Cryptology ePrint Archive: Recent Updates
-
2015/1018 ( PDF )
- A Riddle Wrapped in an Enigma
- N. Koblitz and A. Menezes
-
2015/1017 ( PDF )
- Functional Encryption: Decentralised and Delegatable
- Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
-
2015/1016 ( PDF )
- Lifting the Security of NI-MAC Beyond Birthday Bound
- Avijit Dutta and Goutam Paul
-
2015/1015 ( PDF )
- On Bitcoin as a public randomness source
- Joseph Bonneau and Jeremy Clark and Steven Goldfeder
-
2015/1014 ( PDF )
- Fast Fourier Orthogonalization
- Léo Ducas and Thomas Prest
-
2015/1013 ( PDF )
- Inception Makes Non-malleable Codes Stronger
- Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
-
2015/1012 ( PDF )
- An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
- Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
-
2015/1011 ( PDF )
- Hierarchical Functional Encryption
- Zvika Brakerski and Gil Segev
-
2015/1010 ( PDF )
- TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
- Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
-
2015/1009 ( PDF )
- Applications of Key Recovery Cube-attack-like
- Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
-
2015/1008 ( PDF )
- Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
- Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
-
2015/1007 ( PDF )
- How to Vote Privately Using Bitcoin
- Zhichao Zhao and T-H. Hubert Chan
-
2015/1006 ( PDF )
- Confidential Benchmarking based on Multiparty Computation
- Ivan Damgĺrd and Kasper Damgĺrd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
-
2015/1005 ( PDF )
- Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
- Wenbin Zhang and Chik How Tan
-
2015/1004 ( PDF )
- Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
- Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
-
2015/1003 ( PDF )
- Results on polynomial interpolation with mixed modular operations and unknown moduli
- Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
-
2015/1002 ( PDF )
- got HW crypto? On the (in)security of a Self-Encrypting Drive series
- Gunnar Alendal and Christian Kison and modg
-
2015/1001 ( PDF )
- Dismantling real-world ECC with Horizontal and Vertical Template Attacks
- Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
-
2015/1000 ( PDF )
- Factoring as a Service
- Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
-
2015/999 ( PDF )
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves
-
2015/998 ( PDF )
- All or Nothing at All
- Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
-
2015/997 ( PDF )
- Incremental Program Obfuscation
- Sanjam Garg and Omkant Pandey
-
2015/996 ( PDF )
- Multi-user Schnorr security, revisited
- Daniel J. Bernstein
-
2015/995 ( PDF )
- Updates on Sorting of Fully Homomorphic Encrypted Data
- Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed
-
2015/994 ( -- withdrawn -- )
- An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
- Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
-
2015/993 ( PDF )
- Bi-Deniable Inner Product Encryption from LWE
- Daniel Apon and Xiong Fan and Feng-Hao Liu
-
2015/992 ( PDF )
- Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
- Jinsu Kim and Sungwook Kim and Jae Hong Seo
-
2015/991 ( PDF )
- Ed3363 (HighFive) -- An alternative Elliptic Curve
- Mike Scott
-
2015/990 ( PDF )
- Encryption Switching Protocols
- Geoffroy Couteau, Thomas Peters, David Pointcheval
-
2015/989 ( PDF )
- Fast Oblivious AES\\A dedicated application of the MiniMac protocol
- Ivan Damgĺrd and Rasmus Winther Zakarias
-
2015/988 ( PDF )
- Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
- Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram
-
2015/987 ( PDF )
- Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
- Yehuda Lindell and Ben Riva
-
2015/986 ( PDF )
- Bit Coincidence Mining Algorithm
- Koh-ichi Nagao
-
2015/985 ( PDF )
- Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
- Koh-ichi Nagao
-
2015/984 ( PDF )
- Complexity of ECDLP under the First Fall Degree Assumption
- Koh-ichi Nagao
-
2015/983 ( PDF )
- Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
- Ping Ngai Chung and Craig Costello and Benjamin Smith
-
2015/982 ( PDF )
- A note on constructions of bent functions from involutions
- Sihem Mesnager
-
2015/981 ( PDF )
- Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
- Ayantika Chatterjee and Indranil Sengupta
-
2015/980 ( PDF )
- Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
- Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
-
2015/979 ( PDF )
- Guidelines for Using the CryptDB System Securely
- Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
-
2015/978 ( PDF )
- The OPTLS Protocol and TLS 1.3
- Hugo Krawczyk and Hoeteck Wee
-
2015/977 ( PDF )
- Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(pł)
- Michał Wroński
-
2015/976 ( PDF )
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Alex Biryukov and Léo Perrin
-
2015/975 ( PDF )
- Extended Functionality in Verifiable Searchable Encryption
- James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick
-
2015/974 ( PDF )
- The Conjoined Microprocessor
- Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and Rémi Géraud David Naccache and Jean Vuillemin
-
2015/973 ( PDF )
- Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
- Ashwin Jha and Mridul Nandi
-
2015/972 ( PDF )
- Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
- David Pointcheval and Olivier Sanders and Jacques Traoré
-
2015/971 ( PDF )
- Attacks on Search RLWE
- Hao Chen, Kristin Lauter, and Katherine E. Stange
-
2015/970 ( PDF )
- Multilinear Maps over the Integers Using Modulus Switching
- Gu Chunsheng
-
2015/969 ( PDF )
- Zero-Knowledge Interactive Proof Systems for New Lattice Problems
- Claude Crepéau and Raza Ali Kazmi
-
2015/968 ( PDF )
- Differential and Linear Cryptanalysis of ARX with Partitioning -- Application to FEAL and Chaskey
- Gaëtan Leurent
-
2015/967 ( PDF )
- Freestart collision on full SHA-1
- Marc Stevens and Pierre Karpman and Thomas Peyrin
-
2015/966 ( PDF )
- Vulnerabilities of ``McEliece in the World of Escher"
- Dustin Moody and Ray Perlner
-
2015/965 ( PDF )
- Private Genome Analysis through Homomorphic Encryption
- Miran Kim and Kristin Lauter
-
2015/964 ( PDF )
- Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
- Danping Shi and Lei Hu and Siwei Sun and Ling Song
-
2015/963 ( PDF )
- When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
- Houda Ferradi and Rémi Géraud and David Naccache and Assia Tria
-
2015/962 ( PDF )
- SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
- Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
-
2015/961 ( PDF )
- Short Structure-Preserving Signatures
- Essam Ghadafi
-
2015/960 ( PDF )
- More Efficient Secure Outsourcing Methods for Bilinear Maps
- Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol
-
2015/959 ( PDF )
- Cryptanalysis of the Round-Reduced Kupyna Hash Function
- Jian Zou, Le Dong
-
2015/958 ( PDF )
- One-key Double-Sum MAC with Beyond-Birthday Security
- Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
-
2015/957 ( PDF )
- Delegating RAM Computations
- Yael Tauman Kalai and Omer Paneth
-
2015/956 ( PDF )
- Analysis of the Kupyna-256 Hash Function
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/955 ( PDF )
- On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
- Mridul Nandi and Tapas Pandit
-
2015/954 ( PDF )
- Online-Offline Homomorphic Signatures for Polynomial Functions
- Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
-
2015/953 ( PDF )
- Gaussian Sampling Precision and Information Leakage in Lattice Cryptography
- Markku-Juhani O. Saarinen
-
2015/952 ( PDF )
- Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
- Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
-
2015/951 ( PDF )
- Nearly Optimal Robust Secret Sharing
- Mahdi Cheraghchi
-
2015/950 ( PDF )
- A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
- Shota Goto and Junji Shikata
-
2015/949 ( PDF )
- Private Processing of Outsourced Network Functions: Feasibility and Constructions
- Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali Kaafar
-
2015/948 ( PDF )
- A Provably Secure Short Signature Scheme from Coding Theory
- Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
-
2015/947 ( PDF )
- Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
- Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
-
2015/946 ( PDF )
- Asymmetric proof-of-work based on the Generalized Birthday problem
- Alex Biryukov and Dmitry Khovratovich
-
2015/945 ( PDF )
- Secure Set-based Policy Checking and Its Application to Password Registration
- Changyu Dong and Franziskus Kiefer
-
2015/944 ( PDF )
- New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
- Palash Sarkar and Shashank Singh
-
2015/943 ( PDF )
- Sandy2x: New Curve25519 Speed Records
- Tung Chou
-
2015/942 ( PDF )
- Secrecy and independence for election schemes
- Ben Smyth
-
2015/941 ( PDF )
- Cryptanalysis of the New Multilinear Map over the Integers
- Brice Minaud and Pierre-Alain Fouque
-
2015/940 ( PDF )
- Secure Association for the Internet of Things
- Almog Benin and Sivan Toledo and Eran Tromer
-
2015/939 ( PDF )
- A Decade of Lattice Cryptography
- Chris Peikert
-
2015/938 ( PDF )
- Lattice Based Cryptography for Beginners
- Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim
-
2015/937 ( PDF )
- End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
- Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung
-
2015/936 ( -- withdrawn -- )
- A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
- Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
-
2015/935 ( PDF )
- Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
- Céline Blondeau and Kaisa Nyberg
-
2015/934 ( PDF )
- Cryptanalysis of the New CLT Multilinear Maps
- Jung Hee Cheon and Changmin Lee and Hansol Ryu
-
2015/933 ( PDF )
- Cryptanalysis of Provably Secure Certicateless Short Signature Scheme
- Jayaprakash Kar
-
2015/932 ( PDF )
- Using Tweaks To Design Fault Resistant Ciphers
- Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay
-
2015/931 ( PDF )
- Fast and Secure Three-party Computation: The Garbled Circuit Approach
- Payman Mohassel and Mike Rosulek and Ye Zhang
-
2015/930 ( PDF )
- Nearly Sparse Linear Algebra
- Antoine Joux and Cécile Pierrot
-
2015/929 ( PDF )
- Are you The One to Share? Secret Transfer with Access Structure
- Yongjun Zhao and Sherman S.M. Chow
-
2015/928 ( PDF )
- HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
- Hassan Noura and Damien Couroussé
-
2015/927 ( PDF )
- Rich Queries on Encrypted Data: Beyond Exact Matches
- Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner
-
2015/926 ( PDF )
- CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
- Vadim N.Tsypyschev and Julia S.Vinogradova
-
2015/925 ( PDF )
- Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
- Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
-
2015/924 ( PDF )
- Masking Large Keys in Hardware: A Masked Implementation of McEliece
- Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
-
2015/923 ( PDF )
- DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING
- Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay
-
2015/922 ( PDF )
- Localised Multisecret Sharing
- Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
-
2015/921 ( PDF )
- Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
- Kwangsu Lee and Jong Hwan Park
-
2015/920 ( PDF )
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
- Giuseppe Ateniese and Antonio Faonio and Seny Kamara
-
2015/919 ( PDF )
- PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
- Hung Dang and Tien Tuan Anh Dinh and Ee-Chien Chang and Beng Chin Ooi and Prateek Saxena and Shruti Tople
-
2015/918 ( PDF )
- Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
- Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk
-
2015/917 ( PDF )
- Private Proximity Testing on Steroids: An NTRU-based Protocol
- Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche
-
2015/916 ( PDF )
- Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
- Subhabrata Samajder and Palash Sarkar
-
2015/915 ( PDF )
- A Generic Construction for Verifiable Attribute-based Keyword Search Schemes
- Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
-
2015/914 ( PDF )
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
- Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
-
2015/913 ( PDF )
- Functional Signcryption: Notion, Construction, and Applications
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2015/912 ( PDF )
- Extraction of intrinsic structure for Hardware Trojan detection
- Maxime Lecomte and Jacques Fournier and Philippe Maurine
-
2015/911 ( PDF )
- Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
- Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin
-
2015/910 ( PDF )
- QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
- Alonso González and Alejandro Hevia and Carla Rŕfols
-
2015/909 ( PDF )
- On the Impact of Known-Key Attacks on Hash Functions
- Bart Mennink, Bart Preneel
-
2015/908 ( PDF )
- Linear Distinguishers in the Key-less Setting: Application to PRESENT
- Martin M. Lauridsen and Christian Rechberger
-
2015/907 ( PDF )
- Cryptographic Assumptions: A Position Paper
- Shafi Goldwasser and Yael Tauman Kalai
-
2015/906 ( PDF )
- RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors
- Adnan Baysal and Suhap Sahin
-
2015/905 ( PDF )
- Mapping the Intel Last-Level Cache
- Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser
-
2015/904 ( PDF )
- Almost-tight Identity Based Encryption against Selective Opening Attack
- Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen
-
2015/903 ( PDF )
- A Note on the Indifferentiability of the 10-Round Feistel Construction
- Yannick Seurin
-
2015/902 ( PDF )
- Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques
- Kexin Qiao and Lei Hu and Siwei Sun
-
2015/901 ( PDF )
- A Unified Approach to MPC with Preprocessing using OT
- Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl
-
2015/900 ( PDF )
- New Results on Identity-based Encryption from Quadratic Residuosity
- Ferucio Laurentiu Tiplea and Emil Simion
-
2015/899 ( PDF )
- Privacy-preserving Attribute Based Searchable Encryption
- Payal Chaudhari and Maniklal Das
-
2015/898 ( PDF )
- Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
- Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2015/897 ( PDF )
- Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography
- Prosanta Gope
-
2015/896 ( PDF )
- Improved Attacks on Reduced-Round Camellia-128/192/256
- Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang
-
2015/895 ( PDF )
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Guy Barwell and Dan Page and Martijn Stam
-
2015/894 ( PDF )
- Comparison of cube attacks over different vector spaces
- Richard Winter and Ana Salagean and Raphael C.-W. Phan
-
2015/893 ( PDF )
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography
- Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
-
2015/892 ( PDF )
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee
-
2015/891 ( PDF )
- Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy
- Sébastien Canard and Viet Cuong Trinh
-
2015/890 ( PDF )
- MI-T-HFE, a New Multivariate Signature Scheme
- Wenbin Zhang and Chik How Tan
-
2015/889 ( PDF )
- Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
- Anamaria Costache and Nigel P. Smart
-
2015/888 ( PDF )
- Tweak-Length Extension for Tweakable Blockciphers
- Kazuhiko Minematsu and Tetsu Iwata
-
2015/887 ( PDF )
- Round-Optimal Token-Based Secure Computation
- Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
-
2015/886 ( PDF )
- Applying Cryptographic Acceleration Techniques to Error Correction
- Rémi Géraud and Diana-Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion
-
2015/885 ( PDF )
- A New Standard of Ukraine: The Kupyna Hash Function
- Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov
-
2015/884 ( PDF )
- General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2015/883 ( -- withdrawn -- )
- Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security
- Avijit Dutta and Goutam Paul
-
2015/882 ( PDF )
- Using Modular Extension to Provably Protect ECC Against Fault Attacks
- Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm
-
2015/881 ( PDF )
- Generic Security of NMAC and HMAC with Input Whitening
- Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
-
2015/880 ( PDF )
- Generic Efficient Dynamic Proofs of Retrievability
- Mohammad Etemad and Alptekin Küpçü
-
2015/879 ( PDF )
- Computing information on domain parameters from public keys selected uniformly at random
- Martin Ekerĺ
-
2015/878 ( PDF )
- Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model
- Edward Eaton and Fang Song
-
2015/877 ( PDF )
- Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
- Christophe Clavier and Julien Francq and Antoine Wurcker
-
2015/876 ( PDF )
- 10-Round Feistel is Indifferentiable from an Ideal Cipher
- Dana Dachman-Soled and Jonathan Katz and Aishwarya Thiruvengadam
-
2015/875 ( PDF )
- Bent and Semi-bent Functions via Linear Translators
- Neşe Koçak, Sihem Mesnager and Ferruh Özbudak
-
2015/874 ( PDF )
- Feistel Networks: Indifferentiability at 10 Rounds
- Yuanxi Dai and John Steinberger
-
2015/873 ( PDF )
- On the Diffusion Property of Iterated Functions
- Jian Liu, Sihem Mesnager, and Lusheng Chen
-
2015/872 ( PDF )
- Traceability Improvements of a New RFID Protocol Based On EPC C1G2
- Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
-
2015/871 ( PDF )
- A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family
- Shahin Tajik and Enrico Dietz and Sven Frohmann and Helmar Dittrich and Dmitry Nedospasov and Clemens Helfmeier and Jean-Pierre Seifert and Christian Boit and Heinz-Wilhelm Hübers
-
2015/870 ( PDF )
- Gambling, Computational Information and Encryption Security
- Mohammad Hajiabadi and Bruce M. Kapron
-
2015/869 ( PDF )
- New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
- Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs
-
2015/868 ( PDF )
- Optimally Secure Block Ciphers from Ideal Primitives
- Stefano Tessaro
-
2015/867 ( PDF )
- Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
- Michel Abdalla and Fabrice Benhamouda and Alain Passelčgue
-
2015/866 ( PDF )
- Graded Encoding, Variations on a Scheme
- Shai Halevi
-
2015/865 ( PDF )
- Card-based Cryptographic Protocols Using a Minimal Number of Cards
- Alexander Koch and Stefan Walzer and Kevin Härtel
-
2015/864 ( PDF )
- Encryption Performance Improvements of the Paillier Cryptosystem
- Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets
-
2015/863 ( PDF )
- Is There an Oblivious RAM Lower Bound?
- Elette Boyle and Moni Naor
-
2015/862 ( PDF )
- Idealizing Identity-Based Encryption
- Dennis Hofheinz and Christian Matt and Ueli Maurer
-
2015/861 ( PDF )
- A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
- Chun Guo and Dongdai Lin
-
2015/860 ( PDF )
- Selective Opening Security for Receivers
- Carmit Hazay and Arpita Patra and Bogdan Warinschi
-
2015/859 ( PDF )
- Factor Base Discrete Logarithms in Kummer Extensions
- Dianyan Xiao and Jincheng Zhuang and Qi Cheng
-
2015/858 ( PDF )
- Group Signatures Without q-Assumptions
- Olivier Blazy and Saqib A. Kakvi
-
2015/857 ( PDF )
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
- Benjamin Fuller and Ariel Hamlin
-
2015/856 ( PDF )
- MGR HASH FUNCTION
- Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass
-
2015/855 ( -- withdrawn -- )
- A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
- GANESH YELLAPU
-
2015/854 ( PDF )
- Secure Sketch Metamorphosis: Tight Unified Bounds
- Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu
-
2015/853 ( PDF )
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Felix Heuer and Eike Kiltz and Krzysztof Pietrzak
-
2015/852 ( PDF )
- Analysis of a key exchange protocol based on tropical matrix algebra
- Matvei Kotov and Alexander Ushakov
-
2015/851 ( PDF )
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Benoît Cogliati and Yannick Seurin
-
2015/850 ( PDF )
- Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable
- Zhen Liu and Duncan S. Wong
-
2015/849 ( PDF )
- Regulating the Pace of von Neumann Correctors
- Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, and Amaury de Wargny
-
2015/848 ( PDF )
- The Multiplicative Complexity of Boolean Functions on Four and Five Variables
- Meltem Sonmez Turan and Rene Peralta
-
2015/847 ( PDF )
- Exploring Energy Efficiency of Lightweight Block Ciphers
- Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
-
2015/846 ( PDF )
- Characterization of Secure Multiparty Computation Without Broadcast
- Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem
-
2015/845 ( PDF )
- Cryptanalysis of the Quadratic Zero-Testing of GGH
- Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrčde Lepoint and Amit Sahai and Mehdi Tibouchi
-
2015/844 ( PDF )
- DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
- Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
-
2015/843 ( PDF )
- Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
- David Derler and Daniel Slamanig
-
2015/842 ( PDF )
- On Linkability and Malleability in Self-blindable Credentials
- Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers
-
2015/841 ( PDF )
- An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices
- Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
-
2015/840 ( PDF )
- Related-key Impossible Differential Analysis of Full Khudra
- Qianqian Yang and Lei Hu and Siwei Sun and Ling Song
-
2015/839 ( PDF )
- Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?
- David Wong
-
2015/838 ( PDF )
- Offline Witness Encryption
- Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
-
2015/837 ( PDF )
- Multi-Variate High-Order Attacks of Shuffled Tables Recomputation
- Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA
-
2015/836 ( PDF )
- Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
- Benjamin Wesolowski and Pascal Junod
-
2015/835 ( PDF )
- On near prime-order elliptic curves with small embedding degrees
- Duc-Phong Le and Nadia El Mrabet and Chik How Tan
-
2015/834 ( PDF )
- Authentication Using Side-Channel Information
- Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata
-
2015/833 ( PDF )
- Efficient Key Authentication Service for Secure End-to-end Communications
- Mohammad Etemad and Alptekin Küpçü
-
2015/832 ( PDF )
- Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
- David McCann, Kerstin Eder, Elisabeth Oswald
-
2015/831 ( PDF )
- M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
- Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk
-
2015/830 ( PDF )
- Unique Signature with Short Output from CDH Assumption
- Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
-
2015/829 ( PDF )
- Reducing Multilinear Map Levels in Constrained PRFs and ABE
- Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
-
2015/828 ( PDF )
- State-recovery analysis of Spritz
- Ralph Ankele and Stefan Koelbl and Christian Rechberger
-
2015/827 ( PDF )
- Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
- Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee
-
2015/826 ( PDF )
- Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
- Dario Catalano and Dario Fiore and Luca Nizzardo
-
2015/825 ( PDF )
- The Emperor's New Password Creation Policies
- Ding Wang and Ping Wang
-
2015/824 ( PDF )
- Efficient Fully Structure-Preserving Signatures for Large Messages
- Jens Groth
-
2015/823 ( PDF )
- Efficient (ideal) lattice sieving using cross-polytope LSH
- Anja Becker and Thijs Laarhoven
-
2015/822 ( PDF )
- Efficiently Obfuscating Re-Encryption Program under DDH Assumption
- Akshayaram Srinivasan and C. Pandu Rangan
-
2015/821 ( PDF )
- A general framework for building noise-free homomorphic cryptosystems
- Gérald Gavin
-
2015/820 ( PDF )
- Extended Nested Dual System Groups, Revisited
- Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang
-
2015/819 ( PDF )
- Improving the Big Mac Attack on Elliptic Curve Cryptography
- Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
-
2015/818 ( PDF )
- cuHE: A Homomorphic Encryption Accelerator Library
- Wei Dai and Berk Sunar
-
2015/817 ( PDF )
- Secure Multi-party Graph Computation
- Varsha Bhat and Harsimran Singh and S.R.S. Iyengar
-
2015/816 ( PDF )
- Analysis of Keyless Massive MIMO-based Cryptosystem Security
- Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev
-
2015/815 ( PDF )
- On the Power of Hierarchical Identity-Based Encryption
- Mohammad Mahmoody and Ameer Mohammed
-
2015/814 ( PDF )
- CLKS: Certificateless Keyword Search on Encrypted Data
- Qingji Zheng and Xiangxue Li and Aytac Azgin
-
2015/813 ( PDF )
- Revisiting Turning Online Cipher Off
- Ritam Bhaumik and Mridul Nandi
-
2015/812 ( PDF )
- The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob
- Alex Biryukov and Léo Perrin and Aleksei Udovenko
-
2015/811 ( PDF )
- Key-recovery attacks against the MAC algorithm Chaskey
- Chrysanthi Mavromati
-
2015/810 ( PDF )
- Improved OR Composition of Sigma-Protocols
- Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
-
2015/809 ( PDF )
- New Techniques for Electronic Voting
- Alan Szepieniec and Bart Preneel
-
2015/808 ( PDF )
- Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
- Mihir Bellare and Joseph Jaeger and Daniel Kane
-
2015/807 ( PDF )
- Fair Distributed Computation of Reactive Functions
- Juan Garay and Björn Tackmann and Vassilis Zikas
-
2015/806 ( PDF )
- Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
- Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
-
2015/805 ( PDF )
- A classification of elliptic curves with respect to the GHS attack in odd characteristic
- Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
-
2015/804 ( PDF )
- SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
- Sumit Chakraborty
-
2015/803 ( PDF )
- Statistical and Algebraic Properties of DES
- Stian Fauskanger and Igor Semaev
-
2015/802 ( PDF )
- Ciphertext-only attack on d*d Hill in O(d13^d)
- Shahram Khazaei and Siavash Ahmadi
-
2015/801 ( PDF )
- Scalar Blinding on Elliptic Curves based on Primes with Special Structure
- Scott Fluhrer
-
2015/800 ( PDF )
- Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
- Jihoon Cho, Kyu Young Choi, and Dukjae Moon
-
2015/799 ( PDF )
- Secure Binary Field Multiplication
- Hwajeong Seo and Chien-Ning Chen and Zhe Liu and Yasuyuki Nogami and Taehwan Park and Jongseok Choi and Howon Kim
-
2015/798 ( PDF )
- A Stateless Cryptographically-Secure Physical Unclonable Function
- Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
-
2015/797 ( PDF )
- What Security can we Achieve in 4-Rounds?
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2015/796 ( PDF )
- Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
- Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi
-
2015/795 ( PDF )
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
- Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman
-
2015/794 ( PDF )
- Safe-Errors on SPA Protected implementations with the Atomicity Technique
- Pierre-Alain Fouque and Sylvain Guilley and Cédric Murdica and David Naccache
-
2015/793 ( PDF )
- Algorithmic Information Theory for Obfuscation Security
- Rabih Mohsen and Alexandre Miranda Pinto
-
2015/792 ( PDF )
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Dennis Hofheinz and Vanishree Rao and Daniel Wichs
-
2015/791 ( PDF )
- On the Equivalence of Obfuscation and Multilinear Maps
- Omer Paneth and Amit Sahai
-
2015/790 ( PDF )
- On weak and strong 2^k-bent Boolean functions
- Pantelimon Stanica
-
2015/789 ( PDF )
- Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator
- Gangqiang Yang and Mark D. Aagaard and Guang Gong
-
2015/788 ( PDF )
- Cracking-Resistant Password Vaults using Natural Language Encoders
- Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart
-
2015/787 ( PDF )
- Backtracking-Assisted Multiplication
- Houda Ferradi and Rémi Géraud and Diana Maimut and David Naccache and Hang Zhou
-
2015/786 ( PDF )
- Buying AES Design Resistance with Speed and Energy
- Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto
-
2015/785 ( PDF )
- Double-Speed Barrett Moduli
- Rémi Géraud and Diana Maimut and David Naccache
-
2015/784 ( PDF )
- Threshold FlipThem: When the winner does not need to take all
- David Leslie and Chris Sherfield and Nigel P. Smart
-
2015/783 ( PDF )
- Cryptanalysis of the Authenticated Encryption Algorithm COFFE
- Ivan Tjuawinata and Tao Huang and Hongjun Wu
-
2015/782 ( PDF )
- Secure two-party computation in applied pi-calculus: models and verification
- Sergiu Bursuc
-
2015/781 ( PDF )
- Twisted Hessian curves
- Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange
-
2015/780 ( PDF )
- Multilinear Maps from Obfuscation
- Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson
-
2015/779 ( PDF )
- A Simple Scheme, for Strengthening Product-sum Type PKC
- Masao KASAHARA
-
2015/778 ( PDF )
- Modular Inversion Hidden Number Problem -- Correction and Improvements
- Santanu Sarkar
-
2015/777 ( PDF )
- Arithmetic Walsh Transform of Boolean Functions with Linear Structures
- Qinglan Zhao and Dong Zheng and Xiangxue Li and Xiaoli Dong
-
2015/776 ( PDF )
- Functional Encryption for Turing Machines
- Prabhanjan Ananth and Amit Sahai
-
2015/775 ( PDF )
- Efficient MDS Diffusion Layers Through Decomposition of Matrices
- S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo
-
2015/774 ( PDF )
- Revisiting Prime Power RSA
- Santanu Sarkar
-
2015/773 ( PDF )
- Distinguishing a truncated random permutation from a random function
- Shoni Gilboa and Shay Gueron
-
2015/772 ( PDF )
- Non-Malleable Encryption: Simpler, Shorter, Stronger
- Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
-
2015/771 ( PDF )
- A SAT-based Public Key Cryptography Scheme
- Sebastian E. Schmittner
-
2015/770 ( PDF )
- A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
- Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
-
2015/769 ( PDF )
- On the Hardness of Learning with Rounding over Small Modulus
- Andrej Bogdanov and Siyao Guo and Daniel Masny and Silas Richelson and Alon Rosen
-
2015/768 ( PDF )
- Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
- Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar
-
2015/767 ( PDF )
- Dual EC: A Standardized Back Door
- Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen
-
2015/766 ( PDF )
- Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
- Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng
-
2015/765 ( PDF )
- Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
- Victoria Fehr and Marc Fischlin
-
2015/764 ( PDF )
- On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2})
- Jincheng Zhuang and Qi Cheng
-
2015/763 ( PDF )
- Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
- Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and Takafumi Aoki
-
2015/762 ( PDF )
- A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
- Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef
-
2015/761 ( PDF )
- Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
- William Diehl
-
2015/760 ( PDF )
- Investigating SRAM PUFs in large CPUs and GPUs
- Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen
-
2015/759 ( PDF )
- Cryptanalysis of Gu's ideal multilinear map
- Alice Pellet-Mary and Damien Stehle
-
2015/758 ( PDF )
- Ring-LWE Cryptography for the Number Theorist
- Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
-
2015/757 ( PDF )
- Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks
- Matthias Hamann and Matthias Krause
-
2015/756 ( PDF )
- Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
- Yandong Zheng, Hua Guo
-
2015/755 ( PDF )
- TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
- Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen
-
2015/754 ( PDF )
- Related-Key Attack on Full-Round PICARO
- Anne Canteaut and Virginie Lallemand and María Naya-Plasencia
-
2015/753 ( PDF )
- Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
- Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen
-
2015/752 ( PDF )
- On Constructing One-Way Permutations from Indistinguishability Obfuscation
- Gilad Asharov and Gil Segev
-
2015/751 ( PDF )
- Fast Garbling of Circuits Under Standard Assumptions
- Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
-
2015/750 ( PDF )
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Ryo Nishimaki and Daniel Wichs and Mark Zhandry
-
2015/749 ( PDF )
- Affine Equivalence and its Application to Tightening Threshold Implementations
- Pascal Sasdrich and Amir Moradi and Tim Güneysu
-
2015/748 ( PDF )
- A More Cautious Approach to Security Against Mass Surveillance
- Jean Paul Degabriele and Pooya Farshim and Bertram Poettering
-
2015/747 ( PDF )
- Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
- Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du
-
2015/746 ( PDF )
- A 2^{70} Attack on the Full MISTY1
- Achiya Bar-On
-
2015/745 ( PDF )
- Faster ECC over F_{2^571} (feat. PMULL)
- Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
-
2015/744 ( PDF )
- BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
- Ege Gulcan and Aydin Aysu and Patrick Schaumont
-
2015/743 ( PDF )
- Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
- Benoit Libert and Thomas Peters and Moti Yung
-
2015/742 ( PDF )
- A Matrix Decomposition Method for Optimal Normal Basis Multiplication
- Can Kızılkale and Ömer Eǧecioǧlu and Çetin Kaya Koç
-
2015/741 ( PDF )
- On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
- Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
-
2015/740 ( PDF )
- Predictable Arguments of Knowledge
- Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
-
2015/739 ( PDF )
- Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation
- Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang
-
2015/738 ( PDF )
- Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO)
- Kazuhiko Minematsu
-
2015/737 ( PDF )
- New multilinear maps from ideal lattices
- Gu Chunsheng
-
2015/736 ( -- withdrawn -- )
- Solving LWE via List Decoding
- Mingqiang Wang and Xiaoyun Wang and Kunxian Xia and Jincheng Zhuang
-
2015/735 ( PDF )
- Cutting-Edge Cryptography Through the Lens of Secret Sharing
- Ilan Komargodski and Mark Zhandry
-
2015/734 ( PDF )
- On the Security of Extended Generalized Feistel Networks
- Manoj Kumar and Saibal K. Pal and Anupama Panigrahi
-
2015/733 ( PDF )
- Fully Homomorphic Encryption on Octonion Ring
- Masahiro Yagisawa
-
2015/732 ( PDF )
- Compact Implementations of LEA Block Cipher for Low-End Microprocessors
- Hwajeong Seo and Zhe Liu and Jongseok Choi and Taehwan Park and and Howon Kim
-
2015/731 ( PDF )
- Same Value Analysis on Edwards Curves
- Rodrigo Abarzúa and Santi Martínez and Valeria Mendoza
-
2015/730 ( PDF )
- Indistinguishability Obfuscation from Functional Encryption for Simple Functions, And a New Bootstrapping Theorem for iO
- Prabhanjan Ananth and Abhishek Jain and Amit Sahai
-
2015/729 ( PDF )
- Towards Provably-Secure Remote Memory Attestation
- Alexandra Boldyreva and Taesoo Kim and Richard Lipton and Bogdan Warinschi
-
2015/728 ( PDF )
- Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
- Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas
-
2015/727 ( PDF )
- DPA, Bitslicing and Masking at 1 GHz
- Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede
-
2015/726 ( PDF )
- Compositions of linear functions and applications to hashing
- Vladimir Shpilrain and Bianca Sosnovski
-
2015/725 ( PDF )
- The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable
- Eric Verheul and Sietse Ringers and Jaap-Henk Hoepman
-
2015/724 ( PDF )
- A masked ring-LWE implementation
- Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
-
2015/723 ( PDF )
- Cryptanalysis of Feistel Networks with Secret Round Functions
- Alex Biryukov and Gaëtan Leurent and Léo Perrin
-
2015/722 ( PDF )
- Oblivious Substring Search with Updates
- Tarik Moataz and Erik-Oliver Blass
-
2015/721 ( PDF )
- KDM-Security via Homomorphic Smooth Projective Hashing
- Hoeteck Wee
-
2015/720 ( PDF )
- Output-Compressing Randomized Encodings and Applications
- Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang
-
2015/719 ( PDF )
- Consolidating masking schemes
- Oscar Reparaz and Begül Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede
-
2015/718 ( PDF )
- Efficient Asynchronous Accumulators for Distributed PKI
- Leonid Reyzin and Sophia Yakoubov
-
2015/717 ( PDF )
- Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
- Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
-
2015/716 ( PDF )
- Linear Cryptanalysis of Reduced-Round SIMECK Variants
- Nasour Bagheri
-
2015/715 ( PDF )
- New Circular Security Counterexamples from Decision Linear and Learning with Errors
- Allison Bishop and Susan Hohenberger and Brent Waters
-
2015/714 ( PDF )
- New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
- Masao KASAHARA
-
2015/713 ( PDF )
- Light-hHB: A New Version of hHB with Improved Session Key Exchange
- Ka Ahmad Khoureich
-
2015/712 ( PDF )
- On Limitations of the Fiat–Shamir Transformation
- David Bernhard and Bogdan Warinschi
-
2015/711 ( PDF )
- Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)
- Anne Canteaut and Sébastien Duval and Gaëtan Leurent
-
2015/710 ( PDF )
- Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
- Bernardo Ferreira and João Rodrigues and João Leitão and Henrique Domingos
-
2015/709 ( PDF )
- Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
- Luka Malisa and Kari Kostiainen and Srdjan Capkun
-
2015/708 ( PDF )
- Choosing Parameters for NTRUEncrypt
- Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
-
2015/707 ( PDF )
- Reconciling User Privacy and Implicit Authentication for Mobile Devices
- Siamak F. Shahandashti and Reihaneh Safavi-Naini and Nashad Ahmed Safa
-
2015/706 ( PDF )
- A Brief Comparison of Simon and Simeck
- Stefan Kölbl and Arnab Roy
-
2015/705 ( PDF )
- Linear Overhead Robust MPC with Honest Majority Using Preprocessing
- Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
-
2015/704 ( PDF )
- Indistinguishability Obfuscation: from Approximate to Exact
- Nir Bitansky and Vinod Vaikuntanathan
-
2015/703 ( PDF )
- Point-Function Obfuscation: A Framework and Generic Constructions
- Mihir Bellare and Igors Stepanovs
-
2015/702 ( PDF )
- Demystifying incentives in the consensus computer
- Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena
-
2015/701 ( PDF )
- Differential Privacy in distribution and instance-based noise mechanisms
- Sébastien Canard and Baptiste Olivier
-
2015/700 ( PDF )
- Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
- Jimmy Jose and Dipanwita RoyChowdhury
-
2015/699 ( PDF )
- FURISC: FHE Encrypted URISC Design
- Ayantika Chatterjee and Indranil Sengupta
-
2015/698 ( PDF )
- Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa
- Subhamoy Maitra
-
2015/697 ( PDF )
- On the Security of a Self-healing Group Key Distribution Scheme
- Yandong Zheng, Hua Guo
-
2015/696 ( PDF )
- Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
- Miguel Morales Sandoval and Arturo Diaz Perez
-
2015/695 ( PDF )
- Cliptography: Clipping the Power of Kleptographic Attacks
- Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou
-
2015/694 ( PDF )
- On the Complexity of Additively Homomorphic UC Commitments
- Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
-
2015/693 ( PDF )
- Foundations of Reactive Garbling Schemes
- Jesper Buus Nielsen and Samuel Ranellucci
-
2015/692 ( PDF )
- Fast and Secure Linear Regression and Biometric Authentication with Security Update
- Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
-
2015/691 ( PDF )
- SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
- Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth
-
2015/690 ( PDF )
- Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
- Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2015/689 ( PDF )
- Counting Keys in Parallel After a Side Channel Attack
- Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam
-
2015/688 ( PDF )
- Binary Field Multiplication on ARMv8
- Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
-
2015/687 ( PDF )
- Classical Cryptographic Protocols in a Quantum World
- Sean Hallgren and Adam Smith and Fang Song
-
2015/686 ( PDF )
- Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
- Azeem Irshad and Muhammad Sher and Shahzad Ashraf and Shahzad faisal and Mahmood Ul Hassan
-
2015/685 ( PDF )
- On the discrete logarithm problem in finite fields of fixed characteristic
- Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
-
2015/684 ( PDF )
- A One-time Stegosystem and Applications to Efficient Covert Communication
- Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha Shashidhar
-
2015/683 ( PDF )
- Security of Linear Secret-Sharing Schemes against Mass Surveillance
- Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci
-
2015/682 ( PDF )
- Integral Cryptanalysis on Full MISTY1
- Yosuke Todo
-
2015/681 ( PDF )
- ANONIZE: A Large-Scale Anonymous Survey System
- Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat
-
2015/680 ( PDF )
- Indifferentiability of Confusion-Diffusion Networks
- Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
-
2015/679 ( PDF )
- Another Look at Normal Approximations in Cryptanalysis
- Subhabrata Samajder and Palash Sarkar
-
2015/678 ( PDF )
- Optimizing MAKWA on GPU and CPU
- Thomas Pornin
-
2015/677 ( PDF )
- EdDSA for more curves
- Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang
-
2015/676 ( PDF )
- Quantum Cryptanalysis of NTRU
- Scott Fluhrer
-
2015/675 ( PDF )
- Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
- Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
-
2015/674 ( PDF )
- Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
- Peeter Laud and Alisa Pankova
-
2015/673 ( PDF )
- Decaf: Eliminating cofactors through point compression
- Mike Hamburg
-
2015/672 ( PDF )
- Function-Hiding Inner Product Encryption
- Allison Bishop and Abhishek Jain and Lucas Kowalczyk
-
2015/671 ( PDF )
- Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data
- Peeter Laud and Alisa Pankova
-
2015/670 ( PDF )
- Smart Security Management in Secure Devices
- Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
-
2015/669 ( PDF )
- GMU Hardware API for Authenticated Ciphers
- Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj
-
2015/668 ( PDF )
- The Fallacy of Composition of Oblivious RAM and Searchable Encryption
- Muhammad Naveed
-
2015/667 ( PDF )
- De Bruijn Sequences from Nonlinear Feedback Shift Registers
- Ming Li and Dongdai Lin
-
2015/666 ( PDF )
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques
- Huaifeng Chen and Xiaoyun Wang
-
2015/665 ( PDF )
- Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption.
