Cryptology ePrint Archive: Listing for 2013
-
2013/310 ( PDF )
- MinimaLT: Minimal-latency Networking Through Better Security
- W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange
-
2013/309 ( PDF )
- Bypassing Passkey Authentication in Bluetooth Low Energy
- Tomas Rosa
-
2013/308 ( PDF )
- Lattice-Based Group Signatures with Logarithmic Signature Size
- Fabien Laguillaumie and Adeline Langlois and Benoit Libert and Damien Stehle
-
2013/307 ( PDF )
- Maliciously Circuit-private FHE
- Rafail Ostrovsky and Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky
-
2013/306 ( PDF )
- Solving a $6120$-bit DLP on a Desktop Computer
- Faruk G\"olo\u{g}lu and Robert Granger and Gary McGuire and Jens Zumbr\"agel
-
2013/305 ( PDF )
- Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
- Sonia Belaid and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and Jorn-Marc Schmidt and Francois-Xavier Standaert and Stefan Tillich
-
2013/304 ( PDF )
- Secure PRNG Seeding on Commerial-of-the-Shelf Microcontrollers
- Anthony Van Herrewege and Vincent van der Leest and Andr\'e Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede
-
2013/303 ( PDF )
- Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
- Shivam Bhasin and Claude Carlet and Sylvain Guilley
-
2013/302 ( PDF )
- Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors
- Nicolas T. Courtois
-
2013/301 ( PDF )
- Impossible Differential-Linear Cryptanalysis of Full-Round CLEFIA-128
- Zheng Yuan and Xian Li and Haixia Liu
-
2013/300 ( PDF )
- A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups
- Allison Lewko and Sarah Meiklejohn
-
2013/299 ( PDF )
- Computing class polynomials for abelian surfaces
- Andres Enge and Emmanuel Thomé
-
2013/298 ( PDF )
- A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices
- Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin W\'{o}jcik
-
2013/297 ( PDF )
- Improvement and Efficient Implementation of a Lattice-based Signature Scheme
- Rachid El Bansarkhani and Johannes Buchmann
-
2013/296 ( PDF )
- Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
- Morten Dahl and Ivan Damgård
-
2013/295 ( PDF )
- Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
- Micka\"el Cazorla and Kevin Marquet and Marine Minier
-
2013/294 ( PDF )
- Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis
- Colin O'Flynn and Zhizhang (David) Chen
-
2013/293 ( PDF )
- A Toolkit for Ring-LWE Cryptography
- Vadim Lyubashevsky and Chris Peikert and Oded Regev
-
2013/292 ( PDF )
- A Leakage Resilient MAC
- Dan Martin and Elisabeth Oswald and Martijn Stam
-
2013/291 ( PDF )
- On Diffie-Hellman–like Security Assumptions
- Antoine Joux and Antoine Rojat
-
2013/290 ( PDF )
- Massive Group Message Authentication with Revocable Anonymity
- Boaz Catane and Amir Herzberg
-
2013/289 ( PDF )
- Secure Second Price Auctions with a Rational Auctioneer
- Boaz Catane and Amir Herzberg
-
2013/288 ( PDF )
- Key Classification Attack on Block Ciphers
- Maghsoud Parviz and Seyed Hassan Mousavi and Saeed Mirahmadi
-
2013/287 ( PDF )
- The failure of McEliece PKC based on Reed-Muller codes.
- I. V. Chizhov and M. A. Borodin
-
2013/286 ( PDF )
- Salvaging Indifferentiability in a Multi-stage Setting
- Arno Mittelbach
-
2013/285 ( PDF )
- A Novel Proof on Weil Pairing
- Sutirtha Sanyal
-
2013/284 ( PDF )
- A Secure Paper-Based Electronic Voting With No Encryption
- Asghar Tavakkoli, Reza Ebrahimi Atani
-
2013/283 ( PDF )
- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
- Dan Boneh and Ananth Raghunathan and Gil Segev
-
2013/282 ( PDF )
- Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
- Goutam Paul and Anupam Chattopadhyay
-
2013/281 ( PDF )
- Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
- Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit
-
2013/280 ( PDF )
- Path ORAM: An Extremely Simple Oblivious RAM Protocol
- Emil Stefanov and Marten van Dijk and Elaine Shi and Christopher Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas
-
2013/279 ( PDF )
- Pinocchio: Nearly Practical Verifiable Computation
- Bryan Parno and Craig Gentry and Jon Howell and Mariana Raykova
