Cryptology ePrint Archive: Listing for 2014

2014/578 ( PDF )
The Exact PRF-Security of NMAC and HMAC
Peter Gaži and Krzysztof Pietrzak and Michal Rybár
2014/577 ( PDF )
Reducing Communication Overhead of the Subset Difference Scheme
Sanjay Bhattacherjee and Palash Sarkar
2014/576 ( PDF )
Vernam Two
Dan P. Milleville
2014/575 ( PDF )
Simple AEAD Hardware Interface (S{\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
Markku-Juhani O. Saarinen
2014/574 ( PDF )
Security Analysis of Multilinear Maps over the Integers
Hyung Tae Lee and Jae Hong Seo
2014/573 ( PDF )
A new public key system based on Polynomials over finite fields GF(2)
Gurgen Khachatrian
2014/572 ( PDF )
On the Optimality of Differential Fault Analyses on CLEFIA
Juliane Krämer and Anke Stüber and Ágnes Kiss
2014/571 ( PDF )
How to manipulate curve standards: a white paper for the black hat
Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas H\"ulsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
2014/570 ( PDF )
Deja Q: Using Dual Systems to Revisit q-Type Assumptions
Melissa Chase and Sarah Meiklejohn
2014/569 ( PDF )
Fast Lattice Point Enumeration with Minimal Overhead
Daniele Micciancio and Michael Walter
2014/568 ( PDF )
New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC
2014/567 ( -- withdrawn -- )
Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation
Hiroaki Anada and Seiko Arita and Kouichi Sakurai
2014/566 ( PDF )
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
Daniel Augot and Matthieu Finiasz
2014/565 ( PDF )
Kangaroos in Side-Channel Attacks
Tanja Lange and Christine van Vredendaal and Marnix Wakker
2014/564 ( PDF )
A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
Massoud Hadian Dehkordi and Reza Ghasemi
2014/563 ( PDF )
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Aleksandar Kircanski
2014/562 ( PDF )
hHB: a Harder HB+ Protocol
Ka Ahmad Khoureich
2014/561 ( PDF )
Performance Increasing Approaches For Binary Field Inversion
Vladislav Kovtun and Maria Bulakh
2014/560 ( PDF )
An Investigation of Some Forward Security Properties for PEKS and IBE
Qiang Tang
2014/559 ( PDF )
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
Pablo Rauzy and Sylvain Guilley
2014/558 ( PDF )
Double shielded Public Key Cryptosystems
Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang
2014/557 ( PDF )
Round-Efficient Black-Box Construction of Composable Multi-Party Computation
Susumu Kiyoshima
2014/556 ( PDF )
Securing Cloud Data in the New Attacker Model
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
2014/555 ( PDF )
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges
2014/554 ( PDF )
On Virtual Grey Box Obfuscation for General Circuits
Nir Bitansky and Ran Caentti and Yael Tauman-Kalai and Omer Paneth
2014/553 ( PDF )
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
Ran Canetti and Asaf Cohen and Yehuda Lindell
2014/552 ( PDF )
Efficient Record-Level Keyless Signatures for Audit Logs
Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards
2014/551 ( PDF )
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
Daniel Augot and Pierre-Alain Fouque and Pierre Karpman
2014/550 ( PDF )
Function-Private Functional Encryption in the Private-Key Setting
Zvika Brakerski and Gil Segev
2014/549 ( PDF )
New Attacks on the RSA Cryptosystem
Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig
2014/548 ( PDF )
Implicit factorization of unbalanced RSA moduli
Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin
2014/547 ( PDF )
Authentication Schemes Based on Resilient Maps
Juan Carlos Ku-Cauich and Guillermo Morales-Luna
2014/546 ( PDF )
Anonymous and Publicly Linkable Reputation Systems
Johannes Blömer and Jakob Juhnke and Christina Kolb
2014/545 ( PDF )
Solving closest vector instances using an approximate shortest independent vectors oracle
Chengliang Tian and Wei Wei and Dongdai Lin
2014/544 ( PDF )
Secure Mutual Testing Strategy for Cryptographic SoCs
Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede
2014/543 ( PDF )
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
2014/542 ( PDF )
On the Multi-output Filtering Model and Its Applications
Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu
2014/541 ( PDF )
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto Nagata and Takafumi Aoki
2014/540 ( PDF )
Optimized Architecture for AES
Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey
2014/539 ( PDF )
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption
Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang
2014/538 ( PDF )
A Secure Cloud-based NFC Mobile Payment Protocol
pardis pourghomi and muhammad qasim saeed and george ghinea
2014/537 ( PDF )
Constrained Verifiable Random Functions
Georg Fuchsbauer
2014/536 ( PDF )
On Decomposition of an NFSR into a Cascade Connection of Two Smaller
Tian Tian and Wen-Feng Qi
2014/535 ( PDF )
On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
Massimo Chenal and Qiang Tang
2014/534 ( PDF )
Differential Power Analysis of a McEliece Cryptosystem
Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
2014/533 ( PDF )
Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions
Jaiganesh Balasundaram
2014/532 ( PDF )
On the Pitfalls of using Arbiter-PUFs as Building Blocks
Georg T. Becker
2014/531 ( PDF )
Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
Paolo Palmieri and Luca Calderoni and Dario Maio
2014/530 ( PDF )
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap
2014/529 ( PDF )
Leakage-Resilient Signatures with Graceful Degradation
Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
2014/528 ( PDF )
Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups
Xiaofeng Wang and Chen Xu and Guo Li and Hanling Lin
2014/527 ( PDF )
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
Annelie Heuser and Olivier Rioul and Sylvain Guilley
2014/526 ( PDF )
Curve41417: Karatsuba revisited
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
2014/525 ( PDF )
Differential Analysis on Block Cipher PRIDE
Jingyuan Zhao and Xiaoyun Wang and Meiqin Wang and Xiaoyang Dong
2014/524 ( PDF )
Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Chunming Tang and Yanfeng Qi
2014/523 ( PDF )
Fully Secure and Fast Signing from Obfuscation
Kim Ramchen and Brent Waters
2014/522 ( PDF )
Constrained Pseudorandom Functions: Verifiable and Delegatable
Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
2014/521 ( PDF )
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
Susan Hohenberger and Venkata Koppula and Brent Waters
2014/520 ( PDF )
On powers of codes
Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Z\'emor
2014/519 ( PDF )
Realizing Pico: Finally No More Passwords!
Jens Hermans and Roel Peeters
2014/518 ( PDF )
Cryptography from Compression Functions: The UCE Bridge to the ROM
Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
2014/517 ( PDF )
On the Connection between Leakage Tolerance and Adaptive Security
Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
2014/516 ( PDF )
On the Classification of Finite Boolean Functions up to Fairness
Nikolaos Makriyannis
2014/515 ( PDF )
Ideal Social Secret Sharing Using Birkhoff Interpolation Method
Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian
2014/514 ( PDF )
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili
2014/513 ( PDF )
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
Noboru Kunihiro and Junya Honda
2014/512 ( PDF )
Rmind: a tool for cryptographically secure statistical analysis
Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk
2014/511 ( PDF )
Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
Johannes Blömer and Gennadij Liske
2014/510 ( PDF )
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
Pratish Datta and Dibyendu Roy and Sourav Mukhopadhyay
2014/509 ( PDF )
Privacy preserving delegated word search in the cloud
Kaoutar Elkhiyaoui and Melek Onen and Refik Molva
2014/508 ( PDF )
Reversing Stealthy Dopant-Level Circuits
Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino
2014/507 ( PDF )
How to Generate and use Universal Parameters
Dakshita Khurana and Amit Sahai and Brent Waters
2014/506 ( PDF )
Finding Roots in GF(p^n) with the Successive Resultant Algorithm
Christophe Petit
2014/505 ( PDF )
On the quaternion $\ell$-isogeny path problem
David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
2014/504 ( PDF )
A Provable Security Analysis of Intel's Secure Key RNG
Thomas Shrimpton and R. Seth Terashima
2014/503 ( PDF )
Efficient Hidden Vector Encryption with Constant-Size Ciphertext
Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo
2014/502 ( PDF )
What's the Gist? Privacy-Preserving Aggregation of User Profiles
Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun
2014/501 ( PDF )
Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob
Markku-Juhani O. Saarinen
2014/500 ( PDF )
Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
Can Xiang, Chunming Tang.
