrey and Pierrick Gaudry and Atsuo Inomata and Kazutoshi Fujikawa
2016/364 ( -- withdrawn -- )
Cryptographic Analysis of the 3GPP AKA Protocol
Stéphanie Alt and Pierre-Alain Fouque and Gilles Macario-rat and Cristina Onete and Benjamin Richard
2016/363 ( PDF )
Legally Fair Contract Signing Without Keystones
Houda Ferradi, Rémi Géraud, Diana Maimut,, David Naccache, and David Pointcheval
2016/362 ( PDF )
An Empirical Study towards Refining the AKS Primality Testing Algorithm
Lalitha Kiran Nemana and V. Ch. Venkaiah
2016/361 ( PDF )
Online-Offline Functional Encryption for Bounded Collusions
Shweta Agrawal and Alon Rosen
2016/360 ( PDF )
Another Look at Tightness II: Practical Issues in Cryptography
Sanjit Chatterjee and Neal Koblitz and Alfred Menezes and Palash Sarkar
2016/359 ( PDF )
Less is More - Dimensionality Reduction from a Theoretical Perspective
Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul
2016/358 ( PDF )
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
Ari Juels and Ahmed Kosba and Elaine Shi
2016/357 ( PDF )
State Management for Hash Based Signatures
David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, and Johannes Buchmann
2016/356 ( PDF )
More Efficient Constructions for Inner-Product Encryption
Somindu C. Ramanna
2016/355 ( PDF )
Fruit: Ultra-Lightweight Stream Cipher with Shorter Internal State
Vahid Amin Ghafari, Honggang Hu, and Chengxin Xie
2016/354 ( PDF )
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan
2016/353 ( PDF )
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA
Atsushi Takayasu and Noboru Kunihiro
2016/352 ( PDF )
Closing the Gap in RFC 7748: Implementing Curve448 in Hardware
Pascal Sasdrich and Tim Güneysu
2016/351 ( PDF )
How (Not) to Instantiate Ring-LWE
Chris Peikert
2016/350 ( PDF )
Probabilistic Termination and Composability of Cryptographic Protocols
Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas
2016/349 ( PDF )
Note on Impossible Differential Attacks
Patrick Derbez
2016/348 ( PDF )
A Note on Non-Perfect Secret Sharing
Oriol Farràs and Sebastià Martín and Carles Padró
2016/347 ( PDF )
Cryptanalysis of Searchable Anonymous Attribute Based Encryption
Payal Chaudhari and Manik Lal Das
2016/346 ( PDF )
New Framework for Secure Server-Designation Public Key Encryption with Keyword Search
Xi-Jun Lin and Lin Sun and Haipeng Qu
2016/345 ( PDF )
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction
Satsuya Ohata and Takahiro Matsuda and Kanta Matsuura
2016/344 ( PDF )
Encoding Rational Numbers for FHE-based Applications
HeeWon Chung and Myungsun Kim
2016/343 ( PDF )
On the complexity of constructing pseudorandom functions (especially when they don't exist)
Eric Miles and Emanuele Viola
2016/342 ( PDF )
On the Selective Opening Security of Practical Public-Key Encryption Schemes
Felix Heuer and Tibor Jager and Eike Kiltz and Sven Schäge
2016/341 ( PDF )
Semantically Secure Anonymity: Foundations of Re-encryption
Adam L. Young and Moti Yung
2016/340 ( PDF )
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Eshan Chattopadhyay and Vipul Goyal and Xin Li
2016/339 ( PDF )
Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
Zvika Brakerski and Renen Perlman
2016/338 ( PDF )
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or
Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu
2016/337 ( PDF )
State recovery of RC4 and Spritz Revisited
Martin Gábriš and Martin Stanek
2016/336 ( PDF )
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA
Margarita Osadchy and Julio Hernandez-Castro and Stuart Gibson and Orr Dunkelman and Daniel P ́erez-Cabo
2016/335 ( PDF )
Complete characterization of generalized bent and 2^k-bent Boolean functions
Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng
2016/334 ( PDF )
Probability that the k-gcd of products of positive integers is B-smooth
Jung Hee Cheon and Duhyeong Kim
2016/333 ( PDF )
Proof of Space from Stacked Expanders
Ling Ren and Srinivas Devadas
2016/332 ( PDF )
Micropayments for Decentralized Currencies
Rafael Pass and abhi shelat
2016/331 ( PDF )
TRVote: A New, Trustworthy and Robust Electronic Voting System
Fatih Tiryakioğlu and Mehmet Sabir Kiraz and Fatih Birinci and Mehmet Karahan
2016/330 ( PDF )
NaCl's Crypto_Box in Hardware
Michael Hutter and Jürgen Schilling and Peter Schwabe and Wolfgang Wieser
2016/329 ( PDF )
A modified block Lanczos algorithm with fewer vectors
Emmanuel Thomé
2016/328 ( PDF )
Constructing genus 3 hyperelliptic Jacobians with CM
Jennifer Balakrishnan and Sorina Ionica and Kristin Lauter and Christelle Vincent
2016/327 ( PDF )
Proxy Re-Encryption Schemes with Key Privacy from LWE
Le Trieu Phong and Lihua Wang and Yoshinori Aono and Manh Ha Nguyen and Xavier Boyen
2016/326 ( PDF )
Square Attack on 7-Round Kiasu-BC
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2016/325 ( PDF )
Optimized quantization in Zero Leakage Helper Data Systems
Taras Stanko and Fitria Nur Andini and Boris Skoric
2016/324 ( PDF )
Short Interactive Oracle Proofs with Constant Query Complexity, via Composition and Sumcheck
Eli Ben-Sasson and Alessandro Chiesa and Ariel Gabizon and Michael Riabzev and Nicholas Spooner
2016/323 ( PDF )
A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems
Chaohui Du and Guoqiang Bai
2016/322 ( PDF )
On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks
Ulrich Rührmair
2016/321 ( PDF )
Algebraic Decomposition for Probing Security
Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
2016/320 ( PDF )
On Metrics to Quantify the Inter-Device Uniqueness of PUFs
Linus Feiten, Matthias Sauer, Bernd Becker
2016/319 ( PDF )
High-precision Secure Computation of Satellite Collision Probabilities
Brett Hemenway and Steve Lu and Rafail Ostrovsky and William Welser IV
2016/318 ( PDF )
Generic Construction of Certificateless Signcryption Scheme
Jayaprakash Kar and Sagar Naik
2016/317 ( PDF )
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
Rishab Goyal and Venkata Koppula and Brent Waters
2016/316 ( PDF )
A Note on Black-Box Separations for Indistinguishability Obfuscation
Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and abhi shelat
2016/315 ( PDF )
Flattening NTRU for Evaluation Key Free Homomorphic Encryption
Yarkın Doröz and Berk Sunar
2016/314 ( PDF )
Blind Source Separation from Single Measurements using Singular Spectrum Analysis
Santos Merino Del Pozo and François-Xavier Standaert
2016/313 ( PDF )
Fiat-Shamir for Highly Sound Protocols is Instantiable
Arno Mittelbach and Daniele Venturi
2016/312 ( PDF )
Refinements of the k-tree Algorithm for the Generalized Birthday Problem
Ivica Nikolic and Yu Sasaki
2016/311 ( PDF )
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0
Bin Zhang and Chao Xu and Willi Meier
2016/310 ( PDF )
Coded-BKW: Solving LWE Using Lattice Codes
Qian Guo and Thomas Johansson and Paul Stankovski
2016/309 ( PDF )
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
Celine Chevalier and Fabien Laguillaumie and Damien Vergnaud
2016/308 ( PDF )
Strongly Leakage-Resilient Authenticated Key Exchange
Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
2016/307 ( PDF )
Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin
2016/306 ( PDF )
A Formal Treatment of Backdoored Pseudorandom Generators
Yevgeniy Dodis and Chaya Ganesh and Alexander Golovnev and Ari Juels and Thomas Ristenpart
2016/305 ( PDF )
Certi cateless Aggregate Short Signature Scheme
Jayaprakash Kar
2016/304 ( PDF )
A Fast Attribute Based Encryption
Yacov Yacobi
2016/303 ( PDF )
From Obfuscation to the Security of Fiat-Shamir for Proofs
Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum
2016/302 ( PDF )
A Polynomial-Time Attack on the BBCRS Scheme
Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich and Valérie Gauthier-Umana
2016/301 ( PDF )
Constrained Pseudorandom Functions for Unconstrained Inputs
Apoorvaa Deshpande and Venkata Koppula and Brent Waters
2016/300 ( PDF )
Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme
Leon Groot Bruinderink and Andreas Hülsing and Tanja Lange and Yuval Yarom
2016/299 ( PDF )
Efficient Design Strategies Based on the AES Round Function
Jérémy Jean and Ivica Nikolic
2016/298 ( PDF )
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
Max Fillinger and Marc Stevens
2016/297 ( PDF )
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Liwei Zhang and A. Adam Ding and Yunsi Fei and Pei Luo
2016/296 ( PDF )
How to Sequentialize Independent Parallel Attacks?
Sonia Bogos and Serge Vaudenay
2016/295 ( PDF )
Collision Attack on GRINDAHL
Thomas Peyrin
2016/294 ( PDF )
Evaluation and Improvement of Generic-Emulating DPA Attacks
Weijia Wang and Yu Yu and Junrong Liu and Zheng Guo and François-Xavier Standaert Standaert and Dawu Gu and Sen Xu and Rong Fu
2016/293 ( PDF )
A Parametric Family of Attack Models for Proxy Re-Encryption
David Nuñez, Isaac Agudo, and Javier Lopez
2016/292 ( PDF )
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length
Yusuke Naito and Kan Yasuda
2016/291 ( PDF )
Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems
Cynthia Dwork and Moni Naor and Guy N. Rothblum
2016/290 ( PDF )
Nonce-Based Cryptography: Retaining Security when Randomness Fails
Mihir Bellare and Björn Tackmann
2016/289 ( PDF )
Obfuscation Combiners
Marc Fischlin and Amir Herzberg and Hod Bin Noon and Haya Shulman
2016/288 ( PDF )
Optimization of LPN Solving Algorithms
Sonia Bogos and Serge Vaudenay
2016/287 ( PDF )
Verifiability Notions for E-Voting Protocols
Veronique Cortier and David Galindo and Ralf Kuesters and Johannes Mueller and Tomasz Truderung
2016/286 ( PDF )
On a remarkable property of APN Gold functions
Anastasiya Gorodilova
2016/285 ( PDF )
Bit-Based Division Property and Application to Simon Family
Yosuke Todo and Masakatu Morii
2016/284 ( PDF )
Co-location detection on the Cloud
Mehmet Sinan Inci and Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar
2016/283 ( PDF )
Secure Audit Logs with Verifiable Excerpts
Gunnar Hartung
2016/282 ( PDF )
Detecting flawed masking schemes with leakage detection tests
Oscar Reparaz
2016/281 ( PDF )
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev
2016/280 ( PDF )
Low Power Montgomery Modular Multiplication on Reconfigurable Systems
Pedro Maat C. Massolino and Lejla Batina and Ricardo Chaves and Nele Mentens
2016/279 ( PDF )
Constrained PRFs for Unbounded Inputs with Short Keys
Hamza Abusalah and Georg Fuchsbauer
2016/278 ( PDF )
Various Proxy Re-Encryption Schemes from Lattices
Xiong Fan and Feng-Hao Liu
2016/277 ( PDF )
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings
Xi-Jun Lin and Haipeng Qu and Xiaoshuai Zhang
2016/276 ( PDF )
Arithmetic Coding and Blinding Countermeasures for Ring-LWE
Markku-Juhani O. Saarinen
2016/275 ( PDF )
Faster Algorithms for Solving LPN
Bin Zhang and Lin Jiao and Mingsheng Wang
2016/274 ( PDF )
What users should know about Full Disk Encryption based on LUKS
Simone Bossi and Andrea Visconti
2016/273 ( PDF )
On the weaknesses of PBKDF2
Andrea Visconti and Simone Bossi and Hany Ragab and Alexandro Calò
2016/272 ( PDF )
Spooky Encryption and its Applications
Yevgeniy Dodis and Shai Halevi and Ron D. Rothblum and Daniel Wichs
2016/271 ( PDF )
Cryptanalysis of the FLIP Family of Stream Ciphers
Sébastien Duval and Virginie Lallemand and Yann Rotella
2016/270 ( PDF )
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model
Miguel Ambrona and Gilles Barthe and Benedikt Schmidt
2016/269 ( PDF )
The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials
Ming Li and Dongdai Lin
2016/268 ( PDF )
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach
Ahmad Boorghany and Siavash Bayat-Sarmadi and Rasool Jalili
2016/267 ( PDF )
Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256
Yonglin Hao
2016/266 ( PDF )
Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic
Shinichi Kawamura and Tomoko Yonemura and Yuichi Komano and Hideo Shimizu
2016/265 ( PDF )
Multi-prover Proof-of-Retrievability
Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay
2016/264 ( PDF )
How Fast Can Higher-Order Masking Be in Software?
Dahmun Goudarzi and Matthieu Rivain
2016/263 ( PDF )
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit
2016/262 ( PDF )
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters
Riccardo Longo and Chiara Marcolla and Massimiliano Sala
2016/261 ( PDF )
MEMS-based Gyroscopes as Physical Unclonable Functions
Oliver Willers and Christopher Huth and Jorge Guajardo and Helmut Seidel
2016/260 ( PDF )
On the Size of Pairing-based Non-interactive Arguments
Jens Groth
2016/259 ( PDF )
Adaptive Oblivious Transfer and Generalizations
Olivier Blazy and Céline Chevalier and Paul Germouty
2016/258 ( PDF )
Structure-Preserving Smooth Projective Hashing
Olivier Blazy and Céline Chevalier
2016/257 ( PDF )
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes
Huijia Lin
2016/256 ( PDF )
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage
Qiumao Ma and Jinsheng Zhang and Wensheng Zhang and Daji Qiao
2016/255 ( PDF )
More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds
Essam Ghadafi
2016/254 ( PDF )
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
Pierrick Méaux and Anthony Journault and François-Xavier Standaert and Claude Carlet
2016/253 ( PDF )
Practical DRAM PUFs in Commodity Devices
Wenjie Xiong and André Schaller and Nikolaos Anagnostopoulos and Muhammad Umair Saleem and Sebastian Gabmeyer and Stefan Katzenbeisser and Jakub Szefer
2016/252 ( PDF )
The Exact Round Complexity of Secure Computation
Sanjam Garg and Pratyay Mukherjee and Omkant Pandey and Antigoni Polychroniadou
2016/251 ( PDF )
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations
Gilad Asharov and Moni Naor and Gil Segev and Ido Shahaf
2016/250 ( PDF )
Fixed Point Arithmetic in SHE Scheme
A. Costache and N.P. Smart and S. Vivek and A. Waller
2016/249 ( PDF )
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Amir Moradi and Tobias Schneider
2016/248 ( PDF )
Invariant subspaces in Simpira
Sondre Rønjom
2016/247 ( PDF )
Public Veri able Function Secret Sharing
Wang Qiang and Zhou Fucai and Chen Chunyu and Li Fuxiang and Xu Zifeng
2016/246 ( PDF )
LINGUISTIC CRACKING OF PASSPHRASES USING MARKOV CHAINS
Peder Sparell and Mikael Simovits
2016/245 ( PDF )
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
Peter Linder
2016/244 ( PDF )
Cryptanalysis of Simpira
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2016/243 ( PDF )
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka
2016/242 ( PDF )
Attribute-Based Signatures for Circuits from Bilinear Map
Yusuke Sakai and Nuttapong Attrapadung and Goichiro Hanaoka
2016/241 ( PDF )
A trivial debiasing scheme for Helper Data Systems
Boris Skoric
2016/240 ( PDF )
On Error Distributions in Ring-based LWE
Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2016/239 ( PDF )
Provably Weak Instances of Ring-LWE Revisited
Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2016/238 ( PDF )
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Ágnes Kiss and Juliane Krämer and Pablo Rauzy and Jean-Pierre Seifert
2016/237 ( PDF )
May-Ozerov Algorithm for Nearest-Neighbor Problem over $\mathbb{F}_{q}$ and Its Application to Information Set Decoding
Shoichi Hirose
2016/236 ( PDF )
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT
Guoyan Zhang and Meicheng Liu
2016/235 ( PDF )
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
Takahiro Matsuda and Goichiro Hanaoka
2016/234 ( PDF )
Trick or Tweak: On the (In)security of OTR’s Tweaks
Raphael Bost and Olivier Sanders
2016/233 ( PDF )
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE
Charanjit Jutla and Arnab Roy
2016/232 ( PDF )
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption
Sungwook Kim and Jinsu Kim and Dongyoung Koo and Yuna Kim and Hyunsoo Yoon and Junbum Shin
2016/231 ( PDF )
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
Pierre Belgarric and Pierre-Alain Fouque and Gilles Macario-Rat and Mehdi Tibouchi
2016/230 ( PDF )
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer and Yuval Yarom
2016/229 ( PDF )
Key Compression for Isogeny-Based Cryptosystems
Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, and Christopher Leonardi
2016/228 ( PDF )
On a decentralized trustless pseudo-random number generation algorithm
Serguei Popov
2016/227 ( PDF )
Process Table Covert Channels: Exploitation and Countermeasures
Jean-Michel Cioranesco and Houda Ferradi and Rémi Géraud and David Naccache
2016/226 ( PDF )
On Statistically Secure Obfuscation with Approximate Correctness
Zvika Brakerski and Christina Brzuska and Nils Fleischhacker
2016/225 ( PDF )
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure
Qian Guo, and Thomas Johansson
2016/224 ( PDF )
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
Yuval Yarom and Daniel Genkin and Nadia Heninger
2016/223 ( PDF )
Still Wrong Use of Pairings in Cryptography
Mehmet Sabır Kiraz and Osmanbey Uzunkol
2016/222 ( PDF )
Time-Memory Trade-Off for Lattice Enumeration in a Ball
Paul Kirchner and Pierre-Alain Fouque
2016/221 ( PDF )
On Post-Compromise Security
Katriel Cohn-Gordon and Cas Cremers and Luke Garratt
2016/220 ( PDF )
Algorithms on Ideal over Complex Multiplication order
Paul Kirchner
2016/219 ( PDF )
Nonce-based Kerberos is a Secure Delegated AKE Protocol
Jörg Schwenk
2016/218 ( PDF )
Semantic Security and Key-Privacy With Random Split of St-Gen Codes
Danilo Gligoroski and Simona Samardjiska
2016/217 ( PDF )
Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove
Eric R. Verheul
2016/216 ( PDF )
Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary
Sumit Kumar Debnath and Ratna Dutta
2016/215 ( PDF )
Algorithms for the Approximate Common Divisor Problem
Steven D. Galbraith and Shishay W. Gebregiyorgis and Sean Murphy
2016/214 ( PDF )
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2016/213 ( PDF )
3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky and Zvika Brakerski and Yael Kalai and Omer Paneth and Vinod Vaikuntanathan
2016/212 ( PDF )
Low Linear Complexity Estimates for Coordinate Sequences of Linear Recurrences of Maximal Period over Galois Ring
Vadim N.Tsypyschev
2016/211 ( PDF )
Randomness Complexity of Private Circuits for Multiplication
Sonia Belaïd and Fabrice Benhamouda and Alain Passelègue and Emmanuel Prouff and Adrian Thillard and Damien Vergnaud
2016/210 ( PDF )
Hopes, Fears and Software Obfuscation: A Survey
Boaz Barak
2016/209 ( PDF )
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song and Zhangjie Huang and Qianqian Yang
2016/208 ( PDF )
Constant-Round Asynchronous Multi-Party Computation
Sandro Coretti and Juan Garay and Martin Hirt and Vassilis Zikas
2016/207 ( PDF )
Fault analysis and weak key-IV attack on Sprout
Dibyendu Roy and Sourav Mukhopadhyay
2016/206 ( PDF )
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
Johannes Blömer and Gennadij Liske
2016/205 ( PDF )
Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol
Derek Atkins and Dorian Goldfeld
2016/204 ( PDF )
A Memory Encryption Engine Suitable for General Purpose Processors
Shay Gueron
2016/203 ( PDF )
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
Pascal Sasdrich and Amir Moradi and Tim Güneysu
2016/202 ( PDF )
An Encryption Scheme based on Random Split of St-Gen Codes
Simona Samardjiska and Danilo Gligoroski
2016/201 ( PDF )
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
Nico Doettling and Daniel Kraschewski and Joern Mueller-Quade and Tobias Nilges
2016/200 ( PDF )
An Alternative View of the Graph-Induced Multilinear Maps
Yilei Chen
2016/199 ( PDF )
The Honey Badger of BFT Protocols
Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song
2016/198 ( PDF )
Optimizing S-box Implementations for Several Criteria using SAT Solvers
Ko Stoffelen
2016/197 ( PDF )
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Mayuresh Vivekanand Anand and Ehsan Ebrahimi Targhi and Gelo Noel Tabia and Dominique Unruh
2016/196 ( PDF )
Multi-Key FHE from LWE, Revisited
Chris Peikert and Sina Shiehian
2016/195 ( PDF )
How to Generalize RSA Cryptanalyses
Atsushi Takayasu and Noboru Kunihiro
2016/194 ( PDF )
How to Share a Secret, Infinitely
Ilan Komargodski and Moni Naor and Eylon Yogev
2016/193 ( PDF )
Vulnerable Galois RLWE Families and Improved Attacks
Hao Chen, Kristin Lauter and Katherine E. Stange
2016/192 ( PDF )
On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography
Douglas Miller and Adam Scrivener and Jesse Stern and Muthuramakrishnan Venkitasubramaniam
2016/191 ( PDF )
Optimal Security Proofs for Signatures from Identification Schemes
Eike Kiltz and Daniel Masny and Jiaxin Pan
2016/190 ( PDF )
A MAC Mode for Lightweight Block Ciphers
Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
2016/189 ( PDF )
Compositions of linear functions and applications to hashing
Vladimir Shpilrain and Bianca Sosnovski
2016/188 ( PDF )
On the division property of S-boxes
Faruk Göloğlu and Vincent Rijmen and Qingju Wang
2016/187 ( PDF )
Efficient Secure Multiparty Computation with Identifiable Abort
Carsten Baum and Emmanuela Orsini and Peter Scholl
2016/186 ( PDF )
Lightweight MDS Generalized Circulant Matrices (Full Version)
Meicheng Liu and Siang Meng Sim
2016/185 ( PDF )
On the Influence of Message Length in PMAC's Security Bounds
Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda
2016/184 ( PDF )
Efficiently Enforcing Input Validity in Secure Two-party Computation
Jonathan Katz and Alex J. Malozemoff and Xiao Wang
2016/183 ( PDF )
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks -- Extended Version --
Houssem Maghrebi and Victor Servant and Julien Bringer
2016/182 ( PDF )
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems
Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay
2016/181 ( PDF )
Cryptographic Properties of Addition Modulo $2^n$
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
2016/180 ( PDF )
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Dennis Hofheinz and Tibor Jager and Andy Rupp
2016/179 ( PDF )
Computing theta functions in quasi-linear time in genus 2 and above
Hugo Labrande and Emmanuel Thomé
2016/178 ( PDF )
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants
Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun\inst, Long Wen, Andrey Bogdanov
2016/177 ( PDF )
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key
Christine van Vredendaal
2016/176 ( -- withdrawn -- )
Anonymous Role-Based Access Control on E-Health Records
Xingguang Zhou and Jianwei Liu and Weiran Liu and Qianhong Wu
2016/175 ( PDF )
Online/Offline OR Composition of Sigma Protocols
Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2016/174 ( PDF )
Honey Encryption Beyond Message Recovery Security
Joseph Jaeger and Thomas Ristenpart and Qiang Tang
2016/173 ( PDF )
Circuit Compilers with O(1/ log(n)) Leakage Rate
Marcin Andrychowicz and Stefan Dziembowski and and Sebastian Faust
2016/172 ( PDF )
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption
Yupeng Zhang and Jonathan Katz and Charalampos Papamanthou
2016/171 ( PDF )
Commutativity, Associativity, and Public Key Cryptography
Jacques Patarin and Valérie Nachef
2016/170 ( PDF )
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning
Ran Raz
2016/169 ( PDF )
Provably Robust Sponge-Based PRNGs and KDFs
Peter Gaži and Stefano Tessaro
2016/168 ( PDF )
Town Crier: An Authenticated Data Feed for Smart Contracts
Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi
2016/167 ( PDF )
On Bitcoin Security in the Presence of Broken Crypto Primitives
Ilias Giechaskiel and Cas Cremers and Kasper Rasmussen
2016/166 ( PDF )
Per-Session Security: Password-Based Cryptography Revisited
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2016/165 ( PDF )
PrAd: Enabling Privacy-Aware Location based Advertising
Hung Dang and Ee-Chien Chang
2016/164 ( PDF )
Sanitization of FHE Ciphertexts
Léo Ducas and Damien Stehle
2016/163 ( PDF )
ZKBoo: Faster Zero-Knowledge for Boolean Circuits
Irene Giacomelli and Jesper Madsen and Claudio Orlandi
2016/162 ( PDF )
New Negative Results on Differing-Inputs Obfuscation
Mihir Bellare and Igors Stepanovs and Brent Waters
2016/161 ( PDF )
Revisiting Structure Graph and Its Applications to CBC-MAC and EMAC
Ashwin Jha and Mridul Nandi
2016/160 ( PDF )
Polytopic Cryptanalysis
Tyge Tiessen
2016/159 ( PDF )
Pseudoentropy: Lower-bounds for Chain rules and Transformations
Krzysztof Pietrzak and Maciej Skorski
2016/158 ( PDF )
A Subgradient Algorithm For Computational Distances and Applications to Cryptography
Maciej Skórski
2016/157 ( PDF )
Key Derivation for Squared-Friendly Applications: Lower Bounds
Maciej Skorski
2016/156 ( PDF )
More Efficient Constant-Round Multi-Party Computation from BMR and SHE
Yehuda Lindell and Nigel P. Smart and Eduardo Soria-Vazquez
2016/155 ( PDF )
Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption
Jun Xu and Lei Hu and Santanu Sarkar and Xiaona Zhang and Zhangjie Huang and Liqiang Peng
2016/154 ( PDF )
Fully-Anonymous Short Dynamic Group Signatures Without Encryption
David Derler and Daniel Slamanig
2016/153 ( PDF )
Differentially Private Password Frequency Lists
Jeremiah Blocki and Anupam Datta and Joseph Bonneau
2016/152 ( PDF )
Attacks and parameter choices in HIMMO
Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Moon Sung Lee and Domingo Gomez-Perez and Jaime Gutierrez and Berry Schoenmakers
2016/151 ( PDF )
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
Yu Yu and John Steinberger
2016/150 ( PDF )
On Garbling Schemes With And Without Privacy
Carsten Baum
2016/149 ( PDF )
Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher
Wentan Yi and Shaozhen Chen
2016/148 ( PDF )
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
Srinath M. S. and V. Chandrasekaran
2016/147 ( PDF )
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
Eric Miles and Amit Sahai and Mark Zhandry
2016/146 ( PDF )
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator
Yoshinori Aono and Yuntao Wang and Takuya Hayashi and Tsuyoshi Takagi
2016/145 ( PDF )
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki and Hong-Sheng Zhou
2016/144 ( PDF )
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)
Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu
2016/143 ( PDF )
On the (non-)existence of APN $(n,n)$-functions of algebraic degree $n$
Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nian Li
2016/142 ( PDF )
Hash-Function based PRFs: AMAC and its Multi-User Security
Mihir Bellare and Daniel J. Bernstein and Stefano Tessaro
2016/141 ( PDF )
On low degree polynomials in 2-round AES
Igor Semaev
2016/140 ( PDF )
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
Shota Yamada
2016/139 ( PDF )
An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without a low level encoding of zero
Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee
2016/138 ( PDF )
A new algorithm for residue multiplication modulo $2^{521}-1$
Shoukat Ali, Murat Cenk
2016/137 ( PDF )
Rate-1, Linear Time and Additively Homomorphic UC Commitments
Ignacio Cascudo and Ivan Damgård and Bernardo David and Nico Döttling and Jesper Buus Nielsen
2016/136 ( PDF )
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
Emmanuel Volte and Valérie Nachef and Nicolas Marrière
2016/135 ( PDF )
Cryptanalysis of the New CLT Multilinear Map over the Integers
Jung Hee Cheon and Pierre-Alain Fouque and Changmin Lee and Brice Minaud and Hansol Ryu
2016/134 ( PDF )
More Practical and Secure History-Independent Hash Tables
Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia
2016/133 ( PDF )
On the nonlinearity of monotone Boolean functions
Claude Carlet
2016/132 ( PDF )
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
Shahram Rasoolzadeh and Håvard Raddum
2016/131 ( PDF )
New Attacks on the Concatenation and XOR Hash Combiners
Itai Dinur
2016/130 ( PDF )
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level
Loubna Ghammam and Emmanuel Fouotsa
2016/129 ( PDF )
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer
2016/128 ( PDF )
Removing the Strong RSA Assumption from Arguments over the Integers
Geoffroy Couteau and Thomas Peters and David Pointcheval
2016/127 ( PDF )
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes
Martin Albrecht, Shi Bai, Léo Ducas
2016/126 ( PDF )
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Emre Yüce and Ali Aydın Selçuk
2016/125 ( PDF )
Fully-Secure Lattice-Based IBE as Compact as PKE
Daniel Apon and Xiong Fan and Feng-Hao Liu
2016/124 ( PDF )
Collecting relations for the Number Field Sieve in $GF(p^6)$
Pierrick Gaudry and Laurent Grémy and Marion Videau
2016/123 ( PDF )
Robust Password-Protected Secret Sharing
Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval
2016/122 ( PDF )
Simpira v2: A Family of Efficient Permutations Using the AES Round Function
Shay Gueron and Nicky Mouha
2016/121 ( PDF )
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
Tibor Jager
2016/120 ( PDF )
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
Ignacio Cascudo and Ivan Damgård and Felipe Lacerda and Samuel Ranellucci
2016/119 ( PDF )
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices
Christof Beierle and Thorsten Kranz and Gregor Leander
2016/118 ( PDF )
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security
Zvika Brakerski and Vinod Vaikuntanathan
2016/117 ( PDF )
Circular Security Separations for Arbitrary Length Cycles from LWE
Venkata Koppula and Brent Waters
2016/116 ( PDF )
Interactive Oracle Proofs
Eli Ben-Sasson and Alessandro Chiesa and Nicholas Spooner
2016/115 ( PDF )
Efficiently Computing Data-Independent Memory-Hard Functions
Joel Alwen and Jeremiah Blocki
2016/114 ( PDF )
The Magic of ELFs
Mark Zhandry
2016/113 ( PDF )
On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments
Serge Fehr and Max Fillinger
2016/112 ( PDF )
On the (In)security of SNARKs in the Presence of Oracles
Dario Fiore and Anca Nitulescu
2016/111 ( PDF )
Scalable and Secure Logistic Regression via Homomorphic Encryption
Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
2016/110 ( PDF )
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
Navid Alamati and Chris Peikert
2016/109 ( PDF )
Fast Multiparty Multiplications from shared bits
Ivan Damgård and Tomas Toft and Rasmus Winther Zakarias
2016/108 ( PDF )
Computing Private Set Operations with Linear Complexities
Alex Davidson and Carlos Cid
2016/107 ( PDF )
Fully Anonymous Transferable Ecash
Hitesh Tewari and Arthur Hughes
2016/106 ( PDF )
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård and Helene Haagh and Claudio Orlandi
2016/105 ( PDF )
Fully homomorphic encryption must be fat or ugly?
Kristian Gjøsteen and Martin Strand
2016/104 ( PDF )
Open Sesame: The Password Hashing Competition and Argon2
Jos Wetzels
2016/103 ( PDF )
Speed Optimizations in Bitcoin Key Recovery Attacks
Nicolas Courtois and Guangyan Song and Ryan Castellucci
2016/102 ( PDF )
Breaking the Sub-Exponential Barrier in Obfustopia
Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan and Mark Zhandry
2016/101 ( PDF )
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Benoit Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang
2016/100 ( PDF )
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
Joël Alwen and Binyi Chen and Chethan Kamath and Vladimir Kolmogorov and Krzysztof Pietrzak and Stefano Tessaro
2016/099 ( PDF )
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
Michael Clear and Ciaran McGoldrick
2016/098 ( PDF )
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications
Stefan Kölbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger
2016/097 ( PDF )
A Maiorana-McFarland Construction of a GBF on Galois ring
Shashi Kant Pandey and P.R.Mishra and B.K.Dass
2016/096 ( PDF )
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
Bing Sun and Meicheng Liu and Jian Guo and Vincent Rijmen and Ruilin Li
2016/095 ( PDF )
Obfuscation without Multilinear Maps
Dingfeng Ye and Peng Liu
2016/094 ( PDF )
Tightly CCA-Secure Encryption without Pairings
Romain Gay and Dennis Hofheinz and Eike Kiltz and Hoeteck Wee
2016/093 ( PDF )
Valiant's Universal Circuit is Practical
Ágnes Kiss and Thomas Schneider
2016/092 ( PDF )
Cryptanalysis of the Full Spritz Stream Cipher
Subhadeep Banik and Takanori Isobe
2016/091 ( PDF )
On the Security of the Algebraic Eraser Tag Authentication Protocol
Simon R.~Blackburn and M.J.B.~Robshaw
2016/090 ( PDF )
Spectral characterization of iterating lossy mappings
Joan Daemen
2016/089 ( PDF )
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Johannes Buchmann and Florian Göpfert and Rachel Player and Thomas Wunderer
2016/088 ( PDF )
On Linear Hulls and Trails in Simon
Tomer Ashur and Vincent Rijmen
2016/087 ( PDF )
Safely Exporting Keys from Secure Channels: On the Security of EAP-TLS and TLS Key Exporters
Christina Brzuska and Håkon Jacobsen and Douglas Stebila
2016/086 ( PDF )
Intel SGX Explained
Victor Costan and Srinivas Devadas
2016/085 ( PDF )
Cryptanalysis of ring-LWE based key exchange with key share reuse
Scott Fluhrer
2016/084 ( PDF )
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher
Qianqian Yang and Lei Hu and Siwei Sun and Ling Song
2016/083 ( PDF )
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses
Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin
2016/082 ( PDF )
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
Olivier Blazy and David Derler and Daniel Slamanig and Raphael Spreitzer
2016/081 ( PDF )
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2016/080 ( PDF )
Cryptanalysis of PRINCE with Minimal Data
Shahram Rasoolzadeh and Håvard Raddum
2016/079 ( PDF )
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Qiang Tang and Balazs Pejo and Husen Wang
2016/078 ( PDF )
Non-Interactive Verifiable Secret Sharing For Monotone Circuits
Ge Bai \and Ivan Damgård \and Claudio Orlandi \and Yu Xia
2016/077 ( PDF )
Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN
Shahram Rasoolzadeh and Håvard Raddum
2016/076 ( PDF )
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings
Xi-Jun Lin and Haipeng Qu and Xiaoshuai Zhang
2016/075 ( PDF )
Weaknesses in Hadamard Based Symmetric Key Encryption Schemes
Gajraj Kuldeep and Devendra Kumar Yadav and A. K. Sharma
2016/074 ( PDF )
On the Power of Secure Two-Party Computation
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2016/073 ( PDF )
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Jinsheng Zhang and Wensheng Zhang and Daji Qiao
2016/072 ( PDF )
Downgrade Resilience in Key-Exchange Protocols
Karthikeyan Bhargavan and Christina Brzuska and Cédric Fournet and Matthew Green and Markulf Kohlweiss and Santiago Zanella-Béguelin
2016/071 ( PDF )
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version)
Alex Biryukov and Léo Perrin and Aleksei Udovenko
2016/070 ( PDF )
Domain-Specific Pseudonymous Signatures Revisited
Kamil Kluczniak
2016/069 ( PDF )
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
Gergei Bana and Rohit Chadha
2016/068 ( -- withdrawn -- )
Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes
Yongge Wang
2016/067 ( PDF )
OPFE: Outsourcing Computation for Private Function Evaluation
Henry Carter and Patrick Traynor
2016/066 ( PDF )
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Lingyue Qin and Huaifeng Chen and Xiaoyun Wang
2016/065 ( PDF )
A note on Tensor Simple Matrix Encryption Scheme
Yasufumi Hashimoto
2016/064 ( PDF )
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
Yohei Watanabe and Goichiro Hanaoka and Junji Shikata
2016/063 ( PDF )
Analysing and Exploiting the Mantin Biases in RC4
Remi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe
2016/062 ( PDF )
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
Raphael Bost and Pierre-Alain Fouque and David Pointcheval
2016/061 ( PDF )
Accountable Privacy for Decentralized Anonymous Payments
Christina Garman and Matthew Green and Ian Miers
2016/060 ( PDF )
CrypTopology:Plug, Play and Recover Key Management
Amir Herzberg and Yehonatan Kfir
2016/059 ( PDF )
Secure positioning and quantum non-local correlations
Muhammad Nadeem
2016/058 ( PDF )
New Lattice Attacks on DSA Schemes
Dimitrios Poulakis
2016/057 ( PDF )
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants
Durga Prasad Sahoo and Phuong Ha Nguyen and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay
2016/056 ( PDF )
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
Ethan Heilman and Foteini Baldimtsi and Sharon Goldberg
2016/055 ( PDF )
Attacking NTP's Authenticated Broadcast Mode
Aanchal Malhotra and Sharon Goldberg
2016/054 ( PDF )
Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem
Masahiro Yagisawa
2016/053 ( PDF )
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers
khalid Javeed and Xiaojun Wang
2016/052 ( PDF )
Fault-Tolerant Aggregate Signatures
Gunnar Hartung and Björn Kaidel and Alexander Koch and Jessica Koch and Andy Rupp
2016/051 ( PDF )
Capacity and Data Complexity in Multidimensional Linear Attack
Jialin Huang and Serge Vaudenay and Xuejia Lai and Kaisa Nyberg
2016/050 ( PDF )
Improved Fully Homomorphic Encryption with Composite Number Modulus
Masahiro Yagisawa
2016/049 ( PDF )
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
Christoph M. Mayer
2016/048 ( PDF )
Better Preprocessing for Secure Multiparty Computation
Carsten Baum and Ivan Damgård and Tomas Toft and Rasmus Zakarias
2016/047 ( PDF )
Comb to Pipeline: Fast Software Encryption Revisited
Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser
2016/046 ( PDF )
How To Simulate It - A Tutorial on the Simulation Proof Technique
Yehuda Lindell
2016/045 ( PDF )
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
Xi-Jun Lin and Lin Sun and Haipeng Qu and Xiaoshuai Zhang
2016/044 ( PDF )
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells
2016/043 ( PDF )
Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection
Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
2016/042 ( PDF )
Neeva: A Lightweight Hash Function
Khushboo Bussi and Dhananjoy Dey and Manoj Kumar and B. K. Dass
2016/041 ( PDF )
A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS
Preeti Kulshrestha and Arun Kumar
2016/040 ( PDF )
Packet Header Anomaly Detection Using Bayesian Topic Models
Xuefei Cao, Bo Chen, Hui Li and Yulong Fu
2016/039 ( PDF )
Standard quantum bit commitment – an indefinite commitment time
Muhammad Nadeem
2016/038 ( PDF )
Collateral Damage in Online Social Networks: computing the significance of information collection
Iraklis Symeonids and Bart Preneel
2016/037 ( PDF )
A Framework for Outsourcing of Secure Computation
Thomas P. Jakobsen and Jesper Buus Nielsen and Claudio Orlandi
2016/036 ( PDF )
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family
wentan Yi and Shaozhen Chen
2016/035 ( PDF )
Proofs of Space-Time and Rational Proofs of Storage
Tal Moran and Ilan Orlov
2016/034 ( PDF )
Universal Composition with Responsive Environments
Jan Camenisch and Robert R. Enderlein and Stephan Krenn and Ralf Kuesters and Daniel Rausch
2016/033 ( PDF )
Towards a Unified Security Model for Physically Unclonable Functions
Frederik Armknecht and Daisuke Moriyama and Ahmad-Reza Sadeghi and Moti Yung
2016/032 ( PDF )
On the Leakage-Resilient Key Exchange
Janaka Alawatugoda
2016/031 ( PDF )
Beyond the selective disclosure of ABCs on RAM-constrained devices
Antonio de la Piedra
2016/030 ( PDF )
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek and Nina Bindel and Johannes Buchmann and Juliane Krämer and Giorgia Azzurra Marson
2016/029 ( PDF )
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
Jos Wetzels and Wouter Bokslag
2016/028 ( PDF )
Sponges and Engines: An introduction to Keccak and Keyak
Jos Wetzels and Wouter Bokslag
2016/027 ( PDF )
Balloon Hashing: a Provably Memory-Hard Function with a Data-Independent Access Pattern
Dan Boneh and Henry Corrigan-Gibbs and Stuart Schechter
2016/026 ( PDF )
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM
Abhishek Chakraborty and Debdeep Mukhopadhyay
2016/025 ( PDF )
Human-readable Proof of the Related-Key Security of AES-128
Khoongming Khoo and Eugene Lee and Thomas Peyrin and Siang Meng Sim
2016/024 ( PDF )
Refund attacks on Bitcoin’s Payment Protocol
Patrick McCorry and Siamak F. Shahandashti and Feng Hao
2016/023 ( PDF )
Improved on an improved remote user authentication scheme with key agreement
Yalin Chen1 and Jue-Sam Chou*2 and I - Chiung Liao3
2016/022 ( PDF )
On derivatives of polynomials over finite fields through integration
Enes Pasalic and Amela Muratovic-Ribic and Samir Hodzic and Sugata Gangopadhyay
2016/021 ( PDF )
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs
Eli Ben-Sasson and Alessandro Chiesa and Ariel Gabizon and Madars Virza
2016/020 ( PDF )
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon
Yonglin Hao and Willi Meier
2016/019 ( PDF )
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
Hyung Tae Lee and San Ling and Huaxiong Wang
2016/018 ( PDF )
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Afonso Arriaga and Manuel Barbosa and Pooya Farshim
2016/017 ( PDF )
Valiant's Universal Circuit: Improvements, Implementation, and Applications
Helger Lipmaa and Payman Mohassel and Saeed Sadeghian
2016/016 ( PDF )
A trustless privacy-preserving reputation system
Alexander Schaub and Rémi Bazin and Omar Hasan and Lionel Brunie
2016/015 ( PDF )
Quantum Collision-Resistance of Non-Uniformly Distributed Functions
Ehsan Ebrahimi Targhi and Gelo Noel Tabia and Dominique Unruh
2016/014 ( PDF )
Foundations of Hardware-Based Attested Computation and Application to SGX
Manuel Barbosa and Bernardo Portela and Guillaume Scerri and Bogdan Warinschi
2016/013 ( PDF )
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Rosario Gennaro and Steven Goldfeder and Arvind Narayanan
2016/012 ( PDF )
Cryptography for Big Data Security
Ariel Hamlin and Nabil Schear and Emily Shen and Mayank Varia and Sophia Yakoubov and Arkady Yerukhimovich
2016/011 ( PDF )
Better Security for Functional Encryption for Inner Product Evaluations
Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
2016/010 ( PDF )
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme
Albrecht Petzoldt and Jintai Ding and Lih-Chung Wang
2016/009 ( PDF )
PUF-BASED SOLUTIONS FOR SECURE COMMUNICATIONS IN ADVANCED METERING INFRASTRUCTURE (AMI)
Mahshid Delavar and Sattar Mirzakuchaki and Mohammad Hassan Ameri and Javad Mohajeri
2016/008 ( PDF )
cMix: Anonymization by High-Performance Scalable Mixing
David Chaum and Debajyoti Das and Farid Javani and Aniket Kate and Anna Krasnova and Joeri de Ruiter and Alan T. Sherman
2016/007 ( PDF )
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
Fabrice Benhamouda and Céline Chevalier and Adrian Thillard and Damien Vergnaud
2016/006 ( PDF )
Indistinguishability Obfuscation with Non-trivial Efficiency
Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang
2016/005 ( PDF )
A Columnar Transposition cipher in a contemporary setting.
John Jones
2016/004 ( PDF )
Bounding basis reduction properties
Arnold Neumaier
2016/003 ( PDF )
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves
Nicolas T. Courtois
2016/002 ( PDF )
Remote Cache-Timing Attack without Learning Phase
Ali Can Atici and Cemal Yilmaz and Erkay Savas
2016/001 ( PDF )
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Yalin Chen1 and Jue-Sam Chou*2 and Hung - Sheng Wu
2015/1257 ( -- withdrawn -- )
Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
Jiawei Yuan
2015/1256 ( PDF )
Mitigating Multi-Target Attacks in Hash-based Signatures
Andreas Hülsing and Joost Rijneveld and Fang Song
2015/1255 ( PDF )
Functional Encryption for Inner Product with Full Function Privacy
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/1254 ( PDF )
Identity-based Hierarchical Key-insulated Encryption without Random Oracles
Yohei Watanabe and Junji Shikata
2015/1253 ( PDF )
Non-Malleable Functions and Their Applications
Yu Chen and Baodong Qin and Jiang Zhang and Yi Deng and Sherman S. M. Chow
2015/1252 ( PDF )
Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability
Sayandeep Saha and Rajat Subhra Chakraborty and Srinivasa Shashank Nuthakki and Anshul and Debdeep Mukhopadhyay
2015/1251 ( PDF )
Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability
Zhengjun Cao and Zhenfu Cao
2015/1250 ( PDF )
Adaptively Secure Garbled Circuits from One-Way Functions
Brett Hemenway and Zahra Jafargholi and Rafail Ostrovsky and Alessandra Scafuro and Daniel Wichs
2015/1249 ( PDF )
Trap Me If You Can -- Million Dollar Curve
Thomas Baignères and Cécile Delerablée and Matthieu Finiasz and Louis Goubin and Tancrède Lepoint and Matthieu Rivain
2015/1248 ( PDF )
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Janaka Alawatugoda
2015/1247 ( PDF )
Missing a trick: Karatsuba variations
Mike Scott
2015/1246 ( PDF )
Universally Composable Direct Anonymous Attestation
Jan Camenisch and Manu Drijvers and Anja Lehmann
2015/1245 ( PDF )
Variation of GGH15 Multilinear Maps
Gu Chunsheng
2015/1244 ( PDF )
On values of vectorial Boolean functions and related problems in APN functions
George Shushuev
2015/1243 ( PDF )
Verifiable ASICs
Riad S. Wahby and Max Howald and Siddharth Garg and abhi shelat and Michael Walfish
2015/1242 ( PDF )
Quantum Cryptography Beyond Quantum Key Distribution
Anne Broadbent and Christian Schaffner
2015/1241 ( PDF )
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir
2015/1240 ( PDF )
Exploiting Unreliability of the PUF to Secure Remote Wireless Sensing
Yansong Gao, Hua Ma, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1239 ( PDF )
Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality
Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1238 ( PDF )
Asynchronous Secure Multiparty Computation in Constant Time
Ran Cohen
2015/1237 ( PDF )
On the Security of One Password Authenticated Key Exchange Protocol
Stanislav V. Smyshlyaev and Igor B. Oshkin and Evgeniy K. Alekseev and Liliya R. Ahmetzyanova
2015/1236 ( PDF )
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks
Liron David and Avishai Wool
2015/1235 ( PDF )
Constant-round Leakage-resilient Zero-knowledge from Collision Resistance
Susumu Kiyoshima
2015/1234 ( PDF )
On Cryptographic Anonimity and Unpredicatbility in Secret Sharing
Ruxandra Olimid and Anat Paskin-Cherniavsky
2015/1233 ( PDF )
Degenerate Curve Attacks
Samuel Neves and Mehdi Tibouchi
2015/1232 ( PDF )
Extend FHEW to General Case
Zhou Tanping*, Liu Longfei, Yang Xiaoyuan, Han Yiliang
2015/1231 ( PDF )
When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack
Hassan Jameel Asghar and Mohamed Ali Kaafar
2015/1230 ( PDF )
Indistinguishable Proofs of Work or Knowledge
Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2015/1229 ( PDF )
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Jintai Ding and Momonari Kudo and Shinya Okumura and Tsuyoshi Takagi and Chengdong Tao
2015/1228 ( PDF )
Privacy protection in electronic education based on polymorphic pseudonymization
Eric R. Verheul
2015/1227 ( PDF )
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Akshima and Donghoon Chang and Mohona Ghosh and Aarushi Goel and Somitra Kumar Sanadhya
2015/1226 ( PDF )
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation
Oleg Mazonka and Nektarios Georgios Tsoutsos and Michail Maniatakos
2015/1225 ( PDF )
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p)
Debapriya Basu Roy and Poulami Das and Debdeep Mukhopadhyay
2015/1224 ( PDF )
Twisted Polynomials and Forgery Attacks on GCM
Mohamed Ahmed Abdelraheem and Peter Beelen and Andrey Bogdanov and Elmar Tischhauser
2015/1223 ( PDF )
Chosen-Ciphertext Security from Subset Sum
Sebastian Faust; Daniel Masny; Daniele Venturi
2015/1222 ( PDF )
On the Asymptotic Complexity of Solving LWE
Gottfried Herold and Elena Kirshanova and Alexander May
2015/1221 ( PDF )
Unclonable encryption revisited ($4 \times 2 = 8$)
Boris Skoric
2015/1220 ( PDF )
Two-Round Man-in-the-Middle Security from LPN
David Cash and Eike Kiltz and Stefano Tessaro
2015/1219 ( PDF )
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
Michel Abdalla and Sonia Belaïd and David Pointcheval and Sylvain Ruhault and Damien Vergnaud
2015/1218 ( PDF )
Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Anissa Sghaier and Medien Zeghid and Belgacem Bouallegue and Adel Baganne and Mohsen Machhout
2015/1217 ( PDF )
Two-faced processes and existence of RNG with proven properties
Boris Ryabko
2015/1216 ( PDF )
Non-Transferable Proxy Re-Encryption
Hui Guo and Zhenfeng Zhang and Jing Xu
2015/1215 ( PDF )
Simpler, Faster, and More Robust T-test Based Leakage Detection
A. Adam Ding and Cong Chen and Thomas Eisenbarth
2015/1214 ( PDF )
Speeding: On Low-Latency Key Exchange
Britta Hale and Tibor Jager and Sebastian Lauer and Jörg Schwenk
2015/1213 ( PDF )
Footprint scheduling for Dining-Cryptographer networks
Anna Krasnova, Moritz Neikes, and Peter Schwabe
2015/1212 ( PDF )
Choosing and generating parameters for low level pairing implementation on BN curves
Sylvain Duquesne and Nadia El Mrabet and Safia Haloui and Franck Rondepierre
2015/1211 ( PDF )
Log Analysis of Estonian Internet Voting 2013--2015
Sven Heiberg and Arnis Parsovs and Jan Willemson
2015/1210 ( PDF )
Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
Ehsan Ebrahimi Targhi and Dominique Unruh
2015/1209 ( PDF )
Fast Optimistically Fair Cut-and-Choose 2PC
Alptekin Kupcu and Payman Mohassel
2015/1208 ( PDF )
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE
Zheng Yuan,Zhen Peng,Haiwen Ou
2015/1207 ( PDF )
Comment on Demonstrations of Shor's Algorithm in the Past Decades
Zhengjun Cao and Zhenfu Cao and Lihua Liu
2015/1206 ( PDF )
Simple Photonic Emission Attack with Reduced Data Complexity
Elad Carmon and Jean-Pierre Seifert and Avishai Wool
2015/1205 ( PDF )
Deniable Functional Encryption
Angelo De Caro and Vincenzo Iovino and Adam O'Neill
2015/1204 ( PDF )
Constructing secret, verifiable auction schemes from election schemes
Elizabeth A. Quaglia and Ben Smyth
2015/1203 ( PDF )
The graph of minimal distances of bent functions and its properties
Nikolay Kolomeec
2015/1202 ( PDF )
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park and Moti Yung
2015/1201 ( PDF )
A Star-based Independent Biclique Attack on Full Rounds SQUARE
Zheng Yuan, and Zhen Peng, and Ming Mao
2015/1200 ( PDF )
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/1199 ( PDF )
A compression method for homomorphic ciphertexts
S. Carpov and R. Sirdey
2015/1198 ( PDF )
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption
Mihir Bellare and Anna Lysyanskaya
2015/1197 ( PDF )
On-the-fly Homomorphic Batching/Unbatching
Yarkın Doröz and Berk Sunar and Gizem S. Çetin
2015/1196 ( PDF )
Secure Distributed Computation on Private Inputs
Geoffroy Couteau and Thomas Peters and David Pointcheval
2015/1195 ( PDF )
ARITHMETIC USING WORD-WISE HOMOMORPHIC ENCRYPTION
Gizem S. Cetin and Yarkin Doroz and Berk Sunar and William J. Martin
2015/1194 ( PDF )
HOMOMORPHIC AUTOCOMPLETE
Gizem S. Çetin and Wei Dai and Yarkın Doröz and Berk Sunar
2015/1193 ( PDF )
Collision Attacks against CAESAR Candidates -- Forgery and Key-Recovery against AEZ and Marble
Thomas Fuhr and Gaëtan Leurent and Valentin Suder
2015/1192 ( PDF )
A Guide to Fully Homomorphic Encryption
Frederik Armknecht and Colin Boyd and Christopher Carr and Kristian Gjøsteen and Angela Jäschke and Christian A. Reuter and Martin Strand
2015/1191 ( PDF )
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
Chester Rebeiro and Debdeep Mukhopadhyay
2015/1190 ( PDF )
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption
Yuval Ishal and Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky
2015/1189 ( PDF )
Invariant Subspace Attack Against Full Midori64
Jian Guo and Jérémy Jean and Ivica Nikolić and Kexin Qiao and Yu Sasaki and Siang Meng Sim
2015/1188 ( PDF )
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/1187 ( PDF )
On an almost-universal hash function family with applications to authentication and secrecy codes
Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and László Tóth
2015/1186 ( PDF )
Restricted linear congruences
Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and Roberto Tauraso and László Tóth
2015/1185 ( PDF )
Efficient Pseudorandom Functions via On-the-Fly Adaptation
Nico Doettling and Dominique Schröder
2015/1184 ( PDF )
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems
Alan Szepieniec and Jintai Ding and Bart Preneel
2015/1183 ( PDF )
Authenticated Range \& Closest Point Queries in Zero-Knowledge
Esha Ghosh and Olga Ohrimenko and Roberto Tamassia
2015/1182 ( PDF )
Chaskey: a MAC Algorithm for Microcontrollers -- Status Update and Proposal of Chaskey-12 --
Nicky Mouha
2015/1181 ( PDF )
Construction of Transition Matrices for Binary FCSRs
Zhiqiang Lin, Dingyi Pei and Dongdai Lin
2015/1180 ( PDF )
Secure Comparator: a ZKP-Based Authentication System
Ignat Korchagin and Eugene Pilyankevich
2015/1179 ( PDF )
A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}
Kenichiro Hayasaka and Kazumaro Aoki and Tetsutaro Kobayashi and Tsuyoshi Takagi
2015/1178 ( PDF )
Textbook Non-Malleable Commitments
Vipul Goyal and Omkant Pandey and Silas Richelson
2015/1177 ( PDF )
On the CCA (in)security of MTProto
Jakob Jakobsen and Claudio Orlandi
2015/1176 ( PDF )
On the Efficiency of FHE-based Private Queries
Myungsun Kim and Hyung Tae Lee and San Ling and Huaxiong Wang
2015/1175 ( PDF )
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
Bhanu Prakash Gopularam and Nalini. N
2015/1174 ( PDF )
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Goutam Paul and Souvik Ray
2015/1173 ( PDF )
Secure Multiparty Computation with General Interaction Patterns
Shai Halevi and Yuval Ishai and Abhishek Jain and Eyal Kushilevitz and Tal Rabin
2015/1172 ( -- withdrawn -- )
An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem
Jingwei Hu and Ray C.C. Cheung
2015/1171 ( -- withdrawn -- )
On the Security of a access polynomial based self-healing key management schemes in wireless sensor networks
Yandong Zheng, Hua Guo
2015/1170 ( PDF )
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security
Takanori Yasuda and Xavier Dahan and Kouichi Sakurai
2015/1169 ( PDF )
Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud
Marc Green and Thomas Eisenbarth
2015/1168 ( PDF )
SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains
Loi Luu and Viswesh Narayanan and Kunal Baweja and Chaodong Zheng and Seth Gilbert and Prateek Saxena
2015/1167 ( PDF )
Constraining Pseudorandom Functions Privately
Dan Boneh and Kevin Lewi and David J. Wu
2015/1166 ( PDF )
Ceremonies for End-to-End Verifiable Elections
Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2015/1165 ( PDF )
Meet-in-the-Middle Attacks on Reduced-Round Midori-64
Li Lin and Wenling Wu
2015/1164 ( PDF )
Beyond Bitcoin - Part I: A critical look at blockchain-based systems
Pasquale Forte and Diego Romano and Giovanni Schmid
2015/1163 ( PDF )
A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher
Mehmet Özen and Mustafa Çoban and Ferhat Karakoç
2015/1162 ( PDF )
The Moral Character of Cryptographic Work
Phillip Rogaway
2015/1161 ( PDF )
Cyber and Physical Access Control in Legacy System Using Passwords
Jia Xu and Jianying Zhou and Liming Lu
2015/1160 ( PDF )
Cryptanalysis of multi-HFE
Yasufumi Hashimoto
2015/1159 ( PDF )
Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation
Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste
2015/1158 ( PDF )
A note on the optimality of frequency analysis vs. $\ell_p$-optimization
Marie-Sarah Lacharité and Kenneth G. Paterson
2015/1157 ( PDF )
From Identification to Signatures, Tightly: A Framework and Generic Transforms
Mihir Bellare and Bertram Poettering and Douglas Stebila
2015/1156 ( PDF )
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
Dipanjan Das and Priyanka Bose and S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
2015/1155 ( PDF )
Cross Processor Cache Attacks
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/1154 ( PDF )
NORX8 and NORX16: Authenticated Encryption for Low-End Systems
Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves
2015/1153 ( PDF )
Obliv-C: A Language for Extensible Data-Oblivious Computation
Samee Zahur and David Evans
2015/1152 ( PDF )
Privacy-preserving Friendship-based Recommender Systems
Qiang Tang and Jun Wang
2015/1151 ( PDF )
Fully Leakage-Resilient Codes
Antonio Faonio and Jesper Buus Nielsen
2015/1150 ( PDF )
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
Colin Boyd and Britta Hale and Stig Frode Mjølsnes and Douglas Stebila
2015/1149 ( PDF )
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
Takahiro Matsuda and Goichiro Hanaoka
2015/1148 ( PDF )
An Inverse-free Single-Keyed Tweakable Enciphering Scheme
Ritam Bhaumik and Mridul Nandi
2015/1147 ( PDF )
Collusion Resistant Aggregation from Convertible Tags
Iraklis Leontiadis and Ming Li
2015/1146 ( PDF )
libgroupsig: An extensible C library for group signatures
Jesus Diaz and David Arroyo and Francisco B. Rodriguez
2015/1145 ( PDF )
Lattice Attacks on the DGHV Homomorphic Encryption Scheme
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/1144 ( PDF )
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Olivier Blazy and Céline Chevalier and Damien Vergnaud
2015/1143 ( PDF )
A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE
Zhigang Chen and Xinxia Song
2015/1142 ( PDF )
Midori: A Block Cipher for Low Energy (Extended Version)
Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Kyoji Shibutani and Harunaga Hiwatari and Toru Akishita and Francesco Regazzoni
2015/1141 ( PDF )
Amplifying Side Channels Through Performance Degradation
Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom
2015/1140 ( PDF )
Modular Inversion Hidden Number Problem- A Lattice Approach
Pranjal Dutta
2015/1139 ( PDF )
Secret Sharing Schemes with General Access Structures (Full version)
Jian Liu, Sihem Mesnager, and Lusheng Chen
2015/1138 ( PDF )
Lightweight CRC-based Authentication
Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist
2015/1137 ( PDF )
A New Factoring Attack on Multi-Prime RSA with Small Prime Difference
Mengce Zheng and Honggang Hu
2015/1136 ( PDF )
Multi-Input Functional Encryption for Unbounded Arity Functions
Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai
2015/1135 ( PDF )
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks
Hiraku Morita and Jacob C.N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata
2015/1134 ( PDF )
$\Lambda \circ \lambda$: Functional Lattice Cryptography
Eric Crockett and Chris Peikert
2015/1133 ( PDF )
Comment on ``Realization of a scalable Shor algorithm"
Zhengjun Cao and Lihua Liu
2015/1132 ( PDF )
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders
Katsuyuki Takashima and Atsushi Takayasu
2015/1131 ( PDF )
On the Usability of Two-Factor Authentication
Ding Wang and Ping Wang
2015/1130 ( PDF )
A Note on Perfect Correctness by Derandomization
Nir Bitansky and Vinod Vaikuntanathan
2015/1129 ( PDF )
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS
Martin R. Albrecht and Kenneth G. Paterson
2015/1128 ( PDF )
New directions in nearest neighbor searching with applications to lattice sieving
Anja Becker and Léo Ducas and Nicolas Gama and Thijs Laarhoven
2015/1127 ( PDF )
Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups
Mikhail Anokhin
2015/1126 ( PDF )
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence
Daniel S. Roche and Adam J. Aviv and Seung Geol Choi
2015/1125 ( PDF )
Practical Order-Revealing Encryption with Limited Leakage
Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu
2015/1124 ( PDF )
A Linear Code and its Application into Secret Sharing
Juan Carlos Ku-Cauich and Guillermo Morales-Luna
2015/1123 ( PDF )
Practical, Predictable Lattice Basis Reduction
Daniele Micciancio and Michael Walter
2015/1122 ( -- withdrawn -- )
Schnorr Signatures in the Multi-User Setting
Eike Kiltz and Daniel Masny and Jiaxin Pan
2015/1121 ( PDF )
On the First Fall Degree of Summation Polynomials
Stavros Kousidis and Andreas Wiemers
2015/1120 ( PDF )
Even More Practical Key Exchanges for the Internet using Lattice Cryptography
Vikram Singh and Arjun Chopra
2015/1119 ( PDF )
On the Possibility of Non-Interactive E-Voting in the Public-key Setting
Rosario Giustolisi and Vincenzo Iovino and Peter B. Rønne
2015/1118 ( PDF )
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers
Zhenzhen Bao and Peng Luo and Dongdai Lin
2015/1117 ( PDF )
Efficient implementation of AND, OR and NOT operators for ABCs
Antonio de la Piedra
2015/1116 ( PDF )
CHf-ORAM: A Constant Communication ORAM without Homomorphic Encryption
Tarik Moataz and Erik-Oliver Blass and Travis Mayberry
2015/1115 ( PDF )
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters
Avishek Adhikari and Kirill Morozov and Satoshi Obana and Partha Sarathi Roy and Kouichi Sakurai and Rui Xu
2015/1114 ( PDF )
Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension
Michał Wroński
2015/1113 ( PDF )
Multi-Input Functional Encryption with Unbounded-Message Security
Vipul Goyal and Aayush Jain and Adam O' Neill
2015/1112 ( PDF )
Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles
Prastudy Fauzi and Helger Lipmaa
2015/1111 ( -- withdrawn -- )
Comparison of TERO-cell implementations and characterisation on SRAM FPGAs
Cedric Marchand and Lilian Bossuet and AbdelKarim Cherkaoui
2015/1110 ( PDF )
Privacy-Aware Authentication in the Internet of Things
Hannes Gross and Marko Hölbl and Daniel Slamanig and Raphael Spreitzer
2015/1109 ( PDF )
Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems
Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2015/1108 ( PDF )
Recommender Systems and their Security Concerns
Jun Wang and Qiang Tang
2015/1107 ( PDF )
Concurrent Secure Computation via Non-Black Box Simulation
Vipul Goyal and Divya Gupta and Amit Sahai
2015/1106 ( PDF )
POPE: Partial Order-Preserving Encoding
Daniel Roche and Daniel Apon and Seung Geol Choi and Arkady Yerukhimovich
2015/1105 ( PDF )
Selene: Voting with Transparent Verifiability and Coercion-Mitigation
Peter Y A Ryan andPeter B Roenne and Vincenzo Iovino
2015/1104 ( PDF )
Computing Jacobi's \theta in quasi-linear time
Hugo Labrande
2015/1103 ( PDF )
Linear codes with few weights from weakly regular bent functions based on a generic construction
Sihem Mesnager
2015/1102 ( PDF )
A Practical Cryptanalysis of the Algebraic Eraser
Adi Ben-Zvi and Simon R. Blackburn and Boaz Tsaban
2015/1101 ( PDF )
Virtual Smart Cards: How to Sign with a Password and a Server
Jan Camenisch and Anja Lehmann and Gregory Neven and Kai Samelin
2015/1100 ( PDF )
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves.