-
2013/278 ( PDF )
- A Frequency Leakage Model and its application to CPA and DPA
- S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and P. Maurine
-
2013/277 ( PDF )
- ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
- Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
-
2013/276 ( PDF )
- Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
- David Bernhard and Stephan Neumann and Melanie Volkamer
-
2013/275 ( PDF )
- The Potential of Individualized Trusted Root Stores: Minimizing the Attack Surface in the Light of CA Failures
- Johannes Braun and Gregor Rynkowski
-
2013/274 ( PDF )
- A time series approach for profiling attack
- Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch
-
2013/273 ( PDF )
- Computing the Rank of Incidence Matrix and Algebraic Immunity of Boolean Functions
- Deepak Kumar Dalai
-
2013/272 ( PDF )
- Cryptography Challenges for Computational Privacy in Public Clouds
- Sashank Dara
-
2013/271 ( PDF )
- The Legal Classification of Identity-Based Signatures
- Christoph Sorge
-
2013/270 ( PDF )
- Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
- Yu Yu
-
2013/269 ( PDF )
- Chosen Ciphertext Secure (CCS): Stateful Symmetric Key CCA Encryption with Minimal Ciphertext Expansion
- Jonathan Trostle
-
2013/268 ( PDF )
- Dynamic Cube Attack on Grain-v1
- Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
-
2013/267 ( PDF )
- Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
- S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee
-
2013/266 ( PDF )
- L-P States of RC4 Stream Cipher
- Jing Lv and Dongdai Lin
-
2013/265 ( PDF )
- Attribute-Based Encryption with Fast Decryption
- Susan Hohenberger and Brent Waters
-
2013/264 ( PDF )
- Encrypted Secret Sharing and Analysis by Plaintext Randomization
- Stephen R. Tate and Roopa Vishwanathan and Scott Weeks
-
2013/263 ( PDF )
- Speeding up QUAD
- Albrecht Petzoldt
-
2013/262 ( PDF )
- An efficient FHE based on the hardness of solving systems of non-linear multivariate equations
- Gérald Gavin
-
2013/261 ( PDF )
- Secure information transmission based on physical principles
- Dima Grigoriev and Vladimir Shpilrain
-
2013/260 ( PDF )
- From Weak to Strong Zero-Knowledge and Applications
- Kai-Min Chung and Edward Lui and Rafael Pass
-
2013/259 ( PDF )
- Private Interactive Communication Across an Adversarial Channel
- Ran Gelles and Amit Sahai and Akshay Wadia
-
2013/258 ( PDF )
- Witness Encryption and its Applications
- Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters
-
2013/257 ( PDF )
- Secure two-party computation: a visual way
- Paolo D'Arco and Roberto De Prisco
-
2013/256 ( PDF )
- On the Lossiness of the Rabin Trapdoor Function
- Yannick Seurin
-
2013/255 ( PDF )
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Rodolphe Lampe and Yannick Seurin
-
2013/254 ( PDF )
- Towards Adoption of DNSSEC: Availability and Security Challenges
- Amir Herzberg and Haya Shulman
-
2013/253 ( PDF )
- CacheAudit: A Tool for the Static Analysis of Cache Side Channels
- Goran Doychev and Dominik Feld and Boris Köpf and Laurent Mauborgne and Jan Reineke
-
2013/252 ( PDF )
- On the Primitivity of some Trinomials over Finite Fields
- LI Yujuan, WANG Huaifu, ZHAO Jinhua
-
2013/251 ( PDF )
- Permutation Polynomials and Their Differential Properties over Residue Class Rings
- Yuyin Yu and Mingsheng Wang
-
2013/250 ( PDF )
- Fully Homomorphic Encryption for Mathematicians
- Alice Silverberg
-
2013/249 ( PDF )
- How to Factor N_1 and N_2 When p_1=p_2 mod 2^t
- Kaoru Kurosawa and Takuma Ueda
-
2013/248 ( PDF )
- Another Look at Security Theorems for 1-Key Nested MACs
- Neal Koblitz and Alfred Menezes
-
2013/247 ( PDF )
- Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction
- Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu
-
2013/246 ( PDF )
- A Lever Function to a New Codomain with Adequate Indeterminacy
- Shenghui Su and Maozhi Xu and Shuwang Lu
-
2013/245 ( PDF )
- The Fiat-Shamir Transformation in a Quantum World
- Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni
-
2013/244 ( PDF )
- Cryptographic schemes, key exchange, public key.