2014/499 ( PDF )
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş
2014/498 ( PDF )
Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix
Souvik Kolay and Debdeep Mukhopadhyay
2014/497 ( PDF )
NREPO:Normal Basis Recomputing with Permuted Operands
Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin and Ramesh Karri
2014/496 ( PDF )
Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo
2014/495 ( PDF )
Improved Short Lattice Signatures in the Standard Model
Léo Ducas and Daniele Micciancio
2014/494 ( PDF )
Hardness of k-LWE and Applications in Traitor Tracing
San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld
2014/493 ( PDF )
Arithmetic on Abelian and Kummer Varieties
David Lubicz and Damien Robert
2014/492 ( PDF )
Fault attacks on pairing-based protocols revisited
Sanjit Chatterjee and Koray Karabina and Alfred Menezes
2014/491 ( PDF )
Bootstrappable Identity-Based Fully Homomorphic Encryption
Michael Clear and Ciar\'{a}n McGoldrick
2014/490 ( PDF )
Universally Composable secure TNC protocol based on IF-T binding to TLS
Shijun Zhao and Qianying Zhang and Yu Qin and Dengguo Feng
2014/489 ( PDF )
A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge
Dan Ding and Guizhen Zhu and Xiaoyun Wang
2014/488 ( PDF )
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue and Kenneth G. Paterson
2014/487 ( PDF )
GGHLite: More Efficient Multilinear Maps from Ideal Lattices
Adeline Langlois and Damien Stehle and Ron Steinfeld
2014/486 ( PDF )
Binary Elligator Squared
Diego F. Aranha and Pierre-Alain Fouque and Chen Qian and Mehdi Tibouchi and Jean-Christophe Zapalowicz
2014/485 ( PDF )
An Improved Truncated Di fferential Cryptanalysis of KLEIN
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref
2014/484 ( PDF )
Sealing the Leak on Classical NTRU Signatures
Carlos Aguilar Melchor and Xavier Boyen and Jean-Christophe Deneuville and Philippe Gaborit
2014/483 ( PDF )
Disjunctions for Hash Proof Systems: New Constructions and Applications
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/482 ( PDF )
Privacy-preserving Data Aggregation with Optimal Utility
Fabienne Eigner and Aniket Kate and Matteo Maffei and Francesca Pampaloni and Ivan Pryvalov
2014/481 ( PDF )
Universally Composable Non-Interactive Key Exchange
Eduarda S.V. Freire and Julia Hesse and Dennis Hofheinz
2014/480 ( PDF )
Towards a Unified Theory of Cryptographic Agents
Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
2014/479 ( PDF )
Even more practical secure logging: Tree-based Seekable Sequential Key Generators
Giorgia Azzurra Marson and Bertram Poettering
2014/478 ( PDF )
Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
Benny Applebaum and Eyal Widder
2014/477 ( PDF )
Relaxed Two-to-one Recoding Schemes
Omkant Pandey and Kim Ramchen and Brent Waters
2014/476 ( PDF )
Simon's Circuit
Paul Baecher
2014/475 ( PDF )
A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
Imran Erguler
2014/474 ( PDF )
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Alex Biryukov and Charles Bouillaguet and Dmitry Khovratovich
2014/473 ( PDF )
An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
2014/472 ( PDF )
How to Watermark Cryptographic Functions
Ryo Nishimaki
2014/471 ( PDF )
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
2014/470 ( PDF )
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Au
2014/469 ( PDF )
Homomorphic Signatures with Efficient Verification for Polynomial Functions
Dario Catalano, Dario Fiore, and Bogdan Warinschi
2014/468 ( PDF )
Privacy-Preserving Auditing for Attribute-Based Credentials
Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
2014/467 ( PDF )
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Daniel Demmler and Thomas Schneider and Michael Zohner
2014/466 ( PDF )
On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.
Samir Bouftass and Abdelhak Azhari
2014/465 ( PDF )
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
Jie Chen and Hoeteck Wee
2014/464 ( PDF )
Providing Root of Trust for ARM TrustZone using SRAM PUFs
Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng
2014/463 ( PDF )
(Leveled) Fully Homomorphic Signatures from Lattices
Sergey Gorbunov and Vinod Vaikuntanathan
2014/462 ( PDF )
Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps
Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
2014/461 ( -- withdrawn -- )
Provably secure and efficient certificateless signature in the standard model
Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
2014/460 ( PDF )
FleXOR: Flexible garbling for XOR gates that beats free-XOR
Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek
2014/459 ( PDF )
Template Attacks on Different Devices
Omar Choudary and Markus G. Kuhn
2014/458 ( PDF )
Automated Analysis of Cryptographic Assumptions in Generic Group Models
Gilles Barthe and Edvard Fagerholm and Dario Fiore and John Mitchell and Andre Scedrov and Benedikt Schmidt
2014/457 ( PDF )
Transcript Secure Signatures Based on Modular Lattices
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte
2014/456 ( PDF )
Verified Implementations for Secure and Verifiable Computation
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Guillaume Davy and François Dupressoir and Benjamin Grégoire and Pierre-Yves Strub
2014/455 ( PDF )
Single-shot security for one-time memories in the isolated qubits model
Yi-Kai Liu
2014/454 ( PDF )
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
Amir Moradi and Vincent Immler
2014/453 ( PDF )
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version
Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yalçın
2014/452 ( PDF )
Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake
Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld
2014/451 ( PDF )
Leveled Fully Homomorphic Signatures from Standard Lattices
Daniel Wichs
2014/450 ( PDF )
Optimized Implementation of General Secret Sharing Scheme
Lein Harn and Ching-Fang Hsu*
2014/449 ( -- withdrawn -- )
Related Key Secure PKE from Hash Proof Systems
Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
2014/448 ( PDF )
Improved Differential Attacks on Reduced SIMON Versions
Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao
2014/447 ( PDF )
Faster Private Set Intersection based on OT Extension
Benny Pinkas and Thomas Schneider and Michael Zohner
2014/446 ( PDF )
4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes
Valerie Nachef and Jacques Patarin and Emmanuel Volte
2014/445 ( PDF )
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Ràfols and Andy Rupp
2014/444 ( PDF )
RPKI vs ROVER: Comparing the Risks of BGP Security Solutions
Aanchal Malhotra and Sharon Goldberg
2014/443 ( PDF )
Minimizing the Two-Round Even-Mansour Cipher
Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger
2014/442 ( PDF )
Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix
Xing Hu and Chunming Tang
2014/441 ( PDF )
Improved Generic Attacks Against Hash-based MACs and HAIFA
Itai Dinur and Gaëtan Leurent
2014/440 ( PDF )
Double Level Montgomery Cox-Rower Architecture, New Bounds
Jean-Claude Bajard and Nabil Merkiche
2014/439 ( PDF )
Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions
Chunming Tang, Yuenai Chen