Anissa Sghaier and Loubna Ghammam and Medyen Zeghid and Sylvain Duquesne and Mohsen Machhout
2015/1099 ( PDF )
Device-Enhanced Password Protocols with Optimal Online-Offline Protection
Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena
2015/1098 ( PDF )
Ring Signature Confidential Transactions for Monero
Shen Noether
2015/1097 ( PDF )
On the Communication required for Unconditionally Secure Multiplication
Ivan Damgård, Jesper Buus Nielsen, and Antigoni Polychroniadou
2015/1096 ( PDF )
Watermarking Cryptographic Capabilities
Aloni Cohen and Justin Holmgren and Ryo Nishimaki and Vinod Vaikuntanathan and Daniel Wichs
2015/1095 ( PDF )
Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures
Vipul Goyal and Aayush Jain and Dakshita Khurana
2015/1094 ( PDF )
Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification
Divesh Aggarwal and Kaave Hosseini and Shachar Lovett
2015/1093 ( PDF )
How to Use SNARKs in Universally Composable Protocols
Ahmed Kosba and Zhichao Zhao and Andrew Miller and Yi Qian and Hubert Chan and Charalampos Papamanthou and Rafael Pass and abhi shelat and Elaine Shi
2015/1092 ( PDF )
Post-quantum key exchange - a new hope
Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe
2015/1091 ( -- withdrawn -- )
Construction for de Bruijn Sequences with Large Orders
Junwu Dong and Dingyi Pei
2015/1090 ( PDF )
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
Vipul Goyal and Dakshita Khurana and Ilya Mironov and Omkant Pandey and Amit Sahai
2015/1089 ( PDF )
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Ronald Cramer and Ivan Bjerre Damgård and Nico Döttling and Serge Fehr and Gabriele Spini
2015/1088 ( PDF )
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015
Eiichiro Fujisaki and Keita Xagawa
2015/1087 ( -- withdrawn -- )
Efficient Signature Schemes from R-LWE
Ting Wang and Jianping Yu and Guoqiang Han and Peng Zhang
2015/1086 ( PDF )
Chicken or the Egg - Computational Data Attacks or Physical Attacks
Julien Allibert and Benoit Feix and Georges Gagnerot and Ismael Kane and Hugues Thiebeauld and Tiana Razafindralambo
2015/1085 ( PDF )
Malicious Keccak
Pawel Morawiecki
2015/1084 ( PDF )
Patchable Obfuscation
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/1083 ( PDF )
Implementation Attacks on Post-Quantum Cryptographic Schemes
Mostafa Taha and Thomas Eisenbarth
2015/1082 ( PDF )
Delegating RAM Computations with Adaptive Soundness and Privacy
Prabhanjan Ananth and Yu-Chi Chen and Kai-Min Chung and Huijia Lin and Wei-Kai Lin
2015/1081 ( PDF )
NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture
Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, and Howon Kim
2015/1080 ( PDF )
Variations to the cryptographics algorithms AES and TWOFISH
P. Freyre, N. Díaz and O. Cuellar
2015/1079 ( PDF )
De Bruijn Sequences from Symmetric Shift Registers
Ming Li and Mingxing Wang and Dongdai Lin
2015/1078 ( PDF )
On the Exact Cryptographic Hardness of Finding a Nash Equilibrium
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
2015/1077 ( PDF )
Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn
Dibyendu Roy and Sourav Mukhopadhyay
2015/1076 ( PDF )
An appendix for a recent paper of Kim
Razvan Barbulescu
2015/1075 ( PDF )
Cybersecurity in an era with quantum computers: will we be ready?
Michele Mosca
2015/1074 ( PDF )
Succinct Adaptive Garbled RAM
Ran Canetti and Yilei Chen and Justin Holmgren and Mariana Raykova
2015/1073 ( PDF )
Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower
David Derler and Daniel Slamanig
2015/1072 ( PDF )
Quantum One-Time Memories from Stateless Hardware
Anne Broadbent and Sevag Gharibian and Hong-Sheng Zhou
2015/1071 ( PDF )
Revisiting Secure Two-Party Computation with Rational Players
Arpita Maitra, Goutam Paul and Asim K. Pal
2015/1070 ( PDF )
Barriers to Black-Box Constructions of Traitor Tracing Systems
Bo Tang and Jiapeng Zhang
2015/1069 ( PDF )
Indifferentiability of 8-Round Feistel Networks
Yuanxi Dai and John Steinberger
2015/1068 ( PDF )
Black-Box Parallel Garbled RAM
Steve Lu and Rafail Ostrovsky
2015/1067 ( PDF )
Public Verifiability in the Covert Model (Almost) for Free
Vladimir Kolesnikov and Alex J. Malozemoff
2015/1066 ( PDF )
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential
Haipeng Qu, Peng Shang, Xi-Jun Lin, and Lin Sun
2015/1065 ( PDF )
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM
Christopher Fletcher and Muhammad Naveed and Ling Ren and Elaine Shi and Emil Stefanov
2015/1064 ( PDF )
Déjà Q: Encore! Un Petit IBE
Hoeteck Wee
2015/1063 ( PDF )
Optimal Computational Split-state Non-malleable Codes
Divesh Aggarwal; Shashank Agrawal; Divya Gupta; Hemanta K. Maji; Omkant Pandey; Manoj Prabhakaran
2015/1062 ( PDF )
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Mohammad Mahmoody; Ameer Mohammed; Soheil Nematihaji; Rafael Pass; abhi shelat
2015/1061 ( PDF )
On Basing Private Information Retrieval on NP-Hardness
Tianren Liu and Vinod Vaikuntanathan
2015/1060 ( PDF )
Complete addition formulas for prime order elliptic curves
Joost Renes and Craig Costello and Lejla Batina
2015/1059 ( PDF )
A General Framework for Redactable Signatures and New Constructions
David Derler and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2015/1058 ( PDF )
Rational Sumchecks
Siyao Guo; Pavel Hubacek; Alon Rosen; Margarita Vald
2015/1057 ( PDF )
The Complexity of Computing the Optimal Composition of Differential Privacy
Jack Murtagh, Salil Vadhan
2015/1056 ( PDF )
Information-theoretic Local Non-malleable Codes and their Applications
Nishanth Chandran; Bhavana Kanukurthi; Srinivasan Raghuraman
2015/1055 ( PDF )
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits
Yuval Ishai; Mor Weiss; Guang Yang
2015/1054 ( PDF )
Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS
HUI ZHAO and Kouichi Sakurai
2015/1053 ( PDF )
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
Binyi Chen; Huijia Lin; Stefano Tessaro
2015/1052 ( PDF )
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management
Chenglu Jin and Xiaolin Xu and Wayne Burleson and Ulrich Rührmair and Marten van Dijk
2015/1051 ( PDF )
Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme
Jayaprakash Kar
2015/1050 ( PDF )
Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem
Thuraya M. Qaradaghi and Newroz N. Abdulrazaq
2015/1049 ( PDF )
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Thomas Peyrin and Yannick Seurin
2015/1048 ( PDF )
Verifiable Random Functions from Standard Assumptions
Dennis Hofheinz; Tibor Jager
2015/1047 ( PDF )
Reconfigurable Cryptography: A flexible approach to long-term security
Julia Hesse and Dennis Hofheinz and Andy Rupp
2015/1046 ( PDF )
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
Benny Applebaum and Pavel Raykov
2015/1045 ( PDF )
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs
Gefei Li and Yuval Yarom and Damith C. Ranasinghe
2015/1044 ( PDF )
Homomorphic evaluation requires depth
Andrej Bogdanov and Chin Ho Lee
2015/1043 ( PDF )
The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle
Subhamoy Maitra
2015/1042 ( PDF )
ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM
Andreas Hülsing and Joost Rijneveld and Peter Schwabe
2015/1041 ( PDF )
The Number of Boolean Functions with Multiplicative Complexity 2
Magnus Gausdal Find and Daniel Smith-Tone and Meltem Sonmez Turan
2015/1040 ( PDF )
Fully Homomorphic Encryption with Composite Number Modulus
Masahiro Yagisawa
2015/1039 ( PDF )
Maturity and Performance of Programmable Secure Computation
David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen
2015/1038 ( PDF )
Revisiting LEGOs: Optimizations, Analysis, and their Limit
Yan Huang and Ruiyu Zhu
2015/1037 ( PDF )
Cryptanalysis of GGH15 Multilinear Maps
Jean-Sebastien Coron and Moon Sung Lee and Tancrede Lepoint and Mehdi Tibouchi
2015/1036 ( PDF )
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound
Selcuk Kavut and Subhamoy Maitra
2015/1035 ( PDF )
CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite
Britta Hale and Christopher Carr and Danilo Gligoroski
2015/1034 ( PDF )
Real time detection of cache-based side-channel attacks using Hardware Performance Counters
Marco Chiappetta and Erkay Savas and Cemal Yilmaz
2015/1033 ( PDF )
The Ultimate Transposition Cipher (UTC)
Gideon Samid
2015/1032 ( PDF )
Essentially Optimal Robust Secret Sharing with Maximal Corruptions
Allison Bishop and Valerio Pastro and Rajmohan Rajaraman and Daniel Wichs
2015/1031 ( PDF )
Secure Dating with Four or Fewer Cards
Antonio Marcedone and Zikai Wen and Elaine Shi
2015/1030 ( PDF )
SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
Vadim N.Tsypyschev
2015/1029 ( PDF )
The Energy Budget for Wireless Security: Extended Version
Dave Singelée and Stefaan Seys and Lejla Batina and Ingrid Verbauwhede
2015/1028 ( PDF )
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3
Hristina Mihajloska and Danilo Gligoroski and Simona Samardjiska
2015/1027 ( PDF )
Extended Tower Number Field Sieve: A New Complexity for Medium Prime Case
Taechan Kim and Razvan Barbulescu
2015/1026 ( PDF )
Hardness Estimation of LWE via Band Pruning
Yoshinori Aono and Le Trieu Phong and Lihua Wang
2015/1025 ( PDF )
PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers
Dieter Schmidt
2015/1024 ( -- withdrawn -- )
Parallel Implementation of Number Theoretic Transform
Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Taehwan Park and Howon Kim
2015/1023 ( PDF )
Indistinguishability Obfuscation with Constant Size Overhead
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/1022 ( PDF )
Recent progress on the elliptic curve discrete logarithm problem
Steven D. Galbraith and Pierrick Gaudry
2015/1021 ( PDF )
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application
Katsuyuki Takashima
2015/1020 ( PDF )
Attacking the Network Time Protocol
Aanchal Malhotra and Isaac E. Cohen and Erik Brakke and Sharon Goldberg
2015/1019 ( PDF )
Speed-Security Tradeoffs in Blockchain Protocols
Aggelos Kiayias and Giorgos Panagiotakos
2015/1018 ( PDF )
A Riddle Wrapped in an Enigma
N. Koblitz and A. Menezes
2015/1017 ( PDF )
Functional Encryption: Decentralised and Delegatable
Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
2015/1016 ( PDF )
One-Key Compression Function Based MAC with Security beyond Birthday Bound
Avijit Dutta and Mridul Nandi and Goutam Paul
2015/1015 ( PDF )
On Bitcoin as a public randomness source
Joseph Bonneau and Jeremy Clark and Steven Goldfeder
2015/1014 ( PDF )
Fast Fourier Orthogonalization
Léo Ducas and Thomas Prest
2015/1013 ( PDF )
Inception Makes Non-malleable Codes Stronger
Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
2015/1012 ( PDF )
An Efficient Multiple PKG Compatible Identity Based Authenticated Key Agreement protocol
Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
2015/1011 ( PDF )
Hierarchical Functional Encryption
Zvika Brakerski and Gil Segev
2015/1010 ( PDF )
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
2015/1009 ( PDF )
Applications of Key Recovery Cube-attack-like
Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
2015/1008 ( PDF )
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
2015/1007 ( PDF )
How to Vote Privately Using Bitcoin
Zhichao Zhao and T-H. Hubert Chan
2015/1006 ( PDF )
Confidential Benchmarking based on Multiparty Computation
Ivan Damgård and Kasper Damgård and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
2015/1005 ( PDF )
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
Wenbin Zhang and Chik How Tan
2015/1004 ( PDF )
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
2015/1003 ( PDF )
Results on polynomial interpolation with mixed modular operations and unknown moduli
Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
2015/1002 ( PDF )
got HW crypto? On the (in)security of a Self-Encrypting Drive series
Gunnar Alendal and Christian Kison and modg
2015/1001 ( PDF )
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
2015/1000 ( PDF )
Factoring as a Service
Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
2015/999 ( PDF )
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves
2015/998 ( PDF )
All or Nothing at All
Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
2015/997 ( PDF )
Incremental Program Obfuscation
Sanjam Garg and Omkant Pandey
2015/996 ( PDF )
Multi-user Schnorr security, revisited
Daniel J. Bernstein
2015/995 ( PDF )
Updates on Sorting of Fully Homomorphic Encrypted Data
Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed
2015/994 ( -- withdrawn -- )
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/993 ( PDF )
Bi-Deniable Inner Product Encryption from LWE
Daniel Apon and Xiong Fan and Feng-Hao Liu
2015/992 ( PDF )
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
Jinsu Kim and Sungwook Kim and Jae Hong Seo
2015/991 ( PDF )
Ed3363 (HighFive) -- An alternative Elliptic Curve
Mike Scott
2015/990 ( PDF )
Encryption Switching Protocols
Geoffroy Couteau and Thomas Peters and David Pointcheval
2015/989 ( PDF )
Fast Oblivious AES\\A dedicated application of the MiniMac protocol
Ivan Damgård and Rasmus Winther Zakarias
2015/988 ( PDF )
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram
2015/987 ( PDF )
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
Yehuda Lindell and Ben Riva
2015/986 ( PDF )
Bit Coincidence Mining Algorithm
Koh-ichi Nagao
2015/985 ( PDF )
Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
Koh-ichi Nagao
2015/984 ( PDF )
Complexity of ECDLP under the First Fall Degree Assumption
Koh-ichi Nagao
2015/983 ( PDF )
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
Ping Ngai Chung and Craig Costello and Benjamin Smith
2015/982 ( PDF )
A note on constructions of bent functions from involutions
Sihem Mesnager
2015/981 ( PDF )
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
Ayantika Chatterjee and Indranil Sengupta
2015/980 ( PDF )
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
2015/979 ( PDF )
Guidelines for Using the CryptDB System Securely
Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
2015/978 ( PDF )
The OPTLS Protocol and TLS 1.3
Hugo Krawczyk and Hoeteck Wee
2015/977 ( PDF )
Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³)
Michał Wroński
2015/976 ( PDF )
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Alex Biryukov and Léo Perrin
2015/975 ( PDF )
Extended Functionality in Verifiable Searchable Encryption
James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick
2015/974 ( PDF )
The Conjoined Microprocessor
Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and Rémi Géraud David Naccache and Jean Vuillemin
2015/973 ( PDF )
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
Ashwin Jha and Mridul Nandi
2015/972 ( PDF )
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
David Pointcheval and Olivier Sanders and Jacques Traoré
2015/971 ( PDF )
Attacks on Search RLWE
Hao Chen, Kristin Lauter, and Katherine E. Stange
2015/970 ( -- withdrawn -- )
Multilinear Maps over the Integers Using Modulus Switching
Gu Chunsheng
2015/969 ( PDF )
Zero-Knowledge Interactive Proof Systems for New Lattice Problems
Claude Crepéau and Raza Ali Kazmi
2015/968 ( PDF )
Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning
Gaëtan Leurent
2015/967 ( PDF )
Freestart collision for full SHA-1
Marc Stevens and Pierre Karpman and Thomas Peyrin
2015/966 ( PDF )
Vulnerabilities of ``McEliece in the World of Escher"
Dustin Moody and Ray Perlner
2015/965 ( PDF )
Private Genome Analysis through Homomorphic Encryption
Miran Kim and Kristin Lauter
2015/964 ( PDF )
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
Danping Shi and Lei Hu and Siwei Sun and Ling Song
2015/963 ( PDF )
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
Houda Ferradi and Rémi Géraud and David Naccache and Assia Tria
2015/962 ( PDF )
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
2015/961 ( PDF )
Short Structure-Preserving Signatures
Essam Ghadafi
2015/960 ( PDF )
More Efficient Secure Outsourcing Methods for Bilinear Maps
Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol
2015/959 ( PDF )
Cryptanalysis of the Round-Reduced Kupyna Hash Function
Jian Zou, Le Dong
2015/958 ( PDF )
Building Single-Key Beyond Birthday Bound Message Authentication Code
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
2015/957 ( PDF )
Delegating RAM Computations
Yael Tauman Kalai and Omer Paneth
2015/956 ( PDF )
Analysis of the Kupyna-256 Hash Function
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/955 ( PDF )
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
Mridul Nandi and Tapas Pandit
2015/954 ( PDF )
Online-Offline Homomorphic Signatures for Polynomial Functions
Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/953 ( PDF )
Gaussian Sampling Precision in Lattice Cryptography
Markku-Juhani O. Saarinen
2015/952 ( PDF )
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
2015/951 ( PDF )
Nearly Optimal Robust Secret Sharing
Mahdi Cheraghchi
2015/950 ( PDF )
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Shota Goto and Junji Shikata
2015/949 ( PDF )
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali Kaafar
2015/948 ( PDF )
A Provably Secure Short Signature Scheme from Coding Theory
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/947 ( PDF )
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
2015/946 ( PDF )
Asymmetric proof-of-work based on the Generalized Birthday problem
Alex Biryukov and Dmitry Khovratovich
2015/945 ( PDF )
Secure Set-based Policy Checking and Its Application to Password Registration
Changyu Dong and Franziskus Kiefer
2015/944 ( PDF )
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
Palash Sarkar and Shashank Singh
2015/943 ( PDF )
Sandy2x: New Curve25519 Speed Records
Tung Chou
2015/942 ( PDF )
Secrecy and independence for election schemes
Ben Smyth
2015/941 ( PDF )
Cryptanalysis of the New Multilinear Map over the Integers
Brice Minaud and Pierre-Alain Fouque
2015/940 ( PDF )
Secure Association for the Internet of Things
Almog Benin and Sivan Toledo and Eran Tromer
2015/939 ( PDF )
A Decade of Lattice Cryptography
Chris Peikert
2015/938 ( PDF )
Lattice Based Cryptography for Beginners
Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim
2015/937 ( PDF )
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung
2015/936 ( -- withdrawn -- )
A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
2015/935 ( PDF )
Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity
Céline Blondeau and Kaisa Nyberg
2015/934 ( PDF )
Cryptanalysis of the New CLT Multilinear Maps
Jung Hee Cheon, and Changmin Lee, and Hansol Ryu
2015/933 ( PDF )
Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme
Jayaprakash Kar
2015/932 ( PDF )
Using Tweaks To Design Fault Resistant Ciphers
Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay
2015/931 ( PDF )
Fast and Secure Three-party Computation: The Garbled Circuit Approach
Payman Mohassel and Mike Rosulek and Ye Zhang
2015/930 ( PDF )
Nearly Sparse Linear Algebra and application to Discrete Logarithms Computations
Antoine Joux and Cécile Pierrot
2015/929 ( PDF )
Are you The One to Share? Secret Transfer with Access Structure
Yongjun Zhao and Sherman S.M. Chow
2015/928 ( PDF )
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
Hassan Noura and Damien Couroussé
2015/927 ( PDF )
Rich Queries on Encrypted Data: Beyond Exact Matches
Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner
2015/926 ( PDF )
CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
Vadim N.Tsypyschev and Julia S.Vinogradova
2015/925 ( PDF )
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/924 ( PDF )
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
2015/923 ( PDF )
DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING
Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay
2015/922 ( PDF )
Localised Multisecret Sharing
Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
2015/921 ( PDF )
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
Kwangsu Lee and Jong Hwan Park
2015/920 ( PDF )
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese and Antonio Faonio and Seny Kamara
2015/919 ( PDF )
Privacy-preserving computation with trusted computing via Scramble-then-Compute
Hung Dang and Anh Dinh and Ee-Chien Chang and Beng Chin Ooi and Shruti Tople and Prateek Saxena
2015/918 ( PDF )
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk
2015/917 ( PDF )
Private Proximity Testing on Steroids: An NTRU-based Protocol
Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche
2015/916 ( PDF )
Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/915 ( PDF )
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes
Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
2015/914 ( PDF )
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2015/913 ( PDF )
Functional Signcryption: Notion, Construction, and Applications
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/912 ( PDF )
Extraction of intrinsic structure for Hardware Trojan detection
Maxime Lecomte and Jacques Fournier and Philippe Maurine
2015/911 ( PDF )
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin
2015/910 ( PDF )
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
Alonso González and Alejandro Hevia and Carla Ràfols
2015/909 ( PDF )
On the Impact of Known-Key Attacks on Hash Functions
Bart Mennink, Bart Preneel
2015/908 ( PDF )
Linear Distinguishers in the Key-less Setting: Application to PRESENT
Martin M. Lauridsen and Christian Rechberger
2015/907 ( PDF )
Cryptographic Assumptions: A Position Paper
Shafi Goldwasser and Yael Tauman Kalai
2015/906 ( PDF )
RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors
Adnan Baysal and Suhap Sahin
2015/905 ( PDF )
Mapping the Intel Last-Level Cache
Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser
2015/904 ( PDF )
Almost-tight Identity Based Encryption against Selective Opening Attack
Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen
2015/903 ( PDF )
A Note on the Indifferentiability of the 10-Round Feistel Construction
Yannick Seurin
2015/902 ( PDF )
Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques
Kexin Qiao and Lei Hu and Siwei Sun
2015/901 ( PDF )
A Unified Approach to MPC with Preprocessing using OT
Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl
2015/900 ( PDF )
New Results on Identity-based Encryption from Quadratic Residuosity
Ferucio Laurentiu Tiplea and Emil Simion
2015/899 ( PDF )
Privacy-preserving Attribute Based Searchable Encryption
Payal Chaudhari and Maniklal Das
2015/898 ( PDF )
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/897 ( PDF )
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography
Prosanta Gope
2015/896 ( PDF )
Improved Attacks on Reduced-Round Camellia-128/192/256
Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang
2015/895 ( PDF )
Rogue Decryption Failures: Reconciling AE Robustness Notions
Guy Barwell and Dan Page and Martijn Stam
2015/894 ( PDF )
Comparison of cube attacks over different vector spaces
Richard Winter and Ana Salagean and Raphael C.-W. Phan
2015/893 ( PDF )
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
2015/892 ( PDF )
Security Against Related Randomness Attacks via Reconstructive Extractors
Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee
2015/891 ( PDF )
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy
Sébastien Canard and Viet Cuong Trinh
2015/890 ( PDF )
MI-T-HFE, a New Multivariate Signature Scheme
Wenbin Zhang and Chik How Tan
2015/889 ( PDF )
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
Anamaria Costache and Nigel P. Smart
2015/888 ( PDF )
Tweak-Length Extension for Tweakable Blockciphers
Kazuhiko Minematsu and Tetsu Iwata
2015/887 ( PDF )
Composable Security in the Tamper Proof Model under Minimal Complexity
Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2015/886 ( PDF )
Applying Cryptographic Acceleration Techniques to Error Correction
Rémi Géraud and Diana-Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion
2015/885 ( PDF )
A New Standard of Ukraine: The Kupyna Hash Function
Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov
2015/884 ( PDF )
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/883 ( -- withdrawn -- )
Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security
Avijit Dutta and Goutam Paul
2015/882 ( PDF )
Using Modular Extension to Provably Protect ECC Against Fault Attacks
Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm
2015/881 ( PDF )
Generic Security of NMAC and HMAC with Input Whitening
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/880 ( PDF )
Generic Efficient Dynamic Proofs of Retrievability
Mohammad Etemad and Alptekin Küpçü
2015/879 ( PDF )
Computing information on domain parameters from public keys selected uniformly at random
Martin Ekerå
2015/878 ( PDF )
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model
Edward Eaton and Fang Song
2015/877 ( PDF )
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
Christophe Clavier and Julien Francq and Antoine Wurcker
2015/876 ( PDF )
10-Round Feistel is Indifferentiable from an Ideal Cipher
Dana Dachman-Soled and Jonathan Katz and Aishwarya Thiruvengadam
2015/875 ( PDF )
Bent and Semi-bent Functions via Linear Translators
Neşe Koçak, Sihem Mesnager and Ferruh Özbudak
2015/874 ( PDF )
Indifferentiability of 10-Round Feistel Networks
Yuanxi Dai and John Steinberger
2015/873 ( PDF )
On the Diffusion Property of Iterated Functions
Jian Liu, Sihem Mesnager, and Lusheng Chen
2015/872 ( PDF )
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
2015/871 ( PDF )
Photonic Side Channel Analysis of Arbiter PUFs
Shahin Tajik and Enrico Dietz and Sven Frohmann and Helmar Dittrich and Dmitry Nedospasov and Clemens Helfmeier and Jean-Pierre Seifert and Christian Boit and Heinz-Wilhelm Hübers
2015/870 ( PDF )
Gambling, Computational Information and Encryption Security
Mohammad Hajiabadi and Bruce M. Kapron
2015/869 ( PDF )
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs
2015/868 ( PDF )
Optimally Secure Block Ciphers from Ideal Primitives
Stefano Tessaro
2015/867 ( PDF )
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
2015/866 ( PDF )
Graded Encoding, Variations on a Scheme
Shai Halevi
2015/865 ( PDF )
Card-based Cryptographic Protocols Using a Minimal Number of Cards
Alexander Koch and Stefan Walzer and Kevin Härtel
2015/864 ( PDF )
Encryption Performance Improvements of the Paillier Cryptosystem
Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets
2015/863 ( PDF )
Is There an Oblivious RAM Lower Bound?
Elette Boyle and Moni Naor
2015/862 ( PDF )
Idealizing Identity-Based Encryption
Dennis Hofheinz and Christian Matt and Ueli Maurer
2015/861 ( PDF )
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
Chun Guo and Dongdai Lin
2015/860 ( PDF )
Selective Opening Security for Receivers
Carmit Hazay and Arpita Patra and Bogdan Warinschi
2015/859 ( PDF )
Factor Base Discrete Logarithms in Kummer Extensions
Dianyan Xiao and Jincheng Zhuang and Qi Cheng
2015/858 ( PDF )
Group Signatures Without q-Assumptions
Olivier Blazy and Saqib A. Kakvi
2015/857 ( PDF )
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
Benjamin Fuller and Ariel Hamlin
2015/856 ( PDF )
MGR HASH FUNCTION
Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass
2015/855 ( -- withdrawn -- )
A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
GANESH YELLAPU
2015/854 ( PDF )
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu
2015/853 ( PDF )
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Georg Fuchsbauer and Felix Heuer and Eike Kiltz and Krzysztof Pietrzak
2015/852 ( PDF )
Analysis of a key exchange protocol based on tropical matrix algebra
Matvei Kotov and Alexander Ushakov
2015/851 ( PDF )
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
Benoît Cogliati and Yannick Seurin
2015/850 ( PDF )
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable
Zhen Liu and Duncan S. Wong
2015/849 ( PDF )
Regulating the Pace of von Neumann Correctors
Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, and Amaury de Wargny
2015/848 ( PDF )
The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Meltem Sonmez Turan and Rene Peralta
2015/847 ( PDF )
Exploring Energy Efficiency of Lightweight Block Ciphers
Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
2015/846 ( PDF )
Characterization of Secure Multiparty Computation Without Broadcast
Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem
2015/845 ( PDF )
Cryptanalysis of the Quadratic Zero-Testing of GGH
Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrède Lepoint and Amit Sahai and Mehdi Tibouchi
2015/844 ( PDF )
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2015/843 ( PDF )
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
David Derler and Daniel Slamanig
2015/842 ( PDF )
On Linkability and Malleability in Self-blindable Credentials
Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers
2015/841 ( PDF )
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices
Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
2015/840 ( PDF )
Related-key Impossible Differential Analysis of Full Khudra
Qianqian Yang and Lei Hu and Siwei Sun and Ling Song
2015/839 ( PDF )
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?
David Wong
2015/838 ( PDF )
Offline Witness Encryption
Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
2015/837 ( PDF )
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation
Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA
2015/836 ( PDF )
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
Benjamin Wesolowski and Pascal Junod
2015/835 ( PDF )
On near prime-order elliptic curves with small embedding degrees (Full version)
Duc-Phong Le and Nadia El Mrabet and Chik How Tan
2015/834 ( -- withdrawn -- )
Authentication Using Side-Channel Information
Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata
2015/833 ( PDF )
Efficient Key Authentication Service for Secure End-to-end Communications
Mohammad Etemad and Alptekin Küpçü
2015/832 ( PDF )
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
David McCann, Kerstin Eder, Elisabeth Oswald
2015/831 ( PDF )
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk
2015/830 ( PDF )
Unique Signature with Short Output from CDH Assumption
Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
2015/829 ( PDF )
Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1
Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
2015/828 ( PDF )
State-recovery analysis of Spritz
Ralph Ankele and Stefan Koelbl and Christian Rechberger
2015/827 ( PDF )
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee
2015/826 ( PDF )
Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
Dario Catalano and Dario Fiore and Luca Nizzardo
2015/825 ( PDF )
The Emperor's New Password Creation Policies
Ding Wang and Ping Wang
2015/824 ( PDF )
Efficient Fully Structure-Preserving Signatures for Large Messages
Jens Groth
2015/823 ( PDF )
Efficient (ideal) lattice sieving using cross-polytope LSH
Anja Becker and Thijs Laarhoven
2015/822 ( PDF )
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Akshayaram Srinivasan and C. Pandu Rangan
2015/821 ( PDF )
A general framework for building noise-free homomorphic cryptosystems
Gérald Gavin
2015/820 ( PDF )
Extended Nested Dual System Groups, Revisited
Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang
2015/819 ( PDF )
Improving the Big Mac Attack on Elliptic Curve Cryptography
Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
2015/818 ( PDF )
cuHE: A Homomorphic Encryption Accelerator Library
Wei Dai and Berk Sunar
2015/817 ( PDF )
Secure Multiparty Computation of a Social Network
Varsha Bhat Kukkala and Jaspal Singh Saini and S.R.S. Iyengar
2015/816 ( PDF )
Analysis of Keyless Massive MIMO-based Cryptosystem Security
Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev
2015/815 ( PDF )
On the Power of Hierarchical Identity-Based Encryption
Mohammad Mahmoody and Ameer Mohammed
2015/814 ( PDF )
CLKS: Certificateless Keyword Search on Encrypted Data
Qingji Zheng and Xiangxue Li and Aytac Azgin
2015/813 ( PDF )
Revisiting Turning Online Cipher Off
Ritam Bhaumik and Mridul Nandi
2015/812 ( PDF )
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob
Alex Biryukov and Léo Perrin and Aleksei Udovenko
2015/811 ( PDF )
Key-recovery attacks against the MAC algorithm Chaskey
Chrysanthi Mavromati
2015/810 ( PDF )
Improved OR Composition of Sigma-Protocols
Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2015/809 ( PDF )
New Techniques for Electronic Voting
Alan Szepieniec and Bart Preneel
2015/808 ( PDF )
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
Mihir Bellare and Joseph Jaeger and Daniel Kane
2015/807 ( PDF )
Fair Distributed Computation of Reactive Functions
Juan Garay and Björn Tackmann and Vassilis Zikas
2015/806 ( PDF )
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
2015/805 ( PDF )
A classification of elliptic curves with respect to the GHS attack in odd characteristic
Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
2015/804 ( PDF )
SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
Sumit Chakraborty
2015/803 ( PDF )
Statistical and Algebraic Properties of DES
Stian Fauskanger and Igor Semaev
2015/802 ( PDF )
Ciphertext-only attack on d*d Hill in O(d13^d)
Shahram Khazaei and Siavash Ahmadi
2015/801 ( PDF )
Scalar Blinding on Elliptic Curves based on Primes with Special Structure
Scott Fluhrer
2015/800 ( PDF )
Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
Jihoon Cho, Kyu Young Choi, and Dukjae Moon
2015/799 ( PDF )
Secure Binary Field Multiplication
Hwajeong Seo and Chien-Ning Chen and Zhe Liu and Yasuyuki Nogami and Taehwan Park and Jongseok Choi and Howon Kim
2015/798 ( -- withdrawn -- )
A Stateless Cryptographically-Secure Physical Unclonable Function
Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
2015/797 ( PDF )
What Security Can We Achieve In Less Than 4-Rounds?
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/796 ( PDF )
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi
2015/795 ( PDF )
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman
2015/794 ( PDF )
Safe-Errors on SPA Protected implementations with the Atomicity Technique
Pierre-Alain Fouque and Sylvain Guilley and Cédric Murdica and David Naccache
2015/793 ( PDF )
Algorithmic Information Theory for Obfuscation Security
Rabih Mohsen and Alexandre Miranda Pinto
2015/792 ( PDF )
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz and Vanishree Rao and Daniel Wichs
2015/791 ( PDF )
On the Equivalence of Obfuscation and Multilinear Maps
Omer Paneth and Amit Sahai
2015/790 ( PDF )
On weak and strong 2^k-bent Boolean functions
Pantelimon Stanica
2015/789 ( PDF )
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator
Gangqiang Yang and Mark D. Aagaard and Guang Gong
2015/788 ( PDF )
Cracking-Resistant Password Vaults using Natural Language Encoders
Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart
2015/787 ( PDF )
Backtracking-Assisted Multiplication
Houda Ferradi and Rémi Géraud and Diana Maimut and David Naccache and Hang Zhou
2015/786 ( PDF )
Buying AES Design Resistance with Speed and Energy
Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto
2015/785 ( PDF )
Double-Speed Barrett Moduli
Rémi Géraud and Diana Maimut and David Naccache
2015/784 ( PDF )
Threshold FlipThem: When the winner does not need to take all
David Leslie and Chris Sherfield and Nigel P. Smart
2015/783 ( PDF )
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
Ivan Tjuawinata and Tao Huang and Hongjun Wu
2015/782 ( PDF )
Secure two-party computation in applied pi-calculus: models and verification
Sergiu Bursuc
2015/781 ( PDF )
Twisted Hessian curves
Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange
2015/780 ( PDF )
Multilinear Maps from Obfuscation
Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson
2015/779 ( PDF )
A Simple Scheme, for Strengthening Product-sum Type PKC
Masao KASAHARA
2015/778 ( -- withdrawn -- )
Modular Inversion Hidden Number Problem -- Correction and Improvements
Santanu Sarkar
2015/777 ( PDF )
Arithmetic Walsh Transform of Boolean Functions with Linear Structures
Qinglan Zhao and Dong Zheng and Xiangxue Li and Xiaoli Dong
2015/776 ( PDF )
Functional Encryption for Turing Machines
Prabhanjan Ananth and Amit Sahai
2015/775 ( PDF )
Efficient MDS Diffusion Layers Through Decomposition of Matrices
S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo
2015/774 ( PDF )
Revisiting Prime Power RSA
Santanu Sarkar
2015/773 ( PDF )
Distinguishing a truncated random permutation from a random function
Shoni Gilboa and Shay Gueron
2015/772 ( PDF )
Non-Malleable Encryption: Simpler, Shorter, Stronger
Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
2015/771 ( PDF )
A SAT-based Public Key Cryptography Scheme
Sebastian E. Schmittner
2015/770 ( PDF )
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
Michele Ciampi and Giuseppe Persiano and Luisa Siniscalchi and Ivan Visconti
2015/769 ( PDF )
On the Hardness of Learning with Rounding over Small Modulus
Andrej Bogdanov and Siyao Guo and Daniel Masny and Silas Richelson and Alon Rosen
2015/768 ( PDF )
Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar
2015/767 ( PDF )
Dual EC: A Standardized Back Door
Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen
2015/766 ( PDF )
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng
2015/765 ( PDF )
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Victoria Fehr and Marc Fischlin
2015/764 ( PDF )
On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2})
Jincheng Zhuang and Qi Cheng
2015/763 ( PDF )
Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and Takafumi Aoki
2015/762 ( PDF )
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef
2015/761 ( PDF )
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
William Diehl
2015/760 ( PDF )
Investigating SRAM PUFs in large CPUs and GPUs
Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen
2015/759 ( PDF )
Cryptanalysis of Gu's ideal multilinear map
Alice Pellet-Mary and Damien Stehle
2015/758 ( PDF )
Ring-LWE Cryptography for the Number Theorist
Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
2015/757 ( PDF )
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks
Matthias Hamann and Matthias Krause
2015/756 ( PDF )
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/755 ( PDF )
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen
2015/754 ( PDF )
Related-Key Attack on Full-Round PICARO
Anne Canteaut and Virginie Lallemand and María Naya-Plasencia
2015/753 ( PDF )
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen
2015/752 ( PDF )
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov and Gil Segev
2015/751 ( PDF )
Fast Garbling of Circuits Under Standard Assumptions
Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
2015/750 ( PDF )
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki and Daniel Wichs and Mark Zhandry
2015/749 ( PDF )
Affine Equivalence and its Application to Tightening Threshold Implementations
Pascal Sasdrich and Amir Moradi and Tim Güneysu
2015/748 ( PDF )
A More Cautious Approach to Security Against Mass Surveillance
Jean Paul Degabriele and Pooya Farshim and Bertram Poettering
2015/747 ( PDF )
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du
2015/746 ( PDF )
A 2^{70} Attack on the Full MISTY1
Achiya Bar-On
2015/745 ( PDF )
Faster ECC over F_{2^571} (feat. PMULL)
Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
2015/744 ( PDF )
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
Ege Gulcan and Aydin Aysu and Patrick Schaumont
2015/743 ( PDF )
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Benoit Libert and Thomas Peters and Moti Yung
2015/742 ( PDF )
A Matrix Decomposition Method for Optimal Normal Basis Multiplication
Can Kızılkale and Ömer Eǧecioǧlu and Çetin Kaya Koç
2015/741 ( PDF )
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
2015/740 ( PDF )
Predictable Arguments of Knowledge
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2015/739 ( PDF )
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang
2015/738 ( PDF )
Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO)
Kazuhiko Minematsu
2015/737 ( PDF )
New multilinear maps from ideal lattices
Gu Chunsheng
2015/736 ( -- withdrawn -- )
Solving LWE via List Decoding
Mingqiang Wang and Xiaoyun Wang and Kunxian Xia and Jincheng Zhuang
2015/735 ( PDF )
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Ilan Komargodski and Mark Zhandry
2015/734 ( -- withdrawn -- )
On the Security of Extended Generalized Feistel Networks
Manoj Kumar and Saibal K. Pal and Anupama Panigrahi
2015/733 ( PDF )
Fully Homomorphic Encryption on Octonion Ring
Masahiro Yagisawa
2015/732 ( PDF )
Compact Implementations of LEA Block Cipher for Low-End Microprocessors
Hwajeong Seo and Zhe Liu and Jongseok Choi and Taehwan Park and and Howon Kim
2015/731 ( PDF )
Same Value Analysis on Edwards Curves
Rodrigo Abarzúa and Santi Martínez and Valeria Mendoza
2015/730 ( PDF )
Indistinguishability Obfuscation from Functional Encryption for Simple Functions
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/729 ( PDF )
Provably-Secure Remote Memory Attestation to Prevent Heap Overflow Attacks
Alexandra Boldyreva and Taesoo Kim and Richard Lipton and Bogdan Warinschi
2015/728 ( PDF )
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas
2015/727 ( PDF )
DPA, Bitslicing and Masking at 1 GHz
Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede
2015/726 ( PDF )
Compositions of linear functions and applications to hashing
Vladimir Shpilrain and Bianca Sosnovski
2015/725 ( PDF )
The self-blindable U-Prove scheme from FC'14 is forgeable
Eric Verheul and Sietse Ringers and Jaap-Henk Hoepman
2015/724 ( PDF )
A masked ring-LWE implementation
Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2015/723 ( PDF )
Cryptanalysis of Feistel Networks with Secret Round Functions
Alex Biryukov and Gaëtan Leurent and Léo Perrin
2015/722 ( PDF )
Oblivious Substring Search with Updates
Tarik Moataz and Erik-Oliver Blass
2015/721 ( PDF )
KDM-Security via Homomorphic Smooth Projective Hashing
Hoeteck Wee
2015/720 ( PDF )
Output-Compressing Randomized Encodings and Applications
Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang
2015/719 ( PDF )
Consolidating masking schemes
Oscar Reparaz and Begül Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede
2015/718 ( PDF )
Efficient Asynchronous Accumulators for Distributed PKI
Leonid Reyzin and Sophia Yakoubov
2015/717 ( PDF )
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/716 ( PDF )
Linear Cryptanalysis of Reduced-Round SIMECK Variants
Nasour Bagheri
2015/715 ( PDF )
New Circular Security Counterexamples from Decision Linear and Learning with Errors
Allison Bishop and Susan Hohenberger and Brent Waters
2015/714 ( PDF )
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
Masao KASAHARA
2015/713 ( PDF )
Light-hHB: A New Version of hHB with Improved Session Key Exchange
Ka Ahmad Khoureich
2015/712 ( PDF )
On Limitations of the Fiat­–Shamir Transformation
David Bernhard and Bogdan Warinschi
2015/711 ( PDF )
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)
Anne Canteaut and Sébastien Duval and Gaëtan Leurent
2015/710 ( PDF )
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Bernardo Ferreira and João Rodrigues and João Leitão and Henrique Domingos
2015/709 ( PDF )
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
Luka Malisa and Kari Kostiainen and Srdjan Capkun
2015/708 ( PDF )
Choosing Parameters for NTRUEncrypt
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2015/707 ( PDF )
Reconciling User Privacy and Implicit Authentication for Mobile Devices
Siamak F. Shahandashti and Reihaneh Safavi-Naini and Nashad Ahmed Safa
2015/706 ( PDF )
A Brief Comparison of Simon and Simeck
Stefan Kölbl and Arnab Roy
2015/705 ( PDF )
Linear Overhead Robust MPC with Honest Majority Using Preprocessing
Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
2015/704 ( PDF )
Indistinguishability Obfuscation: from Approximate to Exact
Nir Bitansky and Vinod Vaikuntanathan
2015/703 ( PDF )
Point-Function Obfuscation: A Framework and Generic Constructions
Mihir Bellare and Igors Stepanovs
2015/702 ( PDF )
Demystifying incentives in the consensus computer
Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena
2015/701 ( PDF )
Differential Privacy in distribution and instance-based noise mechanisms
Sébastien Canard and Baptiste Olivier
2015/700 ( PDF )
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
Jimmy Jose and Dipanwita RoyChowdhury
2015/699 ( PDF )
FURISC: FHE Encrypted URISC Design
Ayantika Chatterjee and Indranil Sengupta
2015/698 ( PDF )
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa
Subhamoy Maitra
2015/697 ( PDF )
On the Security of a Self-healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/696 ( PDF )
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
Miguel Morales Sandoval and Arturo Diaz Perez
2015/695 ( PDF )
Cliptography: Clipping the Power of Kleptographic Attacks
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou
2015/694 ( PDF )
On the Complexity of Additively Homomorphic UC Commitments
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
2015/693 ( PDF )
Foundations of Reactive Garbling Schemes
Jesper Buus Nielsen and Samuel Ranellucci
2015/692 ( PDF )
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
2015/691 ( PDF )
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth
2015/690 ( PDF )
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/689 ( PDF )
Counting Keys in Parallel After a Side Channel Attack
Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam
2015/688 ( PDF )
Binary Field Multiplication on ARMv8
Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
2015/687 ( PDF )
Classical Cryptographic Protocols in a Quantum World
Sean Hallgren and Adam Smith and Fang Song
2015/686 ( PDF )
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
Azeem Irshad and Muhammad Sher and Shahzad Ashraf and Shahzad faisal and Mahmood Ul Hassan
2015/685 ( PDF )
On the discrete logarithm problem in finite fields of fixed characteristic
Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
2015/684 ( PDF )
A One-time Stegosystem and Applications to Efficient Covert Communication
Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha Shashidhar
2015/683 ( PDF )
Security of Linear Secret-Sharing Schemes against Mass Surveillance
Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci
2015/682 ( PDF )
Integral Cryptanalysis on Full MISTY1
Yosuke Todo
2015/681 ( PDF )
ANONIZE: A Large-Scale Anonymous Survey System
Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat
2015/680 ( PDF )
Indifferentiability of Confusion-Diffusion Networks
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/679 ( PDF )
Another Look at Normal Approximations in Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/678 ( PDF )
Optimizing MAKWA on GPU and CPU
Thomas Pornin
2015/677 ( PDF )
EdDSA for more curves
Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang
2015/676 ( PDF )
Quantum Cryptanalysis of NTRU
Scott Fluhrer
2015/675 ( PDF )
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
2015/674 ( PDF )
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
Peeter Laud and Alisa Pankova
2015/673 ( PDF )
Decaf: Eliminating cofactors through point compression
Mike Hamburg
2015/672 ( PDF )
Function-Hiding Inner Product Encryption
Allison Bishop and Abhishek Jain and Lucas Kowalczyk
2015/671 ( PDF )
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data
Peeter Laud and Alisa Pankova
2015/670 ( PDF )
Smart Security Management in Secure Devices
Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
2015/669 ( PDF )
GMU Hardware API for Authenticated Ciphers
Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj
2015/668 ( PDF )
The Fallacy of Composition of Oblivious RAM and Searchable Encryption
Muhammad Naveed
2015/667 ( PDF )
De Bruijn Sequences from Nonlinear Feedback Shift Registers
Ming Li and Dongdai Lin
2015/666 ( PDF )
Improved Linear Hull Attack on Round-Reduced \textsc{Simon} with Dynamic Key-guessing Techniques
Huaifeng Chen and Xiaoyun Wang
2015/665 ( PDF )
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption.
Romain Gay and Iordanis Kerenidis and Hoeteck Wee
2015/664 ( PDF )
Secure Multi-Party Shuffling
Mahnush Movahedi and Jared Saia and Mahdi Zamani
2015/663 ( PDF )
Analyzing the Efficiency of Biased-Fault Based Attacks
Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
2015/662 ( PDF )
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves
Ryutaroh Matsumoto
2015/661 ( PDF )
Cryptanalysis of a modern rotor machine in a multicast setting
Shane Kepley and David Russo and Rainer Steinwandt
2015/660 ( PDF )
A Hybrid Gaussian Sampler for Lattices over Rings
Léo Ducas and Thomas Prest
2015/659 ( PDF )
Diversity and Transparency for ECC
Jean-Pierre Flori and Jérôme Plût and Jean-René Reinhard and Martin Ekerå
2015/658 ( PDF )
Single-Cycle Implementations of Block Ciphers
Pieter Maene and Ingrid Verbauwhede
2015/657 ( PDF )
Randomizing the Montgomery Powering Ladder
Duc-Phong Le, Chik How Tan and Michael Tunstall
2015/656 ( PDF )
Cryptanalysis of a Markov Chain Based User Authentication Scheme
Ruhul Amin and G.P. Biswas
2015/655 ( PDF )
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
2015/654 ( PDF )
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng
2015/653 ( -- withdrawn -- )
Homomorphic Signature Schemes - A survey
Giulia Traverso and Denise Demirel and Johannes Buchmann
2015/652 ( PDF )
Modelling ciphersuite and version negotiation in the TLS protocol
Benjamin Dowling and Douglas Stebila
2015/651 ( PDF )
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller
2015/650 ( PDF )
A New Encryption Standard of Ukraine: The Kalyna Block Cipher
Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov and Ruslan Mordvinov and Dmytro Kaidalov
2015/649 ( PDF )
On the Hardness of Proving CCA-security of Signed ElGamal
David Bernhard and Marc Fischlin and Bogdan Warinschi
2015/648 ( PDF )
Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard and Marc Fischlin and Bogdan Warinschi
2015/647 ( PDF )
Efficient ephemeral elliptic curve cryptographic keys
Andrea Miele and Arjen K. Lenstra
2015/646 ( PDF )
Decomposition attack on SASASASAS
Alex Biryukov and Dmitry Khovratovich
2015/645 ( -- withdrawn -- )
New Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Clémentine Gritti, Rongmao Chen, Willy Susilo and Thomas Plantard
2015/644 ( PDF )
The Pythia PRF Service
Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart
2015/643 ( PDF )
Short Accountable Ring Signatures Based on DDH
Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit
2015/642 ( PDF )
A New Partial Key Exposure Attack on Multi-power RSA
Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol
2015/641 ( PDF )
Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Jing Li, Licheng Wang
2015/640 ( PDF )
Very-efficient simulatable flipping of many coins into a well
Luís T. A. N. Brandão
2015/639 ( PDF )
Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings
Hao Chen
2015/638 ( PDF )
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta
2015/637 ( PDF )
A Novel Cyberspace-Oriented Access Control Model
Fenghua Li and Yanchao Wang and Rongna Xie and Jinbo Xiong and Fangfang Shan
2015/636 ( PDF )
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes
Matthias Krause
2015/635 ( PDF )
Microcash: Efficient Off-Line Small Payments
Chris Pavlovski and Colin Boyd
2015/634 ( PDF )
Phasing: Private Set Intersection using Permutation-based Hashing
Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner
2015/633 ( PDF )
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/632 ( PDF )
More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji
2015/631 ( PDF )
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
Thomas Pöppelmann and Michael Naehrig and Andrew Putnam and Adrian Macias
2015/630 ( PDF )
Unconditionally Secure Computation with Reduced Interaction
Ivan Damgård and Jesper Buus Nielsen and Rafail Ostovsky and Adi Rosen
2015/629 ( PDF )
BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme
Véronique Cortier and Georg Fuchsbauer and David Galindo
2015/628 ( PDF )
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
Daniel Cabarcas and Denise Demirel and Florian Göpfert and Jean Lancrenon and Thomas Wunderer
2015/627 ( PDF )
On Necessary Padding with IO
Justin Holmgren
2015/626 ( PDF )
Practical Round-Optimal Blind Signatures in the Standard Model
Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
2015/625 ( PDF )
Ed448-Goldilocks, a new elliptic curve
Mike Hamburg
2015/624 ( PDF )
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff
2015/623 ( PDF )
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand
2015/622 ( PDF )
Random Digit Representation of Integers
Nicolas Méloni and M. Anwar Hasan
2015/621 ( PDF )
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
Sarani Bhattacharya, Debdeep Mukhopadhyay
2015/620 ( PDF )
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions
Susumu Kiyoshima
2015/619 ( PDF )
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
Seher Tutdere and Osmanbey Uzunkol
2015/618 ( PDF )
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
Juan Carlos Ku-Cauich  Guillermo Morales-Luna  Horacio Tapia-Recillas
2015/617 ( PDF )
Generalised tally-based decoders for traitor tracing and group testing
Boris Skoric and Wouter de Groot
2015/616 ( PDF )
The leaking battery: A privacy analysis of the HTML5 Battery Status API
Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia Diaz
2015/615 ( PDF )
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati
2015/614 ( PDF )
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
Fangguo Zhang
2015/613 ( PDF )
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei
2015/612 ( PDF )
The Simeck Family of Lightweight Block Ciphers
Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong
2015/611 ( PDF )
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Shijun Zhao and Qianying Zhang
2015/610 ( PDF )
McBits: fast constant-time code-based cryptography
Daniel J. Bernstein and Tung Chou and Peter Schwabe
2015/609 ( PDF )
Experimental Study of DIGIPASS GO3 and the Security of Authentication
Igor Semaev
2015/608 ( PDF )
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Shweta Agrawal and Benoit Libert and Damien Stehle
2015/607 ( PDF )
Netcoin - A Traceable P2P Electronic Cash System
Hitesh Tewari and Eamon O Nuallain
2015/606 ( PDF )
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon
2015/605 ( PDF )
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm
Steven D. Galbraith and Ping Wang and Fangguo Zhang
2015/604 ( PDF )
Structure-Preserving Signatures from Standard Assumptions, Revisited
Eike Kiltz and Jiaxin Pan and Hoeteck Wee
2015/603 ( PDF )
Complementary Dual Codes for Counter-measures to Side-Channel Attacks
Claude Carlet and Sylvain Guilley
2015/602 ( PDF )
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhay
2015/601 ( PDF )
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
Mei Wang, Zheng Yuan,Xiao Feng
2015/600 ( PDF )
Predictive Models for Min-Entropy Estimation
John Kelsey and Kerry A. McKay and Meltem Sonmez Turan
2015/599 ( PDF )
The Chain Rule for HILL Pseudoentropy, Revisited
Krzysztof Pietrzak and Maciej Skorski
2015/598 ( PDF )
Combining Differential Privacy and Secure Multiparty Computation
Martin Pettai and Peeter Laud
2015/597 ( PDF )
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
Amir Moradi and Alexander Wild
2015/596 ( PDF )
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations
Jean-Sebastien Coron and Craig Gentry and Shai Halevi and Tancrede Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi
2015/595 ( -- withdrawn -- )
Differential Fault Intensity Analysis
Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa Taha and Patrick Schaumont
2015/594 ( PDF )
Disk Encryption: Do We Need to Preserve Length?
Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
2015/593 ( PDF )
A Physical Approach for Stochastic Modeling of TERO-based TRNG
Patrick HADDAD and Viktor FISCHER and Florent BERNARD and Jean NICOLAI
2015/592 ( PDF )
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel
2015/591 ( PDF )
How much randomness can be extracted from memoryless Shannon entropy sources?
Maciej Skorski
2015/590 ( PDF )
TriviA: A Fast and Secure Authenticated Encryption Scheme
Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
2015/589 ( PDF )
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
A.-M. Leventi-Peetz and J.-V. Peetz
2015/588 ( PDF )
An analysis of the $C$ class of bent functions
Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic
2015/587 ( PDF )
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Trupil Limbasiya and Nishant Doshi
2015/586 ( -- withdrawn -- )
SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System
Yuan Zhang and Chunxiang Xu and Shui Yu and Hongwei Li and Xiaojun Zhang
2015/585 ( PDF )
SIMON and SPECK: Block Ciphers for the Internet of Things
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2015/584 ( PDF )
How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Denise Demirel and Jean Lancrenon
2015/583 ( PDF )
Secure Key Generation from Biased PUFs
Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems
2015/582 ( PDF )
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita-Rotaru
2015/581 ( PDF )
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation
Christina Brzuska and Arno Mittelbach
2015/580 ( PDF )
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss
2015/579 ( PDF )
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
Mridul Nandi
2015/578 ( PDF )
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun
2015/577 ( PDF )
Twist Insecurity
Manfred Lochter, Andreas Wiemers
2015/576 ( PDF )
The Carnac protocol -- or how to read the contents of a sealed envelope
Michael Scott and Brian Spector
2015/575 ( PDF )
Known-key Distinguisher on Full PRESENT
Céline Blondeau and Thomas Peyrin and Lei Wang
2015/574 ( PDF )
Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
2015/573 ( PDF )
Last fall degree, HFE, and Weil descent attacks on ECDLP
Ming-Deh A. Huang and Michiel Kosters and Sze Ling Yeo
2015/572 ( PDF )
On Public Key Encryption from Noisy Codewords
Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi
2015/571 ( PDF )
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order - Extended Version
Tobias Schneider and Amir Moradi and Tim Güneysu
2015/570 ( PDF )
Constant Communication ORAM with Small Blocksize
Tarik Moataz and Travis Mayberry and Erik-Oliver Blass
2015/569 ( PDF )
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2015/568 ( PDF )
Cryptanalysis of Reduced-Round Whirlwind (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2015/567 ( PDF )
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
Henri Gilbert and Jérôme Plût and Joana Treger
2015/566 ( PDF )
A Framework for Identity-Based Encryption with Almost Tight Security
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/565 ( PDF )
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
Craig Costello and Patrick Longa
2015/564 ( PDF )
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Victor Costan and Ilia Lebedev and Srinivas Devadas
2015/563 ( PDF )
Privacy in the Genomic Era
Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang
2015/562 ( PDF )
PUDA – Privacy and Unforgeability for Data Aggregation
Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/561 ( PDF )
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J. Longo and E. De Mulder and D. Page and M. Tunstall
2015/560 ( PDF )
Generic Construction of UC-Secure Oblivious Transfer
Olivier Blazy and Céline Chevalier
2015/559 ( PDF )
Concurrent Secure Computation with Optimal Query Complexity
Ran Canetti and Vipul Goyal and Abhishek Jain
2015/558 ( PDF )
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
2015/557 ( PDF )
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
Takanori Isobe and Kyoji Shibutani
2015/556 ( PDF )
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates
Sujoy Sinha Roy and Kimmo Järvinen and Ingrid Verbauwhede
2015/555 ( PDF )
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
Tapas Pandit and Sumit Kumar Pandey and Rana Barua
2015/554 ( PDF )
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
2015/553 ( PDF )
Round-Optimal Black-Box Two-Party Computation
Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro
2015/552 ( PDF )
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
Paul Kirchner and Pierre-Alain Fouque
2015/551 ( PDF )
Quantum homomorphic encryption for circuits of low $T$-gate complexity
Anne Broadbent and Stacey Jeffery
2015/550 ( PDF )
Upending Stock Market Structure Using Secure Multi-Party Computation
Charanjit S. Jutla
2015/549 ( PDF )
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices
Amir Hassani Karbasi, Reza Ebrahimi Atani
2015/548 ( PDF )
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
2015/547 ( PDF )
Secure Computation of MIPS Machine Code
Xiao Shaun Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz
2015/546 ( PDF )
Actively Secure OT Extension with Optimal Overhead
Marcel Keller and Emmanuela Orsini and Peter Scholl
2015/545 ( PDF )
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
Qinglong Zhang and Zongbin Liu and and Cunqing Ma and Changting Li and Jiwu Jing
2015/544 ( PDF )
Alternative cubics' rules with an algebraic appeal
Daniel R. L. Brown
2015/543 ( PDF )
Bloom Filters in Adversarial Environments
Moni Naor and Eylon Yogev
2015/542 ( PDF )
Improved Side-Channel Analysis of Finite-Field Multiplication
Sonia Belaïd and Jean-Sébastien Coron and Pierre-Alain Fouque and Benoît Gérard and Jean-Gabriel Kammerer and Emmanuel Prouff
2015/541 ( PDF )
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Bart Mennink and Reza Reyhanitabar and Damian Vizár
2015/540 ( -- withdrawn -- )
PICO: An Ultra lightweight and Low power encryption design for pervasive computing
Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil
2015/539 ( PDF )
Tweaking Even-Mansour Ciphers
Benoît Cogliati and Rodolphe Lampe and Yannick Seurin
2015/538 ( PDF )
Pairing Based Mutual Healing in Wireless Sensor Networks
Sarita Agrawal and Jay Patel and Manik Lal Das
2015/537 ( PDF )
Towards Easy Leakage Certification
François Durvaux and François-Xavier Standaert
2015/536 ( PDF )
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
François Durvaux and François-Xavier Standaert
2015/535 ( PDF )
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Vincent Grosso and François-Xavier Standaert
2015/534 ( PDF )
Problems, solutions and experience of the first international student's Olympiad in cryptography
Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia Tokareva and Valeria Vitkup
2015/533 ( PDF )
Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
Xiaoshuang Ma and Kexin Qiao
2015/531 ( PDF )
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
Mohammad Hajiabadi, Bruce M. Kapron
2015/530 ( PDF )
Practical Free-Start Collision Attacks on 76-step SHA-1
Pierre Karpman and Thomas Peyrin and Marc Stevens
2015/529 ( PDF )
Power Analysis Attacks against IEEE 802.15.4 Nodes
Colin O'Flynn and Zhizhang Chen
2015/528 ( PDF )
SpaceMint: A Cryptocurrency Based on Proofs of Space
Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gaži
2015/527 ( PDF )
Robust Profiling for DPA-Style Attacks
Carolyn Whitnall and Elisabeth Oswald
2015/526 ( PDF )
Generic Key Recovery Attack on Feistel Scheme
Takanori Isobe and Kyoji Shibutani
2015/525 ( PDF )
Short Randomizable Signatures
David Pointcheval and Olivier Sanders
2015/524 ( PDF )
Secure Key Exchange Protocol based on Virtual Proof of Reality
Yansong Gao
2015/523 ( PDF )
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai
2015/522 ( PDF )
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search
Anja Becker, Nicolas Gama, Antoine Joux
2015/521 ( PDF )
Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency
Sergey Gorbunov and Silvio Micali
2015/520 ( PDF )
A Constant Time, Single Round Attribute-Based Authenticated Key Exchange in Random Oracle Model
Suvradip Chakraborty and Y. Sreenivasarao and C. Pandu Rangan and Srinivasan Raghuraman
2015/519 ( PDF )
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
Yongge Wang
2015/518 ( PDF )
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
Ren Zhang and Bart Preneel
2015/517 ( PDF )
Subversion-Resilient Signatures: Definitions, Constructions and Applications
Giuseppe Ateniese and Bernardo Magri and Daniele Venturi
2015/516 ( PDF )
Key-Recovery Attacks on ASASA
Brice Minaud and Patrick Derbez and Pierre-Alain Fouque and Pierre Karpman
2015/515 ( PDF )
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
Thomas Espitau and Pierre-Alain Fouque and Pierre Karpman
2015/514 ( PDF )
Time-Lock Puzzles from Randomized Encodings
Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters
2015/513 ( PDF )
Computing Individual Discrete Logarithms Faster in $GF(p^n)$
Aurore Guillevic
2015/512 ( PDF )
Key Extraction from the Primary Side of a Switched-Mode Power Supply
Sami Saab and Andrew Leiserson and Michael Tunstall
2015/511 ( PDF )
Near Collision Side Channel Attacks
Baris Ege and Thomas Eisenbarth and Lejla Batina
2015/510 ( PDF )
Equivoe-T: Transposition Equivocation Cryptography
Gideon Samid
2015/509 ( PDF )
A flaw in a theorem about Schnorr signatures
Daniel R. L. Brown
2015/508 ( PDF )
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra
2015/507 ( PDF )
Decomposing the ASASA Block Cipher Construction
Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander
2015/506 ( PDF )
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire
2015/505 ( PDF )
The Tower Number Field Sieve
Razvan Barbulescu and Pierrick Gaudry and Thorsten Kleinjung
2015/504 ( PDF )
The Iterated Random Permutation Problem with Applications to Cascade Encryption
Brice Minaud and Yannick Seurin
2015/503 ( PDF )
The Norwegian Internet Voting Protocol: A new Instantiation
Kristian Gjøsteen and Anders Smedstuen Lund
2015/502 ( PDF )
Centrally Banked Cryptocurrencies
George Danezis and Sarah Meiklejohn
2015/501 ( PDF )
Multi-Prover Commitments Against Non-Signaling Attacks
Serge Fehr and Max Fillinger
2015/500 ( PDF )
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure
Alberto Battistello and Christophe Giraud
2015/499 ( PDF )
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
Dennis Hofheinz
2015/498 ( PDF )
Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Jiajun Zhang and Haining Fan
2015/497 ( PDF )
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost
Zhangxiang Hu and Payman Mohassel and Mike Rosulek
2015/496 ( PDF )
Quantifying Location Privacy Leakage from Transaction Prices
Arthur Gervais and Hubert Ritzdorf and Mario Lucic and Srdjan Capkun
2015/495 ( PDF )
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
Sondre Rønjom
2015/494 ( -- withdrawn -- )
Cryptanalysis of the LSH and SHA-V Hash Functions
Yonglin Hao and Hongbo Yu
2015/493 ( PDF )
Fault Tolerant Infective Countermeasure for AES
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay
2015/492 ( PDF )
Masking vs. Multiparty Computation: How Large is the Gap for AES?
Vincent Grosso and François-Xavier Standaert and Sebastian Faust
2015/491 ( PDF )
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
Nishanth Chandran and Melissa Chase and Feng-Hao Liu and Ryo Nishimaki and Keita Xagawa
2015/490 ( PDF )
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Sonam Devgan Kaul and Amit K. Awasthi
2015/489 ( PDF )
Scalable and private media consumption with Popcorn
Trinabh Gupta and Natacha Crooks and Whitney Mulhern and Srinath Setty and Lorenzo Alvisi and Michael Walfish
2015/488 ( PDF )
On Black-Box Complexity of Universally Composable Security in the CRS model
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/487 ( PDF )
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs and Stefano Tessaro
2015/486 ( PDF )
How to detect unauthorised usage of a key
Jiangshan Yu and Mark Ryan and Cas Cremers
2015/485 ( PDF )
Turning Online Ciphers Off
Elena Andreeva and Guy Barwell and Dan Page and Martijn Stam
2015/484 ( PDF )
More Rounds, Less Security?
Ritam Bhaumik and Avijit Dutta and Jian Guo and Jérémy Jean and Nicky Mouha and Ivica Nikolić
2015/483 ( PDF )
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Shi Bai and Adeline Langlois and Tancrède Lepoint and Damien Stehlé and Ron Steinfeld
2015/482 ( PDF )
Extractable Witness Encryption and Timed-Release Encryption from Bitcoin
Jia Liu and Saqib A. Kakvi and Bogdan Warinschi
2015/481 ( PDF )
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers
Theodosis Mourouzis and Guangyan Song and Nicolas Courtois and Michalis Christofii
2015/480 ( PDF )
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
Berry Schoenmakers, Meilof Veeningen, and Niels de Vreede
2015/479 ( PDF )
A Provably Secure Group Signature Scheme from Code-Based Assumptions
Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang
2015/478 ( PDF )
How to Build Time-Lock Encryption
Tibor Jager
2015/477 ( PDF )
Authentication Key Recovery on Galois Counter Mode (GCM)
John Mattsson, Magnus Westerlund
2015/476 ( PDF )
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
Bart Mennink
2015/475 ( PDF )
Randomizing scalar multiplication using exact covering systems of congruences
Eleonora Guerrini and Laurent Imbert and Théo Winterhalter
2015/474 ( PDF )
Fully Homomorphic Encryption without bootstrapping
Masahiro Yagisawa
2015/473 ( PDF )
VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS
Mehak Khurana and Meena Kumari
2015/472 ( PDF )
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer
Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart
2015/471 ( PDF )
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott
2015/470 ( PDF )
On the power of Public-key Functional Encryption with Function Privacy
Vincenzo Iovino and Qiang Tang and Karol Żebrowski
2015/469 ( PDF )
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
Andrew Miller and Rob Jansen
2015/468 ( PDF )
Practical Fully Homomorphic Encryption without Noise Reduction
Dongxi Liu
2015/467 ( PDF )
The Oblivious Machine - or: How to Put the C into MPC
Marcel Keller
2015/466 ( PDF )
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang
2015/465 ( PDF )
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
Hwajeong Seo and Zhe Liu and Johann Groschadl and Howon Kim
2015/464 ( PDF )
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Florian Tschorsch and Björn Scheuermann
2015/463 ( -- withdrawn -- )
Multilinear Maps Using Random Matrix
Gu Chunsheng
2015/462 ( PDF )
Accelerating SWHE based PIRs using GPUs
Wei Dai, Yarkın Doröz and Berk Sunar
2015/461 ( PDF )
Approximate Algorithms on Lattices with Small Determinant
Jung Hee Cheon and Changmin Lee
2015/460 ( PDF )
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi
2015/459 ( PDF )
New Observation on Division Property
Bing Sun and Xin Hai and Wenyu Zhang and Lei Cheng and Zhichao Yang
2015/458 ( PDF )
A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS
Sheena Sathyan and Shaji R S Professor
2015/457 ( PDF )
Generic Conversions from CPA to CCA secure Functional Encryption
Mridul Nandi and Tapas Pandit
2015/456 ( PDF )
Collateral damage of Facebook Apps: an enhanced privacy scoring model
Iraklis Symeonids, Pagona Tsormpatzoudi and Bart Preneel
2015/455 ( PDF )
Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu and N.Asokan and Benny Pinkas
2015/454 ( PDF )
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO
Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
2015/453 ( PDF )
An Optimization of Gu Map-1
Yupu Hu and Huiwen Jia
2015/452 ( PDF )
Masks will Fall Off -- Higher-Order Optimal Distinguishers
Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul
2015/451 ( PDF )
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
Sihong Su and Xiaohu Tang
2015/450 ( PDF )
Adaptively Secure Computation with Partial Erasures
Carmit Hazay and Yehuda Lindell and Arpita Patra
2015/449 ( PDF )
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions
Ruoxin Zhao and Rui Zhang and Yongqiang Li and Baofeng Wu
2015/448 ( PDF )
A Comment on Gu Map-1
Yupu Hu and Huiwen Jia
2015/447 ( PDF )
A New Model for Error-Tolerant Side-Channel Cube Attacks
Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede
2015/446 ( PDF )
On the Amortized Complexity of Zero-knowledge Protocols
Ronald Cramer and Ivan Damgård and Marcel Keller
2015/445 ( PDF )
XLS is not a Strong Pseudorandom Permutation
Mridul Nandi
2015/444 ( PDF )
Revisiting Security Claims of XLS and COPA
Mridul Nandi
2015/443 ( PDF )
Security Evaluation and Enhancement of Bistable Ring PUFs
Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, and Wayne Burleson
2015/442 ( PDF )
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
2015/441 ( PDF )
FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
Devu Manikantan Shila and Vivek Venugopalan and Cameron D Patterson
2015/440 ( PDF )
Message-Locked Encryption for Lock-Dependent Messages
Martín Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev
2015/439 ( PDF )
On Concurrently Secure Computation in the Multiple Ideal Query Model
Vipul Goyal and Abhishek Jain
2015/438 ( PDF )
A Hybrid Approach for Proving Noninterference of Java Programs
Ralf Kuesters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr
2015/437 ( PDF )
A Note on the Unsoundness of vnTinyRAM's SNARK
Bryan Parno
2015/436 ( PDF )
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks
Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
2015/435 ( PDF )
On the (Fast) Algebraic Immunity of Boolean Power Functions
Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
2015/434 ( PDF )
Dickson Polynomials that are Involutions
Pascale Charpin and Sihem Mesnager and Sumanta Sarkar
2015/433 ( PDF )
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
Wentao Zhang and. Zhenzhen Bao and. Vincent Rijmen and. Meicheng Liu
2015/432 ( -- withdrawn -- )
Non-Repudiable Proofs of Storage in Cloud
Hongyuan Wang and Liehuang Zhu and Yijia Lilong and Chang Xu
2015/431 ( PDF )
Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung and Goichiro Hanaoka and Shota Yamada
2015/430 ( PDF )
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
Alex Biryukov and Daniel Dinu and Dmitry Khovratovich
2015/429 ( PDF )
Cryptanalysis of Round-Reduced LED
Ivica Nikolić and Lei Wang and Shuang Wu
2015/428 ( PDF )
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
Philipp Jovanovic and Samuel Neves
2015/427 ( PDF )
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Mudit Bhargava and Ken Mai
2015/426 ( PDF )
Complementing Feistel Ciphers
Alex Biryukov and Ivica Nikolic
2015/425 ( PDF )
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
Stefan Heyse and Ingo von Maurich and Tim Güneysu
2015/424 ( PDF )
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Begül Bilgin and Andrey Bogdanov and Miroslav Knežević and Florian Mendel and Qingju Wang
2015/423 ( PDF )
On the Implementation of Unified Arithmetic on Binary Huff Curves
Santosh Ghosh, Amit Kumar, Amitabh Das and Ingrid Verbauwhede
2015/422 ( PDF )
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
Marina Blanton and Fattaneh Bayatbabolghani
2015/421 ( PDF )
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism
Zhe Liu and Husen Wang and Johann Großschädl and Zhi Hu and Ingrid Verbauwhede
2015/420 ( PDF )
What Information is Leaked under Concurrent Composition?
Vipul Goyal and Divya Gupta and Abhishek Jain
2015/419 ( PDF )
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava
2015/418 ( PDF )
Optimized Interpolation Attacks on LowMC
Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang
2015/417 ( PDF )
Order-Revealing Encryption and the Hardness of Private Learning
Mark Bun and Mark Zhandry
2015/416 ( PDF )
HETest: A Homomorphic Encryption Testing Framework
Mayank Varia and Sophia Yakoubov and Yang Yang
2015/415 ( PDF )
STRIBOB / WHIRLBOB Security Analysis Addendum
Markku-Juhani O. Saarinen
2015/414 ( PDF )
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
Mridul Nandi
2015/413 ( PDF )
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
Shashank Agrawal and Melissa Chase
2015/412 ( PDF )
Survey on Cryptographic Obfuscation
Máté Horváth
2015/411 ( PDF )
Side-Channel Analysis of MAC-Keccak Hardware Implementations
Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser
2015/410 ( PDF )
Efficient Ring-LWE Encryption on 8-bit AVR Processors
Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Großschädl and Howon Kim and Ingrid Verbauwhede
2015/409 ( PDF )
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
Jie Chen and Romain Gay and Hoeteck Wee
2015/408 ( PDF )
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
Franck Rondepierre
2015/407 ( PDF )
Higher-order cryptanalysis of LowMC
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/406 ( PDF )
Cryptography for Parallel RAM from Indistinguishability Obfuscation
Yu-Chi Chen and Sherman S. M. Chow and Kai-Min Chung and Russell W. F. Lai and Wei-Kai Lin and Hong-Sheng Zhou
2015/405 ( PDF )
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schröder
2015/404 ( PDF )
Zero-Knowledge Accumulators and Set Operations
Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos
2015/403 ( PDF )
Sequential Secret Sharing as a New Hierarchical Access Structure
Mehrdad Nojoumian and Douglas R. Stinson
2015/402 ( PDF )
Success through confidence: Evaluating the effectiveness of a side-channel attack
Adrian Thillard and Emmanuel Prouff and Thomas Roche
2015/401 ( PDF )
Simple Chosen-Ciphertext Security from Low-Noise LPN
Eike Kiltz and Daniel Masny and Krzysztof Pietrzak
2015/400 ( PDF )
Expiration and Revocation of Keys for Attribute-based Signatures (Full Version)
Stephen R. Tate and Roopa Vishwanathan
2015/399 ( PDF )
New attacks on RSA with Moduli $N=p^rq$
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/398 ( PDF )
Factoring RSA moduli with weak prime factors
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/397 ( PDF )
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
Peter Gazi and Jooyoung Lee and Yannick Seurin and John Steinberger and Stefano Tessaro
2015/396 ( PDF )
Generalizing Homomorphic MACs for Arithmetic Circuits
Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo
2015/395 ( PDF )
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schröder and Mark Simkin
2015/394 ( PDF )
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
2015/393 ( PDF )
Biclique cryptanalysis of MIBS-80 and PRESENT-80
Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba
2015/392 ( PDF )
Forgery Attacks on round-reduced ICEPOLE-128
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/391 ( PDF )
On the Communication Complexity of Secure Computation
Deepesh Data and Manoj M. Prabhakaran and Vinod M. Prabhakaran
2015/390 ( PDF )
Dual System Encryption Framework in Prime-Order Groups
Nuttapong Attrapadung
2015/389 ( PDF )
Keccak
Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
2015/388 ( PDF )
Succinct Garbled RAM
Ran Canetti and Justin Holmgren
2015/387 ( PDF )
Method to Protect Passwords in Databases for Web Applications
Scott Contini
2015/386 ( PDF )
Privately Evaluating Decision Trees and Random Forests
David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter
2015/385 ( PDF )
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas
2015/384 ( PDF )
Condensed Unpredictability
Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak
2015/383 ( PDF )
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
Rafael Pass and abhi shelat
2015/382 ( PDF )
High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers
Thomas Pöppelmann and Tobias Oder and Tim Güneysu
2015/381 ( PDF )
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
Sumit Chakraborty
2015/380 ( PDF )
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
Céline Blondeau and Aslí Bay and Serge Vaudenay
2015/379 ( PDF )
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
2015/378 ( PDF )
PAC Learning of Arbiter PUFs
Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
2015/377 ( PDF )
Cluster Computing in Zero Knowledge
Alessandro Chiesa and Eran Tromer and Madars Virza
2015/376 ( PDF )
Cryptography from Post-Quantum Assumptions
Raza Ali Kazmi
2015/375 ( PDF )
Bounds on surmising remixed keys
Daniel R. L. Brown
2015/374 ( PDF )
On the Impossibility of Tight Cryptographic Reductions
Christoph Bader and Tibor Jager and Yong Li and Sven Schäge
2015/373 ( PDF )
Publicly Verifiable Software Watermarking
Aloni Cohen and Justin Holmgren and Vinod Vaikuntanathan
2015/372 ( PDF )
Security Analysis of PRINCE
Jeremy Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu
2015/371 ( PDF )
Constant-Round MPC with Fairness and Guarantee of Output Delivery
S. Dov Gordon and Feng-Hao Liu and Elaine Shi
2015/370 ( PDF )
Financial Cryptography: Discriminatory Pricing Mechanism
Sumit Chakraborty
2015/369 ( PDF )
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
Nir Bitansky and Omer Paneth
2015/368 ( PDF )
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
Evgeny Sidorov
2015/367 ( PDF )
Improved Higher-Order Differential Attacks on MISTY1
Achiya Bar-On
2015/366 ( PDF )
A random zoo: sloth, unicorn, and trx
Arjen K. Lenstra and Benjamin Wesolowski
2015/365 ( PDF )
On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
2015/364 ( PDF )
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
Qiang Tang and Jun Wang
2015/363 ( PDF )
Optimally Secure Tweakable Blockciphers
Bart Mennink
2015/362 ( PDF )
Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem
Claude Crepeau and Raza Ali Kazmi
2015/361 ( PDF )
Computationally binding quantum commitments
Dominique Unruh
2015/360 ( PDF )
Achieving Differential Privacy with Bias-Control Limited Source
Yanqing Yao, Zhoujun Li
2015/359 ( PDF )
Higher-Order Side Channel Security and Mask Refreshing
Jean-Sebastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
2015/358 ( PDF )
On Generalized First Fall Degree Assumptions
Yun-Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi
2015/357 ( PDF )
A Group-theory Method to The Cycle Structures of Feedback Shift Registers
Ming Li, Yupeng Jiang and Dongdai Lin
2015/356 ( PDF )
Succinct Randomized Encodings and their Applications
Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang
2015/355 ( PDF )
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni and Andreas Hülsing and Christian Schaffner
2015/354 ( PDF )
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node
Jacek Samotyja and Kerstin Lemke-Rust and Markus Ullmann
2015/353 ( PDF )
Matrix Computational Assumptions in Multilinear Groups
Paz Morillo and Carla Ràfols and Jorge L. Villar
2015/352 ( PDF )
Broadcast from Minicast Secure Against General Adversaries
Pavel Raykov
2015/351 ( PDF )
Database Outsourcing with Hierarchical Authenticated Data Structures
Mohammad Etemad and Alptekin Küpçü
2015/350 ( PDF )
Improving Local Collisions: New Attacks on Reduced SHA-256
Florian Mendel and Tomislav Nad and Martin Schläffer
2015/349 ( PDF )
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
Chang Liu and Liehuang Zhu and Jinjun Chen
2015/348 ( PDF )
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation
An­dre­as Gor­nik and Amir Mo­ra­di and Jür­gen Oehm and Chris­tof Paar
2015/347 ( PDF )
Fault Analysis of Kuznyechik
Riham AlTawy and Onur Duman and Amr M. Youssef
2015/346 ( PDF )
End-to-End Verifiable Elections in the Standard Model∗
Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2015/345 ( PDF )
Two Round Multiparty Computation via Multi-Key FHE
Pratyay Mukherjee and Daniel Wichs
2015/344 ( PDF )
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
Ryo Nishimaki and Daniel Wichs
2015/343 ( PDF )
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
Michael Düll and Björn Haase and Gesine Hinterwälder and Michael Hutter and Christof Paar and Ana Helena Sánchez and Peter Schwabe
2015/342 ( PDF )
Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext
Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo
2015/341 ( PDF )
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
Gilad Asharov and Gil Segev
2015/340 ( PDF )
A New Distinguisher on Grain v1 for 106 rounds
Santanu Sarkar
2015/339 ( PDF )
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
Sebastiaan de Hoogh and Berry Schoenmakers and Meilof Veeningen
2015/338 ( PDF )
Cryptanalysis of a fair anonymity for the tor network
Amadou Moctar Kane
2015/337 ( PDF )
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
Sujoy Sinha Roy and Kimmo Järvinen and Frederik Vercauteren and Vassil Dimitrov and Ingrid Verbauwhede
2015/336 ( PDF )
Arithmetic Cryptography
Benny Applebaum and Jonathan Avron and Christina Brzuska
2015/335 ( PDF )
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2015/334 ( PDF )
On the Correlation Intractability of Obfuscated Pseudorandom Functions
Ran Canetti and Yilei Chen and Leonid Reyzin
2015/333 ( PDF )
Nearly Optimal Verifiable Data Streaming (Full Version)
Johannes Krupp and Dominique Schröder and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan Nuernberger
2015/332 ( PDF )
Security Intelligence for Broadcast : Threat Analytics
Sumit Chakraborty
2015/331 ( PDF )
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
Megha Agrawal and Donghoon Chang and Somitra Sanadhya
2015/330 ( PDF )
Sponge based CCA2 secure asymmetric encryption for arbitrary length message
Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
2015/329 ( PDF )
PAGES - A Family of Block Ciiphers
Dieter Schmidt
2015/328 ( PDF )
Strongly Secure Authenticated Key Exchange from Ideal Lattices
Xiaopeng Yang and Wenping Ma
2015/327 ( PDF )
Some results on Sprout
Subhadeep Banik
2015/326 ( PDF )
Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata
Saeideh Kabirirad and Hamideh Hajiabadi
2015/325 ( PDF )
Secure Multi-Party Computation with Identifiable Abort
Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas
2015/324 ( PDF )
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys
Divesh Aggarwal and Alexander Golovnev
2015/323 ( -- withdrawn -- )
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange
Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan
2015/322 ( PDF )
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers
Peeter Laud and Alisa Pankova
2015/321 ( -- withdrawn -- )
Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles
Paolo D'Arco and Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Clauido Soriente
2015/320 ( PDF )
Hybrid Publicly Verifiable Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2015/319 ( PDF )
Point Decomposition Problem in Binary Elliptic Curves
Koray Karabina
2015/318 ( PDF )
Practical Divisible E-Cash
Patrick Märtens
2015/317 ( PDF )
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti
2015/316 ( PDF )
Non-malleability under Selective Opening Attacks: Implication and Separation
Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen
2015/315 ( PDF )
Query-Complexity Amplification for Random Oracles
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2015/314 ( PDF )
Certificate-Based Encryption Resilient to Key Leakage
Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and Xinyi Huang and Yang Xiang
2015/313 ( PDF )
Recovering Short Generators of Principal Ideals in Cyclotomic Rings
Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev
2015/312 ( PDF )
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
Pierre-Alain Fouque and Thomas Vannet
2015/311 ( PDF )
Tagged One-Time Signatures: Tight Security and Optimal Tag Size
Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo
2015/310 ( PDF )
New algorithm for the discrete logarithm problem on elliptic curves
Igor Semaev
2015/309 ( PDF )
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
2015/308 ( PDF )
Authenticated Key Exchange over Bitcoin
Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao
2015/307 ( PDF )
Black-Box Garbled RAM
Sanjam Garg and Steve Lu and Rafail Ostrovsky
2015/306 ( PDF )
Analysis of VAES3 (FF2)
Morris Dworkin and Ray Perlner
2015/305 ( PDF )
Foundations of Reconfigurable PUFs (Full Version)
Jonas Schneider and Dominique Schröder
2015/304 ( PDF )
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky
2015/303 ( PDF )
The Design Space of Lightweight Cryptography
Nicky Mouha
2015/302 ( PDF )
Boosting OMD for Almost Free Authentication of Associated Data
Reza Reyhanitabar and Serge Vaudenay and Damian Vizár
2015/301 ( PDF )
Cryptanalysis of GGH Map
Yupu Hu and Huiwen Jia
2015/300 ( PDF )
Scalable Divisible E-cash
Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
2015/299 ( PDF )
A Note on the Lindell-Waisbard Private Web Search Scheme
Zhengjun Cao and Lihua Liu
2015/298 ( PDF )
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE
Yongge Wang
2015/297 ( PDF )
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao
2015/296 ( PDF )
The Uniform Distribution of Sequences Generated by Iteration of Polynomials
Emil Lerner
2015/295 ( PDF )
Security Analysis of Re-Encryption RPC Mix Nets
Ralf Kuesters and Tomasz Truderung
2015/294 ( PDF )
Accelerating Somewhat Homomorphic Evaluation using FPGAs
Erdinç Öztürk and Yarkın Doröz and Berk Sunar and Erkay Savaş
2015/293 ( PDF )
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/292 ( PDF )
Secret Shared Random Access Machine
Shlomi Dolev and Yin Li
2015/291 ( PDF )
Two Operands of Multipliers in Side-Channel Attack
Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki
2015/290 ( PDF )
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Joseph A. Akinyele and Christina Garman and Susan Hohenberger
2015/289 ( PDF )
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
Muhammed F. Esgin and Orhun Kara
2015/288 ( PDF )
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
Aydin Aysu and Patrick Schaumont
2015/287 ( PDF )
A quantum-safe circuit-extension handshake for Tor
John Schanck and William Whyte and Zhenfei Zhang
2015/286 ( PDF )
Impossible Differential Cryptanalysis of Reduced Round SIMON
Zhan Chen and Ning Wang and Xiaoyun Wang
2015/285 ( PDF )
Improved Linear Trails for the Block Cipher Simon
Tomer Ashur
2015/284 ( PDF )
A Note on Scalar Multiplication Using Division Polynomials
Binglong~Chen, Chuangqiang~Hu and~Chang-An~Zhao
2015/283 ( PDF )
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data
Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia
2015/282 ( PDF )
Non-Interactive Secure Computation Based on Cut-and-Choose
Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva
2015/281 ( PDF )
Secret Sharing and Statistical Zero Knowledge
Vinod Vaikuntanathan and Prashant Nalini Vasudevan
2015/280 ( PDF )
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
Jonathan Katz and Aishwarya Thiruvengadam and Hong-Sheng Zhou
2015/279 ( PDF )
Improved Cryptanalysis of AES-like Permutations
Jérémy Jean and Maria Naya-Plasencia and Thomas Peyrin
2015/278 ( PDF )
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
Sébastien Canard and David Pointcheval and Olivier Sanders
2015/277 ( PDF )
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games
Marco Tomamichel and Serge Fehr and Jędrzej Kaniewski and Stephanie Wehner
2015/276 ( PDF )
An Improvment of the Elliptic Net Algorithm
Binglong Chen and Chang-An Zhao
2015/275 ( PDF )
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems
Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai
2015/274 ( PDF )
Low Depth Circuits for Efficient Homomorphic Sorting
Gizem S. Çetin and Yarkın Doröz and Berk Sunar and Erkay Savaş
2015/273 ( PDF )
Dual System Encryption via Predicate Encodings
Hoeteck Wee
2015/272 ( PDF )
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
Baodong Qin and Shengli Liu
2015/271 ( PDF )
Toward Secure Implementation of McEliece Decryption
Mariya Georgieva and Frédéric de Portzamparc
2015/270 ( PDF )
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk
Markus Dichtl
2015/269 ( PDF )
Ideal Multilinear Maps Based on Ideal Lattices
Gu Chunsheng
2015/268 ( PDF )
Improved Top-Down Techniques in Differential Cryptanalysis
Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir
2015/267 ( PDF )
The Simplest Protocol for Oblivious Transfer
Tung Chou and Claudio Orlandi
2015/266 ( PDF )
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
2015/265 ( PDF )
Password Hashing Competition - Survey and Benchmark
George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas
2015/264 ( PDF )
BlindBox: Deep Packet Inspection over Encrypted Traffic
Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy
2015/263 ( PDF )
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
Ethan Heilman. Alison Kendler, Aviv Zohar, Sharon Goldberg
2015/262 ( PDF )
A look at the PGP ecosystem through the key server data
Hanno Böck
2015/261 ( PDF )
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
2015/260 ( PDF )
Computational Aspects of Correlation Power Analysis
Paul Bottinelli and Joppe W. Bos
2015/259 ( PDF )
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES
Patrick Derbez and Pierre-Alain Fouque
2015/258 ( PDF )
Lightweight MDS Involution Matrices
Siang Meng Sim and Khoongming Khoo and Frédérique Oggier and Thomas Peyrin
2015/257 ( PDF )
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
Vadim Lyubashevsky and Thomas Prest
2015/256 ( PDF )
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
Yang Lu, Quanling Zhang, Jiguo Li
2015/255 ( PDF )
A comprehensive analysis of game-based ballot privacy definitions
David Bernhard and Veronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi
2015/254 ( PDF )
Tornado Attack on RC4 with Applications to WEP and WPA
Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux
2015/253 ( PDF )
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang , Dongdai Lin
2015/252 ( PDF )
Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang, Jianghua Zhong, Dongdai Lin
2015/251 ( PDF )
How to Construct UC-Secure Searchable Symmetric Encryption Scheme
Kaoru Kurosawa and Yasuhiro Ohtaki
2015/250 ( PDF )
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys
Junji Shikata
2015/249 ( PDF )
Improved (Hierarchical) Inner-Product Encryption from Lattices
Keita Xagawa
2015/248 ( PDF )
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
Ryo Nishimaki and Keita Xagawa
2015/247 ( PDF )
Subgroup security in pairing-based cryptography
Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and Geovandro C. C. F. Pereira and Gustavo Zanon
2015/246 ( PDF )
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee
2015/245 ( PDF )
Practical Attacks on the Round-reduced PRINCE
Pawel Morawiecki
2015/244 ( PDF )
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
Jeremy Jean and Ivica Nikolic
2015/243 ( PDF )
Reliable Message Transmission under Partial Knowledge and General Adversaries
Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
2015/242 ( PDF )
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
2015/241 ( PDF )
Espresso: A Stream Cipher for 5G Wireless Communication Systems
Elena Dubrova and Martin Hell
2015/240 ( PDF )
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
Alex Biryukov, Patrick Derbez and Léo Perrin
2015/239 ( PDF )
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
Patrick Derbez and Léo Perrin
2015/238 ( PDF )
One Time Programs with Limited Memory
Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michał Zając
2015/237 ( PDF )
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers
2015/236 ( PDF )
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
Subhamoy Maitra and Santanu Sarkar and Anubhab Baksi and Pramit Dey
2015/235 ( PDF )
Performance and Security Improvements for Tor: A Survey
Mashael AlSabah and Ian Goldberg
2015/234 ( PDF )
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
2015/233 ( PDF )
Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
Ben Smyth and Steven Frink and Michael R. Clarkson
2015/232 ( PDF )
Cryptanalysis of Full Sprout
Virginie Lallemand and María Naya-Plasencia
2015/231 ( PDF )
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
Yonglin Hao
2015/230 ( PDF )
W-SPS: Designing a Wide-Area Secure Positioning System
Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun
2015/229 ( PDF )
Improving GGH Public Key Scheme Using Low Density Lattice Codes
Reza Hooshmand
2015/228 ( PDF )
Leakage-Resilient Cryptography with Key Derived from Sensitive Data
Konrad Durnoga and Tomasz Kazana and Michał Zając and Maciej Zdanowicz
2015/227 ( PDF )
Tradeoff Cryptanalysis of Memory-Hard Functions
Alex Biryukov and Dmitry Khovratovich
2015/226 ( PDF )
Secure Physical Computation using Disposable Circuits
Ben Fisch and Daniel Freund and Moni Naor
2015/225 ( PDF )
Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/224 ( PDF )
GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records
Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder
2015/223 ( PDF )
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers
Anubhab Baksi and Subhamoy Maitra and Santanu Sarkar
2015/222 ( PDF )
Towards Understanding the Known-Key Security of Block Ciphers
Elena Andreeva, Andrey Bogdanov, and Bart Mennink
2015/221 ( PDF )
Tighter, faster, simpler side-channel security evaluations beyond computing power
Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal
2015/220 ( PDF )
Key Homomorphic PRFs and Their Applications
Dan Boneh and Kevin Lewi and Hart Montgomery and Ananth Raghunathan
2015/219 ( PDF )
Efficient Format Preserving Encrypted Databases
Prakruti C, Sashank Dara and V.N. Muralidhara
2015/218 ( PDF )
Efficient k-out-of-n oblivious transfer protocol
wang qinglong
2015/217 ( PDF )
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles
Subhamoy Maitra and Goutam Paul and Willi Meier
2015/216 ( PDF )
Quasi-Adaptive NIZK for Linear Subspaces Revisited
Eike Kiltz and Hoeteck Wee
2015/215 ( PDF )
A revocable anonymity in Tor
Amadou Moctar Kane
2015/214 ( PDF )
GCM Security Bounds Reconsidered
Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata
2015/213 ( PDF )
Attribute-Based Versions of Schnorr and ElGamal
Javier Herranz
2015/212 ( PDF )
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger
2015/211 ( PDF )
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
Thijs Laarhoven and Benne de Weger
2015/210 ( PDF )
Secure and Efficient Initialization and Authentication Protocols for SHIELD
Chenglu Jin and Marten van Dijk
2015/209 ( PDF )
Triathlon of Lightweight Block Ciphers for the Internet of Things
Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Léo Perrin and Johann Großschädl and Alex Biryukov
2015/208 ( PDF )
Towards Secure Distance Bounding
Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay
2015/207 ( PDF )
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
Tobias Schneider and Amir Moradi
2015/206 ( PDF )
Efficient and Secure Delegation of Group Exponentiation to a Single Server
Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain
2015/205 ( PDF )
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
Jooyoung Lee
2015/204 ( PDF )
Leakage-Resilient Symmetric Encryption via Re-keying
Michel Abdalla and Sonia Belaïd and Pierre-Alain Fouque
2015/203 ( PDF )
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim Güneysu
2015/202 ( PDF )
Adaptively Secure Coin-Flipping, Revisited
Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park
2015/201 ( PDF )
Statistical Properties of Multiplication mod $2^n$
A. Mahmoodi Rishakani and S. M. Dehnavi and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
2015/200 ( PDF )
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Alexander Wild and Amir Moradi and Tim Güneysu
2015/199 ( PDF )
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Amir Moradi and Gesine Hinterwälder
2015/198 ( PDF )
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim Güneysu
2015/197 ( PDF )
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
N. Nalla Anandakumar
2015/196 ( PDF )
Tighter Reductions for Forward-Secure Signature Schemes
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2015/195 ( PDF )
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists
Stephanie Bayer and Jens Groth
2015/194 ( PDF )
Practical Homomorphic MACs for Arithmetic Circuits
Dario Catalano and Dario Fiore
2015/193 ( PDF )
Improving Modular Inversion in RNS using the Plus-Minus Method
Karim Bigou and Arnaud Tisserand
2015/192 ( PDF )
Memory-saving computation of the pairing fi nal exponentiation on BN curves
Sylvain DUQUESNE and Loubna GHAMMAM
2015/191 ( PDF )
iDASH Secure Genome Analysis Competition Using ObliVM
Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang and Elaine Shi
2015/190 ( PDF )
Multi-Client Non-Interactive Verifiable Computation
Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid
2015/189 ( PDF )
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Vizár
2015/188 ( PDF )
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2015/187 ( PDF )
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
Juan Garay and Jonathan Katz and Bjoern Tackmann and Vassilis Zikas
2015/186 ( PDF )
Higher Order Differential Analysis of NORX
Sourav Das and Subhamoy Maitra and and Willi Meier
2015/185 ( PDF )
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications
Elena Dubrova and Mats Näslund and Gunnar Carlsson and John Fornehed and Ben Smeets
2015/184 ( PDF )
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
Céline Blondeau and Kaisa Nyberg
2015/183 ( PDF )
New Links Between Differential and Linear Cryptanalysis
Céline Blondeau and Kaisa Nyberg
2015/182 ( PDF )
Tweakable Blockciphers with Asymptotically Optimal Security
Rodolphe Lampe and Yannick Seurin
2015/181 ( PDF )
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda Alkhzaimi and Chao Li
2015/180 ( PDF )
Key-Homomorphic Constrained Pseudorandom Functions
Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens
2015/179 ( PDF )
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
Palash Sarkar and Shashank Singh
2015/178 ( PDF )
How to Incentivize Data-Driven Collaboration Among Competing Parties
Pablo Daniel Azar and Shafi Goldwasser and Sunoo Park
2015/177 ( PDF )
On the Security of an Efficient Group Key Agreement Scheme for MANETs
Purushothama B R and Nishat Koti
2015/176 ( PDF )
Key Recovery for LWE in Polynomial Time
Kim Laine and Kristin Lauter
2015/175 ( PDF )
Trivial Nonce-Misusing Attack on Pure OMD
Tomer Ashur and Bart Mennink
2015/174 ( PDF )
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia
Chenyang Tu and Neng Gao and Zeyi Liu and Lei Wang and Zongbin Liu and Bingke Ma
2015/173 ( PDF )
Indistinguishability Obfuscation from Compact Functional Encryption
Prabhanjan Ananth and Abhishek Jain
2015/172 ( PDF )
Silent Simon: A Threshold Implementation under 100 Slices
Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth
2015/171 ( PDF )
Authenticated Network Time Synchronization
Benjamin Dowling and Douglas Stebila and Greg Zaverucha
2015/170 ( PDF )
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer
2015/169 ( PDF )
Short Schnorr signatures require a hash function with more than just random-prefix resistance
Daniel R. L. Brown
2015/168 ( PDF )
More PS and H-like bent functions
C. Carlet
2015/167 ( PDF )
Post-Zeroizing Obfuscation: The case of Evasive Circuits
Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry
2015/166 ( PDF )
Naturally Rehearsing Passwords
Jeremiah Blocki and Manuel Blum and Anupam Datta
2015/165 ( PDF )
The Cryptographic Hardness of Random Local Functions -- Survey
Benny Applebaum
2015/164 ( PDF )
Constant Size Ring Signature Without Random Oracle
Priyanka Bose and Dipanjan Das and C. Pandu Rangan
2015/163 ( PDF )
Indistinguishability Obfuscation from Functional Encryption
Nir Bitansky and Vinod Vaikuntanathan
2015/162 ( PDF )
New Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2015/161 ( PDF )
Exploring the Resilience of Some Lightweight Ciphers Against Pro filed Single Trace Attacks
Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
2015/160 ( PDF )
Differential-Linear Cryptanalysis of ICEPOLE
Tao Huang; Ivan Tjuawinata; Hongjun Wu
2015/159 ( PDF )
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
Shengbao Wu; Hongjun Wu; Tao Huang; Mingsheng Wang; Wenling Wu
2015/158 ( PDF )
Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Zvika Brakerski and Ilan Komargodski and Gil Segev
2015/157 ( PDF )
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Nuttapong Attrapadung and Shota Yamada
2015/156 ( PDF )
Building Lossy Trapdoor Functions from Lossy Encryption
Brett Hemenway and Rafail Ostrovsky
2015/155 ( PDF )
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor
2015/154 ( PDF )
Circuits Resilient to Additive Attacks with Applications to Secure Computation
Daniel Genkin and Yuval Ishai and Manoj M. Prabhakaran and Amit Sahai and Eran Tromer
2015/153 ( PDF )
Functional Encryption from (Small) Hardware Tokens
Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou
2015/152 ( PDF )
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults
Ronan Lashermes and Jacques Fournier and Louis Goubin
2015/151 ( PDF )
Bad directions in cryptographic hash functions
Daniel J. Bernstein and Andreas Hülsing and Tanja Lange and Ruben Niederhagen
2015/150 ( PDF )
Insynd: Privacy-Preserving Transparency Logging Using Balloons
Tobias Pulls and Roel Peeters
2015/149 ( PDF )
Cryptanalysis of HMAC/NMAC-Whirlpool
Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu
2015/148 ( PDF )
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann
2015/147 ( PDF )
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
Lionel Rivière and Zakaria Najm and Pablo Rauzy and Jean-Luc Danger and Julien Bringer and Laurent Sauvage
2015/146 ( PDF )
New Attacks on Feistel Structures with Improved Memory Complexities
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2015/145 ( PDF )
Observations on the SIMON block cipher family
Stefan Kölbl and Gregor Leander and Tyge Tiessen
2015/144 ( PDF )
Security of the AES with a Secret S-box
Tyge Tiessen and Lars R. Knudsen and Stefan Kölbl and Martin M. Lauridsen
2015/143 ( PDF )
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs
Erich Wenger and Paul Wolfger
2015/142 ( PDF )
Multi-Client Verifiable Computation with Stronger Security Guarantees
S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2015/141 ( PDF )
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method
Céline Blondeau and Marine Minier
2015/140 ( PDF )
The Random Oracle Model: A Twenty-Year Retrospective
Neal Koblitz and Alfred Menezes
2015/139 ( PDF )
Performance Analysis of Some Password Hashing Schemes
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2015/138 ( PDF )
A Practical Key Exchange for the Internet using Lattice Cryptography
Vikram Singh
2015/137 ( PDF )
Multi-keyword Similarity Search Over Encrypted Cloud Data
Mikhail Strizhov and Indrajit Ray
2015/136 ( PDF )
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs
Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. L. M. Barreto
2015/135 ( PDF )
Generalizing Efficient Multiparty Computation
Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp
2015/134 ( PDF )
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions
Pierre Karpman
2015/133 ( PDF )
Private Computation on Encrypted Genomic Data
Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig
2015/132 ( PDF )
Homomorphic Computation of Edit Distance
Jung Hee Cheon and Miran Kim and Kristin Lauter2
2015/131 ( PDF )
On Lightweight Stream Ciphers with Shorter Internal States
Frederik Armknecht, Vasily Mikhalev
2015/130 ( PDF )
How to Bootstrap Anonymous Communication
Sune K. Jakobsen and Claudio Orlandi
2015/129 ( PDF )
Block-wise Non-Malleable Codes
Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay
2015/128 ( PDF )
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro
2015/127 ( PDF )
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
Ricardo Dahab and Steven Galbraith and Eduardo Morais
2015/126 ( PDF )
Perfect Structure on the Edge of Chaos
Nir Bitansky and Omer Paneth and Daniel Wichs
2015/125 ( PDF )
Multilinear Pseudorandom Functions
Aloni Cohen and Justin Holmgren
2015/124 ( PDF )
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs
Alexander Wild and Amir Moradi and Tim Güneysu
2015/123 ( PDF )
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
Dennis Hofheinz and Jessica Koch and Christoph Striecks
2015/122 ( PDF )
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2015/121 ( PDF )
Multi-Client Oblivious RAM secure against Malicious Servers
Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
2015/120 ( PDF )
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications
Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean-Luc Danger and Debdeep Mukhopadhyay and Xuan Thuy Ngo and Zakaria Najm
2015/119 ( PDF )
Making Masking Security Proofs Concrete or How to Evaluate the Security of any Leaking Device (Extended Version)
Alexandre Duc and Sebastian Faust and François-Xavier Standaert
2015/118 ( PDF )
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
Takahiro Matsuda and Goichiro Hanaoka
2015/117 ( PDF )
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy
Maciej Skorski
2015/116 ( PDF )
Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs
Riadh Brinci and Walid Khmiri and Mefteh Mbarek and Abdellatif Ben Rabâa and Ammar Bouallègue
2015/115 ( PDF )
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors
Muhammad Yasir Malik
2015/114 ( PDF )
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
2015/113 ( PDF )
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancrède Lepoint and María Naya-Plasencia and Pascal Paillier and Renaud Sirdey
2015/112 ( PDF )
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura
2015/111 ( PDF )
The Multivariate Hidden Number Problem
Steven D. Galbraith and Barak Shani
2015/110 ( PDF )
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices
Shijun Zhao and Qianying Zhang
2015/108 ( PDF )
TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM
Lucjan Hanzlik and Przemysław Kubiak and Mirosław Kutyłowski
2015/107 ( PDF )
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
Attila A. Yavuz and Jorge Guajardo
2015/106 ( PDF )
Provably weak instances of Ring-LWE
Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
2015/105 ( PDF )
Inner Product Masking Revisited
Josep Balasch and Sebastian Faust and Benedikt Gierlichs
2015/104 ( PDF )
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Rafael Dowsley and Jörn Müller-Quade and Tobias Nilges
2015/103 ( PDF )
Mergeable Functional Encryption
Vincenzo Iovino and Karol Zebrowski
2015/102 ( PDF )
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
Shay Gueron and Yehuda Lindell
2015/101 ( PDF )
Multi-Key Security: The Even-Mansour Construction Revisited
Nicky Mouha and Atul Luykx
2015/100 ( PDF )
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA
Christian Wittke and Zoya Dyka and Peter Langendoerfer
2015/099 ( PDF )
Universally Composable Firewall Architectures using Trusted Hardware
Dirk Achenbach and Jörn Müller-Quade and Jochen Rill
2015/098 ( PDF )
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
Shantian Cheng and Juanyang Zhang
2015/097 ( PDF )
Surreptitiously Weakening Cryptographic Systems
Bruce Schneier and Matthew Fredrikson and Tadayoshi Kohno and Thomas Ristenpart
2015/096 ( PDF )
A Meet in the Middle Attack on Reduced Round Kuznyechik
Riham AlTawy and Amr M. Youssef
2015/095 ( PDF )
Rotational Cryptanalysis of ARX Revisited
Dmitry Khovratovich and Ivica Nikolic and Josef Pieprzyk and Przemyslaw Sokolowski and Ron Steinfeld
2015/094 ( PDF )
Some New Results on Binary Polynomial Multiplication
Murat Cenk and M. Anwar Hasan
2015/093 ( PDF )
Generalization of Statistical Criteria for Sboxes
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
2015/092 ( PDF )
TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY
Grasha Jacob, Dr. A. Murugan, Irine Viola
2015/091 ( PDF )
Related-Key Forgeries for Prøst-OTR
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/090 ( PDF )
Structural Evaluation by Generalized Integral Property
Yosuke Todo
2015/089 ( PDF )
On the security margin of MAC striping
Thomas Eisenbarth and Aaron Meyerowitz and Rainer Steinwandt
2015/088 ( PDF )
Structural Weaknesses in the Open Smart Grid Protocol
Klaus Kursawe and Christiane Peters
2015/087 ( PDF )
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
David Derler and Christian Hanser and Daniel Slamanig
2015/086 ( PDF )
Practical Compact E-Cash with Arbitrary Wallet Size
Patrick Märtens
2015/085 ( PDF )
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
Anne Canteaut and Joëlle Roué
2015/084 ( PDF )
On the Disadvantages of Pairing-based Cryptography
Zhengjun Cao and Lihua Liu
2015/083 ( PDF )
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
Massimo Chenal and Qiang Tang
2015/082 ( PDF )
On the Difficulty of Securing Web Applications using CryptDB
İhsan Haluk AKIN and Berk Sunar
2015/081 ( PDF )
Amortizing Garbled Circuits
Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff
2015/080 ( PDF )
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
Feng Hao and Xun Yi and Liqun Chen and Siamak F. Shahandashti
2015/079 ( PDF )
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
Jiqiang Lu
2015/078 ( PDF )
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters
GU Chun-xiang and. Xin Dan and. ZHENG Yong-hui and. KANG Yuan-ji
2015/077 ( PDF )
On the Primary Constructions of Vectorial Boolean Bent Functions
Yuwei Xu and Chuankun Wu
2015/076 ( PDF )
Fully Structure-Preserving Signatures and Shrinking Commitments
Masayuki Abe and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi
2015/075 ( PDF )
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen
2015/074 ( PDF )
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
Gilles Barthe and Juan Manuel Crespo and Yassine Lakhnech and Benedikt Schmidt
2015/073 ( PDF )
Oblivious Network RAM
Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin
2015/072 ( PDF )
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Olivier Blazy and Céline Chevalier and Damien Vergnaud
2015/071 ( PDF )
Factoring N=p^r q^s for Large r and s
Jean-Sebastien Coron and Jean-Charles Faugere and Guenael Renault and Rina Zeitoun
2015/070 ( PDF )
The Sum Can Be Weaker Than Each Part
Gaëtan Leurent and Lei Wang
2015/069 ( PDF )
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
Benoît Cogliati and Yannick Seurin
2015/068 ( PDF )
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
Gregor Leander and Brice Minaud and Sondre Rønjom
2015/067 ( PDF )
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
Susumu Kiyoshima
2015/066 ( PDF )
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
Tobias Schneider and Amir Moradi and Tim Güneysu
2015/065 ( PDF )
A lightweight-friendly modifcation of GOST block cipher
Andrey Dmukh and Denis Dygin and Grigory Marshalko
2015/064 ( PDF )
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
Handan Kılınç and Alptekin Küpçü
2015/063 ( PDF )
CamlCrush: A PKCS\#11 Filtering Proxy
R. Benadjila and T. Calderon and M. Daubignard
2015/062 ( PDF )
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
Yuval Yarom and Gefei Li and Damith C. Ranasinghe
2015/061 ( PDF )
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
2015/060 ( PDF )
Verified Proofs of Higher-Order Masking
Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub
2015/059 ( PDF )
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
2015/058 ( PDF )
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
Berry Schoenmakers and Meilof Veeningen
2015/057 ( PDF )
Cold Boot Attacks in the Discrete Logarithm Setting
Bertram Poettering and Dale L. Sibborn
2015/056 ( PDF )
Better Algorithms for LWE and LWR
Alexandre Duc and Florian Tramèr and Serge Vaudenay
2015/055 ( PDF )
Richer Efficiency/Security Trade-offs in 2PC
Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek
2015/054 ( PDF )
Non-committing encryption from $\Phi$-hiding
Brett Hemenway and Rafail Ostrovsky and Alon Rosen
2015/053 ( PDF )
Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/052 ( PDF )
Interactive Message-Locked Encryption and Secure Deduplication
Mihir Bellare and Sriram Keelveedhi
2015/051 ( PDF )
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
Li Lin, Wenling Wu
2015/050 ( PDF )
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
Carla Ràfols
2015/049 ( PDF )
On Solving Lpn using BKW and Variants
Sonia Bogos and Florian Tramer and Serge Vaudenay
2015/048 ( PDF )
On Obfuscation with Random Oracles
Ran Canetti and Yael Tauman Kalai and Omer Paneth
2015/047 ( PDF )
Linearly Homomorphic Encryption from DDH
Guilhem Castagnos and Fabien Laguillaumie
2015/046 ( PDF )
On the concrete hardness of Learning with Errors
Martin R. Albrecht and Rachel Player and Sam Scott
2015/045 ( PDF )
Reliable Information Extraction for Single Trace Attacks
Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
2015/044 ( PDF )
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
Binanda Sengupta and Abhijit Das
2015/043 ( PDF )
Group Signature with Deniability: How to Disavow a Signature
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka
2015/042 ( PDF )
High Performance Lattice-based CCA-secure Encryption
Rachid El~Bansarkhani and Johannes Buchmann
2015/041 ( PDF )
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP
Artur Mariano and Thijs Laarhoven and Christian Bischof
2015/040 ( PDF )
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/039 ( PDF )
Type-Based Verification of Electronic Voting Protocols
Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling
2015/038 ( PDF )
Aggregate Pseudorandom Functions and Connections to Learning
Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan
2015/037 ( PDF )
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/036 ( PDF )
Faster software for fast endomorphisms
Billy Bob Brumley
2015/035 ( PDF )
Cryptographically Secure CRC for Lightweight Message Authentication
Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist
2015/034 ( PDF )
Suit up! Made-to-Measure Hardware Implementations of Ascon
Hannes Groß and Erich Wenger and Christoph Dobraunig and Christoph Ehrenhöfer
2015/033 ( PDF )
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel
2015/032 ( PDF )
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF
Zvika Brakerski and Vinod Vaikuntanathan
2015/031 ( PDF )
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence
Kai-Min Chung and Rafael Pass
2015/030 ( PDF )
Cryptanalysis of Ascon
Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schläffer
2015/029 ( PDF )
Predicate Encryption for Circuits from LWE
Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2015/028 ( PDF )
Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$)
Jeremy Maitin-Shepard
2015/027 ( PDF )
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption
Adam Smith and Ye Zhang
2015/026 ( PDF )
A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/025 ( PDF )
Obfuscating Circuits via Composite-Order Graded Encoding
Benny Applebaum and Zvika Brakerski
2015/024 ( PDF )
Non-Abelian Analogs of Lattice Rounding
Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan
2015/023 ( PDF )
Multilinear Maps Using Ideal Lattices without Encodings of Zero
Gu Chunsheng
2015/022 ( PDF )
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
Bo Yang and Dengguo Feng and Yu Qin and Yingjun Zhang and Weijin Wang
2015/021 ( PDF )
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification
Xin Li
2015/020 ( PDF )
Simpler Efficient Group Signatures from Lattices
Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang
2015/019 ( PDF )
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Mehdi Tibouchi
2015/018 ( PDF )
A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS
JINTAI DING, ALEXEI MIASNIKOV, AND ALEXANDER USHAKOV
2015/017 ( PDF )
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
2015/016 ( PDF )
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Yannis Rouselakis and Brent Waters
2015/015 ( PDF )
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
Florian Bergsma, Tibor Jager, Jörg Schwenk
2015/014 ( PDF )
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based
San Ling and Khoa Nguyen and Huaxiong Wang
2015/013 ( PDF )
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Nico Döttling
2015/012 ( PDF )
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
Tancrède Lepoint and Mehdi Tibouchi
2015/011 ( PDF )
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications
Benjamin Buhrow and Paul Riemer and Mike Shea and Barry Gilbert and Erik Daniel
2015/010 ( PDF )
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
Shengli Liu and Kenneth G. Paterson
2015/009 ( PDF )
Rig: A simple, secure and flexible design for Password Hashing
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2015/008 ( PDF )
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Satrajit Ghosh and Aniket Kate
2015/007 ( PDF )
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Tobias Pulls and Roel Peeters
2015/006 ( PDF )
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Jan Camenisch and Robert R. Enderlein and Gregory Neven
2015/005 ( PDF )
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs
2015/004 ( PDF )
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Carmit Hazay
2015/003 ( PDF )
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen
2015/002 ( PDF )
Characterization of MDS mappings
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/001 ( PDF )
A note on the security of Higher-Order Threshold Implementations
Oscar Reparaz
2014/1029 ( PDF )
On the Cryptographic Hardness of Finding a Nash Equilibrium
Nir Bitansky and Omer Paneth and Alon Rosen
2014/1028 ( PDF )
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
Payal Chaudhari and Manik Lal Das and Anish Mathuria
2014/1027 ( PDF )
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Vadim Lyubashevsky and Daniel Wichs
2014/1026 ( PDF )
Lattices with Symmetry
H. W. Lenstra, Jr. and A. Silverberg
2014/1025 ( PDF )
XPIR: Private Information Retrieval for Everyone
Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian
2014/1024 ( PDF )
Cryptanalysis of the Co-ACD Assumption
Pierre-Alain Fouque and Moon Sung Lee and Tancrède Lepoint and Mehdi Tibouchi
2014/1023 ( PDF )
How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search
Nathan E. Price and Alan T. Sherman
2014/1022 ( PDF )
Topology-Hiding Computation
Tal Moran and Ilan Orlov and Silas Richelson
2014/1021 ( PDF )
Tightly-Secure Signatures from Chameleon Hash Functions
Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan
2014/1020 ( PDF )
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
2014/1019 ( -- withdrawn -- )
Related-Key Differential Cryptanalysis of Reduced-Round ITUBee
Xiaoming Tang and Weidong Qiu and Zheng Gong and Zheng Huang and Jie Guo
2014/1018 ( PDF )
Algebraic Algorithms for LWE
Martin R. Albrecht and Carlos Cid and Jean-Charles Faugère and Ludovic Perret
2014/1017 ( PDF )
Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
Foteini Baldimtsi and Olga Ohrimenko
2014/1016 ( -- withdrawn -- )
Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security
GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL
2014/1015 ( PDF )
Compact Accumulator using Lattices
Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini
2014/1014 ( PDF )
Double-and-Add with Relative Jacobian Coordinates
Björn Fay
2014/1013 ( PDF )
Computational Independence
Björn Fay
2014/1012 ( PDF )
The Boomerang Attacks on BLAKE and BLAKE2
Yonglin Hao
2014/1011 ( PDF )
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Alex Biryukov and Ivan Pustogarov
2014/1010 ( PDF )
On Continuous After-the-Fact Leakage-Resilient Key Exchange
Mohsen Toorani
2014/1009 ( PDF )
A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
Christopher D. Nguyen and Dhananjay S. Phatak and Steven D. Houston and Alan T. Sherman
2014/1008 ( PDF )
DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS
Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
2014/1007 ( PDF )
Fair Multiple-bank E-cash in the Standard Model
Jiangxiao Zhang and Yanwu Gao and Chunhui Feng and Hua Guo and Zhoujun Li
2014/1006 ( PDF )
Simple composition theorems of one-way functions -- proofs and presentations
Jaime Gaspar and Eerke Boiten
2014/1005 ( PDF )
A pure block chain based decentralized exchange.