- Romain Gay and Iordanis Kerenidis and Hoeteck Wee
-
2015/664 ( PDF )
- Secure Multi-Party Shuffling
- Mahnush Movahedi and Jared Saia and Mahdi Zamani
-
2015/663 ( PDF )
- Analyzing the Efficiency of Biased-Fault Based Attacks
- Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
-
2015/662 ( PDF )
- Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves
- Ryutaroh Matsumoto
-
2015/661 ( PDF )
- Cryptanalysis of a modern rotor machine in a multicast setting
- Shane Kepley and David Russo and Rainer Steinwandt
-
2015/660 ( PDF )
- A Hybrid Gaussian Sampler for Lattices over Rings
- Léo Ducas and Thomas Prest
-
2015/659 ( PDF )
- Diversity and Transparency for ECC
- Jean-Pierre Flori and Jérôme Plűt and Jean-René Reinhard and Martin Ekerĺ
-
2015/658 ( PDF )
- Single-Cycle Implementations of Block Ciphers
- Pieter Maene and Ingrid Verbauwhede
-
2015/657 ( PDF )
- Randomizing the Montgomery Powering Ladder
- Duc-Phong Le, Chik How Tan and Michael Tunstall
-
2015/656 ( PDF )
- Cryptanalysis of a Markov Chain Based User Authentication Scheme
- Ruhul Amin and G.P. Biswas
-
2015/655 ( PDF )
- An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
- Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
-
2015/654 ( PDF )
- DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
- Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng
-
2015/653 ( PDF )
- Homomorphic Signature Schemes - A survey
- Giulia Traverso and Denise Demirel and Johannes Buchmann
-
2015/652 ( PDF )
- Modelling ciphersuite and version negotiation in the TLS protocol
- Benjamin Dowling and Douglas Stebila
-
2015/651 ( PDF )
- Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
- Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller
-
2015/650 ( PDF )
- A New Encryption Standard of Ukraine: The Kalyna Block Cipher
- Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov and Ruslan Mordvinov and Dmytro Kaidalov
-
2015/649 ( PDF )
- On the Hardness of Proving CCA-security of Signed ElGamal
- David Bernhard and Marc Fischlin and Bogdan Warinschi
-
2015/648 ( PDF )
- Adaptive Proofs of Knowledge in the Random Oracle Model
- David Bernhard and Marc Fischlin and Bogdan Warinschi
-
2015/647 ( PDF )
- Efficient ephemeral elliptic curve cryptographic keys
- Andrea Miele and Arjen K. Lenstra
-
2015/646 ( PDF )
- Decomposition attack on SASASASAS
- Alex Biryukov and Dmitry Khovratovich
-
2015/645 ( PDF )
- Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy
- Clémentine Gritti, Willy Susilo, Thomas Plantard and Rongmao Chen
-
2015/644 ( PDF )
- The Pythia PRF Service
- Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart
-
2015/643 ( PDF )
- Short Accountable Ring Signatures Based on DDH
- Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit
-
2015/642 ( PDF )
- A New Partial Key Exposure Attack on Multi-power RSA
- Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol
-
2015/641 ( PDF )
- Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
- Jing Li, Licheng Wang
-
2015/640 ( PDF )
- Very-efficient simulatable flipping of many coins into a well
- Luís T. A. N. Brandăo
-
2015/639 ( PDF )
- Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings
- Hao Chen
-
2015/638 ( PDF )
- An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
- Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta
-
2015/637 ( PDF )
- A Novel Cyberspace-Oriented Access Control Model
- Fenghua Li and Yanchao Wang and Rongna Xie and Jinbo Xiong and Fangfang Shan
-
2015/636 ( PDF )
- Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes
- Matthias Krause
-
2015/635 ( PDF )
- Microcash: Efficient Off-Line Small Payments
- Chris Pavlovski and Colin Boyd
-
2015/634 ( PDF )
- Phasing: Private Set Intersection using Permutation-based Hashing
- Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner
-
2015/633 ( PDF )
- An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
- Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
-
2015/632 ( PDF )
- More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models
- Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji
-
2015/631 ( PDF )
- Accelerating Homomorphic Evaluation on Reconfigurable Hardware
- Thomas Pöppelmann and Michael Naehrig and Andrew Putnam and Adrian Macias
-
2015/630 ( PDF )
- Unconditionally Secure Computation with Reduced Interaction
- Ivan Damgĺrd and Jesper Buus Nielsen
-
2015/629 ( PDF )
- BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme
- Véronique Cortier and Georg Fuchsbauer and David Galindo
-
2015/628 ( PDF )
- An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
- Daniel Cabarcas and Denise Demirel and Florian Göpfert and Jean Lancrenon and Thomas Wunderer
-
2015/627 ( PDF )
- On Necessary Padding with IO
- Justin Holmgren
-
2015/626 ( PDF )
- Practical Round-Optimal Blind Signatures in the Standard Model
- Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
-
2015/625 ( PDF )
- Ed448-Goldilocks, a new elliptic curve
- Mike Hamburg
-
2015/624 ( PDF )
- Automated Analysis and Synthesis of Authenticated Encryption Schemes
- Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff
-
2015/623 ( PDF )
- Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
- Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand
-
2015/622 ( PDF )
- Random Digit Representation of Integers
- Nicolas Méloni and M. Anwar Hasan
-
2015/621 ( PDF )
- Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
- Sarani Bhattacharya, Debdeep Mukhopadhyay
-
2015/620 ( PDF )
- Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions
- Susumu Kiyoshima
-
2015/619 ( PDF )
- Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
- Seher Tutdere and Osmanbey Uzunkol
-
2015/618 ( PDF )
- An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
- Juan Carlos Ku-Cauich Guillermo Morales-Luna Horacio Tapia-Recillas
-
2015/617 ( PDF )
- Generalised tally-based decoders for traitor tracing and group testing
- Boris Skoric and Wouter de Groot
-
2015/616 ( PDF )
- The leaking battery: A privacy analysis of the HTML5 Battery Status API
- Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia Diaz
-
2015/615 ( PDF )
- Security Analysis of Niu et al. Authentication and Ownership Management Protocol
- Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati
-
2015/614 ( PDF )
- Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
- Fangguo Zhang
-
2015/613 ( PDF )
- Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
- Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei
-
2015/612 ( PDF )
- The Simeck Family of Lightweight Block Ciphers
- Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong
-
2015/611 ( PDF )
- A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
- Shijun Zhao and Qianying Zhang
-
2015/610 ( PDF )
- McBits: fast constant-time code-based cryptography
- Daniel J. Bernstein and Tung Chou and Peter Schwabe
-
2015/609 ( PDF )
- Experimental Study of DIGIPASS GO3 and the Security of Authentication
- Igor Semaev
-
2015/608 ( -- withdrawn -- )
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- Benoit Libert and Damien Stehle
-
2015/607 ( PDF )
- Netcoin - A Traceable P2P Electronic Cash System
- Hitesh Tewari and Eamon O Nuallain
-
2015/606 ( PDF )
- Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
- Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon
-
2015/605 ( PDF )
- Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm
- Steven D. Galbraith and Ping Wang and Fangguo Zhang
-
2015/604 ( PDF )
- Structure-Preserving Signatures from Standard Assumptions, Revisited
- Eike Kiltz and Jiaxin Pan and Hoeteck Wee
-
2015/603 ( PDF )
- Complementary Dual Codes for Counter-measures to Side-Channel Attacks
- Claude Carlet and Sylvain Guilley
-
2015/602 ( PDF )
- Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
- Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhay
-
2015/601 ( PDF )
- A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
- Mei Wang, Zheng Yuan,Xiao Feng
-
2015/600 ( PDF )
- Predictive Models for Min-Entropy Estimation
- John Kelsey and Kerry A. McKay and Meltem Sonmez Turan
-
2015/599 ( PDF )
- The Chain Rule for HILL Pseudoentropy, Revisited
- Krzysztof Pietrzak and Maciej Skorski
-
2015/598 ( PDF )
- Combining Differential Privacy and Secure Multiparty Computation
- Martin Pettai and Peeter Laud
-
2015/597 ( PDF )
- Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
- Amir Moradi and Alexander Wild
-
2015/596 ( PDF )
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations
- Jean-Sebastien Coron and Craig Gentry and Shai Halevi and Tancrede Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi
-
2015/595 ( -- withdrawn -- )
- Differential Fault Intensity Analysis
- Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa Taha and Patrick Schaumont
-
2015/594 ( PDF )
- Disk Encryption: Do We Need to Preserve Length?
- Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
-
2015/593 ( PDF )
- A Physical Approach for Stochastic Modeling of TERO-based TRNG
- Patrick HADDAD and Viktor FISCHER and Florent BERNARD and Jean NICOLAI
-
2015/592 ( PDF )
- Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
- Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel
-
2015/591 ( PDF )
- How much randomness can be extracted from memoryless Shannon entropy sources?
- Maciej Skorski
-
2015/590 ( PDF )
- TriviA: A Fast and Secure Authenticated Encryption Scheme
- Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
-
2015/589 ( PDF )
- Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
- A.-M. Leventi-Peetz and J.-V. Peetz
-
2015/588 ( PDF )
- An analysis of the $C$ class of bent functions
- Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic
-
2015/587 ( PDF )
- AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
- Trupil Limbasiya and Nishant Doshi
-
2015/586 ( PDF )
- SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System
- Yuan Zhang and Chunxiang Xu and Shui Yu and Hongwei Li and Xiaojun Zhang
-
2015/585 ( PDF )
- SIMON and SPECK: Block Ciphers for the Internet of Things
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2015/584 ( PDF )
- How to Securely Prolong the Computational Bindingness of Pedersen Commitments
- Denise Demirel and Jean Lancrenon
-
2015/583 ( PDF )
- Secure Key Generation from Biased PUFs
- Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems
-
2015/582 ( PDF )
- How Secure and Quick is QUIC? Provable Security and Performance Analyses
- Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita-Rotaru
-
2015/581 ( PDF )
- Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation
- Christina Brzuska and Arno Mittelbach
-
2015/580 ( PDF )
- Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
- Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss
-
2015/579 ( PDF )
- A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
- Mridul Nandi
-
2015/578 ( PDF )
- Tampering with the Delivery of Blocks and Transactions in Bitcoin
- Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun
-
2015/577 ( PDF )
- Twist Insecurity
- Manfred Lochter, Andreas Wiemers
-
2015/576 ( PDF )
- The Carnac protocol -- or how to read the contents of a sealed envelope
- Michael Scott and Brian Spector
-
2015/575 ( PDF )
- Known-key Distinguisher on Full PRESENT
- Céline Blondeau and Thomas Peyrin and Lei Wang
-
2015/574 ( PDF )
- Fair and Robust Multi-Party Computation using a Global Transaction Ledger
- Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
-
2015/573 ( PDF )
- Last fall degree, HFE, and Weil descent attacks on ECDLP
- Ming-Deh A. Huang and Michiel Kosters and Sze Ling Yeo
-
2015/572 ( PDF )
- On Public Key Encryption from Noisy Codewords
- Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi
-
2015/571 ( PDF )
- Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
- Tobias Schneider and Amir Moradi and Tim Güneysu
-
2015/570 ( PDF )
- Constant Communication ORAM with Small Blocksize
- Tarik Moataz and Travis Mayberry and Erik-Oliver Blass
-
2015/569 ( PDF )
- Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grřstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
- Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
-
2015/568 ( PDF )
- Cryptanalysis of Reduced-Round Whirlwind (Full Version)
- Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
-
2015/567 ( PDF )
- Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
- Henri Gilbert and Jérôme Plűt and Joana Treger
-
2015/566 ( PDF )
- A Framework for Identity-Based Encryption with Almost Tight Security
- Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
-
2015/565 ( PDF )
- FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
- Craig Costello and Patrick Longa
-
2015/564 ( PDF )
- Sanctum: Minimal Hardware Extensions for Strong Software Isolation
- Victor Costan and Ilia Lebedev and Srinivas Devadas
-
2015/563 ( PDF )
- Privacy in the Genomic Era
- Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang
-
2015/562 ( PDF )
- PUDA – Privacy and Unforgeability for Data Aggregation
- Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
-
2015/561 ( PDF )
- SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
- J. Longo and E. De Mulder and D. Page and M. Tunstall
-
2015/560 ( PDF )
- Generic Construction of UC-Secure Oblivious Transfer
- Olivier Blazy and Céline Chevalier
-
2015/559 ( PDF )
- Concurrent Secure Computation with Optimal Query Complexity
- Ran Canetti and Vipul Goyal and Abhishek Jain
-
2015/558 ( PDF )
- Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
- Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
-
2015/557 ( PDF )
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
- Takanori Isobe and Kyoji Shibutani
-
2015/556 ( PDF )
- Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates
- Sujoy Sinha Roy and Kimmo Järvinen and Ingrid Verbauwhede
-
2015/555 ( PDF )
- Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
- Tapas Pandit and Sumit Kumar Pandey and Rana Barua
-
2015/554 ( PDF )
- An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
- Michel Abdalla and Fabrice Benhamouda and Alain Passelčgue
-
2015/553 ( PDF )
- Round-Optimal Black-Box Two-Party Computation
- Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro
-
2015/552 ( PDF )
- An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
- Paul Kirchner and Pierre-Alain Fouque
-
2015/551 ( PDF )
- Quantum homomorphic encryption for circuits of low $T$-gate complexity
- Anne Broadbent and Stacey Jeffery
-
2015/550 ( PDF )
- Upending Stock Market Structure Using Secure Multi-Party Computation
- Charanjit S. Jutla
-
2015/549 ( PDF )
- ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices
- Amir Hassani Karbasi, Reza Ebrahimi Atani
-
2015/548 ( PDF )
- Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
- Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
-
2015/547 ( PDF )
- Secure Computation of MIPS Machine Code
- Xiao Shaun Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz
-
2015/546 ( PDF )
- Actively Secure OT Extension with Optimal Overhead
- Marcel Keller and Emmanuela Orsini and Peter Scholl
-
2015/545 ( PDF )
- FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
- Qinglong Zhang and Zongbin Liu and and Cunqing Ma and Changting Li and Jiwu Jing
-
2015/544 ( PDF )
- Alternative cubics' rules with an algebraic appeal
- Daniel R. L. Brown
-
2015/543 ( PDF )
- Bloom Filters in Adversarial Environments
- Moni Naor and Eylon Yogev
-
2015/542 ( PDF )
- Improved Side-Channel Analysis of Finite-Field Multiplication
- Sonia Belaďd and Jean-Sébastien Coron and Pierre-Alain Fouque and Benoît Gérard and Jean-Gabriel Kammerer and Emmanuel Prouff
-
2015/541 ( PDF )
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
- Bart Mennink and Reza Reyhanitabar and Damian Vizár
-
2015/540 ( PDF )
- PICO: An Ultra lightweight and Low power encryption design for pervasive computing
- Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil
-
2015/539 ( PDF )
- Tweaking Even-Mansour Ciphers
- Benoît Cogliati and Rodolphe Lampe and Yannick Seurin
-
2015/538 ( PDF )
- Pairing Based Mutual Healing in Wireless Sensor Networks
- Sarita Agrawal and Jay Patel and Manik Lal Das
-
2015/537 ( PDF )
- Towards Easy Leakage Certification
- François Durvaux and François-Xavier Standaert
-
2015/536 ( PDF )
- From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
- François Durvaux and François-Xavier Standaert
-
2015/535 ( PDF )
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
- Vincent Grosso and François-Xavier Standaert
-
2015/534 ( PDF )
- Problems, solutions and experience of the first international student's Olympiad in cryptography
- Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia Tokareva and Valeria Vitkup
-
2015/533 ( PDF )
- Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
- Xiaoshuang Ma and Kexin Qiao
-
2015/531 ( PDF )
- Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
- Mohammad Hajiabadi, Bruce M. Kapron
-
2015/530 ( PDF )
- Practical Free-Start Collision Attacks on 76-step SHA-1
- Pierre Karpman and Thomas Peyrin and Marc Stevens
-
2015/529 ( PDF )
- Power Analysis Attacks against IEEE 802.15.4 Nodes
- Colin O'Flynn and Zhizhang Chen
-
2015/528 ( PDF )
- Spacecoin: A Cryptocurrency Based on Proofs of Space
- Sunoo Park and Krzysztof Pietrzak and Joël Alwen and Georg Fuchsbauer and Peter Gazi
-
2015/527 ( PDF )
- Robust Profiling for DPA-Style Attacks
- Carolyn Whitnall and Elisabeth Oswald
-
2015/526 ( PDF )
- Generic Key Recovery Attack on Feistel Scheme
- Takanori Isobe and Kyoji Shibutani
-
2015/525 ( PDF )
- Short Randomizable Signatures
- David Pointcheval and Olivier Sanders
-
2015/524 ( PDF )
- Secure Key Exchange Protocol based on Virtual Proof of Reality
- Yansong Gao
-
2015/523 ( PDF )
- Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
- Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai
-
2015/522 ( PDF )
- Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search
- Anja Becker, Nicolas Gama, Antoine Joux
-
2015/521 ( PDF )
- Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency
- Sergey Gorbunov and Silvio Micali
-
2015/520 ( PDF )
- A Constant Time, Single Round, Attribute-Based Authenticated Key Exchange in Random Oracle Model
- Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
-
2015/519 ( PDF )
- Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
- Yongge Wang
-
2015/518 ( PDF )
- Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
- Ren Zhang
-
2015/517 ( PDF )
- Subversion-Resilient Signature Schemes
- Giuseppe Ateniese and Bernardo Magri and Daniele Venturi
-
2015/516 ( PDF )
- Key-Recovery Attacks on ASASA
- Brice Minaud and Patrick Derbez and Pierre-Alain Fouque and Pierre Karpman
-
2015/515 ( PDF )
- Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
- Thomas Espitau and Pierre-Alain Fouque and Pierre Karpman
-
2015/514 ( PDF )
- Time-Lock Puzzles from Randomized Encodings
- Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters
-
2015/513 ( PDF )
- Computing Individual Discrete Logarithms Faster in $GF(p^n)$
- Aurore Guillevic
-
2015/512 ( PDF )
- Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply
- Sami Saab, Andrew Leiserson, and Michael Tunstall
-
2015/511 ( PDF )
- Near Collision Side Channel Attacks
- Baris Ege and Thomas Eisenbarth and Lejla Batina
-
2015/510 ( PDF )
- Equivoe-T: Transposition Equivocation Cryptography
- Gideon Samid
-
2015/509 ( PDF )
- A flaw in a theorem about Schnorr signatures
- Daniel R. L. Brown
-
2015/508 ( PDF )
- Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
- Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra
-
2015/507 ( PDF )
- Decomposing the ASASA Block Cipher Construction
- Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander
-
2015/506 ( PDF )
- Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
- Gilles Barthe and Sonia Belaďd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire
-
2015/505 ( PDF )
- The Tower Number Field Sieve
- Razvan Barbulescu and Pierrick Gaudry and Thorsten Kleinjung
-
2015/504 ( PDF )
- The Iterated Random Permutation Problem with Applications to Cascade Encryption
- Brice Minaud and Yannick Seurin
-
2015/503 ( PDF )
- The Norwegian Internet Voting Protocol: A new Instantiation
- Kristian Gjřsteen and Anders Smedstuen Lund
-
2015/502 ( PDF )
- Centrally Banked Cryptocurrencies
- George Danezis and Sarah Meiklejohn
-
2015/501 ( PDF )
- Multi-Prover Commitments Against Non-Signaling Attacks
- Serge Fehr and Max Fillinger
-
2015/500 ( PDF )
- Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure
- Alberto Battistello and Christophe Giraud
-
2015/499 ( PDF )
- Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
- Dennis Hofheinz
-
2015/498 ( PDF )
- Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
- Jiajun Zhang and Haining Fan
-
2015/497 ( PDF )
- Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost
- Zhangxiang Hu and Payman Mohassel and Mike Rosulek
-
2015/496 ( PDF )
- Quantifying Location Privacy Leakage from Transaction Prices
- Arthur Gervais and Hubert Ritzdorf and Mario Lucic and Srdjan Capkun
-
2015/495 ( PDF )
- Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
- Sondre Rønjom
-
2015/494 ( -- withdrawn -- )
- Cryptanalysis of the LSH and SHA-V Hash Functions
- Yonglin Hao and Hongbo Yu
-
2015/493 ( PDF )
- Fault Tolerant Infective Countermeasure for AES
- Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay
-
2015/492 ( PDF )
- Masking vs. Multiparty Computation: How Large is the Gap for AES?
- Vincent Grosso and François-Xavier Standaert and Sebastian Faust
-
2015/491 ( PDF )
- Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
- Nishanth Chandran and Melissa Chase and Feng-Hao Liu and Ryo Nishimaki and Keita Xagawa
-
2015/490 ( PDF )
- Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
- Sonam Devgan Kaul and Amit K. Awasthi
-
2015/489 ( PDF )
- Scalable and private media consumption with Popcorn
- Trinabh Gupta and Natacha Crooks and Srinath Setty and Lorenzo Alvisi and Michael Walfish
-
2015/488 ( PDF )
- On Black-Box Complexity of Universally Composable Security in the CRS model
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2015/487 ( PDF )
- Contention in Cryptoland: Obfuscation, Leakage and UCE
- Mihir Bellare, Igors Stepanovs and Stefano Tessaro
-
2015/486 ( PDF )
- How to detect unauthorised usage of a key
- Jiangshan Yu and Mark Ryan and Cas Cremers
-
2015/485 ( PDF )
- Turning Online Ciphers Off
- Elena Andreeva and Guy Barwell and Dan Page and Martijn Stam
-
2015/484 ( PDF )
- More Rounds, Less Security?
- Ritam Bhaumik and Avijit Dutta and Jian Guo and Jérémy Jean and Nicky Mouha and Ivica Nikolić
-
2015/483 ( PDF )
- Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
- Shi Bai and Adeline Langlois and Tancrède Lepoint and Damien Stehlé and Ron Steinfeld
-
2015/482 ( PDF )
- Time-release Protocol from Bitcoin and Witness Encryption for SAT
- Jia Liu and Flavio Garcia and Mark Ryan
-
2015/481 ( PDF )
- Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers
- Theodosis Mourouzis and Guangyan Song and Nicolas Courtois and Michalis Christofii
-
2015/480 ( PDF )
- Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
- Berry Schoenmakers, Meilof Veeningen, and Niels de Vreede
-
2015/479 ( PDF )
- A Provably Secure Group Signature Scheme from Code-Based Assumptions
- Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang
-
2015/478 ( PDF )
- How to Build Time-Lock Encryption
- Tibor Jager
-
2015/477 ( PDF )
- Authentication Key Recovery in Galois/Counter Mode (GCM)
- John Mattsson
-
2015/476 ( PDF )
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- Bart Mennink
-
2015/475 ( PDF )
- Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences
- Eleonora Guerrini and Laurent Imbert and Théo Winterhalter
-
2015/474 ( PDF )
- Fully Homomorphic Encryption without bootstrapping
- Masahiro Yagisawa
-
2015/473 ( PDF )
- VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS
- Mehak Khurana and Meena Kumari
-
2015/472 ( PDF )
- High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer
- Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart
-
2015/471 ( PDF )
- A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
- Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott
-
2015/470 ( PDF )
- On the power of Public-key Functional Encryption with Function Privacy
- Vincenzo Iovino and Karol Zebrowski
-
2015/469 ( PDF )
- Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
- Andrew Miller and Rob Jansen
-
2015/468 ( PDF )
- Practical Fully Homomorphic Encryption without Noise Reduction
- Dongxi Liu
-
2015/467 ( PDF )
- The Oblivious Machine - or: How to Put the C into MPC
- Marcel Keller
-
2015/466 ( PDF )
- Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
- Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang
-
2015/465 ( PDF )
- Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
- Hwajeong Seo and Zhe Liu and Johann Groschadl and Howon Kim
-
2015/464 ( PDF )
- Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
- Florian Tschorsch and Björn Scheuermann
-
2015/463 ( PDF )
- Multilinear Maps Using Random Matrix
- Gu Chunsheng
-
2015/462 ( PDF )
- Accelerating SWHE based PIRs using GPUs
- Wei Dai, Yarkın Doröz and Berk Sunar
-
2015/461 ( PDF )
- Cryptanalysis of the multilinear map on the ideal lattices
- Jung Hee Cheon and Changmin Lee
-
2015/460 ( PDF )
- Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
- Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi
-
2015/459 ( PDF )
- New Observation on Division Property
- Bing Sun and Xin Hai and Wenyu Zhang and Lei Cheng and Zhichao Yang
-
2015/458 ( PDF )
- A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS
- Sheena Sathyan and Shaji R S Professor
-
2015/457 ( PDF )
- Generic Conversions from CPA to CCA secure Functional Encryption
- Mridul Nandi and Tapas Pandit
-
2015/456 ( PDF )
- Collateral damage of Facebook Apps: an enhanced privacy scoring model
- Iraklis Symeonids, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel
-
2015/455 ( PDF )
- Secure Deduplication of Encrypted Data without Additional Independent Servers
- Jian Liu and N.Asokan and Benny Pinkas
-
2015/454 ( PDF )
- A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO
- Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
-
2015/453 ( PDF )
- An Optimization of Gu Map-1
- Yupu Hu and Huiwen Jia
-
2015/452 ( PDF )
- Masks will Fall Off -- Higher-Order Optimal Distinguishers
- Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul
-
2015/451 ( PDF )
- On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
- Sihong Su and Xiaohu Tang
-
2015/450 ( PDF )
- Adaptively Secure Computation with Partial Erasures
- Carmit Hazay and Yehuda Lindell and Arpita Patra
-
2015/449 ( PDF )
- On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions
- Ruoxin Zhao and Rui Zhang and Yongqiang Li and Baofeng Wu
-
2015/448 ( PDF )
- A Comment on Gu Map-1
- Yupu Hu and Huiwen Jia
-
2015/447 ( PDF )
- A New Model for Error-Tolerant Side-Channel Cube Attacks
- Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede
-
2015/446 ( PDF )
- On the Amortized Complexity of Zero-knowledge Protocols
- Ronald Cramer and Ivan Damgĺrd and Marcel Keller
-
2015/445 ( PDF )
- XLS is not a Strong Pseudorandom Permutation
- Mridul Nandi
-
2015/444 ( PDF )
- Revisiting Security Claims of XLS and COPA
- Mridul Nandi
-
2015/443 ( PDF )
- Security Evaluation and Enhancement of Bistable Ring PUFs
- Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, and Wayne Burleson
-
2015/442 ( PDF )
- Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
- Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
-
2015/441 ( PDF )
- FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
- Devu Manikantan Shila and Vivek Venugopalan and Cameron D Patterson
-
2015/440 ( PDF )
- Message-Locked Encryption for Lock-Dependent Messages
- Martín Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev
-
2015/439 ( PDF )
- On Concurrently Secure Computation in the Multiple Ideal Query Model
- Vipul Goyal and Abhishek Jain
-
2015/438 ( PDF )
- A Hybrid Approach for Proving Noninterference of Java Programs
- Ralf Kuesters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr
-
2015/437 ( PDF )
- A Note on the Unsoundness of vnTinyRAM's SNARK
- Bryan Parno
-
2015/436 ( PDF )
- On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks
- Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
-
2015/435 ( PDF )
- On the (Fast) Algebraic Immunity of Boolean Power Functions
- Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
-
2015/434 ( PDF )
- Dickson Polynomials that are Involutions
- Pascale Charpin and Sihem Mesnager and Sumanta Sarkar
-
2015/433 ( PDF )
- A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
- Wentao Zhang and. Zhenzhen Bao and. Vincent Rijmen and. Meicheng Liu
-
2015/432 ( -- withdrawn -- )
- Non-Repudiable Proofs of Storage in Cloud
- Hongyuan Wang and Liehuang Zhu and Yijia Lilong and Chang Xu
-
2015/431 ( PDF )
- Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
- Nuttapong Attrapadung and Goichiro Hanaoka and Shota Yamada
-
2015/430 ( PDF )
- Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
- Alex Biryukov and Daniel Dinu and Dmitry Khovratovich
-
2015/429 ( PDF )
- Cryptanalysis of Round-Reduced LED
- Ivica Nikolić and Lei Wang and Shuang Wu
-
2015/428 ( PDF )
- Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
- Philipp Jovanovic and Samuel Neves
-
2015/427 ( PDF )
- A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
- Mudit Bhargava and Ken Mai
-
2015/426 ( PDF )
- Complementing Feistel Ciphers
- Alex Biryukov and Ivica Nikolic
-
2015/425 ( PDF )
- Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
- Stefan Heyse and Ingo von Maurich and Tim Güneysu
-
2015/424 ( PDF )
- FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
- Begül Bilgin and Andrey Bogdanov and Miroslav Knežević and Florian Mendel and Qingju Wang
-
2015/423 ( PDF )
- On the Implementation of Unified Arithmetic on Binary Huff Curves
- Santosh Ghosh, Amit Kumar, Amitabh Das and Ingrid Verbauwhede
-
2015/422 ( PDF )
- Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
- Marina Blanton and Fattaneh Bayatbabolghani
-
2015/421 ( PDF )
- VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism
- Zhe Liu and Husen Wang and Johann Großschädl and Zhi Hu and Ingrid Verbauwhede
-
2015/420 ( PDF )
- What Information is Leaked under Concurrent Composition?
- Vipul Goyal and Divya Gupta and Abhishek Jain
-
2015/419 ( PDF )
- Non-invasive Spoofing Attacks for Anti-lock Braking Systems
- Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava
-
2015/418 ( PDF )
- Optimized Interpolation Attacks on LowMC
- Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang
-
2015/417 ( PDF )
- Order-Revealing Encryption and the Hardness of Private Learning
- Mark Bun and Mark Zhandry
-
2015/416 ( PDF )
- HETest: A Homomorphic Encryption Testing Framework
- Mayank Varia and Sophia Yakoubov and Yang Yang
-
2015/415 ( PDF )
- STRIBOB / WHIRLBOB Security Analysis Addendum
- Markku-Juhani O. Saarinen
-
2015/414 ( PDF )
- On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
- Mridul Nandi
-
2015/413 ( PDF )
- A study of Pair Encodings: Predicate Encryption in prime order groups
- Shashank Agrawal and Melissa Chase
-
2015/412 ( PDF )
- Survey on Cryptographic Obfuscation
- Máté Horváth
-
2015/411 ( PDF )
- Side-Channel Analysis of MAC-Keccak Hardware Implementations
- Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser
-
2015/410 ( PDF )
- Efficient Ring-LWE Encryption on 8-bit AVR Processors
- Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Großschädl and Howon Kim and Ingrid Verbauwhede
-
2015/409 ( PDF )
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Jie Chen and Romain Gay and Hoeteck Wee
-
2015/408 ( PDF )
- Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
- Franck Rondepierre
-
2015/407 ( PDF )
- Higher-order cryptanalysis of LowMC
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/406 ( PDF )
- Computation-Trace Indistinguishability Obfuscation and its Applications
- Yu-Chi Chen and Sherman S. M. Chow and Kai-Min Chung and Russell W. F. Lai and Wei-Kai Lin and Hong-Sheng Zhou
-
2015/405 ( PDF )
- Feasibility and Infeasibility of Secure Computation with Malicious PUFs
- Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schröder
-
2015/404 ( PDF )
- Zero-Knowledge Accumulators and Set Operations
- Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos
-
2015/403 ( PDF )
- Sequential Secret Sharing as a New Hierarchical Access Structure
- Mehrdad Nojoumian and Douglas R. Stinson
-
2015/402 ( PDF )
- Success through confidence: Evaluating the effectiveness of a side-channel attack
- Adrian Thillard and Emmanuel Prouff and Thomas Roche
-
2015/401 ( PDF )
- Simple Chosen-Ciphertext Security from Low-Noise LPN
- Eike Kiltz and Daniel Masny and Krzysztof Pietrzak
-
2015/400 ( PDF )
- Expiration and Revocation of Keys for Attribute-based Signatures (Full Version)
- Stephen R. Tate and Roopa Vishwanathan
-
2015/399 ( PDF )
- New attacks on RSA with Moduli $N=p^rq$
- Abderrahmane Nitaj and Tajjeeddine Rachidi
-
2015/398 ( PDF )
- Factoring RSA moduli with weak prime factors
- Abderrahmane Nitaj and Tajjeeddine Rachidi
-
2015/397 ( PDF )
- Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
- Peter Gazi and Jooyoung Lee and Yannick Seurin and John Steinberger and Stefano Tessaro
-
2015/396 ( PDF )
- Generalizing Homomorphic MACs for Arithmetic Circuits
- Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo
-
2015/395 ( PDF )
- Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys
- Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schröder and Mark Simkin
-
2015/394 ( PDF )
- Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
- Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
-
2015/393 ( PDF )
- Biclique cryptanalysis of MIBS-80 and PRESENT-80
- Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba
-
2015/392 ( PDF )
- Forgery Attacks on round-reduced ICEPOLE-128
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/391 ( PDF )
- On the Communication Complexity of Secure Computation
- Deepesh Data and Manoj M. Prabhakaran and Vinod M. Prabhakaran
-
2015/390 ( PDF )
- Dual System Encryption Framework in Prime-Order Groups
- Nuttapong Attrapadung
-
2015/389 ( PDF )
- Keccak
- Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
-
2015/388 ( PDF )
- Succinct Garbled RAM
- Ran Canetti and Justin Holmgren
-
2015/387 ( PDF )
- Method to Protect Passwords in Databases for Web Applications
- Scott Contini
-
2015/386 ( PDF )
- Privately Evaluating Decision Trees and Random Forests
- David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter
-
2015/385 ( PDF )
- Feasibility and Completeness of Cryptographic Tasks in the Quantum World
- Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas
-
2015/384 ( PDF )
- Condensed Unpredictability
- Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak
-
2015/383 ( PDF )
- Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
- Rafael Pass and abhi shelat
-
2015/382 ( PDF )
- High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers
- Thomas Pöppelmann and Tobias Oder and Tim Güneysu
-
2015/381 ( PDF )
- Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
- Sumit Chakraborty
-
2015/380 ( PDF )
- Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
- Céline Blondeau and Aslí Bay and Serge Vaudenay
-
2015/379 ( PDF )
- MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
- Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
-
2015/378 ( PDF )
- PAC Learning of Arbiter PUFs
- Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
-
2015/377 ( PDF )
- Cluster Computing in Zero Knowledge
- Alessandro Chiesa and Eran Tromer and Madars Virza
-
2015/376 ( PDF )
- Cryptography from Post-Quantum Assumptions
- Raza Ali Kazmi
-
2015/375 ( PDF )
- Bounds on surmising remixed keys
- Daniel R. L. Brown
-
2015/374 ( PDF )
- On the Impossibility of Tight Cryptographic Reductions
- Christoph Bader and Tibor Jager and Yong Li and Sven Schäge
-
2015/373 ( PDF )
- Publicly Verifiable Software Watermarking
- Aloni Cohen and Justin Holmgren and Vinod Vaikuntanathan
-
2015/372 ( PDF )
- Security Analysis of PRINCE
- Jeremy Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu
-
2015/371 ( PDF )
- Constant-Round MPC with Fairness and Guarantee of Output Delivery
- S. Dov Gordon and Feng-Hao Liu and Elaine Shi
-
2015/370 ( PDF )
- Financial Cryptography: Discriminatory Pricing Mechanism
- Sumit Chakraborty
-
2015/369 ( PDF )
- On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
- Nir Bitansky and Omer Paneth
-
2015/368 ( PDF )
- Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
- Evgeny Sidorov
-
2015/367 ( PDF )
- Improved Higher-Order Differential Attacks on MISTY1
- Achiya Bar-On
-
2015/366 ( PDF )
- A random zoo: sloth, unicorn, and trx
- Arjen K. Lenstra and Benjamin Wesolowski
-
2015/365 ( PDF )
- On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
- Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
-
2015/364 ( PDF )
- Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
- Qiang Tang and Jun Wang
-
2015/363 ( PDF )
- Optimally Secure Tweakable Blockciphers
- Bart Mennink
-
2015/362 ( PDF )
- Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem
- Claude Crepeau and Raza Ali Kazmi
-
2015/361 ( PDF )
- Computationally binding quantum commitments
- Dominique Unruh
-
2015/360 ( PDF )
- Achieving Differential Privacy with Bias-Control Limited Source
- Yanqing Yao, Zhoujun Li
-
2015/359 ( PDF )
- Higher-Order Side Channel Security and Mask Refreshing
- Jean-Sebastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
-
2015/358 ( PDF )
- On Generalized First Fall Degree Assumptions
- Yun-Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi
-
2015/357 ( PDF )
- A Group-theory Method to The Cycle Structures of Feedback Shift Registers
- Ming Li, Yupeng Jiang and Dongdai Lin
-
2015/356 ( PDF )
- Succinct Randomized Encodings and their Applications
- Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang
-
2015/355 ( PDF )
- Semantic Security and Indistinguishability in the Quantum World
- Tommaso Gagliardoni and Andreas Hülsing and Christian Schaffner
-
2015/354 ( PDF )
- SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node
- Jacek Samotyja and Kerstin Lemke-Rust and Markus Ullmann
-
2015/353 ( PDF )
- Matrix Computational Assumptions in Multilinear Groups
- Paz Morillo and Carla Ràfols and Jorge L. Villar
-
2015/352 ( PDF )
- Broadcast from Minicast Secure Against General Adversaries
- Pavel Raykov
-
2015/351 ( PDF )
- Database Outsourcing with Hierarchical Authenticated Data Structures
- Mohammad Etemad and Alptekin Küpçü
-
2015/350 ( PDF )
- Improving Local Collisions: New Attacks on Reduced SHA-256
- Florian Mendel and Tomislav Nad and Martin Schläffer
-
2015/349 ( PDF )
- Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
- Chang Liu and Liehuang Zhu and Jinjun Chen
-
2015/348 ( PDF )
- A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation
- Andreas Gornik and Amir Moradi and Jürgen Oehm and Christof Paar
-
2015/347 ( PDF )
- Fault Analysis of Kuznyechik
- Riham AlTawy and Onur Duman and Amr M. Youssef
-
2015/346 ( PDF )
- End-to-End Verifiable Elections in the Standard Model∗
- Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
-
2015/345 ( PDF )
- Two Round Mutliparty Computation via Multi-Key FHE
- Pratyay Mukherjee and Daniel Wichs
-
2015/344 ( PDF )
- Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
- Ryo Nishimaki and Daniel Wichs
-
2015/343 ( PDF )
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Michael Düll and Björn Haase and Gesine Hinterwälder and Michael Hutter and Christof Paar and Ana Helena Sánchez and Peter Schwabe
-
2015/342 ( PDF )
- Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext
- Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo
-
2015/341 ( PDF )
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
- Gilad Asharov and Gil Segev
-
2015/340 ( PDF )
- A New Distinguisher on Grain v1 for 106 rounds
- Santanu Sarkar
-
2015/339 ( PDF )
- Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation
- Berry Schoenmakers and Meilof Veeningen
-
2015/338 ( PDF )
- Cryptanalysis of a fair anonymity for the tor network
- Amadou Moctar Kane
-
2015/337 ( PDF )
- Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
- Sujoy Sinha Roy and Kimmo Järvinen and Frederik Vercauteren and Vassil Dimitrov and Ingrid Verbauwhede
-
2015/336 ( PDF )
- Arithmetic Cryptography
- Benny Applebaum and Jonathan Avron and Christina Brzuska
-
2015/335 ( PDF )
- Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
- Janaka Alawatugoda and Douglas Stebila and Colin Boyd
-
2015/334 ( PDF )
- On the Correlation Intractability of Obfuscated Pseudorandom Functions
- Ran Canetti and Yilei Chen and Leonid Reyzin
-
2015/333 ( PDF )
- Nearly Optimal Verifiable Data Streaming (Full Version)
- Johannes Krupp and Dominique Schröder and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan Nuernberger
-
2015/332 ( PDF )
- Security Intelligence for Broadcast : Threat Analytics
- Sumit Chakraborty
-
2015/331 ( PDF )
- A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
- Megha Agrawal and Donghoon Chang and Somitra Sanadhya
-
2015/330 ( PDF )
- Sponge based CCA2 secure asymmetric encryption for arbitrary length message
- Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
-
2015/329 ( PDF )
- PAGES - A Family of Block Ciiphers
- Dieter Schmidt
-
2015/328 ( PDF )
- Strongly Secure Authenticated Key Exchange from Ideal Lattices
- Xiaopeng Yang and Wenping Ma
-
2015/327 ( PDF )
- Some results on Sprout
- Subhadeep Banik
-
2015/326 ( PDF )
- Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata
- Saeideh Kabirirad and Hamideh Hajiabadi
-
2015/325 ( PDF )
- Secure Multi-Party Computation with Identifiable Abort
- Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas
-
2015/324 ( PDF )
- A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys
- Divesh Aggarwal and Alexander Golovnev
-
2015/323 ( -- withdrawn -- )
- Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange
- Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan
-
2015/322 ( PDF )
- Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers
- Peeter Laud and Alisa Pankova
-
2015/321 ( -- withdrawn -- )
- Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles
- Paolo D'Arco and Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Clauido Soriente
-
2015/320 ( PDF )
- Hybrid Publicly Verifiable Computation
- James Alderman and Christian Janson and Carlos Cid and Jason Crampton
-
2015/319 ( PDF )
- Point Decomposition Problem in Binary Elliptic Curves
- Koray Karabina
-
2015/318 ( PDF )
- Practical Divisible E-Cash
- Patrick Märtens
-
2015/317 ( PDF )
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
- Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti
-
2015/316 ( PDF )
- Non-malleability under Selective Opening Attacks: Implication and Separation
- Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen
-
2015/315 ( PDF )
- Query-Complexity Amplification for Random Oracles
- Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
-
2015/314 ( PDF )
- Certificate-Based Encryption Resilient to Key Leakage
- Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and Xinyi Huang and Yang Xiang
-
2015/313 ( PDF )
- Recovering Short Generators of Principal Ideals in Cyclotomic Rings
- Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev
-
2015/312 ( PDF )
- Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
- Pierre-Alain Fouque and Thomas Vannet
-
2015/311 ( PDF )
- Tagged One-Time Signatures: Tight Security and Optimal Tag Size
- Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo
-
2015/310 ( PDF )
- New algorithm for the discrete logarithm problem on elliptic curves
- Igor Semaev
-
2015/309 ( PDF )
- TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation
- Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
-
2015/308 ( PDF )
- Authenticated Key Exchange over Bitcoin
- Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao
-
2015/307 ( PDF )
- Black-Box Garbled RAM
- Sanjam Garg and Steve Lu and Rafail Ostrovsky
-
2015/306 ( PDF )
- Analysis of VAES3 (FF2)
- Morris Dworkin and Ray Perlner
-
2015/305 ( PDF )
- Foundations of Reconfigurable PUFs (Full Version)
- Jonas Schneider and Dominique Schröder
-
2015/304 ( PDF )
- Communication-Optimal Proactive Secret Sharing for Dynamic Groups
- Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky
-
2015/303 ( PDF )
- The Design Space of Lightweight Cryptography
- Nicky Mouha
-
2015/302 ( PDF )
- Boosting OMD for Almost Free Authentication of Associated Data
- Reza Reyhanitabar and Serge Vaudenay and Damian Vizár
-
2015/301 ( PDF )
- Cryptanalysis of GGH Map
- Yupu Hu and Huiwen Jia
-
2015/300 ( PDF )
- Scalable Divisible E-cash
- Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
-
2015/299 ( PDF )
- A Note on the Lindell-Waisbard Private Web Search Scheme
- Zhengjun Cao and Lihua Liu
-
2015/298 ( PDF )
- Random Linear Code Based Public Key Encryption Scheme RLCE
- Yongge Wang
-
2015/297 ( PDF )
- Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
- Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao
-
2015/296 ( PDF )
- The Uniform Distribution of Sequences Generated by Iteration of Polynomials
- Emil Lerner
-
2015/295 ( PDF )
- Security Analysis of Re-Encryption RPC Mix Nets
- Ralf Kuesters and Tomasz Truderung
-
2015/294 ( PDF )
- Accelerating Somewhat Homomorphic Evaluation using FPGAs
- Erdinç Öztürk and Yarkın Doröz and Berk Sunar and Erkay Savaş
-
2015/293 ( PDF )
- Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2015/292 ( PDF )
- Secret Shared Random Access Machine
- Shlomi Dolev and Yin Li
-
2015/291 ( PDF )
- Two Operands of Multipliers in Side-Channel Attack
- Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki
-
2015/290 ( PDF )
- Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
- Joseph A. Akinyele and Christina Garman and Susan Hohenberger
-
2015/289 ( PDF )
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
- Muhammed F. Esgin and Orhun Kara
-
2015/288 ( PDF )
- Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
- Aydin Aysu and Patrick Schaumont
-
2015/287 ( PDF )
- A quantum-safe circuit-extension handshake for Tor
- John Schanck and William Whyte and Zhenfei Zhang
-
2015/286 ( PDF )
- Impossible Differential Cryptanalysis of Reduced Round SIMON
- Zhan Chen and Ning Wang and Xiaoyun Wang
-
2015/285 ( PDF )
- Improved Linear Trails for the Block Cipher Simon
- Tomer Ashur
-
2015/284 ( PDF )
- A Note on Scalar Multiplication Using Division Polynomials
- Binglong~Chen, Chuangqiang~Hu and~Chang-An~Zhao
-
