Cryptology ePrint Archive: Listing for 2016


2016/114 ( PDF )
The Magic of ELFs
Mark Zhandry
2016/113 ( PDF )
On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments
Serge Fehr and Max Fillinger
2016/112 ( PDF )
On the (In)security of SNARKs in the Presence of Oracles
Dario Fiore and Anca Nitulescu
2016/111 ( PDF )
Scalable and Secure Logistic Regression via Homomorphic Encryption
Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
2016/110 ( PDF )
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
Navid Alamati and Chris Peikert
2016/109 ( PDF )
Fast Multiparty Multiplications from shared bits
Ivan Damgård and Tomas Toft and Rasmus Winther Zakarias
2016/108 ( PDF )
Computing Private Set Operations with Linear Complexities
Alex Davidson and Carlos Cid
2016/107 ( PDF )
Fully Anonymous Transferable Ecash
Hitesh Tewari and Arthur Hughes
2016/106 ( PDF )
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård and Helene Haagh and Claudio Orlandi
2016/105 ( PDF )
Fully homomorphic encryption must be fat or ugly?
Kristian Gjøsteen and Martin Strand
2016/104 ( PDF )
Open Sesame: The Password Hashing Competition and Argon2
Jos Wetzels
2016/103 ( PDF )
Speed Optimizations in Bitcoin Key Recovery Attacks
Nicolas Courtois and Guangyan Song and Ryan Castellucci
2016/102 ( PDF )
Breaking the Sub-Exponential Barrier in Obfustopia
Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan and Mark Zhandry
2016/101 ( PDF )
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Benoit Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang
2016/100 ( PDF )
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
Joël Alwen and Binyi Chen and Chethan Kamath and Vladimir Kolmogorov and Krzysztof Pietrzak and Stefano Tessaro
2016/099 ( PDF )
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
Michael Clear and Ciaran McGoldrick
2016/098 ( PDF )
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications
Stefan Kölbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger
2016/097 ( PDF )
A Maiorana-McFarland Construction of a GBF on Galois ring
Shashi Kant Pandey and P.R.Mishra and B.K.Dass
2016/096 ( PDF )
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
Bing Sun and Meicheng Liu and Jian Guo and Vincent Rijmen and Ruilin Li
2016/095 ( PDF )
Obfuscation without Multilinear Maps
Dingfeng Ye and Peng Liu
2016/094 ( PDF )
Tightly Secure CCA-Secure Encryption without Pairings
Romain Gay and Dennis Hofheinz and Eike Kiltz and Hoeteck Wee
2016/093 ( PDF )
Valiant's Universal Circuit is Practical
Ágnes Kiss and Thomas Schneider
2016/092 ( PDF )
Cryptanalysis of the Full Spritz Stream Cipher
Subhadeep Banik and Takanori Isobe
2016/091 ( PDF )
On the Security of the Algebraic Eraser Tag Authentication Protocol
Simon R.~Blackburn and M.J.B.~Robshaw
2016/090 ( PDF )
Spectral characterization of iterating lossy mappings
Joan Daemen
2016/089 ( PDF )
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Johannes Buchmann and Florian Göpfert and Rachel Player and Thomas Wunderer
2016/088 ( PDF )
On Linear Hulls and Trails in Simon
Tomer Ashur and Vincent Rijmen
2016/087 ( PDF )
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters
Christina Brzuska and Håkon Jacobsen and Douglas Stebila
2016/086 ( PDF )
Intel SGX Explained
Victor Costan and Srinivas Devadas
2016/085 ( PDF )
Cryptanalysis of ring-LWE based key exchange with key share reuse
Scott Fluhrer
2016/084 ( PDF )
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher
Qianqian Yang and Lei Hu and Siwei Sun and Ling Song
2016/083 ( PDF )
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses
Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin
2016/082 ( PDF )
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
Olivier Blazy and David Derler and Daniel Slamanig and Raphael Spreitzer
2016/081 ( PDF )
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2016/080 ( PDF )
Cryptanalysis of PRINCE with Minimal Data
Shahram Rasoolzadeh and Håvard Raddum
2016/079 ( PDF )
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Qiang Tang and Balazs Pejo and Husen Wang
2016/078 ( PDF )
Non-Interactive Verifiable Secret Sharing For Monotone Circuits
Ge Bai \and Ivan Damgård \and Claudio Orlandi \and Yu Xia
2016/077 ( PDF )
Multidimensional Meet in the Middle Cryptanalysis of KATAN
Shahram Rasoolzadeh and Håvard Raddum
2016/076 ( PDF )
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings
Xi-Jun Lin and Haipeng Qu and Xiaoshuai Zhang
2016/075 ( PDF )
Weaknesses in Hadamard Based Symmetric Key Encryption Schemes