Harsh Patel
2014/1004 ( PDF )
CONIKS: Bringing Key Transparency to End Users
Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
2014/1003 ( PDF )
COFFE: Ciphertext Output Feedback Faithful Encryption
Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel
2014/1002 ( PDF )
Experiments in Encrypted and Searchable Network Audit Logs
Bhanu Prakash Gopularam and Sashank Dara and Nalini N
2014/1001 ( -- withdrawn -- )
Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE
Xiaopeng Yang, Wenping Ma, and Chengli Zhang
2014/1000 ( PDF )
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri
2014/999 ( PDF )
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
Yongdae Kim and Hyunsoo Yoon
2014/998 ( PDF )
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
Gus Gutoski and Douglas Stebila
2014/997 ( PDF )
Constants Count: Practical Improvements to Oblivious RAM
Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas
2014/996 ( PDF )
Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
Maike Massierer
2014/995 ( PDF )
Partial Garbling Schemes and Their Applications
Yuval Ishai and Hoeteck Wee
2014/994 ( PDF )
Key-Policy Multi-authority Attribute-Based Encryption
Riccardo Longo and Chiara Marcolla and Massimiliano Sala
2014/993 ( PDF )
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer
2014/992 ( PDF )
Incentivized Outsourced Computation Resistant to Malicious Contractors
Alptekin Kupcu
2014/991 ( PDF )
Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
Kai-Min Chung and Huijia Lin and Rafael Pass
2014/990 ( PDF )
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
Pille Pullonen and Sander Siim
2014/989 ( PDF )
Controlled Homomorphic Encryption: Definition and Construction
Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti
2014/988 ( PDF )
Armadillo: a compilation chain for privacy preserving applications
Sergiu Carpov and Paul Dubrulle and Renaud Sirdey
2014/987 ( PDF )
Cryptanalysis of Full PRIDE Block Cipher
Yibin Dai and Shaozhen Chen
2014/986 ( PDF )
Related-Key Differential Attack on Round Reduced RECTANGLE-80
Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma
2014/985 ( PDF )
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
Bartosz Zoltak
2014/984 ( PDF )
Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel
Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert
2014/983 ( PDF )
Public Verification of Private Effort
Giulia Alberini and Tal Moran and Alon Rosen
2014/982 ( PDF )
Outlier Privacy
Edward Lui and Rafael Pass
2014/981 ( PDF )
Publicly Verifiable Non-Interactive Arguments for Delegating Computation
Omer Paneth and Guy N. Rothblum
2014/980 ( PDF )
A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors
Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
2014/979 ( PDF )
The Chaining Lemma and its application
Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
2014/978 ( PDF )
Improved Differential Analysis of Block Cipher PRIDE
Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma
2014/977 ( PDF )
A Survey on Lightweight Entity Authentication with Strong PUFs
Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede
2014/976 ( PDF )
Geppetto: Versatile Verifiable Computation
Craig Costello and Cédric Fournet and Jon Howell and Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and Bryan Parno and Samee Zahur
2014/975 ( PDF )
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2014/974 ( -- withdrawn -- )
Non-Linearity and Affine Equivalence of Permutations
P R Mishra, Indivar Gupta and N Rajesh Pillai
2014/973 ( PDF )
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma
2014/972 ( PDF )
A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Haining Fan
2014/971 ( PDF )
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
Y. Wei and E. Pasalic and F. Zhang and W. Wu
2014/970 ( PDF )
Jackpot Stealing Information From Large Caches via Huge Pages
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2014/969 ( PDF )
Privacy-Preserving Face Recognition with Outsourced Computation
Can Xiang and Chunming Tang
2014/968 ( PDF )
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
Jorge Munilla and Mike Burmester and Albert Peinado
2014/967 ( PDF )
A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
Maciej Skorski
2014/966 ( PDF )
Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
Kan Yang and Xiaohua Jia and Kuan Zhang and Xuemin (Sherman) Shen
2014/965 ( PDF )
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
Romain Gay and Pierrick Méaux and Hoeteck Wee
2014/964 ( PDF )
On two windows multivariate cryptosystem depending on random parameters
Urszula Romańczuk-Polubiec, Vasyl Ustimenko
2014/963 ( PDF )
Malicious-Client Security in Blind Seer: A Scalable Private DBMS
Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
2014/962 ( PDF )
Solving Polynomial Systems with Noise over F_2: Revisited
Zhenyu Huang and Dongdai Lin
2014/961 ( PDF )
When are Fuzzy Extractors Possible?
Benjamin Fuller and Leonid Reyzin and Adam Smith
2014/960 ( PDF )
Non-Interactive Secure Multiparty Computation
Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin-Cherniavsky
2014/959 ( PDF )
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul
2014/958 ( PDF )
Authenticated Encryption: How Reordering can Impact Performance
Basel Alomair
2014/957 ( PDF )
Black Box Separations for Differentially Private Protocols
Dakshita Khurana and Hemanta K. Maji and Amit Sahai
2014/956 ( PDF )
Tamper Detection and Continuous Non-Malleable Codes
Zahra Jafargholi and Daniel Wichs
2014/955 ( PDF )
On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme
Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
2014/954 ( PDF )
Algebraic Fault Analysis of Katan
Frank Quedenfeld
2014/953 ( PDF )
The Related-Key Security of Iterated Even-Mansour Ciphers
Pooya Farshim and Gordon Procter
2014/952 ( PDF )
Balanced Encoding to Mitigate Power Analysis: A Case Study
Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye
2014/951 ( PDF )
Modified Alternating Step Generators with Non-Linear Scrambler
Robert Wicik and Tomasz Rachwalik and Rafał Gliwa
2014/950 ( PDF )
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda
2014/949 ( PDF )
Simplification/complication of the basis of prime Boolean ideal
Alexander Rostovtsev and Anna Shustrova
2014/948 ( PDF )
Lattice Point Enumeration on Block Reduced Bases
Michael Walter
2014/947 ( PDF )
The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2014/946 ( PDF )
On a new fast public key cryptosystem
Samir Bouftass and Abdelhak Azhari
2014/945 ( PDF )
Boomerang Attack on Step-Reduced SHA-512
Hongbo Yu, Dongxia Bai
2014/944 ( PDF )
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials
Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
2014/943 ( PDF )
HaTCh: A Formal Framework of Hardware Trojan Design and Detection
Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk
2014/942 ( PDF )
Public-Coin Differing-Inputs Obfuscation and Its Applications
Yuval Ishai, Omkant Pandey, Amit Sahai
2014/941 ( PDF )
Garbled RAM From One-Way Functions
Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro
2014/940 ( PDF )
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2014/939 ( PDF )
Security Analysis of an Authentication Scheme Using Smart Cards
Gaurav Tiwari and Amit K. Awasthi and Neha Shukla
2014/938 ( PDF )
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
2014/937 ( PDF )
Analysis of Lewko-Sahai-Waters Revocation System
Zhengjun Cao and Lihua Liu
2014/936 ( PDF )
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
2014/935 ( PDF )
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia
2014/934 ( PDF )
Efficient Generic Zero-Knowledge Proofs from Commitments
Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias
2014/933 ( PDF )
Certificateless Proxy Re-Encryption Without Pairing: Revisited
Akshayaram Srinivasan and C. Pandu Rangan
2014/932 ( PDF )
Bicliques with Minimal Data and Time Complexity for AES (Extended Version)
Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
2014/931 ( PDF )
Cryptanalysis of JAMBU
Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang
2014/930 ( PDF )
Immunizing Multilinear Maps Against Zeroizing Attacks
Dan Boneh and David J. Wu and Joe Zimmerman
2014/929 ( PDF )
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero
Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai
2014/928 ( PDF )
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois
2014/927 ( PDF )
Physical functions : the common factor of side-channel and fault attacks ?
Bruno Robisson and Hélène Le Bouder
2014/926 ( PDF )
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Keita Emura and Takuya Hayashi
2014/925 ( PDF )
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
Venkata Koppula and Allison Bishop Lewko and Brent Waters
2014/924 ( PDF )
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
Antoine Joux and Cécile Pierrot
2014/923 ( -- withdrawn -- )
New Cryptosystem Using The CRT And The Jordan Normal Form
Hemlata Nagesh and Birendra Kumar Sharma
2014/922 ( PDF )
Differential Analysis of Block Ciphers SIMON and SPECK
Alex Biryukov and Arnab Roy and Vesselin Velichkov
2014/921 ( PDF )
Batch NFS
Daniel J. Bernstein and Tanja Lange
2014/920 ( PDF )
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert
2014/919 ( PDF )
Experimenting with Shuffle Block Cipher and SMT Solvers
Martin Stanek
2014/918 ( PDF )
Web Tap Payment Authentication and Encryption With Zero Customer Effort
Henry Ng
2014/917 ( PDF )
From Selective to Adaptive Security in Functional Encryption
Prabhanjan Ananth and Zvika Brakerski and Gil Segev and Vinod Vaikuntanathan
2014/916 ( PDF )
Adaptively Secure Fully Homomorphic Signatures Based on Lattices
Xavier Boyen and Xiong Fan and Elaine Shi
2014/915 ( PDF )
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014
Yanbin Pan
2014/914 ( PDF )
Cryptography with One-Way Communication
Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2014/913 ( PDF )
Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2014/912 ( PDF )
Low-Cost Concurrent Error Detection for GCM and CCM
Xiaofei Guo and Ramesh Karri
2014/911 ( PDF )
A Denial of Service Attack against Fair Computations using Bitcoin Deposits
Jethro Beekman
2014/910 ( PDF )
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model
Vanishree Rao
2014/909 ( PDF )
Robust Secret Sharing Schemes Against Local Adversaries
Allison Bishop Lewko and Valerio Pastro
2014/908 ( PDF )
Practical UC security with a Global Random Oracle
Ran Canetti and Abhishek Jain and Alessandra Scafuro
2014/907 ( PDF )
Finding shortest lattice vectors faster using quantum search
Thijs Laarhoven and Michele Mosca and Joop van de Pol
2014/906 ( PDF )
Cryptanalysis of the Multilinear Map over the Integers
Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehle
2014/905 ( PDF )
Primary-Secondary-Resolver Membership Proof Systems
Moni Naor and Asaf Ziv
2014/904 ( PDF )
How Secure is TextSecure?
Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz
2014/903 ( PDF )
Falcon Codes: Fast, Authenticated LT Codes
Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos
2014/902 ( PDF )
The Power of Negations in Cryptography
Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen
2014/901 ( PDF )
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
Kenneth G. Paterson and Mario Strefler
2014/900 ( PDF )
Some Security Results of the RC4+ Stream Cipher
Subhadeep Banik and Sonu Jha
2014/899 ( PDF )
Side Channel Power Analysis of an AES-256 Bootloader
Colin O'Flynn and Zhizhang Chen
2014/898 ( PDF )
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
Eduardo Morais and Ricardo Dahab
2014/897 ( PDF )
Leveled Fully Homomorphic Signatures from Standard Lattices
Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs
2014/896 ( PDF )
Efficiently Making Secure Two-Party Computation Fair
Handan Kılınç, Alptekin Küpçü
2014/895 ( PDF )
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
Kerry A. McKay and Poorvi L. Vora
2014/894 ( PDF )
THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS
Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan
2014/893 ( PDF )
Advanced Algebraic Attack on Trivium
Frank Quedenfeld and Christopher Wolf
2014/892 ( PDF )
Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014
Georg Fuchsbauer
2014/891 ( PDF )
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi
2014/890 ( PDF )
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures
Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek
2014/889 ( PDF )
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak
2014/888 ( PDF )
Distance Lower Bounding
Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi
2014/887 ( PDF )
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
2014/886 ( PDF )
Accountable Storage
Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia
2014/885 ( PDF )
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
Marios O. Choudary and Markus G. Kuhn
2014/884 ( -- withdrawn -- )
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo and Yunsi Fei
2014/883 ( -- withdrawn -- )
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo and Yunsi Fei
2014/882 ( PDF )
Obfuscation of Probabilistic Circuits and Applications
Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan
2014/881 ( PDF )
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2014/880 ( PDF )
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
Joppe W. Bos and Michael Naehrig and Joop van de Pol
2014/879 ( PDF )
Watch your Constants: Malicious Streebog
Riham AlTawy and Amr M. Youssef
2014/878 ( PDF )
Protecting obfuscation against arithmetic attacks
Eric Miles and Amit Sahai and Mor Weiss
2014/877 ( PDF )
CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
Daniel R. L. Brown
2014/876 ( PDF )
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
Mihir Bellare and Viet Tung Hoang
2014/875 ( PDF )
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding
2014/874 ( PDF )
Accelerating Bliss: the geometry of ternary polynomials
Léo Ducas
2014/873 ( PDF )
Bootstrapping for HElib
Shai Halevi and Victor Shoup
2014/872 ( PDF )
Recent Results in Scalable Multi-Party Computation
Jared Saia and Mahdi Zamani
2014/871 ( PDF )
An algorithm for MD5 single-block collision attack using high-performance computing cluster
Anton A. Kuznetsov
2014/870 ( PDF )
Dynamic Behavior of RS latches using FIB processing and probe connection
Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto
2014/869 ( PDF )
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Werner Schindler
2014/868 ( PDF )
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
Ilan Komargodski and Gil Segev and Eylon Yogev
2014/867 ( PDF )
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Christina Brzuska and Pooya Farshim and Arno Mittelbach
2014/866 ( -- withdrawn -- )
Self-Destruct Non-Malleability
Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
2014/865 ( PDF )
Impossibility of Black-Box Simulation Against Leakage Attacks
Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
2014/864 ( PDF )
How to Choose Interesting Points for Template Attacks More Effectively
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/863 ( PDF )
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou
2014/862 ( PDF )
Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -
Miroslav Knezevic, Ventzislav Nikov, and Peter Rombouts
2014/861 ( PDF )
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
İhsan Haluk Akın
2014/860 ( PDF )
Differential Factors: Improved Attacks on SERPENT
Cihangir Tezcan and Ferruh Özbudak
2014/859 ( -- withdrawn -- )
Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system
SK Hafizul Islam; G. P. Biswas
2014/858 ( PDF )
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds
Dana Dachman-Soled and Jonathan Katz and Vanishree Rao
2014/857 ( PDF )
Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
2014/856 ( PDF )
Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware
Dana Dachman-Soled and Feng-Hao Liu and Hong-Sheng Zhou
2014/855 ( PDF )
Relating Undisturbed Bits to Other Properties of Substitution Boxes
Rusydi H. Makarim and Cihangir Tezcan
2014/854 ( PDF )
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
2014/853 ( PDF )
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătălin Roşu and Michael Steiner
2014/852 ( PDF )
Faster ECC over $\mathbb{F}_{2^{521}-1}$
Robert Granger and Michael Scott
2014/851 ( PDF )
Near Optimal Rate Homomorphic Encryption for Branching Programs
Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang
2014/850 ( PDF )
The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses
Markku-Juhani O. Saarinen
2014/849 ( PDF )
A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks
Ryotaro Hayashi and Tatsuyuki Matsushita
2014/848 ( PDF )
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
Nicolas T. Courtois and Pinar Emirdag and Filippo Valsorda
2014/847 ( PDF )
Reflections on Slide with a Twist Attacks
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2014/846 ( PDF )
Verifiable computation using multiple provers
Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish
2014/845 ( PDF )
Adaptively secure two-party computation from indistinguishability obfuscation
Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya
2014/844 ( PDF )
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
Sanjam Garg and Antigoni Polychroniadou
2014/843 ( PDF )
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng
2014/842 ( PDF )
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
2014/841 ( PDF )
Explicit Non-malleable Codes Resistant to Permutations and Perturbations
Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
2014/840 ( PDF )
Constrained PRFs for Unbounded Inputs
Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
2014/839 ( PDF )
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
Koji Nuida and Naoto Itakura and Kaoru Kurosawa
2014/838 ( PDF )
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan
2014/837 ( PDF )
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds
Maciej Skorski
2014/836 ( PDF )
A Tight Transformation between HILL and Metric Conditional Pseudoentropy
Maciej Skorski
2014/835 ( PDF )
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
David Galindo and Johann Großschädl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek
2014/834 ( PDF )
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman
2014/833 ( PDF )
Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability
Essam Ghadafi
2014/832 ( PDF )
Requirements for Standard Elliptic Curves
Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
2014/831 ( PDF )
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean and Ivica Nikolić and Thomas Peyrin
2014/830 ( PDF )
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Ivan Damgård and Antigoni Polychroniadou and Vanishree Rao
2014/829 ( PDF )
Additively Homomorphic UC commitments with Optimal Amortized Overhead
Ignacio Cascudo and Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti
2014/828 ( PDF )
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
Zhengjun Cao and Zhenfu Cao and Lihua Liu
2014/827 ( PDF )
Interactive Coding for Interactive Proofs
Yevgeniy Dodis and Allison Bishop Lewko
2014/826 ( PDF )
Learning with Errors in the Exponent
Ozgur Dagdelen and Sebastian Gajek and Florian Gopfert
2014/825 ( -- withdrawn -- )
Towards Optimal Bounds for Implicit Factorization Problem
Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin
2014/824 ( PDF )
Accountable Tracing Signatures
Markulf Kohlweiss and Ian Miers
2014/823 ( PDF )
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Rafael Dowsley and Anderson C. A. Nascimento
2014/822 ( PDF )
Ballot secrecy with malicious bulletin boards
David Bernhard and Ben Smyth
2014/821 ( PDF )
Non-malleable Reductions and Applications
Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski
2014/820 ( PDF )
Operational Signature Schemes
Michael Backes and Ozgur Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schröder
2014/819 ( PDF )
Riding on Asymmetry: Efficient ABE for Branching Programs
Sergey Gorbunov and Dhinakaran Vinayagamurthy
2014/818 ( -- withdrawn -- )
Circulant Matrices and Differential Privacy
Jalaj Upadhyay
2014/817 ( PDF )
Optimized Karatsuba Squaring on 8-bit AVR Processors
Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
2014/816 ( PDF )
FHEW: Bootstrapping Homomorphic Encryption in less than a second
Léo Ducas and Daniele Micciancio
2014/815 ( PDF )
A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves
Palash Sarkar and Shashank Singh
2014/814 ( PDF )
Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing
Lisa Bromberg and Vladimir Shpilrain and Alina Vdovina
2014/813 ( PDF )
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
Dario Catalano and Dario Fiore
2014/812 ( PDF )
Search-and-compute on Encrypted Data
Jung Hee Cheon and Miran Kim and Myungsun Kim
2014/811 ( PDF )
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
Jean-Charles Faugere and Danilo Gligoroski and Ludovic Perret and Simona Samardjiska and Enrico Thomae
2014/810 ( PDF )
Simulation-Based Secure Functional Encryption in the Random Oracle Model
Vincenzo Iovino and Karol Zebrowski
2014/809 ( PDF )
Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
Ignacio Cascudo and Ivan Damgård and Oriol Farràs and Samuel Ranellucci
2014/808 ( PDF )
Online/Off-line Ring Signature Scheme with Provable Security
Jayaprakash Kar
2014/807 ( PDF )
Leakage-resilient non-malleable codes
Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
2014/806 ( PDF )
Summation polynomial algorithms for elliptic curves in characteristic two
Steven D. Galbraith and Shishay W. Gebregiyorgis
2014/805 ( PDF )
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
Charanjit S. Jutla and Arnab Roy
2014/804 ( PDF )
Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
Jacob Alperin-Sheriff
2014/803 ( PDF )
A Decentralized Public Key Infrastructure with Identity Retention
Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
2014/802 ( PDF )
Physical Characterization of Arbiter PUFs
Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
2014/801 ( PDF )
Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties
Georgi Ivanov and Nikolay Nikolov and Svetla Nikova
2014/800 ( PDF )
Efficient Pairings and ECC for Embedded Systems
Thomas Unterluggauer and Erich Wenger
2014/799 ( PDF )
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
2014/798 ( PDF )
Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
Michael Clear and Ciarán McGoldrick
2014/797 ( PDF )
Tightly-Secure Authenticated Key Exchange
Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li
2014/796 ( PDF )
Distributed Cryptography Based on the Proofs of Work
Marcin Andrychowicz and Stefan Dziembowski
2014/795 ( PDF )
SPHINCS: practical stateless hash-based signatures
Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Michael Schneider and Peter Schwabe and Zooko Wilcox-O'Hearn
2014/794 ( PDF )
Efficient Identity-Based Encryption over NTRU Lattices
Léo Ducas and Vadim Lyubashevsky and Thomas Prest
2014/793 ( PDF )
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
Viet Tung Hoang and Ted Krovetz and Phillip Rogaway
2014/792 ( PDF )
General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition
Farzaneh Abed and Christian Forler and Stefan Lucks
2014/791 ( PDF )
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof
Dongdai Lin and Yujuan Quan and Jian Weng and Jun Yan
2014/790 ( PDF )
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
Sarani Bhattacharya and Debdeep Mukhopadhyay
2014/789 ( PDF )
Statistical Properties of the Square Map Modulo a Power of Two
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
2014/788 ( PDF )
Tuning GaussSieve for Speed
Robert Fitzpatrick and Christian Bischof and Johannes Buchmann and Ozgur Dagdelen and Florian Gopfert and Artur Mariano and Bo-Yin Yang
2014/787 ( PDF )
Another Tor is possible
Amadou Moctar Kane
2014/786 ( PDF )
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Chun Guo and Dongdai Lin
2014/785 ( PDF )
Divisible E-Cash Made Practical
Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
2014/784 ( PDF )
Weak Instances of PLWE
Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter
2014/783 ( PDF )
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
Raghavan Kumar and Philipp Jovanovic and Wayne Burleson and Ilia Polian
2014/782 ( PDF )
Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis
Raghavan Kumar and Philipp Jovanovic and Ilia Polian
2014/781 ( PDF )
Tally-based simple decoders for traitor tracing and group testing
Boris Skoric
2014/780 ( PDF )
Deterministic Public-Key Encryption under Continual Leakage
Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters
2014/779 ( PDF )
Implementing Cryptographic Program Obfuscation
Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
2014/778 ( PDF )
Anonymous IBE from Quadratic Residuosity with Improved Performance
Michael Clear and Hitesh Tewari and Ciarán McGoldrick
2014/777 ( PDF )
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces
Koji Nuida and Kaoru Kurosawa
2014/776 ( PDF )
How to Obfuscate Programs Directly
Joe Zimmerman
2014/775 ( PDF )
Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation
Artur Mariano, Shahar Timnat and Christian Bischof
2014/774 ( PDF )
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
Alex J. Malozemoff and Jonathan Katz and Matthew D. Green
2014/773 ( PDF )
Obfuscating Low-Rank Matrix Branching Programs
Amit Sahai and Mark Zhandry
2014/772 ( PDF )
Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps
Nuttapong Attrapadung
2014/771 ( PDF )
Succinct Randomized Encodings and their Applications
Nir Bitansky and Sanjam Garg and Sidharth Telang
2014/770 ( PDF )
AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation
Takaaki Mizuki and Yu-ichi Hayashi
2014/769 ( PDF )
Indistinguishability Obfuscation of Iterated Circuits and RAM Programs
Ran Canetti and Justin Holmgren and Abhishek Jain and Vinod Vaikuntanathan
2014/768 ( PDF )
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation
Han Jiang and Xiaochao Wei and Chuan Zhao and Qiuliang Xu
2014/767 ( PDF )
Algebraic Attacks on Human Identification Protocols
Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk
2014/766 ( PDF )
Succinct Garbling Schemes and Applications
Huijia Lin and Rafael Pass
2014/765 ( PDF )
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2014/764 ( PDF )
One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
Jens Groth and Markulf Kohlweiss
2014/763 ( PDF )
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
Arthur Gervais and Ghassan O. Karame and Damian Gruber and Srdjan Capkun
2014/762 ( PDF )
Access Control in Publicly Verifiable Outsourced Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2014/761 ( PDF )
Cryptanalysis of Reduced-round SIMON32 and SIMON48
Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo
2014/760 ( PDF )
Montgomery Modular Multiplication on ARM-NEON Revisited
Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, and Howon Kim
2014/759 ( PDF )
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
2014/758 ( PDF )
Cryptographic Reverse Firewalls
Ilya Mironov and Noah Stephens-Davidowitz
2014/757 ( PDF )
Adaptively Secure Broadcast Encryption with Small System Parameters
Mark Zhandry
2014/756 ( PDF )
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
Samee Zahur and Mike Rosulek and David Evans
2014/755 ( PDF )
Computing Mod Without Mod
Mark A. Will and Ryan K. L. Ko
2014/754 ( PDF )
Bilinear Entropy Expansion from the Decisional Linear Assumption
Lucas Kowalczyk and Allison Bishop Lewko
2014/753 ( PDF )
Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
Alonso Gonzalez-Ulloa and Alejandro Hevia
2014/752 ( PDF )
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci
2014/751 ( PDF )
Higher-Order Threshold Implementations
Begül Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2014/750 ( PDF )
Hardware Trojan Horses in Cryptographic IP Cores
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage
2014/749 ( PDF )
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM
Daniel E. Holcomb and Kevin Fu
2014/748 ( PDF )
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
Mehmet Sabır Kiraz and Osmanbey Uzunkol
2014/747 ( PDF )
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2014/746 ( PDF )
Decoy-based information security
Vladimir Shpilrain
2014/745 ( PDF )
Universal Signature Aggregators
Susan Hohenberger and Venkata Koppula and Brent Waters
2014/744 ( PDF )
Sieving for shortest vectors in lattices using angular locality-sensitive hashing
Thijs Laarhoven
2014/743 ( PDF )
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
Benoit Libert and Marc Joye and Moti Yung and Thomas Peters
2014/742 ( PDF )
A survey of Fault Attacks in Pairing Based Cryptography
Nadia El Mrabet and Jacques J.A. Fournier and Louis Goubin and Ronan Lashermes
2014/741 ( PDF )
Eliminating Leakage in Reverse Fuzzy Extractors
André Schaller, Boris Skoric, Stefan Katzenbeisser
2014/740 ( -- withdrawn -- )
Non-existence of [n; 5] type Generalized Bent function.
Shashi Kant Pandey and P.R Mishra and B.K Dass
2014/739 ( PDF )
SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers
Smile Markovski and Aleksandra Mileva and Vesna Dimitrova
2014/738 ( PDF )
A Very Compact FPGA Implementation of LED and PHOTON
N. Nalla Anandakumar and Thomas Peyrin and Axel Poschmann
2014/737 ( -- withdrawn -- )
Design and analysis of one-round certificateless authenticated group key agreement protocol with bilinear pairings
SK Hafizul Islam and Abhishek Singh
2014/736 ( PDF )
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
2014/735 ( PDF )
Dealer-Leakage Resilient Verifiable Secret Sharing
Ruxandra F. Olimid
2014/734 ( PDF )
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedra and Dominik Sisejkovic
2014/733 ( PDF )
Augmented Learning with Errors: The Untapped Potential of the Error Term
Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann
2014/732 ( PDF )
Resizable Tree-Based Oblivious RAM
Tarik Moataz and Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
2014/731 ( PDF )
Secure modular password authentication for the web using channel bindings
Mark Manulis and Douglas Stebila and Nick Denham
2014/730 ( PDF )
Differentially Private Linear Algebra in the Streaming Model
Jalaj Upadhyay
2014/729 ( PDF )
Faster Binary-Field Multiplication and Faster Binary-Field MACs
Daniel J. Bernstein and Tung Chou
2014/728 ( PDF )
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson
2014/727 ( PDF )
The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves
Benjamin Smith
2014/726 ( -- withdrawn -- )
CIARP: A RISC Processor For Cryptography Applications
Nima Karimpour Darav and Reza Ebrahimi Atani and Erfan Aghaei and Ahmad Tahmasivand and Mahsa Rahmani and Mina Moazzam Jazi
2014/725 ( PDF )
Efficient Software Implementation of Ring-LWE Encryption
Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2014/724 ( PDF )
Protecting Encrypted Cookies from Compression Side-Channel Attacks
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2014/723 ( PDF )
Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
Yalin Chen and Jue-Sam Chou*
2014/722 ( PDF )
Differential Cryptanalysis of SipHash
Christoph Dobraunig and Florian Mendel and Martin Schläffer
2014/721 ( PDF )
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers
Zhengjun Cao and Zhenfu Cao
2014/720 ( PDF )
Adaptively Secure Constrained Pseudorandom Functions
Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters
2014/719 ( PDF )
Bivariate Polynomials Modulo Composites and their Applications
Dan Boneh and Henry Corrigan-Gibbs
2014/718 ( PDF )
Square Span Programs with Applications to Succinct NIZK Arguments
George Danezis and Cedric Fournet and Jens Groth and Markulf Kohlweiss
2014/717 ( PDF )
How to Split a Secret into Unknown Shares
Ruxandra F. Olimid
2014/716 ( PDF )
Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
Amir Moradi
2014/715 ( PDF )
Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment'
Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
2014/714 ( PDF )
A comprehensive empirical comparison of parallel ListSieve and GaussSieve
Artur Mariano and Ozgur Dagdelen and Christian Bischof
2014/713 ( PDF )
Co-Location-Resistant Clouds
Yossi Azar and Seny Kamara and Ishai Menache and Mariana Raykova and Bruce Shepherd
2014/712 ( PDF )
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
Mohammad Wazid
2014/711 ( PDF )
New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$
Masao KASAHARA
2014/710 ( PDF )
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
Yehuda Lindell
2014/709 ( PDF )
A Note on Quantum Security for Post-Quantum Cryptography
Fang Song
2014/708 ( PDF )
Formal Treatment of Privacy-Enhancing Credential Systems
Jan Camenisch and Stephan Krenn and Anja Lehmann and Gert Læssøe Mikkelsen and Gregory Neven and Michael Østergaard Pedersen
2014/707 ( PDF )
Analysis Of Variance and CPA in SCA
Sebastien Tiran and Guillaume Reymond and Jean-Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles Ducharme and Philippe Maurine
2014/706 ( PDF )
The Feasibility of Outsourced Database Search in the Plain Model
Carmit Hazay and Hila Zarosim
2014/705 ( -- withdrawn -- )
Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
Christian Hanser and Daniel Slamanig
2014/704 ( PDF )
A 128-bit Block Cipher Based on Three Group Arithmetics
Shenghui Su and Shuwang Lü and Daqiang Dong
2014/703 ( PDF )
Linearity Measures for MQ Cryptography
Simona Samardjiska and Danilo Gligoroski
2014/702 ( PDF )
Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques
Benoit Feix and Hugues Thiebeauld
2014/701 ( -- withdrawn -- )
A Practical Iterative Side Channel Cube Attack on AES-128/256
Erfan Aghaee and Majid Rahimi and Hamed Yusefi
2014/700 ( PDF )
Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
Ahto Buldas and Risto Laanoja and Peeter Laud and Ahto Truu
2014/699 ( PDF )
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
Christina Boura and María Naya-Plasencia and Valentin Suder
2014/698 ( PDF )
HIMMO - A lightweight collusion-resistant key predistribution scheme
Oscar Garcia-Morchon and Domingo Gomez-Perez and Jaime Gutierrez and Ronald Rietman and Berry Schoenmakers and Ludo Tolhuizen
2014/697 ( PDF )
A Fully Homomorphic Encryption Scheme with Better Key Size
Zhigang Chen, Jian Wang, ZengNian Zhang , Xinxia Song
2014/696 ( PDF )
Security Proofs for the BLT Signature Scheme
Ahto Buldas and Risto Laanoja and Ahto Truu
2014/695 ( PDF )
Proof of Proximity of Knowledge
Serge Vaudenay
2014/694 ( PDF )
Malicious Hashing: Eve's Variant of SHA-1
Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schläffer
2014/693 ( PDF )
Optimal Proximity Proofs
Ioana Boureanu and Serge Vaudenay
2014/692 ( PDF )
Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead
Enrique Larraia
2014/691 ( PDF )
Integration of hardware tokens in the Idemix library
Antonio de la Piedra
2014/690 ( PDF )
Efficient Interval Check in the Presence of Malicious Adversaries
Genqiang Wu and Yeping He and Yi Lu and Liping Ding
2014/689 ( PDF )
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
Ahto Buldas and Risto Laanoja and Ahto Truu
2014/688 ( PDF )
White-Box AES Implementation Revisited
Chung Hun Baek and Jung Hee Cheon, and Hyunsook Hong
2014/687 ( PDF )
Reducing the Complexity of Normal Basis Multiplication
Omer Egecioglu and Cetin Kaya Koc
2014/686 ( -- withdrawn -- )
A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications
Ming Li and Dongdai Lin
2014/685 ( PDF )
Bit Security of the CDH Problems over Finite Field
Mingqiang Wang and Tao Zhan and Haibin Zhang
2014/684 ( PDF )
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
Antonio de la Piedra and Jaap-Henk Hoepman and Pim Vullers
2014/683 ( PDF )
Error-Tolerant Algebraic Side-Channel Attacks Using BEE
Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao
2014/682 ( PDF )
A Unified Formalism for Physical Attacks
Hélène Le Bouder, Ronan Lashermes , Yanis Linge , Bruno Robisson and Assia Tria
2014/681 ( PDF )
Improved Linear Cryptanalysis of Reduced-round SIMON
Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, and Martin M. Lauridsen
2014/680 ( PDF )
Remarks on the Cryptographic Primitive of Attribute-based Encryption
Zhengjun Cao and Lihua Liu
2014/679 ( PDF )
A Note on the Bellare-Rivest Protocol for Translucent Cryptography
Zhengjun Cao and Lihua Liu
2014/678 ( PDF )
A Counterexample to the Chain Rule for Conditional HILL Entropy
Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia and Daniel Wichs
2014/677 ( PDF )
Attacks in Stream Ciphers: A Survey
Gustavo Banegas
2014/676 ( PDF )
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
Zhen Liu and Zhenfu Cao and Duncan S. Wong
2014/675 ( PDF )
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
Jian Guo and Jérémy Jean and Gaëtan Leurent and Thomas Peyrin and Lei Wang
2014/674 ( PDF )
Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
2014/673 ( PDF )
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
2014/672 ( PDF )
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Xiao Wang and Hubert Chan and Elaine Shi
2014/671 ( PDF )
SCORAM: Oblivious RAM for Secure Computation
Xiao Shaun Wang and Yan Huang and T-H. Hubert Chan and abhi shelat and Elaine Shi
2014/670 ( PDF )
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
2014/669 ( PDF )
On the Communication Complexity of Secure Function Evaluation with Long Output
Pavel Hubacek and Daniel Wichs
2014/668 ( PDF )
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation
Ran Cohen and Yehuda Lindell
2014/667 ( PDF )
Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings
Yehuda Lindell and Ben Riva
2014/666 ( PDF )
Functional Encryption Without Obfuscation
Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
2014/665 ( PDF )
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
Julien Bringer and Claude Carlet and Hervé Chabanne and Sylvain Guilley and Houssem Maghrebi
2014/664 ( PDF )
On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves
William R. Trost and Guangwu Xu
2014/663 ( PDF )
Locally Decodable and Updatable Non-Malleable Codes and Their Applications
Dana Dachman-Soled and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2014/662 ( PDF )
Outsourced Pattern Matching
Sebastian Faust and Carmit Hazay and Daniele Venturi
2014/661 ( PDF )
One-Round Deniable Key Exchange with Perfect Forward Security
Weiqiang Wen and Libin Wang and Min Xie
2014/660 ( PDF )
Interactive Proofs under Continual Memory Leakage
Prabhanjan Ananth and Vipul Goyal and Omkant Pandey
2014/659 ( PDF )
On the Primitivity of Trinomials over Small Finite Fields
YUjuan Li and Jinhua Zhao and Huaifu Wang
2014/658 ( PDF )
The Adjacency Graphs of Some Feedback Shift Registers
Ming Li and Yupeng Jiang and Dongdai Lin
2014/657 ( PDF )
On the cycle decomposition of the WG-NLFSR
YUjuan Li and Wnehua Shen and Huaifu Wang and Peipei Zhou
2014/656 ( PDF )
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
Itai Dinur
2014/655 ( PDF )
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
Bo Zhu and Xinxin Fan and Guang Gong
2014/654 ( PDF )
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
Prakash Dey and Abhishek Chakraborty and Avishek Adhikari and Debdeep Mukhopadhyay
2014/653 ( PDF )
Mersenne factorization factory
Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra
2014/652 ( PDF )
A Dynamic Cube Attack on $105$ round Grain v1
Subhadeep Banik
2014/651 ( PDF )
A note on CCA2-protected McEliece Cryptosystem with a systematic public key
Pavol Zajac
2014/650 ( PDF )
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk
2014/649 ( PDF )
FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar
2014/648 ( PDF )
An Equivalent Condition on the Switching Construction of Differentially $4$-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function
Xi~Chen, Yazhi~Deng, Min Zhu and Longjiang~Qu
2014/647 ( PDF )
Universally Composable Secure Group Communication
Youliang Tian and Changgen Peng
2014/646 ( PDF )
High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems
Donald Donglong Chen and Nele Mentens and Frederik Vercauteren and Sujoy Sinha Roy and Ray C.C. Cheung and Derek Pao and Ingrid Verbauwhede
2014/645 ( PDF )
Graph-Induced Multilinear Maps from Lattices
Craig Gentry and Sergey Gorbunov and Shai Halevi
2014/644 ( PDF )
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai
2014/643 ( PDF )
On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'
Ashok Kumar Das
2014/642 ( PDF )
Balanced permutations Even-Mansour ciphers
Shoni Gilboa and Shay Gueron
2014/641 ( PDF )
The Multiple Number Field Sieve with Conjugation Method
Cécile Pierrot
2014/640 ( PDF )
Revocation in Publicly Verifiable Outsourced Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2014/639 ( PDF )
Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines
Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
2014/638 ( PDF )
Substring-Searchable Symmetric Encryption
Melissa Chase and Emily Shen
2014/637 ( PDF )
Generic Hardness of the Multiple Discrete Logarithm Problem
Aaram Yun
2014/636 ( PDF )
Improved Timing Attacks on ECDSA
Vikram Singh
2014/635 ( PDF )
Type 2 Structure-Preserving Signature Schemes Revisited
Sanjit Chatterjee and Alfred Menezes
2014/634 ( PDF )
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP
Hongda Li, Qihua Niu, Guifang Huang
2014/633 ( PDF )
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity
Ran Canetti and Abhishek Jain and Omer Paneth
2014/632 ( PDF )
Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge
Esha Ghosh and Olga Ohrimenko and Roberto Tamassia
2014/631 ( PDF )
Zipf’s Law in Passwords
Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
2014/630 ( PDF )
Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation
Peeter Laud
2014/629 ( PDF )
Two-factor authentication for the Bitcoin protocol
Christopher Mann and Daniel Loebenberger
2014/628 ( PDF )
An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency
Partha Sarathi Roy and Avishek Adhikari and Rui Xu and Kirill Morozov and Kouichi Sakurai
2014/627 ( PDF )
On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
Debrup Chakraborty and Palash Sarkar
2014/626 ( PDF )
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
Daniel Genkin and Itamar Pipman and Eran Tromer
2014/625 ( PDF )
Pretty Understandable Democracy 2.0
Stephan Neumann and Christian Feier and Perihan Sahin and Sebastian Fach
2014/624 ( PDF )
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao
2014/623 ( PDF )
Privacy with Imperfect Randomness
Yevgeniy Dodis and Yanqing Yao
2014/622 ( PDF )
Fully Secure Attribute Based Encryption from Multilinear Maps
Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
2014/621 ( PDF )
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi
2014/620 ( PDF )
The M3dcrypt Password Hashing Function
Isaiah Makwakwa
2014/619 ( PDF )
THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER
Mohammad Sadegh Nemati Nia, Ali Payandeh
2014/618 ( PDF )
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
Florian Böhl and Simon Greiner and Patrik Scheidecker
2014/617 ( PDF )
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
Michael Backes and Manuel Barbosa and Dario Fiore and Raphael M. Reischuk
2014/616 ( PDF )
Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Zhen Liu and Duncan S. Wong
2014/615 ( PDF )
Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality
Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ostrovsky and Vassilis Zikas
2014/614 ( PDF )
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version)
Zhiquan Lv and Cheng Hong and Min Zhang and Dengguo Feng
2014/613 ( PDF )
A Security Analysis of the Composition of ChaCha20 and Poly1305
Gordon Procter
2014/612 ( PDF )
Attribute-Based Encryption Optimized for Cloud Computing
Máté Horváth
2014/611 ( PDF )
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation
Shlomi Dolev and Niv Gilboa and Ximing Li
2014/610 ( PDF )
Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation
Craig Gentry
2014/609 ( PDF )
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/608 ( PDF )
Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps
Ferucio Laurentiu Tiplea and Constantin Catalin Dragan
2014/607 ( PDF )
Adding Controllable Linkability to Pairing-Based Group Signatures For Free
Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer
2014/606 ( PDF )
A Multi-Function Provable Data Possession Scheme in Cloud Computing
Xiaojun Yu and Qiaoyan Wen
2014/605 ( PDF )
On the Possibilities and Limitations of Computational Fuzzy Extractors
Kenji Yasunaga and Kosuke Yuzawa
2014/604 ( PDF )
Private Web Search with Constant Round Efficiency
Bolam Kang and Sung Cheol Goh and Myungsun Kim
2014/603 ( PDF )
Recursive Trees for Practical ORAM
Tarik Moataz and Erik-Oliver Blass and Guevara Noubir
2014/602 ( PDF )
A Cryptographic Study of Tokenization Systems
Sandra Diaz-Santiago and Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
2014/601 ( PDF )
Adaptive versus Static Security in the UC Model
Ivan Damgård and Jesper Buus Nielsen
2014/600 ( -- withdrawn -- )
DTKI: a new formalized PKI with no trusted parties
Jiangshan Yu and Vincent Cheval and Mark Ryan
2014/599 ( PDF )
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila
2014/598 ( PDF )
Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi
2014/597 ( PDF )
Invisible Adaptive Attacks
Jesper Buus Nielsen and Mario Strefler
2014/596 ( PDF )
Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification
Marina Blanton and Siddharth Saraph
2014/595 ( PDF )
Scalable Zero Knowledge via Cycles of Elliptic Curves
Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
2014/594 ( PDF )
Oblivious Parallel RAM and Applications
Elette Boyle and Kai-Min Chung and Rafael Pass
2014/593 ( PDF )
Improved Exponential-time Algorithms for Inhomogeneous-SIS
Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield
2014/592 ( PDF )
Multiprecision multiplication on AVR revisited
Michael Hutter and Peter Schwabe
2014/591 ( PDF )
Compact and Side Channel Secure Discrete Gaussian Sampling
Sujoy Sinha Roy and Oscar Reparaz and Frederik Vercauteren and Ingrid Verbauwhede
2014/590 ( PDF )
Automated algebraic analysis of structure-preserving signature schemes
Joeri de Ruiter
2014/589 ( PDF )
Authenticated Key Exchange from Ideal Lattices
Jiang Zhang and Zhenfeng Zhang and Jintai Ding and Michael Snook and Özgür Dagdelen
2014/588 ( PDF )
A Punctured Programming Approach to Adaptively Secure Functional Encryption
Brent Waters
2014/587 ( PDF )
Non-interactive zero-knowledge proofs in the quantum random oracle model
Dominique Unruh
2014/586 ( PDF )
An Algebraic Approach to Non-Malleability
Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald
2014/585 ( PDF )
The SPEKE Protocol Revisited
Feng Hao and Siamak F. Shahandashti
2014/584 ( PDF )
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2014/583 ( PDF )
Template Attacks Based On Priori Knowledge
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/582 ( PDF )
NSEC5: Provably Preventing DNSSEC Zone Enumeration
Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv
2014/581 ( PDF )
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
Olivier Blazy and Eike Kiltz and Jiaxin Pan
2014/580 ( PDF )
The Hunting of the SNARK
Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer
2014/579 ( -- withdrawn -- )
Scan Based Side Channel Attack on Grain v1
Sonu Kumar Jha
2014/578 ( PDF )
The Exact PRF-Security of NMAC and HMAC
Peter Gaži and Krzysztof Pietrzak and Michal Rybár
2014/577 ( PDF )
Reducing Communication Overhead of the Subset Difference Scheme
Sanjay Bhattacherjee and Palash Sarkar
2014/576 ( PDF )
Vernam Two
Dan P. Milleville
2014/575 ( PDF )
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
Markku-Juhani O. Saarinen
2014/574 ( PDF )
Security Analysis of Multilinear Maps over the Integers
Hyung Tae Lee and Jae Hong Seo
2014/573 ( PDF )
A new public key system based on Polynomials over finite fields GF(2)
Gurgen Khachatrian
2014/572 ( PDF )
On the Optimality of Differential Fault Analyses on CLEFIA
Juliane Krämer and Anke Stüber and Ágnes Kiss
2014/571 ( PDF )
How to manipulate curve standards: a white paper for the black hat
Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
2014/570 ( PDF )
Deja Q: Using Dual Systems to Revisit q-Type Assumptions
Melissa Chase and Sarah Meiklejohn
2014/569 ( PDF )
Fast Lattice Point Enumeration with Minimal Overhead
Daniele Micciancio and Michael Walter
2014/568 ( PDF )
New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC
Masao KASAHARA
2014/567 ( -- withdrawn -- )
Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation
Hiroaki Anada and Seiko Arita and Kouichi Sakurai
2014/566 ( PDF )
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
Daniel Augot and Matthieu Finiasz
2014/565 ( PDF )
Kangaroos in Side-Channel Attacks
Tanja Lange and Christine van Vredendaal and Marnix Wakker
2014/564 ( -- withdrawn -- )
A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
Massoud Hadian Dehkordi and Reza Ghasemi
2014/563 ( PDF )
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Aleksandar Kircanski
2014/562 ( PDF )
hHB: a Harder HB+ Protocol
Ka Ahmad Khoureich
2014/561 ( PDF )
Performance Increasing Approaches For Binary Field Inversion
Vladislav Kovtun and Maria Bulakh
2014/560 ( PDF )
Towards Forward Security Properties for PEKS and IBE
Qiang Tang
2014/559 ( PDF )
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
Pablo Rauzy and Sylvain Guilley
2014/558 ( PDF )
Double shielded Public Key Cryptosystems
Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang
2014/557 ( PDF )
Round-Efficient Black-Box Construction of Composable Multi-Party Computation
Susumu Kiyoshima
2014/556 ( PDF )
Securing Cloud Data in the New Attacker Model
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
2014/555 ( PDF )
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges
2014/554 ( PDF )
On Virtual Grey Box Obfuscation for General Circuits
Nir Bitansky and Ran Canetti and Yael Tauman-Kalai and Omer Paneth
2014/553 ( PDF )
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
Ran Canetti and Asaf Cohen and Yehuda Lindell
2014/552 ( PDF )
Efficient Record-Level Keyless Signatures for Audit Logs
Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards
2014/551 ( PDF )
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
Daniel Augot and Pierre-Alain Fouque and Pierre Karpman
2014/550 ( PDF )
Function-Private Functional Encryption in the Private-Key Setting
Zvika Brakerski and Gil Segev
2014/549 ( PDF )
New Attacks on the RSA Cryptosystem
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig
2014/548 ( PDF )
Implicit factorization of unbalanced RSA moduli
Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin
2014/547 ( PDF )
Authentication Codes Based on Resilient Boolean Maps
Juan Carlos Ku-Cauich and Guillermo Morales-Luna
2014/546 ( PDF )
Anonymous and Publicly Linkable Reputation Systems
Johannes Blömer and Jakob Juhnke and Christina Kolb
2014/545 ( PDF )
Solving closest vector instances using an approximate shortest independent vectors oracle
Chengliang Tian and Wei Wei and Dongdai Lin
2014/544 ( PDF )
Secure Mutual Testing Strategy for Cryptographic SoCs
Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede
2014/543 ( PDF )
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
2014/542 ( PDF )
On the Multi-output Filtering Model and Its Applications
Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu
2014/541 ( PDF )
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto Nagata and Takafumi Aoki
2014/540 ( PDF )
Optimized Architecture for AES
Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey
2014/539 ( PDF )
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption
Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang
2014/538 ( -- withdrawn -- )
A Secure Cloud-based NFC Mobile Payment Protocol
pardis pourghomi and muhammad qasim saeed and george ghinea
2014/537 ( PDF )
Constrained Verifiable Random Functions
Georg Fuchsbauer
2014/536 ( PDF )
On Decomposition of an NFSR into a Cascade Connection of Two Smaller
Tian Tian and Wen-Feng Qi
2014/535 ( PDF )
On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
Massimo Chenal and Qiang Tang
2014/534 ( PDF )
Differential Power Analysis of a McEliece Cryptosystem
Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
2014/533 ( PDF )
Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions
Jaiganesh Balasundaram
2014/532 ( -- withdrawn -- )
On the Pitfalls of using Arbiter-PUFs as Building Blocks
Georg T. Becker
2014/531 ( PDF )
Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
Paolo Palmieri and Luca Calderoni and Dario Maio
2014/530 ( PDF )
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap
2014/529 ( PDF )
Leakage-Resilient Signatures with Graceful Degradation
Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
2014/528 ( PDF )
Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups
Xiaofeng Wang and Chen Xu and Guo Li and Hanling Lin
2014/527 ( PDF )
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
Annelie Heuser and Olivier Rioul and Sylvain Guilley
2014/526 ( PDF )
Curve41417: Karatsuba revisited
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
2014/525 ( PDF )
Differential Analysis on Block Cipher PRIDE
Jingyuan Zhao and Xiaoyun Wang and Meiqin Wang and Xiaoyang Dong
2014/524 ( PDF )
Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Chunming Tang and Yanfeng Qi
2014/523 ( PDF )
Fully Secure and Fast Signing from Obfuscation
Kim Ramchen and Brent Waters
2014/522 ( PDF )
Constrained Pseudorandom Functions: Verifiable and Delegatable
Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
2014/521 ( PDF )
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
Susan Hohenberger and Venkata Koppula and Brent Waters
2014/520 ( PDF )
Squares of Random Linear Codes
Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Zémor
2014/519 ( PDF )
Realizing Pico: Finally No More Passwords!