2015/283 ( PDF )
- Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data
- Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia
-
2015/282 ( PDF )
- Non-Interactive Secure Computation Based on Cut-and-Choose
- Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva
-
2015/281 ( PDF )
- Secret Sharing and Statistical Zero Knowledge
- Vinod Vaikuntanathan and Prashant Nalini Vasudevan
-
2015/280 ( PDF )
- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
- Jonathan Katz and Aishwarya Thiruvengadam and Hong-Sheng Zhou
-
2015/279 ( PDF )
- Improved Cryptanalysis of AES-like Permutations
- Jérémy Jean and Maria Naya-Plasencia and Thomas Peyrin
-
2015/278 ( PDF )
- Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
- Sébastien Canard and David Pointcheval and Olivier Sanders
-
2015/277 ( PDF )
- One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games
- Marco Tomamichel and Serge Fehr and Jędrzej Kaniewski and Stephanie Wehner
-
2015/276 ( PDF )
- An Improvment of the Elliptic Net Algorithm
- Binglong Chen and Chang-An Zhao
-
2015/275 ( PDF )
- MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems
- Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai
-
2015/274 ( PDF )
- Low Depth Circuits for Efficient Homomorphic Sorting
- Gizem S. Çetin and Yarkın Doröz and Berk Sunar and Erkay Savaş
-
2015/273 ( PDF )
- Dual System Encryption via Predicate Encodings
- Hoeteck Wee
-
2015/272 ( PDF )
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Baodong Qin and Shengli Liu
-
2015/271 ( PDF )
- Toward Secure Implementation of McEliece Decryption
- Mariya Georgieva and Frédéric de Portzamparc
-
2015/270 ( PDF )
- Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk
- Markus Dichtl
-
2015/269 ( PDF )
- Ideal Multilinear Maps Based on Ideal Lattices
- Gu Chunsheng
-
2015/268 ( PDF )
- Improved Top-Down Techniques in Differential Cryptanalysis
- Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir
-
2015/267 ( PDF )
- The Simplest Protocol for Oblivious Transfer
- Tung Chou and Claudio Orlandi
-
2015/266 ( PDF )
- GRECS: Graph Encryption for Approximate Shortest Distance Queries
- Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
-
2015/265 ( PDF )
- Password Hashing Competition - Survey and Benchmark
- George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas
-
2015/264 ( PDF )
- BlindBox: Deep Packet Inspection over Encrypted Traffic
- Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy
-
2015/263 ( PDF )
- Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
- Ethan Heilman. Alison Kendler, Aviv Zohar, Sharon Goldberg
-
2015/262 ( PDF )
- A look at the PGP ecosystem through the key server data
- Hanno Böck
-
2015/261 ( PDF )
- Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
-
2015/260 ( PDF )
- Computational Aspects of Correlation Power Analysis
- Paul Bottinelli and Joppe W. Bos
-
2015/259 ( PDF )
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES
- Patrick Derbez and Pierre-Alain Fouque
-
2015/258 ( PDF )
- Lightweight MDS Involution Matrices
- Siang Meng Sim and Khoongming Khoo and Frédérique Oggier and Thomas Peyrin
-
2015/257 ( PDF )
- Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
- Vadim Lyubashevsky and Thomas Prest
-
2015/256 ( PDF )
- Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
- Yang Lu, Quanling Zhang, Jiguo Li
-
2015/255 ( PDF )
- A comprehensive analysis of game-based ballot privacy definitions
- David Bernhard and Veronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi
-
2015/254 ( PDF )
- Tornado Attack on RC4 with Applications to WEP \& WPA
- Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux
-
2015/253 ( PDF )
- Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers
- Haiyan Wang , Dongdai Lin
-
2015/252 ( PDF )
- Linearization of Multi-valued Nonlinear Feedback Shift Registers
- Haiyan Wang, Jianghua Zhong, Dongdai Lin
-
2015/251 ( PDF )
- How to Construct UC-Secure Searchable Symmetric Encryption Scheme
- Kaoru Kurosawa and Yasuhiro Ohtaki
-
2015/250 ( PDF )
- Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys
- Junji Shikata
-
2015/249 ( PDF )
- Improved (Hierarchical) Inner-Product Encryption from Lattices
- Keita Xagawa
-
2015/248 ( PDF )
- Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
- Ryo Nishimaki and Keita Xagawa
-
2015/247 ( PDF )
- Subgroup security in pairing-based cryptography
- Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and Geovandro C. C. F. Pereira and Gustavo Zanon
-
2015/246 ( PDF )
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
- Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee
-
2015/245 ( PDF )
- Practical Attacks on the Round-reduced PRINCE
- Pawel Morawiecki
-
2015/244 ( PDF )
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
- Jeremy Jean and Ivica Nikolic
-
2015/243 ( PDF )
- Reliable Message Transmission under Partial Knowledge
- Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
-
2015/242 ( PDF )
- Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
- Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
-
2015/241 ( PDF )
- Espresso: A Stream Cipher for 5G Wireless Communication Systems
- Elena Dubrova and Martin Hell
-
2015/240 ( PDF )
- Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
- Alex Biryukov, Patrick Derbez and Léo Perrin
-
2015/239 ( PDF )
- Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
- Patrick Derbez and Léo Perrin
-
2015/238 ( PDF )
- One Time Programs with Limited Memory
- Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michał Zając
-
2015/237 ( PDF )
- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
- Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers
-
2015/236 ( PDF )
- Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
- Subhamoy Maitra and Santanu Sarkar and Anubhab Baksi and Pramit Dey
-
2015/235 ( PDF )
- Performance and Security Improvements for Tor: A Survey
- Mashael AlSabah and Ian Goldberg
-
2015/234 ( PDF )
- Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
- Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
-
2015/233 ( PDF )
- Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
- Ben Smyth and Steven Frink and Michael R. Clarkson
-
2015/232 ( PDF )
- Cryptanalysis of Full Sprout
- Virginie Lallemand and María Naya-Plasencia
-
2015/231 ( PDF )
- A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
- Yonglin Hao
-
2015/230 ( PDF )
- W-SPS: Designing a Wide-Area Secure Positioning System
- Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun
-
2015/229 ( PDF )
- Improving GGH Public Key Scheme Using Low Density Lattice Codes
- Reza Hooshmand
-
2015/228 ( PDF )
- Leakage-Resilient Cryptography with Key Derived from Sensitive Data
- Konrad Durnoga and Tomasz Kazana and Michał Zając and Maciej Zdanowicz
-
2015/227 ( PDF )
- Tradeoff Cryptanalysis of Memory-Hard Functions
- Alex Biryukov and Dmitry Khovratovich
-
2015/226 ( PDF )
- Secure Physical Computation using Disposable Circuits
- Ben Fisch and Daniel Freund and Moni Naor
-
2015/225 ( PDF )
- Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2015/224 ( PDF )
- GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records
- Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder
-
2015/223 ( PDF )
- New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers
- Anubhab Baksi and Subhamoy Maitra and Santanu Sarkar
-
2015/222 ( PDF )
- Towards Understanding the Known-Key Security of Block Ciphers
- Elena Andreeva, Andrey Bogdanov, and Bart Mennink
-
2015/221 ( PDF )
- Tighter, faster, simpler side-channel security evaluations beyond computing power
- Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal
-
2015/220 ( PDF )
- Key Homomorphic PRFs and Their Applications
- Dan Boneh and Kevin Lewi and Hart Montgomery and Ananth Raghunathan
-
2015/219 ( PDF )
- Efficient Format Preserving Encrypted Databases
- Prakruti C, Sashank Dara and V.N. Muralidhara
-
2015/218 ( PDF )
- Efficient k-out-of-n oblivious transfer protocol
- wang qinglong
-
2015/217 ( PDF )
- Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles
- Subhamoy Maitra and Goutam Paul and Willi Meier
-
2015/216 ( PDF )
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
- Eike Kiltz and Hoeteck Wee
-
2015/215 ( PDF )
- A revocable anonymity in Tor
- Amadou Moctar Kane
-
2015/214 ( PDF )
- GCM Security Bounds Reconsidered
- Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata
-
2015/213 ( PDF )
- Attribute-Based Versions of Schnorr and ElGamal
- Javier Herranz
-
2015/212 ( PDF )
- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
- Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger
-
2015/211 ( PDF )
- Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
- Thijs Laarhoven and Benne de Weger
-
2015/210 ( PDF )
- Secure and Efficient Initialization and Authentication Protocols for SHIELD
- Chenglu Jin and Marten van Dijk
-
2015/209 ( PDF )
- Triathlon of Lightweight Block Ciphers for the Internet of Things
- Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Léo Perrin and Johann Großschädl and Alex Biryukov
-
2015/208 ( PDF )
- Towards Secure Distance Bounding
- Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay
-
2015/207 ( PDF )
- Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
- Tobias Schneider and Amir Moradi
-
2015/206 ( PDF )
- Efficient and Secure Delegation of Group Exponentiation to a Single Server
- Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain
-
2015/205 ( PDF )
- Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
- Jooyoung Lee
-
2015/204 ( PDF )
- Leakage-Resilient Symmetric Encryption via Re-keying
- Michel Abdalla and Sonia Belaďd and Pierre-Alain Fouque
-
2015/203 ( PDF )
- Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
- Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim Güneysu
-
2015/202 ( PDF )
- Adaptively Secure Coin-Flipping, Revisited
- Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park
-
2015/201 ( PDF )
- Statistical Properties of Multiplication mod $2^n$
- A. Mahmoodi Rishakani and S. M. Dehnavi and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
-
2015/200 ( PDF )
- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
- Alexander Wild and Amir Moradi and Tim Güneysu
-
2015/199 ( PDF )
- Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
- Amir Moradi and Gesine Hinterwälder
-
2015/198 ( PDF )
- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
- Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim Güneysu
-
2015/197 ( PDF )
- SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
- N. Nalla Anandakumar
-
2015/196 ( PDF )
- Tighter Reductions for Forward-Secure Signature Schemes
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2015/195 ( PDF )
- Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists
- Stephanie Bayer and Jens Groth
-
2015/194 ( PDF )
- Practical Homomorphic MACs for Arithmetic Circuits
- Dario Catalano and Dario Fiore
-
2015/193 ( PDF )
- Improving Modular Inversion in RNS using the Plus-Minus Method
- Karim Bigou and Arnaud Tisserand
-
2015/192 ( PDF )
- Memory-saving computation of the pairing final exponentiation on BN curves
- Sylvain DUQUESNE and Loubna GHAMMAM
-
2015/191 ( PDF )
- iDASH Secure Genome Analysis Competition Using ObliVM
- Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang and Elaine Shi
-
2015/190 ( PDF )
- Multi-Client Non-Interactive Verifiable Computation
- Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid
-
2015/189 ( PDF )
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Vizár
-
2015/188 ( PDF )
- New Techniques for SPHFs and Efficient One-Round PAKE Protocols
- Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2015/187 ( PDF )
- How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
- Juan Garay and Jonathan Katz and Bjoern Tackmann and Vassilis Zikas
-
2015/186 ( PDF )
- Higher Order Differential Analysis of NORX
- Sourav Das and Subhamoy Maitra and and Willi Meier
-
2015/185 ( PDF )
- Remotely Managed Logic Built-In Self-Test for Secure M2M Communications
- Elena Dubrova and Mats Näslund and Gunnar Carlsson and John Fornehed and Ben Smeets
-
2015/184 ( PDF )
- Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
- Céline Blondeau and Kaisa Nyberg
-
2015/183 ( PDF )
- New Links Between Differential and Linear Cryptanalysis
- Céline Blondeau and Kaisa Nyberg
-
2015/182 ( PDF )
- Tweakable Blockciphers with Asymptotically Optimal Security
- Rodolphe Lampe and Yannick Seurin
-
2015/181 ( PDF )
- Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
- Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda Alkhzaimi and Chao Li
-
2015/180 ( PDF )
- Key-Homomorphic Constrained Pseudorandom Functions
- Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens
-
2015/179 ( PDF )
- A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
- Palash Sarkar and Shashank Singh
-
2015/178 ( PDF )
- On Time and Order in Multiparty Computation
- Pablo Daniel Azar and Shafi Goldwasser and Sunoo Park
-
2015/177 ( PDF )
- On the Security of an Efficient Group Key Agreement Scheme for MANETs
- Purushothama B R and Nishat Koti
-
2015/176 ( PDF )
- Key Recovery for LWE in Polynomial Time
- Kim Laine and Kristin Lauter
-
2015/175 ( PDF )
- Trivial Nonce-Misusing Attack on Pure OMD
- Tomer Ashur and Bart Mennink
-
2015/174 ( PDF )
- A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia
- Chenyang Tu and Neng Gao and Zeyi Liu and Lei Wang and Zongbin Liu and Bingke Ma
-
2015/173 ( PDF )
- Indistinguishability Obfuscation from Compact Functional Encryption
- Prabhanjan Ananth and Abhishek Jain
-
2015/172 ( PDF )
- Silent Simon: A Threshold Implementation under 100 Slices
- Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth
-
2015/171 ( PDF )
- Authenticated Network Time Synchronization
- Benjamin Dowling and Douglas Stebila and Greg Zaverucha
-
2015/170 ( PDF )
- Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
- Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer
-
2015/169 ( PDF )
- Short Schnorr signatures require a hash function with more than just random-prefix resistance
- Daniel R. L. Brown
-
2015/168 ( PDF )
- More PS and H-like bent functions
- C. Carlet
-
2015/167 ( PDF )
- Post-Zeroizing Obfuscation: The case of Evasive Circuits
- Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry
-
2015/166 ( PDF )
- Naturally Rehearsing Passwords
- Jeremiah Blocki and Manuel Blum and Anupam Datta
-
2015/165 ( PDF )
- The Cryptographic Hardness of Random Local Functions -- Survey
- Benny Applebaum
-
2015/164 ( PDF )
- Constant Size Ring Signature Without Random Oracle
- Priyanka Bose and Dipanjan Das and C. Pandu Rangan
-
2015/163 ( PDF )
- Indistinguishability Obfuscation from Functional Encryption
- Nir Bitansky and Vinod Vaikuntanathan
-
2015/162 ( PDF )
- New Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2015/161 ( PDF )
- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks
- Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
-
2015/160 ( PDF )
- Differential-Linear Cryptanalysis of ICEPOLE
- Tao Huang; Ivan Tjuawinata; Hongjun Wu
-
2015/159 ( PDF )
- Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
- Shengbao Wu; Hongjun Wu; Tao Huang; Mingsheng Wang; Wenling Wu
-
2015/158 ( PDF )
- Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
- Zvika Brakerski and Ilan Komargodski and Gil Segev
-
2015/157 ( PDF )
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Nuttapong Attrapadung and Shota Yamada
-
2015/156 ( PDF )
- Building Lossy Trapdoor Functions from Lossy Encryption
- Brett Hemenway and Rafail Ostrovsky
-
2015/155 ( PDF )
- On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
- Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor
-
2015/154 ( PDF )
- Circuits Resilient to Additive Attacks with Applications to Secure Computation
- Daniel Genkin and Yuval Ishai and Manoj M. Prabhakaran and Amit Sahai and Eran Tromer
-
2015/153 ( PDF )
- Functional Encryption from (Small) Hardware Tokens
- Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou
-
2015/152 ( PDF )
- Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults
- Ronan Lashermes and Jacques Fournier and Louis Goubin
-
2015/151 ( PDF )
- Bad directions in cryptographic hash functions
- Daniel J. Bernstein and Andreas Hülsing and Tanja Lange and Ruben Niederhagen
-
2015/150 ( PDF )
- Insynd: Privacy-Preserving Transparency Logging Using Balloons
- Tobias Pulls and Roel Peeters
-
2015/149 ( PDF )
- Cryptanalysis of HMAC/NMAC-Whirlpool
- Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu
-
2015/148 ( PDF )
- On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
- Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann
-
2015/147 ( PDF )
- High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
- Lionel Rivičre and Zakaria Najm and Pablo Rauzy and Jean-Luc Danger and Julien Bringer and Laurent Sauvage
-
2015/146 ( PDF )
- New Attacks on Feistel Structures with Improved Memory Complexities
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2015/145 ( PDF )
- Observations on the SIMON block cipher family
- Stefan Kölbl and Gregor Leander and Tyge Tiessen
-
2015/144 ( PDF )
- Security of the AES with a Secret S-box
- Tyge Tiessen and Lars R. Knudsen and Stefan Kölbl and Martin M. Lauridsen
-
2015/143 ( PDF )
- Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs
- Erich Wenger and Paul Wolfger
-
2015/142 ( PDF )
- Multi-Client Verifiable Computation with Stronger Security Guarantees
- S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
-
2015/141 ( PDF )
- Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method
- Céline Blondeau and Marine Minier
-
2015/140 ( PDF )
- The Random Oracle Model: A Twenty-Year Retrospective
- Neal Koblitz and Alfred Menezes
-
2015/139 ( PDF )
- Performance Analysis of Some Password Hashing Schemes
- Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
-
2015/138 ( PDF )
- A Practical Key Exchange for the Internet using Lattice Cryptography
- Vikram Singh
-
2015/137 ( PDF )
- Multi-keyword Similarity Search Over Encrypted Cloud Data
- Mikhail Strizhov and Indrajit Ray
-
2015/136 ( PDF )
- Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs
- Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. L. M. Barreto
-
2015/135 ( PDF )
- Generalizing Efficient Multiparty Computation
- Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp
-
2015/134 ( PDF )
- From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions
- Pierre Karpman
-
2015/133 ( PDF )
- Private Computation on Encrypted Genomic Data
- Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig
-
2015/132 ( PDF )
- Homomorphic Computation of Edit Distance
- Jung Hee Cheon and Miran Kim and Kristin Lauter2
-
2015/131 ( PDF )
- On Lightweight Stream Ciphers with Shorter Internal States
- Frederik Armknecht, Vasily Mikhalev
-
2015/130 ( PDF )
- How to Bootstrap Anonymous Communication
- Sune K. Jakobsen and Claudio Orlandi
-
2015/129 ( PDF )
- Block-wise Non-Malleable Codes
- Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay
-
2015/128 ( PDF )
- Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
- Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro
-
2015/127 ( PDF )
- Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
- Ricardo Dahab and Steven Galbraith and Eduardo Morais
-
2015/126 ( PDF )
- Perfect Structure on the Edge of Chaos
- Nir Bitansky and Omer Paneth and Daniel Wichs
-
2015/125 ( PDF )
- Multilinear Pseudorandom Functions
- Aloni Cohen and Justin Holmgren
-
2015/124 ( PDF )
- GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs
- Alexander Wild and Amir Moradi and Tim Güneysu
-
2015/123 ( PDF )
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Dennis Hofheinz and Jessica Koch and Christoph Striecks
-
2015/122 ( PDF )
- Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
- Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
-
2015/121 ( PDF )
- Multi-Client Oblivious RAM secure against Malicious Servers
- Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
-
2015/120 ( PDF )
- Reconfigurable LUT: Boon or Bane for Secure Applications
- Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean-Luc Danger and Debdeep Mukhopadhyay
-
2015/119 ( PDF )
- Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device
- Alexandre Duc and Sebastian Faust and François-Xavier Standaert
-
2015/118 ( PDF )
- Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
- Takahiro Matsuda and Goichiro Hanaoka
-
2015/117 ( PDF )
- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy
- Maciej Skorski
-
2015/116 ( PDF )
- Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs
- Riadh Brinci and Walid Khmiri and Mefteh Mbarek and Abdellatif Ben Rabâa and Ammar Bouallčgue
-
2015/115 ( PDF )
- Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors
- Muhammad Yasir Malik
-
2015/114 ( PDF )
- Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
- Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
-
2015/113 ( PDF )
- How to Compress Homomorphic Ciphertexts
- Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancrčde Lepoint and María Naya-Plasencia and Pascal Paillier and Renaud Sirdey
-
2015/112 ( PDF )
- Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
- Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura
-
2015/111 ( PDF )
- The Multivariate Hidden Number Problem
- Steven D. Galbraith and Barak Shani
-
2015/110 ( PDF )
- sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices
- Shijun Zhao and Qianying Zhang
-
2015/108 ( PDF )
- TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM
- Lucjan Hanzlik and Przemysław Kubiak and Mirosław Kutyłowski
-
2015/107 ( PDF )
- Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
- Attila A. Yavuz and Jorge Guajardo
-
2015/106 ( PDF )
- Provably weak instances of Ring-LWE
- Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
-
2015/105 ( PDF )
- Inner Product Masking Revisited
- Josep Balasch and Sebastian Faust and Benedikt Gierlichs
-
2015/104 ( PDF )
- Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
- Rafael Dowsley and Jörn Müller-Quade and Tobias Nilges
-
2015/103 ( PDF )
- Mergeable Functional Encryption
- Vincenzo Iovino and Karol Zebrowski
-
2015/102 ( PDF )
- GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
- Shay Gueron and Yehuda Lindell
-
2015/101 ( PDF )
- Multi-Key Security: The Even-Mansour Construction Revisited
- Nicky Mouha and Atul Luykx
-
2015/100 ( PDF )
- Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA
- Christian Wittke and Zoya Dyka and Peter Langendoerfer
-
2015/099 ( PDF )
- Universally Composable Firewall Architectures using Trusted Hardware
- Dirk Achenbach and Jörn Müller-Quade and Jochen Rill
-
2015/098 ( PDF )
- Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
- Shantian Cheng and Juanyang Zhang
-
2015/097 ( PDF )
- Surreptitiously Weakening Cryptographic Systems
- Bruce Schneier and Matthew Fredrikson and Tadayoshi Kohno and Thomas Ristenpart
-
2015/096 ( PDF )
- A Meet in the Middle Attack on Reduced Round Kuznyechik
- Riham AlTawy and Amr M. Youssef
-
2015/095 ( PDF )
- Rotational Cryptanalysis of ARX Revisited
- Dmitry Khovratovich and Ivica Nikolic and Josef Pieprzyk and Przemyslaw Sokolowski and Ron Steinfeld
-
2015/094 ( PDF )
- Some New Results on Binary Polynomial Multiplication
- Murat Cenk and M. Anwar Hasan
-
2015/093 ( PDF )
- Generalization of Statistical Criteria for Sboxes
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
-
2015/092 ( PDF )
- TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY
- Grasha Jacob, Dr. A. Murugan, Irine Viola
-
2015/091 ( PDF )
- Related-Key Forgeries for Prřst-OTR
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/090 ( PDF )
- Structural Evaluation by Generalized Integral Property
- Yosuke Todo
-
2015/089 ( PDF )
- On the security margin of MAC striping
- Thomas Eisenbarth and Aaron Meyerowitz and Rainer Steinwandt
-
2015/088 ( PDF )
- Structural Weaknesses in the Open Smart Grid Protocol
- Klaus Kursawe and Christiane Peters
-
2015/087 ( PDF )
- Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
- David Derler and Christian Hanser and Daniel Slamanig
-
2015/086 ( PDF )
- Practical Compact E-Cash with Arbitrary Wallet Size
- Patrick Märtens
-
2015/085 ( PDF )
- On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
- Anne Canteaut and Joëlle Roué
-
2015/084 ( PDF )
- On the Disadvantages of Pairing-based Cryptography
- Zhengjun Cao and Lihua Liu
-
2015/083 ( PDF )
- Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
- Massimo Chenal and Qiang Tang
-
2015/082 ( PDF )
- On the Difficulty of Securing Web Applications using CryptDB
- İhsan Haluk AKIN and Berk Sunar
-
2015/081 ( PDF )
- Amortizing Garbled Circuits
- Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff
-
2015/080 ( PDF )
- The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
- Feng Hao and Xun Yi and Liqun Chen and Siamak F. Shahandashti
-
2015/079 ( PDF )
- On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
- Jiqiang Lu
-
2015/078 ( PDF )
- Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters
- GU Chun-xiang and. Xin Dan and. ZHENG Yong-hui and. KANG Yuan-ji
-
2015/077 ( PDF )
- On the Primary Constructions of Vectorial Boolean Bent Functions
- Yuwei Xu and Chuankun Wu
-
2015/076 ( PDF )
- Fully Structure-Preserving Signatures and Shrinking Commitments
- Masayuki Abe and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi
-
2015/075 ( PDF )
- Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
- Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen
-
2015/074 ( PDF )
- Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
- Gilles Barthe and Juan Manuel Crespo and Yassine Lakhnech and Benedikt Schmidt
-
2015/073 ( PDF )
- Oblivious Network RAM
- Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin
-
2015/072 ( PDF )
- Non-Interactive Zero-Knowledge Proofs of Non-Membership
- Olivier Blazy and Céline Chevalier and Damien Vergnaud
-
2015/071 ( PDF )
- Factoring N=p^r q^s for Large r and s
- Jean-Sebastien Coron and Jean-Charles Faugere and Guenael Renault and Rina Zeitoun
-
2015/070 ( PDF )
- The Sum Can Be Weaker Than Each Part
- Gaëtan Leurent and Lei Wang
-
2015/069 ( PDF )
- On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
- Benoît Cogliati and Yannick Seurin
-
2015/068 ( PDF )
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- Gregor Leander and Brice Minaud and Sondre Rřnjom
-
2015/067 ( PDF )
- An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
- Susumu Kiyoshima
-
2015/066 ( PDF )
- Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
- Tobias Schneider and Amir Moradi and Tim Güneysu
-
2015/065 ( PDF )
- A lightweight-friendly modifcation of GOST block cipher
- Andrey Dmukh and Denis Dygin and Grigory Marshalko
-
2015/064 ( PDF )
- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
- Handan Kılınç and Alptekin Küpçü
-
2015/063 ( PDF )
- CamlCrush: A PKCS\#11 Filtering Proxy
- R. Benadjila and T. Calderon and M. Daubignard
-
2015/062 ( PDF )
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
- Yuval Yarom and Gefei Li and Damith C. Ranasinghe
-
2015/061 ( PDF )
- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
- Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
-
2015/060 ( PDF )
- Verified Proofs of Higher-Order Masking
- Gilles Barthe and Sonia Belaďd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub
-
2015/059 ( PDF )
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
- Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
-
2015/058 ( PDF )
- Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
- Berry Schoenmakers and Meilof Veeningen
-
2015/057 ( PDF )
- Cold Boot Attacks in the Discrete Logarithm Setting
- Bertram Poettering and Dale L. Sibborn
-
2015/056 ( PDF )
- Better Algorithms for LWE and LWR
- Alexandre Duc and Florian Tramčr and Serge Vaudenay
-
2015/055 ( PDF )
- Richer Efficiency/Security Trade-offs in 2PC
- Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek
-
2015/054 ( PDF )
- Non-committing encryption from $\Phi$-hiding
- Brett Hemenway and Rafail Ostrovsky and Alon Rosen
-
2015/053 ( PDF )
- Tight Bounds for Keyed Sponges and Truncated CBC
- Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
-
2015/052 ( PDF )
- Interactive Message-Locked Encryption and Secure Deduplication
- Mihir Bellare and Sriram Keelveedhi
-
2015/051 ( PDF )
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- Li Lin, Wenling Wu
-
2015/050 ( PDF )
- Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
- Carla Rŕfols
-
2015/049 ( PDF )
- On Solving Lpn using BKW and Variants
- Sonia Bogos and Florian Tramer and Serge Vaudenay
-
2015/048 ( PDF )
- On Obfuscation with Random Oracles
- Ran Canetti and Yael Tauman Kalai and Omer Paneth
-
2015/047 ( PDF )
- Linearly Homomorphic Encryption from DDH
- Guilhem Castagnos and Fabien Laguillaumie
-
2015/046 ( PDF )
- On the concrete hardness of Learning with Errors
- Martin R. Albrecht and Rachel Player and Sam Scott
-
2015/045 ( PDF )
- Reliable Information Extraction for Single Trace Attacks
- Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
-
2015/044 ( PDF )
- Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
- Binanda Sengupta and Abhijit Das
-
2015/043 ( PDF )
- Group Signature with Deniability: How to Disavow a Signature
- Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka
-
2015/042 ( PDF )
- High Performance Lattice-based CCA-secure Encryption
- Rachid El~Bansarkhani and Johannes Buchmann
-
2015/041 ( PDF )
- Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP
- Artur Mariano and Thijs Laarhoven and Christian Bischof
-
2015/040 ( PDF )
- Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
- Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2015/039 ( PDF )
- Type-Based Verification of Electronic Voting Protocols
- Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling
-
2015/038 ( PDF )
- Aggregate Pseudorandom Functions and Connections to Learning
- Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan
-
2015/037 ( PDF )
- Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
- Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2015/036 ( PDF )
- Faster software for fast endomorphisms
- Billy Bob Brumley
-
2015/035 ( PDF )
- Cryptographically Secure CRC for Lightweight Message Authentication
- Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist
-
2015/034 ( PDF )
- Suit up! Made-to-Measure Hardware Implementations of Ascon
- Hannes Groß and Erich Wenger and Christoph Dobraunig and Christoph Ehrenhöfer
-
2015/033 ( PDF )
- On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
- Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel
-
2015/032 ( PDF )
- Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF
- Zvika Brakerski and Vinod Vaikuntanathan
-
2015/031 ( PDF )
- Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence
- Kai-Min Chung and Rafael Pass
-
2015/030 ( PDF )
- Cryptanalysis of Ascon
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schläffer
-
2015/029 ( PDF )
- Predicate Encryption for Circuits from LWE
- Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
-
2015/028 ( PDF )
- Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$)
- Jeremy Maitin-Shepard
-
2015/027 ( PDF )
- On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption
- Adam Smith and Ye Zhang
-
2015/026 ( PDF )
- A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2015/025 ( PDF )
- Obfuscating Circuits via Composite-Order Graded Encoding
- Benny Applebaum and Zvika Brakerski
-
2015/024 ( PDF )
- Non-Abelian Analogs of Lattice Rounding
- Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan
-
2015/023 ( PDF )
- Multilinear Maps Using Ideal Lattices without Encodings of Zero
- Gu Chunsheng
-
2015/022 ( PDF )
- TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
- Bo Yang and Dengguo Feng and Yu Qin and Yingjun Zhang and Weijin Wang
-
2015/021 ( PDF )
- Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification
- Xin Li
-
2015/020 ( PDF )
- Simpler Efficient Group Signatures from Lattices
- Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang
-
2015/019 ( PDF )
- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
- Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Mehdi Tibouchi
-
2015/018 ( PDF )
- A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS
- JINTAI DING, ALEXEI MIASNIKOV, AND ALEXANDER USHAKOV
-
2015/017 ( PDF )
- Simple Functional Encryption Schemes for Inner Products
- Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
-
2015/016 ( PDF )
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
- Yannis Rouselakis and Brent Waters
-
2015/015 ( PDF )
- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
- Florian Bergsma, Tibor Jager, Jörg Schwenk
-
2015/014 ( PDF )
- Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based
- San Ling and Khoa Nguyen and Huaxiong Wang
-
2015/013 ( PDF )
- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
- Nico Döttling
-
2015/012 ( PDF )
- Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
- Tancrčde Lepoint and Mehdi Tibouchi
-
2015/011 ( PDF )
- Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications
- Benjamin Buhrow and Paul Riemer and Mike Shea and Barry Gilbert and Erik Daniel
-
2015/010 ( PDF )
- Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- Shengli Liu and Kenneth G. Paterson
-
2015/009 ( PDF )
- Rig: A simple, secure and flexible design for Password Hashing
- Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
-
2015/008 ( PDF )
- Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
- Satrajit Ghosh and Aniket Kate
-
2015/007 ( PDF )
- Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
- Tobias Pulls and Roel Peeters
-
2015/006 ( PDF )
- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
- Jan Camenisch and Robert R. Enderlein and Gregory Neven
-
2015/005 ( PDF )
- Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
- Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs
-
2015/004 ( PDF )
- Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
- Carmit Hazay
-
2015/003 ( PDF )
- Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
- Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen
-
2015/002 ( PDF )
- Characterization of MDS mappings
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2015/001 ( PDF )
- A note on the security of Higher-Order Threshold Implementations
- Oscar Reparaz
-
2014/1029 ( PDF )
- On the Cryptographic Hardness of Finding a Nash Equilibrium
- Nir Bitansky and Omer Paneth and Alon Rosen
-
2014/1028 ( PDF )
- Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
- Payal Chaudhari and Manik Lal Das and Anish Mathuria
-
2014/1027 ( PDF )
- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
- Vadim Lyubashevsky and Daniel Wichs
-
2014/1026 ( PDF )
- Lattices with Symmetry
- H. W. Lenstra, Jr. and A. Silverberg
-
2014/1025 ( PDF )
- XPIR: Private Information Retrieval for Everyone
- Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian
-
2014/1024 ( PDF )
- Cryptanalysis of the Co-ACD Assumption
- Pierre-Alain Fouque and Moon Sung Lee and Tancrčde Lepoint and Mehdi Tibouchi
-
2014/1023 ( PDF )
- How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search
- Nathan E. Price and Alan T. Sherman
-
2014/1022 ( PDF )
- Topology-Hiding Computation
- Tal Moran and Ilan Orlov and Silas Richelson
-
2014/1021 ( PDF )
- Tightly-Secure Signatures from Chameleon Hash Functions
- Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan
-
2014/1020 ( PDF )
- Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
-
2014/1019 ( -- withdrawn -- )
- Related-Key Differential Cryptanalysis of Reduced-Round ITUBee
- Xiaoming Tang and Weidong Qiu and Zheng Gong and Zheng Huang and Jie Guo
-
2014/1018 ( PDF )
- Algebraic Algorithms for LWE
- Martin R. Albrecht and Carlos Cid and Jean-Charles Faugčre and Ludovic Perret
-
2014/1017 ( PDF )
- Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
- Foteini Baldimtsi and Olga Ohrimenko
-
2014/1016 ( -- withdrawn -- )
- Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security
- GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL
-
2014/1015 ( PDF )
- Compact Accumulator using Lattices
- Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini
-
2014/1014 ( PDF )
- Double-and-Add with Relative Jacobian Coordinates
- Björn Fay
-
2014/1013 ( PDF )
- Computational Independence
- Björn Fay
-
2014/1012 ( PDF )
- The Boomerang Attacks on BLAKE and BLAKE2
- Yonglin Hao
-
2014/1011 ( PDF )
- Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
- Alex Biryukov and Ivan Pustogarov
-
2014/1010 ( PDF )
- On Continuous After-the-Fact Leakage-Resilient Key Exchange
- Mohsen Toorani
-
2014/1009 ( PDF )
- A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
- Christopher D. Nguyen and Dhananjay S. Phatak and Steven D. Houston and Alan T. Sherman
-
2014/1008 ( PDF )
- DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS
- Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
-
2014/1007 ( PDF )
- Fair Multiple-bank E-cash in the Standard Model
- Jiangxiao Zhang and Yanwu Gao and Chunhui Feng and Hua Guo and Zhoujun Li
-
2014/1006 ( PDF )
- Simple composition theorems of one-way functions -- proofs and presentations
- Jaime Gaspar and Eerke Boiten
-
2014/1005 ( PDF )
- A pure block chain based decentralized exchange.
- Harsh Patel
-
2014/1004 ( PDF )
- CONIKS: Bringing Key Transparency to End Users
- Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
-
2014/1003 ( PDF )
- COFFE: Ciphertext Output Feedback Faithful Encryption
- Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel
-
2014/1002 ( PDF )
- Experiments in Encrypted and Searchable Network Audit Logs
- Bhanu Prakash Gopularam and Sashank Dara and Nalini N
-
2014/1001 ( -- withdrawn -- )
- Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE
- Xiaopeng Yang, Wenping Ma, and Chengli Zhang
-
2014/1000 ( PDF )
- Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
- Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri
-
2014/999 ( PDF )
- First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
- Yongdae Kim and Hyunsoo Yoon
-
2014/998 ( PDF )
- Hierarchical deterministic Bitcoin wallets that tolerate key leakage
- Gus Gutoski and Douglas Stebila
-
2014/997 ( PDF )
- Constants Count: Practical Improvements to Oblivious RAM
- Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas
-
2014/996 ( PDF )
- Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
- Maike Massierer
-
2014/995 ( PDF )
- Partial Garbling Schemes and Their Applications
- Yuval Ishai and Hoeteck Wee
-
2014/994 ( PDF )
- Two novel applications of bilinear groups to ABE encryption
- Riccardo Longo and Chiara Marcolla and Massimiliano Sala
-
2014/993 ( PDF )
- How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
- Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer
-
2014/992 ( PDF )
- Incentivized Outsourced Computation Resistant to Malicious Contractors
- Alptekin Kupcu
-
2014/991 ( PDF )
- Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
- Kai-Min Chung and Huijia Lin and Rafael Pass
-
2014/990 ( PDF )
- Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
- Pille Pullonen and Sander Siim
-
2014/989 ( PDF )
- Controlled Homomorphic Encryption: Definition and Construction
- Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti
-
2014/988 ( PDF )
- Armadillo: a compilation chain for privacy preserving applications
- Sergiu Carpov and Paul Dubrulle and Renaud Sirdey
-
2014/987 ( PDF )
- Cryptanalysis of Full PRIDE Block Cipher
- Yibin Dai and Shaozhen Chen
-
2014/986 ( PDF )
- Related-Key Differential Attack on Round Reduced RECTANGLE-80
- Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma
-
2014/985 ( PDF )
- Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
- Bartosz Zoltak
-
2014/984 ( PDF )
- Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel
- Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert
-
2014/983 ( PDF )
- Public Verification of Private Effort
- Giulia Alberini and Tal Moran and Alon Rosen
-
2014/982 ( PDF )
- Outlier Privacy
- Edward Lui and Rafael Pass
-
2014/981 ( PDF )
- Publicly Verifiable Non-Interactive Arguments for Delegating Computation
- Omer Paneth and Guy N. Rothblum
-
2014/980 ( PDF )
- A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors
- Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
-
2014/979 ( PDF )
- The Chaining Lemma and its application
- Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
-
2014/978 ( PDF )
- Improved Differential Analysis of Block Cipher PRIDE
- Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma
-
2014/977 ( PDF )
- A Survey on Lightweight Entity Authentication with Strong PUFs
- Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede
-
2014/976 ( PDF )
- Geppetto: Versatile Verifiable Computation
- Craig Costello and Cédric Fournet and Jon Howell and Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and Bryan Parno and Samee Zahur
-
2014/975 ( PDF )
- Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2014/974 ( -- withdrawn -- )
- Non-Linearity and Affine Equivalence of Permutations
- P R Mishra, Indivar Gupta and N Rajesh Pillai
-
2014/973 ( PDF )
- Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
- Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma
-
2014/972 ( PDF )
- A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
- Haining Fan
-
2014/971 ( PDF )
- Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
- Y. Wei and E. Pasalic and F. Zhang and W. Wu
-
2014/970 ( PDF )
- Jackpot Stealing Information From Large Caches via Huge Pages
- Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2014/969 ( PDF )
- Privacy-Preserving Face Recognition with Outsourced Computation
- Can Xiang and Chunming Tang
-
2014/968 ( PDF )
- Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
- Jorge Munilla and Mike Burmester and Albert Peinado
-
2014/967 ( PDF )
- A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
- Maciej Skorski
-
2014/966 ( PDF )
- Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
- Kan Yang and Xiaohua Jia and Kuan Zhang and Xuemin (Sherman) Shen
-
2014/965 ( PDF )
- Predicate Encryption for Multi-Dimensional Range Queries from Lattices
- Romain Gay and Pierrick Méaux and Hoeteck Wee
-
2014/964 ( PDF )
- On two windows multivariate cryptosystem depending on random parameters
- Urszula Romańczuk-Polubiec, Vasyl Ustimenko
-
2014/963 ( PDF )
- Malicious-Client Security in Blind Seer: A Scalable Private DBMS
- Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
-
2014/962 ( PDF )
- Solving Polynomial Systems with Noise over F_2: Revisited
- Zhenyu Huang and Dongdai Lin
-
2014/961 ( PDF )
- When are Fuzzy Extractors Possible?
- Benjamin Fuller and Adam Smith and Leonid Reyzin
-
2014/960 ( PDF )
- Non-Interactive Secure Multiparty Computation
- Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin-Cherniavsky
-
2014/959 ( PDF )
- Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
- Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul
-
2014/958 ( PDF )
- Authenticated Encryption: How Reordering can Impact Performance
- Basel Alomair
-
2014/957 ( PDF )
- Black Box Separations for Differentially Private Protocols
- Dakshita Khurana and Hemanta K. Maji and Amit Sahai
-
2014/956 ( PDF )
- Tamper Detection and Continuous Non-Malleable Codes
- Zahra Jafargholi and Daniel Wichs
-
2014/955 ( PDF )
- On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme
- Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
-
2014/954 ( PDF )
- Algebraic Fault Analysis of Katan
- Frank Quedenfeld
-
2014/953 ( PDF )
- The Related-Key Security of Iterated Even-Mansour Ciphers
- Pooya Farshim and Gordon Procter
-
2014/952 ( PDF )
- Balanced Encoding to Mitigate Power Analysis: A Case Study
- Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye
-
2014/951 ( PDF )
- Modified Alternating Step Generators with Non-Linear Scrambler
- Robert Wicik and Tomasz Rachwalik and Rafał Gliwa
-
2014/950 ( PDF )
- Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
- Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda
-
2014/949 ( PDF )
- Simplification/complication of the basis of prime Boolean ideal
- Alexander Rostovtsev and Anna Shustrova
-
2014/948 ( PDF )
- Lattice Point Enumeration on Block Reduced Bases
- Michael Walter
-
2014/947 ( PDF )
- The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2014/946 ( PDF )
- On a new fast public key cryptosystem
- Samir Bouftass
-
2014/945 ( PDF )
- Boomerang Attack on Step-Reduced SHA-512
- Hongbo Yu, Dongxia Bai
-
2014/944 ( PDF )
- EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes
- Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
-
2014/943 ( PDF )
- HaTCh: A Formal Framework of Hardware Trojan Design and Detection
- Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk
-
2014/942 ( PDF )
- Public-Coin Differing-Inputs Obfuscation and Its Applications
- Yuval Ishai, Omkant Pandey, Amit Sahai
-
2014/941 ( PDF )
- Garbled RAM From One-Way Functions
- Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro
-
2014/940 ( PDF )
- Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2014/939 ( PDF )
- Security Analysis of an Authentication Scheme Using Smart Cards
- Gaurav Tiwari and Amit K. Awasthi and Neha Shukla
-
2014/938 ( PDF )
- Trapdoor Computational Fuzzy Extractors
- Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
-
2014/937 ( PDF )
- Analysis of Lewko-Sahai-Waters Revocation System
- Zhengjun Cao and Lihua Liu
-
2014/936 ( PDF )
- Outsourcing Secure Two-Party Computation as a Black Box
- Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
-
2014/935 ( PDF )
- Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
- Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia
-
2014/934 ( PDF )
- Efficient Generic Zero-Knowledge Proofs from Commitments
- Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias
-
2014/933 ( PDF )
- Certificateless Proxy Re-Encryption Without Pairing: Revisited
- Akshayaram Srinivasan and C. Pandu Rangan
-
2014/932 ( PDF )
- Bicliques with Minimal Data and Time Complexity for AES (Extended Version)
- Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
-
2014/931 ( PDF )
- Cryptanalysis of JAMBU
- Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang
-
2014/930 ( PDF )
- Immunizing Multilinear Maps Against Zeroizing Attacks
- Dan Boneh and David J. Wu and Joe Zimmerman
-
2014/929 ( PDF )
- Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero
- Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai
-
2014/928 ( PDF )
- Implementing Candidate Graded Encoding Schemes from Ideal Lattices
- Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois
-
2014/927 ( PDF )
- Physical functions : the common factor of side-channel and fault attacks ?