- Ted Hurley
-
2013/243 ( PDF )
- A Simple ORAM
- Kai-Min Chung and Rafael Pass
-
2013/242 ( PDF )
- AE5 Security Notions: Definitions Implicit in the CAESAR Call
- Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton
-
2013/241 ( PDF )
- The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4
- Joachim Strömbergson and Simon Josefsson
-
2013/240 ( PDF )
- Algebraic analysis of Trivium-like ciphers
- Sui-Guan Teo and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
-
2013/239 ( PDF )
- Optimizing ORAM and Using it Efficiently for Secure Computation
- Craig Gentry and Kenny Goldman and Shai Halevi and Charanjit Julta and Mariana Raykova and Daniel Wichs
-
2013/238 ( PDF )
- Anonymity-preserving Public-Key Encryption: A Constructive Approach
- Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Björn Tackmann and Daniele Venturi
-
2013/237 ( PDF )
- Type-Based Analysis of Generic Key Management APIs (Long Version)
- Pedro Adão and Riccardo Focardi and Flaminia L. Luccio
-
2013/236 ( PDF )
- A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security
- Kaitai Liang and Liming Fang and Duncan S. Wong and Willy Susilo
-
2013/235 ( PDF )
- Ballot secrecy and ballot independence coincide
- Ben Smyth and David Bernhard
-
2013/234 ( PDF )
- A Cryptographic Analysis of OPACITY
- Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete
-
2013/233 ( PDF )
- Attacks on JH, Grøstl and SMASH Hash Functions
- Yiyuan Luo and Xuejia Lai
-
2013/232 ( PDF )
- Quantum algorithm to check Resiliency of a Boolean function
- Kaushik Chakraborty and Subhamoy Maitra
-
2013/231 ( PDF )
- Sakura: a flexible coding for tree hashing
- Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
-
2013/230 ( PDF )
- Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
- Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo
-
2013/229 ( PDF )
- Overcoming the Worst-Case Curse for Cryptographic Constructions
- Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich
-
2013/228 ( PDF )
- Public-Key Revocation and Tracing Schemes with Subset Difference Methods
- Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park
-
2013/227 ( PDF )
- Analysis of authentication and key establishment in inter-generational mobile telephony
- Chunyu Tang and David A. Naumann and Susanne Wetzel
-
2013/226 ( PDF )
- Public key exchange using semidirect product of (semi)groups
- Maggie Habeeb and Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
-
2013/225 ( PDF )
- Transparent, Distributed, and Replicated Dynamic Provable Data Possession
- Mohammad Etemad and Alptekin Küpçü
-
2013/224 ( PDF )
- On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
- Yuanyuan Zhou and Yu Yu and François-Xavier Standaert and Jean-Jacques Quisquater
-
2013/223 ( PDF )
- The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
- Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
-
2013/222 ( PDF )
- Tight security bounds for key-alternating ciphers
- Shan Chen, John Steinberger
-
2013/221 ( PDF )
- Identity-based Aggregate Signatures with Verifiable Single Ones
- Yang Zhang, Jun-liang Chen
-
2013/220 ( PDF )
- Towards Efficient Private Distributed Computation on Unbounded Input Streams
- Shlomi Dolev and Juan Garay and Niv Gilboa and Vladimir Kolesnikov and Yelena Yuditsky
-
2013/219 ( PDF )
- Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes
- Stefan G. Weber
-
2013/218 ( PDF )
- Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
- Aurore Guillevic
-
2013/217 ( PDF )
- Computing on Authenticated Data for Adjustable Predicates
- Björn Deiseroth and Victoria Fehr and Marc Fischlin and Manuel Maasz and Nils Fabian Reimers and Richard Stein
-
2013/216 ( PDF )
- Election Verifiability or Ballot Privacy: Do We Need to Choose?
- Edouard Cuvelier and Olivier Pereira and Thomas Peters
-
2013/215 ( PDF )
- Optical PUFs Reloaded
- Ulrich Rührmair and Christian Hilgers and Sebastian Urban and Agnes Weiershäuser and Elias Dinter and Brigitte Forster and Christian Jirauschek
-
2013/214 ( PDF )
- Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
- Filip Zagorski and Richard T. Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora
-
2013/213 ( PDF )
- On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption
- Guangjun Fan and Yongbin Zhou and F.-X. Standaert and Dengguo Feng
-
2013/212 ( PDF )
- A Closer Look at HMAC
- Krzysztof Pietrzak
-
2013/211 ( PDF )
- A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)
- Christina Boura and Anne Canteaut
-
2013/210 ( PDF )
- Cryptophia's Short Combiner for Collision-Resistant Hash Functions
- Arno Mittelbach
-
2013/209 ( PDF )
- New modular multiplication and division algorithms based on continued fraction expansion
- Mourad Gouicem
-
2013/208 ( PDF )
- CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
- Yi-Ruei Chen and Cheng-Kang Chu and Wen-Guey Tzeng and Jianying Zhou
-
2013/207 ( PDF )
- Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication
- Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng
-
2013/206 ( PDF )
- Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation
- Florian Kerschbaum and Hoon Wei Lim and Ivan Gudymenko
-
2013/205 ( PDF )
- Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$
- Jan Camenisch and Robert R. Enderlein and Victor Shoup
-
2013/204 ( PDF )
- Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture
- Shi Pu, Jyh-Charn Liu
-
2013/203 ( PDF )
- From oblivious AES to efficient and secure database join in the multiparty setting
- Sven Laur and Riivo Talviste and Jan Willemson
-
2013/202 ( PDF )
- Breaking NLM-MAC Generator
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld
-
2013/201 ( PDF )
- Non-malleable Codes from Additive Combinatorics
- Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett
-
2013/200 ( PDF )
- Selecting polynomials for the Function Field Sieve
- Razvan Barbulescu
-
2013/199 ( PDF )
- Quantum algorithms for the subset-sum problem
- Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer
-
2013/198 ( PDF )
- On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes
- Zhizhou Li and Ten H. Lai
-
2013/197 ( PDF )
- Discrete logarithm in GF(2^809) with FFS
- Razvan Barbulescu and Cyril Bouvier and Jérémie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thomé and Marion Videau and Paul Zimmermann
-
2013/196 ( PDF )
- Fast Two-Party Secure Computation with Minimal Assumptions
- abhi shelat and Chih-hao Shen
-
2013/195 ( PDF )
- On the (re)design of an FPGA-based PUF
- Philipp Grabher and Dan Page and Marcin Wójcik
-
2013/194 ( PDF )
- On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses
- Per Austrin and Kai-Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth
-
2013/193 ( PDF )
- Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes
- Yu-Chi Chen and Raylin Tso and Willy Susilo and Xinyi Huang and Gwoboa Horng
-
2013/192 ( PDF )
- A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties
- David Lubicz and Damien Robert
-
2013/191 ( PDF )
- Improved Differential Fault Analysis on ARIA using Small Number of Faults
- Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
-
2013/190 ( PDF )
- Power Analysis Attacks against FPGA Implementations of KLEIN
- Shaohua Tang and Jianhao Wu and Weijian Li and Zheng Gong
-
2013/189 ( PDF )
- Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes
- Appala Naidu Tentu and Prabal Paul and V Ch Venkaiah
-
2013/188 ( PDF )
- A family of 6-to-4-bit S-boxes with large linear branch number
- Daniel Loebenberger and Michael Nüsken
-
2013/187 ( PDF )
- Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
- Jorge Munilla, Alberto Peinado, Guoming Yang and Willy Susilo
-
2013/186 ( PDF )
- On the (Im)possibility of Projecting Property in Prime-Order Setting
- Jae Hong Seo
-
2013/185 ( PDF )
- Security Analysis of Linearly Filtered NLFSRs
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett
-
2013/184 ( PDF )
- The Vernam cipher is robust to small deviations from randomness
- Boris Ryabko
-
2013/183 ( PDF )
- Practical Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2013/182 ( PDF )
- Collusion-Resistant Domain-Specific Pseudonymous Signatures
- Julien Bringer and Herve Chabanne and Alain Patey
-
2013/181 ( PDF )
- On the evaluation of modular polynomials
- Andrew V. Sutherland
-
2013/180 ( PDF )
- A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code
- Masao KASAHARA
-
2013/179 ( PDF )
- Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
- Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
-
2013/178 ( PDF )
- Cryptanalysis of RC4(n,m) Stream Cipher
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
-
2013/177 ( PDF )
- A generic construction for voting correctness at minimum cost - Application to Helios
- Veronique Cortier and David Galindo and Stephane Glondu and Malika Izabachene
-
2013/176 ( PDF )
- Distinguishing Attacks on RC4 and A New Improvement of the Cipher
- Jing Lv and Bin Zhang and Dongdai Lin
-
2013/175 ( PDF )
- Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
- Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano
-
2013/174 ( PDF )
- Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key
- Deukjo Hong and Daesung Kwon
-
2013/173 ( PDF )
- On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"
- Ray Perlner and Daniel Smith-Tone
-
2013/172 ( PDF )
- On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
- Raphael Spreitzer and Thomas Plos
-
2013/171 ( PDF )
- Confined Guessing: New Signatures From Standard Assumptions
- Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Christoph Striecks
-
2013/170 ( PDF )
- Fast Collision Attack on MD5
- Tao Xie and Fanbao Liu and Dengguo Feng
-
2013/169 ( PDF )
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
- David Cash and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
-
2013/168 ( PDF )
- On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
- Simon Hoerder and Kimmo Järvinen and Dan Page
-
2013/167 ( PDF )
- Single Password Authentication