Jens Hermans and Roel Peeters
2014/518 ( PDF )
Cryptography from Compression Functions: The UCE Bridge to the ROM
Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
2014/517 ( PDF )
On the Connection between Leakage Tolerance and Adaptive Security
Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
2014/516 ( PDF )
On the Classification of Finite Boolean Functions up to Fairness
Nikolaos Makriyannis
2014/515 ( -- withdrawn -- )
Ideal Social Secret Sharing Using Birkhoff Interpolation Method
Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian
2014/514 ( PDF )
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili
2014/513 ( PDF )
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
Noboru Kunihiro and Junya Honda
2014/512 ( PDF )
Rmind: a tool for cryptographically secure statistical analysis
Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk
2014/511 ( PDF )
Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
Johannes Blömer and Gennadij Liske
2014/510 ( PDF )
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
Pratish Datta and Dibyendu Roy and Sourav Mukhopadhyay
2014/509 ( PDF )
Privacy preserving delegated word search in the cloud
Kaoutar Elkhiyaoui and Melek Onen and Refik Molva
2014/508 ( PDF )
Reversing Stealthy Dopant-Level Circuits
Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino
2014/507 ( PDF )
How to Generate and use Universal Samplers
Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry
2014/506 ( PDF )
Finding Roots in GF(p^n) with the Successive Resultant Algorithm
Christophe Petit
2014/505 ( PDF )
On the quaternion $\ell$-isogeny path problem
David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
2014/504 ( PDF )
A Provable Security Analysis of Intel's Secure Key RNG
Thomas Shrimpton and R. Seth Terashima
2014/503 ( PDF )
Efficient Hidden Vector Encryption with Constant-Size Ciphertext
Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo
2014/502 ( PDF )
What's the Gist? Privacy-Preserving Aggregation of User Profiles
Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun
2014/501 ( PDF )
WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time
Markku--Juhani O. Saarinen and Billy Bob Brumley
2014/500 ( -- withdrawn -- )
Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
Can Xiang and Chunming Tang
2014/499 ( PDF )
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş
2014/498 ( PDF )
Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix
Souvik Kolay and Debdeep Mukhopadhyay
2014/497 ( PDF )
NREPO:Normal Basis Recomputing with Permuted Operands
Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin and Ramesh Karri
2014/496 ( PDF )
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo
2014/495 ( PDF )
Improved Short Lattice Signatures in the Standard Model
Léo Ducas and Daniele Micciancio
2014/494 ( PDF )
Hardness of k-LWE and Applications in Traitor Tracing
San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld
2014/493 ( PDF )
Arithmetic on Abelian and Kummer Varieties
David Lubicz and Damien Robert
2014/492 ( PDF )
Fault attacks on pairing-based protocols revisited
Sanjit Chatterjee and Koray Karabina and Alfred Menezes
2014/491 ( PDF )
Bootstrappable Identity-Based Fully Homomorphic Encryption
Michael Clear and Ciarán McGoldrick
2014/490 ( PDF )
Universally Composable secure TNC protocol based on IF-T binding to TLS
Shijun Zhao and Qianying Zhang and Yu Qin and Dengguo Feng
2014/489 ( PDF )
A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge
Dan Ding and Guizhen Zhu and Xiaoyun Wang
2014/488 ( PDF )
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue and Kenneth G. Paterson
2014/487 ( PDF )
GGHLite: More Efficient Multilinear Maps from Ideal Lattices
Adeline Langlois and Damien Stehle and Ron Steinfeld
2014/486 ( PDF )
Binary Elligator Squared
Diego F. Aranha and Pierre-Alain Fouque and Chen Qian and Mehdi Tibouchi and Jean-Christophe Zapalowicz
2014/485 ( PDF )
An Improved Truncated Di fferential Cryptanalysis of KLEIN
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref
2014/484 ( PDF )
Sealing the Leak on Classical NTRU Signatures
Carlos Aguilar Melchor and Xavier Boyen and Jean-Christophe Deneuville and Philippe Gaborit
2014/483 ( PDF )
Disjunctions for Hash Proof Systems: New Constructions and Applications
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/482 ( PDF )
Differentially Private Data Aggregation with Optimal Utility
Fabienne Eigner and Aniket Kate and Matteo Maffei and Francesca Pampaloni and Ivan Pryvalov
2014/481 ( PDF )
Universally Composable Non-Interactive Key Exchange
Eduarda S.V. Freire and Julia Hesse and Dennis Hofheinz
2014/480 ( PDF )
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
2014/479 ( PDF )
Even more practical secure logging: Tree-based Seekable Sequential Key Generators
Giorgia Azzurra Marson and Bertram Poettering
2014/478 ( PDF )
Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
Benny Applebaum and Eyal Widder
2014/477 ( PDF )
Relaxed Two-to-one Recoding Schemes
Omkant Pandey and Kim Ramchen and Brent Waters
2014/476 ( PDF )
Simon's Circuit
Paul Baecher
2014/475 ( PDF )
A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
Imran Erguler
2014/474 ( PDF )
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Alex Biryukov and Charles Bouillaguet and Dmitry Khovratovich
2014/473 ( -- withdrawn -- )
An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
2014/472 ( PDF )
How to Watermark Cryptographic Functions
Ryo Nishimaki
2014/471 ( -- withdrawn -- )
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
2014/470 ( PDF )
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Au
2014/469 ( PDF )
Homomorphic Signatures with Efficient Verification for Polynomial Functions
Dario Catalano, Dario Fiore, and Bogdan Warinschi
2014/468 ( PDF )
Privacy-Preserving Auditing for Attribute-Based Credentials
Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
2014/467 ( PDF )
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Daniel Demmler and Thomas Schneider and Michael Zohner
2014/466 ( PDF )
On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.
Samir Bouftass and Abdelhak Azhari
2014/465 ( PDF )
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
Jie Chen and Hoeteck Wee
2014/464 ( PDF )
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng
2014/463 ( PDF )
(Leveled) Fully Homomorphic Signatures from Lattices
Sergey Gorbunov and Vinod Vaikuntanathan
2014/462 ( PDF )
Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps
Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
2014/461 ( -- withdrawn -- )
Provably secure and efficient certificateless signature in the standard model
Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
2014/460 ( PDF )
FleXOR: Flexible garbling for XOR gates that beats free-XOR
Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek
2014/459 ( PDF )
Template Attacks on Different Devices
Omar Choudary and Markus G. Kuhn
2014/458 ( PDF )
Automated Analysis of Cryptographic Assumptions in Generic Group Models
Gilles Barthe and Edvard Fagerholm and Dario Fiore and John Mitchell and Andre Scedrov and Benedikt Schmidt
2014/457 ( PDF )
Transcript secure signatures based on modular lattices
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte
2014/456 ( PDF )
Verified Implementations for Secure and Verifiable Computation
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Guillaume Davy and François Dupressoir and Benjamin Grégoire and Pierre-Yves Strub
2014/455 ( PDF )
Single-shot security for one-time memories in the isolated qubits model
Yi-Kai Liu
2014/454 ( PDF )
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
Amir Moradi and Vincent Immler
2014/453 ( PDF )
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version
Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yalçın
2014/452 ( PDF )
Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake
Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld
2014/451 ( PDF )
Leveled Fully Homomorphic Signatures from Standard Lattices
Daniel Wichs
2014/450 ( -- withdrawn -- )
Optimized Implementation of General Secret Sharing Scheme
Lein Harn and Ching-Fang Hsu*
2014/449 ( -- withdrawn -- )
Related Key Secure PKE from Hash Proof Systems
Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
2014/448 ( PDF )
Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
Ning Wang and Xiaoyun Wang and Keting Jia and Jingyuan Zhao
2014/447 ( PDF )
Faster Private Set Intersection based on OT Extension
Benny Pinkas and Thomas Schneider and Michael Zohner
2014/446 ( PDF )
4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes
Valerie Nachef and Jacques Patarin and Emmanuel Volte
2014/445 ( PDF )
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Ràfols and Andy Rupp
2014/444 ( PDF )
RPKI vs ROVER: Comparing the Risks of BGP Security Solutions
Aanchal Malhotra and Sharon Goldberg
2014/443 ( PDF )
Minimizing the Two-Round Even-Mansour Cipher
Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger
2014/442 ( PDF )
Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix
Xing Hu and Chunming Tang
2014/441 ( PDF )
Improved Generic Attacks Against Hash-based MACs and HAIFA
Itai Dinur and Gaëtan Leurent
2014/440 ( PDF )
Double Level Montgomery Cox-Rower Architecture, New Bounds
Jean-Claude Bajard and Nabil Merkiche
2014/439 ( PDF )
Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions
Chunming Tang, Yuenai Chen
2014/438 ( PDF )
Security of Symmetric Encryption against Mass Surveillance
Mihir Bellare and Kenneth Paterson and Phillip Rogaway
2014/437 ( PDF )
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Jingguo Bi and Jean-Sébastien Coron and Jean-Charles Faugère and Phong Q. Nguyen and Guénaël Renault and Rina Zeitoun
2014/436 ( PDF )
Synthesis of Fault Attacks on Cryptographic Implementations
Gilles Barthe and Francois Dupressoir and Pierre-Alain Fouque and Benjamin Gregoire and Jean-Christophe Zapalowicz
2014/435 ( PDF )
Wait a minute! A fast, Cross-VM attack on AES
Gorka Irazoqui and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
2014/434 ( PDF )
Just a Little Bit More
Joop van de Pol and Nigel P. Smart and Yuval Yarom
2014/433 ( PDF )
A Statistical Model for Higher Order DPA on Masked Devices
A. Adam Ding and Liwei Zhang and Yunsi Fei and Pei Luo
2014/432 ( PDF )
Universally Composable Authentication and Key-exchange with Global PKI
Ran Canetti and Daniel Shahaf and Margarita Vald
2014/431 ( PDF )
A Low-Latency, Low-Area Hardware Oblivious RAM Controller
Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten van Dijk and Emil Stefanov and Dimitrios Serpanos  and Srinivas Devadas
2014/430 ( PDF )
Revisiting the Gentry-Szydlo Algorithm
H. W. Lenstra and A. Silverberg
2014/429 ( PDF )
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven
2014/428 ( PDF )
Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
Nuttapong Attrapadung
2014/427 ( PDF )
Fast point multiplication algorithms for binary elliptic curves with and without precomputation
Thomaz Oliveira and Diego F. Aranha and Julio López and Francisco Rodríguez-Henríquez
2014/426 ( PDF )
Towards Optimally Efficient Secret-Key Authentication from PRG
Ivan Damgård and Sunoo Park
2014/425 ( PDF )
Note of Multidimensional MITM Attack on 25-Round TWINE-128
Long Wen and Meiqin Wang and Andrey Bogdanov and Huaifeng Chen
2014/424 ( PDF )
Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants
Craig Costello and Alyson Deines-Schartz and Kristin Lauter and Tonghai Yang
2014/423 ( PDF )
The Hash Function "Fugue"
Shai Halevi and William E. Hall and Charanjit S. Jutla
2014/422 ( PDF )
System-level non-interference for constant-time cryptography
Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Carlos Luna and David Pichardie
2014/421 ( PDF )
FNR : Arbitrary length small domain block cipher proposal
Sashank Dara, Scott Fluhrer
2014/420 ( PDF )
Bounded Fully Homomorphic Signature Schemes
Xiang Xie and Rui Xue
2014/419 ( PDF )
FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve
Jérémie Detrey
2014/418 ( PDF )
A Simple Recursive Tree Oblivious RAM
Benny Pinkas and Tzachy Reinman
2014/417 ( PDF )
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions
Inna Polak, Adi Shamir
2014/416 ( PDF )
Adaptive Security of Constrained PRFs
Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao
2014/415 ( PDF )
Virtual Proofs of Reality
Ulrich Rührmair
2014/414 ( PDF )
A Security Proof of KCDSA using an extended Random Oracle Model
Vikram Singh
2014/413 ( PDF )
On the Cost of Lazy Engineering for Masked Software Implementations
Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and François-Xavier Standaert
2014/412 ( PDF )
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Jean-Baptiste Mairy and Yves Deville
2014/411 ( PDF )
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)
Vincent Grosso and Romain Poussier and François-Xavier Standaert and Lubos Gaspar
2014/410 ( PDF )
Soft Analytical Side-Channel Attacks
Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
2014/409 ( PDF )
Moments-Correlating DPA
Amir Moradi and François-Xavier Standaert
2014/408 ( PDF )
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q
Emmanuela Orsini and Joop van de Pol and Nigel P. Smart
2014/407 ( PDF )
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
Fu-Kuo Tseng and Rong-Jaye Chen and Bao-Shuh Paul Lin
2014/406 ( PDF )
New Generic Attacks Against Hash-based MACs
Gaëtan Leurent and Thomas Peyrin and Lei Wang
2014/405 ( PDF )
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Christina Brzuska and Arno Mittelbach
2014/404 ( PDF )
Large-Scale Secure Computation
Elette Boyle and Kai-Min Chung and Rafael Pass
2014/403 ( PDF )
Generic Universal Forgery Attack on Iterative Hash-based MACs
Thomas Peyrin and Lei Wang
2014/402 ( PDF )
On the Existence of Extractable One-Way Functions
Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
2014/401 ( PDF )
Software implementation of an Attribute-Based Encryption scheme
Eric Zavattoni and Luis J. Dominguez Perez and Shigeo Mitsunari and Ana H. Sánchez-Ramírez and Tadanori Teruya and Francisco Rodríguez-Henríquez
2014/400 ( PDF )
Composable Oblivious Extended Permutations
Peeter Laud and Jan Willemson
2014/399 ( PDF )
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Dustin Moody and Ray Perlner and Daniel Smith-Tone
2014/398 ( PDF )
Differential Properties of the HFE Cryptosystem
Taylor Daniels and Daniel Smith-Tone
2014/397 ( PDF )
Cofactorization on Graphics Processing Units
Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra
2014/396 ( PDF )
Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs
Helger Lipmaa
2014/395 ( PDF )
Lightweight and Privacy-Preserving Delegatable Proofs of Storage
Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong
2014/394 ( PDF )
Relational Hash
Avradip Mandal and Arnab Roy
2014/393 ( PDF )
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
2014/392 ( PDF )
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
2014/391 ( PDF )
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
2014/390 ( PDF )
Black-Box Non-Black-Box Zero Knowledge
Vipul Goyal and Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti
2014/389 ( PDF )
Accelerating NTRU based Homomorphic Encryption using GPUs
Wei Dai and Yarkın Doröz and Berk Sunar
2014/388 ( PDF )
Finding collisions for MD4 hash algorithm using hybrid algorithm
Marko Carić
2014/387 ( PDF )
New candidates for multivariate trapdoor functions
Jaiberth Porras, John B. Baena, Jintai Ding
2014/386 ( PDF )
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede
2014/385 ( PDF )
Jacobian Coordinates on Genus 2 Curves
Huseyin Hisil and Craig Costello
2014/384 ( PDF )
Yao's millionaires' problem and decoy-based public key encryption by classical physics
Dima Grigoriev and Vladimir Shpilrain
2014/383 ( PDF )
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Younsung Choi, Dongho Won
2014/382 ( PDF )
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
Felix Günther and Mark Manulis and Andreas Peter
2014/381 ( PDF )
Using Indistinguishability Obfuscation via UCEs
Christina Brzuska and Arno Mittelbach
2014/380 ( PDF )
Efficient Adaptively Secure IBBE from Standard Assumptions
Somindu C. Ramanna and Palash Sarkar
2014/379 ( PDF )
Hyper-and-elliptic-curve cryptography
Daniel J. Bernstein and Tanja Lange
2014/378 ( -- withdrawn -- )
Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps
SK Hafizul Islam
2014/377 ( PDF )
Logic Synthesis based Public Key Scheme
Boaz Shahar
2014/376 ( PDF )
How Secure is Deterministic Encryption?
Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi
2014/375 ( PDF )
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2014/374 ( PDF )
Optimal Contracts for Outsourced Computation
Viet Pham and MHR. Khouzani and Carlos Cid
2014/373 ( PDF )
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Philipp Jovanovic and Atul Luykx and Bart Mennink
2014/372 ( PDF )
Fully secure constrained pseudorandom functions using random oracles
Dennis Hofheinz
2014/371 ( PDF )
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
Christophe Doche
2014/370 ( PDF )
Compact VSS and Efficient Homomorphic UC Commitments
Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen
2014/369 ( PDF )
On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness
Michèle Feltz and Cas Cremers
2014/368 ( PDF )
Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster
Erich Wenger and Paul Wolfger
2014/367 ( PDF )
Redefining the Transparency Order
Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff
2014/366 ( PDF )
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
Younsung Choi and Dongho Won
2014/365 ( PDF )
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
Luke Mather and Elisabeth Oswald and Carolyn Whitnall
2014/364 ( PDF )
Deleting Secret Data with Public Verifiability
Feng Hao and Dylan Clarke and Avelino Francisco Zorzo
2014/363 ( PDF )
Forging Attacks on two Authenticated Encryptions COBRA and POET
Mridul Nandi
2014/362 ( PDF )
Nothing is for Free: Security in Searching Shared & Encrypted Data
Qiang Tang
2014/361 ( PDF )
New Results in the Linear Cryptanalysis of DES
Igor Semaev
2014/360 ( PDF )
McEliece in the world of Escher
Danilo Gligoroski and Simona Samardjiska and Håkon Jacobsen and Sergey Bezzateev
2014/359 ( PDF )
Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations
Eduardo Ruiz Duarte and Octavio Páez Osuna
2014/358 ( PDF )
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Kim-Kwang Raymond Choo and Junghyun Nam and Dongho Won
2014/357 ( PDF )
Simulatable Leakage: Analysis, Pitfalls, and new Constructions
J. Longo Galea and D. Martin and E. Oswald and D. Page and M. Stam and and M. Tunstall
2014/356 ( PDF )
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy
2014/355 ( PDF )
Graph-theoretic design and analysis of key predistribution schemes
Michelle Kendall and Keith M. Martin
2014/354 ( PDF )
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
Ray Perlner
2014/353 ( PDF )
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups
Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
2014/352 ( PDF )
Multi-Vendor PayWord with Payment Approval
Andrea Huszti
2014/351 ( PDF )
Secret and Verifiable Delegated Voting for Wide Representation
Yefim Leifman
2014/350 ( PDF )
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
Franziskus Kiefer and Mark Manulis
2014/349 ( PDF )
Zerocash: Decentralized Anonymous Payments from Bitcoin
Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza
2014/348 ( PDF )
A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
Helger Lipmaa
2014/347 ( PDF )
One-Way Functions and (Im)perfect Obfuscation
Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev
2014/346 ( PDF )
Time-Memory Trade-offs for Index Calculus in Genus 3
Kim Laine and Kristin Lauter
2014/345 ( PDF )
Private Database Access With HE-over-ORAM Architecture
Craig Gentry and Shai Halevi and Charanjit Jutla and Mariana Raykova
2014/344 ( PDF )
Toward Robust Hidden Volumes using Write-Only Oblivious RAM
Erik-Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu
2014/343 ( PDF )
Solving Linear Equations Modulo Unknown Divisors: Revisited
Yao Lu and Rui Zhang and Liqiang Peng and Dongdai Lin
2014/342 ( PDF )
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
2014/341 ( PDF )
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2014/340 ( PDF )
A Strong and Efficient Certificateless Digital Signature Scheme
Mohammed Alfateh Hassouna and Mohsin Hashim
2014/339 ( -- withdrawn -- )
Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds
Yi Deng
2014/338 ( PDF )
A Tamper and Leakage Resilient von Neumann Architecture
Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
2014/337 ( PDF )
Related Randomness Attacks for Public Key Encryption
Kenneth G. Paterson and Jacob C.N. Schuldt and Dale L. Sibborn
2014/336 ( PDF )
Private Predictive Analysis on Encrypted Medical Data
Joppe W. Bos and Kristin Lauter and Michael Naehrig
2014/335 ( PDF )
SHADOW NUMBERS PUBLIC KEY ENCRYPTION
John Almeida
2014/334 ( PDF )
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures
Rachid El~Bansarkhani and Johannes Buchmann
2014/333 ( PDF )
An optimal representation for the trace zero subgroup
Elisa Gorla and Maike Massierer
2014/332 ( PDF )
How to Choose Interesting Points for Template Attacks?
Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng
2014/331 ( PDF )
Machine Learning Classification over Encrypted Data
Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser
2014/330 ( PDF )
Noncentralized Cryptocurrency wtih No Blockchain
qianxiaochao
2014/329 ( PDF )
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
Berry Schoenmakers
2014/328 ( PDF )
Affine-evasive Sets Modulo a Prime
Divesh Aggarwal
2014/327 ( PDF )
An Optimal Strong Password Authentication Protocol with USB Sticks
Vikram D
2014/326 ( PDF )
FeW: A Lightweight Block Cipher
Manoj Kumar and Saibal K Pal and Anupama Panigrahi
2014/325 ( PDF )
A practical forgery and state recovery attack on the authenticated cipher PANDA-s
Xiutao FENG, Fan ZHANG and Hui WANG
2014/324 ( PDF )
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
Sandro Coretti and Ueli Maurer and Björn Tackmann and Daniele Venturi
2014/323 ( PDF )
Some Remarks on Honeyword Based Password-Cracking Detection
Imran Erguler
2014/322 ( PDF )
Coding Theoretic Construction of Quantum Ramp Secret Sharing
Ryutaroh Matsumoto
2014/321 ( PDF )
Efficient Quantum-Immune Keyless Signatures with Identity
Ahto Buldas and Risto Laanoja and Ahto Truu
2014/320 ( PDF )
Improved Differential Cryptanalysis of Round-Reduced Speck
Itai Dinur
2014/319 ( PDF )
Preimage attacks on Reduced-round Stribog
Riham AlTawy and Amr M. Youssef
2014/318 ( PDF )
Index calculus in the trace zero variety
Elisa Gorla and Maike Massierer
2014/317 ( PDF )
Analysis of NORX: Investigating Differential and Rotational Properties
Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves
2014/316 ( PDF )
Explicit Non-Malleable Codes Resistant to Permutations
Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
2014/315 ( PDF )
Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R
Bartosz Zoltak
2014/314 ( PDF )
Improved Leakage Model Based on Genetic Algorithm
Zhenbin Zhang and Liji Wu and An Wang and Zhaoli Mu
2014/313 ( PDF )
On the Complexity of Finding Low-Level Solutions
Bjoern Grohmann
2014/312 ( PDF )
Structure-Preserving Signatures from Type II Pairings
Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
2014/311 ( PDF )
Exponent-inversion Signatures and IBE under Static Assumptions
Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu
2014/310 ( PDF )
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
Yu Chen and Qiong Huang and Zongyang Zhang
2014/309 ( PDF )
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters
2014/308 ( PDF )
The Locality of Searchable Symmetric Encryption
David Cash and Stefano Tessaro
2014/307 ( PDF )
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
Alessandro Barenghi and Gerardo Pelosi and Francesco Regazzoni
2014/306 ( PDF )
Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen and Zongyang Zhang
2014/305 ( PDF )
Collision Attack on 5 Rounds of Grøstl
Florian Mendel and Vincent Rijmen and Martin Schläffer
2014/304 ( PDF )
Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead
Dai Ikarashi and Ryo Kikuchi and Koki Hamada and Koji Chida
2014/303 ( -- withdrawn -- )
On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems
SK Hafizul Islam
2014/302 ( PDF )
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Maria Eichlseder and Florian Mendel and Martin Schläffer
2014/301 ( PDF )
How to Avoid Obfuscation Using Witness PRFs
Mark Zhandry
2014/300 ( PDF )
On the Powers of 2
Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
2014/299 ( PDF )
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2014/298 ( PDF )
Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
Ignacio Cascudo and Ronald Cramer and Chaoping Xing
2014/297 ( PDF )
Pipelineable On-Line Encryption
Farzaneh Abed and Scott Fluhrer and Christian Forler and Eik List and Stefan Lucks and David McGrew and Jakob Wenzel
2014/296 ( PDF )
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding
Andris Ambainis and Ansis Rosmanis and Dominique Unruh
2014/295 ( PDF )
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
Nir Bitansky and Omer Paneth
2014/294 ( PDF )
The M3lcrypt Password Based Key Derivation Function
Isaiah Makwakwa
2014/293 ( -- withdrawn -- )
An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol
Xi-Jun Lin and Lin Sun
2014/292 ( PDF )
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256
Leibo Li and Keting Jia
2014/291 ( PDF )
Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗
Antonio Sanso
2014/290 ( PDF )
Reliable Broadcast with Respect to Topology Knowledge
Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2014/289 ( PDF )
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
Ivan Damgaard and Rasmus Lauritsen, and Tomas Toft
2014/288 ( PDF )
Resilient Aggregation in Simple Linear Sensor Networks
Kevin J. Henry and Douglas R. Stinson
2014/287 ( PDF )
Active and Passive Side-Channel Attacks on Delay Based PUF Designs
Georg T, Becker and Raghavan Kumar
2014/286 ( PDF )
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
Martin Stanek
2014/285 ( PDF )
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
David Derler and Christian Hanser and Daniel Slamanig
2014/284 ( PDF )
Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way
Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam
2014/283 ( PDF )
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie
2014/282 ( PDF )
On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation
Ivan Damgård and Frédéric Dupuis and Jesper Buus Nielsen
2014/281 ( PDF )
WCFB: a tweakable wide block cipher
Andrey Jivsov
2014/280 ( PDF )
MSEA: Modified Symmetric Encryption Algorithm
Rajul Kumar and K. K. Mishra and Ashish Tripathi and Abhinav Tomar and Surendra Singh
2014/279 ( PDF )
Improved Impossible Differential Attacks against Round-Reduced LBlock
Christina Boura and Marine Minier and María Naya-Plasencia and Valentin Suder
2014/278 ( PDF )
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Essam Ghadafi
2014/277 ( PDF )
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
Lin Ding and Chenhui Jin and Jie Guan and Chuanda Qi
2014/276 ( PDF )
Design of identity-based digital signature schemes using extended chaotic maps
SK Hafizul Islam
2014/275 ( PDF )
Identity-based encryption and digital signature schemes using extended chaotic maps
SK Hafizul Islam
2014/274 ( PDF )
Weak instances of composite order protocols
Sorina Ionica and Malika Izabachène
2014/273 ( PDF )
Witness Encryption from Instance Independent Assumptions
Craig Gentry and Allison Bishop Lewko and Brent Waters
2014/272 ( PDF )
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
2014/271 ( PDF )
STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
Markku-Juhani O. Saarinen
2014/270 ( PDF )
Faster Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen
2014/269 ( PDF )
Chosen Ciphertext Security via Point Obfuscation
Takahiro Matsuda and Goichiro Hanaoka
2014/268 ( PDF )
New bit-parallel Montgomery multiplier for trinomials using squaring operation
Yin Li and Yiyang Chen
2014/267 ( PDF )
Differential Fault Analysis on the families of SIMON and SPECK ciphers
Harshal Tupsamudre and Shikha Bisht and Debdeep Mukhopadhyay
2014/266 ( PDF )
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption
Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Srebrny and Marcin Wojcik
2014/265 ( PDF )
Dual System Groups and its Applications --- Compact HIBE and More
Jie Chen and Hoeteck Wee
2014/264 ( PDF )
Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
Janaka Alawatugoda and Colin Boyd and Douglas Stebila
2014/263 ( PDF )
A Generic Scan Attack on Hardware based eStream Winners
Sandip Karmakar and Dipanwita Roy Chowdhury
2014/262 ( PDF )
Differential Fault Analysis of MICKEY Family of Stream Ciphers
Sandip Karmakar and Dipanwita Roy Chowdhury
2014/261 ( PDF )
Fault Analysis of Grain Family of Stream Ciphers
Sandip Karmakar and Dipanwita Roy Chowdhury
2014/260 ( PDF )
Locally Decodable Codes for edit distance
Rafail Ostrovsky and Anat Paskin-Cherniavsky
2014/259 ( PDF )
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
2014/258 ( PDF )
A realtime key recovery attack on the authenticated cipher FASER128
Xiutao FENG and Fan ZHANG
2014/257 ( PDF )
Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
Bruce Kallick
2014/256 ( PDF )
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
2014/255 ( PDF )
Certification and Efficient Proofs of Committed Topology Graphs
Thomas Gross
2014/254 ( PDF )
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Thomas Pöppelmann and Léo Ducas and Tim Güneysu
2014/253 ( -- withdrawn -- )
Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems
Fangquan Cheng and Qian Wang and Kui Ren and Zhiyong Peng
2014/252 ( PDF )
Making RSA-PSS Provably Secure Against Non-Random Faults
Gilles Barthe and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Mehdi Tibouchi and Jean-Christophe Zapalowicz
2014/251 ( PDF )
Forgery on Stateless CMCC
Guy Barwell
2014/250 ( PDF )
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Boaz Tsaban and Noam Lifshitz
2014/249 ( PDF )
Linear Extension Cube Attack on Stream Ciphers
Liren Ding, Yongjuan Wang, Zhufeng Li
2014/248 ( PDF )
Fine grain Cross-VM Attacks on Xen and VMware are possible!
Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
2014/247 ( PDF )
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
Ivan Pryvalov and Aniket Kate
2014/246 ( PDF )
Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
Kwangsu Lee and Dong Hoon Lee
2014/245 ( PDF )
A practical state recovery attack on the stream cipher Sablier v1
Xiutao FENG and Fan ZHANG
2014/244 ( PDF )
bitcoin.BitMint: Reconciling Bitcoin with Central Banks
Gideon Samid
2014/243 ( PDF )
Reusable Fuzzy Extractors for Low-Entropy Distributions
Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam Smith
2014/242 ( PDF )
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
Franziskus Kiefer and Mark Manulis
2014/241 ( PDF )
A New Way to Prevent UKS Attacks Using Trusted Computing
Qianying Zhang and Shijun Zhao and Dengguo Feng
2014/240 ( PDF )
Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
Martin Pettai and Peeter Laud
2014/239 ( PDF )
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
Florian Legendre and Gilles Dequen and Michaël Krajecki
2014/238 ( PDF )
High Parallel Complexity Graphs and Memory-Hard Functions
Joël Alwen and Vladimir Serbinenko
2014/237 ( PDF )
SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
Aydin Aysu and Ege Gulcan and Patrick Schaumont
2014/236 ( PDF )
Linear Sequential Circuit Approximation of Acterbahn Stream Cipher
Shazia Afreen
2014/235 ( PDF )
Efficient Fuzzy Search on Encrypted Data
Alexandra Boldyreva and Nathan Chenette
2014/234 ( PDF )
Enhancing Oblivious RAM Performance Using Dynamic Prefetching
Xiangyao Yu and Ling Ren and Christopher Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas
2014/233 ( PDF )
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar
2014/232 ( PDF )
Bandwidth Efficient PIR from NTRU
Yarkın Doröz, Berk Sunar and Ghaith Hammouri
2014/231 ( PDF )
Self-Updatable Encryption with Short Public Parameters and Its Extensions
Kwangsu Lee
2014/230 ( PDF )
Isogeny graphs with maximal real multiplication
Sorina Ionica and Emmanuel Thomé
2014/229 ( -- withdrawn -- )
Investigating the Feasibility of LEAP+ in ZigBee Specification
Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi
2014/228 ( PDF )
Cryptanalysis of SP Networks with Partial Non-Linear Layers
Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban
2014/227 ( -- withdrawn -- )
CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks
Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi
2014/226 ( PDF )
Weak-Key Analysis of POET
Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser
2014/225 ( PDF )
Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption
Tapas Pandit and Rana Barua
2014/224 ( PDF )
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
Henry Carter and Charles Lever and Patrick Traynor
2014/223 ( PDF )
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
Léo Perrin and Dmitry Khovratovich
2014/222 ( PDF )
Optimizing Obfuscation: Avoiding Barrington's Theorem
Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai
2014/221 ( PDF )
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
Toomas Krips and Jan Willemson
2014/220 ( PDF )
Total Break of Zorro using Linear and Differential Attacks
Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
2014/219 ( PDF )
Dynamic Searchable Encryption via Blind Storage
Muhammad Naveed and Manoj Prabhakaran and Carl A. Gunter
2014/218 ( PDF )
A Practical Universal Forgery Attack against PAES-8
Yu Sasaki and Lei Wang
2014/217 ( PDF )
A Forgery Attack against PANDA-s
Yu Sasaki and Lei Wang
2014/216 ( PDF )
Implementation and Improvement of the Partial Sum Attack on 6-round AES
Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala
2014/215 ( PDF )
Attack On the Markov Problem
James L. Adams
2014/214 ( PDF )
Squaring Algorithms with Delayed Carry Method and Efficient Parallelization
Vladislav Kovtun and Andrew Okhrimenko
2014/213 ( PDF )
Secret-Sharing for NP
Ilan Komargodski and Moni Naor and Eylon Yogev
2014/212 ( PDF )
Remarks on the Pocklington and Padró-Sáez Cube Root Algorithm in $\mathbb F_q$
Geon Heo and Seokhwan Choi and Kwang Ho Lee and Namhun Koo and Soonhak Kwon
2014/211 ( PDF )
Some Randomness Experiments on TRIVIUM
Subhabrata Samajder and Palash Sarkar
2014/210 ( PDF )
Structural Cryptanalysis of McEliece Schemes with Compact Keys
Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
2014/209 ( PDF )
A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation
Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung
2014/208 ( PDF )
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
Ding Wang and Ping Wang
2014/207 ( PDF )
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
Katsuyuki Takashima
2014/206 ( PDF )
Reconsidering Generic Composition
Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton
2014/205 ( PDF )
Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness
Ling Ren and Christopher Fletcher and Xiangyao Yu and Albert Kwon and Marten van Dijk and Srinivas Devadas
2014/204 ( PDF )
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
Colin O'Flynn and Zhizhang (David) Chen
2014/203 ( PDF )
Privacy-Preserving Implicit Authentication
Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti
2014/202 ( PDF )
Efficiently Verifiable Computation on Encrypted Data
Dario Fiore and Rosario Gennaro and Valerio Pastro
2014/201 ( PDF )
From Input Private to Universally Composable Secure Multiparty Computation Primitives
Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen
2014/200 ( PDF )
Automatic Protocol Selection in Secure Two-Party Computations
Florian Kerschbaum and Thomas Schneider and Axel Schröpfer
2014/199 ( PDF )
Doubly Spatial Encryption from DBDH
Jie Chen and Hoeteck Wee
2014/198 ( PDF )
Fast GPGPU-Based Elliptic Curve Scalar Multiplication
Eric M. Mahé and Jean-Marie Chauvet
2014/197 ( PDF )
Breaking POET Authentication with a Single Query
Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei
2014/196 ( -- withdrawn -- )
Crypto-Multimedia
Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif Ismaili
2014/195 ( PDF )
Low Overhead Broadcast Encryption from Multilinear Maps
Dan Boneh and Brent Waters and Mark Zhandry
2014/194 ( PDF )
Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
Sai Raghu Talluri and Swapnoneel Roy
2014/193 ( PDF )
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri
2014/192 ( PDF )
Two-sources Randomness Extractors for Elliptic Curves
Abdoul Aziz Ciss
2014/191 ( PDF )
Side-Channel Analysis on Blinded Regular Scalar Multiplications
Benoit Feix and Mylène Roussellet and Alexandre Venelli
2014/190 ( PDF )
The Temperature Side Channel and Heating Fault Attacks
Michael Hutter and Jörn-Marc Schmidt
2014/189 ( PDF )
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
2014/188 ( PDF )
A Second Look at Fischlin's Transformation
Özgür Dagdelen and Daniele Venturi
2014/187 ( PDF )
FFT-Based Key Recovery for the Integral Attack
Yosuke Todo
2014/186 ( PDF )
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser
2014/185 ( PDF )
Oblivious Data Structures
Xiao Shaun Wang and Kartik Nayak and Chang Liu and T-H. Hubert Chan and Elaine Shi and Emil Stefanov and Yan Huang
2014/184 ( PDF )
SETUP in Secret Sharing Schemes using Random Values
Ruxandra F. Olimid
2014/183 ( PDF )
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
Tetsu Iwata and Lei Wang
2014/182 ( PDF )
Proving the TLS Handshake Secure (as it is)
Karthikeyan Bhargavan and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Santiago Zanella-Béguelin
2014/181 ( PDF )
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro
2014/180 ( PDF )
Improving throughput of RC4 algorithm using multithreading techniques in multicore processors
T.D.B Weerasinghe
2014/179 ( PDF )
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Maura B. Paterson and Douglas R. Stinson
2014/178 ( PDF )
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
Qingji Zheng and Shouhuai Xu
2014/177 ( PDF )
Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES
Valentina Banciu and Elisabeth Oswald
2014/176 ( -- withdrawn -- )
One-Round Witness Indistinguishability from Indistinguishability Obfuscation
Qihua Niu, Hongda Li, Bei Liang, Fei Tang
2014/175 ( PDF )
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
T.D.B Weerasinghe
2014/174 ( PDF )
Analysis of a Modified RC4 Algorithm
T.D.B Weerasinghe
2014/173 ( PDF )
Continuous Non-malleable Codes
Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
2014/172 ( -- withdrawn -- )
A novel PUF Scheme
Jeroen Delvaux
2014/171 ( PDF )
An Effective RC4 Stream Cipher
T.D.B Weerasinghe
2014/170 ( PDF )
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
Shay Gueron
2014/169 ( PDF )
Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms
Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
2014/168 ( PDF )
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
Scott Coull and Kevin Dyer
2014/167 ( PDF )
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
2014/166 ( PDF )
Tuple decoders for traitor tracing schemes
Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
2014/165 ( -- withdrawn -- )
A NEW SCALAR POINT MULTIPLICATION SCHEME IN ECC BASED ON ZECKENDORF REPRESENTATION AND MULTIBASE CONCEPT
Kirti Chawla and Om Pal Yadav
2014/164 ( PDF )
Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters
Yuriy Tarannikov
2014/163 ( PDF )
Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices
Arnaud Dambra and Philippe Gaborit and Mylène Roussellet and Julien Schrek and Nicolas Tafforeau
2014/162 ( PDF )
TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
Hu Xiong
2014/161 ( PDF )
``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way
Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom
2014/160 ( PDF )
TrueSet: Faster Veri fiable Set Computations
Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikos Triandopoulos
2014/159 ( PDF )
Weak-Key Leakage Resilient Cryptography
Zuoxia Yu and Qiuliang Xu and Yongbin Zhou and Chengyu Hu and Rupeng Yang and Guangjun Fan
2014/158 ( PDF )
Point compression for the trace zero subgroup over a small degree extension field
Elisa Gorla and Maike Massierer
2014/157 ( PDF )
CLOC: Authenticated Encryption for Short Input
Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka
2014/156 ( PDF )
Non-Malleable Extractors with Shorter Seeds and Their Applications
Yanqing Yao and Zhoujun Li
2014/155 ( PDF )
Honey Encryption: Security Beyond the Brute-Force Bound
Ari Juels and Thomas Ristenpart
2014/154 ( -- withdrawn -- )
Non-Interactive Cryptography in the RAM Model of Computation
Daniel Apon and Xiong Fan and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2014/153 ( PDF )
Verifiable Oblivious Storage
Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam
2014/152 ( PDF )
A Statistics-based Fundamental Model for Side-channel Attack Analysis
Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang
2014/151 ( PDF )
Security Analysis of Key-Alternating Feistel Ciphers
Rodolphe Lampe and Yannick Seurin
2014/150 ( -- withdrawn -- )
On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
Nikolaos Karapanos and Srdjan Capkun
2014/149 ( PDF )
Millions of Millionaires: Multiparty Computation in Large Networks
Mahdi Zamani and Mahnush Movahedi and Jared Saia
2014/148 ( PDF )
Outsourcing Private RAM Computation
Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
2014/147 ( PDF )
The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
Razvan Barbulescu and Cécile Pierrot
2014/146 ( PDF )
Untappable communication channels over optical fibers from quantum-optical noise
Geraldo A. Barbosa and Jeroen van de Graaf
2014/145 ( -- withdrawn -- )
Calculating Cryptographic Degree of an S-Box
Prasanna Raghaw Mishra
2014/144 ( PDF )
How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda
2014/143 ( PDF )
Statistical Concurrent Non-Malleable Zero Knowledge
Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti
2014/142 ( -- withdrawn -- )
FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm
Karim M. Abdellatif, R. Chotin-Avot, and H. Mehrez
2014/141 ( -- withdrawn -- )
Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps
Hao Wang
2014/140 ( PDF )
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
Yuval Yarom and Naomi Benger
2014/139 ( PDF )
On the Phase Space of Block-Hiding Strategies
Assaf Shomer
2014/138 ( PDF )
Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction
Jae Hong Seo
2014/137 ( PDF )
Efficient, Oblivious Data Structures for MPC
Marcel Keller and Peter Scholl
2014/136 ( PDF )
Isolated Execution on Many-core Architectures
Ramya Jayaram Masti and Devendra Rai and Claudio Marforio and Srdjan Capkun
2014/135 ( PDF )
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
2014/134 ( PDF )
Kummer strikes back: new DH speed records
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe
2014/133 ( PDF )
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
Yihua Zhang and Marina Blanton
2014/132 ( PDF )
Efficient Revocable Identity-Based Encryption via Subset Difference Methods
Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park
2014/131 ( PDF )
Modelling After-the-fact Leakage for Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2014/130 ( PDF )
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig
2014/129 ( PDF )
How to Use Bitcoin to Design Fair Protocols
Iddo Bentov and Ranjit Kumaresan
2014/128 ( PDF )
Efficient Three-Party Computation from Cut-and-Choose
Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas
2014/127 ( PDF )
Algebraic Properties of Modular Addition Modulo a Power of Two
S. M. Dehnavi and Alireza Rahimipour
2014/126 ( -- withdrawn -- )
Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
Hui Cui \and Yi Mu \and Man Ho Au
2014/125 ( PDF )
Removing Erasures with Explainable Hash Proof Systems
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/124 ( PDF )
On the Information Ratio of Non-Perfect Secret Sharing Schemes
Oriol Farràs and Torben Hansen and Tarik Kaced and Carles Padró
2014/123 ( PDF )
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes
Mohammad Sadeq Dousti and Rasool Jalili
2014/122 ( PDF )
New Way to Construct Cryptographic Hash Function
WANGYong
2014/121 ( PDF )
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation
Koki Hamada and Dai Ikarashi and Koji Chida and Katsumi Takahashi
2014/120 ( PDF )
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)
Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
2014/119 ( PDF )
Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$)
Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
2014/118 ( PDF )
Quantum position verification in the random oracle model
Dominique Unruh
2014/117 ( PDF )
An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems
Bjoern Grohmann
2014/116 ( PDF )
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model
Ronald Cramer and Carles Padró and Chaoping Xing
2014/115 ( PDF )
Comments on a novel user authentication and key agreement scheme
Jia-Lun Tsai
2014/114 ( PDF )
Prover Anonymous and Deniable Distance-Bounding Authentication
Sebastien Gambs and Cristina Onete and Jean-Marc Robert
2014/113 ( PDF )
Secure Compression: Theory \& Practice
James Kelley and Roberto Tamassia
2014/112 ( PDF )
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich
2014/111 ( PDF )
A Note on the CLRW2 Tweakable Block Cipher Construction
Gordon Procter
2014/110 ( PDF )
Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box
Sourav Das
2014/109 ( PDF )
Diffusion Programmable Device : The device to prevent reverse engineering
Mitsuru Shiozaki, Ryohei Hori and Takeshi Fujino
2014/108 ( PDF )
MJH: A Faster Alternative to MDC-2
Jooyoung Lee and Martijn Stam
2014/107 ( PDF )
Key-Indistinguishable Message Authentication Codes
Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
2014/106 ( PDF )
Algorithms in HElib
Shai Halevi and Victor Shoup
2014/105 ( PDF )
Reducing the Overhead of MPC over a Large Population
Ashish Choudhury and Arpita Patra and Nigel P. Smart
2014/104 ( PDF )
Space-efficient, byte-wise incremental and perfectly private encryption schemes
Kévin Atighehchi
2014/103 ( PDF )
SHipher: Families of Block Ciphers based on SubSet-Sum Problem
Xiali Hei and Binheng Song
2014/102 ( PDF )
Actively Secure Private Function Evaluation
Payman Mohassel and Saeed Sadeghian and Nigel P. Smart
2014/101 ( PDF )
Dishonest Majority Multi-Party Computation for Binary Circuits
Enrique Larraia and Emmanuela Orsini and Nigel P. Smart
2014/100 ( PDF )
Improved Slender-set Linear Cryptanalysis
Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi
2014/099 ( PDF )
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Christina Brzuska and Pooya Farshim and Arno Mittelbach
2014/098 ( PDF )
Towards Characterizing Complete Fairness in Secure Two-Party Computation
Gilad Asharov
2014/097 ( PDF )
Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise
Koji Nuida
2014/096 ( PDF )
Tight security bounds for multiple encryption
Yuanxi Dai, John Steinberger
2014/095 ( PDF )
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
2014/094 ( PDF )
Faster Bootstrapping with Polynomial Error
Jacob Alperin-Sheriff and Chris Peikert
2014/093 ( PDF )
The Related-Key Analysis of Feistel Constructions
Manuel Barbosa and Pooya Farshim
2014/092 ( PDF )
A new class of system oriented PKC, K(I)SOPKC.
Masao KASAHARA
2014/091 ( PDF )
On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2014/090 ( PDF )
Cryptanalysis of KLEIN (Full version)
Virginie Lallemand and María Naya-Plasencia
2014/089 ( PDF )
Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version)
Anne Canteaut and Thomas Fuhr and Henri Gilbert and María Naya-Plasencia and Jean-René Reinhard
2014/088 ( PDF )
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
Himanshu Tyagi and Shun Watanabe
2014/087 ( PDF )
AnoA: A Framework For Analyzing Anonymous Communication Protocols
Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi
2014/086 ( PDF )
Randomized and Efficient Authentication in Mobile Environments
Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
2014/085 ( PDF )
Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer
Aleksandra Mileva
2014/084 ( PDF )
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
2014/083 ( PDF )
Garbled RAM Revisited, Part II
Steve Lu and Rafail Ostrovsky
2014/082 ( PDF )
Garbled RAM Revisited, Part I
Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
2014/081 ( PDF )
Efficient Round Optimal Blind Signatures
Sanjam Garg and Divya Gupta
2014/080 ( PDF )
A Full Characterization of Completeness for Two-party Randomized Function Evaluation
Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai
2014/079 ( PDF )
Unifying Leakage Models: from Probing Attacks to Noisy Leakage
Alexandre Duc and Stefan Dziembowski and Sebastian Faust
2014/078 ( PDF )
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Ahmad Boorghany and Rasool Jalili
2014/077 ( PDF )
Mixcoin: Anonymity for Bitcoin with accountable mixes
Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten
2014/076 ( PDF )
Certified Bitcoins
Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros
2014/075 ( PDF )
Publicly Auditable Secure Multi-Party Computation
Carsten Baum and Ivan Damgård and Claudio Orlandi
2014/074 ( PDF )
New and Improved Key-Homomorphic Pseudorandom Functions
Abhishek Banerjee and Chris Peikert
2014/073 ( PDF )
Anonymous Authentication with Shared Secrets
Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
2014/072 ( PDF )
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser and Sebastian Biedermann
2014/071 ( PDF )
Implementing Pairing-Based Cryptosystems in USB Tokens
Zhaohui Cheng
2014/070 ( PDF )
Lattice Cryptography for the Internet
Chris Peikert
2014/069 ( PDF )
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Manoj Ranjan Mishra, Jayaprakash Kar and Banshidhar Majhi
2014/068 ( PDF )
Some security bounds for the DGHV scheme
Franca Marinelli and Riccardo Aragona and Chiara Marcolla and Massimiliano Sala
2014/067 ( PDF )
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey
2014/066 ( PDF )
A Subexponential Construction of Graph Coloring for Multiparty Computation
Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, and Ron Steinfeld
2014/065 ( PDF )
Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case
Palash Sarkar and Shashank Singh
2014/064 ( PDF )
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems
Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan
2014/063 ( PDF )
Cryptanalysis on “Secure untraceable off-line electronic cash system”
Yalin Chen and Jue-Sam Chou*
2014/062 ( PDF )
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
Tancrède Lepoint and Michael Naehrig
2014/061 ( PDF )
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Stefano Tessaro and David A. Wilson
2014/060 ( PDF )
Verifiable Computation in Multiparty Protocols with Honest Majority
Peeter Laud and Alisa Pankova
2014/059 ( PDF )
Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
John Tromp
2014/058 ( PDF )
Cryptanalysis of FIDES
Itai Dinur and Jérémy Jean
2014/057 ( PDF )
Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma
Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
2014/056 ( PDF )
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang
2014/055 ( PDF )
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Younsung Choi
2014/054 ( PDF )
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
Sugata Gangopadhyay and Pantelimon Stanica
2014/053 ( PDF )
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
Sonia Belaïd, and Vincent Grosso and François-Xavier Standaert
2014/052 ( PDF )
DAA-related APIs in TPM2.0 Revisited
Li Xi
2014/051 ( PDF )
An Equivalence-Preserving Transformation of Shift Registers
Elena Dubrova
2014/050 ( PDF )
Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication
Daniel R. L. Brown
2014/049 ( PDF )
Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography
Neha tirthani and Ganesan
2014/048 ( PDF )
When a Boolean Function can be Expressed as the Sum of two Bent Functions
Longjiang Qu and Shaojing Fu and Qingping Dai and Chao Li
2014/047 ( PDF )
Down the Rabbit Hole: Revisiting the Shrinking Method
Vivien Dubois
2014/046 ( PDF )
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
Yalin Chen1 and Jue-Sam Chou*2
2014/045 ( PDF )
Human Assisted Randomness Generation Using Video Games
Mohsen Alimomeni and Reihaneh Safavi-Naini
2014/044 ( PDF )
rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval
Lichun Li and Michael Militzer and Anwitaman Datta
2014/043 ( PDF )
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
Mehdi Tibouchi
2014/042 ( PDF )
A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem
Jintai Ding, Chengdong Tao
2014/041 ( PDF )
Cryptanalysis via algebraic spans
Adi Ben-Zvi and Arkadius Kalka and Boaz Tsaban
2014/040 ( PDF )
A Fast Modular Reduction Method
Zhengjun Cao and Ruizhong Wei and Xiaodong Lin
2014/039 ( PDF )
Homomorphic AES Evaluation using NTRU
Yarkin Doroz and Yin Hu and Berk Sunar
2014/038 ( PDF )
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
Ralf Kuesters and Enrico Scapin and Tomasz Truderung and Juergen Graf
2014/037 ( PDF )
On the Security of the Pre-Shared Key Ciphersuites of TLS
Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk
2014/036 ( PDF )
A Secure Text Messaging Protocol
Gary Belvin
2014/035 ( PDF )
A new attack on RSA with a composed decryption exponent
Abderrahmane Nitaj and Mohamed Ould Douh
2014/034 ( PDF )
Authenticated Encryption with SPECK
Chase Manny
2014/033 ( PDF )
Lattice-based Group Signature Scheme with Verifier-local Revocation
Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang
2014/032 ( PDF )
Scale-Invariant Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi
2014/031 ( PDF )
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results
Yongge Wang
2014/030 ( PDF )
Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simplicio Jr.
2014/029 ( PDF )
General Impossibility of Group Homomorphic Encryption in the Quantum World
Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter
2014/028 ( PDF )
Channel Equalization for Side Channel Attacks
Colin O'Flynn and Zhizhang (David) Chen
2014/027 ( PDF )
Twisting Edwards curves with isogenies
Mike Hamburg
2014/026 ( PDF )
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger and Mélanie Favre and Tarik Graba
2014/025 ( PDF )
Side-Channel Leakage through Static Power – Should We Care about in Practice? –
Amir Moradi
2014/024 ( PDF )
An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
Ivan Damgård and Jesper Buus Nielsen
2014/023 ( PDF )
Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle
Gengran Hu and Yanbin Pan and Feng Zhang
2014/022 ( PDF )
Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR
Sourav Das
2014/021 ( PDF )
Online/Offline Attribute-Based Encryption
Susan Hohenberger and Brent Waters
2014/020 ( PDF )
(De-)Constructing TLS
Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi
2014/019 ( PDF )
Lazy Modulus Switching for the BKW Algorithm on LWE
Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
2014/018 ( PDF )
Completeness for Symmetric Two-Party Functionalities - Revisited
Yehuda Lindell and Eran Omri and Hila Zarosim
2014/017 ( -- withdrawn -- )
Two-round password-only authenticated key exchange in the three-party setting
Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
2014/016 ( PDF )
Triple and Quadruple Encryption: Bridging the Gaps
Bart Mennink and Bart Preneel
2014/015 ( PDF )
Tight Security Bounds for Triple Encryption
Jooyoung Lee
2014/014 ( PDF )
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther and Bertram Poettering
2014/013 ( -- withdrawn -- )
A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs
Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol
2014/012 ( PDF )
Maximal Information Coefficient Analysis
Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
2014/011 ( PDF )
Construction of New Families of ‎MDS‎ Diffusion Layers
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
2014/010 ( PDF )
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
2014/009 ( PDF )
Characterization of EME with Linear Mixing
Nilanjan Datta and Mridul Nandi
2014/008 ( PDF )
A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
Annelie Heuser and Olivier Rioul and Sylvain Guilley
2014/007 ( PDF )
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.
Ethan Heilman
2014/006 ( PDF )
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
2014/005 ( -- withdrawn -- )
The analysis of the Keccak with the new method called parity
Ghanei yakhdan.mostafa
2014/004 ( PDF )
MaxMinMax problem and sparse equations over finite fields
Igor Semaev
2014/003 ( PDF )
$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials
Xi Xiong and Haining Fan
2014/002 ( PDF )
Pseudorandom Generator Based on Hard Lattice Problem
Kuan Cheng
2014/001 ( PDF )
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
Yalin Chen and Jue-Sam Chou
2013/882 ( PDF )
New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers
Zhe Liu and Johann Großschädl
2013/881 ( PDF )
Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains
Yonatan Sompolinsky and Aviv Zohar
2013/880 ( PDF )
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
Seunghwan Park and Kwangsu Lee and Dong Hoon Lee
2013/879 ( PDF )
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
2013/878 ( PDF )
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs
Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng
2013/877 ( PDF )
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature
Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
2013/876 ( PDF )
Public-Key Encryption with Lazy Parties
Kenji Yasunaga
2013/875 ( PDF )
Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE
Michael Clear and Ciaran McGoldrick
2013/874 ( PDF )
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga
2013/873 ( PDF )
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
Mihir Bellare and Igors Stepanovs and Stefano Tessaro
2013/872 ( -- withdrawn -- )
2013/871 ( PDF )
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities
Weiqiang Wen and Libin Wang and Jiaxin Pan
2013/870 ( PDF )
A new class of hyper-bent functions and Kloosterman sums
Chunming Tang, Yanfeng Qi
2013/869 ( PDF )
How to Fake Auxiliary Input
Dimitar Jetchev and Krzysztof Pietrzak
2013/868 ( PDF )
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
Lear Bahack
2013/867 ( PDF )
LHash: A Lightweight Hash Function (Full Version)
Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong
2013/866 ( PDF )
Compact Ring-LWE based Cryptoprocessor
Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede
2013/865 ( PDF )
SNR to Success Rate: Reaching the Limit of Non-Profiling DPA
Suvadeep Hajra and Debdeep Mukhopadhyay
2013/864 ( PDF )
Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs
Adam Smith and Ye Zhang
2013/863 ( PDF )
Formal Treatment of Distributed Trust in Electronic Voting
Stephan Neumann and Melanie Volkamer
2013/862 ( PDF )
How to Delegate Computations: The Power of No-Signaling Proofs
Yael Tauman Kalai and Ran Raz and Ron D. Rothblum
2013/861 ( PDF )
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments
Muhammad Rizwan Asghar
2013/860 ( PDF )
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs
2013/859 ( PDF )
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
2013/858 ( PDF )
Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications
Sherman S.M. Chow and Matthew Franklin and Haibin Zhang
2013/857 ( PDF )
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Daniel Genkin and Adi Shamir and Eran Tromer
2013/856 ( PDF )
Tightly-Secure Signatures From Lossy Identification Schemes
Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi
2013/855 ( PDF )
Weaknesses in a Recently Proposed RFID Authentication Protocol
Mete Akgün, M. Ufuk Çaǧlayan
2013/854 ( PDF )
Multiple-Use Transferable E-Cash
Pratik Sarkar
2013/853 ( PDF )
Automatic Search for Differential Trails in ARX Ciphers (Extended Version)
Alex Biryukov and Vesselin Velichkov
2013/852 ( PDF )
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang
2013/851 ( PDF )
Power and Timing Side Channels for PUFs and their Efficient Exploitation
Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson
2013/850 ( PDF )
Secure Floating-Point Arithmetic and Private Satellite Collision Analysis
Liina Kamm and Jan Willemson
2013/849 ( PDF )
Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model
Suvadeep Hajra and Debdeep Mukhopadhyay
2013/848 ( PDF )
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Xi-Jun Lin and Lin Sun
2013/847 ( -- withdrawn -- )
Ultralightweight cryptography for passive RFID system
Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed
2013/846 ( -- withdrawn -- )
A new attack on RSA with a composed decryption exponent
Abderrahmane Nitaj and Mohamed Ould Douh
2013/845 ( PDF )
How to Keep a Secret: Leakage Deterring Public-key Cryptography
Aggelos Kiayias and Qiang Tang
2013/844 ( PDF )
A generic view on trace-and-revoke broadcast encryption schemes
Dennis Hofheinz and Christoph Striecks
2013/843 ( PDF )
A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues
Jian Ye and Chenglian Liu
2013/842 ( PDF )
Detecting Hidden Leakages
Amir Moradi and Sylvain Guilley and Annelie Heuser
2013/841 ( PDF )
Trust Views for the Web PKI
Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser
2013/840 ( PDF )
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Zhou
2013/839 ( PDF )
Lattice Decoding Attacks on Binary LWE
Shi Bai and Steven D. Galbraith
2013/838 ( PDF )
An improved compression technique for signatures based on learning with errors
Shi Bai and Steven D. Galbraith
2013/837 ( PDF )
Fair Two-Party Computations via Bitcoin Deposits
Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek
2013/836 ( PDF )
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps
Hao Wang and Lei Wu and Zhihua Zheng and Yilei Wang
2013/835 ( PDF )
A Modular Framework for Building Variable-Input Length Tweakable Ciphers
Thomas Shrimpton and R. Seth Terashima
2013/834 ( PDF )
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees
Ahto Buldas and Andres Kroonmaa and Risto Laanoja
2013/833 ( PDF )
Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
Fabrice Benhamouda and David Pointcheval
2013/832 ( PDF )
Practical Dynamic Searchable Encryption with Small Leakage
Emil Stefanov and Charalampos Papamanthou and Elaine Shi
2013/831 ( PDF )
Provable Security Proofs and their Interpretation in the Real World
Vikram Singh
2013/830 ( PDF )
Property Preserving Symmetric Encryption Revisited
Sanjit Chatterjee and M. Prem Laxman Das
2013/829 ( PDF )
Is Bitcoin a Decentralized Currency?
Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun
2013/828 ( PDF )
Decentralized Traceable Attribute-Based Signatures
Ali El Kaafarani and Essam Ghadafi and Dalia Khader
2013/827 ( PDF )
Lower Bounds in the Hardware Token Model
Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen
2013/826 ( PDF )
Secure multi-party data analysis: end user validation and practical experiments
Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt
2013/825 ( -- withdrawn -- )
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen
Alberto Peinado and Jorge Munilla and Amparo Fúster
2013/824 ( PDF )
Fair and Efficient Secure Multiparty Computation with Reputation Systems
Gilad Asharov and Yehuda Lindell and Hila Zarosim
2013/823 ( PDF )
Another Look at XCB
Debrup Chakraborty and Vicente Hernandez-Jimenez and Palash Sarkar
2013/822 ( PDF )
Leakage Resilient Fully Homomorphic Encryption
Alexandra Berkoff and Feng-Hao Liu
2013/821 ( -- withdrawn -- )
Exact Smooth Projective Hash Function based on LWE
Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan
2013/820 ( -- withdrawn -- )
On the Security of Recently Proposed RFID Protocols
Mete Akgün, M. Ufuk Çaǧlayan
2013/819 ( PDF )
Safe enclosures: towards cryptographic techniques for server protection
Sergiu Bursuc and Julian P. Murphy
2013/818 ( PDF )
On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography
Roberto De Prisco and Alfredo De Santis
2013/817 ( PDF )
Interactive Encryption and Message Authentication
Yevgeniy Dodis and Dario Fiore
2013/816 ( PDF )
Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes
Shay Gueron and Vlad Krasnov
2013/815 ( PDF )
Iterated group products and leakage resilience against NC^1
Eric Miles
2013/814 ( PDF )
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
2013/813 ( PDF )
Multi-ciphersuite security of the Secure Shell (SSH) protocol
Florian Bergsma and Benjamin Dowling and Florian Kohlar and Jörg Schwenk and Douglas Stebila
2013/812 ( PDF )
A Note on Bilinear Groups of a Large Composite Order
Zhengjun Cao and Lihua Liu
2013/811 ( PDF )
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol
Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto
2013/810 ( PDF )
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
Pablo Rauzy and Sylvain Guilley
2013/809 ( PDF )
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
Sarah Ibrahimi and Boris Skoric and Jan-Jaap Oosterwijk
2013/808 ( PDF )
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing
2013/807 ( PDF )
Distributed Key Generation for Secure Encrypted Deduplication
Yitao Duan
2013/806 ( PDF )
Efficient (Anonymous) Compact HIBE From Standard Assumptions
Somindu C. Ramanna and Palash Sarkar
2013/805 ( PDF )
Proofs of Space: When Space is of the Essence
Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi
2013/804 ( PDF )
Group Signature with relaxed-privacy and revocability for VANET
Mohammad Saiful Islam Mamun and Atsuko Miyaji
2013/803 ( PDF )
Fully, (Almost) Tightly Secure IBE from Standard Assumptions
Jie Chen and Hoeteck Wee
2013/802 ( PDF )
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions
Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng
2013/801 ( PDF )
Authenticating Computation on Groups: New Homomorphic Primitives and Applications
Dario Catalano and Antonio Marcedone and Orazio Puglisi
2013/800 ( PDF )
Algebraic Properties of the Cube Attack
Frank-M. Quedenfeld and Christopher Wolf
2013/799 ( PDF )
New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography
Gilles Macario-Rat and Jérôme Plût and Henri Gilbert
2013/798 ( -- withdrawn -- )
A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System
Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, and Zuoxia Yu
2013/797 ( PDF )
Tamper Resilient Circuits: The Adversary at the Gates
Aggelos Kiayias and Yiannis Tselekounis
2013/796 ( PDF )
Proofs of Space
Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak
2013/795 ( PDF )
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications
Xi-Jun Lin and Lin Sun
2013/794 ( PDF )
Behind the Scene of Side Channel Attacks
Victor Lomné, Emmanuel Prouff, and Thomas Roche
2013/793 ( PDF )
A fast integer-based batch full-homomorphic encryption scheme over finite field
Long Zhang and Qiuling Yue
2013/792 ( PDF )
Improved Authenticity Bound of EAX, and Refinements
Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata
2013/791 ( PDF )
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
Elena Andreeva and Begül Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda
2013/790 ( PDF )
Parallelizable and Authenticated Online Ciphers
Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda
2013/789 ( PDF )
Proofs of Data Possession and Retrievability Based on MRD Codes
Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu
2013/788 ( PDF )
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis
Zhengjun Cao and Lihua Liu
2013/787 ( PDF )
Wide-weak Privacy Preserving RFID Mutual Authentication Protocol
Raghuvir Songhela and Manik Lal Das
2013/786 ( PDF )
Tree Based Symmetric Key Broadcast Encryption
Sanjay Bhattacherjee and Palash Sarkar
2013/785 ( PDF )
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model
Fei Tang, Hongda Li, Qihua Niu, and Bei Liang
2013/784 ( PDF )
Secure Multiparty Computations on Bitcoin
Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek
2013/783 ( PDF )
ECC-Based Non-Interactive Deniable Authentication with Designated Verifier
Yalin Chen and Jue-Sam Chou2
2013/782 ( PDF )
How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
Dorit Ron and Adi Shamir
2013/781 ( PDF )
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
Rafael Pass and Karn Seth and Sidharth Telang
2013/780 ( PDF )
A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester
Nasser Ramazani Darmian
2013/779 ( PDF )
Distributed Group Authentication for RFID Supply Management
Mike Burmester and Jorge Munilla
2013/778 ( PDF )
Multi-Stage Fault Attacks on Block Ciphers
Philipp Jovanovic and Martin Kreuzer and Ilia Polian
2013/777 ( PDF )
Construction of Multiplicative Monotone Span Program
Yuenai Chen and Chunming Tang
2013/776 ( PDF )
Location Leakage in Distance Bounding: Why Location Privacy does not Work
Aikaterini Mitrokotsa and Cristina Onete and Serge Vaudenay
2013/775 ( PDF )
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
Yanfeng Wang, Wenling Wu, Zhiyuan Guo and Xiaoli Yu
2013/774 ( PDF )
Multi-Input Functional Encryption
S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2013/773 ( PDF )
CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions
Markku-Juhani O. Saarinen
2013/772 ( PDF )
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
Markku-Juhani O. Saarinen
2013/771 ( PDF )
TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor
Wuqiang Shen and Shaohua Tang
2013/770 ( PDF )
Efficient Template Attacks
Omar Choudary and Markus G. Kuhn
2013/769 ( PDF )
Broadcast Amplification
Martin Hirt and Ueli Maurer and Pavel Raykov
2013/768 ( PDF )
VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4
Bartosz Zoltak
2013/767 ( PDF )
Misuse Resistant Parallel Authenticated Encryptions
Nilanjan Datta and Mridul Nandi
2013/766 ( PDF )
RankSign : an efficient signature algorithm based on the rank metric
P. Gaborit and O. Ruatta and J. Schrek and G. Zémor
2013/765 ( PDF )
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More
Kaoru Kurosawa and Le Trieu Phong
2013/764 ( PDF )
Dynamic Countermeasure Against the Zero Power Analysis
Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
2013/763 ( PDF )
Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting
Yutaka Kawai and Katsuyuki Takashima
2013/762 ( PDF )
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung
2013/761 ( PDF )
Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
Pierre-Alain Fouque and Antoine Joux and Chrysanthi Mavromati
2013/760 ( PDF )
On cross joining de Bruijn sequences
Johannes Mykkeltveit and Janusz Szmidt
2013/759 ( PDF )
Vectorization of ChaCha Stream Cipher
Martin Goll and Shay Gueron
2013/758 ( PDF )
A Revocable Online-Offline Certificateless Signature Scheme without Pairing
Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek Krishna Pradhan
2013/757 ( PDF )
Practical Signatures from the Partial Fourier Recovery Problem
Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte
2013/756 ( PDF )
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
Yonglin Hao and Dongxia Bai and Leibo Li
2013/755 ( -- withdrawn -- )
Improving security and efficiency for multi-authority access control system in cloud storage
Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong
2013/754 ( PDF )
Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
Omkant Pandey and Manoj Prabhakaran and Amit Sahai
2013/753 ( PDF )
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yalcin
2013/752 ( PDF )
On the Power of Rewinding Simulators in Functional Encryption
Angelo De Caro and Vincenzo Iovino
2013/751 ( PDF )
Using Hamiltonian Totems as Passwords
Hervé Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache
2013/750 ( PDF )
Fully Deniable Mutual Authentication Protocol Based on RSA Signature
Xi-Jun Lin and Lin Sun
2013/749 ( PDF )
Efficient CCA-secure Threshold Public-Key Encryption Scheme
Xi-Jun Lin and Lin Sun
2013/748 ( PDF )
Plaintext Recovery Attacks Against WPA/TKIP
Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt
2013/747 ( PDF )
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Jayaprakash Kar
2013/746 ( PDF )
Asymptotically Efficient Lattice-Based Digital Signatures
Vadim Lyubashevsky and Daniele Micciancio
2013/745 ( PDF )
Asynchronous MPC with a Strict Honest Majority Using Non-equivocation
Michael Backes and Fabian Bendun and Ashish Choudhury and Aniket Kate
2013/744 ( PDF )
Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results
Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai
2013/743 ( -- withdrawn -- )
Privacy Preserving Unique Statistics in a Smart Grid
Iraklis Leontiadis, Melek Önen, Refik Molva
2013/742 ( PDF )
CODING - Stream Cipher Methods by Varying Components during Ciphering Data
Jürgen Müller
2013/741 ( PDF )
Fast Software Implementation of Binary Elliptic Curve Cryptography
Manuel Bluhm and Shay Gueron
2013/740 ( PDF )
An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)
Gérald Gavin
2013/739 ( -- withdrawn -- )
NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS
Dr. G.S.G.N.Anjaneyulu and A.Vijayabarathi
2013/738 ( PDF )
On the Resilience and Uniqueness of CPA for Secure Broadcast
Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
2013/737 ( PDF )
Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography
Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez
2013/736 ( PDF )
TRS-80 With A Keccak Sponge Cake
Jean-Marie Chauvet
2013/735 ( PDF )
Masking Tables---An Underestimated Security Risk
Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald
2013/734 ( PDF )
Elliptic Curve Cryptography in Practice
Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow
2013/733 ( -- withdrawn -- )
A Key Compromise Impersonation attack against Wang's Provably Secure Identity-based Key Agreement Protocol
Maurizio Adriano Strangio
2013/732 ( PDF )
SSS-V2: Secure Similarity Search
Hyun-A Park
2013/731 ( PDF )
Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited
Yongqiang Li and Mingsheng Wang and Yuyin Yu
2013/730 ( PDF )
Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees
Łukasz Krzywiecki and Przemysław Kubiak and Mirosław Kutyłowski
2013/729 ( PDF )
Functional Encryption for Randomized Functionalities
Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai
2013/728 ( PDF )
Modified Alternating Step Generators
Robert Wicik and Tomasz Rachwalik
2013/727 ( PDF )
Multi-Input Functional Encryption
Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai
2013/726 ( PDF )
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
Chihong Joo and Aaram Yun
2013/725 ( -- withdrawn -- )
Mobile Transaction over NFC and GSM
Muhammad Qasim Saeed and Pardis Pourghomi
2013/724 ( PDF )
Verifiable Set Operations over Outsourced Databases
Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos
2013/723 ( PDF )
Amplifying Privacy in Privacy Amplification
Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin
2013/722 ( PDF )
The Realm of the Pairings
Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini
2013/721 ( PDF )
Deep Attacks of a Certificateless Signature Scheme
Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li
2013/720 ( PDF )
Outsourced Symmetric Private Information Retrieval
Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
2013/719 ( PDF )
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
Sandro Coretti and Ueli Maurer and Björn Tackmann
2013/718 ( PDF )
NTRU-KE: A Lattice-based Public Key Exchange Protocol
Xinyu Lei and Xiaofeng Liao
2013/717 ( PDF )
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
2013/716 ( PDF )
A Secure Obfuscator for Encrypted Blind Signature Functionality
Xiao Feng and Zheng Yuan
2013/715 ( PDF )
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
Erik-Oliver Blass and Travis Mayberry and Guevara Noubir
2013/714 ( PDF )
Method to secure data in the cloud while preserving summary statistics
Sanchita Barman, Bimal Roy
2013/713 ( PDF )
Cryptanalysis of Zorro
Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang
2013/712 ( PDF )
PUF-Based RFID Authentication Secure and Private under Memory Leakage
Daisuke Moriyama and Shin'ichiro Matsuo and Moti Yung
2013/711 ( PDF )
Ambiguous One-Move Nominative Signature Without Random Oracles
Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang
2013/710 ( PDF )
An Approach to Reduce Storage for Homomorphic Computations
Jung Hee Cheon and Jinsu Kim
2013/709 ( PDF )
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks
Mohammad Sadeq Dousti and Rasool Jalili
2013/708 ( PDF )
Key Derivation Without Entropy Waste
Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs
2013/707 ( PDF )
A reduction of Semigroup DLP to classic DLP
Matan Banin and Boaz Tsaban
2013/706 ( PDF )
How to Certify the Leakage of a Chip?
François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon
2013/705 ( PDF )
Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation
Clemens Heuberger and Michela Mazzoli
2013/704 ( PDF )
Adaptive Witness Encryption and Asymmetric Password-based Cryptography
Mihir Bellare and Viet Tung Hoang
2013/703 ( PDF )
Limits of Extractability Assumptions with Distributional Auxiliary Input
Elette Boyle and Rafael Pass
2013/702 ( PDF )
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs
2013/701 ( PDF )
More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input
Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
2013/700 ( PDF )
Higher Order Masking of Look-up Tables
Jean-Sebastien Coron
2013/699 ( PDF )
Bootstrapping Obfuscators via Fast Pseudorandom Functions
Benny Applebaum
2013/698 ( PDF )
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
Xi-Jun Lin and Lin Sun
2013/697 ( PDF )
A More Efficient AES Threshold Implementation
Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2013/696 ( PDF )
Examination of a New Defense Mechanism: Honeywords
Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
2013/695 ( PDF )
AEGIS: A Fast Authenticated Encryption Algorithm
Hongjun Wu and Bart Preneel
2013/694 ( PDF )
Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data
Lichun Li and Anwitaman Datta
2013/693 ( PDF )
Secure Key Exchange and Sessions Without Credentials
Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis
2013/692 ( PDF )
Faster Compact Diffie-Hellman: Endomorphisms on the x-line
Craig Costello and Huseyin Hisil and Benjamin Smith
2013/691 ( PDF )
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
2013/690 ( PDF )
Obfuscation ==> (IND-CPA Security =/=> Circular Security)
Antonio Marcedone and Claudio Orlandi
2013/689 ( PDF )
Differing-Inputs Obfuscation and Applications
Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry
2013/688 ( PDF )
Unbalancing Pairing-Based Key Exchange Protocols
Michael Scott
2013/687 ( PDF )
How to Compress (Reusable) Garbled Circuits
Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy
2013/686 ( PDF )
New abstractions in applied pi-calculus and automated verification of protected executions
Shiwei Xu and Sergiu Bursuc and Julian P. Murphy
2013/685 ( PDF )
Solving shortest and closest vector problems: The decomposition approach
Anja Becker, Nicolas Gama and Antoine Joux
2013/684 ( PDF )
Fully Bideniable Public-Key Encryption
Marcel Šebek
2013/683 ( PDF )
Separations in Circular Security for Arbitrary Length Key Cycles
Venkata Koppula and Kim Ramchen and Brent Waters
2013/682 ( PDF )
Secret Key Cryptosystem based on Non-Systematic Polar Codes
Reza Hooshmand, Mohammad Reza Aref, and Taraneh Eghlidos
2013/681 ( PDF )
Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks
Damien Vergnaud and David Xiao
2013/680 ( PDF )
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme
Dana Dachman-Soled
2013/679 ( PDF )
Formal verification of a software countermeasure against instruction skip attacks
Nicolas Moro and Karine Heydemann and Emmanuelle Encrenaz and Bruno Robisson
2013/678 ( PDF )
Universally composable privacy preserving finite automata execution with low online and offline complexity
Peeter Laud and Jan Willemson
2013/677 ( PDF )
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
2013/676 ( PDF )
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers
Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
2013/675 ( PDF )
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
Tomer Ashur and Orr Dunkelman
2013/674 ( PDF )
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2013/673 ( PDF )
Traps to the BGJT-Algorithm for Discrete Logarithms
Qi Cheng and Daqing Wan and Jincheng Zhuang
2013/672 ( PDF )
Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians
Benjamin Smith
2013/671 ( PDF )
Robust Pseudorandom Generators
Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman
2013/670 ( PDF )
Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces
Charanjit Jutla and Arnab Roy
2013/669 ( PDF )
Attribute-Based Encryption for Arithmetic Circuits
Dan Boneh and Valeria Nikolaenko and Gil Segev
2013/668 ( PDF )
Obfuscation for Evasive Functions
Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai
2013/667 ( PDF )
A TPM Diffie-Hellman Oracle
Tolga Acar and Lan Nguyen and Greg Zaverucha
2013/666 ( PDF )
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol
Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
2013/665 ( PDF )
The Impossibility of Obfuscation with a Universal Simulator
Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai
2013/664 ( PDF )
TUC: Time-sensitive and Modular Analysis of Anonymous Communication
Michael Backes and Praveen Manoharan and Esfandiar Mohammadi
2013/663 ( PDF )
Linear Cryptanalysis of Round Reduced SIMON
Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya
2013/662 ( PDF )
Fine-Tuning Groth-Sahai Proofs
Alex Escala and Jens Groth
2013/661 ( PDF )
Private aggregation on untrusted servers with customizable thresholds
Constantinos Patsakis, Michael Clear, Paul Laird
2013/660 ( PDF )
Discrete Logarithms and Mordell-Weil Groups
Mohammad Sadek
2013/659 ( PDF )
A provable secure anonymous proxy signature scheme without random oracles
Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2013/658 ( PDF )
Parallel authenticated encryption with the duplex construction
Pawel Morawiecki and Josef Pieprzyk
2013/657 ( PDF )
New Trapdoor Projection Maps for Composite-Order Bilinear Groups
Sarah Meiklejohn and Hovav Shacham
2013/656 ( PDF )
Bias-based modeling and entropy analysis of PUFs
Robbert van den Berg and Boris Skoric and Vincent van der Leest
2013/655 ( PDF )
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)
Georg Neugebauer and Lucas Brutschy and Ulrike Meyer and Susanne Wetzel
2013/654 ( PDF )
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Baodong Qin and Shengli Liu
2013/653 ( PDF )
RKA-KDM secure encryption from public-key encryption
Florian Böhl and Gareth T. Davies and Dennis Hofheinz
2013/652 ( PDF )
Efficient Modular Arithmetic for SIMD Devices
Wilke Trei
2013/651 ( PDF )
A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound
Sanjit Chatterjee and Chethan Kamath
2013/650 ( PDF )
On Extractability (a.k.a. Differing-Inputs) Obfuscation
Elette Boyle and Kai-Min Chung and Rafael Pass
2013/649 ( PDF )
Security Analysis of Password-Authenticated Key Retrieval
SeongHan Shin and Kazukuni Kobara
2013/648 ( PDF )
Integral Distinguishers for Reduced-round Stribog
Riham AlTawy and Amr M. Youssef
2013/647 ( PDF )
A note on high-security general-purpose elliptic curves
Diego F. Aranha and Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira and Jefferson E. Ricardini
2013/646 ( PDF )
Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles
Johannes Blömer and Gennadij Liske
2013/645 ( PDF )
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin Küpçü and Öznur Özkasap
2013/644 ( PDF )
Elliptic and Hyperelliptic Curves: a Practical Security Analysis
Joppe W. Bos and Craig Costello and Andrea Miele
2013/643 ( PDF )
There is no Indistinguishability Obfuscation in Pessiland
Tal Moran and Alon Rosen
2013/642 ( PDF )
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Dan Boneh and Mark Zhandry
2013/641 ( PDF )
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall
Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
2013/640 ( PDF )
Communication-Efficient MPC for General Adversary Structures
Joshua Lampkins and Rafail Ostrovsky
2013/639 ( PDF )
Differentially 4-Uniform Bijections by Permuting the Inverse Function
Deng Tang and Claude Carlet and Xiaohu Tang
2013/638 ( PDF )
DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption
Somindu C. Ramanna
2013/637 ( PDF )
Detection of Algebraic Manipulation in the Presence of Leakage
Hadi Ahmadi and Reihaneh Safavi-Naini
2013/636 ( PDF )
SCARE of Secret Ciphers with SPN Structures
Matthieu Rivain and Thomas Roche
2013/635 ( PDF )
Universal security; from bits and mips to pools, lakes -- and beyond
Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
2013/634 ( PDF )
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2013/633 ( PDF )
Four Measures of Nonlinearity
J. Boyar and M.G. Find and R. Peralta
2013/632 ( PDF )
Combined Modeling and Side Channel Attacks on Strong PUFs
Ahmed Mahmoud and Ulrich Rührmair and Mehrdad Majzoobi and Farinaz Koushanfar
2013/631 ( PDF )
Protecting Obfuscation Against Algebraic Attacks
Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai
2013/630 ( PDF )
Estimating Key Sizes For High Dimensional Lattice-Based Systems
Joop van de Pol and Nigel P. Smart
2013/629 ( PDF )
Secure Key Management in the Cloud
Ivan Damgård and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob I. Pagter
2013/628 ( PDF )
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
Kazuhiko Minematsu
2013/627 ( PDF )
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
Jiawei Yuan and Shucheng Yu
2013/626 ( PDF )
Improved Linear Attacks on the Chinese Block Cipher Standard
Mingjie Liu and Jiazhe Chen
2013/625 ( PDF )
PillarBox: Combating next-generation malware with fast forward-secure logging
Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos
2013/624 ( -- withdrawn -- )
New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption
Xiaolin Cao and Ciara Moore
2013/623 ( PDF )
Off-Path Hacking: The Illusion of Challenge-Response Authentication
Yossi Gilad and Amir Herzberg and Haya Shulman
2013/622 ( PDF )
Decentralized Anonymous Credentials
Christina Garman and Matthew Green and Ian Miers
2013/621 ( PDF )
Multi-LHL protocol
Marika Mitrengová
2013/620 ( PDF )
Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
2013/619 ( PDF )
Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
Jeroen Delvaux and Ingrid Verbauwhede
2013/618 ( PDF )
Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Pierre-Alain Fouque and Pierre Karpman
2013/617 ( PDF )
Some results concerning global avalanche characteristics of two $q$-ary functions
Brajesh Kumar Singh
2013/616 ( PDF )
Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction
Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan and Neil Hanley
2013/615 ( PDF )
Privacy and Verifiability in Voting Systems: Methods, Developments and Trends
Hugo Jonker and Sjouke Mauw and Jun Pang
2013/614 ( PDF )
Is extracting data the same as possessing data?
Douglas R. Stinson and Jalaj Upadhyay
2013/613 ( PDF )
Recomputing with Permuted Operands: A Concurrent Error Detection Approach
Xiaofei Guo and Ramesh Karri
2013/612 ( PDF )
Sub-linear Blind Ring Signatures without Random Oracles
Essam Ghadafi
2013/611 ( PDF )
Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful
Mitsugu Iwamoto and Thomas Peyrin and Yu Sasaki
2013/610 ( PDF )
Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
Jeroen Delvaux and Ingrid Verbauwhede
2013/609 ( PDF )
Ultra Low-Power implementation of ECC on the ARM Cortex-M0+
Ruan de Clercq and Leif Uhsadel and Anthony Van Herrewege and Ingrid Verbauwhede
2013/608 ( PDF )
Towards Optimal Leakage Exploitation Rate in Template Attacks
Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
2013/607 ( PDF )
Cryptanalysis of Full RIPEMD-128
Franck Landelle and Thomas Peyrin
2013/606 ( PDF )
Revocable quantum timed-release encryption
Dominique Unruh
2013/605 ( PDF )
Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC.
Masao KASAHARA
2013/604 ( PDF )
Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos
Jörg Schwenk
2013/603 ( PDF )
Invariance-Based Concurrent Error Detection for Advanced Encryption Standard
Xiaofei Guo and Ramesh Karri
2013/602 ( PDF )
On the Efficacy of Solving LWE by Reduction to Unique-SVP
Martin R. Albrecht and Robert Fitzpatrick and Florian G ̈opfert
2013/601 ( PDF )
Two-round secure MPC from Indistinguishability Obfuscation
Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova
2013/600 ( PDF )
Improved Cryptanalysis of Reduced RIPEMD-160
Florian Mendel and Thomas Peyrin and Martin Schläffer and Lei Wang and Shuang Wu
2013/599 ( PDF )
Factoring RSA keys from certified smart cards: Coppersmith in the wild
Daniel J. Bernstein and Yun-An Chang and Chen-Mou Cheng and Li-Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren
2013/598 ( PDF )
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version
Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David Oswald and Falk Schellenberg and Christof Paar
2013/597 ( PDF )
Efficient Pairings Computation on Jacobi Quartic Elliptic Curves
Sylvain Duquesne, Nadia El Mrabet and Emmanuel Fouotsa
2013/596 ( PDF )
Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study
Michael Shantz and Edlyn Teske
2013/595 ( PDF )
Enhanced certificate transparency and end-to-end encrypted mail
Mark D. Ryan
2013/594 ( PDF )
A Local-Global Approach to Solving Ideal Lattice Problems
Yuan Tian and Rongxin Sun and Xueyong Zhu
2013/593 ( PDF )
Efficient One-Sided Adaptively Secure Computation
Carmit Hazay and Arpita Patra
2013/592 ( PDF )
Cryptanalysis of the Toorani-Falahati Hill Ciphers
Liam Keliher and Anthony Z. Delaney
2013/591 ( PDF )
Analysis of the Rainbow Tradeoff Algorithm Used in Practice
Jung Woo Kim and Jin Hong and Kunsoo Park
2013/590 ( PDF )
EyeDecrypt -- Private Interactions in Plain Sight
Andrea Forte and Juan Garay and Trevor Jim and Yevgeniy Vahlis
2013/589 ( PDF )
Smashing MASH-1
Vladimir Antipkin
2013/588 ( PDF )
SPHF-Friendly Non-Interactive Commitments
Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval
2013/587 ( PDF )
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments
Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
2013/586 ( PDF )
Generic related-key and induced chosen IV attacks using the method of key differentiation
Enes Pasalic and Yongzhuang Wei
2013/585 ( PDF )
On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two
Xiutao Feng and Guang Gong
2013/584 ( PDF )
Cryptanalysis of GOST R Hash Function
Zongyue Wang, Hongbo Yu, Xiaoyun Wang
2013/583 ( PDF )
polynomial selection for the number field sieve in geometric view
Min yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
2013/582 ( PDF )
The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions
Antoine Joux and Cécile Pierrot
2013/581 ( PDF )
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones
Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
2013/580 ( PDF )
Random Projections, Graph Sparsification, and Differential Privacy
Jalaj Upadhyay
2013/579 ( PDF )
On Measurable Side-Channel Leaks inside ASIC Design Primitives
Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino
2013/578 ( PDF )
A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent
Oleksandr Kazymyrov and Valentyna Kazymyrova and Roman Oliynykov
2013/577 ( PDF )
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique
Luís T. A. N. Brandão
2013/576 ( PDF )
Extended Criterion for Absence of Fixed Points
Oleksandr Kazymyrov and Valentyna Kazymyrova
2013/575 ( PDF )
Equivalence between MAC and PRF for Blockcipher based Constructions
Nilanjan Datta and Mridul Nandi
2013/574 ( PDF )
On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
Mridul Nandi
2013/573 ( PDF )
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE
Leibo Li and Keting Jia and Xiaoyun Wang
2013/572 ( PDF )
Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher
Goutam Paul and Subhamoy Maitra and Anupam Chattopadhyay
2013/571 ( PDF )
Efficient General-Adversary Multi-Party Computation
Martin Hirt and Daniel Tschudi
2013/570 ( PDF )
New Efficient Identity-Based Encryption From Factorization
Jun Shao and Licheng Wang and Xiaolei Dong and Zhenfu Cao
2013/569 ( PDF )
More Efficient Cryptosystems From $k^{th}$-Power Residues
Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao
2013/568 ( PDF )
Cryptanalysis of the Speck Family of Block Ciphers
Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel
2013/567 ( PDF )
KDM Security in the Hybrid Framework
Gareth T. Davies and Martijn Stam
2013/566 ( PDF )
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
Jeroen Delvaux and Ingrid Verbauwhede
2013/565 ( PDF )
Non-Malleable Coding Against Bit-wise and Split-State Tampering
Mahdi Cheraghchi and Venkatesan Guruswami
2013/564 ( PDF )
Capacity of Non-Malleable Codes
Mahdi Cheraghchi and Venkatesan Guruswami
2013/563 ( PDF )
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
Zvika Brakerski and Guy N. Rothblum
2013/562 ( PDF )
Self-pairings on supersingular elliptic curves with embedding degree $three$
Binglong Chen and Chang-An~Zhao
2013/561 ( PDF )
Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis
Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
2013/560 ( PDF )
Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time
Ben Morris and Phillip Rogaway
2013/559 ( PDF )
A Definitional Framework for Functional Encryption
Christian Matt and Ueli Maurer
2013/558 ( PDF )
Practical approaches to varying network size in combinatorial key predistribution schemes
Kevin Henry and Maura B. Paterson and Douglas R. Stinson
2013/557 ( PDF )
Black-Box Obfuscation for d-CNFs
Zvika Brakerski and Guy N. Rothblum
2013/556 ( PDF )
Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012
Oleksandr Kazymyrov and Valentyna Kazymyrova
2013/555 ( PDF )
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
Ueli Maurer and Björn Tackmann and Sandro Coretti
2013/554 ( PDF )
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
Pablo Rauzy and Sylvain Guilley and Zakaria Najm
2013/553 ( PDF )
Multi-Valued Byzantine Broadcast: the $t < n$ Case
Martin Hirt and Pavel Raykov
2013/552 ( PDF )
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
2013/551 ( PDF )
Puzzle Encryption Algorithm
Gregory Alvarez and Charles Berenguer
2013/550 ( -- withdrawn -- )
More Efficient Cryptosystems From k-th Power Residues
Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao
2013/549 ( PDF )
Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem
Koh-ichi Nagao
2013/548 ( PDF )
Decomposition formula of the Jacobian group of plane curve
Koh-ichi Nagao
2013/547 ( PDF )
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks
Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang
2013/546 ( PDF )
TRS-80 with a grain of salt
Jean-Marie Chauvet
2013/545 ( PDF )
Private Over-threshold Aggregation Protocols over Distributed Databases
Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim
2013/544 ( PDF )
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
Christian Hanser and Daniel Slamanig
2013/543 ( PDF )
Cryptanalysis of the SIMON Family of Block Ciphers
Hoda A. Alkhzaimi and Martin M. Lauridsen
2013/542 ( PDF )
Searching for Nonlinear Feedback Shift Registers with Parallel Computing
Przemysław Dąbrowski and Grzegorz Łabuzek and Tomasz Rachwalik and Janusz Szmidt
2013/541 ( PDF )
Lattice-Based FHE as Secure as PKE
Zvika Brakerski and Vinod Vaikuntanathan
2013/540 ( PDF )
On the security of a password-only authenticated three-party key exchange protocol
Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
2013/539 ( PDF )
Rebound attacks on Stribog
Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef
2013/538 ( PDF )
Practical Issues with TLS Client Certificate Authentication
Arnis Parsovs
2013/537 ( PDF )
Inter-FSP Funds Transfer Protocol
Amir Herzberg and Shay Nachmani
2013/536 ( PDF )
A Three-Level Sieve Algorithm for the Shortest Vector Problem
Feng Zhang and Yanbin Pan and Gengran Hu
2013/535 ( PDF )
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms
Sujoy Sinha Roy and Junfeng Fan and Ingrid Verbauwhede
2013/534 ( PDF )
Efficient Unobservable Anonymous Reporting against Strong Adversaries
Nethanel Gelernter and Amir Herzberg
2013/533 ( PDF )
Gossip Latin Square and The Meet-All Gossipers Problem
Nethanel Gelernter and Amir Herzberg
2013/532 ( PDF )
On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves
Takakazu Satoh
2013/531 ( PDF )
On the Limits of Provable Anonymity
Nethanel Gelernter and Amir Herzberg
2013/530 ( PDF )
The Parallel-Cut Meet-In-The-Middle Attack
Ivica Nikolic and Lei Wang and Shuang Wu
2013/529 ( PDF )
How to Withstand Mobile Virus Attacks, Revisited
Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky
2013/528 ( PDF )
Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption
Somindu C. Ramanna and Palash Sarkar
2013/527 ( PDF )
The Spammed Code Offset Method
Boris Skoric and Niels de Vreede
2013/526 ( PDF )
Differential and Linear Cryptanalysis of Reduced-Round Simon
Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel
2013/525 ( PDF )
Catena : A Memory-Consuming Password-Scrambling Framework
Christian Forler and Stefan Lucks and Jakob Wenzel
2013/524 ( PDF )
Threshold Secret Image Sharing
Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang and YaWei Ren
2013/523 ( PDF )
White-Box Security Notions for Symmetric Encryption Schemes
Cécile Delerablée and Tancrède Lepoint and Pascal Paillier and Matthieu Rivain
2013/522 ( PDF )
The Resistance of PRESENT-80 Against Related-Key Differential Attacks
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk and Huaxiong Wang
2013/521 ( PDF )
Multiple Limited-Birthday Distinguishers and Applications
Jérémy Jean and María Naya-Plasencia and Thomas Peyrin
2013/520 ( PDF )
Locally Updatable and Locally Decodable Codes
Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky
2013/519 ( PDF )
Montgomery Multiplication Using Vector Instructions
Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha
2013/518 ( -- withdrawn -- )
Universal Leaky Random Oracle Model
Guangjun Fan and Yongbin Zhou and Dengguo Feng
2013/517 ( PDF )
Improvement of One Adaptive Oblivious Transfer Scheme
Zhengjun Cao and Lihua Liu
2013/516 ( PDF )
Algebraic MACs and Keyed-Verification Anonymous Credentials
Melissa Chase and Sarah Meiklejohn and Gregory M. Zaverucha
2013/515 ( PDF )
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
Changyu Dong and Liqun Chen and Zikai Wen
2013/514 ( PDF )
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
Jia Xu and Jianying Zhou
2013/513 ( PDF )
Enforcing Language Semantics Using Proof-Carrying Data
Stephen Chong and Eran Tromer and Jeffrey A. Vaughan
2013/512 ( PDF )
Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Jingguo Bi and Phong Q. Nguyen
2013/511 ( PDF )
Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, and Mohammad Reza Aref
2013/510 ( PDF )
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers
Johannes Buchmann and Daniel Cabarcas and Florian Göpfert and Andreas Hülsing and Patrick Weiden
2013/509 ( PDF )
Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation
Susan Hohenberger and Amit Sahai and Brent Waters
2013/508 ( PDF )
Multi-Key Searchable Encryption
Raluca Ada Popa and Nickolai Zeldovich
2013/507 ( PDF )
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza
2013/506 ( PDF )
A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA
Pablo Rauzy and Sylvain Guilley
2013/505 ( PDF )
Improvement of One Anonymous Identity-Based Encryption
Zhengjun Cao and Lihua Liu
2013/504 ( PDF )
A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves
Reza Azarderakhsh and Koray Karabina
2013/503 ( PDF )
On secret sharing with nonlinear product reconstruction
Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing
2013/502 ( PDF )
Proving TLS-attack related open biases of RC4
Santanu Sarkar and Sourav Sen Gupta and Goutam Paul and Subhamoy Maitra
2013/501 ( PDF )
Type-Based Analysis of Protected Storage in the TPM (full version)
Jianxiong Shao and Dengguo Feng and Yu Qin
2013/500 ( PDF )
Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups
Ran Canetti and Vinod Vaikuntanathan
2013/499 ( PDF )
Limits on the Power of Cryptographic Cheap Talk
Pavel Hubacek and Jesper Buus Nielsen and Alon Rosen
2013/498 ( PDF )
Non-Malleable Codes from Two-Source Extractors
Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
2013/497 ( PDF )
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
Zhengjun Cao and Hanyue Cao
2013/496 ( PDF )
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
Juan Garay and Jonathan Katz and Ueli Maurer and Bjoern Tackmann and Vassilis Zikas
2013/495 ( PDF )
Revocable IBE Systems with Almost Constant-size Key Update
Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang
2013/494 ( PDF )
Differential Fault Attack against Grain family with very few faults and minimal assumptions
Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra
2013/493 ( PDF )
A new class of semi-bent quadratic Boolean functions
Chunming Tang and Yanfeng Qi
2013/492 ( PDF )
Cryptographically Enforced RBAC
Anna Lisa Ferrara and George Fuchsbauer and Bogdan Warinschi
2013/491 ( PDF )
Improved OT Extension for Transferring Short Secrets
Vladimir Kolesnikov and Ranjit Kumaresan
2013/490 ( PDF )
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
Masoumeh Safkhani, Nasour Bagheri
2013/489 ( PDF )
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments
Constantinos Patsakis and Agusti Solanas
2013/488 ( PDF )
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency
Kwangsu Lee and Dong Hoon Lee
2013/487 ( PDF )
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition
Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
2013/486 ( -- withdrawn -- )
Handling Authentication and Detection Probability in Multi-tag RFID Environment
Subhasish Dhal and Indranil Sengupta
2013/485 ( -- withdrawn -- )
A New Object Searching Protocol for Multi-tag RFID
Subhasish Dhal and Indranil Sengupta
2013/484 ( -- withdrawn -- )
Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification
Jiawei Yuan and Shucheng Yu
2013/483 ( PDF )
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search
Jean-Sébastien Coron and Jean-Charles Faugère and Guénaël Renault and Rina Zeitoun
2013/482 ( PDF )
Bounds in Shallows and in Miseries
Céline Blondeau and Andrey Bogdanov and Gregor Leander
2013/481 ( PDF )
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012
Yosuke Todo and Keita Xagawa
2013/480 ( PDF )
Efficient Multiparty Protocols via Log-Depth Threshold Formulae
Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz and Ron D. Rothblum
2013/479 ( PDF )
Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks
B. Skoric
2013/478 ( PDF )
Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach
Stefan G. Weber
2013/477 ( PDF )
Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing
Renaud Dubois and Margaux Dugardin and Aurore Guillevic
2013/476 ( PDF )
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Sourav Sen Gupta and Subhamoy Maitra and Willi Meier and Goutam Paul and Santanu Sarkar
2013/475 ( PDF )
A note on verifying the APN property
Pascale Charpin and Gohar M. Kyureghyan
2013/474 ( PDF )
Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications
Zhengjun Cao
2013/473 ( PDF )
The Norwegian Internet Voting Protocol
Kristian Gjøsteen
2013/472 ( PDF )
Partially blind password-based signatures using elliptic curves
Kristian Gjøsteen
2013/471 ( PDF )
Obfuscating Conjunctions
Zvika Brakerski and Guy N. Rothblum
2013/470 ( PDF )
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
2013/469 ( PDF )
Verifiable Delegation of Computation on Outsourced Data
Michael Backes and Dario Fiore and Raphael M. Reischuk
2013/468 ( PDF )
How To Construct Extractable One-Way Functions Against Uniform Adversaries
Nir Bitansky and Ran Canetti and Omer Paneth
2013/467 ( PDF )
Analysis of BLAKE2
Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu
2013/466 ( PDF )
Efficient computation of addition-subtraction chains using generalized continued Fractions
Amadou Tall and Ali Yassin Sanghare
2013/465 ( PDF )
Practical & Provably Secure Distance-Bounding
Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay
2013/464 ( PDF )
Towards A Practical JCJ / Civitas Implementation
Stephan Neumann and Christian Feier and Melanie Volkamer and Reto Koenig
2013/463 ( PDF )
Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
2013/462 ( PDF )
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese
2013/461 ( PDF )
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware
Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu
2013/460 ( PDF )
Solving Terminal Revocation in EAC by Augmenting Terminal Authentication
Rafik Chaabouni
2013/459 ( PDF )
Reset Indifferentiability and its Consequences
Paul Baecher and Christina Brzuska and Arno Mittelbach
2013/458 ( PDF )
Exponentiating in Pairing Groups
Joppe W. Bos and Craig Costello and Michael Naehrig
2013/457 ( PDF )
Deduction Soundness: Prove One, Get Five for Free
Florian Böhl and Véronique Cortier and Bogdan Warinschi
2013/456 ( PDF )
On the Security of Group-based Proxy Re-encryption Scheme
Purushothama B R and B B Amberker
2013/455 ( PDF )
Another Nail in the Coffin of White-Box AES Implementations
Tancrède Lepoint and Matthieu Rivain
2013/454 ( PDF )
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
Amit Sahai and Brent Waters
2013/453 ( PDF )
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
Nasour Bagheri, Masoumeh Safkhani
2013/452 ( PDF )
Secure Channel Coding Schemes based on Polar Codes
Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
2013/451 ( PDF )
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters
2013/450 ( PDF )
Revisiting the BGE Attack on a White-Box AES Implementation
Yoni De Mulder and Peter Roelse and Bart Preneel
2013/449 ( PDF )
A Note On the Storage Requirement for AKS Primality Testing Algorithm
Zhengjun Cao
2013/448 ( PDF )
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
Yuval Yarom and Katrina Falkner
2013/447 ( PDF )
Dynamic Runtime Methods to Enhance Private Key Blinding
Karine Gandolfi-Villegas and Nabil Hamzi
2013/446 ( PDF )
Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography
Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
2013/445 ( PDF )
Implementing Lightweight Block Ciphers on x86 Architectures
Ryad Benadjila and Jian Guo and Victor Lomné and Thomas Peyrin
2013/444 ( PDF )
Sequential message authentication code without random oracles
Bin Wang and Xiaojing Hong
2013/443 ( PDF )
Optimally Anonymous and Transferable Conditional E-cash
Jiangxiao Zhang. Hua Guo. Zhoujun Li. Chang Xu
2013/442 ( PDF )
On Fair Exchange, Fair Coins and Fair Sampling
Shashank Agrawal and Manoj Prabhakaran
2013/441 ( -- withdrawn -- )
On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences
Yongge Wang
2013/440 ( PDF )
Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption
Mitsugu Iwamoto and Junji Shikata
2013/439 ( PDF )
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
Peter Pessl and Michael Hutter
2013/438 ( PDF )
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations
Johann Heyszl and Andreas Ibing and Stefan Mangard and Fabrizio De Santis and Georg Sigl
2013/437 ( PDF )
A Uniform Min-Max Theorem with Applications in Cryptography
Salil Vadhan and Colin Jia Zheng
2013/436 ( PDF )
Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version
Charles Bouillaguet and Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Bo-Yin Yang
2013/435 ( PDF )
Efficient Cryptosystems From $2^k$-th Power Residue Symbols
Fabrice Benhamouda and Javier Herranz and Marc Joye and and Benoît Libert
2013/434 ( PDF )
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
Susan Hohenberger and Amit Sahai and Brent Waters
2013/433 ( PDF )
On Symmetric Encryption with Distinguishable Decryption Failures
Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
2013/432 ( PDF )
How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
Eric Brier and David Naccache and Li-yao Xia
2013/431 ( PDF )
Practical-Time Attacks Against Reduced Variants of MISTY1
Orr Dunkelman and Nathan Keller
2013/430 ( PDF )
Security of the Misty Structure Beyond the Birthday Bound
Jooyoung Lee
2013/429 ( PDF )
DupLESS: Server-Aided Encryption for Deduplicated Storage
Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart
2013/428 ( PDF )
Faster 128-EEA3 and 128-EIA3 Software
Roberto Avanzi and Billy Bob Brumley
2013/427 ( PDF )
Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials
Jiangtao Han and Haining Fan
2013/426 ( PDF )
Efficient Garbling from a Fixed-Key Blockcipher
Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi and Phillip Rogaway
2013/425 ( PDF )
Break WEP Faster with Statistical Analysis
Rafik Chaabouni
2013/424 ( PDF )
Instantiating Random Oracles via UCEs
Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
2013/423 ( PDF )
Locally Computable UOWHF with Linear Shrinkage
Benny Applebaum and Yoni Moses
2013/422 ( PDF )
Private Database Queries Using Somewhat Homomorphic Encryption
Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu
2013/421 ( PDF )
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)
Valentina Banciu and Simon Hoerder and Dan Page
2013/420 ( PDF )
The Holey Grail: A special score function for non-binary traitor tracing
B. Skoric and J.-J. Oosterwijk and J. Doumen
2013/419 ( PDF )
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
Rikke Bendlin and Sara Krehbiel and Chris Peikert
2013/418 ( PDF )
On Tight Security Proofs for Schnorr Signatures
Nils Fleischhacker and Tibor Jager and Dominique Schröder
2013/417 ( PDF )
The Improved Cube Attack on Grain-v1
Yongjuan Wang and Liren Ding and Wenbao Han and Xiangyu Wang
2013/416 ( PDF )
Computational Fuzzy Extractors
Benjamin Fuller and Xianrui Meng and Leonid Reyzin
2013/415 ( PDF )
SL2 homomorphic hash functions: Worst case to average case reduction and short collision search
Ciaran Mullan and Boaz Tsaban
2013/414 ( PDF )
A novel certificateless deniable authentication protocol
Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
2013/413 ( PDF )
Policy-Based Signatures
Mihir Bellare and Georg Fuchsbauer
2013/412 ( PDF )
Moduar Form Aprroach to Solving Lattice Problems
Yuan Tian, Xueyong Zhu, Rongxin Sun
2013/411 ( PDF )
Security Analysis of Lightweight Authentication Protocol from WISTP 2013
Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
2013/410 ( PDF )
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
Yossi Gilad and Amir Herzberg
2013/409 ( PDF )
Order-Preserving Encryption Secure Beyond One-Wayness
Tal Malkin and Isamu Teranishi and Moti Yung
2013/408 ( PDF )
Delegatable Functional Signatures
Michael Backes and Sebastian Meiser and Dominique Schröder
2013/407 ( PDF )
Automated Security Proofs for Almost-Universal Hash for MAC verification
Martin Gagné and Pascal Lafourcade and Yassine Lakhnech
2013/406 ( -- withdrawn -- )
Attribute-Based Server-Aided Verification Signature
Zhiwei Wang and Ruirui Xie and Wei Zhang and Liwen He and Guozi Sun and Wei Chen
2013/405 ( PDF )
New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields
Chunming Tang, Yanfeng Qi, Maozhi Xu
2013/404 ( PDF )
The SIMON and SPECK Families of Lightweight Block Ciphers
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2013/403 ( PDF )
Function-Private Subspace-Membership Encryption and Its Applications
Dan Boneh and Ananth Raghunathan and Gil Segev
2013/402 ( PDF )
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
Jue-Sam Chou1*, Chun-Hui Huang2, Yu-Siang Huang3, Yalin Chen4
2013/401 ( PDF )
Functional Signatures and Pseudorandom Functions
Elette Boyle and Shafi Goldwasser and Ioana Ivan
2013/400 ( PDF )
A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thomé
2013/399 ( PDF )
Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol
Roel Peeters and Jens Hermans
2013/398 ( PDF )
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Colin Boyd and Cas Cremers and Michèle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila
2013/397 ( PDF )
Practical Secure Logging: Seekable Sequential Key Generators
Giorgia Azzurra Marson and Bertram Poettering
2013/396 ( PDF )
On the Practical Security of a Leakage Resilient Masking Scheme
Emmanuel Prouff and Matthieu Rivain and Thomas Roche
2013/394 ( PDF )
A Public Key Cryptoscheme Using Bit-pair Shadows
Shenghui Su and Shuwang Lv and Maozhi Xu
2013/393 ( PDF )
Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model
Yong Li and Zheng Yang
2013/392 ( PDF )
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
Christian Hanser and Daniel Slamanig
2013/391 ( PDF )
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2013/390 ( PDF )
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada
2013/389 ( PDF )
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes
Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
2013/388 ( PDF )
Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions
Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi
2013/387 ( PDF )
Cryptographically Protected Prefixes for Location Privacy in IPv6
Jonathan Trostle and Hosei Matsuoka and James Kempf and Toshiro Kawahara and Ravi Jain
2013/386 ( PDF )
Side Channel Attacks against Pairing over Theta Functions
Nadia El Mrabet
2013/385 ( -- withdrawn -- )
Cryptanalysis of ultralightweight RFID authentication protocol
Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed, Usman Mujahid
2013/384 ( PDF )
Sequential Aggregate Signatures Made Shorter
Kwangsu Lee and Dong Hoon Lee and Moti Yung
2013/383 ( PDF )
Lattice Signatures and Bimodal Gaussians
Léo Ducas and Alain Durmus and Tancrède Lepoint and Vadim Lyubashevsky
2013/382 ( PDF )
To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC
Yevgeniy Dodis and Thomas Ristenpart and John Steinberger and Stefano Tessaro
2013/381 ( -- withdrawn -- )
Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Grøstl
Bingke Ma and Bao Li and Ronglin Hao
2013/380 ( PDF )
Comments on Three Multi-Server Authentication Protocols
Yalin Chen 1, *Jue-Sam Chou2, Wen-Yi Tsai 3
2013/379 ( PDF )
Delegatable Pseudorandom Functions and Applications
Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias
2013/378 ( PDF )
A note on quantum related-key attacks
Martin Roetteler and Rainer Steinwandt
2013/377 ( PDF )
An Algebraic Framework for Diffie-Hellman Assumptions
Alex Escala and Gottfried Herold and Eike Kiltz and Carla Ràfols and Jorge Villar
2013/376 ( PDF )
An Accurate Probabilistic Reliability Model for Silicon PUFs
Roel Maes
2013/375 ( PDF )
NaCl on 8-Bit AVR Microcontrollers
Michael Hutter and Peter Schwabe
2013/374 ( PDF )
A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN
Majid Bayat, Mohammad Reza Aref
2013/373 ( PDF )
Injective Encoding to Elliptic Curves
Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi
2013/372 ( PDF )
Practical Bootstrapping in Quasilinear Time
Jacob Alperin-Sheriff and Chris Peikert
2013/371 ( PDF )
Domain-Polymorphic Programming of Privacy-Preserving Applications
Dan Bogdanov and Peeter Laud and Jaak Randmets
2013/370 ( PDF )
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions
François-Xavier Standaert and Olivier Pereira and Yu Yu
2013/369 ( PDF )
Block Ciphers that are Easier to Mask: How Far Can we Go?
Benoît Gérard and Vincent Grosso and María Naya-Plasencia and François-Xavier Standaert
2013/368 ( PDF )
Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique--
Jacques Patarin
2013/367 ( PDF )
On the Security of TLS-DH and TLS-RSA in the Standard Model
Florian Kohlar and Sven Schäge and Jörg Schwenk
2013/366 ( PDF )
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin
2013/365 ( PDF )
Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model
Zheng Yang
2013/364 ( PDF )
On the Achievability of Simulation-Based Security for Functional Encryption
Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano
2013/363 ( PDF )
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems --
Masao KASAHARA
2013/362 ( PDF )
A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor
Shigeo MITSUNARI
2013/361 ( PDF )
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
2013/360 ( PDF )
Achieving the limits of the noisy-storage model using entanglement sampling
Frédéric Dupuis and Omar Fawzi and Stephanie Wehner
2013/359 ( PDF )
A heuristic for finding compatible differential paths with application to HAS-160
Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef
2013/358 ( PDF )
Counter-cryptanalysis
Marc Stevens
2013/357 ( PDF )
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE
Dmitry Khovratovich and Christian Rechberger
2013/356 ( PDF )
Verifying Computations with State (Extended Version)
Benjamin Braun and Ariel J. Feldman and Zuocheng Ren and Srinath Setty and Andrew J. Blumberg and Michael Walfish
2013/355 ( PDF )
New Attacks against Transformation-Based Privacy-Preserving Linear Programming
Peeter Laud and Alisa Pankova
2013/354 ( PDF )
Programmable Hash Functions in the Multilinear Setting
Eduarda S.V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks
2013/353 ( PDF )
Profiling DPA: Efficacy and efficiency trade-offs
Carolyn Whitnall and Elisabeth Oswald
2013/352 ( PDF )
Constrained Pseudorandom Functions and Their Applications
Dan Boneh and Brent Waters
2013/351 ( PDF )
Time-Optimal Interactive Proofs for Circuit Evaluation
Justin Thaler
2013/350 ( PDF )
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam
2013/349 ( PDF )
A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation
Martin Hirt and Christoph Lucas and Ueli Maurer
2013/348 ( PDF )
Multi-file proofs of retrievability for cloud storage auditing
Bin Wang and Xiaojing Hong
2013/347 ( PDF )
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
2013/346 ( PDF )
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson
2013/345 ( PDF )
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
Arnab Roy and Srinivas Vivek
2013/344 ( PDF )
Limits of provable security for homomorphic encryption
Andrej Bogdanov and Chin Ho Lee
2013/343 ( PDF )
Quantum one-time programs
Anne Broadbent and Gus Gutoski and Douglas Stebila
2013/342 ( PDF )
Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices
Xiang Xie and Rui Xue
2013/341 ( PDF )
Trapdoor Smooth Projective Hash Functions
Fabrice Benhamouda and David Pointcheval
2013/340 ( PDF )
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
Craig Gentry and Amit Sahai and Brent Waters
2013/339 ( PDF )
On the Security of the TLS Protocol: A Systematic Analysis
Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee
2013/338 ( PDF )
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
2013/337 ( PDF )
Attribute-Based Encryption for Circuits
Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2013/336 ( -- withdrawn -- )
A Novel Technique in Linear Cryptanalysis
Wen-Long Sun Jie Guan Lin Ding
2013/335 ( PDF )
Parallel and Dynamic Searchable Symmetric Encryption
Seny Kamara and Charalampos Papamanthou
2013/334 ( PDF )
Protecting PUF Error Correction by Codeword Masking
Dominik Merli and Frederic Stumpf and Georg Sigl
2013/333 ( PDF )
Double-authentication-preventing signatures
Bertram Poettering and Douglas Stebila
2013/332 ( PDF )
A method for obtaining lower bounds on the higher order nonlinearity of Boolean function
Mikhail S. Lobanov
2013/331 ( PDF )
New Constructions and Applications of Trapdoor DDH Groups
Yannick Seurin
2013/330 ( PDF )
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
Afonso Arriaga and Qiang Tang and Peter Ryan
2013/329 ( PDF )
Protocol Variants and Electronic Identification
Kristian Gjøsteen
2013/328 ( PDF )
Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20
Nicky Mouha and Bart Preneel
2013/327 ( PDF )
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
Shenghui Su and Tao Xie and Shuwang Lv
2013/326 ( PDF )
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Mihir Bellare and Sarah Meiklejohn and Susan Thomson
2013/325 ( PDF )
Elligator: Elliptic-curve points indistinguishable from uniform random strings
Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange
2013/324 ( PDF )
Sieve-in-the-Middle: Improved MITM Attacks (Full Version)
Anne Canteaut and María Naya-Plasencia and Bastien Vayssiere
2013/323 ( PS PS.GZ PDF )
Encryption Schemes with Post-Challenge Auxiliary Inputs
Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu
2013/322 ( PDF )
BLAKE2: simpler, smaller, fast as MD5
Jean-Philippe Aumasson and Samuel Neves and Zooko Wilcox-O'Hearn and Christian Winnerlein
2013/321 ( PDF )
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote
2013/320 ( PDF )
Instantaneous Frequency Analysis
Roman Korkikian and David Naccache and Guilherme Ozari de Almeida
2013/319 ( PDF )
On the use of continued fractions for stream ciphers
Amadou Moctar Kane
2013/318 ( PDF )
Fully-Anonymous Functional Proxy-Re-Encryption
Yutaka Kawai and Katsuyuki Takashima
2013/317 ( PDF )
Anon-Pass: Practical Anonymous Subscriptions
Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel
2013/316 ( PDF )
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir
2013/315 ( PDF )
Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes
Albrecht Petzoldt
2013/314 ( PDF )
Keyed Side-Channel Based Hashing for IP Protection using Wavelets
Timo Bartkewitz
2013/313 ( PDF )
Pairing Inversion via Non-degenerate Auxiliary Pairings
Seunghwan Chang and Hoon Hong and Eunjeong Lee and Hyang-Sook Lee
2013/312 ( PDF )
Families of fast elliptic curves from Q-curves
Benjamin Smith
2013/311 ( PDF )
Four-dimensional GLV via the Weil restriction
Aurore Guillevic and Sorina Ionica
2013/310 ( PDF )
MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange
2013/309 ( PDF )
Bypassing Passkey Authentication in Bluetooth Low Energy
Tomas Rosa
2013/308 ( PDF )
Lattice-Based Group Signatures with Logarithmic Signature Size
Fabien Laguillaumie and Adeline Langlois and Benoit Libert and Damien Stehle
2013/307 ( PDF )
Maliciously Circuit-Private FHE
Rafail Ostrovsky and Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky
2013/306 ( PDF )
Solving a $6120$-bit DLP on a Desktop Computer
Faruk Göloğlu and Robert Granger and Gary McGuire and Jens Zumbrägel
2013/305 ( PDF )
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
Sonia Belaid and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and Jorn-Marc Schmidt and Francois-Xavier Standaert and Stefan Tillich
2013/304 ( PDF )
Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers
Anthony Van Herrewege and Vincent van der Leest and André Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede
2013/303 ( PDF )
Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
Shivam Bhasin and Claude Carlet and Sylvain Guilley
2013/302 ( PDF )
Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors
Nicolas T. Courtois
2013/301 ( PDF )
Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128
Zheng Yuan and Xian Li and Haixia Liu
2013/300 ( PDF )
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
Allison Lewko and Sarah Meiklejohn
2013/299 ( PDF )
Computing class polynomials for abelian surfaces
Andres Enge and Emmanuel Thomé
2013/298 ( PDF )
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin Wojcik
2013/297 ( PDF )
Improvement and Efficient Implementation of a Lattice-based Signature Scheme
Rachid El~Bansarkhani and Johannes Buchmann
2013/296 ( PDF )
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
Morten Dahl and Ivan Damgård
2013/295 ( PDF )
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
Mickaël Cazorla and Kevin Marquet and Marine Minier
2013/294 ( PDF )
Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis
Colin O'Flynn and Zhizhang (David) Chen
2013/293 ( PDF )
A Toolkit for Ring-LWE Cryptography
Vadim Lyubashevsky and Chris Peikert and Oded Regev
2013/292 ( PDF )
A Leakage Resilient MAC
Daniel P. Martin and Elisabeth Oswald and Martijn Stam and Marcin Wojcik
2013/291 ( PDF )
Security ranking among assumptions within the Uber assumption framework
Antoine Joux and Antoine Rojat
2013/290 ( PDF )
Massive Group Message Authentication with Revocable Anonymity
Boaz Catane and Amir Herzberg
2013/289 ( PDF )
Secure Second Price Auctions with a Rational Auctioneer
Boaz Catane and Amir Herzberg
2013/288 ( PDF )
Key Classification Attack on Block Ciphers
Maghsoud Parviz and Seyed Hassan Mousavi and Saeed Mirahmadi
2013/287 ( PDF )
The failure of McEliece PKC based on Reed-Muller codes.
