Cryptology ePrint Archive: Listing for 2015


2015/069 ( PDF )
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
Benoît Cogliati and Yannick Seurin
2015/068 ( PDF )
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
Gregor Leander and Brice Minaud and Sondre Rønjom
2015/067 ( PDF )
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
Susumu Kiyoshima
2015/066 ( PDF )
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
Tobias Schneider and Amir Moradi and Tim Güneysu
2015/065 ( PDF )
A lightweight-friendly modifcation of GOST block cipher
Andrey Dmukh and Denis Dygin and Grigory Marshalko
2015/064 ( PDF )
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
Handan Kılınç and Alptekin Küpçü
2015/063 ( PDF )
CamlCrush: A PKCS\#11 Filtering Proxy
R. Benadjila and T. Calderon and M. Daubignard
2015/062 ( PDF )
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
Yuval Yarom and Gefei Li and Damith C. Ranasinghe
2015/061 ( PDF )
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
2015/060 ( PDF )
Verified Proofs of Higher-Order Masking
Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub
2015/059 ( PDF )
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
2015/058 ( PDF )
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
Berry Schoenmakers and Meilof Veeningen
2015/057 ( PDF )
Cold Boot Attacks in the Discrete Logarithm Setting
Bertram Poettering and Dale L. Sibborn
2015/056 ( PDF )
Better Algorithms for LWE and LWR
Alexandre Duc and Florian Tramèr and Serge Vaudenay
2015/055 ( PDF )
Richer Efficiency/Security Trade-offs in 2PC
Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek
2015/054 ( PDF )
Non-committing encryption from $\Phi$-hiding
Brett Hemenway and Rafail Ostrovsky and Alon Rosen
2015/053 ( PDF )
Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/052 ( PDF )
Interactive Message-Locked Encryption and Secure Deduplication
Mihir Bellare and Sriram Keelveedhi
2015/051 ( PDF )
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
Li Lin, Wenling Wu
2015/050 ( PDF )
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
Carla Ràfols
2015/049 ( PDF )
On Solving Lpn using BKW and Variants
Sonia Bogos and Florian Tramer and Serge Vaudenay
2015/048 ( PDF )
On Obfuscation with Random Oracles
Ran Canetti and Yael Tauman Kalai and Omer Paneth
2015/047 ( PDF )
Linearly Homomorphic Encryption from DDH
Guilhem Castagnos and Fabien Laguillaumie
2015/046 ( PDF )
On the concrete hardness of Learning with Errors
Martin R. Albrecht and Rachel Player and Sam Scott
2015/045 ( PDF )
Reliable Information Extraction for Single Trace Attacks
Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
2015/044 ( PDF )
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
Binanda Sengupta and Abhijit Das
2015/043 ( PDF )
Group Signature with Deniability: How to Disavow a Signature
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka
2015/042 ( PDF )
High Performance Lattice-based CCA-secure Encryption
Rachid El~Bansarkhani and Johannes Buchmann
2015/041 ( PDF )
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP
Artur Mariano and Thijs Laarhoven and Christian Bischof
2015/040 ( PDF )
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian and Sahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/039 ( PDF )
Type-Based Verification of Electronic Voting Protocols
Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling
2015/038 ( PDF )
Aggregate Pseudorandom Functions and Connections to Learning
Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan
2015/037 ( PDF )
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/036 ( PDF )
Faster software for fast endomorphisms
Billy Bob Brumley
2015/035 ( PDF )
Cryptographically Secure CRC for Lightweight Message Authentication
Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist
2015/034 ( PDF )
Suit up! Made-to-Measure Hardware Implementations of Ascon
Hannes Gro{\ss} and Erich Wenger and Christoph Dobraunig and Christoph Ehrenh{\"o}fer
2015/033 ( PDF )
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel
2015/032 ( PDF )
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF
Zvika Brakerski and Vinod Vaikuntanathan
2015/031 ( PDF )
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence
Kai-Min Chung and Rafael Pass
2015/030 ( PDF )
Cryptanalysis of Ascon
Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schläffer
2015/029 ( PDF )
Predicate Encryption for Circuits from LWE
Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2015/028 ( PDF )
Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$)
Jeremy Maitin-Shepard
2015/027 ( PDF )
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption
Adam Smith and Ye Zhang
2015/026 ( PDF )
A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/025 ( PDF )
Obfuscating Circuits via Composite-Order Graded Encoding
Benny Applebaum and Zvika Brakerski
2015/024 ( PDF )
Non-Abelian Analogs of Lattice Rounding
Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan
2015/023 ( PDF )
Multilinear Maps Using Ideal Lattices without Encodings of Zero
Gu Chunsheng
2015/022 ( PDF )
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
Bo Yang and Dengguo Feng and Yu Qin and Yingjun Zhang and Weijin Wang
2015/021 ( PDF )
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification
Xin Li
2015/020 ( PDF )
Simpler Efficient Group Signatures from Lattices
Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang
2015/019 ( PDF )
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Mehdi Tibouchi
2015/018 ( PDF )
A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS
JINTAI DING, ALEXEI MIASNIKOV, AND ALEXANDER USHAKOV
2015/017 ( PDF )
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
2015/016 ( PDF )
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Yannis Rouselakis and Brent Waters
2015/015 ( PDF )
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
Florian Bergsma, Tibor Jager, Jörg Schwenk
2015/014 ( PDF )
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based
San Ling and Khoa Nguyen and Huaxiong Wang
2015/013 ( PDF )
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Nico Döttling
2015/012 ( PDF )
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
Tancrède Lepoint and Mehdi Tibouchi
2015/011 ( PDF )
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications
Benjamin Buhrow and Paul Riemer and Mike Shea and Barry Gilbert and Erik Daniel
2015/010 ( PDF )
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
Shengli Liu and Kenneth G. Paterson
2015/009 ( PDF )
Rig: A simple, secure and flexible design for Password Hashing
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2015/008 ( PDF )
Post-Quantum Forward Secure Onion Routing (Future Anonymity in Today’s Budget)
Satrajit Ghosh and Aniket Kate
2015/007 ( PDF )
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Tobias Pulls and Roel Peeters
2015/006 ( PDF )
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Jan Camenisch and Robert R. Enderlein and Gregory Neven
2015/005 ( PDF )
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE)
Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren
2015/004 ( PDF )
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Carmit Hazay
2015/003 ( PDF )
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen
2015/002 ( PDF )
Characterization of MDS mappings
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/001 ( PDF )
A note on the security of Higher-Order Threshold Implementations
Oscar Reparaz


[ Cryptology ePrint archive ]