- Bruno Robisson and Hélčne Le Bouder
-
2014/926 ( PDF )
- Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
- Keita Emura and Takuya Hayashi
-
2014/925 ( PDF )
- Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
- Venkata Koppula and Allison Bishop Lewko and Brent Waters
-
2014/924 ( PDF )
- Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
- Antoine Joux and Cécile Pierrot
-
2014/923 ( -- withdrawn -- )
- New Cryptosystem Using The CRT And The Jordan Normal Form
- Hemlata Nagesh and Birendra Kumar Sharma
-
2014/922 ( PDF )
- Differential Analysis of Block Ciphers SIMON and SPECK
- Alex Biryukov and Arnab Roy and Vesselin Velichkov
-
2014/921 ( PDF )
- Batch NFS
- Daniel J. Bernstein and Tanja Lange
-
2014/920 ( PDF )
- Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
- Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert
-
2014/919 ( PDF )
- Experimenting with Shuffle Block Cipher and SMT Solvers
- Martin Stanek
-
2014/918 ( PDF )
- Web Tap Payment Authentication and Encryption With Zero Customer Effort
- Henry Ng
-
2014/917 ( PDF )
- From Selective to Adaptive Security in Functional Encryption
- Prabhanjan Ananth and Zvika Brakerski and Gil Segev and Vinod Vaikuntanathan
-
2014/916 ( PDF )
- Adaptively Secure Fully Homomorphic Signatures Based on Lattices
- Xavier Boyen and Xiong Fan and Elaine Shi
-
2014/915 ( PDF )
- The Security of the Hanser-Slamanig Signature Scheme Revisited
- Yanbin Pan
-
2014/914 ( PDF )
- Cryptography with One-Way Communication
- Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
-
2014/913 ( PDF )
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
- Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
-
2014/912 ( PDF )
- Low-Cost Concurrent Error Detection for GCM and CCM
- Xiaofei Guo and Ramesh Karri
-
2014/911 ( PDF )
- A Denial of Service Attack against Fair Computations using Bitcoin Deposits
- Jethro Beekman
-
2014/910 ( PDF )
- Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model
- Vanishree Rao
-
2014/909 ( PDF )
- Robust Secret Sharing Schemes Against Local Adversaries
- Allison Bishop Lewko and Valerio Pastro
-
2014/908 ( PDF )
- Practical UC security with a Global Random Oracle
- Ran Canetti and Abhishek Jain and Alessandra Scafuro
-
2014/907 ( PDF )
- Finding shortest lattice vectors faster using quantum search
- Thijs Laarhoven and Michele Mosca and Joop van de Pol
-
2014/906 ( PDF )
- Cryptanalysis of the Multilinear Map over the Integers
- Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehle
-
2014/905 ( PDF )
- Primary-Secondary-Resolver Membership Proof Systems
- Moni Naor and Asaf Ziv
-
2014/904 ( PDF )
- How Secure is TextSecure?
- Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz
-
2014/903 ( PDF )
- Falcon Codes: Fast, Authenticated LT Codes
- Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos
-
2014/902 ( PDF )
- The Power of Negations in Cryptography
- Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen
-
2014/901 ( PDF )
- A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
- Kenneth G. Paterson and Mario Strefler
-
2014/900 ( PDF )
- Some Security Results of the RC4+ Stream Cipher
- Subhadeep Banik and Sonu Jha
-
2014/899 ( PDF )
- Side Channel Power Analysis of an AES-256 Bootloader
- Colin O'Flynn and Zhizhang Chen
-
2014/898 ( PDF )
- A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
- Eduardo Morais and Ricardo Dahab
-
2014/897 ( PDF )
- Leveled Fully Homomorphic Signatures from Standard Lattices
- Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs
-
2014/896 ( PDF )
- Efficiently Making Secure Two-Party Computation Fair
- Handan Kılınç and Alptekin Küpçü
-
2014/895 ( PDF )
- Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
- Kerry A. McKay and Poorvi L. Vora
-
2014/894 ( PDF )
- THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS
- Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan
-
2014/893 ( PDF )
- Advanced Algebraic Attack on Trivium
- Frank Quedenfeld and Christopher Wolf
-
2014/892 ( PDF )
- Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014
- Georg Fuchsbauer
-
2014/891 ( PDF )
- Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
- Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi
-
2014/890 ( PDF )
- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures
- Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek
-
2014/889 ( PDF )
- Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
- Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak
-
2014/888 ( PDF )
- Distance Lower Bounding
- Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi
-
2014/887 ( PDF )
- Hardware Implementation of Secure Shamir's Secret Sharing Scheme
- Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
-
2014/886 ( PDF )
- Accountable Storage
- Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia
-
2014/885 ( PDF )
- Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
- Marios O. Choudary and Markus G. Kuhn
-
2014/884 ( -- withdrawn -- )
- Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
- Pei Luo and Yunsi Fei
-
2014/883 ( PDF )
- Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
- Pei Luo and Yunsi Fei
-
2014/882 ( PDF )
- Obfuscation of Probabilistic Circuits and Applications
- Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan
-
2014/881 ( PDF )
- Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
- Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
-
2014/880 ( PDF )
- Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
- Joppe W. Bos and Michael Naehrig and Joop van de Pol
-
2014/879 ( PDF )
- Watch your Constants: Malicious Streebog
- Riham AlTawy and Amr M. Youssef
-
2014/878 ( PDF )
- Protecting obfuscation against arithmetic attacks
- Eric Miles and Amit Sahai and Mor Weiss
-
2014/877 ( PDF )
- CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
- Daniel R. L. Brown
-
2014/876 ( PDF )
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
- Mihir Bellare and Viet Tung Hoang
-
2014/875 ( PDF )
- Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
- Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding
-
2014/874 ( PDF )
- Accelerating Bliss: the geometry of ternary polynomials
- Léo Ducas
-
2014/873 ( PDF )
- Bootstrapping for HElib
- Shai Halevi and Victor Shoup
-
2014/872 ( PDF )
- Recent Results in Scalable Multi-Party Computation
- Jared Saia and Mahdi Zamani
-
2014/871 ( PDF )
- An algorithm for MD5 single-block collision attack using high-performance computing cluster
- Anton A. Kuznetsov
-
2014/870 ( PDF )
- Dynamic Behavior of RS latches using FIB processing and probe connection
- Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto
-
2014/869 ( PDF )
- Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
- Werner Schindler
-
2014/868 ( PDF )
- Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
- Ilan Komargodski and Gil Segev and Eylon Yogev
-
2014/867 ( PDF )
- Random-Oracle Uninstantiability from Indistinguishability Obfuscation
- Christina Brzuska and Pooya Farshim and Arno Mittelbach
-
2014/866 ( -- withdrawn -- )
- Self-Destruct Non-Malleability
- Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
-
2014/865 ( PDF )
- Impossibility of Black-Box Simulation Against Leakage Attacks
- Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
-
2014/864 ( PDF )
- How to Choose Interesting Points for Template Attacks More Effectively
- Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
-
2014/863 ( PDF )
- A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
- Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou
-
2014/862 ( PDF )
- Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -
- Miroslav Knezevic, Ventzislav Nikov, and Peter Rombouts
-
2014/861 ( PDF )
- Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
- İhsan Haluk Akın
-
2014/860 ( PDF )
- Differential Factors: Improved Attacks on SERPENT
- Cihangir Tezcan and Ferruh Özbudak
-
2014/859 ( -- withdrawn -- )
- Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system
- SK Hafizul Islam; G. P. Biswas
-
2014/858 ( PDF )
- Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds
- Dana Dachman-Soled and Jonathan Katz and Vanishree Rao
-
2014/857 ( PDF )
- Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
- Jonathan Katz and Andrew Miller and Elaine Shi
-
2014/856 ( PDF )
- Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware
- Dana Dachman-Soled and Feng-Hao Liu and Hong-Sheng Zhou
-
2014/855 ( PDF )
- Relating Undisturbed Bits to Other Properties of Substitution Boxes
- Rusydi H. Makarim and Cihangir Tezcan
-
2014/854 ( PDF )
- Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
- Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
-
2014/853 ( PDF )
- Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
- David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătălin Roşu and Michael Steiner
-
2014/852 ( PDF )
- Faster ECC over $\mathbb{F}_{2^{521}-1}$
- Robert Granger and Michael Scott
-
2014/851 ( PDF )
- Near Optimal Rate Homomorphic Encryption for Branching Programs
- Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang
-
2014/850 ( PDF )
- BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates
- Markku-Juhani O. Saarinen
-
2014/849 ( PDF )
- A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks
- Ryotaro Hayashi and Tatsuyuki Matsushita
-
2014/848 ( PDF )
- Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
- Nicolas T. Courtois and Pinar Emirdag and Filippo Valsorda
-
2014/847 ( PDF )
- Reflections on Slide with a Twist Attacks
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2014/846 ( PDF )
- Verifiable computation using multiple provers
- Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish
-
2014/845 ( PDF )
- Adaptively Secure Two-party Computation From Indistinguishability Obfuscation
- Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya
-
2014/844 ( PDF )
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Sanjam Garg and Antigoni Polychroniadou
-
2014/843 ( PDF )
- Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator
- Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng
-
2014/842 ( PDF )
- A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
- Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
-
2014/841 ( PDF )
- Explicit Non-malleable Codes Resistant to Permutations and Perturbations
- Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
-
2014/840 ( PDF )
- Constrained PRFs for Unbounded Inputs
- Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
-
2014/839 ( PDF )
- A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
- Koji Nuida and Naoto Itakura and Kaoru Kurosawa
-
2014/838 ( PDF )
- SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
- Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan
-
2014/837 ( PDF )
- True Random Number Generators Secure in a Changing Environment: Improved Security Bounds
- Maciej Skorski
-
2014/836 ( PDF )
- A Tight Transformation between HILL and Metric Conditional Pseudoentropy
- Maciej Skorski
-
2014/835 ( PDF )
- Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
- David Galindo and Johann Großschädl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek
-
2014/834 ( PDF )
- Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
- Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman
-
2014/833 ( PDF )
- Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability
- Essam Ghadafi
-
2014/832 ( PDF )
- Requirements for Standard Elliptic Curves
- Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
-
2014/831 ( PDF )
- Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
- Jérémy Jean and Ivica Nikolić and Thomas Peyrin
-
2014/830 ( PDF )
- Adaptively Secure UC Constant Round Multi-Party Computation
- Ivan Damgĺrd and Antigoni Polychroniadou and Vanishree Rao
-
2014/829 ( PDF )
- Additively Homomorphic UC commitments with Optimal Amortized Overhead
- Ignacio Cascudo and Ivan Damgĺrd and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti
-
2014/828 ( PDF )
- Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm
- Zhengjun Cao and Zhenfu Cao and Lihua Liu
-
2014/827 ( PDF )
- Interactive Coding for Interactive Proofs
- Yevgeniy Dodis and Allison Bishop Lewko
-
2014/826 ( PDF )
- Learning with Errors in the Exponent
- Ozgur Dagdelen and Sebastian Gajek and Florian Gopfert
-
2014/825 ( -- withdrawn -- )
- Towards Optimal Bounds for Implicit Factorization Problem
- Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin
-
2014/824 ( PDF )
- Accountable Tracing Signatures
- Markulf Kohlweiss and Ian Miers
-
2014/823 ( PDF )
- On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
- Rafael Dowsley and Anderson C. A. Nascimento
-
2014/822 ( PDF )
- Ballot secrecy with malicious bulletin boards
- David Bernhard and Ben Smyth
-
2014/821 ( PDF )
- Non-malleable Reductions and Applications
- Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski
-
2014/820 ( PDF )
- Operational Signature Schemes
- Michael Backes and Ozgur Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schröder
-
2014/819 ( PDF )
- Riding on Asymmetry: Efficient ABE for Branching Programs
- Sergey Gorbunov and Dhinakaran Vinayagamurthy
-
2014/818 ( -- withdrawn -- )
- Circulant Matrices and Differential Privacy
- Jalaj Upadhyay
-
2014/817 ( PDF )
- Optimized Karatsuba Squaring on 8-bit AVR Processors
- Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
-
2014/816 ( PDF )
- FHEW: Bootstrapping Homomorphic Encryption in less than a second
- Léo Ducas and Daniele Micciancio
-
2014/815 ( PDF )
- A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves
- Palash Sarkar and Shashank Singh
-
2014/814 ( PDF )
- Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing
- Lisa Bromberg and Vladimir Shpilrain and Alina Vdovina
-
2014/813 ( PDF )
- Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
- Dario Catalano and Dario Fiore
-
2014/812 ( PDF )
- Search-and-compute on Encrypted Data
- Jung Hee Cheon and Miran Kim and Myungsun Kim
-
2014/811 ( PDF )
- A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
- Jean-Charles Faugere and Danilo Gligoroski and Ludovic Perret and Simona Samardjiska and Enrico Thomae
-
2014/810 ( PDF )
- Simulation-Based Secure Functional Encryption in the Random Oracle Model
- Vincenzo Iovino and Karol Zebrowski
-
2014/809 ( PDF )
- Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
- Ignacio Cascudo and Ivan Damgĺrd and Oriol Farràs and Samuel Ranellucci
-
2014/808 ( PDF )
- Online/Off-line Ring Signature Scheme with Provable Security
- Jayaprakash Kar
-
2014/807 ( PDF )
- Leakage-resilient non-malleable codes
- Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
-
2014/806 ( PDF )
- Summation polynomial algorithms for elliptic curves in characteristic two
- Steven D. Galbraith and Shishay W. Gebregiyorgis
-
2014/805 ( PDF )
- Dual-System Simulation-Soundness with Applications to UC-PAKE and More
- Charanjit S. Jutla and Arnab Roy
-
2014/804 ( PDF )
- Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
- Jacob Alperin-Sheriff
-
2014/803 ( PDF )
- A Decentralized Public Key Infrastructure with Identity Retention
- Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
-
2014/802 ( PDF )
- Physical Characterization of Arbiter PUFs
- Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
-
2014/801 ( PDF )
- Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties
- Georgi Ivanov and Nikolay Nikolov and Svetla Nikova
-
2014/800 ( PDF )
- Efficient Pairings and ECC for Embedded Systems
- Thomas Unterluggauer and Erich Wenger
-
2014/799 ( PDF )
- Verifiable Random Functions from Weaker Assumptions
- Tibor Jager
-
2014/798 ( PDF )
- Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
- Michael Clear and Ciarán McGoldrick
-
2014/797 ( PDF )
- Tightly-Secure Authenticated Key Exchange
- Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li
-
2014/796 ( PDF )
- Distributed Cryptography Based on the Proofs of Work
- Marcin Andrychowicz and Stefan Dziembowski
-
2014/795 ( PDF )
- SPHINCS: practical stateless hash-based signatures
- Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Michael Schneider and Peter Schwabe and Zooko Wilcox-O'Hearn
-
2014/794 ( PDF )
- Efficient Identity-Based Encryption over NTRU Lattices
- Léo Ducas and Vadim Lyubashevsky and Thomas Prest
-
2014/793 ( PDF )
- Robust Authenticated-Encryption: AEZ and the Problem that it Solves
- Viet Tung Hoang and Ted Krovetz and Phillip Rogaway
-
2014/792 ( PDF )
- General Overview of the First-Round CAESAR Candidates for Authenticated Encryption
- {Farzaneh Abed, Christian Forler, Stefan Lucks
-
2014/791 ( PDF )
- Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof
- Dongdai Lin and Yujuan Quan and Jian Weng and Jun Yan
-
2014/790 ( PDF )
- Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses
- Sarani Bhattacharya and Debdeep Mukhopadhyay
-
2014/789 ( PDF )
- Statistical Properties of the Square Map Modulo a Power of Two
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
-
2014/788 ( PDF )
- Tuning GaussSieve for Speed
- Robert Fitzpatrick and Christian Bischof and Johannes Buchmann and Ozgur Dagdelen and Florian Gopfert and Artur Mariano and Bo-Yin Yang
-
2014/787 ( PDF )
- Another Tor is possible
- Amadou Moctar Kane
-
2014/786 ( PDF )
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Chun Guo and Dongdai Lin
-
2014/785 ( PDF )
- Divisible E-Cash Made Practical
- Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
-
2014/784 ( PDF )
- Weak Instances of PLWE
- Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter
-
2014/783 ( PDF )
- Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
- Raghavan Kumar and Philipp Jovanovic and Wayne Burleson and Ilia Polian
-
2014/782 ( PDF )
- Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis
- Raghavan Kumar and Philipp Jovanovic and Ilia Polian
-
2014/781 ( PDF )
- Tally-based simple decoders for traitor tracing and group testing
- Boris Skoric
-
2014/780 ( PDF )
- Deterministic Public-Key Encryption under Continual Leakage
- Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters
-
2014/779 ( PDF )
- Implementing Cryptographic Program Obfuscation
- Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
-
2014/778 ( PDF )
- Anonymous IBE from Quadratic Residuosity with Improved Performance
- Michael Clear and Hitesh Tewari and Ciarán McGoldrick
-
2014/777 ( PDF )
- (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces
- Koji Nuida and Kaoru Kurosawa
-
2014/776 ( PDF )
- How to Obfuscate Programs Directly
- Joe Zimmerman
-
2014/775 ( PDF )
- Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation
- Artur Mariano, Shahar Timnat and Christian Bischof
-
2014/774 ( PDF )
- Automated Analysis and Synthesis of Block-Cipher Modes of Operation
- Alex J. Malozemoff and Jonathan Katz and Matthew D. Green
-
2014/773 ( PDF )
- Obfuscating Low-Rank Matrix Branching Programs
- Amit Sahai and Mark Zhandry
-
2014/772 ( PDF )
- Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps
- Nuttapong Attrapadung
-
2014/771 ( PDF )
- Succinct Randomized Encodings and their Applications
- Nir Bitansky and Sanjam Garg and Sidharth Telang
-
2014/770 ( PDF )
- AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation
- Takaaki Mizuki and Yu-ichi Hayashi
-
2014/769 ( PDF )
- Indistinguishability Obfuscation of Iterated Circuits and RAM Programs
- Ran Canetti and Justin Holmgren and Abhishek Jain and Vinod Vaikuntanathan
-
2014/768 ( PDF )
- Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation
- Han Jiang and Xiaochao Wei and Chuan Zhao and Qiuliang Xu
-
2014/767 ( PDF )
- Algebraic Attacks on Human Identification Protocols
- Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk
-
2014/766 ( PDF )
- Succinct Garbling Schemes and Applications
- Huijia Lin and Rafael Pass
-
2014/765 ( PDF )
- The Bitcoin Backbone Protocol: Analysis and Applications
- Juan Garay and Aggelos Kiayias and Nikos Leonardos
-
2014/764 ( PDF )
- One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
- Jens Groth and Markulf Kohlweiss
-
2014/763 ( PDF )
- On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
- Arthur Gervais and Ghassan O. Karame and Damian Gruber and Srdjan Capkun
-
2014/762 ( PDF )
- Access Control in Publicly Verifiable Outsourced Computation
- James Alderman and Christian Janson and Carlos Cid and Jason Crampton
-
2014/761 ( PDF )
- Cryptanalysis of Reduced-round SIMON32 and SIMON48
- Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo
-
2014/760 ( PDF )
- Montgomery Modular Multiplication on ARM-NEON Revisited
- Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, and Howon Kim
-
2014/759 ( PDF )
- How to Efficiently Evaluate RAM Programs with Malicious Security
- Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
-
2014/758 ( PDF )
- Cryptographic Reverse Firewalls
- Ilya Mironov and Noah Stephens-Davidowitz
-
2014/757 ( PDF )
- Adaptively Secure Broadcast Encryption with Small System Parameters
- Mark Zhandry
-
2014/756 ( PDF )
- Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
- Samee Zahur and Mike Rosulek and David Evans
-
2014/755 ( PDF )
- Computing Mod Without Mod
- Mark A. Will and Ryan K. L. Ko
-
2014/754 ( PDF )
- Bilinear Entropy Expansion from the Decisional Linear Assumption
- Lucas Kowalczyk and Allison Bishop Lewko
-
2014/753 ( PDF )
- Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
- Alonso Gonzalez-Ulloa and Alejandro Hevia
-
2014/752 ( PDF )
- Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
- Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci
-
2014/751 ( PDF )
- Higher-Order Threshold Implementations
- Begül Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
-
2014/750 ( PDF )
- Hardware Trojan Horses in Cryptographic IP Cores
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage
-
2014/749 ( PDF )
- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM
- Daniel E. Holcomb and Kevin Fu
-
2014/748 ( PDF )
- Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
- Mehmet Sabır Kiraz and Osmanbey Uzunkol
-
2014/747 ( PDF )
- Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
- Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
-
2014/746 ( PDF )
- Decoy-based information security
- Vladimir Shpilrain
-
2014/745 ( PDF )
- Universal Signature Aggregators
- Susan Hohenberger and Venkata Koppula and Brent Waters
-
2014/744 ( PDF )
- Sieving for shortest vectors in lattices using angular locality-sensitive hashing
- Thijs Laarhoven
-
2014/743 ( PDF )
- Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
- Benoit Libert and Marc Joye and Moti Yung and Thomas Peters
-
2014/742 ( PDF )
- A survey of Fault Attacks in Pairing Based Cryptography
- Nadia El Mrabet and Jacques J.A. Fournier and Louis Goubin and Ronan Lashermes
-
2014/741 ( PDF )
- Eliminating Leakage in Reverse Fuzzy Extractors
- André Schaller, Boris Skoric, Stefan Katzenbeisser
-
2014/740 ( -- withdrawn -- )
- Non-existence of [n; 5] type Generalized Bent function.
- Shashi Kant Pandey and P.R Mishra and B.K Dass
-
2014/739 ( PDF )
- SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers
- Smile Markovski and Aleksandra Mileva and Vesna Dimitrova
-
2014/738 ( PDF )
- A Very Compact FPGA Implementation of LED and PHOTON
- N. Nalla Anandakumar and Thomas Peyrin and Axel Poschmann
-
2014/737 ( -- withdrawn -- )
- Design and analysis of one-round certificateless authenticated group key agreement protocol with bilinear pairings
- SK Hafizul Islam and Abhishek Singh
-
2014/736 ( PDF )
- Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
- Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
-
2014/735 ( PDF )
- Dealer-Leakage Resilient Verifiable Secret Sharing
- Ruxandra F. Olimid
-
2014/734 ( PDF )
- S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
- Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedra and Dominik Sisejkovic
-
2014/733 ( PDF )
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann
-
2014/732 ( PDF )
- Resizable Tree-Based Oblivious RAM
- Tarik Moataz and Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
-
2014/731 ( PDF )
- Secure modular password authentication for the web using channel bindings
- Mark Manulis and Douglas Stebila and Nick Denham
-
2014/730 ( PDF )
- Differentially Private Linear Algebra in the Streaming Model
- Jalaj Upadhyay
-
2014/729 ( PDF )
- Faster Binary-Field Multiplication and Faster Binary-Field MACs
- Daniel J. Bernstein and Tung Chou
-
2014/728 ( PDF )
- Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
- Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson
-
2014/727 ( PDF )
- The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves
- Benjamin Smith
-
2014/726 ( -- withdrawn -- )
- CIARP: A RISC Processor For Cryptography Applications
- Nima Karimpour Darav and Reza Ebrahimi Atani and Erfan Aghaei and Ahmad Tahmasivand and Mahsa Rahmani and Mina Moazzam Jazi
-
2014/725 ( PDF )
- Efficient Software Implementation of Ring-LWE Encryption
- Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
-
2014/724 ( PDF )
- Protecting Encrypted Cookies from Compression Side-Channel Attacks
- Janaka Alawatugoda and Douglas Stebila and Colin Boyd
-
2014/723 ( PDF )
- Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
- Yalin Chen and Jue-Sam Chou*
-
2014/722 ( PDF )
- Differential Cryptanalysis of SipHash
- Christoph Dobraunig and Florian Mendel and Martin Schläffer
-
2014/721 ( PDF )
- On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers
- Zhengjun Cao and Zhenfu Cao
-
2014/720 ( PDF )
- Adaptively Secure Constrained Pseudorandom Functions
- Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters
-
2014/719 ( PDF )
- Bivariate Polynomials Modulo Composites and their Applications
- Dan Boneh and Henry Corrigan-Gibbs
-
2014/718 ( PDF )
- Square Span Programs with Applications to Succinct NIZK Arguments
- George Danezis and Cedric Fournet and Jens Groth and Markulf Kohlweiss
-
2014/717 ( PDF )
- How to Split a Secret into Unknown Shares
- Ruxandra F. Olimid
-
2014/716 ( PDF )
- Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
- Amir Moradi
-
2014/715 ( PDF )
- Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment'
- Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
-
2014/714 ( PDF )
- A comprehensive empirical comparison of parallel ListSieve and GaussSieve
- Artur Mariano and Ozgur Dagdelen and Christian Bischof
-
2014/713 ( PDF )
- Co-Location-Resistant Clouds
- Yossi Azar and Seny Kamara and Ishai Menache and Mariana Raykova and Bruce Shepherd
-
2014/712 ( PDF )
- Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
- Mohammad Wazid
-
2014/711 ( PDF )
- New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$
- Masao KASAHARA
-
2014/710 ( PDF )
- An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
- Yehuda Lindell
-
2014/709 ( PDF )
- A Note on Quantum Security for Post-Quantum Cryptography
- Fang Song
-
2014/708 ( PDF )
- Formal Treatment of Privacy-Enhancing Credential Systems
- Jan Camenisch and Stephan Krenn and Anja Lehmann and Gert Lćssře Mikkelsen and Gregory Neven and Michael Řstergaard Pedersen
-
2014/707 ( PDF )
- Analysis Of Variance and CPA in SCA
- Sebastien Tiran and Guillaume Reymond and Jean-Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles Ducharme and Philippe Maurine
-
2014/706 ( PDF )
- The Feasibility of Outsourced Database Search in the Plain Model
- Carmit Hazay and Hila Zarosim
-
2014/705 ( PDF )
- Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
- Christian Hanser and Daniel Slamanig
-
2014/704 ( PDF )
- A 128-bit Block Cipher Based on Three Group Arithmetics
- Shenghui Su and Shuwang Lü and Daqiang Dong
-
2014/703 ( PDF )
- Linearity Measures for MQ Cryptography
- Simona Samardjiska and Danilo Gligoroski
-
2014/702 ( PDF )
- Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques
- Benoit Feix and Hugues Thiebeauld
-
2014/701 ( -- withdrawn -- )
- A Practical Iterative Side Channel Cube Attack on AES-128/256
- Erfan Aghaee and Majid Rahimi and Hamed Yusefi
-
2014/700 ( PDF )
- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
- Ahto Buldas and Risto Laanoja and Peeter Laud and Ahto Truu
-
2014/699 ( PDF )
- Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
- Christina Boura and María Naya-Plasencia and Valentin Suder
-
2014/698 ( PDF )
- HIMMO - A lightweight collusion-resistant key predistribution scheme
- Oscar Garcia-Morchon and Domingo Gomez-Perez and Jaime Gutierrez and Ronald Rietman and Berry Schoenmakers and Ludo Tolhuizen
-
2014/697 ( PDF )
- A Fully Homomorphic Encryption Scheme with Better Key Size
- Zhigang Chen, Jian Wang, ZengNian Zhang , Xinxia Song
-
2014/696 ( PDF )
- Security Proofs for the BLT Signature Scheme
- Ahto Buldas and Risto Laanoja and Ahto Truu
-
2014/695 ( PDF )
- Proof of Proximity of Knowledge
- Serge Vaudenay
-
2014/694 ( PDF )
- Malicious Hashing: Eve's Variant of SHA-1
- Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schläffer
-
2014/693 ( PDF )
- Optimal Proximity Proofs
- Ioana Boureanu and Serge Vaudenay
-
2014/692 ( PDF )
- Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead
- Enrique Larraia
-
2014/691 ( PDF )
- Integration of hardware tokens in the Idemix library
- Antonio de la Piedra
-
2014/690 ( PDF )
- Efficient Interval Check in the Presence of Malicious Adversaries
- Genqiang Wu and Yeping He and Yi Lu and Liping Ding
-
2014/689 ( PDF )
- Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
- Ahto Buldas and Risto Laanoja and Ahto Truu
-
2014/688 ( PDF )
- Analytic Toolbox for White-Box Implementations: Limitation and Perspectives
- Chung Hun Baek and Jung Hee Cheon and Hyunsook Hong
-
2014/687 ( PDF )
- Reducing the Complexity of Normal Basis Multiplication
- Omer Egecioglu and Cetin Kaya Koc
-
2014/686 ( PDF )
- A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications
- Ming Li and Dongdai Lin
-
2014/685 ( PDF )
- Bit Security of the CDH Problems over Finite Field
- Mingqiang Wang and Tao Zhan and Haibin Zhang
-
2014/684 ( PDF )
- Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
- Antonio de la Piedra and Jaap-Henk Hoepman and Pim Vullers
-
2014/683 ( PDF )
- Error-Tolerant Algebraic Side-Channel Attacks Using BEE
- Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao
-
2014/682 ( PDF )
- A Unified Formalism for Physical Attacks
- Hélčne Le Bouder, Ronan Lashermes , Yanis Linge , Bruno Robisson and Assia Tria
-
2014/681 ( PDF )
- Improved Linear Cryptanalysis of Reduced-round SIMON
- Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, and Martin M. Lauridsen
-
2014/680 ( PDF )
- Remarks on the Cryptographic Primitive of Attribute-based Encryption
- Zhengjun Cao and Lihua Liu
-
2014/679 ( PDF )
- A Note on the Bellare-Rivest Protocol for Translucent Cryptography
- Zhengjun Cao and Lihua Liu
-
2014/678 ( PDF )
- A Counterexample to the Chain Rule for Conditional HILL Entropy
- Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia and Daniel Wichs
-
2014/677 ( PDF )
- Attacks in Stream Ciphers: A Survey
- Gustavo Banegas
-
2014/676 ( PDF )
- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
- Zhen Liu and Zhenfu Cao and Duncan S. Wong
-
2014/675 ( PDF )
- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
- Jian Guo and Jérémy Jean and Gaëtan Leurent and Thomas Peyrin and Lei Wang
-
2014/674 ( PDF )
- Efficient RAM and control flow in verifiable outsourced computation
- Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
-
2014/673 ( PDF )
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
-
2014/672 ( PDF )
- Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
- Xiao Wang and Hubert Chan and Elaine Shi
-
2014/671 ( PDF )
- SCORAM: Oblivious RAM for Secure Computation
- Xiao Shaun Wang and Yan Huang and T-H. Hubert Chan and abhi shelat and Elaine Shi
-
2014/670 ( PDF )
- DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
- Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
-
2014/669 ( PDF )
- On the Communication Complexity of Secure Function Evaluation with Long Output
- Pavel Hubacek and Daniel Wichs
-
2014/668 ( PDF )
- Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation
- Ran Cohen and Yehuda Lindell
-
2014/667 ( PDF )
- Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings
- Yehuda Lindell and Ben Riva
-
2014/666 ( PDF )
- Fully Secure Functional Encryption without Obfuscation
- Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
-
2014/665 ( PDF )
- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
- Julien Bringer and Claude Carlet and Hervé Chabanne and Sylvain Guilley and Houssem Maghrebi
-
2014/664 ( PDF )
- On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves
- William R. Trost and Guangwu Xu
-
2014/663 ( PDF )
- Locally Decodable and Updatable Non-Malleable Codes and Their Applications
- Dana Dachman-Soled and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
-
2014/662 ( PDF )
- Outsourced Pattern Matching
- Sebastian Faust and Carmit Hazay and Daniele Venturi
-
2014/661 ( PDF )
- One-Round Deniable Key Exchange with Perfect Forward Security
- Weiqiang Wen and Libin Wang and Min Xie
-
2014/660 ( PDF )
- Interactive Proofs under Continual Memory Leakage
- Prabhanjan Ananth and Vipul Goyal and Omkant Pandey
-
2014/659 ( PDF )
- On the Primitivity of Trinomials over Small Finite Fields
- YUjuan Li and Jinhua Zhao and Huaifu Wang
-
2014/658 ( PDF )
- A Class of FSRs and Their Adjacency Graphs
- Ming Li and Dongdai Lin
-
2014/657 ( PDF )
- On the cycle decomposition of the WG-NLFSR
- YUjuan Li and Wnehua Shen and Huaifu Wang and Peipei Zhou
-
2014/656 ( PDF )
- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
- Itai Dinur
-
2014/655 ( PDF )
- Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
- Bo Zhu and Xinxin Fan and Guang Gong
-
2014/654 ( PDF )
- Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
- Prakash Dey and Abhishek Chakraborty and Avishek Adhikari and Debdeep Mukhopadhyay
-
2014/653 ( PDF )
- Mersenne factorization factory
- Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra
-
2014/652 ( PDF )
- A Dynamic Cube Attack on $105$ round Grain v1
- Subhadeep Banik
-
2014/651 ( PDF )
- A note on CCA2-protected McEliece Cryptosystem with a systematic public key
- Pavol Zajac
-
2014/650 ( PDF )
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
- Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk
-
2014/649 ( PDF )
- FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
- Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar
-
2014/648 ( PDF )
- An Equivalent Condition on the Switching Construction of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function
- Xi Chen, Yazhi Deng, Min Zhu and Longjiang Qu
-
2014/647 ( PDF )
- Universally Composable Secure Group Communication
- Youliang Tian and Changgen Peng
-
2014/646 ( PDF )
- High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems
- Donald Donglong Chen and Nele Mentens and Frederik Vercauteren and Sujoy Sinha Roy and Ray C.C. Cheung and Derek Pao and Ingrid Verbauwhede
-
2014/645 ( PDF )
- Graph-Induced Multilinear Maps from Lattices
- Craig Gentry and Sergey Gorbunov and Shai Halevi
-
2014/644 ( PDF )
- Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
- Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai
-
2014/643 ( PDF )
- On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'
- Ashok Kumar Das
-
2014/642 ( PDF )
- Balanced permutations Even-Mansour ciphers
- Shoni Gilboa and Shay Gueron
-
2014/641 ( PDF )
- The Multiple Number Field Sieve with Conjugation Method
- Cécile Pierrot
-
2014/640 ( PDF )
- Revocation in Publicly Verifiable Outsourced Computation
- James Alderman and Christian Janson and Carlos Cid and Jason Crampton
-
2014/639 ( PDF )
- Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines
- Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
-
2014/638 ( PDF )
- Substring-Searchable Symmetric Encryption
- Melissa Chase and Emily Shen
-
2014/637 ( PDF )
- Generic Hardness of the Multiple Discrete Logarithm Problem
- Aaram Yun
-
2014/636 ( PDF )
- Improved Timing Attacks on ECDSA
- Vikram Singh
-
2014/635 ( PDF )
- Type 2 Structure-Preserving Signature Schemes Revisited
- Sanjit Chatterjee and Alfred Menezes
-
2014/634 ( PDF )
- Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP
- Hongda Li, Qihua Niu, Guifang Huang
-
2014/633 ( PDF )
- Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity
- Ran Canetti and Abhishek Jain and Omer Paneth
-
2014/632 ( PDF )
- Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge
- Esha Ghosh and Olga Ohrimenko and Roberto Tamassia
-
2014/631 ( PDF )
- Zipf’s Law in Passwords
- Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
-
2014/630 ( PDF )
- Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation
- Peeter Laud
-
2014/629 ( PDF )
- Two-factor authentication for the Bitcoin protocol
- Christopher Mann and Daniel Loebenberger
-
2014/628 ( PDF )
- An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency
- Partha Sarathi Roy and Avishek Adhikari and Rui Xu and Kirill Morozov and Kouichi Sakurai
-
2014/627 ( PDF )
- On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
- Debrup Chakraborty and Palash Sarkar
-
2014/626 ( PDF )
- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
- Daniel Genkin and Itamar Pipman and Eran Tromer
-
2014/625 ( PDF )
- Pretty Understandable Democracy 2.0
- Stephan Neumann and Christian Feier and Perihan Sahin and Sebastian Fach
-
2014/624 ( PDF )
- KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
- Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao
-
2014/623 ( PDF )
- Privacy with Imperfect Randomness
- Yevgeniy Dodis and Yanqing Yao
-
2014/622 ( PDF )
- Fully Secure Attribute Based Encryption from Multilinear Maps
- Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
-
2014/621 ( PDF )
- (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
- Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi
-
2014/620 ( PDF )
- The M3dcrypt Password Hashing Function
- Isaiah Makwakwa
-
2014/619 ( PDF )
- THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER
- Mohammad Sadegh Nemati Nia, Ali Payandeh
-
2014/618 ( PDF )
- Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
- Florian Böhl and Simon Greiner and Patrik Scheidecker
-
2014/617 ( PDF )
- ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
- Michael Backes and Manuel Barbosa and Dario Fiore and Raphael M. Reischuk
-
2014/616 ( PDF )
- Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
- Zhen Liu and Duncan S. Wong
-
2014/615 ( PDF )
- Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality
- Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ostrovsky and Vassilis Zikas
-
2014/614 ( PDF )
- Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version)
- Zhiquan Lv and Cheng Hong and Min Zhang and Dengguo Feng
-
2014/613 ( PDF )
- A Security Analysis of the Composition of ChaCha20 and Poly1305
- Gordon Procter
-
2014/612 ( PDF )
- Attribute-Based Encryption Optimized for Cloud Computing
- Máté Horváth
-
2014/611 ( PDF )
- Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation
- Shlomi Dolev and Niv Gilboa and Ximing Li
-
2014/610 ( PDF )
- Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation
- Craig Gentry
-
2014/609 ( PDF )
- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/608 ( PDF )
- Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps
- Ferucio Laurentiu Tiplea and Constantin Catalin Dragan
-
2014/607 ( PDF )
- Adding Controllable Linkability to Pairing-Based Group Signatures For Free
- Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer
-
2014/606 ( PDF )
- A Multi-Function Provable Data Possession Scheme in Cloud Computing
- Xiaojun Yu and Qiaoyan Wen
-
2014/605 ( PDF )
- On the Possibilities and Limitations of Computational Fuzzy Extractors
- Kenji Yasunaga and Kosuke Yuzawa
-
2014/604 ( PDF )
- Private Web Search with Constant Round Efficiency
- Bolam Kang and Sung Cheol Goh and Myungsun Kim
-
2014/603 ( PDF )
- Recursive Trees for Practical ORAM
- Tarik Moataz and Erik-Oliver Blass and Guevara Noubir
-
2014/602 ( PDF )
- A Cryptographic Study of Tokenization Systems
- Sandra Diaz-Santiago and Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
-
2014/601 ( PDF )
- Adaptive versus Static Security in the UC Model
- Ivan Damgĺrd and Jesper Buus Nielsen
-
2014/600 ( -- withdrawn -- )
- DTKI: a new formalized PKI with no trusted parties
- Jiangshan Yu and Vincent Cheval and Mark Ryan
-
2014/599 ( PDF )
- Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
- Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila
-
2014/598 ( PDF )
- Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
- Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi
-
2014/597 ( PDF )
- Invisible Adaptive Attacks
- Jesper Buus Nielsen and Mario Strefler
-
2014/596 ( PDF )
- Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification
- Marina Blanton and Siddharth Saraph
-
2014/595 ( PDF )
- Scalable Zero Knowledge via Cycles of Elliptic Curves
- Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
-
2014/594 ( PDF )
- Oblivious Parallel RAM and Applications
- Elette Boyle and Kai-Min Chung and Rafael Pass
-
2014/593 ( PDF )
- Improved Exponential-time Algorithms for Inhomogeneous-SIS
- Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield
-
2014/592 ( PDF )
- Multiprecision multiplication on AVR revisited
- Michael Hutter and Peter Schwabe
-
2014/591 ( PDF )
- Compact and Side Channel Secure Discrete Gaussian Sampling
- Sujoy Sinha Roy and Oscar Reparaz and Frederik Vercauteren and Ingrid Verbauwhede
-
2014/590 ( PDF )
- Automated algebraic analysis of structure-preserving signature schemes
- Joeri de Ruiter
-
2014/589 ( PDF )
- Authenticated Key Exchange from Ideal Lattices
- Jiang Zhang and Zhenfeng Zhang and Jintai Ding and Michael Snook and Özgür Dagdelen
-
2014/588 ( PDF )
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Brent Waters
-
2014/587 ( PDF )
- Non-interactive zero-knowledge proofs in the quantum random oracle model
- Dominique Unruh
-
2014/586 ( PDF )
- An Algebraic Approach to Non-Malleability
- Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald
-
2014/585 ( PDF )
- The SPEKE Protocol Revisited
- Feng Hao and Siamak F. Shahandashti
-
2014/584 ( PDF )
- Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2014/583 ( PDF )
- Template Attacks Based On Priori Knowledge
- Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
-
2014/582 ( PDF )
- NSEC5: Provably Preventing DNSSEC Zone Enumeration
- Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv
-
2014/581 ( PDF )
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Olivier Blazy and Eike Kiltz and Jiaxin Pan
-
2014/580 ( PDF )
- The Hunting of the SNARK
- Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer
-
2014/579 ( -- withdrawn -- )
- Scan Based Side Channel Attack on Grain v1
- Sonu Kumar Jha
-
2014/578 ( PDF )
- The Exact PRF-Security of NMAC and HMAC
- Peter Gaži and Krzysztof Pietrzak and Michal Rybár
-
2014/577 ( PDF )
- Reducing Communication Overhead of the Subset Difference Scheme
- Sanjay Bhattacherjee and Palash Sarkar
-
2014/576 ( PDF )
- Vernam Two
- Dan P. Milleville
-
2014/575 ( PDF )
- Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
- Markku-Juhani O. Saarinen
-
2014/574 ( PDF )
- Security Analysis of Multilinear Maps over the Integers
- Hyung Tae Lee and Jae Hong Seo
-
2014/573 ( PDF )
- A new public key system based on Polynomials over finite fields GF(2)
- Gurgen Khachatrian
-
2014/572 ( PDF )
- On the Optimality of Differential Fault Analyses on CLEFIA
- Juliane Krämer and Anke Stüber and Ágnes Kiss
-
2014/571 ( PDF )
- How to manipulate curve standards: a white paper for the black hat
- Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
-
2014/570 ( PDF )
- Deja Q: Using Dual Systems to Revisit q-Type Assumptions
- Melissa Chase and Sarah Meiklejohn
-
2014/569 ( PDF )
- Fast Lattice Point Enumeration with Minimal Overhead
- Daniele Micciancio and Michael Walter
-
2014/568 ( PDF )
- New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC
- Masao KASAHARA
-
2014/567 ( -- withdrawn -- )
- Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation
- Hiroaki Anada and Seiko Arita and Kouichi Sakurai
-
2014/566 ( PDF )
- Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
- Daniel Augot and Matthieu Finiasz
-
2014/565 ( PDF )
- Kangaroos in Side-Channel Attacks
- Tanja Lange and Christine van Vredendaal and Marnix Wakker
-
2014/564 ( -- withdrawn -- )
- A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
- Massoud Hadian Dehkordi and Reza Ghasemi
-
2014/563 ( PDF )
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
- Aleksandar Kircanski
-
2014/562 ( PDF )
- hHB: a Harder HB+ Protocol
- Ka Ahmad Khoureich
-
2014/561 ( PDF )
- Performance Increasing Approaches For Binary Field Inversion
- Vladislav Kovtun and Maria Bulakh
-
2014/560 ( PDF )
- Towards Forward Security Properties for PEKS and IBE
- Qiang Tang
-
2014/559 ( PDF )
- Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
- Pablo Rauzy and Sylvain Guilley
-
2014/558 ( PDF )
- Double shielded Public Key Cryptosystems
- Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang
-
2014/557 ( PDF )
- Round-Efficient Black-Box Construction of Composable Multi-Party Computation
- Susumu Kiyoshima
-
2014/556 ( PDF )
- Securing Cloud Data in the New Attacker Model
- Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
-
2014/555 ( PDF )
- General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
- Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges
-
2014/554 ( PDF )
- On Virtual Grey Box Obfuscation for General Circuits
- Nir Bitansky and Ran Canetti and Yael Tauman-Kalai and Omer Paneth
-
2014/553 ( PDF )
- A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
- Ran Canetti and Asaf Cohen and Yehuda Lindell
-
2014/552 ( PDF )
- Efficient Record-Level Keyless Signatures for Audit Logs
- Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards
-
2014/551 ( PDF )
- Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
- Daniel Augot and Pierre-Alain Fouque and Pierre Karpman
-
2014/550 ( PDF )
- Function-Private Functional Encryption in the Private-Key Setting
- Zvika Brakerski and Gil Segev
-
2014/549 ( PDF )
- New Attacks on the RSA Cryptosystem
- Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig
-
2014/548 ( PDF )
- Implicit factorization of unbalanced RSA moduli
- Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin
-
2014/547 ( PDF )
- Authentication Codes Based on Resilient Boolean Maps
- Juan Carlos Ku-Cauich and Guillermo Morales-Luna
-
2014/546 ( PDF )
- Anonymous and Publicly Linkable Reputation Systems
- Johannes Blömer and Jakob Juhnke and Christina Kolb
-
2014/545 ( PDF )
- Solving closest vector instances using an approximate shortest independent vectors oracle
- Chengliang Tian and Wei Wei and Dongdai Lin
-
2014/544 ( PDF )
- Secure Mutual Testing Strategy for Cryptographic SoCs
- Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede
-
2014/543 ( PDF )
- A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
- Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
-
2014/542 ( PDF )
- On the Multi-output Filtering Model and Its Applications
- Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu
-
2014/541 ( PDF )
- EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
- Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto Nagata and Takafumi Aoki
-
2014/540 ( PDF )
- Optimized Architecture for AES
- Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey
-
2014/539 ( PDF )
- Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption
- Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang
-
2014/538 ( -- withdrawn -- )
- A Secure Cloud-based NFC Mobile Payment Protocol
- pardis pourghomi and muhammad qasim saeed and george ghinea
-
2014/537 ( PDF )
- Constrained Verifiable Random Functions
- Georg Fuchsbauer
-
2014/536 ( PDF )
- On Decomposition of an NFSR into a Cascade Connection of Two Smaller
- Tian Tian and Wen-Feng Qi
-
2014/535 ( PDF )
- On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
- Massimo Chenal and Qiang Tang
-
2014/534 ( PDF )
- Differential Power Analysis of a McEliece Cryptosystem
- Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
-
2014/533 ( PDF )
- Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions
- Jaiganesh Balasundaram
-
2014/532 ( -- withdrawn -- )
- On the Pitfalls of using Arbiter-PUFs as Building Blocks
- Georg T. Becker
-
2014/531 ( PDF )
- Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
- Paolo Palmieri and Luca Calderoni and Dario Maio
-
2014/530 ( PDF )
- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
- Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap
-
2014/529 ( PDF )
- Leakage-Resilient Signatures with Graceful Degradation
- Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
-
2014/528 ( PDF )
- Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups
- Xiaofeng Wang and Chen Xu and Guo Li and Hanling Lin
-
2014/527 ( PDF )
- Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
- Annelie Heuser and Olivier Rioul and Sylvain Guilley
-
2014/526 ( PDF )
- Curve41417: Karatsuba revisited
- Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
-
2014/525 ( PDF )
- Differential Analysis on Block Cipher PRIDE
- Jingyuan Zhao and Xiaoyun Wang and Meiqin Wang and Xiaoyang Dong
-
2014/524 ( PDF )
- Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
- Chunming Tang and Yanfeng Qi
-
2014/523 ( PDF )
- Fully Secure and Fast Signing from Obfuscation
- Kim Ramchen and Brent Waters
-
2014/522 ( PDF )
- Constrained Pseudorandom Functions: Verifiable and Delegatable
- Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
-
2014/521 ( PDF )
- Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
- Susan Hohenberger and Venkata Koppula and Brent Waters
-
2014/520 ( PDF )
- Squares of Random Linear Codes
- Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Zémor
-
2014/519 ( PDF )
- Realizing Pico: Finally No More Passwords!