I. V. Chizhov and M. A. Borodin
2013/286 ( PDF )
Salvaging Indifferentiability in a Multi-stage Setting
Arno Mittelbach
2013/285 ( PDF )
A Novel Proof on Weil Pairing
Sutirtha Sanyal
2013/284 ( PDF )
A Secure Paper-Based Electronic Voting With No Encryption
Asghar Tavakkoli, Reza Ebrahimi Atani
2013/283 ( PDF )
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
Dan Boneh and Ananth Raghunathan and Gil Segev
2013/282 ( PDF )
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Goutam Paul and Anupam Chattopadhyay
2013/281 ( PDF )
Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit
2013/280 ( PDF )
Path ORAM: An Extremely Simple Oblivious RAM Protocol
Emil Stefanov and Marten van Dijk and Elaine Shi and T-H. Hubert Chan and Christopher Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas
2013/279 ( PDF )
Pinocchio: Nearly Practical Verifiable Computation
Bryan Parno and Craig Gentry and Jon Howell and Mariana Raykova
2013/278 ( PDF )
A Frequency Leakage Model and its application to CPA and DPA
S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and P. Maurine
2013/277 ( PDF )
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
2013/276 ( PDF )
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
David Bernhard and Stephan Neumann and Melanie Volkamer
2013/275 ( PDF )
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
Johannes Braun and Gregor Rynkowski
2013/274 ( PDF )
A time series approach for profiling attack
Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch
2013/273 ( PDF )
Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions
Deepak Kumar Dalai
2013/272 ( PDF )
Cryptography Challenges for Computational Privacy in Public Clouds
Sashank Dara
2013/271 ( PDF )
The Legal Classification of Identity-Based Signatures
Christoph Sorge
2013/270 ( PDF )
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
Yu Yu
2013/269 ( PDF )
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Jonathan Trostle
2013/268 ( PDF )
Dynamic Cube Attack on Grain-v1
Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
2013/267 ( PDF )
Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee
2013/266 ( PDF )
L-P States of RC4 Stream Cipher
Jing Lv and Dongdai Lin
2013/265 ( PDF )
Attribute-Based Encryption with Fast Decryption
Susan Hohenberger and Brent Waters
2013/264 ( PDF )
Encrypted Secret Sharing and Analysis by Plaintext Randomization
Stephen R. Tate and Roopa Vishwanathan and Scott Weeks
2013/263 ( PDF )
Speeding up QUAD
Albrecht Petzoldt
2013/262 ( PDF )
An efficient FHE based on the hardness of solving systems of non-linear multivariate equations
Gérald Gavin
2013/261 ( PDF )
Secure information transmission based on physical principles
Dima Grigoriev and Vladimir Shpilrain
2013/260 ( PDF )
From Weak to Strong Zero-Knowledge and Applications
Kai-Min Chung and Edward Lui and Rafael Pass
2013/259 ( PDF )
Private Interactive Communication Across an Adversarial Channel
Ran Gelles and Amit Sahai and Akshay Wadia
2013/258 ( PDF )
Witness Encryption and its Applications
Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters
2013/257 ( PDF )
Secure two-party computation: a visual way
Paolo D'Arco and Roberto De Prisco
2013/256 ( PDF )
On the Lossiness of the Rabin Trapdoor Function
Yannick Seurin
2013/255 ( PDF )
How to Construct an Ideal Cipher from a Small Set of Public Permutations
Rodolphe Lampe and Yannick Seurin
2013/254 ( PDF )
Towards Adoption of DNSSEC: Availability and Security Challenges
Amir Herzberg and Haya Shulman
2013/253 ( PDF )
CacheAudit: A Tool for the Static Analysis of Cache Side Channels
Goran Doychev and Dominik Feld and Boris Köpf and Laurent Mauborgne and Jan Reineke
2013/252 ( PDF )
On the Primitivity of some Trinomials over Finite Fields
LI Yujuan, WANG Huaifu, ZHAO Jinhua
2013/251 ( PDF )
Permutation Polynomials and Their Differential Properties over Residue Class Rings
Yuyin Yu and Mingsheng Wang
2013/250 ( PDF )
Fully Homomorphic Encryption for Mathematicians
Alice Silverberg
2013/249 ( PDF )
How to Factor N_1 and N_2 When p_1=p_2 mod 2^t
Kaoru Kurosawa and Takuma Ueda
2013/248 ( PDF )
Another Look at Security Theorems for 1-Key Nested MACs
Neal Koblitz and Alfred Menezes
2013/247 ( PDF )
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction
Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu
2013/246 ( PDF )
A Lever Function to a New Codomain with Adequate Indeterminacy
Shenghui Su and Maozhi Xu and Shuwang Lv
2013/245 ( PDF )
The Fiat-Shamir Transformation in a Quantum World
Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni
2013/244 ( PDF )
Cryptographic schemes, key exchange, public key.
Ted Hurley
2013/243 ( PDF )
A Simple ORAM
Kai-Min Chung and Rafael Pass
2013/242 ( PDF )
AE5 Security Notions: Definitions Implicit in the CAESAR Call
Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton
2013/241 ( PDF )
The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4
Joachim Strömbergson and Simon Josefsson
2013/240 ( PDF )
Algebraic analysis of Trivium-like ciphers
Sui-Guan Teo and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
2013/239 ( PDF )
Optimizing ORAM and Using it Efficiently for Secure Computation
Craig Gentry and Kenny Goldman and Shai Halevi and Charanjit Julta and Mariana Raykova and Daniel Wichs
2013/238 ( PDF )
Anonymity-preserving Public-Key Encryption: A Constructive Approach
Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Björn Tackmann and Daniele Venturi
2013/237 ( PDF )
Type-Based Analysis of Generic Key Management APIs (Long Version)
Pedro Adão and Riccardo Focardi and Flaminia L. Luccio
2013/236 ( PDF )
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security
Kaitai Liang and Liming Fang and Duncan S. Wong and Willy Susilo
2013/235 ( PDF )
Ballot secrecy and ballot independence: definitions and relations
Ben Smyth and David Bernhard
2013/234 ( PDF )
A Cryptographic Analysis of OPACITY
Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete
2013/233 ( PDF )
Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai
2013/232 ( PDF )
Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean function
Kaushik Chakraborty and Anupam Chattopadhyay and Subhamoy Maitra
2013/231 ( PDF )
Sakura: a flexible coding for tree hashing
Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
2013/230 ( PDF )
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo
2013/229 ( PDF )
How to Run Turing Machines on Encrypted Data
Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and and Nickolai Zeldovich
2013/228 ( PDF )
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park
2013/227 ( PDF )
Analysis of authentication and key establishment in inter-generational mobile telephony
Chunyu Tang and David A. Naumann and Susanne Wetzel
2013/226 ( PDF )
Public key exchange using semidirect product of (semi)groups
Maggie Habeeb and Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
2013/225 ( PDF )
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
Mohammad Etemad and Alptekin Küpçü
2013/224 ( PDF )
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Yuanyuan Zhou and Yu Yu and François-Xavier Standaert and Jean-Jacques Quisquater
2013/223 ( PDF )
The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
2013/222 ( PDF )
Tight security bounds for key-alternating ciphers
Shan Chen, John Steinberger
2013/221 ( PDF )
Identity-based Aggregate Signatures with Verifiable Single Ones
Yang Zhang, Jun-liang Chen
2013/220 ( PDF )
Towards Efficient Private Distributed Computation on Unbounded Input Streams
Shlomi Dolev and Juan Garay and Niv Gilboa and Vladimir Kolesnikov and Yelena Yuditsky
2013/219 ( PDF )
Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes
Stefan G. Weber
2013/218 ( PDF )
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
Aurore Guillevic
2013/217 ( PDF )
Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth and Victoria Fehr and Marc Fischlin and Manuel Maasz and Nils Fabian Reimers and Richard Stein
2013/216 ( PDF )
Election Verifiability or Ballot Privacy: Do We Need to Choose?
Edouard Cuvelier and Olivier Pereira and Thomas Peters
2013/215 ( PDF )
Optical PUFs Reloaded
Ulrich Rührmair and Christian Hilgers and Sebastian Urban and Agnes Weiershäuser and Elias Dinter and Brigitte Forster and Christian Jirauschek
2013/214 ( PDF )
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
Filip Zagorski and Richard T. Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora
2013/213 ( PDF )
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes
Guangjun Fan and Yongbin Zhou and F.-X. Standaert and Dengguo Feng
2013/212 ( PDF )
A Closer Look at HMAC
Krzysztof Pietrzak
2013/211 ( PDF )
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)
Christina Boura and Anne Canteaut
2013/210 ( PDF )
Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
2013/209 ( PDF )
New modular multiplication and division algorithms based on continued fraction expansion
Mourad Gouicem
2013/208 ( PDF )
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
Yi-Ruei Chen and Cheng-Kang Chu and Wen-Guey Tzeng and Jianying Zhou
2013/207 ( PDF )
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication
Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng
2013/206 ( PDF )
Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation
Florian Kerschbaum and Hoon Wei Lim and Ivan Gudymenko
2013/205 ( PDF )
Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$
Jan Camenisch and Robert R. Enderlein and Victor Shoup
2013/204 ( PDF )
Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture
Shi Pu, Jyh-Charn Liu
2013/203 ( PDF )
From oblivious AES to efficient and secure database join in the multiparty setting
Sven Laur and Riivo Talviste and Jan Willemson
2013/202 ( PDF )
Breaking NLM-MAC Generator
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld
2013/201 ( PDF )
Non-malleable Codes from Additive Combinatorics
Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett
2013/200 ( PDF )
Selecting polynomials for the Function Field Sieve
Razvan Barbulescu
2013/199 ( PDF )
Quantum algorithms for the subset-sum problem
Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer
2013/198 ( PDF )
On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes
Zhizhou Li and Ten H. Lai
2013/197 ( PDF )
Discrete logarithm in GF(2^809) with FFS
Razvan Barbulescu and Cyril Bouvier and Jérémie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thomé and Marion Videau and Paul Zimmermann
2013/196 ( PDF )
Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat and Chih-hao Shen
2013/195 ( PDF )
On the (re)design of an FPGA-based PUF
Philipp Grabher and Dan Page and Marcin Wójcik
2013/194 ( PDF )
On the Impossibility of Cryptography with Tamperable Randomness
Per Austrin and Kai-Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth
2013/193 ( PDF )
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes
Yu-Chi Chen and Raylin Tso and Willy Susilo and Xinyi Huang and Gwoboa Horng
2013/192 ( PDF )
A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties
David Lubicz and Damien Robert
2013/191 ( PDF )
Improved Differential Fault Analysis on ARIA using Small Number of Faults
Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
2013/190 ( PDF )
Power Analysis Attacks against FPGA Implementations of KLEIN
Shaohua Tang and Jianhao Wu and Weijian Li and Zheng Gong
2013/189 ( PDF )
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes
Appala Naidu Tentu and Prabal Paul and V Ch Venkaiah
2013/188 ( PDF )
A family of 6-to-4-bit S-boxes with large linear branch number
Daniel Loebenberger and Michael Nüsken
2013/187 ( PDF )
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
Jorge Munilla, Alberto Peinado, Guoming Yang and Willy Susilo
2013/186 ( PDF )
On the (Im)possibility of Projecting Property in Prime-Order Setting
Jae Hong Seo
2013/185 ( PDF )
Security Analysis of Linearly Filtered NLFSRs
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett
2013/184 ( PDF )
The Vernam cipher is robust to small deviations from randomness
Boris Ryabko
2013/183 ( PDF )
Practical Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2013/182 ( PDF )
Collusion-Resistant Domain-Specific Pseudonymous Signatures
Julien Bringer and Herve Chabanne and Alain Patey
2013/181 ( PDF )
On the evaluation of modular polynomials
Andrew V. Sutherland
2013/180 ( PDF )
A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code
Masao KASAHARA
2013/179 ( PDF )
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2013/178 ( PDF )
Cryptanalysis of RC4(n,m) Stream Cipher
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
2013/177 ( PDF )
A generic construction for voting correctness at minimum cost - Application to Helios
Veronique Cortier and David Galindo and Stephane Glondu and Malika Izabachene
2013/176 ( PDF )
Distinguishing Attacks on RC4 and A New Improvement of the Cipher
Jing Lv and Bin Zhang and Dongdai Lin
2013/175 ( PDF )
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano
2013/174 ( PDF )
Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key
Deukjo Hong and Daesung Kwon
2013/173 ( PDF )
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"
Ray Perlner and Daniel Smith-Tone
2013/172 ( PDF )
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
Raphael Spreitzer and Thomas Plos
2013/171 ( PDF )
Confined Guessing: New Signatures From Standard Assumptions
Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Christoph Striecks
2013/170 ( PDF )
Fast Collision Attack on MD5
Tao Xie and Fanbao Liu and Dengguo Feng
2013/169 ( PDF )
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
David Cash and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
2013/168 ( PDF )
On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
Simon Hoerder and Kimmo Järvinen and Dan Page
2013/167 ( PDF )
Single Password Authentication
Tolga Acar and Mira Belenkiy and Alptekin Küpçü
2013/166 ( PDF )
On generalized semi-bent (and partially bent) Boolean functions
Brajesh Kumar Singh
2013/165 ( -- withdrawn -- )
A New Security and Privacy Framework for RFID In Cloud Computing
Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi
2013/164 ( PDF )
Provably Secure LWE Encryption with Smallish Uniform Noise and Secret
Daniel Cabarcas and Florian Göpfert and Patrick Weiden
2013/163 ( PDF )
Search Pattern Leakage in Searchable Encryption: Attacks and New Construction
Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu-an Tan
2013/162 ( PDF )
A Non Asymptotic Analysis of Information Set Decoding
Yann Hamdaoui and Nicolas Sendrier
2013/161 ( PDF )
Completeness Theorems for All Finite Stateless 2-Party Primitives
Daniel Kraschewski
2013/160 ( PDF )
Interactive Coding, Revisited
Kai-Min Chung and Rafael Pass and Sidharth Telang
2013/159 ( PDF )
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
Dingding Jia and Bao Liand Yamin Liu and Qixiang Mei
2013/158 ( PDF )
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version)
Armando Faz-Hernandez and Patrick Longa and Ana H. Sanchez
2013/157 ( PDF )
The fragility of AES-GCM authentication algorithm
Shay Gueron and Vlad Krasnov
2013/156 ( PDF )
Incentivizing Outsourced Computation
Mira Belenkiy and Melissa Chase and C. Chris Erway and John Jannotti and Alptekin Küpçü and Anna Lysyanskaya
2013/155 ( PDF )
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi
2013/154 ( PDF )
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
2013/153 ( PDF )
On the security of a certi cateless signature scheme in the standard model
Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
2013/152 ( PDF )
Policy-based Secure Deletion
Christian Cachin and Kristiyan Haralambiev and Hsu-Chun Hsiao and Alessandro Sorniotti
2013/151 ( PDF )
Some Fixes To SSH
Xu ZiJie
2013/150 ( PDF )
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya
2013/149 ( PDF )
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Jiawei Yuan and Shucheng Yu
2013/148 ( PDF )
AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
Alexander Rostovtsev
2013/147 ( PDF )
A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms
Naomi Benger and Manuel Charlemagne and Kefei Chen
2013/146 ( PDF )
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
2013/145 ( PDF )
Key Wrapping with a Fixed Permutation
Dmitry Khovratovich
2013/144 ( PDF )
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter and Carlos Cid
2013/143 ( PDF )
An architecture for practical actively secure MPC with dishonest majority
Marcel Keller and Peter Scholl and Nigel P. Smart
2013/142 ( PDF )
A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES
Kisoon YOON
2013/141 ( PDF )
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
M. Shakiba and M. Dakhilalian and H. Mala
2013/140 ( PDF )
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
Marc Fischlin and Nils Fleischhacker
2013/139 ( PDF )
Rethinking Definitions of Security for Session Key Agreement
Wesley George and Charles Rackoff
2013/138 ( PDF )
Multi-bit homomorphic encryption based on learning with errors over rings
Zhang Wei, Liu Shuguang, Yang Xiaoyuan
2013/137 ( PDF )
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
Payman Mohassel and Saeed Sadeghian
2013/136 ( PDF )
2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers
Dieter Schmidt
2013/135 ( PDF )
An MQ/Code Cryptosystem Proposal
Leonard J. Schulman
2013/134 ( PDF )
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Skeith III
2013/133 ( PDF )
New Lattice Based Signature Using The Jordan Normal Form
Hemlata Nagesh and Birendra Kumar Sharma
2013/132 ( PDF )
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
Niu Liu and Shaohua Tang and Lingling Xu
2013/131 ( PDF )
Two is the fastest prime: lambda coordinates for binary elliptic curves
Thomaz Oliveira and Julio López and Diego F. Aranha and Francisco Rodríguez-Henríquez
2013/130 ( PDF )
Blank Digital Signatures
Christian Hanser and Daniel Slamanig
2013/129 ( PDF )
An Ideal-Security Protocol for Order-Preserving Encoding
Raluca Ada Popa and Frank H. Li and Nickolai Zeldovich
2013/128 ( PDF )
Attribute-Based Encryption for Circuits from Multilinear Maps
Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters
2013/127 ( PDF )
Oblivious PAKE: Efficient Handling of Password Trials
Franziskus Kiefer and Mark Manulis
2013/126 ( PDF )
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
Aysajan Abidin and Jan-Åke Larsson
2013/125 ( PDF )
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
Ananth Raghunathan and Gil Segev and Salil Vadhan
2013/124 ( -- withdrawn -- )
Tamper Resilient Cryptography Without Self-Destruct
Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi,
2013/123 ( PDF )
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2013/122 ( PDF )
Practical collision attack on 40-step RIPEMD-128
Gaoli Wang
2013/121 ( PDF )
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
Helger Lipmaa
2013/120 ( PDF )
An Attack Against Fixed Value Discrete Logarithm Representations
Gergely Alpár and Jaap-Henk Hoepman and Wouter Lueks
2013/119 ( PDF )
Speeding up Ate Pairing Computation in Affine Coordinates
Duc-Phong Le and Chik How Tan
2013/118 ( PDF )
Throughput Optimized Implementations of QUAD
Jason R. Hamlet and Robert W. Brocato
2013/117 ( PDF )
On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s
Namhun Koo and Gook Hwa Cho and Soonhak Kwon
2013/116 ( PDF )
The Algorithm of AAES
Shiyong Zhang and Gongliang Chen and Lei Fan
2013/115 ( PDF )
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release
Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang
2013/114 ( PDF )
Public Key Exchange Using Matrices Over Group Rings
Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
2013/113 ( PDF )
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
2013/112 ( PDF )
PUF Modeling Attacks on Simulated and Silicon Data
Ulrich Rührmair and Jan Sölter and Frank Sehnke and Xiaolin Xu and Ahmed Mahmoud and Vera Stoyanova and Gideon Dror and Jürgen Schmidhuber and Wayne Burleson and Srinivas Devadas
2013/111 ( PDF )
Message Authentication Codes Secure against Additively Related-Key Attacks
Keita Xagawa
2013/110 ( PDF )
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
Gilad Asharov and Yehuda Lindell and Tal Rabin
2013/109 ( PDF )
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
Charanjit S. Jutla and Arnab Roy
2013/108 ( PDF )
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
Ivan Damgard and Alessandra Scafuro
2013/107 ( PDF )
On the Arithmetic Complexity of Strassen-Like Matrix Multiplications
Murat Cenk and M. Anwar Hasan
2013/106 ( -- withdrawn -- )
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
Roohallah Rastaghi
2013/105 ( PDF )
Lossy Chains and Fractional Secret Sharing
Yuval Ishai and Eyal Kushilevitz and Omer Strulovich
2013/104 ( PDF )
A Tutorial on White-box AES
James A. Muir
2013/103 ( PDF )
On the Complexity of Broadcast Setup
Martin Hirt and Pavel Raykov
2013/102 ( PDF )
On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis
Yuchen Cao, Yongbin Zhou and Zhenmei Yu
2013/101 ( PDF )
Notions of Black-Box Reductions, Revisited
Paul Baecher and Christina Brzuska and Marc Fischlin
2013/100 ( PDF )
Attacks and Comments on Several Recently Proposed Key Management Schemes
Niu Liu and Shaohua Tang and Lingling Xu
2013/099 ( PDF )
Constant-round secure two-party computation from a linear number of oblivious transfer
Samuel Ranellucci and Alain Tapp
2013/098 ( PDF )
Learning with Rounding, Revisited: New Reduction, Properties and Applications
Joel Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs
2013/097 ( PDF )
Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher
Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
2013/096 ( PDF )
State convergence in bit-based stream ciphers
Sui-Guan Teo and Harry Bartlett and Ali Alhamdan and Leonie Simpson and Kenneth Koon-Ho Wong and Ed Dawson
2013/095 ( PDF )
A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic
Antoine Joux
2013/094 ( PDF )
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
2013/093 ( PDF )
On the security of a certificateless aggregate signature scheme
Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou
2013/092 ( PDF )
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
Vadim Lyubashevsky and Daniel Masny
2013/091 ( PDF )
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers
Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
2013/090 ( -- withdrawn -- )
Functional Encryption Supporting Recursive Languages
Somindu C. Ramanna and Palash Sarkar
2013/089 ( PDF )
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
James McLaughlin and John A. Clark
2013/088 ( PDF )
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Dan Boneh and Mark Zhandry
2013/087 ( PDF )
Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1))
Namhun Koo and Gook Hwa Cho and Soonhak Kwon
2013/086 ( PDF )
Efficient Private File Retrieval by Combining ORAM and PIR
Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
2013/085 ( PDF )
Between a Rock and a Hard Place: Interpolating Between MPC and FHE
Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
2013/084 ( PDF )
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks
Boris Skoric and Allard P. Mosk and Pepijn W.H. Pinkse
2013/083 ( PDF )
A Security Framework for Analysis and Design of Software Attestation
Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Christian Wachsmann
2013/082 ( PDF )
Secret Sharing, Rank Inequalities, and Information Inequalities
Sebastia Martin and Carles Padro and An Yang
2013/081 ( PDF )
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
Yan Huang and Jonathan Katz and Dave Evans
2013/080 ( PDF )
An efficient attack of a McEliece cryptosystem variant based on convolutional codes
Grégory Landais and Jean-Pierre Tillich
2013/079 ( PDF )
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
2013/078 ( PDF )
Broadcast Steganography
Nelly Fazio and Antonio R. Nicolosi and Irippuge Milinda Perera
2013/077 ( PDF )
UC-Secure Multi-Session OT Using Tamper-Proof Hardware
Kaoru Kurosawa and Ro Nojima and Le Trieu Phong
2013/076 ( PDF )
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
Ling Ren and Xiangyao Yu and Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas
2013/075 ( PDF )
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
Joppe W. Bos and Kristin Lauter and Jake Loftus and Michael Naehrig
2013/074 ( PDF )
On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$ and $\F_{2^{3164}}$
Faruk Göloğlu and Robert Granger and Gary McGuire and Jens Zumbrägel
2013/073 ( PDF )
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
Marek Jawurek and Florian Kerschbaum and Claudio Orlandi
2013/072 ( PDF )
The UC approach: an application view
István Vajda
2013/071 ( PDF )
Relation collection for the Function Field Sieve
Jérémie Detrey and Pierrick Gaudry and Marion Videau
2013/070 ( PDF )
Related-key Attacks Against Full Hummingbird-2
Markku-Juhani O. Saarinen
2013/069 ( PDF )
Hardness of SIS and LWE with Small Parameters
Daniele Micciancio and Chris Peikert
2013/068 ( PDF )
Why Proving HIBE Systems Secure is Difficult
Allison Lewko and Brent Waters
2013/067 ( PDF )
Power Analysis of Hardware Implementations Protected with Secret Sharing
Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh-Ha Le and Michael Peeters and Gilles Van Assche
2013/066 ( PDF )
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
Amin Mohammadali; Zahra Ahmadian; Mohammad Reza Aref
2013/065 ( PDF )
Instantiating Treeless Signature Schemes
Patrick Weiden and Andreas Hülsing and Daniel Cabarcas and Johannes Buchmann
2013/064 ( PDF )
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
Sven Laur and Bingsheng Zhang
2013/063 ( PDF )
A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol
Christian L. F. Corniaux and Hossein Ghodosi
2013/062 ( PDF )
Symbolic Universal Composability
Florian Böhl and Dominique Unruh
2013/061 ( PS PS.GZ PDF )
On the Indifferentiability of Key-Alternating Ciphers
Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger
2013/060 ( PDF )
On FHE without bootstrapping
Aayush Jain
2013/059 ( PDF )
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
Ayesha Khalid and Deblin Bagchi and Goutam Paul and Anupam Chattopadhyay
2013/058 ( PDF )
Cryptanalysis of the Dragonfly Key Exchange Protocol
Dylan Clarke and Feng Hao
2013/057 ( PDF )
CRT-based Fully Homomorphic Encryption over the Integers
Jinsu Kim and Moon Sung Lee and Aaram Yun and Jung Hee Cheon
2013/056 ( PDF )
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
Kishan Chand Gupta and Indranil Ghosh Ray
2013/055 ( PDF )
Secrecy without one-way functions
Dima Grigoriev and Vladimir Shpilrain
2013/054 ( PDF )
Joint Compartmented Threshold Access Structures
Ali Aydın Selçuk and Ramazan Yılmaz
2013/053 ( PDF )
A revocable certificateless signature scheme
Yinxia Sun and Futai Zhang and Limin Shen and Robert H. Deng
2013/052 ( PDF )
Some Complexity Results and Bit Unpredictable for Short Vector Problem
Kuan Cheng
2013/051 ( PDF )
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
Payman Mohassel and Ben Riva
2013/050 ( PS PS.GZ PDF )
Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
Roohallah Rastaghi
2013/049 ( PDF )
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
Christopher Meyer and Jörg Schwenk
2013/048 ( PDF )
Power Balanced Circuits for Leakage-Power-Attacks Resilient Design
Basel Halak, Julian Murphy, Alex Yakovlev
2013/047 ( PDF )
Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes
Carles Padro
2013/046 ( PDF )
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
2013/045 ( -- withdrawn -- )
Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
Jiawei Yuan and Shucheng Yu
2013/044 ( PDF )
Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions
Fangguo Zhang and Xu Ma and Shengli Liu
2013/043 ( PDF )
Differential Fault Attack on the PRINCE Block Cipher
Ling Song and Lei Hu
2013/042 ( PDF )
Complexity of Multi-Party Computation Functionalities
Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
2013/041 ( PDF )
Trace Expression of r-th Root over Finite Field
Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
2013/040 ( PDF )
An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
Roohallah Rastaghi
2013/039 ( PDF )
Creating a Challenge for Ideal Lattices
Thomas Plantard and Michael Schneider
2013/038 ( PDF )
Verifiable Data Streaming
Dominique Schröder and Heike Schröder
2013/037 ( PDF )
Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
Jayaprakash Kar
2013/036 ( PDF )
Batch Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi
2013/035 ( -- withdrawn -- )
Improvements to NFC Mobile Transaction and Authentication Protocol
Muhammad Qasim Saeed
2013/034 ( PDF )
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2013/033 ( PDF )
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
2013/032 ( PDF )
Detection of Cheaters in Non-interactive Polynomial Evaluation
Maki Yoshida and Satoshi Obana
2013/031 ( PDF )
An Analysis of the EMV Channel Establishment Protocol
Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson
2013/030 ( PDF )
On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
Haiyan Sun
2013/029 ( PDF )
Improved Differential Fault Attack on MICKEY 2.0
Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
2013/028 ( PDF )
More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96
Stanislav Bulygin
2013/027 ( PDF )
Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol
Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven Watson
2013/026 ( PDF )
RSA private key reconstruction from random bits using SAT solvers
Constantinos Patsakis
2013/025 ( PDF )
The IITM Model: a Simple and Expressive Model for Universal Composability
Ralf Kuesters and Max Tuengerthal
2013/024 ( PDF )
New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field
Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
2013/023 ( PDF )
A New Practical Identity-Based Encryption System
Jong Hwan Park and Dong Hoon Lee
2013/022 ( PDF )
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
James McLaughlin and John A. Clark
2013/021 ( PDF )
Rate-Limited Secure Function Evaluation
Özgür Dagdelen and Payman Mohassel and Daniele Venturi
2013/020 ( PDF )
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles
Markus Rückert and Dominique Schroeder
2013/019 ( PDF )
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
Peter Gaži
2013/018 ( PDF )
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
Jae Hong Seo and Keita Emura
2013/017 ( PDF )
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions
Alexandra Boldyreva and Robert Lychev
2013/016 ( PDF )
Revocable Identity-Based Encryption Revisited: Security Model and Construction
Jae Hong Seo and Keita Emura
2013/015 ( PDF )
Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography
Graham Enos
2013/014 ( PDF )
On formal and automatic security verification of WSN transport protocols
Ta Vinh Thong and Amit Dvir
2013/013 ( PDF )
Efficiently Outsourcing Multiparty Computation under Multiple Keys
Andreas Peter and Erik Tews and Stefan Katzenbeisser
2013/012 ( PDF )
Tropical cryptography
Dima Grigoriev and Vladimir Shpilrain
2013/011 ( PDF )
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
James McLaughlin and John A. Clark
2013/010 ( PDF )
Simultaneous Resettable WI from One-way Functions
Kai-Min Chung and Rafael Pass
2013/009 ( PDF )
Achieving Anonymity Against Major Face Recognition Algorithms
Benedikt Driessen and Markus Dürmuth
2013/008 ( PDF )
Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security
Kai-Min Chung and Rafael Pass and Karn Seth
2013/007 ( PDF )
A Matrix Approach for Constructing Quadratic APN Functions
Yuyin Yu and Mingsheng Wang and Yongqiang Li
2013/006 ( PDF )
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
Qingfeng Cheng
2013/005 ( PDF )
Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA
Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue and Faouzi Chekir
2013/004 ( PDF )
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices
Damien Stehlé and Ron Steinfeld
2013/003 ( PDF )
On Formal Expressions of BRW-polynomials
Guillermo Morales-Luna
2013/002 ( PDF )
Generalized (Identity-Based) Hash Proof System and Its Applications
Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
2013/001 ( PDF )
Shielding circuits with groups
Eric Miles and Emanuele Viola
2012/733 ( PDF )
Reusable Garbled Circuits and Succinct Functional Encryption
Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich
2012/732 ( PDF )
Non-Interactive Key Exchange
Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson
2012/731 ( PDF )
Time-memory Trade-offs for Near-collisions
Gaëtan Leurent
2012/730 ( PS PS.GZ PDF )
Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Dalin Chu and Johann Großschädl and Zhe Liu and Volker Müller and Yang Zhang
2012/729 ( PDF )
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
Nir Bitansky and Omer Paneth
2012/728 ( PDF )
Defensive Leakage Camouflage
E. Brier and Q. Fortier and R. Korkikian and K. W. Magld and D. Naccache and G. Ozari de Almeida and A. Pommellet and A. H. Ragab and J. Vuillemin
2012/727 ( PDF )
On the Impossibility of Sender-Deniable Public Key Encryption
Dana Dachman-Soled
2012/726 ( PDF )
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
Marc Obrador and Paz Morillo and Sandra Guasch
2012/725 ( PDF )
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
Qingfeng Cheng
2012/724 ( PDF )
A Coding-Theoretic Approach to Recovering Noisy RSA Keys
Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn
2012/723 ( PDF )
Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks
Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov and Avraham Entelis
2012/722 ( PDF )
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
2012/721 ( PDF )
On the (In)security of Fischlin's Paradigm
Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao
2012/720 ( PDF )
Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields
Antoine Joux
2012/719 ( PDF )
An ideal multi-secret sharing scheme based on minimal privileged coalitions
Yun Song , Zhihui Li
2012/718 ( PDF )
Succinct Non-Interactive Arguments via Linear Interactive Proofs
Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth
2012/717 ( PDF )
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Jan Camenisch and Anna Lysyanskaya and Gregory Neven
2012/716 ( PDF )
Attribute-Based Functional Encryption on Lattices
Xavier Boyen
2012/715 ( PDF )
New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$
Jingyuan Zhao and Meiqin Wang and Jiazhe Chen and Yuliang Zheng
2012/714 ( PDF )
Discrete Gaussian Leftover Hash Lemma over Infinite Domains
Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai
2012/713 ( PDF )
Systematic Treatment of Remote Attestation
Aurelien Francillon and Quan Nguyen and Kasper B. Rasmussen and Gene Tsudik
2012/712 ( PDF )
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis
Farzaneh Abed and Eik List and Stefan Lucks
2012/711 ( PDF )
Unprovable Security of Two-Message Zero Knowledge
Kai-Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass
2012/710 ( PDF )
Non Observability in the Random Oracle Model
Prabhanjan Ananth and Raghav Bhaskar
2012/709 ( PDF )
Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng and Wen-Feng Qi
2012/708 ( PDF )
Calling out Cheaters: Covert Security With Public Verifiability
Gilad Asharov and Claudio Orlandi
2012/707 ( PDF )
Cryptanalysis of WIDEA
Gaëtan Leurent
2012/706 ( PDF )
On the (In)security of the Fiat-Shamir Paradigm, Revisited
Dana Dachman-Soled and Abhishek Jain and Yael Tauman Kalai and Adriana Lopez-Alt
2012/705 ( PDF )
Why "Fiat-Shamir for Proofs" Lacks a Proof
Nir Bitansky and Sanjam Garg and Daniel Wichs
2012/704 ( PDF )
On the Non-malleability of the Fiat-Shamir Transform
Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi
2012/703 ( PDF )
Profiled Model Based Power Simulator for Side Channel Evaluation
Nicolas Debande and Maël Berthier and Yves Bocktaels and Thanh-Ha Le
2012/702 ( PDF )
Cryptanalysis of RAPP, an RFID Authentication Protocol
Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
2012/701 ( PDF )
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu
2012/700 ( PDF )
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong-Sheng Zhou
2012/699 ( PDF )
How Practical is Public-Key Encryption Based on LPN and Ring-LPN?
Ivan Damgård and Sunoo Park
2012/698 ( PDF )
5PM: Secure Pattern Matching
Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler
2012/697 ( PDF )
Verifiable Elections That Scale for Free
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2012/696 ( PDF )
Cryptanalysis of RAKAPOSHI Stream Cipher
Lin Ding and Jie Guan
2012/695 ( PDF )
Fully Automated Analysis of Padding-Based Encryption in the Computational Model
Gilles Barthe and Juan Manuel Crespo and Benjamin Grégoire and César Kunz and Yassine Lakhnech and Benedikt Schmidt and Santiago Zanella-Béguelin
2012/694 ( PDF )
Cryptanalysis of matrix conjugation schemes
A. D. Myasnikov and A. Ushakov
2012/693 ( PDF )
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters
2012/692 ( PDF )
Generic Constructions of Integrated PKE and PEKS
Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin
2012/691 ( PDF )
Root Optimization of Polynomials in the Number Field Sieve
Shi Bai and Richard P. Brent and Emmanuel Thomé
2012/690 ( PDF )
The Weakness of Integrity Protection for LTE
Teng Wu and Guang Gong
2012/689 ( PDF )
Cryptography Using CAPTCHA Puzzles
Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia
2012/688 ( PDF )
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
Jintai Ding, Xiang Xie, Xiaodong Lin
2012/687 ( PDF )
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
Karyn Benson and Hovav Shacham and Brent Waters
2012/686 ( PDF )
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl
Jian Zou and Wenling Wu and Shuang Wu and Le Dong
2012/685 ( PDF )
Square root computation over even extension fields
Gora Adj and Francisco Rodríguez-Henríquez
2012/684 ( PDF )
Generic Related-key Attacks for HMAC
Thomas Peyrin and Yu Sasaki and Lei Wang
2012/683 ( -- withdrawn -- )
Fingerprint Tables: A Generalization of Rainbow Tables
Gildas Avoine and Adrien Bourgeois and Xavier Carpent
2012/682 ( PDF )
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud
Jiawei Yuan and Shucheng Yu
2012/681 ( PDF )
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations
Guang Gong and Mark Aagaard and Xinxin Fan
2012/680 ( PDF )
Natural Generalizations of Threshold Secret Sharing
Oriol Farras,Carles Padro,Chaoping Xing, and An Yang
2012/679 ( PDF )
Hiding the Input-Size in Secure Two-Party Computation
Yehuda Lindell and Kobbi Nissim and Claudio Orlandi
2012/678 ( PDF )
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
Benedikt Gierlichs and Jorn-Marc Schmidt and Michael Tunstall
2012/677 ( PDF )
What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher
Jialin Huang and Xuejia Lai
2012/676 ( PDF )
Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan
Julia Borghoff
2012/675 ( PDF )
Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA
Yoshinori Aono
2012/674 ( PDF )
Lecture Notes in Secret Sharing
Carles Padro
2012/673 ( PDF )
Robust Encryption, Revisited
Pooya Farshim and Benoît Libert and Kenneth G. Paterson and Elizabeth A. Quaglia
2012/672 ( PDF )
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
Itai Dinur and Orr Dunkelman and Adi Shamir
2012/671 ( PDF )
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
Tatsuaki Okamoto and Katsuyuki Takashima
2012/670 ( PDF )
Fast Cryptography in Genus 2
Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
2012/669 ( PDF )
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay
Zhen Liu and Zhenfu Cao and Duncan S. Wong
2012/668 ( PDF )
Construction of Differential Characteristics in ARX Designs -- Application to Skein
Gaetan Leurent
2012/667 ( PDF )
False Negative probabilities in Tardos codes
Antonino Simone and Boris Skoric
2012/666 ( PS PS.GZ PDF )
Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem
Chenglian Liu and Ziwei Ye
2012/665 ( PDF )
Uniform Compression Functions Can Fail to Preserve “Full” Entropy
Daniel R. L. Brown
2012/664 ( PDF )
PRE- Stronger Security Notion and Efficient Construction with New Property
Jiang Zhang and Zhenfeng Zhang and Yu Chen
2012/663 ( PDF )
Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?
Alexander Rostovtsev
2012/662 ( PDF )
Asynchronous Physical Unclonable Functions – AsyncPUF
Julian Murphy
2012/661 ( PDF )
Breaking Another Quasigroup-Based Cryptographic Scheme
Markus Dichtl and Pascale Böffgen
2012/660 ( PDF )
Design of Secure Image Transmission in MANET using Number Theory Based Image Compression and Quasigroup Encryption (NTICQE) Algorithm
Munivel E and Rajeswari Mukesh
2012/659 ( PDF )
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks
Hassan Jameel Asghar and Shujun Li and Ron Steinfeld and Josef Pierpzyk
2012/658 ( PDF )
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy
2012/657 ( PDF )
Fixed Argument Pairing Inversion on Elliptic Curves
Sungwook Kim and Jung Hee Cheon
2012/656 ( PDF )
Security Evaluation of Rakaposhi Stream Cipher
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
2012/655 ( PDF )
Privacy Preserving Revocable Predicate Encryption Revisited
Kwangsu Lee and Intae Kim and Seong Oun Hwang
2012/654 ( PDF )
Refine the Concept of Public Key Encryption with Delegated Search
Qiang Tang and Yuanjie Zhao and Xiaofeng Chen and Hua Ma
2012/653 ( PDF )
How powerful are the DDH hard groups?
Periklis A. Papakonstantinou and Charles W. Rackoff and Yevgeniy Vahlis
2012/652 ( PDF )
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Vipul Goyal and Huijia Lin and Omkant Pandey and Rafael Pass and Amit Sahai
2012/651 ( -- withdrawn -- )
TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems
Kan Yang and Zhen Liu and Zhenfu Cao and Xiaohua Jia and Duncan S. Wong and Kui Ren
2012/650 ( PDF )
Formal analysis of privacy in Direct Anonymous Attestation schemes
Ben Smyth and Mark D. Ryan and Liqun Chen
2012/649 ( PDF )
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
Yannick Seurin and Joana Treger
2012/648 ( PDF )
Search in Encrypted Data: Theoretical Models and Practical Applications
Qiang Tang
2012/647 ( PDF )
A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions
Daniel Smith-Tone and Cristina Tone
2012/646 ( PDF )
Galindo-Garcia Identity-Based Signature, Revisited
Sanjit Chatterjee and Chethan Kamath and Vikas Kumar
2012/645 ( PDF )
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
2012/644 ( PDF )
Impossibility Results for Indifferentiability with Resets
Atul Luykx and Elena Andreeva and Bart Mennink and Bart Preneel
2012/643 ( PDF )
Protocols for Multiparty Coin Toss With Dishonest Majority
Amos Beimel and Eran Omri and Ilan Orlov
2012/642 ( PDF )
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
Ivan Damgard and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart
2012/641 ( PDF )
A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure
Bin Wang
2012/640 ( PDF )
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function
Gaoli Wang and Yanzhao Shen
2012/639 ( PDF )
Coarse-grained integer - Smooth? Rough? Both!
Daniel Loebenberger and Michael Nüsken
2012/638 ( PDF )
Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme
Cai-xue Zhou
2012/637 ( PDF )
Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification
Aviad Kipnis and Eliphaz Hibshoosh
2012/636 ( PDF )
On the Complexity of the BKW Algorithm on LWE
Martin R. Albrecht and Carlos Cid and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
2012/635 ( -- withdrawn -- )
Secure Outsourced Attribute-based Encryption
Jin Li and Jingwei Li and Xiaofeng Chen and Chunfu Jia and Duncan S. Wong
2012/634 ( PDF )
Cryptanalysis of Double-Block-Length Hash Mode MJH
Deukjo Hong and Daesung Kwon
2012/633 ( PDF )
New Preimage Attack on MDC-4
Deukjo Hong and Daesung Kwon
2012/632 ( PDF )
Pairings on Generalized Huff Curves
Abdoul Aziz Ciss and Djiby Sow
2012/631 ( PDF )
Message-Locked Encryption and Secure Deduplication
Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart
2012/630 ( PDF )
On the Security of TLS Renegotiation
Florian Giesen and Florian Kohlar and Douglas Stebila
2012/629 ( PDF )
SCAPI: The Secure Computation Application Programming Interface
Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell
2012/628 ( PDF )
Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems
Muhammad Yasir Malik
2012/627 ( PDF )
Efficient Group Signatures in the Standard Model
Laila El Aimani and Olivier Sanders
2012/626 ( PDF )
Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis
Xi Xiong and Haining Fan
2012/625 ( PDF )
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
Alexandra Boldyreva and Nathan Chenette and Adam O’Neill
2012/624 ( PDF )
Order-Preserving Symmetric Encryption
Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O’Neill
2012/623 ( PDF )
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes
David McGrew
2012/622 ( PDF )
Resolving the conflict between generality and plausibility in verified computation
Srinath Setty and Benjamin Braun and Victor Vu and Andrew J. Blumberg and Bryan Parno and Michael Walfish
2012/621 ( PDF )
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
Kitae Jeong and HyungChul Kang and Changhoon Lee and Jaechul Sung and Seokhie Hong
2012/620 ( PDF )
Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction
Claus P. Schnorr and Taras Shevchenko
2012/619 ( PDF )
Asynchronous Computational VSS with Reduced Communication Complexity
Michael Backes and Amit Datta and Aniket Kate
2012/618 ( -- withdrawn -- )
An ultra-lightweight ID-based pairwise key establishment scheme aiming at full collusion resistance
Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez-Perez, Jaime Gutierrez, Santos Merino del Pozo
2012/617 ( PDF )
Security Analysis of an Open Car Immobilizer Protocol Stack
Stefan Tillich and Marcin Wójcik
2012/616 ( PDF )
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
Nishanth Chandran and Sanjam Garg
2012/615 ( PDF )
Polynomial time solutions of computational problems in noncommutative-algebraic cryptography
Boaz Tsaban
2012/614 ( PDF )
An arithmetic intersection formula for denominators of Igusa class polynomials
Kristin Lauter and Bianca Viray
2012/613 ( PDF )
Resource-Restricted Indifferentiability
Grégory Demay and Peter Gaži and Martin Hirt and Ueli Maurer
2012/612 ( PDF )
Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff
Byoung-Il Kim and Jin Hong
2012/611 ( PDF )
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay
2012/610 ( PDF )
Candidate Multilinear Maps from Ideal Lattices
Sanjam Garg and Craig Gentry and Shai Halevi
2012/609 ( PDF )
A NEW APPROACH TO THE DISCRETE LOGARITHM PROBLEM WITH AUXILIARY INPUTS
Taechan Kim and Jung Hee Cheon
2012/608 ( PDF )
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting
Marina Blanton and Mehrdad Aliasgari
2012/607 ( PDF )
Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem
Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber
2012/606 ( PDF )
Quantum-Secure Message Authentication Codes
Dan Boneh and Mark Zhandry
2012/605 ( PDF )
Secure Outsourced Attribute-Based Signatures
Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
2012/604 ( PDF )
Leakage-Resilient Cryptography from Minimal Assumptions
Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs
2012/603 ( PDF )
Collecting Data while Preserving Individuals' Privacy: A Case Study
Alexis Bonnecaze and Robert Rolland
2012/602 ( PDF )
A note on invariant linear transformations in multivariate public key cryptography
Andreas Wiemers
2012/601 ( PS PS.GZ PDF )
How to Garble RAM Programs
Steve Lu and Rafail Ostrovsky
2012/600 ( PDF )
The LED Block Cipher
Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw
2012/599 ( PDF )
On the coefficients of the polynomial in the number field sieve
Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
2012/598 ( PDF )
Taking proof-based verified computation a few steps closer to practicality (extended version)
Srinath Setty and Victor Vu and Nikhil Panpalia and Benjamin Braun and Muqeet Ali and Andrew J. Blumberg and Michael Walfish
2012/597 ( PDF )
A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA
Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj
2012/596 ( PDF )
Evaluating User Privacy in Bitcoin
Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun
2012/595 ( PDF )
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes
Oriol Farràs and Carles Padró
2012/594 ( PDF )
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256
Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li
2012/593 ( PDF )
Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps
Tomoko Yonemura and Taichi Isogai and Hirofumi Muratani and Yoshikazu Hanatani
2012/592 ( PDF )
Attribute-Based Encryption for Circuits from Multilinear Maps
Amit Sahai and Brent Waters
2012/591 ( PDF )
Biclique Cryptanalysis Of PRESENT, LED, And KLEIN
Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2012/590 ( -- withdrawn -- )
--withdrawn--
--withdrawn--
2012/589 ( -- withdrawn -- )
--withdrawn--
--withdrawn--
2012/588 ( PDF )
Breaking Public Keys - How to Determine an Unknown RSA Public Modulus
Hans-Joachim Knobloch
2012/587 ( PDF )
Symbolic computation in block cipher with application to PRESENT
Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
2012/586 ( PDF )
SHADE: Secure HAmming DistancE computation from oblivious transfer
Julien Bringer and Herve Chabanne and Alain Patey
2012/585 ( PDF )
On Provably Secure Code-based Signature and Signcryption Scheme
Preetha Mathew K and Sachin Vasant and C. Pandu Rangan
2012/584 ( PDF )
Quantitative Analysis of the Full Bitcoin Transaction Graph
Dorit Ron and Adi Shamir
2012/583 ( PDF )
New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
Yannis Rouselakis and Brent Waters
2012/582 ( PS PS.GZ PDF )
Using Randomizers for Batch Verification of ECDSA Signatures
Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury
2012/581 ( PDF )
On the (in)security of some smart-card-based password authentication schemes for WSN
Ding Wang and Chun-guang Ma
2012/580 ( PDF )
Cryptanalysis of the OKH Authenticated Encryption Scheme
Peng Wang and Wenling Wu and Liting Zhang
2012/579 ( PDF )
Defending Against the Unknown Enemy: Applying FlipIt to System Security
Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos
2012/578 ( PDF )
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
2012/577 ( PDF )
A Framework for Unique Ring Signatures
Matthew Franklin and Haibin Zhang
2012/576 ( PDF )
Concurrent Signature without Random Oracles
Xiao Tan and Qiong Huang and Duncan S. Wong
2012/575 ( PDF )
Nanoelectronic Solutions for Hardware Security
Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki
2012/574 ( PDF )
Quantum algorithm for the discrete logarithm problem for matrices over finite group rings
A. D. Myasnikov and A. Ushakov
2012/573 ( PDF )
Limits on the Usefulness of Random Oracles
Iftach Haitner and Eran Omri and Hila Zarosim
2012/572 ( PDF )
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption
Divya Gupta and Amit Sahai
2012/571 ( PDF )
Improved side channel attack on the block cipher NOEKEON
Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
2012/570 ( PDF )
Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock
Hadi Soleimany and Kaisa Nyberg
2012/569 ( PDF )
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
San Ling and Khoa Nguyen and Damien Stehle and Huaxiong Wang
2012/568 ( PDF )
On Transaction Pseudonyms with Implicit Attributes
Stefan G. Weber
2012/567 ( PDF )
Leakage Squeezing of Order Two
Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi
2012/566 ( PDF )
Quantization in Continuous-Source Zero Secrecy Leakage Helper Data Schemes
Joep de Groot and Boris Škorić and Niels de Vreede and Jean-Paul Linnartz
2012/565 ( PDF )
Packed Ciphertexts in LWE-based Homomorphic Encryption
Zvika Brakerski and Craig Gentry and Shai Halevi
2012/564 ( PDF )
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
2012/563 ( PDF )
Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions
Kai-Min Chung and Huijia Lin and Rafael Pass
2012/562 ( PDF )
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Kwangsu Lee and Dong Hoon Lee and Moti Yung
2012/561 ( PDF )
An Attack on a Fully Homomorphic Encryption Scheme
Hu Yupu, Wang Fenghe
2012/560 ( PDF )
Computational Soundness of Coinductive Symbolic Security under Active Attacks
Mohammad Hajiabadi, Bruce M. Kapron
2012/559 ( PDF )
Plaintext Awareness in Identity-Based Key Encapsulation
Mark Manulis and Bertram Poettering and Douglas Stebila
2012/558 ( PDF )
Domain-Specifi c Pseudonymous Signatures for the German Identity Card
Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
2012/557 ( PDF )
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)
Stefan Katzenbeisser, Ünal Kocabas, Vladimir Rožic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede and Christian Wachsmann
2012/556 ( PDF )
Resource-based Corruptions and the Combinatorics of Hidden Diversity
Juan Garay and David Johnson and Aggelos Kiayias and Moti Yung
2012/555 ( PDF )
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation
Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai
2012/554 ( PDF )
Security weakness in the Proof of Storage with Deduplication
Youngjoo Shin, Junbeom Hur, Kwangjo Kim
2012/553 ( PDF )
Bellcore attack in practice
Andrey Sidorenko and Joachim van den Berg and Remko Foekema and Michiel Grashuis and Jaap de Vos
2012/552 ( PDF )
Provably Secure Concurrent Error Detection Against Differential Fault Analysis
Xiaofei Guo, Debdeep Mukhopadhyay and Ramesh Karri
2012/551 ( PDF )
Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists
Liangze Li and Hongfeng Wu and Fan Zhang
2012/550 ( PDF )
Dynamic Proofs of Retrievability via Oblivious RAM
David Cash and Alptekin Kupcu and Daniel Wichs
2012/549 ( PDF )
Faster batch forgery identification
Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk
2012/548 ( PDF )
Efficient Modular NIZK Arguments from Shift and Product
Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
2012/547 ( PDF )
Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity
Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta
2012/546 ( PDF )
Rotational cryptanalysis of round-reduced Keccak
Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny
2012/545 ( PDF )
A Versatile Multi-Input Multiplier over Finite Fields
Haibo Yi, Shaohua Tang, Lingling Xu
2012/544 ( PDF )
Differential Analysis of the LED Block Cipher
Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici
2012/543 ( PDF )
Enhanced Chosen-Ciphertext Security and Applications
Dana Dachman-Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill
2012/542 ( PDF )
Salus: A System for Server-Aided Secure Function Evaluation
Seny Kamara and Payman Mohassel and Ben Riva
2012/541 ( -- withdrawn -- )
2048XKS - A Software Oriented High Security Block Cipher
Dieter Schmidt
2012/540 ( PDF )
A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms
Ga Won Lee and Jin Hong
2012/539 ( PDF )
Efficient Implementation of RSA Algorithm with MKE
Sami A. Nagar and Dr. Saad Alshamma
2012/538 ( PDF )
Private Top-k Aggregation Protocols
Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim
2012/537 ( PDF )
Intercepting Tokens: The Empire Strikes Back in the Clone Wars
Özgür Dagdelen and Marc Fischlin
2012/536 ( PDF )
Secret Sharing and Secure Computing from Monotone Formulae
Ivan Bjerre Damgård and Jonas Kölker and Peter Bro Miltersen
2012/535 ( PDF )
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl
Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
2012/534 ( PDF )
A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes
Maura B. Paterson and Douglas R. Stinson
2012/533 ( PDF )
Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems
Thijs Laarhoven and Joop van de Pol and Benne de Weger
2012/532 ( PDF )
Pairing computation on Edwards curves with high-degree twists
Liangze Li and Hongfeng Wu and Fan Zhang
2012/531 ( PDF )
Generic Construction of Trace and Revoke Schemes
Murat Ak and Aggelos Kiayias and Serdar Pehlivanoglu and Ali Aydin Selcuk
2012/530 ( PS PS.GZ PDF )
Dynamic Searchable Symmetric Encryption
Seny Kamara and Charalampos Papamanthou and Tom Roeder
2012/529 ( PDF )
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version)
Julia Borghoff and Anne Canteaut and Tim Güneysu and Elif Bilge Kavun and Miroslav Knežević and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and Søren S. Thomsen and Tolga Yalçın
2012/528 ( PDF )
An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption
Graham Enos and Yuliang Zheng
2012/527 ( PDF )
Cryptanalysis of a recent two factor authentication scheme
Michael Scott
2012/526 ( PDF )
Invertible Polynomial Representation for Private Set Operations
Jung Hee Cheon and Hyunsook Hong and Hyung Tae Lee
2012/525 ( PDF )
Computing endomorphism rings of abelian varieties of dimension two
Gaetan Bisson
2012/524 ( PDF )
Tahoe – The Least-Authority Filesystem
Zooko Wilcox-O'Hearn and Brian Warner
2012/523 ( PDF )
The Curious Case of Non-Interactive Commitments
Mohammad Mahmoody and Rafael Pass
2012/522 ( PDF )
False Positive probabilities in q-ary Tardos codes: comparison of attacks
A. Simone and B. Skoric
2012/521 ( PDF )
Functional Encryption with Bounded Collusions via Multi-Party Computation
Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2012/520 ( PDF )
Optimizing Segment Based Document Protection (Corrected Version)
Miroslaw Kutylowski and Maciej Gebala
2012/519 ( PDF )
Faster implementation of scalar multiplication on Koblitz curves
Diego F. Aranha and Armando Faz-Hernández and Julio López and Francisco Rodríguez-Henríquez
2012/518 ( PDF )
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Kwangsu Lee and Dong Hoon Lee and Moti Yung
2012/517 ( PDF )
Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity
Ashish Choudhury and Martin Hirt and Arpita Patra
2012/516 ( PDF )
Garbling XOR Gates ``For Free'' in the Standard Model
Benny Applebaum
2012/515 ( PDF )
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
Mihir Bellare and Adam O'Neill
2012/514 ( PDF )
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
Mihir Bellare and Kenneth G. Paterson and Susan Thomson
2012/513 ( PS PS.GZ PDF )
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes
2012/512 ( PDF )
Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
Ivan Damgard and Sarah Zakarias
2012/511 ( PDF )
Entangled Cloud Storage
Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi
2012/510 ( PDF )
Enabling 3-share Threshold Implementations for any 4-bit S-box
Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann
2012/509 ( PDF )
On 3-share Threshold Implementations for 4-bit S-boxes
Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang
2012/508 ( PDF )
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung
2012/507 ( PDF )
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
Josep Balasch and Baris Ege and Thomas Eisenbarth and Benoit Gérard and Zheng Gong and Tim Güneysu and Stefan Heyse and Stéphanie Kerckhof and François Koeune and Thomas Plos and Thomas Pöppelmann and Francesco Regazzoni and François-Xavier Standaert and Gilles Van Assche and Ronny Van Keer and Loïc van Oldeneel tot Oldenzeel and Ingo von Maurich
2012/506 ( PDF )
Succinct Malleable NIZKs and an Application to Compact Shuffles
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2012/505 ( PDF )
On pseudorandomization of information-theoretically secure schemes without hardness assumptions
Koji Nuida
2012/504 ( PDF )
Scalable Deniable Group Key Establishment
Kashi Neupane and Rainer Steinwandt and Adriana Suarez Corona
2012/503 ( PDF )
Hierarchical Identity-Based (Lossy) Trapdoor Functions
Alex Escala and Javier Herranz and Benoit Libert and Carla Rafols
2012/502 ( PDF )
Are We Compromised? Modelling Security Assessment Games
Viet Pham and Carlos Cid
2012/501 ( PDF )
Privacy Amplification with Asymptotically Optimal Entropy Loss
Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin
2012/500 ( PDF )
Constant Ciphertext Length in CP-ABE
Nishant Doshi and Devesh Jinwala
2012/499 ( -- withdrawn -- )
Authenticity, Integrity and Proof of Existence for Long-Term Archiving: a Survey
Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann
2012/498 ( PDF )
Almost Perfect Algebraic Immune Functions with Good Nonlinearity
Meicheng Liu and Dongdai Lin
2012/497 ( PDF )
The low-call diet: Authenticated Encryption for call counting HSM users
Mike Bond and George French and Nigel P. Smart and Gaven J. Watson
2012/496 ( PDF )
Updating attribute in CP-ABE: A New Approach
Nishant Doshi and Devesh Jinwala
2012/495 ( PDF )
"Metaproofs" (and their Cryptographic Applications)
Alfredo De Santis and Moti Yung
2012/494 ( PDF )
Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton
2012/493 ( PDF )
Efficient Query Integrity for Outsourced Dynamic Databases
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2012/492 ( PDF )
A Method for Generating Full Cycles by a Composition of NLFSRs
Elena Dubrova
2012/491 ( PDF )
On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown
Lidong Han and Wei Wei and Mingjie Liu
2012/490 ( PS PS.GZ PDF )
Desynchronization Attack on RAPP Ultralightweight Authentication Protocol
Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref
2012/489 ( PDF )
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/488 ( PDF )
Designated Verifier Threshold Proxy Signature Scheme without Random Oracles
Mohammad Beheshti-Atashgah \and Majid Bayat \and Mahmoud Gardeshi \and Mohammad Reza Aref
2012/487 ( PDF )
Short communication: An interpretation of the Linux entropy estimator
Benjamin Pousse
2012/486 ( PDF )
Computational Soundness without Protocol Restrictions
Michael Backes and Ankit Malik and Dominique Unruh
2012/485 ( PDF )
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Neil Hanley and HeeSeok Kim and Michael Tunstall
2012/484 ( PS PS.GZ )
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture
Ding Wang, Chun-guang Ma, De-li Gu and Zhen-shan Cui
2012/483 ( PS PS.GZ PDF )
An Efficient Signcryption Scheme from q-Diffie-Hellman Problems
Jayaprakash Kar
2012/482 ( PDF )
Approaches for the Parallelization of Software Implementation of Integer Multiplication
Vladislav Kovtun and Andrew Okhrimenko
2012/481 ( PDF )
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance
John Steinberger
2012/480 ( PDF )
Short Signatures From Diffie-Hellman: Realizing Short Public Key
Jae Hong Seo
2012/479 ( PDF )
Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles
Mohammad Reza Reyhanitabar and Willy Susilo
2012/478 ( PDF )
Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol
Wang Qinglong, Xu Li
2012/477 ( PDF )
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean
2012/476 ( PDF )
A j-lanes tree hashing mode and j-lanes SHA-256
Shay Gueron
2012/475 ( PDF )
Efficient Signatures of Knowledge and DAA in the Standard Model
David Bernhard and Georg Fuchsbauer and Essam Ghadafi
2012/474 ( PDF )
On the Semantic Security of Functional Encryption Schemes
Manuel Barbosa and Pooya Farshim
2012/473 ( PDF )
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
Zhengan Huang and Shengli Liu and Baodong Qin
2012/472 ( PDF )
On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme –
Amir Moradi and Oliver Mischke
2012/471 ( PDF )
A Quasigroup Based Random Number Generator for Resource Constrained Environments
Matthew Battey and Abhishek Parakh
2012/470 ( PDF )
Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime
Sorin Iftene
2012/469 ( PDF )
Perfect Keyword Privacy in PEKS Systems
Mototsugu Nishioka
2012/468 ( PDF )
Functional Encryption: New Perspectives and Lower Bounds
Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2012/467 ( PDF )
New results on nonexistence of generalized bent functions
Yupeng Jiang and Yingpu Deng
2012/466 ( PDF )
Computational Entropy and Information Leakage
Benjamin Fuller and Leonid Reyzin
2012/465 ( PDF )
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags
Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
2012/464 ( PDF )
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
Carles Padro and Leonor Vazquez and An Yang
2012/463 ( PDF )
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
Xiang Xie and Rui Xue and Rui Zhang
2012/462 ( PDF )
Perfect Ambiguous Optimistic Fair Exchange
Yang Wang and Man Ho Au and Willy Susilo
2012/461 ( PDF )
Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits
Nir Bitansky and Alessandro Chiesa
2012/460 ( PDF )
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
Yohei Watanabe and Takenobu Seito and Junji Shikata
2012/459 ( PDF )
Barriers in Cryptography with Weak, Correlated and Leaky Sources
Daniel Wichs
2012/458 ( PDF )
Computing small discrete logarithms faster
Daniel J. Bernstein and Tanja Lange
2012/457 ( PDF )
Hush Functions Extended to Any Size Input versus Any Size Output
Gideon Samid
2012/456 ( PDF )
Crowd-Blending Privacy
Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass
2012/455 ( PDF )
Must you know the code of f to securely compute f?