Gajraj Kuldeep and Devendra Kumar Yadav and A. K. Sharma
2016/074 ( PDF )
On the Power of Secure Two-Party Computation
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2016/073 ( PDF )
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Jinsheng Zhang and Wensheng Zhang and Daji Qiao
2016/072 ( PDF )
Downgrade Resilience in Key-Exchange Protocols
Karthikeyan Bhargavan and Christina Brzuska and Cédric Fournet and Matthew Green and Markulf Kohlweiss and Santiago Zanella-Béguelin
2016/071 ( PDF )
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
Alex Biryukov and Léo Perrin and Aleksei Udovenko
2016/070 ( PDF )
Domain-Specific Pseudonymous Signatures Revisited
Kamil Kluczniak
2016/069 ( PDF )
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
Gergei Bana and Rohit Chadha
2016/068 ( PDF )
Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes
Yongge Wang
2016/067 ( PDF )
OPFE: Outsourcing Computation for Private Function Evaluation
Henry Carter and Patrick Traynor
2016/066 ( PDF )
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Lingyue Qin and Huaifeng Chen
2016/065 ( PDF )
A note on Tensor Simple Matrix Encryption Scheme
Yasufumi Hashimoto
2016/064 ( PDF )
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
Yohei Watanabe and Goichiro Hanaoka and Junji Shikata
2016/063 ( PDF )
Analysing and Exploiting the Mantin Biases in RC4
Remi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe
2016/062 ( PDF )
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
Raphael Bost and Pierre-Alain Fouque and David Pointcheval
2016/061 ( PDF )
Accountable Privacy for Decentralized Anonymous Payments
Christina Garman and Matthew Green and Ian Miers
2016/060 ( PDF )
Topology-based Plug-and-Play Key-Setup
Amir Herzberg nd Yehonatan Kfir
2016/059 ( PDF )
Secure positioning and quantum non-local correlations
Muhammad Nadeem
2016/058 ( PDF )
New Lattice Attacks on DSA Schemes
Dimitrios Poulakis
2016/057 ( PDF )
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants
Durga Prasad Sahoo and Phuong Ha Nguyen and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay
2016/056 ( PDF )
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
Ethan Heilman and Foteini Baldimtsi and Sharon Goldberg
2016/055 ( PDF )
Attacking NTP's Authenticated Broadcast Mode
Aanchal Malhotra and Sharon Goldberg
2016/054 ( PDF )
Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem
Masahiro Yagisawa
2016/053 ( PDF )
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers
khalid Javeed and Xiaojun Wang
2016/052 ( PDF )
Fault-Tolerant Aggregate Signatures
Gunnar Hartung and Björn Kaidel and Alexander Koch and Jessica Koch and Andy Rupp
2016/051 ( PDF )
Capacity and Data Complexity in Multidimensional Linear Attack
Jialin Huang and Serge Vaudenay and Xuejia Lai and Kaisa Nyberg
2016/050 ( PDF )
Improved Fully Homomorphic Encryption with Composite Number Modulus
Masahiro Yagisawa
2016/049 ( PDF )
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
Christoph M. Mayer
2016/048 ( PDF )
Better Preprocessing for Secure Multiparty Computation
Carsten Baum and Ivan Damgård and Tomas Toft and Rasmus Zakarias
2016/047 ( PDF )
Comb to Pipeline: Fast Software Encryption Revisited
Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser
2016/046 ( PDF )
How To Simulate It - A Tutorial on the Simulation Proof Technique
Yehuda Lindell
2016/045 ( PDF )
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
Xi-Jun Lin and Lin Sun and Haipeng Qu and Xiaoshuai Zhang
2016/044 ( PDF )
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells
2016/043 ( PDF )
Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection
Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
2016/042 ( PDF )
Neeva: A Lightweight Hash Function
Khushboo Bussi and Dhananjoy Dey and Manoj Kumar and B. K. Dass
2016/041 ( PDF )
A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS
Preeti Kulshrestha and Arun Kumar
2016/040 ( PDF )
Packet Header Anomaly Detection Using Bayesian Topic Models
Xuefei Cao, Bo Chen, Hui Li and Yulong Fu
2016/039 ( PDF )
Standard quantum bit commitment – an indefinite commitment time
Muhammad Nadeem
2016/038 ( PDF )
Collateral Damage in Online Social Networks: computing the significance of information collection
Iraklis Symeonids and Bart Preneel
2016/037 ( PDF )
A Framework for Outsourcing of Secure Computation
Thomas P. Jakobsen and Jesper Buus Nielsen and Claudio Orlandi
2016/036 ( PDF )
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family
wentan Yi and Shaozhen Chen
2016/035 ( PDF )