- Jens Hermans and Roel Peeters
-
2014/518 ( PDF )
- Cryptography from Compression Functions: The UCE Bridge to the ROM
- Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
-
2014/517 ( PDF )
- On the Connection between Leakage Tolerance and Adaptive Security
- Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
-
2014/516 ( PDF )
- On the Classification of Finite Boolean Functions up to Fairness
- Nikolaos Makriyannis
-
2014/515 ( -- withdrawn -- )
- Ideal Social Secret Sharing Using Birkhoff Interpolation Method
- Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian
-
2014/514 ( PDF )
- On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
- Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili
-
2014/513 ( PDF )
- RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
- Noboru Kunihiro and Junya Honda
-
2014/512 ( PDF )
- Rmind: a tool for cryptographically secure statistical analysis
- Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk
-
2014/511 ( PDF )
- Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
- Johannes Blömer and Gennadij Liske
-
2014/510 ( PDF )
- A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
- Pratish Datta and Dibyendu Roy and Sourav Mukhopadhyay
-
2014/509 ( PDF )
- Privacy preserving delegated word search in the cloud
- Kaoutar Elkhiyaoui and Melek Onen and Refik Molva
-
2014/508 ( PDF )
- Reversing Stealthy Dopant-Level Circuits
- Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino
-
2014/507 ( PDF )
- How to Generate and use Universal Samplers
- Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry
-
2014/506 ( PDF )
- Finding Roots in GF(p^n) with the Successive Resultant Algorithm
- Christophe Petit
-
2014/505 ( PDF )
- On the quaternion $\ell$-isogeny path problem
- David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
-
2014/504 ( PDF )
- A Provable Security Analysis of Intel's Secure Key RNG
- Thomas Shrimpton and R. Seth Terashima
-
2014/503 ( PDF )
- Efficient Hidden Vector Encryption with Constant-Size Ciphertext
- Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo
-
2014/502 ( PDF )
- What's the Gist? Privacy-Preserving Aggregation of User Profiles
- Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun
-
2014/501 ( PDF )
- WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time
- Markku--Juhani O. Saarinen and Billy Bob Brumley
-
2014/500 ( -- withdrawn -- )
- Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
- Can Xiang and Chunming Tang
-
2014/499 ( PDF )
- Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
- Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş
-
2014/498 ( PDF )
- Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix
- Souvik Kolay and Debdeep Mukhopadhyay
-
2014/497 ( PDF )
- NREPO:Normal Basis Recomputing with Permuted Operands
- Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin and Ramesh Karri
-
2014/496 ( PDF )
- Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo
-
2014/495 ( PDF )
- Improved Short Lattice Signatures in the Standard Model
- Léo Ducas and Daniele Micciancio
-
2014/494 ( PDF )
- Hardness of k-LWE and Applications in Traitor Tracing
- San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld
-
2014/493 ( PDF )
- Arithmetic on Abelian and Kummer Varieties
- David Lubicz and Damien Robert
-
2014/492 ( PDF )
- Fault attacks on pairing-based protocols revisited
- Sanjit Chatterjee and Koray Karabina and Alfred Menezes
-
2014/491 ( PDF )
- Bootstrappable Identity-Based Fully Homomorphic Encryption
- Michael Clear and Ciarán McGoldrick
-
2014/490 ( PDF )
- Universally Composable secure TNC protocol based on IF-T binding to TLS
- Shijun Zhao and Qianying Zhang and Yu Qin and Dengguo Feng
-
2014/489 ( PDF )
- A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge
- Dan Ding and Guizhen Zhu and Xiaoyun Wang
-
2014/488 ( PDF )
- Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
- Michel Abdalla and Fabrice Benhamouda and Alain Passelčgue and Kenneth G. Paterson
-
2014/487 ( PDF )
- GGHLite: More Efficient Multilinear Maps from Ideal Lattices
- Adeline Langlois and Damien Stehle and Ron Steinfeld
-
2014/486 ( PDF )
- Binary Elligator Squared
- Diego F. Aranha and Pierre-Alain Fouque and Chen Qian and Mehdi Tibouchi and Jean-Christophe Zapalowicz
-
2014/485 ( PDF )
- An Improved Truncated Differential Cryptanalysis of KLEIN
- Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref
-
2014/484 ( PDF )
- Sealing the Leak on Classical NTRU Signatures
- Carlos Aguilar Melchor and Xavier Boyen and Jean-Christophe Deneuville and Philippe Gaborit
-
2014/483 ( PDF )
- Disjunctions for Hash Proof Systems: New Constructions and Applications
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/482 ( PDF )
- Differentially Private Data Aggregation with Optimal Utility
- Fabienne Eigner and Aniket Kate and Matteo Maffei and Francesca Pampaloni and Ivan Pryvalov
-
2014/481 ( PDF )
- Universally Composable Non-Interactive Key Exchange
- Eduarda S.V. Freire and Julia Hesse and Dennis Hofheinz
-
2014/480 ( PDF )
- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
- Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
-
2014/479 ( PDF )
- Even more practical secure logging: Tree-based Seekable Sequential Key Generators
- Giorgia Azzurra Marson and Bertram Poettering
-
2014/478 ( PDF )
- Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
- Benny Applebaum and Eyal Widder
-
2014/477 ( PDF )
- Relaxed Two-to-one Recoding Schemes
- Omkant Pandey and Kim Ramchen and Brent Waters
-
2014/476 ( PDF )
- Simon's Circuit
- Paul Baecher
-
2014/475 ( PDF )
- A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
- Imran Erguler
-
2014/474 ( PDF )
- Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
- Alex Biryukov and Charles Bouillaguet and Dmitry Khovratovich
-
2014/473 ( -- withdrawn -- )
- An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
- Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
-
2014/472 ( PDF )
- How to Watermark Cryptographic Functions
- Ryo Nishimaki
-
2014/471 ( -- withdrawn -- )
- Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
- Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
-
2014/470 ( PDF )
- PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
- Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Au
-
2014/469 ( PDF )
- Homomorphic Signatures with Efficient Verification for Polynomial Functions
- Dario Catalano, Dario Fiore, and Bogdan Warinschi
-
2014/468 ( PDF )
- Privacy-Preserving Auditing for Attribute-Based Credentials
- Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
-
2014/467 ( PDF )
- Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
- Daniel Demmler and Thomas Schneider and Michael Zohner
-
2014/466 ( PDF )
- On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.
- Samir Bouftass and Abdelhak Azhari
-
2014/465 ( PDF )
- Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
- Jie Chen and Hoeteck Wee
-
2014/464 ( PDF )
- Providing Root of Trust for ARM TrustZone using On-Chip SRAM
- Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng
-
2014/463 ( PDF )
- (Leveled) Fully Homomorphic Signatures from Lattices
- Sergey Gorbunov and Vinod Vaikuntanathan
-
2014/462 ( PDF )
- Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps
- Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
-
2014/461 ( -- withdrawn -- )
- Provably secure and efficient certificateless signature in the standard model
- Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
-
2014/460 ( PDF )
- FleXOR: Flexible garbling for XOR gates that beats free-XOR
- Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek
-
2014/459 ( PDF )
- Template Attacks on Different Devices
- Omar Choudary and Markus G. Kuhn
-
2014/458 ( PDF )
- Automated Analysis of Cryptographic Assumptions in Generic Group Models
- Gilles Barthe and Edvard Fagerholm and Dario Fiore and John Mitchell and Andre Scedrov and Benedikt Schmidt
-
2014/457 ( PDF )
- Transcript Secure Signatures Based on Modular Lattices
- Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte
-
2014/456 ( PDF )
- Verified Implementations for Secure and Verifiable Computation
- José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Guillaume Davy and François Dupressoir and Benjamin Grégoire and Pierre-Yves Strub
-
2014/455 ( PDF )
- Single-shot security for one-time memories in the isolated qubits model
- Yi-Kai Liu
-
2014/454 ( PDF )
- Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
- Amir Moradi and Vincent Immler
-
2014/453 ( PDF )
- Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version
- Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yalçın
-
2014/452 ( PDF )
- Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake
- Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld
-
2014/451 ( PDF )
- Leveled Fully Homomorphic Signatures from Standard Lattices
- Daniel Wichs
-
2014/450 ( -- withdrawn -- )
- Optimized Implementation of General Secret Sharing Scheme
- Lein Harn and Ching-Fang Hsu*
-
2014/449 ( -- withdrawn -- )
- Related Key Secure PKE from Hash Proof Systems
- Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
-
2014/448 ( PDF )
- Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
- Ning Wang and Xiaoyun Wang and Keting Jia and Jingyuan Zhao
-
2014/447 ( PDF )
- Faster Private Set Intersection based on OT Extension
- Benny Pinkas and Thomas Schneider and Michael Zohner
-
2014/446 ( PDF )
- 4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes
- Valerie Nachef and Jacques Patarin and Emmanuel Volte
-
2014/445 ( PDF )
- Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
- Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Rŕfols and Andy Rupp
-
2014/444 ( PDF )
- RPKI vs ROVER: Comparing the Risks of BGP Security Solutions
- Aanchal Malhotra and Sharon Goldberg
-
2014/443 ( PDF )
- Minimizing the Two-Round Even-Mansour Cipher
- Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger
-
2014/442 ( PDF )
- Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix
- Xing Hu and Chunming Tang
-
2014/441 ( PDF )
- Improved Generic Attacks Against Hash-based MACs and HAIFA
- Itai Dinur and Gaëtan Leurent
-
2014/440 ( PDF )
- Double Level Montgomery Cox-Rower Architecture, New Bounds
- Jean-Claude Bajard and Nabil Merkiche
-
2014/439 ( PDF )
- Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions
- Chunming Tang, Yuenai Chen
-
2014/438 ( PDF )
- Security of Symmetric Encryption against Mass Surveillance
- Mihir Bellare and Kenneth Paterson and Phillip Rogaway
-
2014/437 ( PDF )
- Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
- Jingguo Bi and Jean-Sébastien Coron and Jean-Charles Faugère and Phong Q. Nguyen and Guénaël Renault and Rina Zeitoun
-
2014/436 ( PDF )
- Synthesis of Fault Attacks on Cryptographic Implementations
- Gilles Barthe and Francois Dupressoir and Pierre-Alain Fouque and Benjamin Gregoire and Jean-Christophe Zapalowicz
-
2014/435 ( PDF )
- Wait a minute! A fast, Cross-VM attack on AES
- Gorka Irazoqui and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
-
2014/434 ( PDF )
- Just a Little Bit More
- Joop van de Pol and Nigel P. Smart and Yuval Yarom
-
2014/433 ( PDF )
- A Statistical Model for Higher Order DPA on Masked Devices
- A. Adam Ding and Liwei Zhang and Yunsi Fei and Pei Luo
-
2014/432 ( PDF )
- Universally Composable Authentication and Key-exchange with Global PKI
- Ran Canetti and Daniel Shahaf and Margarita Vald
-
2014/431 ( PDF )
- Tiny ORAM: A Low-Latency, Low-Area Hardware ORAM Controller
- Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten Van Dijk and Emil Stefanov and Srinivas Devadas
-
2014/430 ( PDF )
- Revisiting the Gentry-Szydlo Algorithm
- H. W. Lenstra and A. Silverberg
-
2014/429 ( PDF )
- Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
- Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven
-
2014/428 ( PDF )
- Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
- Nuttapong Attrapadung
-
2014/427 ( PDF )
- Fast point multiplication algorithms for binary elliptic curves with and without precomputation
- Thomaz Oliveira and Diego F. Aranha and Julio López and Francisco Rodríguez-Henríquez
-
2014/426 ( PDF )
- Towards Optimally Efficient Secret-Key Authentication from PRG
- Ivan Damgård and Sunoo Park
-
2014/425 ( PDF )
- Note of Multidimensional MITM Attack on 25-Round TWINE-128
- Long Wen and Meiqin Wang and Andrey Bogdanov and Huaifeng Chen
-
2014/424 ( PDF )
- Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants
- Craig Costello and Alyson Deines-Schartz and Kristin Lauter and Tonghai Yang
-
2014/423 ( PDF )
- The Hash Function "Fugue"
- Shai Halevi and William E. Hall and Charanjit S. Jutla
-
2014/422 ( PDF )
- System-level non-interference for constant-time cryptography
- Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Carlos Luna and David Pichardie
-
2014/421 ( PDF )
- FNR : Arbitrary length small domain block cipher proposal
- Sashank Dara, Scott Fluhrer
-
2014/420 ( PDF )
- Bounded Fully Homomorphic Signature Schemes
- Xiang Xie and Rui Xue
-
2014/419 ( PDF )
- FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve
- Jérémie Detrey
-
2014/418 ( PDF )
- A Simple Recursive Tree Oblivious RAM
- Benny Pinkas and Tzachy Reinman
-
2014/417 ( PDF )
- Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions
- Inna Polak, Adi Shamir
-
2014/416 ( PDF )
- Adaptive Security of Constrained PRFs
- Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao
-
2014/415 ( PDF )
- Virtual Proofs of Reality
- Ulrich Rührmair
-
2014/414 ( PDF )
- A Security Proof of KCDSA using an extended Random Oracle Model
- Vikram Singh
-
2014/413 ( PDF )
- On the Cost of Lazy Engineering for Masked Software Implementations
- Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and François-Xavier Standaert
-
2014/412 ( PDF )
- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
- François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Jean-Baptiste Mairy and Yves Deville
-
2014/411 ( PDF )
- Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)
- Vincent Grosso and Romain Poussier and François-Xavier Standaert and Lubos Gaspar
-
2014/410 ( PDF )
- Soft Analytical Side-Channel Attacks
- Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
-
2014/409 ( PDF )
- Moments-Correlating DPA
- Amir Moradi and François-Xavier Standaert
-
2014/408 ( PDF )
- Bootstrapping BGV Ciphertexts With A Wider Choice of p and q.
- Emmanuela Orsini and Joop van de Pol and Nigel P. Smart
-
2014/407 ( PDF )
- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
- Fu-Kuo Tseng and Rong-Jaye Chen and Bao-Shuh Paul Lin
-
2014/406 ( PDF )
- New Generic Attacks Against Hash-based MACs
- Gaëtan Leurent and Thomas Peyrin and Lei Wang
-
2014/405 ( PDF )
- Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
- Christina Brzuska and Arno Mittelbach
-
2014/404 ( PDF )
- Large-Scale Secure Computation
- Elette Boyle and Kai-Min Chung and Rafael Pass
-
2014/403 ( PDF )
- Generic Universal Forgery Attack on Iterative Hash-based MACs
- Thomas Peyrin and Lei Wang
-
2014/402 ( PDF )
- On the Existence of Extractable One-Way Functions
- Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
-
2014/401 ( PDF )
- Software implementation of an Attribute-Based Encryption scheme
- Eric Zavattoni and Luis J. Dominguez Perez and Shigeo Mitsunari and Ana H. Sánchez-Ramírez and Tadanori Teruya and Francisco Rodríguez-Henríquez
-
2014/400 ( PDF )
- Composable Oblivious Extended Permutations
- Peeter Laud and Jan Willemson
-
2014/399 ( PDF )
- An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
- Dustin Moody and Ray Perlner and Daniel Smith-Tone
-
2014/398 ( PDF )
- Differential Properties of the HFE Cryptosystem
- Taylor Daniels and Daniel Smith-Tone
-
2014/397 ( PDF )
- Cofactorization on Graphics Processing Units
- Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra
-
2014/396 ( PDF )
- Efficient Short Adaptive NIZK for NP
- Helger Lipmaa
-
2014/395 ( PDF )
- Lightweight and Privacy-Preserving Delegatable Proofs of Storage
- Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong
-
2014/394 ( PDF )
- Relational Hash
- Avradip Mandal and Arnab Roy
-
2014/393 ( PDF )
- (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
- Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
-
2014/392 ( PDF )
- The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
- Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
-
2014/391 ( PDF )
- MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
- Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
-
2014/390 ( PDF )
- Black-Box Non-Black-Box Zero Knowledge
- Vipul Goyal and Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti
-
2014/389 ( PDF )
- Accelerating NTRU based Homomorphic Encryption using GPUs
- Wei Dai and Yarkın Doröz and Berk Sunar
-
2014/388 ( PDF )
- Finding collisions for MD4 hash algorithm using hybrid algorithm
- Marko Carić
-
2014/387 ( PDF )
- New candidates for multivariate trapdoor functions
- Jaiberth Porras, John B. Baena, Jintai Ding
-
2014/386 ( PDF )
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
- Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede
-
2014/385 ( PDF )
- Jacobian Coordinates on Genus 2 Curves
- Huseyin Hisil and Craig Costello
-
2014/384 ( PDF )
- Yao's millionaires' problem and decoy-based public key encryption by classical physics
- Dima Grigoriev and Vladimir Shpilrain
-
2014/383 ( PDF )
- Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
- Younsung Choi, Dongho Won
-
2014/382 ( PDF )
- Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
- Felix Günther and Mark Manulis and Andreas Peter
-
2014/381 ( PDF )
- Using Indistinguishability Obfuscation via UCEs
- Christina Brzuska and Arno Mittelbach
-
2014/380 ( PDF )
- Efficient Adaptively Secure IBBE from Standard Assumptions
- Somindu C. Ramanna and Palash Sarkar
-
2014/379 ( PDF )
- Hyper-and-elliptic-curve cryptography
- Daniel J. Bernstein and Tanja Lange
-
2014/378 ( PDF )
- Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps
- SK Hafizul Islam
-
2014/377 ( PDF )
- Logic Synthesis based Public Key Scheme
- Boaz Shahar
-
2014/376 ( PDF )
- How Secure is Deterministic Encryption?
- Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi
-
2014/375 ( PDF )
- Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)
- Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
-
2014/374 ( PDF )
- Optimal Contracts for Outsourced Computation
- Viet Pham and MHR. Khouzani and Carlos Cid
-
2014/373 ( PDF )
- Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
- Philipp Jovanovic and Atul Luykx and Bart Mennink
-
2014/372 ( PDF )
- Fully secure constrained pseudorandom functions using random oracles
- Dennis Hofheinz
-
2014/371 ( PDF )
- On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
- Christophe Doche
-
2014/370 ( PDF )
- Compact VSS and Efficient Homomorphic UC Commitments
- Ivan Damgĺrd and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen
-
2014/369 ( PDF )
- On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness
- Michčle Feltz and Cas Cremers
-
2014/368 ( PDF )
- Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster
- Erich Wenger and Paul Wolfger
-
2014/367 ( PDF )
- Redefining the Transparency Order
- Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff
-
2014/366 ( PDF )
- Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System
- Younsung Choi and Dongho Won
-
2014/365 ( PDF )
- Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
- Luke Mather and Elisabeth Oswald and Carolyn Whitnall
-
2014/364 ( PDF )
- Deleting Secret Data with Public Verifiability
- Feng Hao and Dylan Clarke and Avelino Francisco Zorzo
-
2014/363 ( PDF )
- Forging Attacks on two Authenticated Encryptions COBRA and POET
- Mridul Nandi
-
2014/362 ( PDF )
- Nothing is for Free: Security in Searching Shared & Encrypted Data
- Qiang Tang
-
2014/361 ( PDF )
- New Results in the Linear Cryptanalysis of DES
- Igor Semaev
-
2014/360 ( PDF )
- McEliece in the world of Escher
- Danilo Gligoroski and Simona Samardjiska and Håkon Jacobsen and Sergey Bezzateev
-
2014/359 ( PDF )
- Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations
- Eduardo Ruiz Duarte and Octavio Páez Osuna
-
2014/358 ( PDF )
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- Kim-Kwang Raymond Choo and Junghyun Nam and Dongho Won
-
2014/357 ( PDF )
- Simulatable Leakage: Analysis, Pitfalls, and new Constructions
- J. Longo Galea and D. Martin and E. Oswald and D. Page and M. Stam and and M. Tunstall
-
2014/356 ( PDF )
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
- Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy
-
2014/355 ( PDF )
- Graph-theoretic design and analysis of key predistribution schemes
- Michelle Kendall and Keith M. Martin
-
2014/354 ( PDF )
- Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
- Ray Perlner
-
2014/353 ( PDF )
- Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups
- Jean-Charles Faugčre and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
-
2014/352 ( PDF )
- Multi-Vendor PayWord with Payment Approval
- Andrea Huszti
-
2014/351 ( PDF )
- Secret and Verifiable Delegated Voting for Wide Representation
- Yefim Leifman
-
2014/350 ( PDF )
- Distributed Smooth Projective Hashing and its Application to Two-Server PAKE
- Franziskus Kiefer and Mark Manulis
-
2014/349 ( PDF )
- Zerocash: Decentralized Anonymous Payments from Bitcoin
- Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza
-
2014/348 ( PDF )
- A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
- Helger Lipmaa
-
2014/347 ( PDF )
- One-Way Functions and (Im)perfect Obfuscation
- Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev
-
2014/346 ( PDF )
- Time-Memory Trade-offs for Index Calculus in Genus 3
- Kim Laine and Kristin Lauter
-
2014/345 ( PDF )
- Private Database Access With HE-over-ORAM Architecture
- Craig Gentry and Shai Halevi and Charanjit Jutla and Mariana Raykova
-
2014/344 ( PDF )
- Toward Robust Hidden Volumes using Write-Only Oblivious RAM
- Erik-Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu
-
2014/343 ( PDF )
- Solving Linear Equations Modulo Unknown Divisors: Revisited
- Yao Lu and Rui Zhang and Liqiang Peng and Dongdai Lin
-
2014/342 ( PDF )
- Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
- Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
-
2014/341 ( PDF )
- Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2014/340 ( PDF )
- A Strong and Efficient Certificateless Digital Signature Scheme
- Mohammed Alfateh Hassouna and Mohsin Hashim
-
2014/339 ( -- withdrawn -- )
- Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds
- Yi Deng
-
2014/338 ( PDF )
- A Tamper and Leakage Resilient von Neumann Architecture
- Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
-
2014/337 ( PDF )
- Related Randomness Attacks for Public Key Encryption
- Kenneth G. Paterson and Jacob C.N. Schuldt and Dale L. Sibborn
-
2014/336 ( PDF )
- Private Predictive Analysis on Encrypted Medical Data
- Joppe W. Bos and Kristin Lauter and Michael Naehrig
-
2014/335 ( PDF )
- SHADOW NUMBERS PUBLIC KEY ENCRYPTION
- John Almeida
-
2014/334 ( PDF )
- LCPR: High Performance Compression Algorithm for Lattice-Based Signatures
- Rachid El~Bansarkhani and Johannes Buchmann
-
2014/333 ( PDF )
- An optimal representation for the trace zero subgroup
- Elisa Gorla and Maike Massierer
-
2014/332 ( PDF )
- How to Choose Interesting Points for Template Attacks?
- Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng
-
2014/331 ( PDF )
- Machine Learning Classification over Encrypted Data
- Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser
-
2014/330 ( PDF )
- PoS Cryptocurrency wtih No Blockchain
- qianxiaochao
-
2014/329 ( PDF )
- Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
- Berry Schoenmakers
-
2014/328 ( PDF )
- Affine-evasive Sets Modulo a Prime
- Divesh Aggarwal
-
2014/327 ( PDF )
- An Optimal Strong Password Authentication Protocol with USB Sticks
- Vikram D
-
2014/326 ( PDF )
- FeW: A Lightweight Block Cipher
- Manoj Kumar and Saibal K Pal and Anupama Panigrahi
-
2014/325 ( PDF )
- A practical forgery and state recovery attack on the authenticated cipher PANDA-s
- Xiutao FENG, Fan ZHANG and Hui WANG
-
2014/324 ( PDF )
- From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
- Sandro Coretti and Ueli Maurer and Björn Tackmann and Daniele Venturi
-
2014/323 ( PDF )
- Some Remarks on Honeyword Based Password-Cracking Detection
- Imran Erguler
-
2014/322 ( PDF )
- Coding Theoretic Construction of Quantum Ramp Secret Sharing
- Ryutaroh Matsumoto
-
2014/321 ( PDF )
- Efficient Quantum-Immune Keyless Signatures with Identity
- Ahto Buldas and Risto Laanoja and Ahto Truu
-
2014/320 ( PDF )
- Improved Differential Cryptanalysis of Round-Reduced Speck
- Itai Dinur
-
2014/319 ( PDF )
- Preimage attacks on Reduced-round Stribog
- Riham AlTawy and Amr M. Youssef
-
2014/318 ( PDF )
- Index calculus in the trace zero variety
- Elisa Gorla and Maike Massierer
-
2014/317 ( PDF )
- Analysis of NORX: Investigating Differential and Rotational Properties
- Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves
-
2014/316 ( PDF )
- Explicit Non-Malleable Codes Resistant to Permutations
- Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
-
2014/315 ( PDF )
- Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R
- Bartosz Zoltak
-
2014/314 ( PDF )
- Improved Leakage Model Based on Genetic Algorithm
- Zhenbin Zhang and Liji Wu and An Wang and Zhaoli Mu
-
2014/313 ( PDF )
- On the Complexity of Finding Low-Level Solutions
- Bjoern Grohmann
-
2014/312 ( PDF )
- Structure-Preserving Signatures from Type II Pairings
- Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
-
2014/311 ( PDF )
- Exponent-inversion Signatures and IBE under Static Assumptions
- Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu
-
2014/310 ( PDF )
- Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
- Yu Chen and Qiong Huang and Zongyang Zhang
-
2014/309 ( PDF )
- Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
- Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters
-
2014/308 ( PDF )
- The Locality of Searchable Symmetric Encryption
- David Cash and Stefano Tessaro
-
2014/307 ( PDF )
- Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
- Alessandro Barenghi and Gerardo Pelosi and Francesco Regazzoni
-
2014/306 ( PDF )
- Publicly Evaluable Pseudorandom Functions and Their Applications
- Yu Chen and Zongyang Zhang
-
2014/305 ( PDF )
- Collision Attack on 5 Rounds of Grřstl
- Florian Mendel and Vincent Rijmen and Martin Schläffer
-
2014/304 ( PDF )
- Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead
- Dai Ikarashi and Ryo Kikuchi and Koki Hamada and Koji Chida
-
2014/303 ( -- withdrawn -- )
- On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems
- SK Hafizul Islam
-
2014/302 ( PDF )
- Branching Heuristics in Differential Collision Search with Applications to SHA-512
- Maria Eichlseder and Florian Mendel and Martin Schläffer
-
2014/301 ( PDF )
- How to Avoid Obfuscation Using Witness PRFs
- Mark Zhandry
-
2014/300 ( PDF )
- On the Powers of 2
- Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
-
2014/299 ( PDF )
- Optimality of Non-Adaptive Strategies: The Case of Parallel Games
- Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
-
2014/298 ( PDF )
- Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
- Ignacio Cascudo and Ronald Cramer and Chaoping Xing
-
2014/297 ( PDF )
- Pipelineable On-Line Encryption
- Farzaneh Abed and Scott Fluhrer and Christian Forler and Eik List and Stefan Lucks and David McGrew and Jakob Wenzel
-
2014/296 ( PDF )
- Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding
- Andris Ambainis and Ansis Rosmanis and Dominique Unruh
-
2014/295 ( PDF )
- ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
- Nir Bitansky and Omer Paneth
-
2014/294 ( PDF )
- The M3lcrypt Password Based Key Derivation Function
- Isaiah Makwakwa
-
2014/293 ( -- withdrawn -- )
- An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol
- Xi-Jun Lin and Lin Sun
-
2014/292 ( PDF )
- Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256
- Leibo Li and Keting Jia
-
2014/291 ( PDF )
- Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗
- Antonio Sanso
-
2014/290 ( PDF )
- Reliable Broadcast with Respect to Topology Knowledge
- Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
-
2014/289 ( PDF )
- An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation
- Ivan Damgaard and Rasmus Lauritsen, and Tomas Toft
-
2014/288 ( PDF )
- Resilient Aggregation in Simple Linear Sensor Networks
- Kevin J. Henry and Douglas R. Stinson
-
2014/287 ( PDF )
- Active and Passive Side-Channel Attacks on Delay Based PUF Designs
- Georg T, Becker and Raghavan Kumar
-
2014/286 ( PDF )
- Weaknesses of Password Authentication Scheme Based on Geometric Hashing
- Martin Stanek
-
2014/285 ( PDF )
- Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
- David Derler and Christian Hanser and Daniel Slamanig
-
2014/284 ( PDF )
- Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way
- Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam
-
2014/283 ( PDF )
- Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
- Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie
-
2014/282 ( PDF )
- On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation
- Ivan Damgĺrd and Frédéric Dupuis and Jesper Buus Nielsen
-
2014/281 ( PDF )
- WCFB: a tweakable wide block cipher
- Andrey Jivsov
-
2014/280 ( PDF )
- MSEA: Modified Symmetric Encryption Algorithm
- Rajul Kumar and K. K. Mishra and Ashish Tripathi and Abhinav Tomar and Surendra Singh
-
2014/279 ( PDF )
- Improved Impossible Differential Attacks against Round-Reduced LBlock
- Christina Boura and Marine Minier and María Naya-Plasencia and Valentin Suder
-
2014/278 ( PDF )
- Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
- Essam Ghadafi
-
2014/277 ( PDF )
- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
- Lin Ding and Chenhui Jin and Jie Guan and Chuanda Qi
-
2014/276 ( PDF )
- Design of identity-based digital signature schemes using extended chaotic maps
- SK Hafizul Islam
-
2014/275 ( PDF )
- Identity-based encryption and digital signature schemes using extended chaotic maps
- SK Hafizul Islam
-
2014/274 ( PDF )
- Weak instances of composite order protocols
- Sorina Ionica and Malika Izabachène
-
2014/273 ( PDF )
- Witness Encryption from Instance Independent Assumptions
- Craig Gentry and Allison Bishop Lewko and Brent Waters
-
2014/272 ( PDF )
- Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
- Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
-
2014/271 ( PDF )
- STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
- Markku-Juhani O. Saarinen
-
2014/270 ( PDF )
- Faster Maliciously Secure Two-Party Computation Using the GPU
- Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen
-
2014/269 ( PDF )
- Chosen Ciphertext Security via Point Obfuscation
- Takahiro Matsuda and Goichiro Hanaoka
-
2014/268 ( PDF )
- New bit-parallel Montgomery multiplier for trinomials using squaring operation
- Yin Li and Yiyang Chen
-
2014/267 ( PDF )
- Differential Fault Analysis on the families of SIMON and SPECK ciphers
- Harshal Tupsamudre and Shikha Bisht and Debdeep Mukhopadhyay
-
2014/266 ( PDF )
- ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption
- Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Srebrny and Marcin Wojcik
-
2014/265 ( PDF )
- Dual System Groups and its Applications --- Compact HIBE and More
- Jie Chen and Hoeteck Wee
-
2014/264 ( PDF )
- Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
- Janaka Alawatugoda and Colin Boyd and Douglas Stebila
-
2014/263 ( PDF )
- A Generic Scan Attack on Hardware based eStream Winners
- Sandip Karmakar and Dipanwita Roy Chowdhury
-
2014/262 ( PDF )
- Differential Fault Analysis of MICKEY Family of Stream Ciphers
- Sandip Karmakar and Dipanwita Roy Chowdhury
-
2014/261 ( PDF )
- Fault Analysis of Grain Family of Stream Ciphers
- Sandip Karmakar and Dipanwita Roy Chowdhury
-
2014/260 ( PDF )
- Locally Decodable Codes for edit distance
- Rafail Ostrovsky and Anat Paskin-Cherniavsky
-
2014/259 ( PDF )
- Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
- Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
-
2014/258 ( PDF )
- A realtime key recovery attack on the authenticated cipher FASER128
- Xiutao FENG and Fan ZHANG
-
2014/257 ( PDF )
- Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
- Bruce Kallick
-
2014/256 ( PDF )
- Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
- Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
-
2014/255 ( PDF )
- Certification and Efficient Proofs of Committed Topology Graphs
- Thomas Gross
-
2014/254 ( PDF )
- Enhanced Lattice-Based Signatures on Reconfigurable Hardware
- Thomas Pöppelmann and Léo Ducas and Tim Güneysu
-
2014/253 ( -- withdrawn -- )
- Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems
- Fangquan Cheng and Qian Wang and Kui Ren and Zhiyong Peng
-
2014/252 ( PDF )
- Making RSA-PSS Provably Secure Against Non-Random Faults
- Gilles Barthe and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Mehdi Tibouchi and Jean-Christophe Zapalowicz
-
2014/251 ( PDF )
- Forgery on Stateless CMCC
- Guy Barwell
-
2014/250 ( PDF )
- Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
- Boaz Tsaban and Noam Lifshitz
-
2014/249 ( PDF )
- Linear Extension Cube Attack on Stream Ciphers
- Liren Ding, Yongjuan Wang, Zhufeng Li
-
2014/248 ( PDF )
- Fine grain Cross-VM Attacks on Xen and VMware are possible!
- Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
-
2014/247 ( PDF )
- Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
- Ivan Pryvalov and Aniket Kate
-
2014/246 ( PDF )
- Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
- Kwangsu Lee and Dong Hoon Lee
-
2014/245 ( PDF )
- A practical state recovery attack on the stream cipher Sablier v1
- Xiutao FENG and Fan ZHANG
-
2014/244 ( PDF )
- bitcoin.BitMint: Reconciling Bitcoin with Central Banks
- Gideon Samid
-
2014/243 ( PDF )
- Key Derivation From Noisy Sources With More Errors Than Entropy
- Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam Smith
-
2014/242 ( PDF )
- Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
- Franziskus Kiefer and Mark Manulis
-
2014/241 ( PDF )
- A New Way to Prevent UKS Attacks Using Trusted Computing
- Qianying Zhang and Shijun Zhao and Dengguo Feng
-
2014/240 ( PDF )
- Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
- Martin Pettai and Peeter Laud
-
2014/239 ( PDF )
- Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
- Florian Legendre and Gilles Dequen and Michaël Krajecki
-
2014/238 ( PDF )
- High Parallel Complexity Graphs and Memory-Hard Functions
- Joël Alwen and Vladimir Serbinenko
-
2014/237 ( PDF )
- SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs
- Aydin Aysu and Ege Gulcan and Patrick Schaumont
-
2014/236 ( PDF )
- Linear Sequential Circuit Approximation of Acterbahn Stream Cipher
- Shazia Afreen
-
2014/235 ( PDF )
- Efficient Fuzzy Search on Encrypted Data
- Alexandra Boldyreva and Nathan Chenette
-
2014/234 ( PDF )
- Enhancing Oblivious RAM Performance Using Dynamic Prefetching
- Xiangyao Yu and Ling Ren and Christopher Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas
-
2014/233 ( PDF )
- Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
- Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar
-
2014/232 ( PDF )
- Bandwidth Efficient PIR from NTRU
- Yarkın Doröz, Berk Sunar and Ghaith Hammouri
-
2014/231 ( PDF )
- Self-Updatable Encryption with Short Public Parameters and Its Extensions
- Kwangsu Lee
-
2014/230 ( PDF )
- Isogeny graphs with maximal real multiplication
- Sorina Ionica and Emmanuel Thomé
-
2014/229 ( -- withdrawn -- )
- Investigating the Feasibility of LEAP+ in ZigBee Specification
- Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi
-
2014/228 ( PDF )
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban
-
2014/227 ( -- withdrawn -- )
- CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks
- Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi
-
2014/226 ( PDF )
- Weak-Key Analysis of POET
- Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser
-
2014/225 ( PDF )
- Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption
- Tapas Pandit and Rana Barua
-
2014/224 ( PDF )
- Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
- Henry Carter and Charles Lever and Patrick Traynor
-
2014/223 ( PDF )
- Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
- Léo Perrin and Dmitry Khovratovich
-
2014/222 ( PDF )
- Optimizing Obfuscation: Avoiding Barrington's Theorem
- Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai
-
2014/221 ( PDF )
- Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
- Toomas Krips and Jan Willemson
-
2014/220 ( PDF )
- Total Break of Zorro using Linear and Differential Attacks
- Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2014/219 ( PDF )
- Dynamic Searchable Encryption via Blind Storage
- Muhammad Naveed and Manoj Prabhakaran and Carl A. Gunter
-
2014/218 ( PDF )
- A Practical Universal Forgery Attack against PAES-8
- Yu Sasaki and Lei Wang
-
2014/217 ( PDF )
- A Forgery Attack against PANDA-s
- Yu Sasaki and Lei Wang
-
2014/216 ( PDF )
- Implementation and Improvement of the Partial Sum Attack on 6-round AES
- Francesco Aldŕ and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala
-
2014/215 ( PDF )
- Attack On the Markov Problem
- James L. Adams
-
2014/214 ( PDF )
- Squaring Algorithms with Delayed Carry Method and Efficient Parallelization
- Vladislav Kovtun and Andrew Okhrimenko
-
2014/213 ( PDF )
- Secret-Sharing for NP
- Ilan Komargodski and Moni Naor and Eylon Yogev
-
2014/212 ( PDF )
- Remarks on the Pocklington and Padró-Sáez Cube Root Algorithm in $\mathbb F_q$
- Geon Heo and Seokhwan Choi and Kwang Ho Lee and Namhun Koo and Soonhak Kwon
-
2014/211 ( PDF )
- Some Randomness Experiments on TRIVIUM
- Subhabrata Samajder and Palash Sarkar
-
2014/210 ( PDF )
- Structural Cryptanalysis of McEliece Schemes with Compact Keys
- Jean-Charles Faugčre and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich
-
2014/209 ( PDF )
- A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation
- Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung
-
2014/208 ( PDF )
- Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
- Ding Wang and Ping Wang
-
2014/207 ( PDF )
- Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
- Katsuyuki Takashima
-
2014/206 ( PDF )
- Reconsidering Generic Composition
- Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton
-
2014/205 ( PDF )
- Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness
- Ling Ren and Christopher Fletcher and Xiangyao Yu and Albert Kwon and Marten van Dijk and Srinivas Devadas
-
2014/204 ( PDF )
- ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research
- Colin O'Flynn and Zhizhang (David) Chen
-
2014/203 ( PDF )
- Privacy-Preserving Implicit Authentication
- Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti
-
2014/202 ( PDF )
- Efficiently Verifiable Computation on Encrypted Data
- Dario Fiore and Rosario Gennaro and Valerio Pastro
-
2014/201 ( PDF )
- From Input Private to Universally Composable Secure Multiparty Computation Primitives
- Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen
-
2014/200 ( PDF )
- Automatic Protocol Selection in Secure Two-Party Computations
- Florian Kerschbaum and Thomas Schneider and Axel Schröpfer
-
2014/199 ( PDF )
- Doubly Spatial Encryption from DBDH
- Jie Chen and Hoeteck Wee
-
2014/198 ( PDF )
- Fast GPGPU-Based Elliptic Curve Scalar Multiplication
- Eric M. Mahé and Jean-Marie Chauvet
-
2014/197 ( PDF )
- Breaking POET Authentication with a Single Query
- Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei
-
2014/196 ( -- withdrawn -- )
- Crypto-Multimedia
- Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif Ismaili
-
2014/195 ( PDF )
- Low Overhead Broadcast Encryption from Multilinear Maps
- Dan Boneh and Brent Waters and Mark Zhandry
-
2014/194 ( PDF )
- Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
- Sai Raghu Talluri and Swapnoneel Roy
-
2014/193 ( PDF )
- JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
- Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri
-
2014/192 ( PDF )
- Two-sources Randomness Extractors for Elliptic Curves
- Abdoul Aziz Ciss
-
2014/191 ( PDF )
- Side-Channel Analysis on Blinded Regular Scalar Multiplications
- Benoit Feix and Mylčne Roussellet and Alexandre Venelli
-
2014/190 ( PDF )
- The Temperature Side Channel and Heating Fault Attacks
- Michael Hutter and Jörn-Marc Schmidt
-
2014/189 ( PDF )
- Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
- Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
-
2014/188 ( PDF )
- A Second Look at Fischlin's Transformation
- Özgür Dagdelen and Daniele Venturi
-
2014/187 ( PDF )
- FFT-Based Key Recovery for the Integral Attack
- Yosuke Todo
-
2014/186 ( PDF )
- AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
- Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser
-
2014/185 ( PDF )
- Oblivious Data Structures
- Xiao Shaun Wang and Kartik Nayak and Chang Liu and T-H. Hubert Chan and Elaine Shi and Emil Stefanov and Yan Huang
-
2014/184 ( PDF )
- SETUP in Secret Sharing Schemes using Random Values
- Ruxandra F. Olimid
-
2014/183 ( PDF )
- Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
- Tetsu Iwata and Lei Wang
-
2014/182 ( PDF )
- Proving the TLS Handshake Secure (as it is)
- Karthikeyan Bhargavan and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Santiago Zanella-Béguelin
-
2014/181 ( PDF )
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
- Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro
-
2014/180 ( PDF )
- Improving throughput of RC4 algorithm using multithreading techniques in multicore processors
- T.D.B Weerasinghe
-
2014/179 ( PDF )
- Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
- Maura B. Paterson and Douglas R. Stinson
-
2014/178 ( PDF )
- Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
- Qingji Zheng and Shouhuai Xu
-
2014/177 ( PDF )
- Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES
- Valentina Banciu and Elisabeth Oswald
-
2014/176 ( -- withdrawn -- )
- One-Round Witness Indistinguishability from Indistinguishability Obfuscation
- Qihua Niu, Hongda Li, Bei Liang, Fei Tang
-
2014/175 ( PDF )
- Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
- T.D.B Weerasinghe
-
2014/174 ( PDF )
- Analysis of a Modified RC4 Algorithm
- T.D.B Weerasinghe
-
2014/173 ( PDF )
- Continuous Non-malleable Codes
- Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
-
2014/172 ( -- withdrawn -- )
- A novel PUF Scheme
- Jeroen Delvaux
-
2014/171 ( PDF )
- An Effective RC4 Stream Cipher
- T.D.B Weerasinghe
-
2014/170 ( PDF )
- Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256
- Shay Gueron
-
2014/169 ( PDF )
- Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms
- Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
-
2014/168 ( PDF )
- Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
- Scott Coull and Kevin Dyer
-
2014/167 ( PDF )
- How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
- Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs
-
2014/166 ( PDF )
- Tuple decoders for traitor tracing schemes
- Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
-
2014/165 ( -- withdrawn -- )
- A NEW SCALAR POINT MULTIPLICATION SCHEME IN ECC BASED ON ZECKENDORF REPRESENTATION AND MULTIBASE CONCEPT
- Kirti Chawla and Om Pal Yadav
-
2014/164 ( PDF )
- Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters
- Yuriy Tarannikov
-
2014/163 ( PDF )
- Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices
- Arnaud Dambra and Philippe Gaborit and Mylčne Roussellet and Julien Schrek and Nicolas Tafforeau
-
2014/162 ( PDF )
- TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
- Hu Xiong
-
2014/161 ( PDF )
- ``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way
- Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom
-
2014/160 ( PDF )
- TrueSet: Faster Verifiable Set Computations
- Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikos Triandopoulos
-
2014/159 ( PDF )
- Weak-Key Leakage Resilient Cryptography
- Zuoxia Yu and Qiuliang Xu and Yongbin Zhou and Chengyu Hu and Rupeng Yang and Guangjun Fan
-
2014/158 ( PDF )
- Point compression for the trace zero subgroup over a small degree extension field
- Elisa Gorla and Maike Massierer
-
2014/157 ( PDF )
- CLOC: Authenticated Encryption for Short Input
- Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka
-
2014/156 ( PDF )
- Non-Malleable Extractors with Shorter Seeds and Their Applications
- Yanqing Yao and Zhoujun Li
-
2014/155 ( PDF )
- Honey Encryption: Security Beyond the Brute-Force Bound
- Ari Juels and Thomas Ristenpart
-
2014/154 ( -- withdrawn -- )
- Non-Interactive Cryptography in the RAM Model of Computation
- Daniel Apon and Xiong Fan and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
-
2014/153 ( PDF )
- Verifiable Oblivious Storage
- Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam
-
2014/152 ( PDF )
- A Statistics-based Fundamental Model for Side-channel Attack Analysis
- Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang
-
2014/151 ( PDF )
- Security Analysis of Key-Alternating Feistel Ciphers
- Rodolphe Lampe and Yannick Seurin
-
2014/150 ( -- withdrawn -- )
- On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
- Nikolaos Karapanos and Srdjan Capkun
-
2014/149 ( PDF )
- Millions of Millionaires: Multiparty Computation in Large Networks
- Mahdi Zamani and Mahnush Movahedi and Jared Saia
-
2014/148 ( PDF )
- Outsourcing Private RAM Computation
- Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
-
2014/147 ( PDF )
- The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
- Razvan Barbulescu and Cécile Pierrot
-
2014/146 ( PDF )
- Untappable communication channels over optical fibers from quantum-optical noise
- Geraldo A. Barbosa and Jeroen van de Graaf
-
2014/145 ( -- withdrawn -- )
- Calculating Cryptographic Degree of an S-Box
- Prasanna Raghaw Mishra
-
2014/144 ( PDF )
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda
-
2014/143 ( PDF )
- Statistical Concurrent Non-Malleable Zero Knowledge
- Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti
-
2014/142 ( -- withdrawn -- )
- FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm
- Karim M. Abdellatif, R. Chotin-Avot, and H. Mehrez
-
2014/141 ( -- withdrawn -- )
- Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps
- Hao Wang
-
2014/140 ( PDF )
- Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
- Yuval Yarom and Naomi Benger
-
2014/139 ( PDF )
- On the Phase Space of Block-Hiding Strategies
- Assaf Shomer
-
2014/138 ( PDF )
- Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction
- Jae Hong Seo
-
2014/137 ( PDF )
- Efficient, Oblivious Data Structures for MPC
- Marcel Keller and Peter Scholl
-
2014/136 ( PDF )
- Isolated Execution on Many-core Architectures
- Ramya Jayaram Masti and Devendra Rai and Claudio Marforio and Srdjan Capkun
-
2014/135 ( PDF )
- Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
- Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
-
2014/134 ( PDF )
- Kummer strikes back: new DH speed records
- Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe
-
2014/133 ( PDF )
- Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
- Yihua Zhang and Marina Blanton
-
2014/132 ( PDF )
- Efficient Revocable Identity-Based Encryption via Subset Difference Methods
- Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park
-
2014/131 ( PDF )
- Modelling After-the-fact Leakage for Key Exchange
- Janaka Alawatugoda and Douglas Stebila and Colin Boyd
-
2014/130 ( PDF )
- Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
- Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig
-
2014/129 ( PDF )
- How to Use Bitcoin to Design Fair Protocols
- Iddo Bentov and Ranjit Kumaresan
-
2014/128 ( PDF )
- Efficient Three-Party Computation from Cut-and-Choose
- Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas
-
2014/127 ( PDF )
- Algebraic Properties of Modular Addition Modulo a Power of Two
- S. M. Dehnavi and Alireza Rahimipour
-
2014/126 ( -- withdrawn -- )
- Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
- Hui Cui \and Yi Mu \and Man Ho Au
-
2014/125 ( PDF )
- Removing Erasures with Explainable Hash Proof Systems
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/124 ( PDF )
- On the Information Ratio of Non-Perfect Secret Sharing Schemes
- Oriol Farrŕs and Torben Hansen and Tarik Kaced and Carles Padró
-
2014/123 ( PDF )
- FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes
- Mohammad Sadeq Dousti and Rasool Jalili
-
2014/122 ( PDF )
- New Way to Construct Cryptographic Hash Function
- WANGYong
-
2014/121 ( PDF )
- Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation
- Koki Hamada and Dai Ikarashi and Koji Chida and Katsumi Takahashi
-
2014/120 ( PDF )
- Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)
- Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
-
2014/119 ( PDF )
- Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$)
- Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
-
2014/118 ( PDF )
- Quantum position verification in the random oracle model
- Dominique Unruh
-
2014/117 ( PDF )
- An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems
- Bjoern Grohmann
-
2014/116 ( PDF )
- Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model
- Ronald Cramer and Carles Padró and Chaoping Xing
-
2014/115 ( PDF )
- Comments on a novel user authentication and key agreement scheme
- Jia-Lun Tsai
-
2014/114 ( PDF )
- Prover Anonymous and Deniable Distance-Bounding Authentication
- Sebastien Gambs and Cristina Onete and Jean-Marc Robert
-
2014/113 ( PDF )
- Secure Compression: Theory \& Practice
- James Kelley and Roberto Tamassia
-
2014/112 ( PDF )
- Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
- Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich
-
2014/111 ( PDF )
- A Note on the CLRW2 Tweakable Block Cipher Construction
- Gordon Procter
-
2014/110 ( PDF )
- Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box
- Sourav Das
-
2014/109 ( PDF )
- Diffusion Programmable Device : The device to prevent reverse engineering
- Mitsuru Shiozaki, Ryohei Hori and Takeshi Fujino
-
2014/108 ( PDF )
- MJH: A Faster Alternative to MDC-2
- Jooyoung Lee and Martijn Stam
-
2014/107 ( PDF )
- Key-Indistinguishable Message Authentication Codes
- Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
-
2014/106 ( PDF )
- Algorithms in HElib
- Shai Halevi and Victor Shoup
-
2014/105 ( PDF )
- Reducing the Overhead of MPC over a Large Population
- Ashish Choudhury and Arpita Patra and Nigel P. Smart
-
2014/104 ( PDF )
- Space-efficient, byte-wise incremental and perfectly private encryption schemes
- Kévin Atighehchi
-
2014/103 ( PDF )
- SHipher: Families of Block Ciphers based on SubSet-Sum Problem
- Xiali Hei and Binheng Song
-
2014/102 ( PDF )
- Actively Secure Private Function Evaluation
- Payman Mohassel and Saeed Sadeghian and Nigel P. Smart
-
2014/101 ( PDF )
- Dishonest Majority Multi-Party Computation for Binary Circuits
- Enrique Larraia and Emmanuela Orsini and Nigel P. Smart
-
2014/100 ( PDF )
- Improved Slender-set Linear Cryptanalysis
- Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi
-
2014/099 ( PDF )
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
- Christina Brzuska and Pooya Farshim and Arno Mittelbach
-
2014/098 ( PDF )
- Towards Characterizing Complete Fairness in Secure Two-Party Computation
- Gilad Asharov
-
2014/097 ( PDF )
- A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups
- Koji Nuida
-
2014/096 ( PDF )
- Tight security bounds for multiple encryption
- Yuanxi Dai, John Steinberger
-
2014/095 ( PDF )
- Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
- Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi
-
2014/094 ( PDF )
- Faster Bootstrapping with Polynomial Error
- Jacob Alperin-Sheriff and Chris Peikert
-
2014/093 ( PDF )
- The Related-Key Analysis of Feistel Constructions
- Manuel Barbosa and Pooya Farshim
-
2014/092 ( PDF )
- A new class of system oriented PKC, K(I)SOPKC.
- Masao KASAHARA
-
2014/091 ( PDF )
- On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2014/090 ( PDF )
- Cryptanalysis of KLEIN (Full version)
- Virginie Lallemand and María Naya-Plasencia
-
2014/089 ( PDF )
- Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)
- Anne Canteaut and Thomas Fuhr and Henri Gilbert and María Naya-Plasencia and Jean-René Reinhard
-
2014/088 ( PDF )
- A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
- Himanshu Tyagi and Shun Watanabe
-
2014/087 ( PDF )
- AnoA: A Framework For Analyzing Anonymous Communication Protocols
- Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi
-
2014/086 ( PDF )
- Randomized and Efficient Authentication in Mobile Environments
- Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
-
2014/085 ( PDF )
- Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer
- Aleksandra Mileva
-
2014/084 ( PDF )
- RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
- Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
-
2014/083 ( PDF )
- Garbled RAM Revisited, Part II
- Steve Lu and Rafail Ostrovsky
-
2014/082 ( PDF )
- Garbled RAM Revisited, Part I
- Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs
-
2014/081 ( PDF )
- Efficient Round Optimal Blind Signatures
- Sanjam Garg and Divya Gupta
-
2014/080 ( PDF )
- A Full Characterization of Completeness for Two-party Randomized Function Evaluation
- Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai
-
2014/079 ( PDF )
- Unifying Leakage Models: from Probing Attacks to Noisy Leakage
- Alexandre Duc and Stefan Dziembowski and Sebastian Faust
-
2014/078 ( PDF )
- Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
- Ahmad Boorghany and Rasool Jalili
-
2014/077 ( PDF )
- Mixcoin: Anonymity for Bitcoin with accountable mixes
- Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten
-
2014/076 ( PDF )
- Certified Bitcoins
- Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros
-
2014/075 ( PDF )
- Publicly Auditable Secure Multi-Party Computation
- Carsten Baum and Ivan Damgĺrd and Claudio Orlandi
-
2014/074 ( PDF )
- New and Improved Key-Homomorphic Pseudorandom Functions
- Abhishek Banerjee and Chris Peikert
-
2014/073 ( PDF )
- Anonymous Authentication with Shared Secrets
- Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov
-
2014/072 ( PDF )
- Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
- Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser and Sebastian Biedermann
-
2014/071 ( PDF )
- Implementing Pairing-Based Cryptosystems in USB Tokens
- Zhaohui Cheng
-
2014/070 ( PDF )
- Lattice Cryptography for the Internet
- Chris Peikert
-
2014/069 ( PDF )
- One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
- Manoj Ranjan Mishra, Jayaprakash Kar and Banshidhar Majhi
-
2014/068 ( PDF )
- Some security bounds for the DGHV scheme
- Franca Marinelli and Riccardo Aragona and Chiara Marcolla and Massimiliano Sala
-
2014/067 ( PDF )
- Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
- Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey
-
2014/066 ( PDF )
- A Subexponential Construction of Graph Coloring for Multiparty Computation
- Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, and Ron Steinfeld
-
2014/065 ( PDF )
- Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case
- Palash Sarkar and Shashank Singh
-
2014/064 ( PDF )
- A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems
- Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan
-
2014/063 ( PDF )
- Cryptanalysis on “Secure untraceable off-line electronic cash system”
- Yalin Chen and Jue-Sam Chou*
-
2014/062 ( PDF )
- A Comparison of the Homomorphic Encryption Schemes FV and YASHE
- Tancrčde Lepoint and Michael Naehrig
-
2014/061 ( PDF )
- Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
- Stefano Tessaro and David A. Wilson
-
2014/060 ( PDF )
- Verifiable Computation in Multiparty Protocols with Honest Majority
- Peeter Laud and Alisa Pankova
-
2014/059 ( PDF )
- Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
- John Tromp
-
2014/058 ( PDF )
- Cryptanalysis of FIDES
- Itai Dinur and Jérémy Jean
-
2014/057 ( PDF )
- Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma
- Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
-
2014/056 ( PDF )
- Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
- Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang
-
2014/055 ( PDF )
- Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
- Younsung Choi
-
2014/054 ( PDF )
- The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions
- Sugata Gangopadhyay and Pantelimon Stanica
-
2014/053 ( PDF )
- Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
- Sonia Belaďd, and Vincent Grosso and François-Xavier Standaert
-
2014/052 ( PDF )
- DAA-related APIs in TPM2.0 Revisited
- Li Xi
-
2014/051 ( PDF )
- An Equivalence-Preserving Transformation of Shift Registers
- Elena Dubrova
-
2014/050 ( PDF )
- Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication
- Daniel R. L. Brown
-
2014/049 ( PDF )
- Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography
- Neha tirthani and Ganesan
-
2014/048 ( PDF )
- When a Boolean Function can be Expressed as the Sum of two Bent Functions
- Longjiang Qu and Shaojing Fu and Qingping Dai and Chao Li
-
2014/047 ( PDF )
- Down the Rabbit Hole: Revisiting the Shrinking Method
- Vivien Dubois
-
2014/046 ( PDF )
- Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
- Yalin Chen1 and Jue-Sam Chou*2
-
2014/045 ( PDF )
- Human Assisted Randomness Generation Using Video Games
- Mohsen Alimomeni and Reihaneh Safavi-Naini
-
2014/044 ( PDF )
- rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval
- Lichun Li and Michael Militzer and Anwitaman Datta
-
2014/043 ( PDF )
- Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
- Mehdi Tibouchi
-
2014/042 ( PDF )
- A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem
- Jintai Ding, Chengdong Tao
-
2014/041 ( PDF )
- Cryptanalysis via algebraic spans
- Adi Ben-Zvi and Arkadius Kalka and Boaz Tsaban
-
2014/040 ( PDF )
- A Fast Modular Reduction Method
- Zhengjun Cao and Ruizhong Wei and Xiaodong Lin
-
2014/039 ( PDF )
- Homomorphic AES Evaluation using NTRU
- Yarkin Doroz and Yin Hu and Berk Sunar
-
2014/038 ( PDF )
- Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
- Ralf Kuesters and Enrico Scapin and Tomasz Truderung and Juergen Graf
-
2014/037 ( PDF )
- On the Security of the Pre-Shared Key Ciphersuites of TLS
- Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk
-
2014/036 ( PDF )
- A Secure Text Messaging Protocol
- Gary Belvin
-
2014/035 ( PDF )
- A new attack on RSA with a composed decryption exponent
- Abderrahmane Nitaj and Mohamed Ould Douh
-
2014/034 ( PDF )
- Authenticated Encryption with SPECK
- Chase Manny
-
2014/033 ( PDF )
- Lattice-based Group Signature Scheme with Verifier-local Revocation
- Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang
-
2014/032 ( PDF )
- Scale-Invariant Fully Homomorphic Encryption over the Integers
- Jean-Sébastien Coron and Tancrčde Lepoint and Mehdi Tibouchi
-
2014/031 ( PDF )
- On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results
- Yongge Wang
-
2014/030 ( PDF )
- Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
- Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simplicio Jr.
-
2014/029 ( PDF )
- General Impossibility of Group Homomorphic Encryption in the Quantum World
- Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter
-
2014/028 ( PDF )
- Channel Equalization for Side Channel Attacks
- Colin O'Flynn and Zhizhang (David) Chen
-
2014/027 ( PDF )
- Twisting Edwards curves with isogenies
- Mike Hamburg
-
2014/026 ( PDF )
- Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
- Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger and Mélanie Favre and Tarik Graba
-
2014/025 ( PDF )
- Side-Channel Leakage through Static Power – Should We Care about in Practice? –
- Amir Moradi
-
2014/024 ( PDF )
- An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
- Ivan Damgĺrd and Jesper Buus Nielsen
-
2014/023 ( PDF )
- Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle
- Gengran Hu and Yanbin Pan and Feng Zhang
-
2014/022 ( PDF )
- Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR
- Sourav Das
-
2014/021 ( PDF )
- Online/Offline Attribute-Based Encryption
- Susan Hohenberger and Brent Waters
-
2014/020 ( PDF )
- (De-)Constructing TLS
- Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi
-
2014/019 ( PDF )
- Lazy Modulus Switching for the BKW Algorithm on LWE
- Martin R. Albrecht and Jean-Charles Faugčre and Robert Fitzpatrick and Ludovic Perret
-
2014/018 ( PDF )
- Completeness for Symmetric Two-Party Functionalities - Revisited
- Yehuda Lindell and Eran Omri and Hila Zarosim
-
2014/017 ( -- withdrawn -- )
- Two-round password-only authenticated key exchange in the three-party setting
- Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
-
2014/016 ( PDF )
- Triple and Quadruple Encryption: Bridging the Gaps
- Bart Mennink and Bart Preneel
-
2014/015 ( PDF )
- Tight Security Bounds for Triple Encryption
- Jooyoung Lee
-
2014/014 ( PDF )
- Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
- Felix Günther and Bertram Poettering
-
2014/013 ( -- withdrawn -- )
- A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs
- Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol
-
2014/012 ( PDF )
- Maximal Information Coefficient Analysis
- Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
-
2014/011 ( PDF )
- Construction of New Families of MDS Diffusion Layers
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
-
2014/010 ( PDF )
- A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
- Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
-
2014/009 ( PDF )
- Characterization of EME with Linear Mixing
- Nilanjan Datta and Mridul Nandi
-
2014/008 ( PDF )
- A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
- Annelie Heuser and Olivier Rioul and Sylvain Guilley
-
2014/007 ( PDF )
- One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.
- Ethan Heilman
-
2014/006 ( PDF )
- Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
- Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
-
2014/005 ( -- withdrawn -- )
- The analysis of the Keccak with the new method called parity
- Ghanei yakhdan.mostafa
-
2014/004 ( PDF )
- MaxMinMax problem and sparse equations over finite fields
- Igor Semaev
-
2014/003 ( PDF )
- $GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials
- Xi Xiong and Haining Fan
-
2014/002 ( PDF )
- Pseudorandom Generator Based on Hard Lattice Problem
- Kuan Cheng
-
2014/001 ( PDF )
- Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
- Yalin Chen and Jue-Sam Chou
-
2013/882 ( PDF )
- New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers
- Zhe Liu and Johann Großschädl
-
2013/881 ( PDF )
- Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains
- Yonatan Sompolinsky and Aviv Zohar
-
2013/880 ( PDF )
- New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
- Seunghwan Park and Kwangsu Lee and Dong Hoon Lee
-
2013/879 ( PDF )
- Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
- Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
-
2013/878 ( PDF )
- Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs
- Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng
-
2013/877 ( PDF )
- MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature
- Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
-
2013/876 ( PDF )
- Public-Key Encryption with Lazy Parties
- Kenji Yasunaga
-
2013/875 ( PDF )
- Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE
- Michael Clear and Ciaran McGoldrick
-
2013/874 ( PDF )
- General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
- Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga
-
2013/873 ( PDF )
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- Mihir Bellare and Igors Stepanovs and Stefano Tessaro
-
2013/872 ( -- withdrawn -- )
-
-
-
2013/871 ( PDF )
- A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities
- Weiqiang Wen and Libin Wang and Jiaxin Pan
-
2013/870 ( PDF )
- A new class of hyper-bent functions and Kloosterman sums
- Chunming Tang, Yanfeng Qi
-
2013/869 ( PDF )
- How to Fake Auxiliary Input
- Dimitar Jetchev and Krzysztof Pietrzak
-
2013/868 ( PDF )
- Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
- Lear Bahack
-
2013/867 ( PDF )
- LHash: A Lightweight Hash Function (Full Version)
- Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong
-
2013/866 ( PDF )
- Compact Ring-LWE based Cryptoprocessor
- Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede
-
2013/865 ( PDF )
- SNR to Success Rate: Reaching the Limit of Non-Profiling DPA
- Suvadeep Hajra and Debdeep Mukhopadhyay
-
2013/864 ( PDF )
- Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs
- Adam Smith and Ye Zhang
-
2013/863 ( PDF )
- Formal Treatment of Distributed Trust in Electronic Voting
- Stephan Neumann and Melanie Volkamer
-
2013/862 ( PDF )
- How to Delegate Computations: The Power of No-Signaling Proofs
- Yael Tauman Kalai and Ran Raz and Ron D. Rothblum
-
2013/861 ( PDF )
- Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments
- Muhammad Rizwan Asghar
-
2013/860 ( PDF )
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs
-
2013/859 ( PDF )
- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
- Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix
-
2013/858 ( PDF )
- Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications
- Sherman S.M. Chow and Matthew Franklin and Haibin Zhang
-
2013/857 ( PDF )
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Daniel Genkin and Adi Shamir and Eran Tromer
-
2013/856 ( PDF )
- Tightly-Secure Signatures From Lossy Identification Schemes
- Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi
-
2013/855 ( PDF )
- Weaknesses in a Recently Proposed RFID Authentication Protocol
- Mete Akgün, M. Ufuk Çaǧlayan
-
2013/854 ( PDF )
- Multiple-Use Transferable E-Cash
- Pratik Sarkar
-
2013/853 ( PDF )
- Automatic Search for Differential Trails in ARX Ciphers (Extended Version)
- Alex Biryukov and Vesselin Velichkov
-
2013/852 ( PDF )
- Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
- Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang
-
2013/851 ( PDF )
- Power and Timing Side Channels for PUFs and their Efficient Exploitation
- Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson
-
2013/850 ( PDF )
- Secure Floating-Point Arithmetic and Private Satellite Collision Analysis
- Liina Kamm and Jan Willemson
-
2013/849 ( PDF )
- Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model
- Suvadeep Hajra and Debdeep Mukhopadhyay
-
2013/848 ( PDF )
- Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
- Xi-Jun Lin and Lin Sun
-
2013/847 ( -- withdrawn -- )
- Ultralightweight cryptography for passive RFID system
- Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed
-
2013/846 ( -- withdrawn -- )
- A new attack on RSA with a composed decryption exponent
- Abderrahmane Nitaj and Mohamed Ould Douh
-
2013/845 ( PDF )
- How to Keep a Secret: Leakage Deterring Public-key Cryptography
- Aggelos Kiayias and Qiang Tang
-
2013/844 ( PDF )
- A generic view on trace-and-revoke broadcast encryption schemes
- Dennis Hofheinz and Christoph Striecks
-
2013/843 ( PDF )
- A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues
- Jian Ye and Chenglian Liu
-
2013/842 ( PDF )
- Detecting Hidden Leakages
- Amir Moradi and Sylvain Guilley and Annelie Heuser
-
2013/841 ( PDF )
- Trust Views for the Web PKI
- Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser
-
2013/840 ( PDF )
- (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
- Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Zhou
-
2013/839 ( PDF )
- Lattice Decoding Attacks on Binary LWE
- Shi Bai and Steven D. Galbraith
-
2013/838 ( PDF )
- An improved compression technique for signatures based on learning with errors
- Shi Bai and Steven D. Galbraith
-
2013/837 ( PDF )
- Fair Two-Party Computations via Bitcoin Deposits
- Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek
-
2013/836 ( PDF )
- Identity-Based Key-Encapsulation Mechanism from Multilinear Maps
- Hao Wang and Lei Wu and Zhihua Zheng and Yilei Wang
-
2013/835 ( PDF )
- A Modular Framework for Building Variable-Input Length Tweakable Ciphers
- Thomas Shrimpton and R. Seth Terashima
-
2013/834 ( PDF )
- Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees
- Ahto Buldas and Andres Kroonmaa and Risto Laanoja
-
2013/833 ( PDF )
- Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions
- Fabrice Benhamouda and David Pointcheval
-
2013/832 ( PDF )
- Practical Dynamic Searchable Encryption with Small Leakage
- Emil Stefanov and Charalampos Papamanthou and Elaine Shi
-
2013/831 ( PDF )
- Provable Security Proofs and their Interpretation in the Real World
- Vikram Singh
-
2013/830 ( PDF )
- Property Preserving Symmetric Encryption Revisited
- Sanjit Chatterjee and M. Prem Laxman Das
-
2013/829 ( PDF )
- Is Bitcoin a Decentralized Currency?
- Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun
-
2013/828 ( PDF )
- Decentralized Traceable Attribute-Based Signatures
- Ali El Kaafarani and Essam Ghadafi and Dalia Khader
-
2013/827 ( PDF )
- Lower Bounds in the Hardware Token Model
- Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen
-
2013/826 ( PDF )
- Secure multi-party data analysis: end user validation and practical experiments
- Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt
-
2013/825 ( -- withdrawn -- )
- EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen
- Alberto Peinado and Jorge Munilla and Amparo Fúster
-
2013/824 ( PDF )
- Fair and Efficient Secure Multiparty Computation with Reputation Systems
- Gilad Asharov and Yehuda Lindell and Hila Zarosim
-
2013/823 ( PDF )
- Another Look at XCB
- Debrup Chakraborty and Vicente Hernandez-Jimenez and Palash Sarkar
-
2013/822 ( PDF )
- Leakage Resilient Fully Homomorphic Encryption
- Alexandra Berkoff and Feng-Hao Liu
-
2013/821 ( -- withdrawn -- )
- Exact Smooth Projective Hash Function based on LWE
- Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan
-
2013/820 ( -- withdrawn -- )
- On the Security of Recently Proposed RFID Protocols
- Mete Akgün, M. Ufuk Çaǧlayan
-
2013/819 ( PDF )
- Safe enclosures: towards cryptographic techniques for server protection
- Sergiu Bursuc and Julian P. Murphy
-
2013/818 ( PDF )
- On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography
- Roberto De Prisco and Alfredo De Santis
-
2013/817 ( PDF )
- Interactive Encryption and Message Authentication
- Yevgeniy Dodis and Dario Fiore
-
2013/816 ( PDF )
- Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes
- Shay Gueron and Vlad Krasnov
-
2013/815 ( PDF )
- Iterated group products and leakage resilience against NC^1
- Eric Miles
-
2013/814 ( PDF )
- RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
- Lil Maria Rodriguez-Henriquez and Debrup Chakraborty
-
2013/813 ( PDF )
- Multi-ciphersuite security of the Secure Shell (SSH) protocol
- Florian Bergsma and Benjamin Dowling and Florian Kohlar and Jörg Schwenk and Douglas Stebila
-
2013/812 ( PDF )
- A Note on Bilinear Groups of a Large Composite Order
- Zhengjun Cao and Lihua Liu
-
2013/811 ( PDF )
- Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol
- Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto
-
2013/810 ( PDF )
- Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
- Pablo Rauzy and Sylvain Guilley
-
2013/809 ( PDF )
- Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
- Sarah Ibrahimi and Boris Skoric and Jan-Jaap Oosterwijk
-
2013/808 ( PDF )
- Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
- Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing
-
2013/807 ( PDF )
- Distributed Key Generation for Secure Encrypted Deduplication
- Yitao Duan
-
2013/806 ( PDF )
- Efficient (Anonymous) Compact HIBE From Standard Assumptions
- Somindu C. Ramanna and Palash Sarkar
-
2013/805 ( PDF )
- Proofs of Space: When Space is of the Essence
- Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi
-
2013/804 ( PDF )
- Group Signature with relaxed-privacy and revocability for VANET
- Mohammad Saiful Islam Mamun and Atsuko Miyaji
-
2013/803 ( PDF )
- Fully, (Almost) Tightly Secure IBE from Standard Assumptions
- Jie Chen and Hoeteck Wee
-
2013/802 ( PDF )
- Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions
- Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng
-
2013/801 ( PDF )
- Authenticating Computation on Groups: New Homomorphic Primitives and Applications
- Dario Catalano and Antonio Marcedone and Orazio Puglisi
-
2013/800 ( PDF )
- Algebraic Properties of the Cube Attack
- Frank-M. Quedenfeld and Christopher Wolf
-
2013/799 ( PDF )
- New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography
- Gilles Macario-Rat and Jérôme Plűt and Henri Gilbert
-
2013/798 ( -- withdrawn -- )
- A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System
- Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, and Zuoxia Yu
-
2013/797 ( PDF )
- Tamper Resilient Circuits: The Adversary at the Gates
- Aggelos Kiayias and Yiannis Tselekounis
-
2013/796 ( PDF )
- Proofs of Space
- Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak
-
2013/795 ( PDF )
- Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications
- Xi-Jun Lin and Lin Sun
-
2013/794 ( PDF )
- Behind the Scene of Side Channel Attacks
- Victor Lomné, Emmanuel Prouff, and Thomas Roche
-
2013/793 ( PDF )
- A fast integer-based batch full-homomorphic encryption scheme over finite field
- Long Zhang and Qiuling Yue
-
2013/792 ( PDF )
- Improved Authenticity Bound of EAX, and Refinements
- Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata
-
2013/791 ( PDF )
- APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
- Elena Andreeva and Begül Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda
-
2013/790 ( PDF )
- Parallelizable and Authenticated Online Ciphers
- Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda
-
2013/789 ( PDF )
- Proofs of Data Possession and Retrievability Based on MRD Codes
- Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu
-
2013/788 ( PDF )
- Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis
- Zhengjun Cao and Lihua Liu
-
2013/787 ( PDF )
- Wide-weak Privacy Preserving RFID Mutual Authentication Protocol
- Raghuvir Songhela and Manik Lal Das
-
2013/786 ( PDF )
- Tree Based Symmetric Key Broadcast Encryption
- Sanjay Bhattacherjee and Palash Sarkar
-
2013/785 ( PDF )
- Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model
- Fei Tang, Hongda Li, Qihua Niu, and Bei Liang
-
2013/784 ( PDF )
- Secure Multiparty Computations on Bitcoin
- Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek
-
2013/783 ( PDF )
- ECC-Based Non-Interactive Deniable Authentication with Designated Verifier
- Yalin Chen and Jue-Sam Chou2
-
2013/782 ( PDF )
- How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?
- Dorit Ron and Adi Shamir
-
2013/781 ( PDF )
- Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
- Rafael Pass and Karn Seth and Sidharth Telang
-
2013/780 ( PDF )
- A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester
- Nasser Ramazani Darmian
-
2013/779 ( PDF )
- Distributed Group Authentication for RFID Supply Management
- Mike Burmester and Jorge Munilla
-
2013/778 ( PDF )
- Multi-Stage Fault Attacks on Block Ciphers
- Philipp Jovanovic and Martin Kreuzer and Ilia Polian
-
2013/777 ( PDF )
- Construction of Multiplicative Monotone Span Program
- Yuenai Chen and Chunming Tang
-
2013/776 ( PDF )
- Location Leakage in Distance Bounding: Why Location Privacy does not Work
- Aikaterini Mitrokotsa and Cristina Onete and Serge Vaudenay
-
2013/775 ( PDF )
- Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
- Yanfeng Wang, Wenling Wu, Zhiyuan Guo and Xiaoli Yu
-
2013/774 ( PDF )
- Multi-Input Functional Encryption
- S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
-
2013/773 ( PDF )
- CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions
- Markku-Juhani O. Saarinen
-
2013/772 ( PDF )
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
- Markku-Juhani O. Saarinen
-
2013/771 ( PDF )
- TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor
- Wuqiang Shen and Shaohua Tang
-
2013/770 ( PDF )
- Efficient Template Attacks
- Omar Choudary and Markus G. Kuhn
-
2013/769 ( PDF )
- Broadcast Amplification
- Martin Hirt and Ueli Maurer and Pavel Raykov
-
2013/768 ( PDF )
- VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4
- Bartosz Zoltak
-
2013/767 ( PDF )
- Misuse Resistant Parallel Authenticated Encryptions
- Nilanjan Datta and Mridul Nandi
-
2013/766 ( PDF )
- RankSign : an efficient signature algorithm based on the rank metric
- P. Gaborit and O. Ruatta and J. Schrek and G. Zémor
-
2013/765 ( PDF )
- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More
- Kaoru Kurosawa and Le Trieu Phong
-
2013/764 ( PDF )
- Dynamic Countermeasure Against the Zero Power Analysis
- Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
-
2013/763 ( PDF )
- Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting
- Yutaka Kawai and Katsuyuki Takashima
-
2013/762 ( PDF )
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung
-
2013/761 ( PDF )
- Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
- Pierre-Alain Fouque and Antoine Joux and Chrysanthi Mavromati
-
2013/760 ( PDF )
- On cross joining de Bruijn sequences
- Johannes Mykkeltveit and Janusz Szmidt
-
2013/759 ( PDF )
- Vectorization of ChaCha Stream Cipher
- Martin Goll and Shay Gueron
-
2013/758 ( PDF )
- A Revocable Online-Offline Certificateless Signature Scheme without Pairing
- Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek Krishna Pradhan
-
2013/757 ( PDF )
- Practical Signatures from the Partial Fourier Recovery Problem
- Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte
-
2013/756 ( PDF )
- A Meet-in-the-middle Attack on Round-Reduced mCrypton
- Yonglin Hao, Dongxia Bai
-
2013/755 ( -- withdrawn -- )
- Improving security and efficiency for multi-authority access control system in cloud storage
- Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong
-
2013/754 ( PDF )
- Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
- Omkant Pandey and Manoj Prabhakaran and Amit Sahai
-
2013/753 ( PDF )
- Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
- Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yalcin
-
2013/752 ( PDF )
- On the Power of Rewinding Simulators in Functional Encryption
- Angelo De Caro and Vincenzo Iovino
-
2013/751 ( PDF )
- Using Hamiltonian Totems as Passwords
- Hervé Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache
-
2013/750 ( PDF )
- Fully Deniable Mutual Authentication Protocol Based on RSA Signature
- Xi-Jun Lin and Lin Sun
-
2013/749 ( PDF )
- Efficient CCA-secure Threshold Public-Key Encryption Scheme
- Xi-Jun Lin and Lin Sun
-
2013/748 ( PDF )
- Plaintext Recovery Attacks Against WPA/TKIP
- Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt
-
2013/747 ( PDF )
- Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
- Jayaprakash Kar
-
2013/746 ( PDF )
- Asymptotically Efficient Lattice-Based Digital Signatures
- Vadim Lyubashevsky and Daniele Micciancio
-
2013/745 ( PDF )
- Asynchronous MPC with a Strict Honest Majority Using Non-equivocation
- Michael Backes and Fabian Bendun and Ashish Choudhury and Aniket Kate
-
2013/744 ( PDF )
- Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results
- Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai
-
2013/743 ( -- withdrawn -- )
- Privacy Preserving Unique Statistics in a Smart Grid
- Iraklis Leontiadis, Melek Önen, Refik Molva
-
2013/742 ( PDF )
- CODING - Stream Cipher Methods by Varying Components during Ciphering Data
- Jürgen Müller
-
2013/741 ( PDF )
- Fast Software Implementation of Binary Elliptic Curve Cryptography
- Manuel Bluhm and Shay Gueron
-
2013/740 ( PDF )
- An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)
- Gérald Gavin
-
2013/739 ( PDF )
- NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS
- Dr. G.S.G.N.Anjaneyulu and A.Vijayabarathi
-
2013/738 ( PDF )
- On the Resilience and Uniqueness of CPA for Secure Broadcast
- Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
-
2013/737 ( PDF )
- Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography
- Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez
-
2013/736 ( PDF )
- TRS-80 With A Keccak Sponge Cake
- Jean-Marie Chauvet
-
2013/735 ( PDF )
- Masking Tables---An Underestimated Security Risk
- Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald
-
2013/734 ( PDF )
- Elliptic Curve Cryptography in Practice
- Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow
-
2013/733 ( -- withdrawn -- )
- A Key Compromise Impersonation attack against Wang's Provably Secure Identity-based Key Agreement Protocol
- Maurizio Adriano Strangio
-
2013/732 ( PDF )
- SSS-V2: Secure Similarity Search
- Hyun-A Park
-
2013/731 ( PDF )
- Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited
- Yongqiang Li and Mingsheng Wang and Yuyin Yu
-
2013/730 ( PDF )
- Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees
- Łukasz Krzywiecki and Przemysław Kubiak and Mirosław Kutyłowski
-
2013/729 ( PDF )
- Functional Encryption for Randomized Functionalities
- Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai
-
2013/728 ( PDF )
- Modified Alternating Step Generators
- Robert Wicik and Tomasz Rachwalik
-
2013/727 ( PDF )
- Multi-Input Functional Encryption
- Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai
-
2013/726 ( PDF )
- Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
- Chihong Joo and Aaram Yun
-
2013/725 ( -- withdrawn -- )
- Mobile Transaction over NFC and GSM
- Muhammad Qasim Saeed and Pardis Pourghomi
-
2013/724 ( PDF )
- Verifiable Set Operations over Outsourced Databases
- Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos
-
2013/723 ( PDF )
- Amplifying Privacy in Privacy Amplification
- Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin
-
2013/722 ( PDF )
- The Realm of the Pairings
- Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini
-
2013/721 ( PDF )
- Deep Attacks of a Certificateless Signature Scheme
- Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li
-
2013/720 ( PDF )
- Outsourced Symmetric Private Information Retrieval
- Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
-
2013/719 ( PDF )
- Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
- Sandro Coretti and Ueli Maurer and Björn Tackmann
-
2013/718 ( PDF )
- NTRU-KE: A Lattice-based Public Key Exchange Protocol
- Xinyu Lei and Xiaofeng Liao
-
2013/717 ( PDF )
- NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
-
2013/716 ( PDF )
- A Secure Obfuscator for Encrypted Blind Signature Functionality
- Xiao Feng and Zheng Yuan
-
2013/715 ( PDF )
- Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
- Erik-Oliver Blass and Travis Mayberry and Guevara Noubir
-
2013/714 ( PDF )
- Method to secure data in the cloud while preserving summary statistics
- Sanchita Barman, Bimal Roy
-
2013/713 ( PDF )
- Cryptanalysis of Zorro
- Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang
-
2013/712 ( PDF )
- PUF-Based RFID Authentication Secure and Private under Memory Leakage
- Daisuke Moriyama and Shin'ichiro Matsuo and Moti Yung
-
2013/711 ( PDF )
- Ambiguous One-Move Nominative Signature Without Random Oracles
- Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang
-
2013/710 ( PDF )
- An Approach to Reduce Storage for Homomorphic Computations
- Jung Hee Cheon and Jinsu Kim
-
2013/709 ( PDF )
- Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active \& Concurrent Attacks
- Mohammad Sadeq Dousti and Rasool Jalili
-
2013/708 ( PDF )
- Key Derivation Without Entropy Waste
- Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs
-
2013/707 ( PDF )
- A reduction of semigroup DLP to classic DLP
- Matan Banin and Boaz Tsaban
-
2013/706 ( PDF )
- How to Certify the Leakage of a Chip?