Mike Rosulek
2012/454 ( PDF )
A Probabilistic Quantum Key Transfer Protocol
Abhishek Parakh
2012/453 ( PDF )
New Leakage Resilient CCA-Secure Public Key Encryption
Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
2012/452 ( PDF )
EPiC: Efficient Privacy-Preserving Counting for MapReduce
Erik-Oliver Blass and Guevara Noubir and Triet D. Vo-Huu
2012/451 ( PS PS.GZ PDF )
Stam's Conjecture and Threshold Phenomena in Collision Resistance
John Steinberger, Xiaoming Sun, Zhe Yang
2012/450 ( PDF )
Tweakable Blockciphers with Beyond Birthday-Bound Security
Will Landecker and Thomas Shrimpton and R. Seth Terashima
2012/449 ( PDF )
Long Term Confidentiality: a Survey
Johannes Braun and Johannes Buchmann and Ciaran Mullan and Alex Wiesmaier
2012/448 ( PDF )
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka and Takahiro Matsuda and Jacob C.N. Schuldt
2012/447 ( PDF )
Multi-receiver Homomorphic Authentication Codes for Network Coding
Zhaohui Tang and Hoon Wei Lim
2012/446 ( PS PS.GZ PDF )
Differential Fault Analysis of AES: Towards Reaching its Limits
Sk Subidh Ali , Debdeep Mukhopadhyay, and Michael Tunstall
2012/445 ( PDF )
A note on ‘An efficient certificateless aggregate signature with constant pairing computations’
Debiao He, Jianhua Chen, Miaomiao Tian
2012/444 ( PDF )
Factorization of a 1061-bit number by the Special Number Field Sieve
Greg Childers
2012/443 ( PDF )
Improved CRT Algorithm for Class Polynomials in Genus 2
Kristin Lauter and Damien Robert
2012/442 ( PDF )
Group Signatures with Almost-for-free Revocation
Benoit Libert and Thomas Peters and Moti Yung
2012/441 ( PDF )
Adaptively Secure Multi-Party Computation with Dishonest Majority
Sanjam Garg and Amit Sahai
2012/440 ( PDF )
New Preimage Attacks Against Reduced SHA-1
Simon Knellwolf and Dmitry Khovratovich
2012/439 ( PDF )
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
2012/438 ( PDF )
Breaking and Repairing GCM Security Proofs
Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu
2012/437 ( PDF )
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
Amit Sahai and Hakan Seyalioglu and Brent Waters
2012/436 ( PDF )
Secure Database Commitments and Universal Arguments of Quasi Knowledge
Melissa Chase and Ivan Visconti
2012/435 ( PS PS.GZ PDF )
Differential Privacy with Imperfect Randomness
Yevgeniy Dodis and Adriana Lopez-Alt and Ilya Mironov and Salil Vadhan
2012/434 ( PDF )
Algebraic (Trapdoor) One Way Functions and their Applications
Dario Catalano and Dario Fiore and Rosario Gennaro and Konstantinos Vamvourellis
2012/433 ( PDF )
Impossibility Results for Static Input Secure Computation
Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti
2012/432 ( PDF )
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2012/431 ( PDF )
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Yusuke Sakai and Jacob C.N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta
2012/430 ( PDF )
A formal study of two physical countermeasures against side channel attacks
Sébastien Briais and Sylvain Guilley and Jean-Luc Danger
2012/429 ( PDF )
Simple construction of epsilon-biased distribution
Long Hoang Nguyen and Andrew William Roscoe
2012/428 ( PDF )
Rational authentication protocols and their use in financial transactions
Long Hoang Nguyen
2012/427 ( PDF )
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian
Robert Drylo
2012/426 ( PDF )
A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes
Ed Kendall and Michelle Kendall and Wilfrid S. Kendall
2012/425 ( PDF )
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
Gautham Sekar
2012/424 ( PDF )
Scalable Group Signatures with Revocation
Benoit Libert and Thomas Peters and Moti Yung
2012/423 ( PDF )
Programmable encryption and key-dependent messages
Dominique Unruh
2012/422 ( PDF )
Biclique Cryptanalysis of TWINE
Mustafa Çoban and Ferhat Karakoç and Özkan Boztaş
2012/421 ( PDF )
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
Ekawat Homsirikamol and Pawel Morawiecki and Marcin Rogawski and Marian Srebrny
2012/420 ( PDF )
A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers
Denise Demirel and Jeroen van de Graaf
2012/419 ( -- withdrawn -- )
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
Kan Yang and Xiaohua Jia and Kui Ren
2012/418 ( PDF )
Weaknesses of an Improvement Authentication Scheme using
Rafael Martínez-Peláez and Francisco Rico-Novella
2012/417 ( PDF )
Efficient Padding Oracle Attacks on Cryptographic Hardware
Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay
2012/416 ( PDF )
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
Cas Cremers and Michèle Feltz
2012/415 ( PDF )
Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion
Jialin Huang and Xuejia Lai
2012/414 ( PDF )
Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials
Yin Li and Gong-liang Chen and Xiao-ning Xie
2012/413 ( PDF )
Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation
Mukund Kalyanaraman and Michael Orshansky
2012/412 ( PDF )
Probabilistic Infinite Secret Sharing
Laszlo Csirmaz
2012/411 ( PDF )
Infinite Secret Sharing -- Examples
Alexander Dibert and Laszlo Csirmaz
2012/410 ( PDF )
Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme
Qingfeng Cheng
2012/409 ( PDF )
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes
Rafael Misoczki and Jean-Pierre Tillich and Nicolas Sendrier and Paulo S. L. M. Barreto
2012/408 ( PDF )
Efficient Implementation of Bilinear Pairings on ARM Processors
Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, and David Jao
2012/407 ( PDF )
Cross-Unlinkable Hierarchical Group Signatures
Julien Bringer and Herve Chabanne and Alain Patey
2012/406 ( PDF )
Comments on four multi-server authentication protocols using smart card
*Jue-Sam Chou 1, Yalin Chen2, Chun-Hui Huang 3, Yu-Siang Huang4
2012/405 ( PDF )
Secure Computation on Floating Point Numbers
Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele
2012/404 ( PDF )
Secret Sharing Schemes for Very Dense Graphs
Amos Beimel and Oriol Farràs and Yuval Mintz
2012/403 ( PDF )
Fully Private Revocable Predicate Encryption
Juan Manuel González Nieto and Mark Manulis and Dongdong Sun
2012/402 ( PDF )
Forward-Secure Hierarchical Predicate Encryption
Juan Manuel González Nieto and Mark Manulis and Dongdong Sun
2012/401 ( PDF )
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
Martin Albrecht and Gregor Leander
2012/400 ( PDF )
An Algebraic Fault Attack on the LED Block Cipher
Philipp Jovanovic and Martin Kreuzer and Ilia Polian
2012/399 ( PDF )
Differential Fault Analysis on Block Cipher Piccolo
Kitae Jeong
2012/398 ( PDF )
PIRMAP: Efficient Private Information Retrieval for MapReduce
Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
2012/397 ( PDF )
Cross-Domain Password-Based Authenticated Key Exchange Revisited
Liqun Chen and Hoon Wei Lim and Guomin Yang
2012/396 ( PDF )
On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$
Brajesh Kumar Singh
2012/395 ( PDF )
A New Efficient Authenticated ID-Based Group Key Agreement Protocol
Morteza Arifi and Mahmoud Gardeshi and Mohammad Sabzinejad Farash
2012/394 ( PDF )
An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks
Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari
2012/393 ( PDF )
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings
Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat
2012/392 ( PDF )
ID Based Signcryption Scheme in Standard Model
S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan
2012/391 ( PDF )
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
Shaohui Wang,Sujuan Liu,Danwei Chen
2012/390 ( PDF )
Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three
Chol-Sun Sin
2012/389 ( PDF )
Wide Strong Private RFID Identification based on Zero-Knowledge
Roel Peeters and Jens Hermans
2012/388 ( PDF )
The Arithmetic Codex
Ignacio Cascudo and Ronald Cramer and Chaoping Xing
2012/387 ( PDF )
New cryptographic constructions using generalized learning with errors problem
Jintai ding
2012/386 ( PDF )
Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards
Rafael Martínez-Peláez and Francisco Rico-Novella
2012/385 ( PDF )
CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing
Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen
2012/384 ( PDF )
Functional Encryption for Regular Languages
Brent Waters
2012/383 ( PDF )
Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited
Junji Shikata
2012/382 ( PDF )
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
Afonso Arriaga and Manuel Barbosa and Pooya Farshim
2012/381 ( -- withdrawn -- )
A Strongly Secure Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles
Zheng Yang
2012/380 ( PDF )
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
Ioana Boureanu and Serge Vaudenay
2012/379 ( PDF )
All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments
Eiichiro Fujisaki
2012/378 ( PDF )
Multiparty Proximity Testing with Dishonest Majority from Equality Testing
Ran Gelles and Rafail Ostrovsky and Kina Winoto
2012/377 ( PDF )
Distributed Key Generation in the Wild
Aniket Kate and Yizhou Huang and Ian Goldberg
2012/376 ( PDF )
Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem
Colleen M. Swanson and Douglas R. Stinson
2012/375 ( PDF )
How to Store some Secrets
Reto E. Koenig and Rolf Haenni
2012/374 ( PDF )
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
Omar Choudary and Felix Grobert and Joachim Metz
2012/373 ( PDF )
Optimal Lower Bound for Differentially Private Multi-Party Aggregation
T-H. Hubert Chan and Elaine Shi and Dawn Song
2012/372 ( -- withdrawn -- )
New Preimage Attacks on Hash Modes of AES-256
Deukjo Hong and Dong-Chan Kim and Daesung Kwon
2012/371 ( PDF )
Simultaneous hashing of multiple messages
Shay Gueron and Vlad Krasnov
2012/370 ( PDF )
Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
Renaud Dubois and Aurore Guillevic and Marine Sengelin Le Breton
2012/369 ( PDF )
Factorisation of RSA-704 with CADO-NFS
Shi Bai and Emmanuel Thomé and Paul Zimmermann
2012/368 ( PDF )
Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs
Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski and Rabia Shahid and Malik Umar Sharif
2012/367 ( PDF )
On Continual Leakage of Discrete Log Representations
Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs
2012/366 ( PDF )
Securing Circuits Against Constant-Rate Tampering
Dana Dachman-Soled and Yael Tauman Kalai
2012/365 ( PDF )
Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy
Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
2012/364 ( PDF )
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions
Ivan Damgard and Adriana Lopez-Alt
2012/363 ( PDF )
A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions
Anne Canteaut and Thomas Fuhr and María Naya-Plasencia and Pascal Paillier and Jean-René Reinhard and Marion Videau
2012/362 ( PDF )
Achieving Constant Round Leakage-Resilient Zero-Knowledge
Omkant Pandey
2012/361 ( PDF )
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
Michele Mosca and Douglas Stebila and Berkant Ustaoglu
2012/360 ( PDF )
Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics
Céline Blondeau and Benoît Gérard and Kaisa Nyberg
2012/359 ( PDF )
Another look at non-uniformity
Neal Koblitz and Alfred Menezes
2012/358 ( PDF )
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --
Gilles Piret and Thomas Roche and Claude Carlet
2012/357 ( PDF )
Publicly Verifiable Ciphertexts
Juan Manuel González Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila
2012/356 ( PDF )
Fully Anonymous Attribute Tokens from Lattices
Jan Camenisch and Gregory Neven and Markus Rückert
2012/355 ( PDF )
Never trust a bunny
Daniel J. Bernstein and Tanja Lange
2012/354 ( PDF )
Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
Arno Mittelbach
2012/353 ( PDF )
On Reconfigurable Fabrics and Generic Side-Channel Countermeasures
Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik
2012/352 ( PS PS.GZ PDF )
On Hashing Graphs
Ashish Kundu, Elisa Bertino
2012/351 ( PDF )
SipHash: a fast short-input PRF
Jean-Philippe Aumasson and Daniel J. Bernstein
2012/350 ( PDF )
A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption
Liangliang Xiao and I-Ling Yen
2012/349 ( PDF )
A Differential Fault Attack on Grain-128a using MACs
Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
2012/348 ( PDF )
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Gregory Neven
2012/347 ( PDF )
Algebraic Differential Fault Attacks on LED using a Single Fault Injection
Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji
2012/346 ( PS PS.GZ PDF )
Edwards model of elliptic curves defined over any fields
Oumar DIAO and Emmanuel FOUOTSA
2012/345 ( PDF )
Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$
Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi
2012/344 ( PDF )
Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code
Masao KASAHARA
2012/343 ( PDF )
High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions
Tamas Gyorfi and Octavian Cret and Guillaume Hanrot and Nicolas Brisebarre
2012/342 ( PDF )
Enhancing Location Privacy for Electric Vehicles (at the right time)
Joseph Liu and Man Ho Au and Willy Susilo and Jianying Zhou
2012/341 ( PDF )
From Selective to Full Security: Semi-Generic Transformations in the Standard Model
Michel Abdalla and Dario Fiore and Vadim Lyubashevsky
2012/340 ( PDF )
Deciding Epistemic and Strategic Properties of Cryptographic Protocols
Henning Schnoor
2012/339 ( PDF )
Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash
Adi Shamir and Eldad Zinger
2012/338 ( PDF )
Characterizations on Algebraic Immunity for Multi-Output Boolean Functions
Xiao Zhong and Mingsheng Wang
2012/337 ( PDF )
Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme
Sanjay Bhattacherjee and Palash Sarkar
2012/336 ( PDF )
RSA modulus generation in the two-party case
Gerald Gavin
2012/335 ( PDF )
Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition
Yu Lou and Huiting Han and Chunming Tang and Maozhi Xu
2012/334 ( PDF )
On the Traceability of Tags in SUAP RFID Authentication Protocols
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2012/333 ( PDF )
On the Feasibility of Extending Oblivious Transfer
Yehuda Lindell and Hila Zarosim
2012/332 ( PDF )
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/331 ( PDF )
Homomorphic Authentication Codes for Network Coding
Zhaohui Tang
2012/330 ( PDF )
A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences
Xu ZiJie and Xu Ke
2012/329 ( PDF )
An Analysis of ZVP-Attack on ECC Cryptosystems
Claude Crépeau and Raza Ali Kazmi
2012/328 ( PS PS.GZ PDF )
The Multivariate Probabilistic Encryption Scheme MQQ-ENC
Danilo Gligoroski and Simona Samardjiska
2012/327 ( PDF )
Security Analysis of RAPP An RFID Authentication Protocol based on Permutation
Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
2012/326 ( PDF )
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
Allison Lewko and Brent Waters
2012/325 ( PDF )
A note on generalized bent criteria for Boolean functions
Sugata Gangopadhyay, Enes Pasalic and Pantelimon Stanica
2012/324 ( PDF )
3D Hardware Canaries
Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf
2012/323 ( PDF )
ML Confidential: Machine Learning on Encrypted Data
Thore Graepel and Kristin Lauter and Michael Naehrig
2012/322 ( PDF )
Revisiting Dedicated and Block Cipher based Hash Functions
Anupam Pattanayak
2012/321 ( PDF )
DECT Security Analysis
Erik Tews
2012/320 ( PDF )
The Discrete Logarithm Problem in non-representable rings
Matan Banin and Boaz Tsaban
2012/319 ( PDF )
Bounds on the Threshold Gap in Secret Sharing and its Applications
Ignacio Cascudo and Ronald Cramer and Chaoping Xing
2012/318 ( PDF )
Non-uniform cracks in the concrete: the power of free precomputation
Daniel J. Bernstein and Tanja Lange
2012/317 ( PDF )
A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)
Markku-Juhani O. Saarinen and Daniel Engels
2012/316 ( PDF )
Computationally Complete Symbolic Attacker in Action
Gergei Bana and Pedro Adão and Hideki Sakurada
2012/315 ( PDF )
Using Variance to Analyze Visual Cryptography Schemes
Teng Guo and Feng Liu and ChuanKun Wu and YoungChang Hou
2012/314 ( PDF )
Generation of Nonlinear Feedback Shift Registers with special-purpose hardware
Tomasz Rachwalik and Janusz Szmidt and Robert Wicik, and Janusz Zablocki
2012/313 ( -- withdrawn -- )
An anonymous proxy signature scheme without random oracles
Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/312 ( PDF )
Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Debiao He
2012/311 ( PDF )
Tightly Secure Signatures and Public-Key Encryption
Dennis Hofheinz and Tibor Jager
2012/310 ( PDF )
A mathematical problem for security analysis of hash functions and pseudorandom generators
Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata
2012/309 ( PDF )
Fast and compact elliptic-curve cryptography
Mike Hamburg
2012/308 ( PDF )
Verified Security of Redundancy-Free Encryption from Rabin and RSA
Gilles Barthe and David Pointcheval and Santiago Zanella-Béguelin
2012/307 ( PDF )
Multi-Channel Broadcast Encryption
Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh
2012/306 ( PDF )
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
Marcel Keller and Gert Læssøe Mikkelsen and Andy Rupp
2012/305 ( PDF )
Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography
Duong Hieu Phan and Viet Cuong Trinh
2012/304 ( PDF )
Actively Secure Two-Party Evaluation of any Quantum Operation
Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail
2012/303 ( PDF )
On The Distribution of Linear Biases: Three Instructive Examples
Mohamed Ahmed Abdelraheem and Martin Aagren and Peter Beelen and Gregor Leander
2012/302 ( PDF )
On instance separation in the UC-framework
István Vajda
2012/301 ( PDF )
A Public Shuffle without Private Permutations
Myungsun Kim and Jinsu Kim and Jung Hee Cheon
2012/300 ( PDF )
Threshold Implementations of all 3x3 and 4x4 S-boxes
B. Bilgin and S.Nikova and V.Nikov and V.Rijmen and G.Stütz
2012/299 ( PDF )
Differential Power Analysis on ZUC Algorithm
TANG Ming, CHENG PingPan ,QIU ZhenLong
2012/298 ( PDF )
Anonymous Credentials Light
Foteini Baldimtsi and Anna Lysyanskaya
2012/297 ( PDF )
Tamper and Leakage Resilience in the Split-State Model
Feng-Hao Liu and Anna Lysyanskaya
2012/296 ( PDF )
In the blink of an eye: There goes your AES key
Sergei Skorobogatov and Christopher Woods
2012/295 ( PDF )
Broadcast-enhanced key predistribution schemes
Michelle Kendall and Keith M. Martin and Siaw-Lynn Ng and Maura B. Paterson and Douglas R. Stinson
2012/294 ( PDF )
Two grumpy giants and a baby
Daniel J. Bernstein and Tanja Lange
2012/293 ( PDF )
New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors
Wei Wei and Chengliang Tian and Xiaoyun Wang
2012/292 ( PDF )
An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle
Jon Passki and Tom Ritter
2012/291 ( PDF )
Efficient Dynamic Provable Possession of Remote Data via Update Trees
Yihua Zhang and Marina Blanton
2012/290 ( PDF )
Fully Homomorphic Message Authenticators
Rosario Gennaro and Daniel Wichs
2012/289 ( PS PS.GZ PDF )
Ring Group Signatures
Liqun Chen
2012/288 ( PDF )
Fair Exchange of Short Signatures without Trusted Third Party
Philippe Camacho
2012/287 ( PDF )
Computationally-Fair Group and Identity-Based Key-Exchange
Andrew C. Yao and Yunlei Zhao
2012/286 ( PS PS.GZ PDF )
Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis
Sk Subidh Ali and Debdeep Mukhopadhyay
2012/285 ( PDF )
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2012/284 ( PDF )
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Fabrice Ben Hamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2012/283 ( PDF )
Some properties of q-ary functions based on spectral analysis
Deep Singh and Maheshanand Bhaintwal
2012/282 ( PDF )
ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY
Md. Iftekhar Salam and Hoon-Jae Lee
2012/281 ( PDF )
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications
Dario Fiore and Rosario Gennaro
2012/280 ( PDF )
Improved ``Partial Sums"-based Square Attack on AES
Michael Tunstall
2012/279 ( PDF )
Concurrent Zero Knowledge in the Bounded Player Model
Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti
2012/278 ( PS PS.GZ PDF )
Improved Indifferentiability Security Bound for the JH Mode
Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
2012/277 ( PS PS.GZ PDF )
Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil
Rkia Aouinatou (1) Mostafa Belkasmi (2)
2012/276 ( PDF )
Official Arbitration with Secure Cloud Storage Application
Alptekin Küpçü
2012/275 ( PDF )
Implementing BLAKE with AVX, AVX2, and XOP
Samuel Neves and Jean-Philippe Aumasson
2012/274 ( PDF )
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
Aleksandar Kircanski and Amr M. Youssef
2012/273 ( PDF )
Public-Key Cryptography from New Multivariate Quadratic Assumptions
Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang
2012/272 ( PS PS.GZ PDF )
Passive Corruption in Statistical Multi-Party Computation
Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub
2012/271 ( -- withdrawn -- )
Homomorphic Signature for Identity Authentication in Cloud Computing
Zhiwei Wang, Guozi Sun and Danwei Chen
2012/270 ( PDF )
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings
Enrico Thomae
2012/269 ( PDF )
Quantifying Side-Channel Information Leakage from Web Applications
Luke Mather and Elisabeth Oswald
2012/268 ( PDF )
On a CCA2-secure variant of McEliece in the standard model
Edoardo Persichetti
2012/267 ( PDF )
Self-pairings on Hyperelliptic Curves
Steven D. Galbraith and Chang-An Zhao
2012/266 ( PDF )
Compilation Techniques for Efficient Encrypted Computation
Christopher Fletcher and Marten van Dijk and Srinivas Devadas
2012/265 ( PDF )
Foundations of Garbled Circuits
Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
2012/264 ( PDF )
On the (In)Security of IDEA in Various Hashing Modes
Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang
2012/263 ( PDF )
One-way Functions from Chebyshev Polynomials
Kai-Yuen Cheong
2012/262 ( PDF )
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
I. Damgard and M. Keller and E. Larraia and C. Miles and N.P. Smart
2012/261 ( PDF )
Dual Form Signatures: An Approach for Proving Security from Static Assumptions
Michael Gerbush and Allison Lewko and Adam O'Neill and Brent Waters
2012/260 ( PDF )
Transposition of AES Key Schedule
Jialin Huang, Xuejia Lai
2012/259 ( PDF )
A Novel Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/258 ( PDF )
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols
José Bacelar Almeida and Manuel Barbosa and Endre Bangerter and Gilles Barthe and Stephan Krenn and Santiago Zanella Béguelin
2012/257 ( -- withdrawn -- )
The Transformation from the Galois NLFSR to the Fibonacci Configuration
Lin Zhiqiang
2012/256 ( PDF )
The myth of generic DPA...and the magic of learning
Carolyn Whitnall and Elisabeth Oswald and François-Xavier Standaert
2012/255 ( PDF )
How to Garble Arithmetic Circuits
Benny Applebaum and Yuval Ishai and Eyal Kushilevitz
2012/254 ( PDF )
FastPRP: Fast Pseudo-Random Permutations for Small Domains
Emil Stefanov and Elaine Shi
2012/253 ( PDF )
Cryptanalysis of pairing-free certificateless authenticated key agreement protocol
Zhian Zhu
2012/252 ( PDF )
Fair Private Set Intersection with a Semi-trusted Arbiter
Changyu Dong and Liqun Chen and Jan Camenisch and Giovanni Russello
2012/251 ( PDF )
The Linux Pseudorandom Number Generator Revisited
Patrick Lacharme and Andrea Röck and Vincent Strubel and Marion Videau
2012/250 ( PDF )
New Identity Based Encryption And Its Proxy Re-encryption
Xu An Wang and Xiaoyuan Yang
2012/249 ( PDF )
Binary and q-ary Tardos codes, revisited
Boris Skoric and Jan-Jaap Oosterwijk
2012/248 ( PDF )
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
Ghassan O. Karame and Elli Androulaki and Srdjan Capkun
2012/247 ( PDF )
On Efficient Pairings on Elliptic Curves over Extension Fields
Xusheng Zhang and Kunpeng Wang and Dongdai Lin
2012/246 ( PDF )
A Secret Sharing Scheme Based on Group Presentations and the Word Problem
Maggie Habeeb and Delaram Kahrobaei and Vladimir Shpilrain
2012/245 ( PDF )
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes
Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen
2012/244 ( PDF )
Cryptography from tensor problems
Leonard J. Schulman
2012/243 ( PDF )
COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES
MYUNGSUN KIM and JIHYE KIM and AND JUNG HEE CHEON
2012/242 ( PDF )
Less is More: Relaxed yet Composable Security Notions for Key Exchange
C. Brzuska and M. Fischlin and N.P. Smart and B. Warinschi and S. Williams
2012/241 ( PDF )
Key distribution system and attribute-based encryption
Masahiro Yagisawa
2012/240 ( PDF )
Field Switching in BGV-Style Homomorphic Encryption
Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart
2012/239 ( PDF )
Zero-Knowledge for Multivariate Polynomials
Valerie Nachef and Jacques Patarin and Emmanuel Volte
2012/238 ( PDF )
The Boomerang Attacks on the Round-Reduced Skein-512
Hongbo Yu and Jiazhe Chen and XIaoyun Wang
2012/237 ( PS PS.GZ PDF )
In the point of view security, An efficient scheme in IBE with random oracle
Rkia Aouinatou1, Mostafa Belkasmi2
2012/236 ( PDF )
On Necessary and Sufficient Conditions for Private Ballot Submission
D. Bernhard and O. Pereira and B. Warinschi
2012/235 ( PDF )
Ring-LWE in Polynomial Rings
Leo Ducas and Alain Durmus
2012/234 ( PDF )
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
2012/233 ( PDF )
A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis
Qi Chai and Guang Gong
2012/232 ( PDF )
Implementing Pairings at the 192-bit Security Level
Diego F. Aranha and Laura Fuentes-Castañeda and Edward Knapp and Alfred Menezes and Francisco Rodríguez-Henríquez
2012/231 ( PDF )
A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT
Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin and Pengwei Wang
2012/230 ( PDF )
On Ideal Lattices and Learning with Errors Over Rings
Vadim Lyubashevsky and Chris Peikert and Oded Regev
2012/229 ( PDF )
Languages with Efficient Zero-Knowledge PCP's are in SZK
Mohammad Mahmoody and David Xiao
2012/228 ( PDF )
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
Marten van Dijk and Ulrich Rührmair
2012/227 ( -- withdrawn -- )
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
Ding Wang and Chun-guang Ma and Peng Wu
2012/226 ( PDF )
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
Sarah Meiklejohn and C. Chris Erway and Alptekin Küpçü and Theodora Hinkle and Anna Lysyanskaya
2012/225 ( PDF )
When Homomorphism Becomes a Liability
Zvika Brakerski
2012/224 ( PDF )
Shorter IBE and Signatures via Asymmetric Pairings
Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee
2012/223 ( PDF )
A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes
Enrico Thomae
2012/222 ( PDF )
A secret sharing scheme of prime numbers based on hardness of factorization
Kai-Yuen Cheong
2012/221 ( PDF )
Almost-Everywhere Secure Computation with Edge Corruptions
Nishanth Chandran and Juan Garay and Rafail Ostrovsky
2012/220 ( PDF )
Hedged Public-key Encryption: How to Protect against Bad Randomness
Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek
2012/219 ( PDF )
Private Fingerprint Matching
Siamak F. Shahandashti and Reihaneh Safavi-Naini and Philip Ogunbona
2012/218 ( PDF )
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
T-H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu
2012/217 ( PDF )
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2012/216 ( PDF )
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
Duong-Hieu Phan and David Pointcheval and Siamak F. Shahandashti and Mario Strefler
2012/215 ( PDF )
Quadratic Span Programs and Succinct NIZKs without PCPs
Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova
2012/214 ( PDF )
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version)
Shengbao Wu and Mingsheng Wang
2012/213 ( PDF )
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
2012/212 ( PDF )
Perfect Algebraic Immune Functions
Meicheng Liu and Yin Zhang and Dongdai Lin
2012/211 ( PDF )
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama
2012/210 ( PDF )
On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks
Yusong Du, and Fangguo Zhang
2012/209 ( PS PS.GZ PDF )
Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications
Donghoon Chang and Moti Yung
2012/208 ( PDF )
A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER
Jay Shah and Ayan Mahalanobis
2012/207 ( -- withdrawn -- )
Cryptanalysis of Hummingbird-2
Kai Zhang, Lin Ding and Jie Guan
2012/206 ( PDF )
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version)
Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou
2012/205 ( PDF )
Information-flow control for programming on encrypted data
J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman
2012/204 ( PDF )
Unique Group Signatures
Matthew Franklin and Haibin Zhang
2012/203 ( PDF )
Robust biometric-based user authentication scheme for wireless sensor networks
Debiao He
2012/202 ( PDF )
Secure Similarity Coefficients Computation with Malicious Adversaries
Bo Zhang and Fangguo Zhang
2012/201 ( PDF )
Comment an Anonymous Multi-receiver Identity-based Encryption Scheme
J.H.Zhang, Y.B.Cui
2012/200 ( PDF )
Aggregate Signcryption
Alexander W. Dent
2012/199 ( PDF )
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm
Jean-Charles Faugère and Pierrick Gaudry and Louise Huot and Guénaël Renault
2012/198 ( PDF )
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
Jae Hong Seo and Jung Hee Cheon
2012/197 ( PDF )
On The Security of One-Witness Blind Signature Schemes
Foteini Baldimtsi and Anna Lysyanskaya
2012/196 ( PDF )
Multi-Instance Security and its Application to Password-Based Cryptography
Mihir Bellare and Thomas Ristenpart and Stefano Tessaro
2012/195 ( PDF )
The BlueJay Ultra-Lightweight Hybrid Cryptosystem
Markku-Juhani O. Saarinen
2012/194 ( PDF )
A Multivariate based Threshold Ring Signature Scheme
Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
2012/193 ( PDF )
An Efficient Homomorphic Encryption Protocol for Multi-User Systems
Liangliang Xiao and Osbert Bastani and I-Ling Yen
2012/192 ( PDF )
Extending Order Preserving Encryption for Multi-User Systems
Liangliang Xiao and I-Ling Yen and Dung T. Huynh
2012/191 ( PDF )
Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes
Liangliang Xiao and I-Ling Yen
2012/190 ( PDF )
On the Security of an Improved Password Authentication Scheme Based on ECC
Ding Wang and Chun-guang Ma
2012/189 ( PDF )
Universally Composable Key-Management
Steve Kremer and Robert Künnemann and Graham Steel
2012/188 ( PS PS.GZ PDF )
Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification
Xin Li
2012/187 ( PDF )
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)
Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann
2012/186 ( PDF )
Third-order nonlinearities of some biquadratic monomial Boolean functions
Brajesh Kumar Singh
2012/185 ( PDF )
Replay attacks that violate ballot secrecy in Helios
Ben Smyth
2012/184 ( PDF )
Asymptotic fingerprinting capacity in the Combined Digit Model
Dion Boesten and Boris Skoric
2012/183 ( PDF )
Differentially Private Smart Metering with Battery Recharging
Michael Backes and Sebastian Meiser
2012/182 ( PDF )
How to Construct Quantum Random Functions
Mark Zhandry
2012/181 ( PDF )
A Modular Framework for Multi-Factor Authentication and Key Exchange
Nils Fleischhacker and Mark Manulis and Amir Azodi
2012/180 ( PDF )
Yet Another SHA-3 Round 3 FPGA Results Paper
Brian Baldwin and William P. Marnane
2012/179 ( PDF )
Billion-Gate Secure Computation with Malicious Adversaries
Benjamin Kreuter and abhi shelat and Chih-hao Shen
2012/178 ( PDF )
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification
Aleksander Essex and Jeremy Clark and Urs Hengartner and Carlisle Adams
2012/177 ( PDF )
Everlasting Multi-Party Computation
Unruh, Dominique
2012/176 ( PS PS.GZ PDF )
Improvements of Algebraic Attacks Based on Structured Gaussian Elimination
Satrajit Ghosh and Abhijit Das
2012/175 ( PDF )
Optimal First-Order Masking with Linear and Non-Linear Bijections
Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY and Jean-Luc DANGER
2012/174 ( PDF )
Zero Knowledge with Rubik's Cubes and Non-Abelian Groups
Emmanuel VOLTE and Jacques PATARIN and Valérie NACHEF
2012/173 ( PS PS.GZ PDF )
Automatically Verified Mechanized Proof of One-Encryption Key Exchange
Bruno Blanchet
2012/172 ( PDF )
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz
2012/171 ( PS PS.GZ PDF )
Quantum Money from Hidden Subspaces
Scott Aaronson and Paul Christiano
2012/170 ( PDF )
Approaches for the performance increasing of software implementation of integer multiplication in prime fields
Vladislav Kovtun and Andrew Okhrimenko
2012/169 ( PDF )
Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers
Xiaopei Guo, Kejian Xu, Tongsen Sun and Xiubin Fan
2012/168 ( PDF )
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes
Valérie Gauthier and Ayoub Otmani and Jean-Pierre Tillich
2012/167 ( PDF )
Pairing-based methods for genus 2 jacobians with maximal endomorphism ring
Sorina Ionica
2012/166 ( PDF )
A List of Maximum Period NLFSRs
Elena Dubrova
2012/165 ( PDF )
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy
Cristina Onete
2012/164 ( PDF )
On Secure Two-party Integer Division
Morten Dahl, Chao Ning, Tomas Toft
2012/163 ( PDF )
Differential propagation analysis of Keccak
Joan Daemen and Gilles Van Assche
2012/162 ( PS PS.GZ PDF )
Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network
Jayaprakash Kar
2012/161 ( PDF )
New Constructions of Low Correlation Sequences with High Linear Complexity
Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
2012/160 ( -- withdrawn -- )
New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set
Hai Xiong, Longjiang Qu, Chao Li
2012/159 ( PDF )
Hybrid Encryption in the Multi-User Setting
G.M. Zaverucha
2012/158 ( PDF )
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
Peter Gazi and Stefano Tessaro
2012/157 ( PDF )
Attack on Fully Homomorphic Encryption over the Integers
Gu Chunsheng
2012/156 ( PDF )
Fast Embedded Software Hashing
Dag Arne Osvik
2012/155 ( PS PS.GZ PDF )
Toward Practical Group Encryption
Laila El Aimani and Marc Joye
2012/154 ( PS PS.GZ PDF )
The Joint Signature and Encryption Revisited
Laila El Aimani
2012/153 ( PDF )
A Framework for the Cryptographic Verification of Java-like Programs
Ralf Kuesters and Tomasz Truderung and Juergen Graf
2012/152 ( PDF )
On security of a Certificateless Aggregate Signature Scheme
Limin Shen, Yinxia Sun
2012/151 ( PDF )
On Boolean Ideals and Varieties with Application to Algebraic Attacks
Alexander Rostovtsev and Alexey Mizyukin
2012/150 ( PDF )
Circular chosen-ciphertext security with compact ciphertexts
Dennis Hofheinz
2012/149 ( PDF )
Attacking Scrambled Burrows-Wheeler Transform
Martin Stanek
2012/148 ( PDF )
Replacing Username/Password with Software-Only Two-Factor Authentication
Michael Scott
2012/147 ( PDF )
On Security Arguments of the Second Round SHA-3 Candidates
Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger
2012/146 ( PDF )
On Polynomial Systems Arising from a Weil Descent
Christophe Petit and Jean-Jacques Quisquater
2012/145 ( PDF )
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryou Fujita
2012/144 ( PDF )
Somewhat Practical Fully Homomorphic Encryption
Junfeng Fan and Frederik Vercauteren
2012/143 ( PDF )
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
2012/142 ( PDF )
Identity-Based Encryption with Master Key-Dependent Message Security and Applications
David Galindo and Javier Herranz and Jorge Villar
2012/141 ( PDF )
Bicliques for permutations: collision and preimage attacks in stronger settings
Dmitry Khovratovich
2012/140 ( PDF )
Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors
Selcuk Baktir and Erkay Savas
2012/139 ( PDF )
Formal veri cation of secure ad-hoc network routing protocols using deductive model-checking
Ta Vinh Thong
2012/138 ( PDF )
An Improved Differential Attack on Full GOST (extended version)
Nicolas T. Courtois
2012/137 ( PDF )
Usable assembly language for GPUs: a success story
Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
2012/136 ( PDF )
Adaptive Key Protection in Complex Cryptosystems with Attributes
Zilong Wang and Danfeng (Daphne) Yao and Rongquan Feng
2012/135 ( PDF )
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token
Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade
2012/134 ( PDF )
A Digital Signature Scheme for Long-Term Security
Dimitrios Poulakis and Robert Rolland
2012/133 ( PDF )
Toward Practical Private Access to Data Centers via Parallel ORAM
Jacob R. Lorch and Bryan Parno and James Mickens and Mariana Raykova and Joshua Schiffman
2012/132 ( PDF )
CFS Software Implementation
Gregory Landais and Nicolas Sendrier
2012/131 ( PDF )
Composition Theorems for CCA Cryptographic Security
Rodolphe Lampe and Jacques Patarin
2012/130 ( PDF )
Broadcast (and Round) Efficient Verifiable Secret Sharing
Juan Garay and Clint Givens and Rafail Ostrovsky and Pavel Raykov
2012/129 ( PDF )
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Nelly Fazio and Irippuge Milinda Perera
2012/128 ( PDF )
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols
Marc Fischlin and Cristina Onete
2012/127 ( PDF )
Additive autocorrelation of some classes of cubic semi-bent Boolean functions
Deep Singh and Maheshanand Bhaintwal
2012/126 ( PDF )
Compact Implementation of Threefish and Skein on FPGA
Nuray At and Jean-Luc Beuchat and Ismail San
2012/125 ( -- withdrawn -- )
Short and Efficient Expressive Attribute-Based Signature in the Standard Model
Aijun Ge and Cheng Chen and Chuangui Ma and Zhenfeng Zhang
2012/124 ( PS PS.GZ PDF )
On Securing Communication From Profilers
Sandra Diaz-Santiago and Debrup Chakraborty
2012/123 ( PDF )
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-
A. Dehbaoui and J.M. Dutertre and B. Robisson and P. Orsatelli and P. Maurine and A. Tria
2012/122 ( PDF )
Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three
Reza R. Farashahi and Hongfeng Wu and Chang-An Zhao
2012/121 ( PDF )
An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps
Mitra Fatemi and Taraneh Eghlidos and Mohammadreza Aref
2012/120 ( PDF )
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks
Yongge Wang
2012/119 ( PDF )
Accelerating the Final Exponentiation in the Computation of the Tate Pairings
Taechan Kim, Sungwook Kim, Jung Hee Cheon
2012/118 ( PDF )
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks
S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
2012/117 ( PDF )
Universally Composable Security With Local Adversaries
Ran Canetti and Margarita Vald
2012/116 ( PDF )
Clash Attacks on the Verifiability of E-Voting Systems
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2012/115 ( PDF )
Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing
XU Chun-xiang and HE Xiao-hu and Daniel Abraha
2012/114 ( PDF )
On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives
Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
2012/113 ( PDF )
On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model
Bart Mennink
2012/112 ( PDF )
On The Nonlinearity of Maximum-length NFSR Feedbacks
Meltem Sonmez Turan
2012/111 ( PDF )
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks
Yin Zhang and Meicheng Liu and Dongdai Lin
2012/110 ( PDF )
Finding Optimal Formulae for Bilinear Maps
Razvan Barbulescu and Jérémie Detrey and Nicolas Estibals and Paul Zimmermann
2012/109 ( -- withdrawn -- )
Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model
Yang Cui and Kirill Morozov
2012/108 ( PDF )
On the Optimality of Lattices for the Coppersmith Technique
Yoshinori Aono and Manindra Agrawal and Takakazu Satoh and Osamu Watanabe
2012/107 ( PDF )
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
Guilin Wang and Jiangshan Yu and Qi Xie
2012/106 ( PDF )
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents
Santanu Sarkar and Subhamoy Maitra
2012/105 ( PDF )
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited
Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
2012/104 ( PDF )
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
2012/103 ( PDF )
FlipIt: The Game of "Stealthy Takeover"
Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest
2012/102 ( PDF )
On the Circular Security of Bit-Encryption
Ron Rothblum
2012/101 ( -- withdrawn -- )
Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)>=3"
Zhihui Ou
2012/100 ( PDF )
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
Shahram Khazaei and Björn Terelius and Douglas Wikström
2012/099 ( PDF )
Homomorphic Evaluation of the AES Circuit
Craig Gentry and Shai Halevi and Nigel P. Smart
2012/098 ( PS PS.GZ PDF )
Combined Attacks on the AES Key Schedule
François Dassance and Alexandre Venelli
2012/097 ( PDF )
An algorithm for factoring integers
Yingpu Deng and Yanbin Pan
2012/096 ( PDF )
The Collision Security of MDC-4
Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel
2012/095 ( PDF )
Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data
Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer
2012/094 ( PDF )
Algebraic attack on lattice based cryptosystems via solving equations over real numbers.
Jintai Ding and Dieter Schmidt
2012/093 ( PDF )
Recent Results on Balanced Symmetric Boolean Functions
Yingming Guo and Guangpu Gao and Yaqun Zhao
2012/092 ( PDF )
Tolerant Algebraic Side-Channel Analysis of {AES}
Yossef Oren and Avishai Wool
2012/091 ( -- withdrawn -- )
Hardness of decision (R)LWE for any modulus
Adeline Langlois and Damien Stehle
2012/090 ( PDF )
Worst-Case to Average-Case Reductions for Module Lattices
Adeline Langlois and Damien Stehle
2012/089 ( PDF )
ECM at Work
Joppe W. Bos and Thorsten Kleinjung
2012/088 ( -- withdrawn -- )
A Lattice-Based Traitor Tracing Scheme
San Ling and Damien Stehle
2012/087 ( PDF )
Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms
Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev
2012/086 ( -- withdrawn -- )
Remarks on- An ideal multi-secret sharing scheme based on MSP
Zhi-hui Li Jing Li
2012/085 ( PDF )
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery
Stanislav Bulygin and Michael Walter
2012/084 ( PDF )
Improved Algebraic Side-Channel Attack on AES
Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter
2012/083 ( PDF )
Optimally Robust Private Information Retrieval
Casey Devet and Ian Goldberg and Nadia Heninger
2012/082 ( PDF )
Semi-Supervised Template Attack
Liran Lerman and Stephane Fernandes Medeiros and Nikita Veshchikov and Cedric Meuter and Gianluca Bontempi and Olivier Markowitch
2012/081 ( PDF )
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification
Michael Backes and Fabian Bendun and Dominique Unruh
2012/080 ( PDF )
Strongly Unforgeable Proxy Re-Signatures in the Standard Model
S. Sree Vivek and S. Sharmila Deva Selvi and Guhan Balasubramanian and C. Pandu Rangan
2012/079 ( PDF )
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
Masao KASAHARA
2012/078 ( PDF )
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
Zvika Brakerski
2012/077 ( PDF )
MAGNITUDE SQUARED COHERENCE BASED SCA
Sebastien Tiran and Amine Dehbaoui and Philippe Maurine
2012/076 ( PDF )
Secure Identity-Based Encryption in the Quantum Random Oracle Model
Mark Zhandry
2012/075 ( PDF )
Efficient identity-based threshold decryption scheme from bilinear pairings
Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang and Guoyan Zhang
2012/074 ( PDF )
Another look at HMAC
Neal Koblitz and Alfred Menezes
2012/073 ( PDF )
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model
Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
2012/072 ( PDF )
Particularly Friendly Members of Family Trees
Craig Costello
2012/071 ( PDF )
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems
Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer
2012/070 ( PDF )
Finding ECM-Friendly Curves through a Study of Galois Properties
Razvan Barbulescu and Joppe W. Bos and Cyril Bouvier and Thorsten Kleinjung and Peter L. Montgomery
2012/069 ( PDF )
Automatic Search of Attacks on round-reduced AES and Applications
Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque
2012/068 ( PDF )
Extended Security Arguments for (Ring) Signature Schemes
Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, and Pierre-Louis Cayrel
2012/067 ( PDF )
Parallelizing message schedules to accelerate the computations of hash functions
Shay Gueron, Vlad Krasnov
2012/066 ( PDF )
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
Jiqiang Lu and Wen-She Yap and Yongzhuang Wei
2012/065 ( PDF )
Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha”
Tsukasa Ishiguro
2012/064 ( PDF )
Ron was wrong, Whit is right
Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter
2012/063 ( PDF )
Randomized Partial Checking Revisited
Shahram Khazaei and Douglas Wikström
2012/062 ( -- withdrawn -- )
On the Security of Attribute Based Signature Schemes
S Sharmila Deva Selvi and Subhashini Venugopalan and C. Pandu Rangan
2012/061 ( PDF )
A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/060 ( PDF )
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
David Mandell Freeman
2012/059 ( PDF )
Message Authentication, Revisited
Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs
2012/058 ( PS PS.GZ PDF )
Key recycling in authentication
Christopher Portmann
2012/057 ( PDF )
Anonymous Constant-Size Ciphertext HIBE From Asymmetric Pairings
Somindu C. Ramanna and Palash Sarkar
2012/056 ( PDF )
A New Pseudorandom Generator from Collision-Resistant Hash Functions
Alexandra Boldyreva and Virendra Kumar
2012/055 ( -- withdrawn -- )
Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks
Hongbin Tang and Xinsong Liu
2012/054 ( PDF )
On the performance of certain Private Set Intersection protocols
Emiliano De Cristofaro and Gene Tsudik
2012/053 ( PS PS.GZ PDF )
Beating Shannon requires BOTH efficient adversaries AND non-zero advantage
Yevgeniy Dodis
2012/052 ( PDF )
Identity-based Encryption with Efficient Revocation
Alexandra Boldyreva and Vipul Goyal and Virendra Kumar
2012/051 ( PDF )
Eavesdropping on Satellite Telecommunication Systems
Benedikt Driessen
2012/050 ( PDF )
Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture
Jeremy Constantin and Andreas Burg and Frank K. Gurkaynak
2012/049 ( PDF )
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160
Yu Sasaki and Lei Wang
2012/048 ( PDF )
Designing Integrated Accelerator for Stream Ciphers with Structural Similarities
Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid
2012/047 ( PDF )
Incremental Deterministic Public-Key Encryption
Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev
2012/046 ( PDF )
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity
Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis
2012/045 ( PDF )
Signature Schemes Secure against Hard-to-Invert Leakage
Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel
2012/044 ( PDF )
PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems
Jun Zhou, Zhenfu Cao
2012/043 ( PDF )
A novel Group Key Transfer Protocol
Chingfang Hsu and Bing Zeng and Qi Cheng and Guohua Cui
2012/042 ( PDF )
Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing
Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi
2012/041 ( -- withdrawn -- )
A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION
Norziana Jamil and Ramlan Mahmood and Muhammad Reza Z'aba and Nur Izura Udzir and Zuriati Ahmad Zukarnaen
2012/040 ( PDF )
Single-block collision attack on MD5
Marc Stevens
2012/039 ( PDF )
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol
Feng Hao and Dylan Clarke
2012/038 ( PDF )
Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure
François Durvaux and Mathieu Renauld and François-Xavier Standaert and Loic van Oldeneel tot Oldenzeel and Nicolas Veyrat-Charvillon
2012/037 ( PDF )
Some results on $q$-ary bent functions
Deep Singh, Maheshanand Bhaintwal and Brajesh Kumar Singh
2012/036 ( PS PS.GZ PDF )
Efficient Leakage-free Authentication of Trees, Graphs and Forests
Ashish Kundu, Mikhail Atallah, Elisa Bertino
2012/035 ( PDF )
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
2012/034 ( PDF )
Automatic Quantification of Cache Side-Channels
Boris Köpf and Laurent Mauborgne and Martin Ochoa
2012/033 ( PDF )
A note on hyper-bent functions via Dillon-like exponents
Sihem Mesnager and Jean-Pierre Flori
2012/032 ( PS PS.GZ PDF )
Counterexamples to Hardness Amplification Beyond Negligible
Yevgeniy Dodis and Abhishek Jain and Tal Moran and Daniel Wichs
2012/031 ( PDF )
An error in "On a new formal proof model for RFID location privacy"
Da-Zhi Sun
2012/030 ( PDF )
Fault Analysis of the KATAN Family of Block Ciphers
Shekh Faisal Abdul-Latip and Mohammad Reza Reyhanitabar and Willy Susilo and Jennifer Seberry
2012/029 ( PDF )
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
Yannick Seurin
2012/028 ( PDF )
A First-Order Leak-Free Masking Countermeasure
Houssem MAGHREBI and Emmanuel PROUFF and Sylvain GUILLEY and Jean-Luc DANGER
2012/027 ( -- withdrawn -- )
Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack
Ali Mackvandi and Maryam Saeed and Mansour Naddafiun
2012/026 ( PS PS.GZ PDF )
Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding
Anja Becker and Antoine Joux and Alexander May and Alexander Meurer
2012/025 ( PDF )
A new remote data integrity checking scheme for cloud storage
Xiangtao Yan and Yifa Li
2012/024 ( PS PS.GZ PDF )
Variants of Waters' Dual-System Primitives Using Asymmetric Pairings
Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar
2012/023 ( PS PS.GZ PDF )
On the security of Lo et al.’s ownership transfer protocol
Masoumeh Safkhani and Nasour Bagheri and Majid Naderi and Ali Mahani
2012/022 ( PS PS.GZ PDF )
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity
Mihir Bellare and Stefano Tessaro
2012/021 ( -- withdrawn -- )
Security Analysis of J-PAKE
Mohsen Toorani
2012/020 ( PDF )
Dickson polynomials, hyperelliptic curves and hyper-bent functions
Jean-Pierre Flori and Sihem Mesnager
2012/019 ( PDF )
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
Gergei Bana and Hubert Comon-Lundh
2012/018 ( PDF )
Attacks and Security Proofs of EAX-Prime
Kazuhiko Minematsu and Stefan Lucks and Hiraku Morita and Tetsu Iwata
2012/017 ( PDF )
Secondary constructions on generalized bent functions
Brajesh Kumar Singh
2012/016 ( -- withdrawn -- )
Efficient Mix-Net Veri cation by Proofs of Random Blocks
Denise Demirel and Melanie Volkamer and Hugo Jonker
2012/015 ( PS PS.GZ PDF )
A Cryptographic Treatment of the Wiretap Channel
Mihir Bellare and Stefano Tessaro and Alexander Vardy
2012/014 ( PDF )
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
2012/013 ( -- withdrawn -- )
Higher Order Algebraic Attacks on Stream Ciphers
Qichun Wang and Thomas Johansson
2012/012 ( PDF )
Malleable Proof Systems and Applications
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2012/011 ( PDF )
Biclique Attack of the Full ARIA-256
Shao-zhen Chen Tian-min Xu
2012/010 ( PDF )
PayTree: "Amortized Signature" for Flexible Micro-Payments
Charanjit Jutla and Moti Yung
2012/009 ( PDF )
On the Indifferentiability of the Integrated-Key Hash Functions
Saif Al-Kuwari
2012/008 ( PDF )
Security proof with dishonest keys
Hubert Comon-Lundh and Véronique Cortier and Guillaume Scerri
2012/007 ( PDF )
Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures
Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
2012/006 ( PDF )
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
Susan Hohenberger and Allison Lewko and Brent Waters
2012/005 ( PDF )
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Benjamin Fuller and Adam O'Neill and Leonid Reyzin
2012/004 ( PDF )
The new SHA-3 software shootout
Daniel J. Bernstein and Tanja Lange
2012/003 ( PDF )
On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng, Wen-Feng Qi and Tian Tian
2012/002 ( PDF )
ECC2K-130 on NVIDIA GPUs
Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
2012/001 ( PDF )
Digital Signatures from Challenge-Divided Sigma-Protocols
Andrew C. Yao and Yunlei Zhao
2011/714 ( PDF )
Position-Verification in Multi-Channel Models
Huajun Zhang and Zongyang Zhang and Zhenfu Cao
2011/713 ( PDF )
A server-aided verification signature scheme without random oracles
Bin Wang and Qing Zhao
2011/712 ( PDF )
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
Johann Großschädl and Dan Page and Stefan Tillich
2011/711 ( PDF )
Evolutionary Construction of de Bruijn Sequences
Meltem Sonmez Turan
2011/710 ( PDF )
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Alex Biryukov and Johann Großschädl
2011/709 ( PDF )
Fault Attack against Miller's algorithm
Nadia El Mrabet
2011/708 ( PDF )
Computational Extractors and Pseudorandomness
Dana Dachman-Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin
2011/707 ( PS PS.GZ PDF )
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF
Alex Biryukov and Ilya Kizhvatov and Bin Zhang
2011/706 ( PDF )
Improved Side Channel Attacks on Pairing Based Cryptography
Johannes Blömer and Peter Günther and Gennadij Liske
2011/705 ( PDF )
Differential Attacks on Generalized Feistel Schemes
Valerie Nachef and Emmanuel Volte and Jacques Patarin
2011/704 ( PS PS.GZ PDF )
Security Analysis of a PUF based RFID Authentication Protocol
Masoumeh Safkhani and Nasour Bagheri and Majid Naderi
2011/703 ( PDF )
Waters Signatures with Optimal Security Reduction
Dennis Hofheinz and Tibor Jager and Edward Knapp
2011/702 ( PDF )
Comments of an efficient and secure multi-server authentication scheme with key agreement
Yitao Chen
2011/701 ( PDF )
Decentralized Attribute-Based Signatures
Tatsuaki Okamoto and Katsuyuki Takashima
2011/700 ( PDF )
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
Tatsuaki Okamoto and Katsuyuki Takashima
2011/699 ( -- withdrawn -- )
Public-Key Encryption with Cluster-Chain-based Keyword Search
Peng Xu and Hai Jin and Wei Wang and Deqing Zou
2011/698 ( PDF )
A generalization of the class of hyper-bent Boolean functions in binomial forms
Chunming Tang, Yu Lou, Yanfeng Qi, Baocheng Wang, Yixian Yang
2011/697 ( PDF )
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
2011/696 ( PDF )
Efficient Network Coding Signatures in the Standard Model
Dario Catalano and Dario Fiore and Bogdan Warinschi
2011/695 ( PDF )
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
2011/694 ( PDF )
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation
Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng
2011/693 ( PDF )
A non-interactive deniable authentication scheme in the standard model
Bin W