2014/438 ( PDF )
Security of Symmetric Encryption against Mass Surveillance
Mihir Bellare and Kenneth Paterson and Phillip Rogaway
2014/437 ( PDF )
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
Jingguo Bi and Jean-S\'ebastien Coron and Jean-Charles Faug\`ere and Phong Q. Nguyen and Gu\'ena\"el Renault and Rina Zeitoun
2014/436 ( PDF )
Synthesis of Fault Attacks on Cryptographic Implementations
Gilles Barthe and Francois Dupressoir and Pierre-Alain Fouque and Benjamin Gregoire and Jean-Christophe Zapalowicz
2014/435 ( PDF )
Wait a minute! A fast, Cross-VM attack on AES
Gorka Irazoqui and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
2014/434 ( PDF )
Just a Little Bit More
Joop van de Pol and Nigel P. Smart and Yuval Yarom
2014/433 ( PDF )
A Statistical Model for Higher Order DPA on Masked Devices
A. Adam Ding and Liwei Zhang and Yunsi Fei and Pei Luo
2014/432 ( PDF )
Composable Authentication with Global PKI
Ran Canetti and Daniel Shahaf and Margarita Vald
2014/431 ( PDF )
Tiny ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification
Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten Van Dijk and Emil Stefanov and Srinivas Devadas
2014/430 ( PDF )
Revisiting the Gentry-Szydlo Algorithm
H. W. Lenstra and A. Silverberg
2014/429 ( PDF )
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven
2014/428 ( PDF )
Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
Nuttapong Attrapadung
2014/427 ( PDF )
Fast point multiplication algorithms for binary elliptic curves with and without precomputation
Thomaz Oliveira and Diego F. Aranha and Julio López and Francisco Rodríguez-Henríquez
2014/426 ( PDF )
Efficient Authentication and Pseudorandomness from Weaker (Ring-)LPN Assumptions
Ivan Damg{\aa}rd and Sunoo Park and Sarah Zakarias
2014/425 ( PDF )
Note of Multidimensional MITM Attack on 25-Round TWINE-128
Long Wen and Meiqin Wang and Andrey Bogdanov and Huaifeng Chen
2014/424 ( PDF )
Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants
Craig Costello and Alyson Deines-Schartz and Kristin Lauter and Tonghai Yang
2014/423 ( PDF )
The Hash Function "Fugue"
Shai Halevi and William E. Hall and Charanjit S. Jutla
2014/422 ( PDF )
System-level non-interference for constant-time cryptography
Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Carlos Luna and David Pichardie
2014/421 ( PDF )
FNR : Arbitrary length small domain block cipher proposal
Sashank Dara, Scott Fluhrer
2014/420 ( PDF )
Bounded Fully Homomorphic Signature Schemes
Xiang Xie and Rui Xue
2014/419 ( PDF )
FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve
J\'er\'emie Detrey
2014/418 ( PDF )
A Simple Recursive Tree Oblivious RAM
Benny Pinkas and Tzachy Reinman
2014/417 ( PDF )
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions
Inna Polak, Adi Shamir
2014/416 ( PDF )
Adaptive Security of Constrained PRFs
Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao
2014/415 ( PDF )
Virtual Proofs of Reality
Ulrich Rührmair
2014/414 ( PDF )
A Security Proof of KCDSA using an extended Random Oracle Model
Vikram Singh
2014/413 ( PDF )
On the Cost of Lazy Engineering for Masked Software Implementations
Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and François-Xavier Standaert
2014/412 ( PDF )
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Jean-Baptiste Mairy and Yves Deville
2014/411 ( PDF )
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)
Vincent Grosso and Romain Poussier and François-Xavier Standaert and Lubos Gaspar
2014/410 ( PDF )
Soft Analytical Side-Channel Attacks
Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
2014/409 ( PDF )
Moments-Correlating DPA
Amir Moradi and François-Xavier Standaert
2014/408 ( PDF )
Bootstrapping BGV Ciphertexts With A Wider Choice of p and q.
Emmanuela Orsini and Joop van de Pol and Nigel P. Smart
2014/407 ( PDF )
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
Fu-Kuo Tseng and Rong-Jaye Chen and Bao-Shuh Paul Lin
2014/406 ( PDF )
New Generic Attacks Against Hash-based MACs
Gaëtan Leurent and Thomas Peyrin and Lei Wang
2014/405 ( PDF )
Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input
Christina Brzuska and Arno Mittelbach
2014/404 ( PDF )
Large-Scale Secure Computation
Elette Boyle and Kai-Min Chung and Rafael Pass
2014/403 ( PDF )
Generic Universal Forgery Attack on Iterative Hash-based MACs
Thomas Peyrin and Lei Wang
2014/402 ( PDF )
On the Existence of Extractable One-Way Functions
Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
2014/401 ( PDF )
Software implementation of an Attribute-Based Encryption scheme
Eric Zavattoni and Luis J. Dominguez Perez and Shigeo Mitsunari and Ana H. Sánchez-Ramírez and Tadanori Teruya and Francisco Rodríguez-Henríquez
2014/400 ( PDF )
Composable Oblivious Extended Permutations
Peeter Laud and Jan Willemson
2014/399 ( PDF )
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Dustin Moody and Ray Perlner and Daniel Smith-Tone
2014/398 ( PDF )
Differential Properties of the HFE Cryptosystem
Taylor Daniels and Daniel Smith-Tone
2014/397 ( PDF )
Cofactorization on Graphics Processing Units
Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, and Arjen K. Lenstra
2014/396 ( PDF )
Almost Optimal Short Adaptive Non-Interactive Zero Knowledge
Helger Lipmaa
2014/395 ( PDF )
Lightweight and Privacy-Preserving Delegatable Proofs of Storage
Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong
2014/394 ( PDF )
Relational Hash
Avradip Mandal and Arnab Roy
2014/393 ( PDF )
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
2014/392 ( PDF )
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li
2014/391 ( PDF )
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
2014/390 ( PDF )
Black-Box Non-Black-Box Zero Knowledge
Vipul Goyal and Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti
2014/389 ( PDF )
Accelerating NTRU based Homomorphic Encryption using GPUs
Wei Dai and Yark{\i}n Dor\"{o}z and Berk Sunar
2014/388 ( PDF )
Finding collisions for MD4 hash algorithm using hybrid algorithm
Marko Carić
2014/387 ( PDF )
New candidates for multivariate trapdoor functions
Jaiberth Porras, John B. Baena, Jintai Ding
2014/386 ( PDF )
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede
2014/385 ( PDF )
Jacobian Coordinates on Genus 2 Curves
Huseyin Hisil and Craig Costello
2014/384 ( PDF )
Yao's millionaires' problem and decoy-based public key encryption by classical physics
Dima Grigoriev and Vladimir Shpilrain
2014/383 ( PDF )
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Younsung Choi, Dongho Won
2014/382 ( PDF )
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation
Felix Günther and Mark Manulis and Andreas Peter
2014/381 ( PDF )
Using Indistinguishability Obfuscation via UCEs
Christina Brzuska and Arno Mittelbach
2014/380 ( PDF )
Efficient Adaptively Secure IBBE from Standard Assumptions
Somindu C. Ramanna and Palash Sarkar
2014/379 ( PDF )
Hyper-and-elliptic-curve cryptography
Daniel J. Bernstein and Tanja Lange
2014/378 ( PDF )
Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps
SK Hafizul Islam
2014/377 ( PDF )
Logic Synthesis based Public Key Scheme
Boaz Shahar
2014/376 ( PDF )
How Secure is Deterministic Encryption?
Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi
2014/375 ( PDF )
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2014/374 ( PDF )
Optimal Contracts for Outsourced Computation
Viet Pham and MHR. Khouzani and Carlos Cid
2014/373 ( PDF )
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Philipp Jovanovic and Atul Luykx and Bart Mennink
2014/372 ( PDF )
Fully secure constrained pseudorandom functions using random oracles
Dennis Hofheinz
2014/371 ( PDF )
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
Christophe Doche
2014/370 ( PDF )
Compact VSS and Efficient Homomorphic UC Commitments
Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen
2014/369 ( PDF )
On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness
Michèle Feltz and Cas Cremers
2014/368 ( PDF )
Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster
Erich Wenger and Paul Wolfger
2014/367 ( PDF )
Redefining the Transparency Order
Kaushik Chakraborty and Subhamoy Maitra and Sumanta Sarkar and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay
2014/366 ( PDF )
Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
Younsung Choi and Dongho Won
2014/365 ( PDF )
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
Luke Mather and Elisabeth Oswald and Carolyn Whitnall
2014/364 ( PDF )
Deleting Secret Data with Public Verifiability
Feng Hao and Dylan Clarke and Avelino Francisco Zorzo
2014/363 ( PDF )
Forging Attacks on two Authenticated Encryptions COBRA and POET
Mridul Nandi
2014/362 ( PDF )
Nothing is for Free: Security in Searching Shared & Encrypted Data
Qiang Tang
2014/361 ( PDF )
New Results in the Linear Cryptanalysis of DES
Igor Semaev
2014/360 ( PDF )
McEliece in the world of Escher
Danilo Gligoroski and Simona Samardjiska and H{\aa}kon Jacobsen and Sergey Bezzateev
2014/359 ( PDF )
Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations
Eduardo Ruiz Duarte and Octavio P\'{a}ez Osuna
2014/358 ( PDF )
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Kim-Kwang Raymond Choo and Junghyun Nam and Dongho Won
2014/357 ( PDF )
Making and Breaking Leakage Simulators
Jake Longo Galea and Daniel Martin and Elisabeth Oswald and Daniel Page and Martijn Stam
2014/356 ( PDF )
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy
2014/355 ( PDF )
Graph-theoretic design and analysis of key predistribution schemes
Michelle Kendall and Keith M. Martin
2014/354 ( PDF )
Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
Ray Perlner
2014/353 ( PDF )
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups
Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
2014/352 ( PDF )
Multi-Vendor PayWord with Payment Approval
Andrea Huszti
2014/351 ( PDF )
Secret and Verifiable Delegated Voting for Wide Representation
Yefim Leifman
2014/350 ( PDF )
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
Franziskus Kiefer and Mark Manulis
2014/349 ( PDF )
Zerocash: Decentralized Anonymous Payments from Bitcoin
Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza
2014/348 ( PDF )
A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
Helger Lipmaa
2014/347 ( PDF )
One-Way Functions and (Im)perfect Obfuscation
Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev
2014/346 ( PDF )
Time-Memory Trade-offs for Index Calculus in Genus 3
Kim Laine and Kristin Lauter
2014/345 ( PDF )
Private Database Access With HE-over-ORAM Architecture
Craig Gentry and Shai Halevi and Charanjit Jutla and Mariana Raykova
2014/344 ( PDF )
Toward Robust Hidden Volumes using Write-Only Oblivious RAM
Erik-Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu
2014/343 ( PDF )
New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications
Yao Lu and Rui Zhang and Dongdai Lin
2014/342 ( PDF )
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
2014/341 ( PDF )
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2014/340 ( PDF )
A Strong and Efficient Certificateless Digital Signature Scheme
Mohammed Alfateh Hassouna and Mohsin Hashim
2014/339 ( PDF )
Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds
Yi Deng
2014/338 ( PDF )
A Tamper and Leakage Resilient Random Access Machine
Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
2014/337 ( PDF )
Related Randomness Attacks for Public Key Encryption
Kenneth G. Paterson and Jacob C.N. Schuldt and Dale L. Sibborn
2014/336 ( PDF )
Private Predictive Analysis on Encrypted Medical Data
Joppe W. Bos and Kristin Lauter and Michael Naehrig
2014/335 ( PDF )
John Almeida
2014/334 ( PDF )
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions
Rachid El Bansarkhani and Johannes Buchmann
2014/333 ( PDF )
An optimal representation for the trace zero subgroup
Elisa Gorla and Maike Massierer
2014/332 ( PDF )
How to Choose Interesting Points for Template Attacks?
Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng
2014/331 ( PDF )
Machine Learning Classification over Encrypted Data
Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser
2014/330 ( PDF )
PoS Cryptocurrency wtih No Blockchain
2014/329 ( PDF )
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
Berry Schoenmakers
2014/328 ( PDF )
Affine-evasive Sets Modulo a Prime
Divesh Aggarwal
2014/327 ( PDF )
An Optimal Strong Password Authentication Protocol with USB Sticks
Vikram D
2014/326 ( PDF )
FeW: A Lightweight Block Cipher
Manoj Kumar and Saibal K Pal and Anupama Panigrahi
2014/325 ( PDF )
A practical forgery and state recovery attack on the authenticated cipher PANDA-s
Xiutao FENG, Fan ZHANG and Hui WANG
2014/324 ( PDF )
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
Sandro Coretti and Ueli Maurer and Björn Tackmann and Daniele Venturi
2014/323 ( PDF )
Some Remarks on Honeyword Based Password-Cracking Detection
Imran Erguler
2014/322 ( PDF )
Coding Theoretic Construction of Quantum Ramp Secret Sharing
Ryutaroh Matsumoto
2014/321 ( PDF )
Efficient Quantum-Immune Keyless Signatures with Identity
Ahto Buldas and Risto Laanoja and Ahto Truu
2014/320 ( PDF )
Improved Differential Cryptanalysis of Round-Reduced Speck
Itai Dinur
2014/319 ( PDF )
Preimage attacks on Reduced-round Stribog
Riham AlTawy and Amr M. Youssef
2014/318 ( PDF )
Index calculus in the trace zero variety
Elisa Gorla and Maike Massierer
2014/317 ( PDF )
Analysis of NORX
Philipp Jovanovic and Samuel Neves and Jean-Philippe Aumasson
2014/316 ( PDF )
Explicit Non-Malleable Codes Resistant to Permutations
Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
2014/315 ( PDF )
Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R
Bartosz Zoltak
2014/314 ( PDF )
Improved Leakage Model Based on Genetic Algorithm
Zhenbin Zhang and Liji Wu and An Wang and Zhaoli Mu
2014/313 ( PDF )
On the Complexity of Finding Low-Level Solutions
Bjoern Grohmann
2014/312 ( PDF )
Structure-Preserving Signatures from Type II Pairings
Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
2014/311 ( PDF )
Exponent-inversion Signatures and IBE under Static Assumptions
Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu
2014/310 ( PDF )
Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited
Yu Chen and Qiong Huang and Zongyang Zhang
2014/309 ( PDF )
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters
2014/308 ( PDF )
The Locality of Searchable Symmetric Encryption
David Cash and Stefano Tessaro
2014/307 ( PDF )
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
Alessandro Barenghi and Gerardo Pelosi and Francesco Regazzoni
2014/306 ( PDF )
Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen and Zongyang Zhang
2014/305 ( PDF )
Collision Attack on 5 Rounds of Grøstl
Florian Mendel and Vincent Rijmen and Martin Schläffer
2014/304 ( PDF )
Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead
Dai Ikarashi and Ryo Kikuchi and Koki Hamada and Koji Chida
2014/303 ( -- withdrawn -- )
On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems
SK Hafizul Islam
2014/302 ( PDF )
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Maria Eichlseder and Florian Mendel and Martin Schläffer
2014/301 ( PDF )
How to Avoid Obfuscation Using Witness PRFs
Mark Zhandry
2014/300 ( PDF )
On the Powers of 2
Robert Granger and Thorsten Kleinjung and Jens Zumbr\"agel
2014/299 ( PDF )
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2014/298 ( PDF )
Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
Ignacio Cascudo and Ronald Cramer and Chaoping Xing
2014/297 ( PDF )
Pipelineable On-Line Encryption
Farzaneh Abed and Scott Fluhrer and Christian Forler and Eik List and Stefan Lucks and David McGrew and Jakob Wenzel
2014/296 ( PDF )
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding
Andris Ambainis and Ansis Rosmanis and Dominique Unruh
2014/295 ( PDF )
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
Nir Bitansky and Omer Paneth
2014/294 ( PDF )
The M3lcrypt Password Based Key Derivation Function
Isaiah Makwakwa
2014/293 ( -- withdrawn -- )
An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol
Xi-Jun Lin and Lin Sun
2014/292 ( PDF )
Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256
Leibo Li and Keting Jia
2014/291 ( PDF )
Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗
Antonio Sanso
2014/290 ( PDF )
Reliable Broadcast with Respect to Topology Knowledge
Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2014/289 ( PDF )
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
Ivan Damgaard and Rasmus Lauritsen, and Tomas Toft
2014/288 ( PDF )
Resilient Aggregation in Simple Linear Sensor Networks
Kevin J. Henry and Douglas R. Stinson
2014/287 ( PDF )
Active and Passive Side-Channel Attacks on Delay Based PUF Designs
Georg T, Becker and Raghavan Kumar
2014/286 ( PDF )
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
Martin Stanek
2014/285 ( PDF )
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
David Derler and Christian Hanser and Daniel Slamanig
2014/284 ( PDF )
Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way
Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam
2014/283 ( PDF )
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions
Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie
2014/282 ( PDF )
On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation
Ivan Damgård and Frédéric Dupuis and Jesper Buus Nielsen
2014/281 ( PDF )
WCFB: a tweakable wide block cipher
Andrey Jivsov
2014/280 ( PDF )
MSEA: Modified Symmetric Encryption Algorithm
Rajul Kumar and K. K. Mishra and Ashish Tripathi and Abhinav Tomar and Surendra Singh
2014/279 ( PDF )
Improved Impossible Differential Attacks against Round-Reduced LBlock
Christina Boura and Marine Minier and Mar\'ia Naya-Plasencia and Valentin Suder
2014/278 ( PDF )
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Essam Ghadafi
2014/277 ( PDF )
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
Lin Ding and Chenhui Jin and Jie Guan and Chuanda Qi
2014/276 ( PDF )
Design of identity-based digital signature schemes using extended chaotic maps
SK Hafizul Islam
2014/275 ( PDF )
Identity-based encryption and digital signature schemes using extended chaotic maps
SK Hafizul Islam
2014/274 ( PDF )
Weak instances of composite order protocols
Sorina Ionica and Malika Izabach{\`e}ne
2014/273 ( PDF )
Witness Encryption from Instance Independent Assumptions
Craig Gentry and Allison Bishop Lewko and Brent Waters
2014/272 ( PDF )
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
2014/271 ( PDF )
STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
Markku-Juhani O. Saarinen
2014/270 ( PDF )
Faster Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen
2014/269 ( PDF )
Chosen Ciphertext Security via Point Obfuscation
Takahiro Matsuda and Goichiro Hanaoka
2014/268 ( PDF )
A low complexity bit-parallel Montgomery multiplier based on squaring for trinomials
Yin Li and Yiyang Chen
2014/267 ( PDF )
Differential Fault Analysis on the families of SIMON and SPECK ciphers
Harshal Tupsamudre and Shikha Bisht and Debdeep Mukhopadhyay
2014/266 ( PDF )
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption
Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Srebrny and Marcin Wojcik
2014/265 ( PDF )
Dual System Groups and its Applications --- Compact HIBE and More
Jie Chen and Hoeteck Wee
2014/264 ( PDF )
Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
Janaka Alawatugoda and Colin Boyd and Douglas Stebila
2014/263 ( PDF )
A Generic Scan Attack on Hardware based eStream Winners
Sandip Karmakar and Dipanwita Roy Chowdhury
2014/262 ( PDF )
Differential Fault Analysis of MICKEY Family of Stream Ciphers
Sandip Karmakar and Dipanwita Roy Chowdhury
2014/261 ( PDF )
Fault Analysis of Grain Family of Stream Ciphers
Sandip Karmakar and Dipanwita Roy Chowdhury
2014/260 ( PDF )
Locally Decodable Codes for edit distance
Rafail Ostrovsky and Anat Paskin-Cherniavsky
2014/259 ( PDF )
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
2014/258 ( PDF )
A realtime key recovery attack on the authenticated cipher FASER128
Xiutao FENG and Fan ZHANG
2014/257 ( PDF )
Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
Bruce Kallick
2014/256 ( PDF )
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
Iraklis Leontiadis and Kaoutar Elkhiyaoui and Refik Molva
2014/255 ( PDF )
Certification and Efficient Proofs of Committed Topology Graphs
Thomas Gross
2014/254 ( PDF )
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Thomas P\"oppelmann and L{\'e}o Ducas and Tim G\"uneysu
2014/253 ( -- withdrawn -- )
Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems
Fangquan Cheng and Qian Wang and Kui Ren and Zhiyong Peng
2014/252 ( PDF )
Making RSA-PSS Provably Secure Against Non-Random Faults
Gilles Barthe and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Mehdi Tibouchi and Jean-Christophe Zapalowicz
2014/251 ( PDF )
Forgery on Stateless CMCC
Guy Barwell
2014/250 ( PDF )
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Boaz Tsaban and Noam Lifshitz
2014/249 ( PDF )
Linear Extension Cube Attack on Stream Ciphers
Liren Ding, Yongjuan Wang, Zhufeng Li
2014/248 ( PDF )
Fine grain Cross-VM Attacks on Xen and VMware are possible!
Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
2014/247 ( PDF )
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
Ivan Pryvalov and Aniket Kate
2014/246 ( PDF )
Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
Kwangsu Lee and Dong Hoon Lee
2014/245 ( PDF )
A practical state recovery attack on the stream cipher Sablier v1
Xiutao FENG and Fan ZHANG
2014/244 ( PDF )
bitcoin.BitMint: Reconciling Bitcoin with Central Banks
Gideon Samid
2014/243 ( PDF )
Key Derivation From Noisy Sources With More Errors Than Entropy
Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin
2014/242 ( PDF )
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
Franziskus Kiefer and Mark Manulis
2014/241 ( PDF )
A New Way to Prevent UKS Attacks Using Trusted Computing
Qianying Zhang and Shijun Zhao and Dengguo Feng
2014/240 ( PDF )
Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
Martin Pettai and Peeter Laud
2014/239 ( PDF )
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
Florian Legendre and Gilles Dequen and Michaël Krajecki
2014/238 ( PDF )
High Parallel Complexity Graphs and Memory-Hard Functions
Joel Alwen and Vladimir Serbinenko
2014/237 ( PDF )
SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
Aydin Aysu and Ege Gulcan and Patrick Schaumont
2014/236 ( PDF )
Linear Sequential Circuit Approximation of Acterbahn Stream Cipher
Shazia Afreen
2014/235 ( PDF )
Efficient Fuzzy Search on Encrypted Data
Alexandra Boldyreva and Nathan Chenette
2014/234 ( PDF )
Enhancing Oblivious RAM Performance Using Dynamic Prefetching
Xiangyao Yu and Ling Ren and Christopher Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas
2014/233 ( PDF )
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
Yark{\i}n Dor\"{o}z, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar
2014/232 ( PDF )
Bandwidth Efficient PIR from NTRU
Yark{\i}n Dor\"{o}z, Berk Sunar and Ghaith Hammouri
2014/231 ( PDF )
Self-Updatable Encryption with Short Public Parameters and Its Extensions
Kwangsu Lee
2014/230 ( PDF )
Isogeny graphs with maximal real multiplication
Sorina Ionica and Emmanuel Thomé
2014/229 ( -- withdrawn -- )
Investigating the Feasibility of LEAP+ in ZigBee Specification
Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi
2014/228 ( PDF )
Improved Analysis of Zorro-Like Ciphers
Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Boaz Tsaban
2014/227 ( -- withdrawn -- )
CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks
Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi
2014/226 ( PDF )
Weak-Key Analysis of POET
Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser
2014/225 ( PDF )
Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption
Tapas Pandit and Rana Barua
2014/224 ( PDF )
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
Henry Carter and Charles Lever and Patrick Traynor
2014/223 ( PDF )
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
Léo Perrin and Dmitry Khovratovich
2014/222 ( PDF )
Optimizing Obfuscation: Avoiding Barrington's Theorem
Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai
2014/221 ( PDF )
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
Toomas Krips and Jan Willemson
2014/220 ( PDF )
Total Break of Zorro using Linear and Differential Attacks
Shahram Rasoolzadeh and Zahra Ahmadian and Mahmood Salmasizadeh and Mohammad Reza Aref
2014/219 ( PDF )
Dynamic Searchable Encryption via Blind Storage
Muhammad Naveed and Manoj Prabhakaran and Carl A. Gunter
2014/218 ( PDF )
A Practical Universal Forgery Attack against PAES-8
Yu Sasaki and Lei Wang
2014/217 ( PDF )
A Forgery Attack against PANDA-s
Yu Sasaki and Lei Wang
2014/216 ( PDF )
Implementation and improvement of the Partial Sum Attack on 6-round AES
Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala
2014/215 ( PDF )
Attack On the Markov Problem
James L. Adams
2014/214 ( PDF )
Squaring Algorithms with Delayed Carry Method and Efficient Parallelization
Vladislav Kovtun and Andrew Okhrimenko
2014/213 ( PDF )
Secret-Sharing for NP
Ilan Komargodski and Moni Naor and Eylon Yogev
2014/212 ( PDF )
Remarks on the Pocklington and Padr\'o-S\'aez Cube Root Algorithm in $\mathbb F_q$
Geon Heo and Seokhwan Choi and Kwang Ho Lee and Namhun Koo and Soonhak Kwon
2014/211 ( PDF )
Some Randomness Experiments on TRIVIUM
Subhabrata Samajder and Palash Sarkar
2014/210 ( PDF )
Structural Cryptanalysis of McEliece Schemes with Compact Keys
Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
2014/209 ( PDF )
A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation
Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung
2014/208 ( PDF )
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
Ding Wang and Ping Wang
2014/207 ( PDF )
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
Katsuyuki Takashima
2014/206 ( PDF )
Reconsidering Generic Composition
Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton
2014/205 ( PDF )
Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness
Ling Ren and Christopher Fletcher and Xiangyao Yu and Albert Kwon and Marten van Dijk and Srinivas Devadas
2014/204 ( PDF )
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
Colin O'Flynn and Zhizhang (David) Chen
2014/203 ( PDF )
Privacy-Preserving Implicit Authentication
Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti
2014/202 ( PDF )
Efficiently Verifiable Computation on Encrypted Data
Dario Fiore and Rosario Gennaro and Valerio Pastro
2014/201 ( PDF )
From Input Private to Universally Composable Secure Multiparty Computation Primitives
Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen
2014/200 ( PDF )
Automatic Protocol Selection in Secure Two-Party Computations
Florian Kerschbaum and Thomas Schneider and Axel Schröpfer
2014/199 ( PDF )
Doubly Spatial Encryption from DBDH
Jie Chen and Hoeteck Wee
2014/198 ( PDF )
Fast GPGPU-Based Elliptic Curve Scalar Multiplication
Eric M. Mahé and Jean-Marie Chauvet
2014/197 ( PDF )
Breaking POET Authentication with a Single Query
Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei
2014/196 ( -- withdrawn -- )
Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif Ismaili
2014/195 ( PDF )
Low Overhead Broadcast Encryption from Multilinear Maps
Dan Boneh and Brent Waters and Mark Zhandry
2014/194 ( PDF )
Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
Sai Raghu Talluri and Swapnoneel Roy
2014/193 ( PDF )
JHAE: An Authenticated Encryption Mode Based on JH
Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri
2014/192 ( PDF )
Two-sources Randomness Extractors for Elliptic Curves
Abdoul Aziz Ciss
2014/191 ( PDF )
Side-Channel Analysis on Blinded Regular Scalar Multiplications
Benoit Feix and Mylène Roussellet and Alexandre Venelli
2014/190 ( PDF )
The Temperature Side Channel and Heating Fault Attacks
Michael Hutter and Jörn-Marc Schmidt
2014/189 ( PDF )
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
2014/188 ( PDF )
A Second Look at Fischlin's Transformation
Özgür Dagdelen and Daniele Venturi
2014/187 ( PDF )
FFT-Based Key Recovery for the Integral Attack
Yosuke Todo
2014/186 ( PDF )
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser
2014/185 ( PDF )
Oblivious Data Structures
Xiao Wang and Kartik Nayak and Chang Liu and Elaine Shi and Emil Stefanov and Yan Huang
2014/184 ( PDF )
SETUP in Secret Sharing Schemes using Random Values
Ruxandra F. Olimid
2014/183 ( PDF )
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
Tetsu Iwata and Lei Wang
2014/182 ( PDF )
Proving the TLS Handshake Secure (as it is)
Karthikeyan Bhargavan and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Santiago Zanella-Béguelin
2014/181 ( PDF )
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro
2014/180 ( PDF )
Improving throughput of RC4 algorithm using multithreading techniques in multicore processors
T.D.B Weerasinghe
2014/179 ( PDF )
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Maura B. Paterson and Douglas R. Stinson
2014/178 ( PDF )
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
Qingji Zheng and Shouhuai Xu
2014/177 ( PDF )
Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES
Valentina Banciu and Elisabeth Oswald
2014/176 ( -- withdrawn -- )
One-Round Witness Indistinguishability from Indistinguishability Obfuscation
Qihua Niu, Hongda Li, Bei Liang, Fei Tang
2014/175 ( PDF )
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
T.D.B Weerasinghe
2014/174 ( PDF )
Analysis of a Modified RC4 Algorithm
T.D.B Weerasinghe
2014/173 ( PDF )
Continuous Non-malleable Codes
Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
2014/172 ( -- withdrawn -- )
A novel PUF Scheme
Jeroen Delvaux
2014/171 ( PDF )
An Effective RC4 Stream Cipher
T.D.B Weerasinghe
2014/170 ( PDF )
Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
Shay Gueron
2014/169 ( PDF )
Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms
Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
2014/168 ( PDF )
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
Scott Coull and Kevin Dyer
2014/167 ( PDF )
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
2014/166 ( PDF )
Tuple decoders for traitor tracing schemes
Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
2014/165 ( -- withdrawn -- )
Kirti Chawla and Om Pal Yadav
2014/164 ( PDF )
Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters
Yuriy Tarannikov
2014/163 ( PDF )
Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices
Arnaud Dambra and Philippe Gaborit and Mylène Roussellet and Julien Schrek and Nicolas Tafforeau