- François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon
-
2013/705 ( PDF )
- Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation
- Clemens Heuberger and Michela Mazzoli
-
2013/704 ( PDF )
- Adaptive Witness Encryption and Asymmetric Password-based Cryptography
- Mihir Bellare and Viet Tung Hoang
-
2013/703 ( PDF )
- Limits of Extractability Assumptions with Distributional Auxiliary Input
- Elette Boyle and Rafael Pass
-
2013/702 ( PDF )
- Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
- Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs
-
2013/701 ( PDF )
- More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input
- Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
-
2013/700 ( PDF )
- Higher Order Masking of Look-up Tables
- Jean-Sebastien Coron
-
2013/699 ( PDF )
- Bootstrapping Obfuscators via Fast Pseudorandom Functions
- Benny Applebaum
-
2013/698 ( PDF )
- Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
- Xi-Jun Lin and Lin Sun
-
2013/697 ( PDF )
- A More Efficient AES Threshold Implementation
- Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
-
2013/696 ( PDF )
- Examination of a New Defense Mechanism: Honeywords
- Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
-
2013/695 ( PDF )
- AEGIS: A Fast Authenticated Encryption Algorithm
- Hongjun Wu and Bart Preneel
-
2013/694 ( PDF )
- Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data
- Lichun Li and Anwitaman Datta
-
2013/693 ( PDF )
- Secure Key Exchange and Sessions Without Credentials
- Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis
-
2013/692 ( PDF )
- Faster Compact Diffie-Hellman: Endomorphisms on the x-line
- Craig Costello and Huseyin Hisil and Benjamin Smith
-
2013/691 ( PDF )
- Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
- Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
-
2013/690 ( PDF )
- Obfuscation ==> (IND-CPA Security =/=> Circular Security)
- Antonio Marcedone and Claudio Orlandi
-
2013/689 ( PDF )
- Differing-Inputs Obfuscation and Applications
- Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry
-
2013/688 ( PDF )
- Unbalancing Pairing-Based Key Exchange Protocols
- Michael Scott
-
2013/687 ( PDF )
- How to Compress (Reusable) Garbled Circuits
- Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy
-
2013/686 ( PDF )
- New abstractions in applied pi-calculus and automated verification of protected executions
- Shiwei Xu and Sergiu Bursuc and Julian P. Murphy
-
2013/685 ( PDF )
- Solving shortest and closest vector problems: The decomposition approach
- Anja Becker, Nicolas Gama and Antoine Joux
-
2013/684 ( PDF )
- Fully Bideniable Public-Key Encryption
- Marcel Šebek
-
2013/683 ( PDF )
- Separations in Circular Security for Arbitrary Length Key Cycles
- Venkata Koppula and Kim Ramchen and Brent Waters
-
2013/682 ( PDF )
- Secret Key Cryptosystem based on Non-Systematic Polar Codes
- Reza Hooshmand, Mohammad Reza Aref, and Taraneh Eghlidos
-
2013/681 ( PDF )
- Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks
- Damien Vergnaud and David Xiao
-
2013/680 ( PDF )
- A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme
- Dana Dachman-Soled
-
2013/679 ( PDF )
- Formal verification of a software countermeasure against instruction skip attacks
- Nicolas Moro and Karine Heydemann and Emmanuelle Encrenaz and Bruno Robisson
-
2013/678 ( PDF )
- Universally composable privacy preserving finite automata execution with low online and offline complexity
- Peeter Laud and Jan Willemson
-
2013/677 ( PDF )
- Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
- Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
-
2013/676 ( PDF )
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers
- Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
-
2013/675 ( PDF )
- A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
- Tomer Ashur and Orr Dunkelman
-
2013/674 ( PDF )
- Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2013/673 ( PDF )
- Traps to the BGJT-Algorithm for Discrete Logarithms
- Qi Cheng and Daqing Wan and Jincheng Zhuang
-
2013/672 ( PDF )
- Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians
- Benjamin Smith
-
2013/671 ( PDF )
- Robust Pseudorandom Generators
- Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman
-
2013/670 ( PDF )
- Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces
- Charanjit Jutla and Arnab Roy
-
2013/669 ( PDF )
- Attribute-Based Encryption for Arithmetic Circuits
- Dan Boneh and Valeria Nikolaenko and Gil Segev
-
2013/668 ( PDF )
- Obfuscation for Evasive Functions
- Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai
-
2013/667 ( PDF )
- A TPM Diffie-Hellman Oracle
- Tolga Acar and Lan Nguyen and Greg Zaverucha
-
2013/666 ( PDF )
- An Offline Dictionary Attack against a Three-Party Key Exchange Protocol
- Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
-
2013/665 ( PDF )
- The Impossibility of Obfuscation with a Universal Simulator
- Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai
-
2013/664 ( PDF )
- TUC: Time-sensitive and Modular Analysis of Anonymous Communication
- Michael Backes and Praveen Manoharan and Esfandiar Mohammadi
-
2013/663 ( PDF )
- Linear Cryptanalysis of Round Reduced SIMON
- Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya
-
2013/662 ( PDF )
- Fine-Tuning Groth-Sahai Proofs
- Alex Escala and Jens Groth
-
2013/661 ( PDF )
- Private aggregation on untrusted servers with customizable thresholds
- Constantinos Patsakis, Michael Clear, Paul Laird
-
2013/660 ( PDF )
- Discrete Logarithms and Mordell-Weil Groups
- Mohammad Sadek
-
2013/659 ( PDF )
- A provable secure anonymous proxy signature scheme without random oracles
- Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
-
2013/658 ( PDF )
- Parallel authenticated encryption with the duplex construction
- Pawel Morawiecki and Josef Pieprzyk
-
2013/657 ( PDF )
- New Trapdoor Projection Maps for Composite-Order Bilinear Groups
- Sarah Meiklejohn and Hovav Shacham
-
2013/656 ( PDF )
- Bias-based modeling and entropy analysis of PUFs
- Robbert van den Berg and Boris Skoric and Vincent van der Leest
-
2013/655 ( PDF )
- Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)
- Georg Neugebauer and Lucas Brutschy and Ulrike Meyer and Susanne Wetzel
-
2013/654 ( PDF )
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Baodong Qin and Shengli Liu
-
2013/653 ( PDF )
- RKA-KDM secure encryption from public-key encryption
- Florian Böhl and Gareth T. Davies and Dennis Hofheinz
-
2013/652 ( PDF )
- Efficient Modular Arithmetic for SIMD Devices
- Wilke Trei
-
2013/651 ( PDF )
- A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound
- Sanjit Chatterjee and Chethan Kamath
-
2013/650 ( PDF )
- On Extractability (a.k.a. Differing-Inputs) Obfuscation
- Elette Boyle and Kai-Min Chung and Rafael Pass
-
2013/649 ( PDF )
- Security Analysis of Password-Authenticated Key Retrieval
- SeongHan Shin and Kazukuni Kobara
-
2013/648 ( PDF )
- Integral Distinguishers for Reduced-round Stribog
- Riham AlTawy and Amr M. Youssef
-
2013/647 ( PDF )
- A note on high-security general-purpose elliptic curves
- Diego F. Aranha and Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira and Jefferson E. Ricardini
-
2013/646 ( PDF )
- Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles
- Johannes Blömer and Gennadij Liske
-
2013/645 ( PDF )
- FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
- Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin Küpçü and Öznur Özkasap
-
2013/644 ( PDF )
- Elliptic and Hyperelliptic Curves: a Practical Security Analysis
- Joppe W. Bos and Craig Costello and Andrea Miele
-
2013/643 ( PDF )
- There is no Indistinguishability Obfuscation in Pessiland
- Tal Moran and Alon Rosen
-
2013/642 ( PDF )
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Dan Boneh and Mark Zhandry
-
2013/641 ( PDF )
- Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall
- Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen
-
2013/640 ( PDF )
- Communication-Efficient MPC for General Adversary Structures
- Joshua Lampkins and Rafail Ostrovsky
-
2013/639 ( PDF )
- Differentially 4-Uniform Bijections by Permuting the Inverse Function
- Deng Tang and Claude Carlet and Xiaohu Tang
-
2013/638 ( PDF )
- DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption
- Somindu C. Ramanna
-
2013/637 ( PDF )
- Detection of Algebraic Manipulation in the Presence of Leakage
- Hadi Ahmadi and Reihaneh Safavi-Naini
-
2013/636 ( PDF )
- SCARE of Secret Ciphers with SPN Structures
- Matthieu Rivain and Thomas Roche
-
2013/635 ( PDF )
- Universal security; from bits and mips to pools, lakes -- and beyond
- Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
-
2013/634 ( PDF )
- Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2013/633 ( PDF )
- Four Measures of Nonlinearity
- J. Boyar and M.G. Find and R. Peralta
-
2013/632 ( PDF )
- Combined Modeling and Side Channel Attacks on Strong PUFs
- Ahmed Mahmoud and Ulrich Rührmair and Mehrdad Majzoobi and Farinaz Koushanfar
-
2013/631 ( PDF )
- Protecting Obfuscation Against Algebraic Attacks
- Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai
-
2013/630 ( PDF )
- Estimating Key Sizes For High Dimensional Lattice-Based Systems
- Joop van de Pol and Nigel P. Smart
-
2013/629 ( PDF )
- Secure Key Management in the Cloud
- Ivan Damgĺrd and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob I. Pagter
-
2013/628 ( PDF )
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Kazuhiko Minematsu
-
2013/627 ( PDF )
- Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
- Jiawei Yuan and Shucheng Yu
-
2013/626 ( PDF )
- Improved Linear Attacks on the Chinese Block Cipher Standard
- Mingjie Liu and Jiazhe Chen
-
2013/625 ( PDF )
- PillarBox: Combating next-generation malware with fast forward-secure logging
- Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos
-
2013/624 ( -- withdrawn -- )
- New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption
- Xiaolin Cao and Ciara Moore
-
2013/623 ( PDF )
- Off-Path Hacking: The Illusion of Challenge-Response Authentication
- Yossi Gilad and Amir Herzberg and Haya Shulman
-
2013/622 ( PDF )
- Decentralized Anonymous Credentials
- Christina Garman and Matthew Green and Ian Miers
-
2013/621 ( PDF )
- Multi-LHL protocol
- Marika Mitrengová
-
2013/620 ( PDF )
- Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
- Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
-
2013/619 ( PDF )
- Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes
- Jeroen Delvaux and Ingrid Verbauwhede
-
2013/618 ( PDF )
- Security Amplification against Meet-in-the-Middle Attacks Using Whitening
- Pierre-Alain Fouque and Pierre Karpman
-
2013/617 ( PDF )
- Some results concerning global avalanche characteristics of two $q$-ary functions
- Brajesh Kumar Singh
-
2013/616 ( PDF )
- Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction
- Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan and Neil Hanley
-
2013/615 ( PDF )
- Privacy and Verifiability in Voting Systems: Methods, Developments and Trends
- Hugo Jonker and Sjouke Mauw and Jun Pang
-
2013/614 ( PDF )
- Is extracting data the same as possessing data?
- Douglas R. Stinson and Jalaj Upadhyay
-
2013/613 ( PDF )
- Recomputing with Permuted Operands: A Concurrent Error Detection Approach
- Xiaofei Guo and Ramesh Karri
-
2013/612 ( PDF )
- Sub-linear Blind Ring Signatures without Random Oracles
- Essam Ghadafi
-
2013/611 ( PDF )
- Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful
- Mitsugu Iwamoto and Thomas Peyrin and Yu Sasaki
-
2013/610 ( PDF )
- Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation
- Jeroen Delvaux and Ingrid Verbauwhede
-
2013/609 ( PDF )
- Ultra Low-Power implementation of ECC on the ARM Cortex-M0+
- Ruan de Clercq and Leif Uhsadel and Anthony Van Herrewege and Ingrid Verbauwhede
-
2013/608 ( PDF )
- Towards Optimal Leakage Exploitation Rate in Template Attacks
- Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng
-
2013/607 ( PDF )
- Cryptanalysis of Full RIPEMD-128
- Franck Landelle and Thomas Peyrin
-
2013/606 ( PDF )
- Revocable quantum timed-release encryption
- Dominique Unruh
-
2013/605 ( PDF )
- Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC.
- Masao KASAHARA
-
2013/604 ( PDF )
- Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos
- Jörg Schwenk
-
2013/603 ( PDF )
- Invariance-Based Concurrent Error Detection for Advanced Encryption Standard
- Xiaofei Guo and Ramesh Karri
-
2013/602 ( PDF )
- On the Efficacy of Solving LWE by Reduction to Unique-SVP
- Martin R. Albrecht and Robert Fitzpatrick and Florian G ̈opfert
-
2013/601 ( PDF )
- Two-round secure MPC from Indistinguishability Obfuscation
- Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova
-
2013/600 ( PDF )
- Improved Cryptanalysis of Reduced RIPEMD-160
- Florian Mendel and Thomas Peyrin and Martin Schläffer and Lei Wang and Shuang Wu
-
2013/599 ( PDF )
- Factoring RSA keys from certified smart cards: Coppersmith in the wild
- Daniel J. Bernstein and Yun-An Chang and Chen-Mou Cheng and Li-Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren
-
2013/598 ( PDF )
- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version
- Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David Oswald and Falk Schellenberg and Christof Paar
-
2013/597 ( PDF )
- Efficient Pairings Computation on Jacobi Quartic Elliptic Curves
- Sylvain Duquesne, Nadia El Mrabet and Emmanuel Fouotsa
-
2013/596 ( PDF )
- Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study
- Michael Shantz and Edlyn Teske
-
2013/595 ( PDF )
- Enhanced certificate transparency and end-to-end encrypted mail
- Mark D. Ryan
-
2013/594 ( PDF )
- A Local-Global Approach to Solving Ideal Lattice Problems
- Yuan Tian and Rongxin Sun and Xueyong Zhu
-
2013/593 ( PDF )
- Efficient One-Sided Adaptively Secure Computation
- Carmit Hazay and Arpita Patra
-
2013/592 ( PDF )
- Cryptanalysis of the Toorani-Falahati Hill Ciphers
- Liam Keliher and Anthony Z. Delaney
-
2013/591 ( PDF )
- Analysis of the Rainbow Tradeoff Algorithm Used in Practice
- Jung Woo Kim and Jin Hong and Kunsoo Park
-
2013/590 ( PDF )
- EyeDecrypt -- Private Interactions in Plain Sight
- Andrea Forte and Juan Garay and Trevor Jim and Yevgeniy Vahlis
-
2013/589 ( PDF )
- Smashing MASH-1
- Vladimir Antipkin
-
2013/588 ( PDF )
- SPHF-Friendly Non-Interactive Commitments
- Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval
-
2013/587 ( PDF )
- ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments
- Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
-
2013/586 ( PDF )
- Generic related-key and induced chosen IV attacks using the method of key differentiation
- Enes Pasalic and Yongzhuang Wei
-
2013/585 ( PDF )
- On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two
- Xiutao Feng and Guang Gong
-
2013/584 ( PDF )
- Cryptanalysis of GOST R Hash Function
- Zongyue Wang, Hongbo Yu, Xiaoyun Wang
-
2013/583 ( PDF )
- polynomial selection for the number field sieve in geometric view
- Min yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
-
2013/582 ( PDF )
- The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions
- Antoine Joux and Cécile Pierrot
-
2013/581 ( PDF )
- PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones
- Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
-
2013/580 ( PDF )
- Random Projections, Graph Sparsification, and Differential Privacy
- Jalaj Upadhyay
-
2013/579 ( PDF )
- On Measurable Side-Channel Leaks inside ASIC Design Primitives
- Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino
-
2013/578 ( PDF )
- A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent
- Oleksandr Kazymyrov and Valentyna Kazymyrova and Roman Oliynykov
-
2013/577 ( PDF )
- Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique
- Luís T. A. N. Brandăo
-
2013/576 ( PDF )
- Extended Criterion for Absence of Fixed Points
- Oleksandr Kazymyrov and Valentyna Kazymyrova
-
2013/575 ( PDF )
- Equivalence between MAC and PRF for Blockcipher based Constructions
- Nilanjan Datta and Mridul Nandi
-
2013/574 ( PDF )
- On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
- Mridul Nandi
-
2013/573 ( PDF )
- Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE
- Leibo Li and Keting Jia and Xiaoyun Wang
-
2013/572 ( PDF )
- Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher
- Goutam Paul and Subhamoy Maitra and Anupam Chattopadhyay
-
2013/571 ( PDF )
- Efficient General-Adversary Multi-Party Computation
- Martin Hirt and Daniel Tschudi
-
2013/570 ( PDF )
- New Efficient Identity-Based Encryption From Factorization
- Jun Shao and Licheng Wang and Xiaolei Dong and Zhenfu Cao
-
2013/569 ( PDF )
- More Efficient Cryptosystems From $k^{th}$-Power Residues
- Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao
-
2013/568 ( PDF )
- Cryptanalysis of the Speck Family of Block Ciphers
- Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel
-
2013/567 ( PDF )
- KDM Security in the Hybrid Framework
- Gareth T. Davies and Martijn Stam
-
2013/566 ( PDF )
- Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
- Jeroen Delvaux and Ingrid Verbauwhede
-
2013/565 ( PDF )
- Non-Malleable Coding Against Bit-wise and Split-State Tampering
- Mahdi Cheraghchi and Venkatesan Guruswami
-
2013/564 ( PDF )
- Capacity of Non-Malleable Codes
- Mahdi Cheraghchi and Venkatesan Guruswami
-
2013/563 ( PDF )
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- Zvika Brakerski and Guy N. Rothblum
-
2013/562 ( PDF )
- Self-pairings on supersingular elliptic curves with embedding degree $three$
- Binglong Chen and Chang-An~Zhao
-
2013/561 ( PDF )
- Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis
- Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus
-
2013/560 ( PDF )
- Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time
- Ben Morris and Phillip Rogaway
-
2013/559 ( PDF )
- A Definitional Framework for Functional Encryption
- Christian Matt and Ueli Maurer
-
2013/558 ( PDF )
- Practical approaches to varying network size in combinatorial key predistribution schemes
- Kevin Henry and Maura B. Paterson and Douglas R. Stinson
-
2013/557 ( PDF )
- Black-Box Obfuscation for d-CNFs
- Zvika Brakerski and Guy N. Rothblum
-
2013/556 ( PDF )
- Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012
- Oleksandr Kazymyrov and Valentyna Kazymyrova
-
2013/555 ( PDF )
- Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
- Ueli Maurer and Björn Tackmann and Sandro Coretti
-
2013/554 ( PDF )
- Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
- Pablo Rauzy and Sylvain Guilley and Zakaria Najm
-
2013/553 ( PDF )
- Multi-Valued Byzantine Broadcast: the $t < n$ Case
- Martin Hirt and Pavel Raykov
-
2013/552 ( PDF )
- More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
- Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
-
2013/551 ( PDF )
- Puzzle Encryption Algorithm
- Gregory Alvarez and Charles Berenguer
-
2013/550 ( -- withdrawn -- )
- More Efficient Cryptosystems From k-th Power Residues
- Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao
-
2013/549 ( PDF )
- Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem
- Koh-ichi Nagao
-
2013/548 ( PDF )
- Decomposition formula of the Jacobian group of plane curve
- Koh-ichi Nagao
-
2013/547 ( PDF )
- Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks
- Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang
-
2013/546 ( PDF )
- TRS-80 with a grain of salt
- Jean-Marie Chauvet
-
2013/545 ( PDF )
- Private Over-threshold Aggregation Protocols over Distributed Databases
- Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim
-
2013/544 ( PDF )
- Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
- Christian Hanser and Daniel Slamanig
-
2013/543 ( PDF )
- Cryptanalysis of the SIMON Family of Block Ciphers
- Hoda A. Alkhzaimi and Martin M. Lauridsen
-
2013/542 ( PDF )
- Searching for Nonlinear Feedback Shift Registers with Parallel Computing
- Przemysław Dąbrowski and Grzegorz Łabuzek and Tomasz Rachwalik and Janusz Szmidt
-
2013/541 ( PDF )
- Lattice-Based FHE as Secure as PKE
- Zvika Brakerski and Vinod Vaikuntanathan
-
2013/540 ( PDF )
- On the security of a password-only authenticated three-party key exchange protocol
- Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won
-
2013/539 ( PDF )
- Rebound attacks on Stribog
- Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef
-
2013/538 ( PDF )
- Practical Issues with TLS Client Certificate Authentication
- Arnis Parsovs
-
2013/537 ( PDF )
- Inter-FSP Funds Transfer Protocol
- Amir Herzberg and Shay Nachmani
-
2013/536 ( PDF )
- A Three-Level Sieve Algorithm for the Shortest Vector Problem
- Feng Zhang and Yanbin Pan and Gengran Hu
-
2013/535 ( PDF )
- Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms
- Sujoy Sinha Roy and Junfeng Fan and Ingrid Verbauwhede
-
2013/534 ( PDF )
- Efficient Unobservable Anonymous Reporting against Strong Adversaries
- Nethanel Gelernter and Amir Herzberg
-
2013/533 ( PDF )
- Gossip Latin Square and The Meet-All Gossipers Problem
- Nethanel Gelernter and Amir Herzberg
-
2013/532 ( PDF )
- On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves
- Takakazu Satoh
-
2013/531 ( PDF )
- On the Limits of Provable Anonymity
- Nethanel Gelernter and Amir Herzberg
-
2013/530 ( PDF )
- The Parallel-Cut Meet-In-The-Middle Attack
- Ivica Nikolic and Lei Wang and Shuang Wu
-
2013/529 ( PDF )
- How to Withstand Mobile Virus Attacks, Revisited
- Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky
-
2013/528 ( PDF )
- Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption
- Somindu C. Ramanna and Palash Sarkar
-
2013/527 ( PDF )
- The Spammed Code Offset Method
- Boris Skoric and Niels de Vreede
-
2013/526 ( PDF )
- Differential and Linear Cryptanalysis of Reduced-Round Simon
- Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel
-
2013/525 ( PDF )
- Catena : A Memory-Consuming Password-Scrambling Framework
- Christian Forler and Stefan Lucks and Jakob Wenzel
-
2013/524 ( PDF )
- Threshold Secret Image Sharing
- Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang and YaWei Ren
-
2013/523 ( PDF )
- White-Box Security Notions for Symmetric Encryption Schemes
- Cécile Delerablée and Tancrčde Lepoint and Pascal Paillier and Matthieu Rivain
-
2013/522 ( PDF )
- The Resistance of PRESENT-80 Against Related-Key Differential Attacks
- Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk and Huaxiong Wang
-
2013/521 ( PDF )
- Multiple Limited-Birthday Distinguishers and Applications
- Jérémy Jean and María Naya-Plasencia and Thomas Peyrin
-
2013/520 ( PDF )
- Locally Updatable and Locally Decodable Codes
- Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky
-
2013/519 ( PDF )
- Montgomery Multiplication Using Vector Instructions
- Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha
-
2013/518 ( -- withdrawn -- )
- Universal Leaky Random Oracle Model
- Guangjun Fan and Yongbin Zhou and Dengguo Feng
-
2013/517 ( PDF )
- Improvement of One Adaptive Oblivious Transfer Scheme
- Zhengjun Cao and Lihua Liu
-
2013/516 ( PDF )
- Algebraic MACs and Keyed-Verification Anonymous Credentials
- Melissa Chase and Sarah Meiklejohn and Gregory M. Zaverucha
-
2013/515 ( PDF )
- When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
- Changyu Dong and Liqun Chen and Zikai Wen
-
2013/514 ( PDF )
- Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
- Jia Xu and Jianying Zhou
-
2013/513 ( PDF )
- Enforcing Language Semantics Using Proof-Carrying Data
- Stephen Chong and Eran Tromer and Jeffrey A. Vaughan
-
2013/512 ( PDF )
- Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
- Jingguo Bi and Phong Q. Nguyen
-
2013/511 ( PDF )
- Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
- Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, and Mohammad Reza Aref
-
2013/510 ( PDF )
- Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers
- Johannes Buchmann and Daniel Cabarcas and Florian Göpfert and Andreas Hülsing and Patrick Weiden
-
2013/509 ( PDF )
- Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation
- Susan Hohenberger and Amit Sahai and Brent Waters
-
2013/508 ( PDF )
- Multi-Key Searchable Encryption
- Raluca Ada Popa and Nickolai Zeldovich
-
2013/507 ( PDF )
- SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
- Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza
-
2013/506 ( PDF )
- A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA
- Pablo Rauzy and Sylvain Guilley
-
2013/505 ( PDF )
- Improvement of One Anonymous Identity-Based Encryption
- Zhengjun Cao and Lihua Liu
-
2013/504 ( PDF )
- A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves
- Reza Azarderakhsh and Koray Karabina
-
2013/503 ( PDF )
- On secret sharing with nonlinear product reconstruction
- Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing
-
2013/502 ( PDF )
- Proving TLS-attack related open biases of RC4
- Santanu Sarkar and Sourav Sen Gupta and Goutam Paul and Subhamoy Maitra
-
2013/501 ( PDF )
- Type-Based Analysis of Protected Storage in the TPM (full version)
- Jianxiong Shao and Dengguo Feng and Yu Qin
-
2013/500 ( PDF )
- Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups
- Ran Canetti and Vinod Vaikuntanathan
-
2013/499 ( PDF )
- Limits on the Power of Cryptographic Cheap Talk
- Pavel Hubacek and Jesper Buus Nielsen and Alon Rosen
-
2013/498 ( PDF )
- Non-Malleable Codes from Two-Source Extractors
- Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
-
2013/497 ( PDF )
- Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
- Zhengjun Cao and Hanyue Cao
-
2013/496 ( PDF )
- Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
- Juan Garay and Jonathan Katz and Ueli Maurer and Bjoern Tackmann and Vassilis Zikas
-
2013/495 ( PDF )
- Revocable IBE Systems with Almost Constant-size Key Update
- Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang
-
2013/494 ( PDF )
- Differential Fault Attack against Grain family with very few faults and minimal assumptions
- Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra
-
2013/493 ( PDF )
- A new class of semi-bent quadratic Boolean functions
- Chunming Tang and Yanfeng Qi
-
2013/492 ( PDF )
- Cryptographically Enforced RBAC
- Anna Lisa Ferrara and George Fuchsbauer and Bogdan Warinschi
-
2013/491 ( PDF )
- Improved OT Extension for Transferring Short Secrets
- Vladimir Kolesnikov and Ranjit Kumaresan
-
2013/490 ( PDF )
- For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
- Masoumeh Safkhani, Nasour Bagheri
-
2013/489 ( PDF )
- An Efficient Scheme for Centralized Group Key Management in Collaborative Environments
- Constantinos Patsakis and Agusti Solanas
-
2013/488 ( PDF )
- Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency
- Kwangsu Lee and Dong Hoon Lee
-
2013/487 ( PDF )
- Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition
- Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
-
2013/486 ( -- withdrawn -- )
- Handling Authentication and Detection Probability in Multi-tag RFID Environment
- Subhasish Dhal and Indranil Sengupta
-
2013/485 ( -- withdrawn -- )
- A New Object Searching Protocol for Multi-tag RFID
- Subhasish Dhal and Indranil Sengupta
-
2013/484 ( -- withdrawn -- )
- Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification
- Jiawei Yuan and Shucheng Yu
-
2013/483 ( PDF )
- A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search
- Jean-Sébastien Coron and Jean-Charles Faugčre and Guénaël Renault and Rina Zeitoun
-
2013/482 ( PDF )
- Bounds in Shallows and in Miseries
- Céline Blondeau and Andrey Bogdanov and Gregor Leander
-
2013/481 ( PDF )
- Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012
- Yosuke Todo and Keita Xagawa
-
2013/480 ( PDF )
- Efficient Multiparty Protocols via Log-Depth Threshold Formulae
- Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz and Ron D. Rothblum
-
2013/479 ( PDF )
- Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks
- B. Skoric
-
2013/478 ( PDF )
- Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach
- Stefan G. Weber
-
2013/477 ( PDF )
- Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing
- Renaud Dubois and Margaux Dugardin and Aurore Guillevic
-
2013/476 ( PDF )
- Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
- Sourav Sen Gupta and Subhamoy Maitra and Willi Meier and Goutam Paul and Santanu Sarkar
-
2013/475 ( PDF )
- A note on verifying the APN property
- Pascale Charpin and Gohar M. Kyureghyan
-
2013/474 ( PDF )
- Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications
- Zhengjun Cao
-
2013/473 ( PDF )
- The Norwegian Internet Voting Protocol
- Kristian Gjřsteen
-
2013/472 ( PDF )
- Partially blind password-based signatures using elliptic curves
- Kristian Gjřsteen
-
2013/471 ( PDF )
- Obfuscating Conjunctions
- Zvika Brakerski and Guy N. Rothblum
-
2013/470 ( PDF )
- Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
- Martin R. Albrecht and Jean-Charles Faugčre and Robert Fitzpatrick and Ludovic Perret
-
2013/469 ( PDF )
- Verifiable Delegation of Computation on Outsourced Data
- Michael Backes and Dario Fiore and Raphael M. Reischuk
-
2013/468 ( PDF )
- How To Construct Extractable One-Way Functions Against Uniform Adversaries
- Nir Bitansky and Ran Canetti and Omer Paneth
-
2013/467 ( PDF )
- Analysis of BLAKE2
- Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu
-
2013/466 ( PDF )
- Efficient computation of addition-subtraction chains using generalized continued Fractions
- Amadou Tall and Ali Yassin Sanghare
-
2013/465 ( PDF )
- Practical & Provably Secure Distance-Bounding
- Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay
-
2013/464 ( PDF )
- Towards A Practical JCJ / Civitas Implementation
- Stephan Neumann and Christian Feier and Melanie Volkamer and Reto Koenig
-
2013/463 ( PDF )
- Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
- Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
-
2013/462 ( PDF )
- VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
- Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese
-
2013/461 ( PDF )
- HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware
- Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu
-
2013/460 ( PDF )
- Solving Terminal Revocation in EAC by Augmenting Terminal Authentication
- Rafik Chaabouni
-
2013/459 ( PDF )
- Reset Indifferentiability and its Consequences
- Paul Baecher and Christina Brzuska and Arno Mittelbach
-
2013/458 ( PDF )
- Exponentiating in Pairing Groups
- Joppe W. Bos and Craig Costello and Michael Naehrig
-
2013/457 ( PDF )
- Deduction Soundness: Prove One, Get Five for Free
- Florian Böhl and Véronique Cortier and Bogdan Warinschi
-
2013/456 ( PDF )
- On the Security of Group-based Proxy Re-encryption Scheme
- Purushothama B R and B B Amberker
-
2013/455 ( PDF )
- Another Nail in the Coffin of White-Box AES Implementations
- Tancrčde Lepoint and Matthieu Rivain
-
2013/454 ( PDF )
- How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
- Amit Sahai and Brent Waters
-
2013/453 ( PDF )
- Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
- Nasour Bagheri, Masoumeh Safkhani
-
2013/452 ( PDF )
- Secure Channel Coding Schemes based on Polar Codes
- Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
-
2013/451 ( PDF )
- Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
- Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters
-
2013/450 ( PDF )
- Revisiting the BGE Attack on a White-Box AES Implementation
- Yoni De Mulder and Peter Roelse and Bart Preneel
-
2013/449 ( PDF )
- A Note On the Storage Requirement for AKS Primality Testing Algorithm
- Zhengjun Cao
-
2013/448 ( PDF )
- Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
- Yuval Yarom and Katrina Falkner
-
2013/447 ( PDF )
- Dynamic Runtime Methods to Enhance Private Key Blinding
- Karine Gandolfi-Villegas and Nabil Hamzi
-
2013/446 ( PDF )
- Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography
- Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
-
2013/445 ( PDF )
- Implementing Lightweight Block Ciphers on x86 Architectures
- Ryad Benadjila and Jian Guo and Victor Lomné and Thomas Peyrin
-
2013/444 ( PDF )
- Sequential message authentication code without random oracles
- Bin Wang and Xiaojing Hong
-
2013/443 ( PDF )
- Optimally Anonymous and Transferable Conditional E-cash
- Jiangxiao Zhang. Hua Guo. Zhoujun Li. Chang Xu
-
2013/442 ( PDF )
- On Fair Exchange, Fair Coins and Fair Sampling
- Shashank Agrawal and Manoj Prabhakaran
-
2013/441 ( -- withdrawn -- )
- On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences
- Yongge Wang
-
2013/440 ( PDF )
- Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption
- Mitsugu Iwamoto and Junji Shikata
-
2013/439 ( PDF )
- Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
- Peter Pessl and Michael Hutter
-
2013/438 ( PDF )
- Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations
- Johann Heyszl and Andreas Ibing and Stefan Mangard and Fabrizio De Santis and Georg Sigl
-
2013/437 ( PDF )
- A Uniform Min-Max Theorem with Applications in Cryptography
- Salil Vadhan and Colin Jia Zheng
-
2013/436 ( PDF )
- Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version
- Charles Bouillaguet and Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Bo-Yin Yang
-
2013/435 ( PDF )
- Efficient Cryptosystems From $2^k$-th Power Residue Symbols
- Marc Joye and Benoit Libert
-
2013/434 ( PDF )
- Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
- Susan Hohenberger and Amit Sahai and Brent Waters
-
2013/433 ( PDF )
- On Symmetric Encryption with Distinguishable Decryption Failures
- Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
-
2013/432 ( PDF )
- How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
- Eric Brier and David Naccache and Li-yao Xia
-
2013/431 ( PDF )
- Practical-Time Attacks Against Reduced Variants of MISTY1
- Orr Dunkelman and Nathan Keller
-
2013/430 ( PDF )
- Security of the Misty Structure Beyond the Birthday Bound
- Jooyoung Lee
-
2013/429 ( PDF )
- DupLESS: Server-Aided Encryption for Deduplicated Storage
- Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart
-
2013/428 ( PDF )
- Faster 128-EEA3 and 128-EIA3 Software
- Roberto Avanzi and Billy Bob Brumley
-
2013/427 ( PDF )
- Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials
- Jiangtao Han and Haining Fan
-
2013/426 ( PDF )
- Efficient Garbling from a Fixed-Key Blockcipher
- Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi and Phillip Rogaway
-
2013/425 ( PDF )
- Break WEP Faster with Statistical Analysis
- Rafik Chaabouni
-
2013/424 ( PDF )
- Instantiating Random Oracles via UCEs
- Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
-
2013/423 ( PDF )
- Locally Computable UOWHF with Linear Shrinkage
- Benny Applebaum and Yoni Moses
-
2013/422 ( PDF )
- Private Database Queries Using Somewhat Homomorphic Encryption
- Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu
-
2013/421 ( PDF )
- Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)
- Valentina Banciu and Simon Hoerder and Dan Page
-
2013/420 ( PDF )
- The Holey Grail: A special score function for non-binary traitor tracing
- B. Skoric and J.-J. Oosterwijk and J. Doumen
-
2013/419 ( PDF )
- How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
- Rikke Bendlin and Sara Krehbiel and Chris Peikert
-
2013/418 ( PDF )
- On Tight Security Proofs for Schnorr Signatures
- Nils Fleischhacker and Tibor Jager and Dominique Schröder
-
2013/417 ( PDF )
- The Improved Cube Attack on Grain-v1
- Yongjuan Wang and Liren Ding and Wenbao Han and Xiangyu Wang
-
2013/416 ( PDF )
- Computational Fuzzy Extractors
- Benjamin Fuller and Xianrui Meng and Leonid Reyzin
-
2013/415 ( PDF )
- Short collision search in arbitrary SL2 homomorphic hash functions
- Ciaran Mullan and Boaz Tsaban
-
2013/414 ( PDF )
- A novel certificateless deniable authentication protocol
- Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
-
2013/413 ( PDF )
- Policy-Based Signatures
- Mihir Bellare and Georg Fuchsbauer
-
2013/412 ( PDF )
- Moduar Form Aprroach to Solving Lattice Problems
- Yuan Tian, Xueyong Zhu, Rongxin Sun
-
2013/411 ( PDF )
- Security Analysis of Lightweight Authentication Protocol from WISTP 2013
- Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
-
2013/410 ( PDF )
- Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
- Yossi Gilad and Amir Herzberg
-
2013/409 ( PDF )
- Order-Preserving Encryption Secure Beyond One-Wayness
- Tal Malkin and Isamu Teranishi and Moti Yung
-
2013/408 ( PDF )
- Delegatable Functional Signatures
- Michael Backes and Sebastian Meiser and Dominique Schröder
-
2013/407 ( PDF )
- Automated Security Proofs for Almost-Universal Hash for MAC verification
- Martin Gagné and Pascal Lafourcade and Yassine Lakhnech
-
2013/406 ( -- withdrawn -- )
- Attribute-Based Server-Aided Verification Signature
- Zhiwei Wang and Ruirui Xie and Wei Zhang and Liwen He and Guozi Sun and Wei Chen
-
2013/405 ( PDF )
- New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields
- Chunming Tang, Yanfeng Qi, Maozhi Xu
-
2013/404 ( PDF )
- The SIMON and SPECK Families of Lightweight Block Ciphers
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2013/403 ( PDF )
- Function-Private Subspace-Membership Encryption and Its Applications
- Dan Boneh and Ananth Raghunathan and Gil Segev
-
2013/402 ( PDF )
- Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
- Jue-Sam Chou1*, Chun-Hui Huang2, Yu-Siang Huang3, Yalin Chen4
-
2013/401 ( PDF )
- Functional Signatures and Pseudorandom Functions
- Elette Boyle and Shafi Goldwasser and Ioana Ivan
-
2013/400 ( PDF )
- A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
- Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thomé
-
2013/399 ( PDF )
- Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol
- Roel Peeters and Jens Hermans
-
2013/398 ( PDF )
- ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
- Colin Boyd and Cas Cremers and Michčle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila
-
2013/397 ( PDF )
- Practical Secure Logging: Seekable Sequential Key Generators
- Giorgia Azzurra Marson and Bertram Poettering
-
2013/396 ( PDF )
- On the Practical Security of a Leakage Resilient Masking Scheme
- Emmanuel Prouff and Matthieu Rivain and Thomas Roche
-
2013/394 ( PDF )
- A Public Key Cryptoscheme Using Bit-pair Shadows
- Shenghui Su and Shuwang Lv and Maozhi Xu
-
2013/393 ( PDF )
- Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model
- Yong Li and Zheng Yang
-
2013/392 ( PDF )
- Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
- Christian Hanser and Daniel Slamanig
-
2013/391 ( PDF )
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2013/390 ( PDF )
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
- Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada
-
2013/389 ( PDF )
- A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes
- Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
-
2013/388 ( PDF )
- Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions
- Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi
-
2013/387 ( PDF )
- Cryptographically Protected Prefixes for Location Privacy in IPv6
- Jonathan Trostle and Hosei Matsuoka and James Kempf and Toshiro Kawahara and Ravi Jain
-
2013/386 ( PDF )
- Side Channel Attacks against Pairing over Theta Functions
- Nadia El Mrabet
-
2013/385 ( -- withdrawn -- )
- Cryptanalysis of ultralightweight RFID authentication protocol
- Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed, Usman Mujahid
-
2013/384 ( PDF )
- Sequential Aggregate Signatures Made Shorter
- Kwangsu Lee and Dong Hoon Lee and Moti Yung
-
2013/383 ( PDF )
- Lattice Signatures and Bimodal Gaussians
- Léo Ducas and Alain Durmus and Tancrčde Lepoint and Vadim Lyubashevsky
-
2013/382 ( PDF )
- To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC
- Yevgeniy Dodis and Thomas Ristenpart and John Steinberger and Stefano Tessaro
-
2013/381 ( -- withdrawn -- )
- Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Grøstl
- Bingke Ma and Bao Li and Ronglin Hao
-
2013/380 ( PDF )
- Comments on Three Multi-Server Authentication Protocols
- Yalin Chen 1, *Jue-Sam Chou2, Wen-Yi Tsai 3
-
2013/379 ( PDF )
- Delegatable Pseudorandom Functions and Applications
- Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias
-
2013/378 ( PDF )
- A note on quantum related-key attacks
- Martin Roetteler and Rainer Steinwandt
-
2013/377 ( PDF )
- An Algebraic Framework for Diffie-Hellman Assumptions
- Alex Escala and Gottfried Herold and Eike Kiltz and Carla Rŕfols and Jorge Villar
-
2013/376 ( PDF )
- An Accurate Probabilistic Reliability Model for Silicon PUFs
- Roel Maes
-
2013/375 ( PDF )
- NaCl on 8-Bit AVR Microcontrollers
- Michael Hutter and Peter Schwabe
-
2013/374 ( PDF )
- A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN
- Majid Bayat, Mohammad Reza Aref
-
2013/373 ( PDF )
- Injective Encoding to Elliptic Curves
- Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi
-
2013/372 ( PDF )
- Practical Bootstrapping in Quasilinear Time
- Jacob Alperin-Sheriff and Chris Peikert
-
2013/371 ( PDF )
- Domain-Polymorphic Programming of Privacy-Preserving Applications
- Dan Bogdanov and Peeter Laud and Jaak Randmets
-
2013/370 ( PDF )
- Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions
- François-Xavier Standaert and Olivier Pereira and Yu Yu
-
2013/369 ( PDF )
- Block Ciphers that are Easier to Mask: How Far Can we Go?