- Tolga Acar and Mira Belenkiy and Alptekin Küpçü
-
2013/166 ( PDF )
- On generalized semi-bent (and partially bent) Boolean functions
- Brajesh Kumar Singh
-
2013/165 ( PDF )
- A New Security and Privacy Framework for RFID In Cloud Computing
- Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi
-
2013/164 ( PDF )
- Provably Secure LWE-Encryption with Uniform Secret
- Daniel Cabarcas and Florian Göpfert and Patrick Weiden
-
2013/163 ( PDF )
- Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions
- Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu-an Tan
-
2013/162 ( PDF )
- A Non Asymptotic Analysis of Information Set Decoding
- Yann Hamdaoui and Nicolas Sendrier
-
2013/161 ( PDF )
- Completeness Theorems for All Finite Stateless 2-Party Primitives
- Daniel Kraschewski
-
2013/160 ( PDF )
- Interactive Coding, Revisited
- Kai-Min Chung and Rafael Pass and Sidharth Telang
-
2013/159 ( PDF )
- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
- Dingding Jia and Bao Liand Yamin Liu and Qixiang Mei
-
2013/158 ( PDF )
- Keep Calm and Stay with One (and p>3)
- Armando Faz-Hernandez and Patrick Longa and Ana H. Sanchez
-
2013/157 ( PDF )
- The fragility of AES-GCM authentication algorithm
- Shay Gueron and Vlad Krasnov
-
2013/156 ( PDF )
- Incentivizing Outsourced Computation
- Mira Belenkiy and Melissa Chase and C. Chris Erway and John Jannotti and Alptekin Küpçü and Anna Lysyanskaya
-
2013/155 ( PDF )
- MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
- Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi
-
2013/154 ( PDF )
- Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
- Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
-
2013/153 ( PDF )
- On the security of a certicateless signature scheme in the standard model
- Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
-
2013/152 ( PDF )
- Policy-based Secure Deletion
- Christian Cachin and Kristiyan Haralambiev and Hsu-Chun Hsiao and Alessandro Sorniotti
-
2013/151 ( PDF )
- Some Fixes To SSH
- Xu ZiJie
-
2013/150 ( PS PS.GZ PDF )
- Practical (Second) Preimage Attacks on TCS_SHA-3
- Gautham Sekar and Soumyadeep Bhattacharya
-
2013/149 ( PDF )
- Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
- Jiawei Yuan and Shucheng Yu
-
2013/148 ( PDF )
- AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
- Alexander Rostovtsev
-
2013/147 ( PDF )
- A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms
- Naomi Benger and Manuel Charlemagne and Kefei Chen
-
2013/146 ( PDF )
- High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
- Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
-
2013/145 ( PDF )
- Key Wrapping with a Fixed Permutation
- Dmitry Khovratovich
-
2013/144 ( PDF )
- On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
- Gordon Procter and Carlos Cid
-
2013/143 ( PDF )
- An architecture for practical actively secure MPC with dishonest majority
- Marcel Keller and Peter Scholl and Nigel P. Smart
-
2013/142 ( PDF )
- A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES
- Kisoon YOON
-
2013/141 ( PDF )
- Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
- M. Shakiba and M. Dakhilalian and H. Mala
-
2013/140 ( PDF )
- Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
- Marc Fischlin and Nils Fleischhacker
-
2013/139 ( PDF )
- Rethinking Definitions of Security for Session Key Agreement
- Wesley George and Charles Rackoff
-
2013/138 ( PDF )
- Multi-bit homomorphic encryption based on learning with errors over rings
- Zhang Wei, Liu Shuguang, Yang Xiaoyuan
-
2013/137 ( PDF )
- How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
- Payman Mohassel and Saeed Sadeghian
-
2013/136 ( PDF )
- 2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers
- Dieter Schmidt
-
2013/135 ( PDF )
- An MQ/Code Cryptosystem Proposal
- Leonard J. Schulman
-
2013/134 ( PDF )
- Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields
- Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Skeith III
-
2013/133 ( PDF )
- New Lattice Based Signature Using The Jordan Normal Form
- Hemlata Nagesh and Birendra Kumar Sharma
-
2013/132 ( PDF )
- Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
- Niu Liu and Shaohua Tang and Lingling Xu
-
2013/131 ( PDF )
- Two is the fastest prime
- Thomaz Oliveira and Juilo López and Diego F. Aranha and Francisco Rodríguez-Henríquez
-
2013/130 ( PDF )
- Blank Digital Signatures
- Christian Hanser and Daniel Slamanig
-
2013/129 ( PDF )
- An Ideal-Security Protocol for Order-Preserving Encoding
- Raluca Ada Popa and Frank H. Li and Nickolai Zeldovich
-
2013/128 ( PDF )
- Attribute-Based Encryption for Circuits from Multilinear Maps
- Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters
-
2013/127 ( PDF )
- Oblivious PAKE and Efficient Handling of Password Trials
- Franziskus Kiefer and Mark Manulis
-
2013/126 ( PDF )
- Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
- Aysajan Abidin and Jan-Åke Larsson
-
2013/125 ( PDF )
- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