2014/162 ( PDF )
Hu Xiong
2014/161 ( PDF )
``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way
Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom
2014/160 ( PDF )
TRUESET: Nearly Practical Verifiable Set Computations
Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikos Triandopoulos
2014/159 ( PDF )
Weak-Key Leakage Resilient Cryptography
Zuoxia Yu and Qiuliang Xu and Yongbin Zhou and Chengyu Hu and Rupeng Yang and Guangjun Fan
2014/158 ( PDF )
Point compression for the trace zero subgroup over a small degree extension field
Elisa Gorla and Maike Massierer
2014/157 ( PDF )
CLOC: Authenticated Encryption for Short Input
Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka
2014/156 ( PDF )
Non-Malleable Extractors with Shorter Seeds and Privacy Amplification
Yanqing Yao, Zhoujun Li
2014/155 ( PDF )
Honey Encryption: Security Beyond the Brute-Force Bound
Ari Juels and Thomas Ristenpart
2014/154 ( -- withdrawn -- )
Non-Interactive Cryptography in the RAM Model of Computation
Daniel Apon and Xiong Fan and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2014/153 ( PDF )
Verifiable Oblivious Storage
Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam
2014/152 ( PDF )
A Statistics-based Fundamental Model for Side-channel Attack Analysis
Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang
2014/151 ( PDF )
Security Analysis of Key-Alternating Feistel Ciphers
Rodolphe Lampe and Yannick Seurin
2014/150 ( PDF )
On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
Nikolaos Karapanos and Srdjan Capkun
2014/149 ( PDF )
Millions of Millionaires: Multiparty Computation in Large Networks
Mahdi Zamani and Mahnush Movahedi and Jared Saia
2014/148 ( PDF )
Outsourcing Private RAM Computation
Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
2014/147 ( PDF )
The Multiple Number Field Sieve for Medium and High Characteristic Finite Fields
Razvan Barbulescu and Cécile Pierrot
2014/146 ( PDF )
Untappable communication channels over optical fibers from quantum-optical noise
Geraldo A. Barbosa and Jeroen van de Graaf
2014/145 ( -- withdrawn -- )
Calculating Cryptographic Degree of an S-Box
Prasanna Raghaw Mishra
2014/144 ( PDF )
How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda
2014/143 ( PDF )
Statistical Concurrent Non-Malleable Zero Knowledge
Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti
2014/142 ( -- withdrawn -- )
FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm
Karim M. Abdellatif, R. Chotin-Avot, and H. Mehrez
2014/141 ( PDF )
Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps
Hao Wang
2014/140 ( PDF )
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
Yuval Yarom and Naomi Benger
2014/139 ( PDF )
On the Phase Space of Block-Hiding Strategies
Assaf Shomer
2014/138 ( PDF )
Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction
Jae Hong Seo
2014/137 ( PDF )
Efficient, Oblivious Data Structures for MPC
Marcel Keller and Peter Scholl
2014/136 ( PDF )
Isolated Execution on Many-core Architectures
Ramya Jayaram Masti and Devendra Rai and Claudio Marforio and Srdjan Capkun
2014/135 ( PDF )
Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment
Ding Wang, Ping Wang, and Debiao He
2014/134 ( PDF )
Kummer strikes back: new DH speed records
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe
2014/133 ( PDF )
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
Yihua Zhang and Marina Blanton
2014/132 ( PDF )
Efficient Revocable Identity-Based Encryption via Subset Difference Methods
Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park
2014/131 ( PDF )
Modelling After-the-fact Leakage for Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2014/130 ( PDF )
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig
2014/129 ( PDF )
How to Use Bitcoin to Design Fair Protocols
Iddo Bentov and Ranjit Kumaresan
2014/128 ( PDF )
Efficient Three-Party Computation from Cut-and-Choose
Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas
2014/127 ( PDF )
Algebraic Properties of Modular Addition Modulo a Power of Two
S. M. Dehnavi and Alireza Rahimipour
2014/126 ( -- withdrawn -- )
Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
Hui Cui \and Yi Mu \and Man Ho Au
2014/125 ( PDF )
Removing Erasures with Explainable Hash Proof Systems
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/124 ( PDF )
Optimal Non-Perfect Uniform Secret Sharing Schemes
Oriol Farràs and Torben Hansen and Tarik Kaced and Carles Padró
2014/123 ( PDF )
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes
Mohammad Sadeq Dousti and Rasool Jalili
2014/122 ( PDF )
New Way to Construct Cryptographic Hash Function
2014/121 ( PDF )
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation
Koki Hamada and Dai Ikarashi and Koji Chida and Katsumi Takahashi
2014/120 ( PDF )
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)
Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
2014/119 ( PDF )
Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$)
Robert Granger and Thorsten Kleinjung and Jens Zumbr\"agel
2014/118 ( PDF )
Quantum position verification in the random oracle model
Dominique Unruh
2014/117 ( PDF )
An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems
Bjoern Grohmann
2014/116 ( PDF )
Optimal Algebraic Manipulation Detection Codes
Ronald Cramer and Carles Padr{\'o} and Chaoping Xing
2014/115 ( PDF )
Comments on a novel user authentication and key agreement scheme
Jia-Lun Tsai
2014/114 ( PDF )
Prover Anonymous and Deniable Distance-Bounding Authentication
Sebastien Gambs and Cristina Onete and Jean-Marc Robert
2014/113 ( PDF )
Secure Compression: Theory \& Practice
James Kelley and Roberto Tamassia
2014/112 ( PDF )
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich
2014/111 ( PDF )
A Note on the CLRW2 Tweakable Block Cipher Construction
Gordon Procter
2014/110 ( PDF )
Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box
Sourav Das
2014/109 ( PDF )
Diffusion Programmable Device : The device to prevent reverse engineering
Mitsuru Shiozaki, Ryohei Hori and Takeshi Fujino
2014/108 ( PDF )
MJH: A Faster Alternative to MDC-2
Jooyoung Lee and Martijn Stam
2014/107 ( PDF )
Key-Indistinguishable Message Authentication Codes
Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
2014/106 ( PDF )
Algorithms in HElib
Shai Halevi and Victor Shoup
2014/105 ( PDF )
Reducing the Overhead of MPC over a Large Population
Ashish Choudhury and Arpita Patra and Nigel P. Smart
2014/104 ( PDF )
Space-efficient, byte-wise incremental and perfectly private encryption schemes
Kévin Atighehchi
2014/103 ( PDF )
SHipher: Families of Block Ciphers based on SubSet-Sum Problem
Xiali Hei and Binheng Song
2014/102 ( PDF )
Actively Secure Private Function Evaluation
Payman Mohassel and Saeed Sadeghian and Nigel P. Smart
2014/101 ( PDF )
Dishonest Majority Multi-Party Computation for Binary Circuits
Enrique Larraia and Emmanuela Orsini and Nigel P. Smart
2014/100 ( PDF )
Improved Slender-set Linear Cryptanalysis
Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi
2014/099 ( PDF )
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Christina Brzuska and Pooya Farshim and Arno Mittelbach
2014/098 ( PDF )
Towards Characterizing Complete Fairness in Secure Two-Party Computation
Gilad Asharov
2014/097 ( PDF )
A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups
Koji Nuida
2014/096 ( PDF )
Tight security bounds for multiple encryption
Yuanxi Dai, John Steinberger
2014/095 ( PDF )
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
2014/094 ( PDF )
Faster Bootstrapping with Polynomial Error
Jacob Alperin-Sheriff and Chris Peikert
2014/093 ( PDF )
The Related-Key Analysis of Feistel Constructions
Manuel Barbosa and Pooya Farshim
2014/092 ( PDF )
A new class of system oriented PKC, K(I)SOPKC.