Proofs of Space-Time and Rational Proofs of Storage
Tal Moran and Ilan Orlov
2016/034 ( PDF )
Universal Composition with Responsive Environments
Jan Camenisch and Robert R. Enderlein and Stephan Krenn and Ralf Kuesters and Daniel Rausch
2016/033 ( PDF )
Towards a Unified Security Model for Physically Unclonable Functions
Frederik Armknecht and Daisuke Moriyama and Ahmad-Reza Sadeghi and Moti Yung
2016/032 ( PDF )
On the Leakage-Resilient Key Exchange
Janaka Alawatugoda
2016/031 ( PDF )
Beyond the selective disclosure of ABCs on RAM-constrained devices
Antonio de la Piedra
2016/030 ( PDF )
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek and Nina Bindel and Johannes Buchmann and Juliane Krämer and Giorgia Azzurra Marson
2016/029 ( PDF )
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
Jos Wetzels and Wouter Bokslag
2016/028 ( PDF )
Sponges and Engines: An introduction to Keccak and Keyak
Jos Wetzels and Wouter Bokslag
2016/027 ( PDF )
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns
Henry Corrigan-Gibbs and Dan Boneh and Stuart Schechter
2016/026 ( PDF )
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM
Abhishek Chakraborty and Debdeep Mukhopadhyay
2016/025 ( PDF )
Human-readable Proof of the Related-Key Security of AES-128
Khoongming Khoo and Eugene Lee and Thomas Peyrin and Siang Meng Sim
2016/024 ( PDF )
Refund attacks on Bitcoin’s Payment Protocol
Patrick McCorry and Siamak F. Shahandashti and Feng Hao
2016/023 ( PDF )
Improved on an improved remote user authentication scheme with key agreement
Yalin Chen1 and Jue-Sam Chou*2 and I - Chiung Liao3
2016/022 ( PDF )
On derivatives of polynomials over finite fields through integration
Enes Pasalic and Amela Muratovic-Ribic and Samir Hodzic and Sugata Gangopadhyay
2016/021 ( PDF )
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs
Eli Ben-Sasson and Alessandro Chiesa and Ariel Gabizon and Madars Virza
2016/020 ( PDF )
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon
Yonglin Hao and Willi Meier
2016/019 ( PDF )
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
Hyung Tae Lee and San Ling and Huaxiong Wang
2016/018 ( PDF )
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Afonso Arriaga and Manuel Barbosa and Pooya Farshim
2016/017 ( PDF )
Valiant's Universal Circuit: Improvements, Implementation, and Applications
Helger Lipmaa and Payman Mohassel and Saeed Sadeghian
2016/016 ( PDF )
A trustless privacy-preserving reputation system
Alexander Schaub and Rémi Bazin and Omar Hasan and Lionel Brunie
2016/015 ( PDF )
Quantum Collision-Resistance of Non-Uniformly Distributed Functions
Ehsan Ebrahimi Targhi and Gelo Noel Tabia and Dominique Unruh
2016/014 ( PDF )
Foundations of Hardware-Based Attested Computation and Application to SGX
Manuel Barbosa and Bernardo Portela and Guillaume Scerri and Bogdan Warinschi
2016/013 ( PDF )
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Rosario Gennaro and Steven Goldfeder and Arvind Narayanan
2016/012 ( PDF )
Cryptography for Big Data Security
Ariel Hamlin and Nabil Schear and Emily Shen and Mayank Varia and Sophia Yakoubov and Arkady Yerukhimovich
2016/011 ( PDF )
Better Security for Functional Encryption for Inner Product Evaluations
Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
2016/010 ( PDF )
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme
Albrecht Petzoldt and Jintai Ding and Lih-Chung Wang
2016/009 ( PDF )
PUF-BASED SOLUTIONS FOR SECURE COMMUNICATIONS IN ADVANCED METERING INFRASTRUCTURE (AMI)
Mahshid Delavar and Sattar Mirzakuchaki and Mohammad Hassan Ameri and Javad Mohajeri
2016/008 ( PDF )
cMix: Anonymization byHigh-Performance Scalable Mixing
DavidChaum and Farid Javani and Aniket Kate and Anna Krasnova and Joeri de Ruiter and Alan T. Sherman
2016/007 ( PDF )
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
Fabrice Benhamouda and Céline Chevalier and Adrian Thillard and Damien Vergnaud
2016/006 ( PDF )
Indistinguishability Obfuscation with Non-trivial Efficiency
Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang
2016/005 ( PDF )
A Columnar Transposition cipher in a contemporary setting.
John Jones
2016/004 ( PDF )
Bounding basis reduction properties
Arnold Neumaier
2016/003 ( PDF )
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves
Nicolas T. Courtois
2016/002 ( PDF )
Remote Cache-Timing Attack without Learning Phase
Ali Can Atici and Cemal Yilmaz and Erkay Savas
2016/001 ( PDF )
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Yalin Chen1 and Jue-Sam Chou*2 and Hung - Sheng Wu


[ Cryptology ePrint archive ]