- Ananth Raghunathan and Gil Segev and Salil Vadhan
-
2013/124 ( PDF )
- Tamper Resilient Cryptography Without Self-Destruct
- Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
-
2013/123 ( PDF )
- Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
- Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2013/122 ( PDF )
- Practical collision attack on 40-step RIPEMD-128
- Gaoli Wang
-
2013/121 ( PDF )
- Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
- Helger Lipmaa
-
2013/120 ( PDF )
- An Attack Against Fixed Value Discrete Logarithm Representations
- Gergely Alpár and Jaap-Henk Hoepman and Wouter Lueks
-
2013/119 ( PDF )
- Speeding up Ate Pairing Computation in Affine Coordinates
- Duc-Phong Le and Chik How Tan
-
2013/118 ( PDF )
- Throughput Optimized Implementations of QUAD
- Jason R. Hamlet and Robert W. Brocato
-
2013/117 ( PDF )
- On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s
- Namhun Koo and Gook Hwa Cho and Soonhak Kwon
-
2013/116 ( PDF )
- The Algorithm of AAES
- Shiyong Zhang and Gongliang Chen and Lei Fan
-
2013/115 ( PDF )
- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release
- Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang
-
2013/114 ( PDF )
- Public Key Exchange Using Matrices Over Group Rings
- Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
-
2013/113 ( PDF )
- Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
- Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
-
2013/112 ( PDF )
- PUF Modeling Attacks on Simulated and Silicon Data
- Ulrich Rührmair and Jan Sölter and Frank Sehnke and Xiaolin Xu and Ahmed Mahmoud and Vera Stoyanova and Gideon Dror and Jürgen Schmidhuber and Wayne Burleson and Srinivas Devadas
-
2013/111 ( PDF )
- Message Authentication Codes Secure against Additively Related-Key Attacks
- Keita Xagawa
-
2013/110 ( PDF )
- Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
- Gilad Asharov and Yehuda Lindell and Tal Rabin
-
2013/109 ( PS PS.GZ PDF )
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
- Charanjit S. Jutla and Arnab Roy
-
2013/108 ( PDF )
- Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
- Ivan Damgard and Alessandra Scafuro
-
2013/107 ( PDF )
- On the Arithmetic Complexity of Strassen-Like Matrix Multiplications
- Murat Cenk and M. Anwar Hasan
-
2013/106 ( -- withdrawn -- )
- URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
- Roohallah Rastaghi
-
2013/105 ( PDF )
- Lossy Chains and Fractional Secret Sharing
- Yuval Ishai and Eyal Kushilevitz and Omer Strulovich
-
2013/104 ( PDF )
- A Tutorial on White-box AES
- James A. Muir
-
2013/103 ( PDF )
- On the Complexity of Broadcast Setup
- Martin Hirt and Pavel Raykov
-
2013/102 ( PDF )
- On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis
- Yuchen Cao, Yongbin Zhou and Zhenmei Yu
-
2013/101 ( PDF )
- Notions of Black-Box Reductions, Revisited
- Paul Baecher and Christina Brzuska and Marc Fischlin
-
2013/100 ( PDF )
- Attacks and Comments on Several Recently Proposed Key Management Schemes
- Niu Liu and Shaohua Tang and Lingling Xu
-
2013/099 ( PDF )
- Secure Two-Party Computation via Leaky Generalized Oblivious Transfer
- Samuel Ranellucci and Alain Tapp
-
2013/098 ( PDF )
- Learning with Rounding, Revisited: New Reduction, Properties and Applications
- Joel Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs
-
2013/097 ( PDF )
- Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher
- Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2013/096 ( PDF )
- State convergence in bit-based stream ciphers
- Sui-Guan Teo and Harry Bartlett and Ali Alhamdan and Leonie Simpson and Kenneth Koon-Ho Wong and Ed Dawson
-
2013/095 ( PDF )
- A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic
- Antoine Joux
-
2013/094 ( PDF )
- On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
- Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
-
2013/093 ( PDF )
- On the security of a certificateless aggregate signature scheme
- Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou
-
2013/092 ( PDF )
- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
- Vadim Lyubashevsky and Daniel Masny
-
2013/091 ( PDF )
- Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers
- Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
-
2013/090 ( -- withdrawn -- )
- Functional Encryption Supporting Recursive Languages
- Somindu C. Ramanna and Palash Sarkar
-
2013/089 ( PDF )
- Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
- James McLaughlin and John A. Clark
-
2013/088 ( PDF )
- Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World
- Dan Boneh and Mark Zhandry
-
2013/087 ( PDF )
- Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1))
- Namhun Koo and Gook Hwa Cho and Soonhak Kwon
-
2013/086 ( PDF )
- Efficient Private File Retrieval by Combining ORAM and PIR
- Travis Mayberry and Erik-Oliver Blass and Agnes Chan
-
2013/085 ( PDF )
- Between a Rock and a Hard Place: Interpolating Between MPC and FHE
- Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
-
2013/084 ( PDF )
- Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks
- Boris Skoric and Allard P. Mosk and Pepijn W.H. Pinkse
-
2013/083 ( PDF )
- A Security Framework for Analysis and Design of Software Attestation
- Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Christian Wachsmann
-
2013/082 ( PDF )
- Secret Sharing, Rank Inequalities and Information Inequalities
- Sebastia Martin and Carles Padro and An Yang
-
2013/081 ( PDF )
- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
- Yan Huang and Jonathan Katz and Dave Evans
-
2013/080 ( PDF )
- An efficient attack of a McEliece cryptosystem variant based on convolutional codes
- Grégory Landais and Jean-Pierre Tillich
-
2013/079 ( PDF )
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Yehuda Lindell
-
2013/078 ( PDF )
- Broadcast Steganography
- Nelly Fazio and Antonio R. Nicolosi and Irippuge Milinda Perera
-
2013/077 ( PDF )
- UC-Secure Multi-Session OT Using Tamper-Proof Hardware
- Kaoru Kurosawa and Ro Nojima and Le Trieu Phong
-
2013/076 ( PDF )
- Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
- Ling Ren and Xiangyao Yu and Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas
-
2013/075 ( PDF )
- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
- Joppe W. Bos and Kristin Lauter and Jake Loftus and Michael Naehrig
-
2013/074 ( PDF )
- On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$
- Faruk Gologlu and Robert Granger and Gary McGuire and Jens Zumbragel
-
2013/073 ( PDF )
- Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
- Marek Jawurek and Florian Kerschbaum and Claudio Orlandi
-
2013/072 ( PDF )
- The UC approach: an application view
- István Vajda
-
2013/071 ( PDF )
- Relation collection for the Function Field Sieve
- Jérémie Detrey and Pierrick Gaudry and Marion Videau
-
2013/070 ( PDF )
- Related-key Attacks Against Full Hummingbird-2
- Markku-Juhani O. Saarinen
-
2013/069 ( PDF )
- Hardness of SIS and LWE with Small Parameters
- Daniele Micciancio and Chris Peikert
-
2013/068 ( PDF )
- Why Proving HIBE Systems Secure is Difficult
- Allison Lewko and Brent Waters
-
2013/067 ( PDF )
- Power Analysis of Hardware Implementations Protected with Secret Sharing
- Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh-Ha Le and Michael Peeters and Gilles Van Assche
-
2013/066 ( PDF )
- Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
- Amin Mohammadali; Zahra Ahmadian; Mohammad Reza Aref
-
2013/065 ( PDF )
- Instantiating Treeless Signature Schemes
- Patrick Weiden and Andreas Hülsing and Daniel Cabarcas and Johannes Buchmann
-
2013/064 ( PDF )
- Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
- Sven Laur and Bingsheng Zhang
-
2013/063 ( PDF )
- A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol
- Christian L. F. Corniaux and Hossein Ghodosi
-
2013/062 ( PDF )
- Symbolic Universal Composability
- Florian Böhl and Dominique Unruh
-
2013/061 ( PS PS.GZ PDF )
- On the Indifferentiability of Key-Alternating Ciphers
- Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger
-
2013/060 ( PDF )
- On FHE without bootstrapping
- Aayush Jain
-
2013/059 ( PDF )
- Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
- Ayesha Khalid and Deblin Bagchi and Goutam Paul and Anupam Chattopadhyay
-
2013/058 ( PDF )
- Cryptanalysis of the Dragonfly Key Exchange Protocol
- Dylan Clarke and Feng Hao
-
2013/057 ( PDF )
- CRT-based Fully Homomorphic Encryption over the Integers
- Jinsu Kim and Moon Sung Lee and Aaram Yun and Jung Hee Cheon
-
2013/056 ( PDF )
- On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
- Kishan Chand Gupta and Indranil Ghosh Ray
-
2013/055 ( PDF )
- Secrecy without one-way functions
- Dima Grigoriev and Vladimir Shpilrain
-
2013/054 ( PDF )
- Joint Compartmented Threshold Access Structures
- Ali Aydın Selçuk and Ramazan Yılmaz
-
2013/053 ( PDF )
- A revocable certificateless signature scheme
- Yinxia Sun and Futai Zhang and Limin Shen and Robert H. Deng
-
2013/052 ( PDF )
- Some Complexity Results and Bit Unpredictable for Short Vector Problem
- Kuan Cheng
-
2013/051 ( PDF )
- Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
- Payman Mohassel and Ben Riva
-
2013/050 ( PS PS.GZ PDF )
- Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
- Roohallah Rastaghi
-
2013/049 ( PDF )
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
- Christopher Meyer and Jörg Schwenk
-
2013/048 ( PDF )
- Power Balanced Circuits for Leakage-Power-Attacks Resilient Design
- Basel Halak, Julian Murphy, Alex Yakovlev
-
2013/047 ( PDF )
- Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes
- Carles Padro
-
2013/046 ( PDF )
- Fast and Maliciously Secure Two-Party Computation Using the GPU
- Tore Kasper Frederiksen and Jesper Buus Nielsen
-
2013/045 ( PDF )
- Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
- Jiawei Yuan and Shucheng Yu
-
2013/044 ( PDF )
- Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions
- Fangguo Zhang and Xu Ma and Shengli Liu
-
2013/043 ( PDF )
- Differential Fault Attack on the PRINCE Block Cipher
- Ling Song and Lei Hu
-
2013/042 ( PDF )
- Complexity of Multi-Party Computation Functionalities
- Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
-
2013/041 ( PDF )
- Trace Expression of r-th Root over Finite Field
- Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
-
2013/040 ( PDF )
- An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
- Roohallah Rastaghi
-
2013/039 ( PDF )
- Creating a Challenge for Ideal Lattices
- Thomas Plantard and Michael Schneider
-
2013/038 ( PDF )
- Verifiable Data Streaming
- Dominique Schröder and Heike Schröder
-
2013/037 ( PDF )
- Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
- Jayaprakash Kar
-
2013/036 ( PDF )
- Batch Fully Homomorphic Encryption over the Integers
- Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi
-
2013/035 ( PDF )
- Improvements to NFC Mobile Transaction and Authentication Protocol
- Muhammad Qasim Saeed
-
2013/034 ( PDF )
- New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
- Fabrice Ben Hamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2013/033 ( PDF )
- CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
- Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
-
2013/032 ( PDF )
- Detection of Cheaters in Non-interactive Polynomial Evaluation
- Maki Yoshida and Satoshi Obana
-
2013/031 ( PDF )
- An Analysis of the EMV Channel Establishment Protocol
- Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson
-
2013/030 ( PDF )
- On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
- Haiyan Sun
-
2013/029 ( PDF )
- A Differential Fault Attack on MICKEY 2.0
- Subhadeep Banik and Subhamoy Maitra
-
2013/028 ( PDF )
- More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96
- Stanislav Bulygin
-
2013/027 ( PDF )
- Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol
- Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven Watson
-
2013/026 ( PDF )
- RSA private key reconstruction from random bits using SAT solvers
- Constantinos Patsakis
-
2013/025 ( PDF )
- The IITM Model: a Simple and Expressive Model for Universal Composability
- Ralf Kuesters and Max Tuengerthal
-
2013/024 ( PDF )
- New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field
- Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
-
2013/023 ( PDF )
- A New Practical Identity-Based Encryption System
- Jong Hwan Park and Dong Hoon Lee
-
2013/022 ( PDF )
- Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
- James McLaughlin and John A. Clark
-
2013/021 ( PDF )
- Rate-Limited Secure Function Evaluation: Definitions and Constructions
- Özgür Dagdelen and Payman Mohassel and Daniele Venturi
-
2013/020 ( PDF )
- Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles
- Markus Rückert and Dominique Schroeder
-
2013/019 ( PDF )
- Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
- Peter Gaži
-
2013/018 ( PDF )
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Jae Hong Seo and Keita Emura
-
2013/017 ( PDF )
- Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions
- Alexandra Boldyreva and Robert Lychev
-
2013/016 ( PDF )
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Jae Hong Seo and Keita Emura
-
2013/015 ( PDF )
- Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography
- Graham Enos
-
2013/014 ( PDF )
- On formal and automatic security verification of WSN transport protocols
- Ta Vinh Thong and Amit Dvir
-
2013/013 ( PDF )
- Efficiently Outsourcing Multiparty Computation under Multiple Keys
- Andreas Peter and Erik Tews and Stefan Katzenbeisser
-
2013/012 ( PDF )
- Tropical cryptography
- Dima Grigoriev and Vladimir Shpilrain
-
2013/011 ( PDF )
- Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
- James McLaughlin and John A. Clark
-
2013/010 ( PDF )
- Simultaneous Resettable WI from One-way Functions
- Kai-Min Chung and Rafael Pass
-
2013/009 ( PDF )
- Achieving Anonymity Against Major Face Recognition Algorithms
- Benedikt Driessen and Markus Dürmuth
-
2013/008 ( PDF )
- Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security
- Kai-Min Chung and Rafael Pass and Karn Seth
-
2013/007 ( PDF )
- A Matrix Approach for Constructing Quadratic APN Functions
- Yuyin Yu and Mingsheng Wang and Yongqiang Li
-
2013/006 ( PDF )
- Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
- Qingfeng Cheng
-
2013/005 ( PDF )
- Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA
- Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue and Faouzi Chekir
-
2013/004 ( PDF )
- Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices
- Damien Stehlé and Ron Steinfeld
-
2013/003 ( PDF )
- On Formal Expressions of BRW-polynomials
- Guillermo Morales-Luna
-
2013/002 ( PDF )
- Generalized (Identity-Based) Hash Proof System and Its Applications
- Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
-
2013/001 ( PDF )
- Shielding circuits with groups
- Eric Miles and Emanuele Viola
[ Cryptology ePrint archive ]