2014/091 ( PDF )
On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2014/090 ( PDF )
Cryptanalysis of KLEIN (Full version)
Virginie Lallemand and María Naya-Plasencia
2014/089 ( PDF )
Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version)
Anne Canteaut and Thomas Fuhr and Henri Gilbert and Maria Naya-Plasencia and Jean-René Reinhard
2014/088 ( PDF )
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
Himanshu Tyagi and Shun Watanabe
2014/087 ( PDF )
AnoA: A Framework For Analyzing Anonymous Communication Protocols
Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi
2014/086 ( PDF )
Randomized and Efficient Authentication in Mobile Environments
Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
2014/085 ( PDF )
Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer
Aleksandra Mileva
2014/084 ( PDF )
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms
Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
2014/083 ( PDF )
Garbled RAM Revisited, Part II
Steve Lu and Rafail Ostrovsky
2014/082 ( PDF )
Garbled RAM Revisited, Part I
Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
2014/081 ( PDF )
Efficient Round Optimal Blind Signatures
Sanjam Garg and Divya Gupta
2014/080 ( PDF )
A Full Characterization of Completeness for Two-party Randomized Function Evaluation
Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai
2014/079 ( PDF )
Unifying Leakage Models: from Probing Attacks to Noisy Leakage
Alexandre Duc and Stefan Dziembowski and Sebastian Faust
2014/078 ( PDF )
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Ahmad Boorghany and Rasool Jalili
2014/077 ( PDF )
Mixcoin: Anonymity for Bitcoin with accountable mixes
Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten
2014/076 ( PDF )
Certified Bitcoins
Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros
2014/075 ( PDF )
Publicly Auditable Secure Multi-Party Computation
Carsten Baum and Ivan Damgård and Claudio Orlandi
2014/074 ( PDF )
New and Improved Key-Homomorphic Pseudorandom Functions
Abhishek Banerjee and Chris Peikert
2014/073 ( PDF )
Anonymous Authentication with Shared Secrets
Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
2014/072 ( PDF )
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser and Sebastian Biedermann
2014/071 ( PDF )
Implementing Pairing-Based Cryptosystems in USB Tokens
Zhaohui Cheng
2014/070 ( PDF )
Lattice Cryptography for the Internet
Chris Peikert
2014/069 ( PDF )
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Manoj Ranjan Mishra, Jayaprakash Kar and Banshidhar Majhi
2014/068 ( PDF )
Some security bounds for the DGHV scheme
Franca Marinelli and Riccardo Aragona and Chiara Marcolla and Massimiliano Sala
2014/067 ( PDF )
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey
2014/066 ( PDF )
A Subexponential Construction of Graph Coloring for Multiparty Computation
Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, and Ron Steinfeld
2014/065 ( PDF )
Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case
Palash Sarkar and Shashank Singh
2014/064 ( PDF )
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems
Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan
2014/063 ( PDF )
Cryptanalysis on “Secure untraceable off-line electronic cash system”
Yalin Chen and Jue-Sam Chou*
2014/062 ( PDF )
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
Tancrède Lepoint and Michael Naehrig
2014/061 ( PDF )
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Stefano Tessaro and David A. Wilson
2014/060 ( PDF )
Verifiable Computation in Multiparty Protocols with Honest Majority
Peeter Laud and Alisa Pankova
2014/059 ( PDF )
Cuckoo Cycle: a graph-theoretic proof-of-work system
John Tromp
2014/058 ( PDF )
Cryptanalysis of FIDES
Itai Dinur and Jérémy Jean
2014/057 ( PDF )
Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma
Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
2014/056 ( PDF )
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang
2014/055 ( PDF )
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Younsung Choi
2014/054 ( PDF )
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
Sugata Gangopadhyay and Pantelimon Stanica
2014/053 ( PDF )
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
Sonia Belaïd, and Vincent Grosso and François-Xavier Standaert
2014/052 ( PDF )
DAA-related APIs in TPM2.0 Revisited
Li Xi
2014/051 ( PDF )
An Equivalence-Preserving Transformation of Shift Registers
Elena Dubrova
2014/050 ( PDF )
Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication
Daniel R. L. Brown
2014/049 ( PDF )
Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography
Neha tirthani and Ganesan
2014/048 ( PDF )
When a Boolean Function can be Expressed as the Sum of two Bent Functions
Longjiang Qu and Shaojing Fu and Qingping Dai and Chao Li
2014/047 ( PDF )
Down the Rabbit Hole: Revisiting the Shrinking Method
Vivien Dubois
2014/046 ( PDF )
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
Yalin Chen1 and Jue-Sam Chou*2
2014/045 ( PDF )
Human Assisted Randomness Generation Using Video Games
Mohsen Alimomeni and Reihaneh Safavi-Naini
2014/044 ( PDF )
rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval
Lichun Li and Michael Militzer and Anwitaman Datta
2014/043 ( PDF )
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
Mehdi Tibouchi
2014/042 ( PDF )
A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem
Jintai Ding, Chengdong Tao
2014/041 ( PDF )
Practical polynomial time solutions of several major problems in noncommutative-algebraic cryptography
Boaz Tsaban
2014/040 ( PDF )
A Fast Modular Reduction Method
Zhengjun Cao and Ruizhong Wei and Xiaodong Lin
2014/039 ( PDF )
Homomorphic AES Evaluation using NTRU
Yarkin Doroz and Yin Hu and Berk Sunar
2014/038 ( PDF )
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
Ralf Kuesters and Enrico Scapin and Tomasz Truderung and Juergen Graf
2014/037 ( PDF )
On the Security of the Pre-Shared Key Ciphersuites of TLS
Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk
2014/036 ( PDF )
A Secure Text Messaging Protocol
Gary Belvin
2014/035 ( PDF )
A new attack on RSA with a composed decryption exponent
Abderrahmane Nitaj and Mohamed Ould Douh
2014/034 ( PDF )
Authenticated Encryption with SPECK
Chase Manny
2014/033 ( PDF )
Lattice-based Group Signature Scheme with Verifier-local Revocation
Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang
2014/032 ( PDF )
Scale-Invariant Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi
2014/031 ( PDF )
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results
Yongge Wang
2014/030 ( PDF )
Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simplicio Jr.
2014/029 ( PDF )
General Impossibility of Group Homomorphic Encryption in the Quantum World
Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter
2014/028 ( PDF )
Channel Equalization for Side Channel Attacks
Colin O'Flynn and Zhizhang (David) Chen
2014/027 ( PDF )
Twisting Edwards curves with isogenies
Mike Hamburg
2014/026 ( PDF )
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger and Mélanie Favre and Tarik Graba
2014/025 ( PDF )
Side-Channel Leakage through Static Power – Should We Care about in Practice? –
Amir Moradi
2014/024 ( PDF )
An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
Ivan Damgård and Jesper Buus Nielsen
2014/023 ( PDF )
Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle
Gengran Hu and Yanbin Pan and Feng Zhang
2014/022 ( PDF )
Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR
Sourav Das
2014/021 ( PDF )
Online/Offline Attribute-Based Encryption
Susan Hohenberger and Brent Waters
2014/020 ( PDF )
(De-)Constructing TLS
Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi
2014/019 ( PDF )
Lazy Modulus Switching for the BKW Algorithm on LWE
Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
2014/018 ( PDF )
Completeness for Symmetric Two-Party Functionalities - Revisited
Yehuda Lindell and Eran Omri and Hila Zarosim
2014/017 ( PDF )
Two-round password-only authenticated key exchange in the three-party setting
Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
2014/016 ( PDF )
Triple and Quadruple Encryption: Bridging the Gaps
Bart Mennink and Bart Preneel
2014/015 ( PDF )
Tight Security Bounds for Triple Encryption
Jooyoung Lee
2014/014 ( PDF )
Linkable Message Tagging: Solving the key distribution problem of signature schemes
Felix Günther and Bertram Poettering
2014/013 ( -- withdrawn -- )
A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs
Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol
2014/012 ( PDF )
Maximal Information Coefficient Analysis
Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
2014/011 ( PDF )
Construction of New Families of ‎MDS‎ Diffusion Layers
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
2014/010 ( PDF )
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
2014/009 ( PDF )
Characterization of EME with Linear Mixing
Nilanjan Datta and Mridul Nandi
2014/008 ( PDF )
A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
Annelie Heuser and Olivier Rioul and Sylvain Guilley
2014/007 ( PDF )
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.
Ethan Heilman
2014/006 ( PDF )
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
2014/005 ( -- withdrawn -- )
The analysis of the Keccak with the new method called parity
Ghanei yakhdan.mostafa
2014/004 ( PDF )
MaxMinMax problem and sparse equations over finite fields
Igor Semaev
2014/003 ( PDF )
$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials
Xi Xiong and Haining Fan
2014/002 ( PDF )
Pseudorandom Generator Based on Hard Lattice Problem
Kuan Cheng
2014/001 ( PDF )
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
Yalin Chen and Jue-Sam Chou

[ Cryptology ePrint archive ]