Cryptology ePrint Archive: Listing for 2017

2017/038 ( PDF )
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
Fabrice Benhamouda and Florian Bourse and Helger Lipmaa
2017/037 ( PDF )
Double-base scalar multiplication revisited
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
2017/036 ( PDF )
Low-Complexity Cryptographic Hash Functions
Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan
2017/035 ( PDF )
Privacy-Preserving Classification on Deep Neural Network
Hervé Chabanne and Amaury de Wargny and Jonathan Milgram and Constance Morel and Emmanuel Prouff
2017/034 ( PDF )
Analysis of the NORX Core Permutation
Alex Biryukov and Aleksei Udovenko and Vesselin Velichkov
2017/033 ( PDF )
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Peter Pessl
2017/032 ( PDF )
Cryptanalysis of GlobalPlatform Secure Channel Protocols
Mohamed Sabt and Jacques Traoré
2017/031 ( PDF )
Honey Encryption for Language
Marc Beunardeau and Houda Ferradi and Rémi Géraud and David Naccache
2017/030 ( PDF )
Authenticated Garbling and Communication-Efficient, Constant-Round, Secure Two-Party Computation
Jonathan Katz and Samuel Ranellucci and Xiao Wang
2017/029 ( PDF )
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
Gene Itkis and Emily Shen and Mayank Varia and David Wilson and Arkady Yerukhimovich
2017/028 ( PDF )
A Decentralized PKI In A Mobile Ecosystem
Varun Chandrasekaran and Lakshminarayanan Subramanian
2017/027 ( PDF )
Scalable Multi-Party Private Set-Intersection
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2017/026 ( PDF )
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2017/025 ( PDF )
Improved Structure Preserving Signatures under Standard Bilinear Assumptions
Charanjit S. Jutla and Arnab Roy
2017/024 ( PDF )
Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases
Mohamed Ahmed Abdelraheem, Tobias Andersson and Christian Gehrmann
2017/023 ( PDF )
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
Nuttapong Attrapadung
2017/022 ( PDF )
Privacy for Distributed Databases via (Un)linkable Pseudonyms
Jan Camenisch and Anja Lehmann
2017/021 ( PDF )
A Generic Approach to Constructing and Proving Verifiable Random Functions
Rishab Goyal and Susan Hohenberger and Venkata Koppula and Brent Waters
2017/020 ( PDF )
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
Olivier Levillain and Maxence Tury and Nicolas Vivet
2017/019 ( PDF )
SMART POOL : Practical Decentralized Pooled Mining
Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena
2017/018 ( PDF )
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs
Nir Bitansky
2017/017 ( PDF )
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm
Gottfried Herold and Elena Kirshanova
2017/016 ( PDF )
Provable Security of Substitution-Permutation Networks
Yevgeniy Dodis and Jonathan Katz and John Steinberger and Aishwarya Thiruvengadam and Zhe Zhang
2017/015 ( PDF )
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/014 ( PDF )
ORAMs in a Quantum World
Tommaso Gagliardoni and Nikolaos P. Karvelas and Stefan Katzenbeisser
2017/013 ( PDF )
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
Meilof Veeningen
2017/012 ( PDF )
Universal Samplers with Fast Verification
Venkata Koppula and Andrew Poelstra and Brent Waters
2017/011 ( PDF )
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2017/010 ( PDF )
Circuit-Private Multi-Key FHE
Wutichai Chongchitmate and Rafail Ostrovsky
2017/009 ( PDF )
Access Control Encryption for Equality, Comparison, and More
Georg Fuchsbauer and Romain Gay and Lucas Kowalczyk and Claudio Orlandi
2017/008 ( PDF )
Externally Verifiable Oblivious RAM
Joshua Gancher and Adam Groce and Alex Ledger
2017/007 ( PDF )
Algebraic Attack Efficiency versus S-box Representation
Hossein Arabnezhad-Khanoki and Babak Sadeghiyan and Josef Pieprzyk
2017/006 ( PDF )
Reduced Mumford divisors of a genus 2 curve through its jacobian function field
Eduardo Ruiz Duarte
2017/005 ( PDF )
High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves
Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi
2017/004 ( PDF )
A New Approach for Practical Function-Private Inner Product Encryption
Sungwook Kim and Jinsu Kim and Jae Hong Seo
2017/003 ( PDF )
The STROBE protocol framework
Mike Hamburg
2017/002 ( PDF )
Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Applications
Ping Zhang, Honggang Hu, and Peng Wang
2017/001 ( PDF )
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
Jorge Luis Villar

[ Cryptology ePrint archive ]