- Benoît Gérard and Vincent Grosso and María Naya-Plasencia and François-Xavier Standaert
-
2013/368 ( PDF )
- Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique--
- Jacques Patarin
-
2013/367 ( PDF )
- On the Security of TLS-DH and TLS-RSA in the Standard Model
- Florian Kohlar and Sven Schäge and Jörg Schwenk
-
2013/366 ( PDF )
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
- Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin
-
2013/365 ( PDF )
- Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model
- Zheng Yang
-
2013/364 ( PDF )
- On the Achievability of Simulation-Based Security for Functional Encryption
- Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano
-
2013/363 ( PDF )
- A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems --
- Masao KASAHARA
-
2013/362 ( PDF )
- A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor
- Shigeo MITSUNARI
-
2013/361 ( PDF )
- Linearly Homomorphic Structure-Preserving Signatures and Their Applications
- Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
-
2013/360 ( PDF )
- Achieving the limits of the noisy-storage model using entanglement sampling
- Frédéric Dupuis and Omar Fawzi and Stephanie Wehner
-
2013/359 ( PDF )
- A heuristic for finding compatible differential paths with application to HAS-160
- Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef
-
2013/358 ( PDF )
- Counter-cryptanalysis
- Marc Stevens
-
2013/357 ( PDF )
- The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE
- Dmitry Khovratovich and Christian Rechberger
-
2013/356 ( PDF )
- Verifying Computations with State (Extended Version)
- Benjamin Braun and Ariel J. Feldman and Zuocheng Ren and Srinath Setty and Andrew J. Blumberg and Michael Walfish
-
2013/355 ( PDF )
- New Attacks against Transformation-Based Privacy-Preserving Linear Programming
- Peeter Laud and Alisa Pankova
-
2013/354 ( PDF )
- Programmable Hash Functions in the Multilinear Setting
- Eduarda S.V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks
-
2013/353 ( PDF )
- Profiling DPA: Efficacy and efficiency trade-offs
- Carolyn Whitnall and Elisabeth Oswald
-
2013/352 ( PDF )
- Constrained Pseudorandom Functions and Their Applications
- Dan Boneh and Brent Waters
-
2013/351 ( PDF )
- Time-Optimal Interactive Proofs for Circuit Evaluation
- Justin Thaler
-
2013/350 ( PDF )
- Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
- Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam
-
2013/349 ( PDF )
- A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation
- Martin Hirt and Christoph Lucas and Ueli Maurer
-
2013/348 ( PDF )
- Multi-file proofs of retrievability for cloud storage auditing
- Bin Wang and Xiaojing Hong
-
2013/347 ( PDF )
- STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
- Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
-
2013/346 ( PDF )
- Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA
- Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson
-
2013/345 ( PDF )
- Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
- Arnab Roy and Srinivas Vivek
-
2013/344 ( PDF )
- Limits of provable security for homomorphic encryption
- Andrej Bogdanov and Chin Ho Lee
-
2013/343 ( PDF )
- Quantum one-time programs
- Anne Broadbent and Gus Gutoski and Douglas Stebila
-
2013/342 ( PDF )
- Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices
- Xiang Xie and Rui Xue
-
2013/341 ( PDF )
- Trapdoor Smooth Projective Hash Functions
- Fabrice Benhamouda and David Pointcheval
-
2013/340 ( PDF )
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Craig Gentry and Amit Sahai and Brent Waters
-
2013/339 ( PDF )
- On the Security of the TLS Protocol: A Systematic Analysis
- Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee
-
2013/338 ( PDF )
- Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
- Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs
-
2013/337 ( PDF )
- Attribute-Based Encryption for Circuits
- Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
-
2013/336 ( -- withdrawn -- )
- A Novel Technique in Linear Cryptanalysis
- Wen-Long Sun Jie Guan Lin Ding
-
2013/335 ( PDF )
- Parallel and Dynamic Searchable Symmetric Encryption
- Seny Kamara and Charalampos Papamanthou
-
2013/334 ( PDF )
- Protecting PUF Error Correction by Codeword Masking
- Dominik Merli and Frederic Stumpf and Georg Sigl
-
2013/333 ( PDF )
- Double-authentication-preventing signatures
- Bertram Poettering and Douglas Stebila
-
2013/332 ( PDF )
- A method for obtaining lower bounds on the higher order nonlinearity of Boolean function
- Mikhail S. Lobanov
-
2013/331 ( PDF )
- New Constructions and Applications of Trapdoor DDH Groups
- Yannick Seurin
-
2013/330 ( PDF )
- Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
- Afonso Arriaga and Qiang Tang and Peter Ryan
-
2013/329 ( PDF )
- Protocol Variants and Electronic Identification
- Kristian Gjřsteen
-
2013/328 ( PDF )
- Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20
- Nicky Mouha and Bart Preneel
-
2013/327 ( PDF )
- A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
- Shenghui Su and Tao Xie and Shuwang Lv
-
2013/326 ( PDF )
- Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
- Mihir Bellare and Sarah Meiklejohn and Susan Thomson
-
2013/325 ( PDF )
- Elligator: Elliptic-curve points indistinguishable from uniform random strings
- Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange
-
2013/324 ( PDF )
- Sieve-in-the-Middle: Improved MITM Attacks (Full Version)
- Anne Canteaut and María Naya-Plasencia and Bastien Vayssiere
-
2013/323 ( PS PS.GZ PDF )
- Encryption Schemes with Post-Challenge Auxiliary Inputs
- Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu
-
2013/322 ( PDF )
- BLAKE2: simpler, smaller, fast as MD5
- Jean-Philippe Aumasson and Samuel Neves and Zooko Wilcox-O'Hearn and Christian Winnerlein
-
2013/321 ( PDF )
- Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
- Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote
-
2013/320 ( PDF )
- Instantaneous Frequency Analysis
- Roman Korkikian and David Naccache and Guilherme Ozari de Almeida
-
2013/319 ( PDF )
- On the use of continued fractions for stream ciphers
- Amadou Moctar Kane
-
2013/318 ( PDF )
- Fully-Anonymous Functional Proxy-Re-Encryption
- Yutaka Kawai and Katsuyuki Takashima
-
2013/317 ( PDF )
- Anon-Pass: Practical Anonymous Subscriptions
- Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel
-
2013/316 ( PDF )
- Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations
- José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir
-
2013/315 ( PDF )
- Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes
- Albrecht Petzoldt
-
2013/314 ( PDF )
- Keyed Side-Channel Based Hashing for IP Protection using Wavelets
- Timo Bartkewitz
-
2013/313 ( PDF )
- Pairing Inversion via Non-degenerate Auxiliary Pairings
- Seunghwan Chang and Hoon Hong and Eunjeong Lee and Hyang-Sook Lee
-
2013/312 ( PDF )
- Families of fast elliptic curves from Q-curves
- Benjamin Smith
-
2013/311 ( PDF )
- Four-dimensional GLV via the Weil restriction
- Aurore Guillevic and Sorina Ionica
-
2013/310 ( PDF )
- MinimaLT: Minimal-latency Networking Through Better Security
- W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange
-
2013/309 ( PDF )
- Bypassing Passkey Authentication in Bluetooth Low Energy
- Tomas Rosa
-
2013/308 ( PDF )
- Lattice-Based Group Signatures with Logarithmic Signature Size
- Fabien Laguillaumie and Adeline Langlois and Benoit Libert and Damien Stehle
-
2013/307 ( PDF )
- Maliciously Circuit-Private FHE
- Rafail Ostrovsky and Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky
-
2013/306 ( PDF )
- Solving a $6120$-bit DLP on a Desktop Computer
- Faruk Göloğlu and Robert Granger and Gary McGuire and Jens Zumbrägel
-
2013/305 ( PDF )
- Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
- Sonia Belaid and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and Jorn-Marc Schmidt and Francois-Xavier Standaert and Stefan Tillich
-
2013/304 ( PDF )
- Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers
- Anthony Van Herrewege and Vincent van der Leest and André Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede
-
2013/303 ( PDF )
- Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
- Shivam Bhasin and Claude Carlet and Sylvain Guilley
-
2013/302 ( PDF )
- Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors
- Nicolas T. Courtois
-
2013/301 ( PDF )
- Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128
- Zheng Yuan and Xian Li and Haixia Liu
-
2013/300 ( PDF )
- A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
- Allison Lewko and Sarah Meiklejohn
-
2013/299 ( PDF )
- Computing class polynomials for abelian surfaces
- Andres Enge and Emmanuel Thomé
-
2013/298 ( PDF )
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin Wojcik
-
2013/297 ( PDF )
- Improvement and Efficient Implementation of a Lattice-based Signature Scheme
- Rachid El~Bansarkhani and Johannes Buchmann
-
2013/296 ( PDF )
- Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
- Morten Dahl and Ivan Damgĺrd
-
2013/295 ( PDF )
- Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
- Mickaël Cazorla and Kevin Marquet and Marine Minier
-
2013/294 ( PDF )
- Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis
- Colin O'Flynn and Zhizhang (David) Chen
-
2013/293 ( PDF )
- A Toolkit for Ring-LWE Cryptography
- Vadim Lyubashevsky and Chris Peikert and Oded Regev
-
2013/292 ( PDF )
- A Leakage Resilient MAC
- Daniel P. Martin and Elisabeth Oswald and Martijn Stam and Marcin Wojcik
-
2013/291 ( PDF )
- Security ranking among assumptions within the Uber assumption framework
- Antoine Joux and Antoine Rojat
-
2013/290 ( PDF )
- Massive Group Message Authentication with Revocable Anonymity
- Boaz Catane and Amir Herzberg
-
2013/289 ( PDF )
- Secure Second Price Auctions with a Rational Auctioneer
- Boaz Catane and Amir Herzberg
-
2013/288 ( PDF )
- Key Classification Attack on Block Ciphers
- Maghsoud Parviz and Seyed Hassan Mousavi and Saeed Mirahmadi
-
2013/287 ( PDF )
- The failure of McEliece PKC based on Reed-Muller codes.
- I. V. Chizhov and M. A. Borodin
-
2013/286 ( PDF )
- Salvaging Indifferentiability in a Multi-stage Setting
- Arno Mittelbach
-
2013/285 ( PDF )
- A Novel Proof on Weil Pairing
- Sutirtha Sanyal
-
2013/284 ( PDF )
- A Secure Paper-Based Electronic Voting With No Encryption
- Asghar Tavakkoli, Reza Ebrahimi Atani
-
2013/283 ( PDF )
- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
- Dan Boneh and Ananth Raghunathan and Gil Segev
-
2013/282 ( PDF )
- Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
- Goutam Paul and Anupam Chattopadhyay
-
2013/281 ( PDF )
- Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
- Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit
-
2013/280 ( PDF )
- Path ORAM: An Extremely Simple Oblivious RAM Protocol
- Emil Stefanov and Marten van Dijk and Elaine Shi and T-H. Hubert Chan and Christopher Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas
-
2013/279 ( PDF )
- Pinocchio: Nearly Practical Verifiable Computation
- Bryan Parno and Craig Gentry and Jon Howell and Mariana Raykova
-
2013/278 ( PDF )
- A Frequency Leakage Model and its application to CPA and DPA
- S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and P. Maurine
-
2013/277 ( PDF )
- ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
- Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
-
2013/276 ( PDF )
- Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
- David Bernhard and Stephan Neumann and Melanie Volkamer
-
2013/275 ( PDF )
- The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
- Johannes Braun and Gregor Rynkowski
-
2013/274 ( PDF )
- A time series approach for profiling attack
- Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch
-
2013/273 ( PDF )
- Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions
- Deepak Kumar Dalai
-
2013/272 ( PDF )
- Cryptography Challenges for Computational Privacy in Public Clouds
- Sashank Dara
-
2013/271 ( PDF )
- The Legal Classification of Identity-Based Signatures
- Christoph Sorge
-
2013/270 ( PDF )
- Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
- Yu Yu
-
2013/269 ( PDF )
- CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
- Jonathan Trostle
-
2013/268 ( PDF )
- Dynamic Cube Attack on Grain-v1
- Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
-
2013/267 ( PDF )
- Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
- S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee
-
2013/266 ( PDF )
- L-P States of RC4 Stream Cipher
- Jing Lv and Dongdai Lin
-
2013/265 ( PDF )
- Attribute-Based Encryption with Fast Decryption
- Susan Hohenberger and Brent Waters
-
2013/264 ( PDF )
- Encrypted Secret Sharing and Analysis by Plaintext Randomization
- Stephen R. Tate and Roopa Vishwanathan and Scott Weeks
-
2013/263 ( PDF )
- Speeding up QUAD
- Albrecht Petzoldt
-
2013/262 ( PDF )
- An efficient FHE based on the hardness of solving systems of non-linear multivariate equations
- Gérald Gavin
-
2013/261 ( PDF )
- Secure information transmission based on physical principles
- Dima Grigoriev and Vladimir Shpilrain
-
2013/260 ( PDF )
- From Weak to Strong Zero-Knowledge and Applications
- Kai-Min Chung and Edward Lui and Rafael Pass
-
2013/259 ( PDF )
- Private Interactive Communication Across an Adversarial Channel
- Ran Gelles and Amit Sahai and Akshay Wadia
-
2013/258 ( PDF )
- Witness Encryption and its Applications
- Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters
-
2013/257 ( PDF )
- Secure two-party computation: a visual way
- Paolo D'Arco and Roberto De Prisco
-
2013/256 ( PDF )
- On the Lossiness of the Rabin Trapdoor Function
- Yannick Seurin
-
2013/255 ( PDF )
- How to Construct an Ideal Cipher from a Small Set of Public Permutations
- Rodolphe Lampe and Yannick Seurin
-
2013/254 ( PDF )
- Towards Adoption of DNSSEC: Availability and Security Challenges
- Amir Herzberg and Haya Shulman
-
2013/253 ( PDF )
- CacheAudit: A Tool for the Static Analysis of Cache Side Channels
- Goran Doychev and Dominik Feld and Boris Köpf and Laurent Mauborgne and Jan Reineke
-
2013/252 ( PDF )
- On the Primitivity of some Trinomials over Finite Fields
- LI Yujuan, WANG Huaifu, ZHAO Jinhua
-
2013/251 ( PDF )
- Permutation Polynomials and Their Differential Properties over Residue Class Rings
- Yuyin Yu and Mingsheng Wang
-
2013/250 ( PDF )
- Fully Homomorphic Encryption for Mathematicians
- Alice Silverberg
-
2013/249 ( PDF )
- How to Factor N_1 and N_2 When p_1=p_2 mod 2^t
- Kaoru Kurosawa and Takuma Ueda
-
2013/248 ( PDF )
- Another Look at Security Theorems for 1-Key Nested MACs
- Neal Koblitz and Alfred Menezes
-
2013/247 ( PDF )
- Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction
- Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu
-
2013/246 ( PDF )
- A Lever Function to a New Codomain with Adequate Indeterminacy
- Shenghui Su and Maozhi Xu and Shuwang Lv
-
2013/245 ( PDF )
- The Fiat-Shamir Transformation in a Quantum World
- Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni
-
2013/244 ( PDF )
- Cryptographic schemes, key exchange, public key.
- Ted Hurley
-
2013/243 ( PDF )
- A Simple ORAM
- Kai-Min Chung and Rafael Pass
-
2013/242 ( PDF )
- AE5 Security Notions: Definitions Implicit in the CAESAR Call
- Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton
-
2013/241 ( PDF )
- The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4
- Joachim Strömbergson and Simon Josefsson
-
2013/240 ( PDF )
- Algebraic analysis of Trivium-like ciphers
- Sui-Guan Teo and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
-
2013/239 ( PDF )
- Optimizing ORAM and Using it Efficiently for Secure Computation
- Craig Gentry and Kenny Goldman and Shai Halevi and Charanjit Julta and Mariana Raykova and Daniel Wichs
-
2013/238 ( PDF )
- Anonymity-preserving Public-Key Encryption: A Constructive Approach
- Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Björn Tackmann and Daniele Venturi
-
2013/237 ( PDF )
- Type-Based Analysis of Generic Key Management APIs (Long Version)
- Pedro Adăo and Riccardo Focardi and Flaminia L. Luccio
-
2013/236 ( PDF )
- A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security
- Kaitai Liang and Liming Fang and Duncan S. Wong and Willy Susilo
-
2013/235 ( PDF )
- Ballot secrecy and ballot independence: definitions and relations
- Ben Smyth and David Bernhard
-
2013/234 ( PDF )
- A Cryptographic Analysis of OPACITY
- Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete
-
2013/233 ( PDF )
- Attacks on JH, Grøstl and SMASH Hash Functions
- Yiyuan Luo and Xuejia Lai
-
2013/232 ( PDF )
- Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean function
- Kaushik Chakraborty and Anupam Chattopadhyay and Subhamoy Maitra
-
2013/231 ( PDF )
- Sakura: a flexible coding for tree hashing
- Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
-
2013/230 ( PDF )
- Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
- Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo
-
2013/229 ( PDF )
- How to Run Turing Machines on Encrypted Data
- Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and and Nickolai Zeldovich
-
2013/228 ( PDF )
- Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
- Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park
-
2013/227 ( PDF )
- Analysis of authentication and key establishment in inter-generational mobile telephony
- Chunyu Tang and David A. Naumann and Susanne Wetzel
-
2013/226 ( PDF )
- Public key exchange using semidirect product of (semi)groups
- Maggie Habeeb and Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
-
2013/225 ( PDF )
- Transparent, Distributed, and Replicated Dynamic Provable Data Possession
- Mohammad Etemad and Alptekin Küpçü
-
2013/224 ( PDF )
- On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
- Yuanyuan Zhou and Yu Yu and François-Xavier Standaert and Jean-Jacques Quisquater
-
2013/223 ( PDF )
- The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
- Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
-
2013/222 ( PDF )
- Tight security bounds for key-alternating ciphers
- Shan Chen, John Steinberger
-
2013/221 ( PDF )
- Identity-based Aggregate Signatures with Verifiable Single Ones
- Yang Zhang, Jun-liang Chen
-
2013/220 ( PDF )
- Towards Efficient Private Distributed Computation on Unbounded Input Streams
- Shlomi Dolev and Juan Garay and Niv Gilboa and Vladimir Kolesnikov and Yelena Yuditsky
-
2013/219 ( PDF )
- Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes
- Stefan G. Weber
-
2013/218 ( PDF )
- Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
- Aurore Guillevic
-
2013/217 ( PDF )
- Computing on Authenticated Data for Adjustable Predicates
- Björn Deiseroth and Victoria Fehr and Marc Fischlin and Manuel Maasz and Nils Fabian Reimers and Richard Stein
-
2013/216 ( PDF )
- Election Verifiability or Ballot Privacy: Do We Need to Choose?
- Edouard Cuvelier and Olivier Pereira and Thomas Peters
-
2013/215 ( PDF )
- Optical PUFs Reloaded
- Ulrich Rührmair and Christian Hilgers and Sebastian Urban and Agnes Weiershäuser and Elias Dinter and Brigitte Forster and Christian Jirauschek
-
2013/214 ( PDF )
- Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
- Filip Zagorski and Richard T. Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora
-
2013/213 ( PDF )
- On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes
- Guangjun Fan and Yongbin Zhou and F.-X. Standaert and Dengguo Feng
-
2013/212 ( PDF )
- A Closer Look at HMAC
- Krzysztof Pietrzak
-
2013/211 ( PDF )
- A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)
- Christina Boura and Anne Canteaut
-
2013/210 ( PDF )
- Cryptophia's Short Combiner for Collision-Resistant Hash Functions
- Arno Mittelbach
-
2013/209 ( PDF )
- New modular multiplication and division algorithms based on continued fraction expansion
- Mourad Gouicem
-
2013/208 ( PDF )
- CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
- Yi-Ruei Chen and Cheng-Kang Chu and Wen-Guey Tzeng and Jianying Zhou
-
2013/207 ( PDF )
- Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication
- Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng
-
2013/206 ( PDF )
- Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation
- Florian Kerschbaum and Hoon Wei Lim and Ivan Gudymenko
-
2013/205 ( PDF )
- Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$
- Jan Camenisch and Robert R. Enderlein and Victor Shoup
-
2013/204 ( PDF )
- Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture
- Shi Pu, Jyh-Charn Liu
-
2013/203 ( PDF )
- From oblivious AES to efficient and secure database join in the multiparty setting
- Sven Laur and Riivo Talviste and Jan Willemson
-
2013/202 ( PDF )
- Breaking NLM-MAC Generator
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld
-
2013/201 ( PDF )
- Non-malleable Codes from Additive Combinatorics
- Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett
-
2013/200 ( PDF )
- Selecting polynomials for the Function Field Sieve
- Razvan Barbulescu
-
2013/199 ( PDF )
- Quantum algorithms for the subset-sum problem
- Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer
-
2013/198 ( PDF )
- On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes
- Zhizhou Li and Ten H. Lai
-
2013/197 ( PDF )
- Discrete logarithm in GF(2^809) with FFS
- Razvan Barbulescu and Cyril Bouvier and Jérémie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thomé and Marion Videau and Paul Zimmermann
-
2013/196 ( PDF )
- Fast Two-Party Secure Computation with Minimal Assumptions
- abhi shelat and Chih-hao Shen
-
2013/195 ( PDF )
- On the (re)design of an FPGA-based PUF
- Philipp Grabher and Dan Page and Marcin Wójcik
-
2013/194 ( PDF )
- On the Impossibility of Cryptography with Tamperable Randomness
- Per Austrin and Kai-Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth
-
2013/193 ( PDF )
- Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes
- Yu-Chi Chen and Raylin Tso and Willy Susilo and Xinyi Huang and Gwoboa Horng
-
2013/192 ( PDF )
- A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties
- David Lubicz and Damien Robert
-
2013/191 ( PDF )
- Improved Differential Fault Analysis on ARIA using Small Number of Faults
- Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
-
2013/190 ( PDF )
- Power Analysis Attacks against FPGA Implementations of KLEIN
- Shaohua Tang and Jianhao Wu and Weijian Li and Zheng Gong
-
2013/189 ( PDF )
- Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes
- Appala Naidu Tentu and Prabal Paul and V Ch Venkaiah
-
2013/188 ( PDF )
- A family of 6-to-4-bit S-boxes with large linear branch number
- Daniel Loebenberger and Michael Nüsken
-
2013/187 ( PDF )
- Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
- Jorge Munilla, Alberto Peinado, Guoming Yang and Willy Susilo
-
2013/186 ( PDF )
- On the (Im)possibility of Projecting Property in Prime-Order Setting
- Jae Hong Seo
-
2013/185 ( PDF )
- Security Analysis of Linearly Filtered NLFSRs
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett
-
2013/184 ( PDF )
- The Vernam cipher is robust to small deviations from randomness
- Boris Ryabko
-
2013/183 ( PDF )
- Practical Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2013/182 ( PDF )
- Collusion-Resistant Domain-Specific Pseudonymous Signatures
- Julien Bringer and Herve Chabanne and Alain Patey
-
2013/181 ( PDF )
- On the evaluation of modular polynomials
- Andrew V. Sutherland
-
2013/180 ( PDF )
- A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code
- Masao KASAHARA
-
2013/179 ( PDF )
- Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
- Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
-
2013/178 ( PDF )
- Cryptanalysis of RC4(n,m) Stream Cipher
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
-
2013/177 ( PDF )
- A generic construction for voting correctness at minimum cost - Application to Helios
- Veronique Cortier and David Galindo and Stephane Glondu and Malika Izabachene
-
2013/176 ( PDF )
- Distinguishing Attacks on RC4 and A New Improvement of the Cipher
- Jing Lv and Bin Zhang and Dongdai Lin
-
2013/175 ( PDF )
- Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
- Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano
-
2013/174 ( PDF )
- Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key
- Deukjo Hong and Daesung Kwon
-
2013/173 ( PDF )
- On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"
- Ray Perlner and Daniel Smith-Tone
-
2013/172 ( PDF )
- On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
- Raphael Spreitzer and Thomas Plos
-
2013/171 ( PDF )
- Confined Guessing: New Signatures From Standard Assumptions
- Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Christoph Striecks
-
2013/170 ( PDF )
- Fast Collision Attack on MD5
- Tao Xie and Fanbao Liu and Dengguo Feng
-
2013/169 ( PDF )
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
- David Cash and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
-
2013/168 ( PDF )
- On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
- Simon Hoerder and Kimmo Järvinen and Dan Page
-
2013/167 ( PDF )
- Single Password Authentication
- Tolga Acar and Mira Belenkiy and Alptekin Küpçü
-
2013/166 ( PDF )
- On generalized semi-bent (and partially bent) Boolean functions
- Brajesh Kumar Singh
-
2013/165 ( -- withdrawn -- )
- A New Security and Privacy Framework for RFID In Cloud Computing
- Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi
-
2013/164 ( PDF )
- Provably Secure LWE Encryption with Smallish Uniform Noise and Secret
- Daniel Cabarcas and Florian Göpfert and Patrick Weiden
-
2013/163 ( PDF )
- Search Pattern Leakage in Searchable Encryption: Attacks and New Construction
- Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu-an Tan
-
2013/162 ( PDF )
- A Non Asymptotic Analysis of Information Set Decoding
- Yann Hamdaoui and Nicolas Sendrier
-
2013/161 ( PDF )
- Completeness Theorems for All Finite Stateless 2-Party Primitives
- Daniel Kraschewski
-
2013/160 ( PDF )
- Interactive Coding, Revisited
- Kai-Min Chung and Rafael Pass and Sidharth Telang
-
2013/159 ( PDF )
- Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
- Dingding Jia and Bao Liand Yamin Liu and Qixiang Mei
-
2013/158 ( PDF )
- Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version)
- Armando Faz-Hernandez and Patrick Longa and Ana H. Sanchez
-
2013/157 ( PDF )
- The fragility of AES-GCM authentication algorithm
- Shay Gueron and Vlad Krasnov
-
2013/156 ( PDF )
- Incentivizing Outsourced Computation
- Mira Belenkiy and Melissa Chase and C. Chris Erway and John Jannotti and Alptekin Küpçü and Anna Lysyanskaya
-
2013/155 ( PDF )
- MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
- Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi
-
2013/154 ( PDF )
- Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
- Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
-
2013/153 ( PDF )
- On the security of a certicateless signature scheme in the standard model
- Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
-
2013/152 ( PDF )
- Policy-based Secure Deletion
- Christian Cachin and Kristiyan Haralambiev and Hsu-Chun Hsiao and Alessandro Sorniotti
-
2013/151 ( PDF )
- Some Fixes To SSH
- Xu ZiJie
-
2013/150 ( PDF )
- Practical (Second) Preimage Attacks on TCS_SHA-3
- Gautham Sekar and Soumyadeep Bhattacharya
-
2013/149 ( PDF )
- Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
- Jiawei Yuan and Shucheng Yu
-
2013/148 ( PDF )
- AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
- Alexander Rostovtsev
-
2013/147 ( PDF )
- A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms
- Naomi Benger and Manuel Charlemagne and Kefei Chen
-
2013/146 ( PDF )
- High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
- Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
-
2013/145 ( PDF )
- Key Wrapping with a Fixed Permutation
- Dmitry Khovratovich
-
2013/144 ( PDF )
- On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
- Gordon Procter and Carlos Cid
-
2013/143 ( PDF )
- An architecture for practical actively secure MPC with dishonest majority
- Marcel Keller and Peter Scholl and Nigel P. Smart
-
2013/142 ( PDF )
- A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES
- Kisoon YOON
-
2013/141 ( PDF )
- Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
- M. Shakiba and M. Dakhilalian and H. Mala
-
2013/140 ( PDF )
- Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
- Marc Fischlin and Nils Fleischhacker
-
2013/139 ( PDF )
- Rethinking Definitions of Security for Session Key Agreement
- Wesley George and Charles Rackoff
-
2013/138 ( PDF )
- Multi-bit homomorphic encryption based on learning with errors over rings
- Zhang Wei, Liu Shuguang, Yang Xiaoyuan
-
2013/137 ( PDF )
- How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
- Payman Mohassel and Saeed Sadeghian
-
2013/136 ( PDF )
- 2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers
- Dieter Schmidt
-
2013/135 ( PDF )
- An MQ/Code Cryptosystem Proposal
- Leonard J. Schulman
-
2013/134 ( PDF )
- Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields
- Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Skeith III
-
2013/133 ( PDF )
- New Lattice Based Signature Using The Jordan Normal Form
- Hemlata Nagesh and Birendra Kumar Sharma
-
2013/132 ( PDF )
- Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
- Niu Liu and Shaohua Tang and Lingling Xu
-
2013/131 ( PDF )
- Two is the fastest prime: lambda coordinates for binary elliptic curves
- Thomaz Oliveira and Julio López and Diego F. Aranha and Francisco Rodríguez-Henríquez
-
2013/130 ( PDF )
- Blank Digital Signatures
- Christian Hanser and Daniel Slamanig
-
2013/129 ( PDF )
- An Ideal-Security Protocol for Order-Preserving Encoding
- Raluca Ada Popa and Frank H. Li and Nickolai Zeldovich
-
2013/128 ( PDF )
- Attribute-Based Encryption for Circuits from Multilinear Maps
- Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters
-
2013/127 ( PDF )
- Oblivious PAKE: Efficient Handling of Password Trials
- Franziskus Kiefer and Mark Manulis
-
2013/126 ( PDF )
- Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
- Aysajan Abidin and Jan-Ĺke Larsson
-
2013/125 ( PDF )
- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
- Ananth Raghunathan and Gil Segev and Salil Vadhan
-
2013/124 ( -- withdrawn -- )
- Tamper Resilient Cryptography Without Self-Destruct
- Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi,
-
2013/123 ( PDF )
- Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
- Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2013/122 ( PDF )
- Practical collision attack on 40-step RIPEMD-128
- Gaoli Wang
-
2013/121 ( PDF )
- Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
- Helger Lipmaa
-
2013/120 ( PDF )
- An Attack Against Fixed Value Discrete Logarithm Representations
- Gergely Alpár and Jaap-Henk Hoepman and Wouter Lueks
-
2013/119 ( PDF )
- Speeding up Ate Pairing Computation in Affine Coordinates
- Duc-Phong Le and Chik How Tan
-
2013/118 ( PDF )
- Throughput Optimized Implementations of QUAD
- Jason R. Hamlet and Robert W. Brocato
-
2013/117 ( PDF )
- On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s
- Namhun Koo and Gook Hwa Cho and Soonhak Kwon
-
2013/116 ( PDF )
- The Algorithm of AAES
- Shiyong Zhang and Gongliang Chen and Lei Fan
-
2013/115 ( PDF )
- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release
- Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang
-
2013/114 ( PDF )
- Public Key Exchange Using Matrices Over Group Rings
- Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
-
2013/113 ( PDF )
- Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
- Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
-
2013/112 ( PDF )
- PUF Modeling Attacks on Simulated and Silicon Data
- Ulrich Rührmair and Jan Sölter and Frank Sehnke and Xiaolin Xu and Ahmed Mahmoud and Vera Stoyanova and Gideon Dror and Jürgen Schmidhuber and Wayne Burleson and Srinivas Devadas
-
2013/111 ( PDF )
- Message Authentication Codes Secure against Additively Related-Key Attacks
- Keita Xagawa
-
2013/110 ( PDF )
- Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
- Gilad Asharov and Yehuda Lindell and Tal Rabin
-
2013/109 ( PDF )
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
- Charanjit S. Jutla and Arnab Roy
-
2013/108 ( PDF )
- Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
- Ivan Damgard and Alessandra Scafuro
-
2013/107 ( PDF )
- On the Arithmetic Complexity of Strassen-Like Matrix Multiplications
- Murat Cenk and M. Anwar Hasan
-
2013/106 ( -- withdrawn -- )
- URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
- Roohallah Rastaghi
-
2013/105 ( PDF )
- Lossy Chains and Fractional Secret Sharing
- Yuval Ishai and Eyal Kushilevitz and Omer Strulovich
-
2013/104 ( PDF )
- A Tutorial on White-box AES
- James A. Muir
-
2013/103 ( PDF )
- On the Complexity of Broadcast Setup
- Martin Hirt and Pavel Raykov
-
2013/102 ( PDF )
- On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis
- Yuchen Cao, Yongbin Zhou and Zhenmei Yu
-
2013/101 ( PDF )
- Notions of Black-Box Reductions, Revisited
- Paul Baecher and Christina Brzuska and Marc Fischlin
-
2013/100 ( PDF )
- Attacks and Comments on Several Recently Proposed Key Management Schemes
- Niu Liu and Shaohua Tang and Lingling Xu
-
2013/099 ( PDF )
- Constant-round secure two-party computation from a linear number of oblivious transfer
- Samuel Ranellucci and Alain Tapp
-
2013/098 ( PDF )
- Learning with Rounding, Revisited: New Reduction, Properties and Applications
- Joel Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs
-
2013/097 ( PDF )
- Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher
- Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2013/096 ( PDF )
- State convergence in bit-based stream ciphers
- Sui-Guan Teo and Harry Bartlett and Ali Alhamdan and Leonie Simpson and Kenneth Koon-Ho Wong and Ed Dawson
-
2013/095 ( PDF )
- A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic
- Antoine Joux
-
2013/094 ( PDF )
- On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
- Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
-
2013/093 ( PDF )
- On the security of a certificateless aggregate signature scheme
- Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou
-
2013/092 ( PDF )
- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
- Vadim Lyubashevsky and Daniel Masny
-
2013/091 ( PDF )
- Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers
- Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
-
2013/090 ( -- withdrawn -- )
- Functional Encryption Supporting Recursive Languages
- Somindu C. Ramanna and Palash Sarkar
-
2013/089 ( PDF )
- Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
- James McLaughlin and John A. Clark
-
2013/088 ( PDF )
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- Dan Boneh and Mark Zhandry
-
2013/087 ( PDF )
- Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1))
- Namhun Koo and Gook Hwa Cho and Soonhak Kwon
-
2013/086 ( PDF )
- Efficient Private File Retrieval by Combining ORAM and PIR
- Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
-
2013/085 ( PDF )
- Between a Rock and a Hard Place: Interpolating Between MPC and FHE
- Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
-
2013/084 ( PDF )
- Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks
- Boris Skoric and Allard P. Mosk and Pepijn W.H. Pinkse
-
2013/083 ( PDF )
- A Security Framework for Analysis and Design of Software Attestation
- Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Christian Wachsmann
-
2013/082 ( PDF )
- Secret Sharing, Rank Inequalities and Information Inequalities
- Sebastia Martin and Carles Padro and An Yang
-
2013/081 ( PDF )
- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
- Yan Huang and Jonathan Katz and Dave Evans
-
2013/080 ( PDF )
- An efficient attack of a McEliece cryptosystem variant based on convolutional codes
- Grégory Landais and Jean-Pierre Tillich
-
2013/079 ( PDF )
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Yehuda Lindell
-
2013/078 ( PDF )
- Broadcast Steganography
- Nelly Fazio and Antonio R. Nicolosi and Irippuge Milinda Perera
-
2013/077 ( PDF )
- UC-Secure Multi-Session OT Using Tamper-Proof Hardware
- Kaoru Kurosawa and Ro Nojima and Le Trieu Phong
-
2013/076 ( PDF )
- Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
- Ling Ren and Xiangyao Yu and Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas
-
2013/075 ( PDF )
- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
- Joppe W. Bos and Kristin Lauter and Jake Loftus and Michael Naehrig
-
2013/074 ( PDF )
- On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$ and $\F_{2^{3164}}$
- Faruk Göloğlu and Robert Granger and Gary McGuire and Jens Zumbrägel
-
2013/073 ( PDF )
- Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
- Marek Jawurek and Florian Kerschbaum and Claudio Orlandi
-
2013/072 ( PDF )
- The UC approach: an application view
- István Vajda
-
2013/071 ( PDF )
- Relation collection for the Function Field Sieve
- Jérémie Detrey and Pierrick Gaudry and Marion Videau
-
2013/070 ( PDF )
- Related-key Attacks Against Full Hummingbird-2
- Markku-Juhani O. Saarinen
-
2013/069 ( PDF )
- Hardness of SIS and LWE with Small Parameters
- Daniele Micciancio and Chris Peikert
-
2013/068 ( PDF )
- Why Proving HIBE Systems Secure is Difficult
- Allison Lewko and Brent Waters
-
2013/067 ( PDF )
- Power Analysis of Hardware Implementations Protected with Secret Sharing
- Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh-Ha Le and Michael Peeters and Gilles Van Assche
-
2013/066 ( PDF )
- Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
- Amin Mohammadali; Zahra Ahmadian; Mohammad Reza Aref
-
2013/065 ( PDF )
- Instantiating Treeless Signature Schemes
- Patrick Weiden and Andreas Hülsing and Daniel Cabarcas and Johannes Buchmann
-
2013/064 ( PDF )
- Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
- Sven Laur and Bingsheng Zhang
-
2013/063 ( PDF )
- A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol
- Christian L. F. Corniaux and Hossein Ghodosi
-
2013/062 ( PDF )
- Symbolic Universal Composability
- Florian Böhl and Dominique Unruh
-
2013/061 ( PS PS.GZ PDF )
- On the Indifferentiability of Key-Alternating Ciphers
- Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger
-
2013/060 ( PDF )
- On FHE without bootstrapping
- Aayush Jain
-
2013/059 ( PDF )
- Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
- Ayesha Khalid and Deblin Bagchi and Goutam Paul and Anupam Chattopadhyay
-
2013/058 ( PDF )
- Cryptanalysis of the Dragonfly Key Exchange Protocol
- Dylan Clarke and Feng Hao
-
2013/057 ( PDF )
- CRT-based Fully Homomorphic Encryption over the Integers
- Jinsu Kim and Moon Sung Lee and Aaram Yun and Jung Hee Cheon
-
2013/056 ( PDF )
- On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
- Kishan Chand Gupta and Indranil Ghosh Ray
-
2013/055 ( PDF )
- Secrecy without one-way functions
- Dima Grigoriev and Vladimir Shpilrain
-
2013/054 ( PDF )
- Joint Compartmented Threshold Access Structures
- Ali Aydın Selçuk and Ramazan Yılmaz
-
2013/053 ( PDF )
- A revocable certificateless signature scheme
- Yinxia Sun and Futai Zhang and Limin Shen and Robert H. Deng
-
2013/052 ( PDF )
- Some Complexity Results and Bit Unpredictable for Short Vector Problem
- Kuan Cheng
-
2013/051 ( PDF )
- Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
- Payman Mohassel and Ben Riva
-
2013/050 ( PS PS.GZ PDF )
- Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
- Roohallah Rastaghi
-
2013/049 ( PDF )
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
- Christopher Meyer and Jörg Schwenk
-
2013/048 ( PDF )
- Power Balanced Circuits for Leakage-Power-Attacks Resilient Design
- Basel Halak, Julian Murphy, Alex Yakovlev
-
2013/047 ( PDF )
- Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes
- Carles Padro
-
2013/046 ( PDF )
- Fast and Maliciously Secure Two-Party Computation Using the GPU
- Tore Kasper Frederiksen and Jesper Buus Nielsen
-
2013/045 ( -- withdrawn -- )
- Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
- Jiawei Yuan and Shucheng Yu
-
2013/044 ( PDF )
- Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions
- Fangguo Zhang and Xu Ma and Shengli Liu
-
2013/043 ( PDF )
- Differential Fault Attack on the PRINCE Block Cipher
- Ling Song and Lei Hu
-
2013/042 ( PDF )
- Complexity of Multi-Party Computation Functionalities
- Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
-
2013/041 ( PDF )
- Trace Expression of r-th Root over Finite Field
- Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
-
2013/040 ( PDF )
- An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
- Roohallah Rastaghi
-
2013/039 ( PDF )
- Creating a Challenge for Ideal Lattices
- Thomas Plantard and Michael Schneider
-
2013/038 ( PDF )
- Verifiable Data Streaming
- Dominique Schröder and Heike Schröder
-
2013/037 ( PDF )
- Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
- Jayaprakash Kar
-
2013/036 ( PDF )
- Batch Fully Homomorphic Encryption over the Integers
- Jean-Sébastien Coron and Tancrčde Lepoint and Mehdi Tibouchi
-
2013/035 ( -- withdrawn -- )
- Improvements to NFC Mobile Transaction and Authentication Protocol
- Muhammad Qasim Saeed
-
2013/034 ( PDF )
- New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
- Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2013/033 ( PDF )
- CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
- Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
-
2013/032 ( PDF )
- Detection of Cheaters in Non-interactive Polynomial Evaluation
- Maki Yoshida and Satoshi Obana
-
2013/031 ( PDF )
- An Analysis of the EMV Channel Establishment Protocol
- Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson
-
2013/030 ( PDF )
- On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
- Haiyan Sun
-
2013/029 ( PDF )
- Improved Differential Fault Attack on MICKEY 2.0
- Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
-
2013/028 ( PDF )
- More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96
- Stanislav Bulygin
-
2013/027 ( PDF )
- Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol
- Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven Watson
-
2013/026 ( PDF )
- RSA private key reconstruction from random bits using SAT solvers
- Constantinos Patsakis
-
2013/025 ( PDF )
- The IITM Model: a Simple and Expressive Model for Universal Composability
- Ralf Kuesters and Max Tuengerthal
-
2013/024 ( PDF )
- New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field
- Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
-
2013/023 ( PDF )
- A New Practical Identity-Based Encryption System
- Jong Hwan Park and Dong Hoon Lee
-
2013/022 ( PDF )
- Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
- James McLaughlin and John A. Clark
-
2013/021 ( PDF )
- Rate-Limited Secure Function Evaluation: Definitions and Constructions
- Özgür Dagdelen and Payman Mohassel and Daniele Venturi
-
2013/020 ( PDF )
- Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles
- Markus Rückert and Dominique Schroeder
-
2013/019 ( PDF )
- Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
- Peter Gaži
-
2013/018 ( PDF )
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Jae Hong Seo and Keita Emura
-
2013/017 ( PDF )
- Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions
- Alexandra Boldyreva and Robert Lychev
-
2013/016 ( PDF )
- Revocable Identity-Based Encryption Revisited: Security Model and Construction
- Jae Hong Seo and Keita Emura
-
2013/015 ( PDF )
- Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography
- Graham Enos
-
2013/014 ( PDF )
- On formal and automatic security verification of WSN transport protocols
- Ta Vinh Thong and Amit Dvir
-
2013/013 ( PDF )
- Efficiently Outsourcing Multiparty Computation under Multiple Keys
- Andreas Peter and Erik Tews and Stefan Katzenbeisser
-
2013/012 ( PDF )
- Tropical cryptography
- Dima Grigoriev and Vladimir Shpilrain
-
2013/011 ( PDF )
- Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
- James McLaughlin and John A. Clark
-
2013/010 ( PDF )
- Simultaneous Resettable WI from One-way Functions
- Kai-Min Chung and Rafael Pass
-
2013/009 ( PDF )
- Achieving Anonymity Against Major Face Recognition Algorithms
- Benedikt Driessen and Markus Dürmuth
-
2013/008 ( PDF )
- Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security
- Kai-Min Chung and Rafael Pass and Karn Seth
-
2013/007 ( PDF )
- A Matrix Approach for Constructing Quadratic APN Functions
- Yuyin Yu and Mingsheng Wang and Yongqiang Li
-
2013/006 ( PDF )
- Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
- Qingfeng Cheng
-
2013/005 ( PDF )
- Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA
- Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaa, Ammar Bouallegue and Faouzi Chekir
-
2013/004 ( PDF )
- Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices
- Damien Stehlé and Ron Steinfeld
-
2013/003 ( PDF )
- On Formal Expressions of BRW-polynomials
- Guillermo Morales-Luna
-
2013/002 ( PDF )
- Generalized (Identity-Based) Hash Proof System and Its Applications
- Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
-
2013/001 ( PDF )
- Shielding circuits with groups
- Eric Miles and Emanuele Viola
-
2012/733 ( PDF )
- Reusable Garbled Circuits and Succinct Functional Encryption
- Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich
-
2012/732 ( PDF )
- Non-Interactive Key Exchange
- Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson
-
2012/731 ( PDF )
- Time-memory Trade-offs for Near-collisions
- Gaëtan Leurent
-
2012/730 ( PS PS.GZ PDF )
- Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
- Dalin Chu and Johann Großschädl and Zhe Liu and Volker Müller and Yang Zhang
-
2012/729 ( PDF )
- On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
- Nir Bitansky and Omer Paneth
-
2012/728 ( PDF )
- Defensive Leakage Camouflage
- E. Brier and Q. Fortier and R. Korkikian and K. W. Magld and D. Naccache and G. Ozari de Almeida and A. Pommellet and A. H. Ragab and J. Vuillemin
-
2012/727 ( PDF )
- On the Impossibility of Sender-Deniable Public Key Encryption
- Dana Dachman-Soled
-
2012/726 ( PDF )
- Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
- Marc Obrador and Paz Morillo and Sandra Guasch
-
2012/725 ( PDF )
- Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
- Qingfeng Cheng
-
2012/724 ( PDF )
- A Coding-Theoretic Approach to Recovering Noisy RSA Keys
- Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn
-
2012/723 ( PDF )
- Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks
- Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov and Avraham Entelis
-
2012/722 ( PDF )
- Hardness Preserving Reductions via Cuckoo Hashing
- Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
-
2012/721 ( PDF )
- On the (In)security of Fischlin's Paradigm
- Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao
-
2012/720 ( PDF )
- Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields
- Antoine Joux
-
2012/719 ( PDF )
- An ideal multi-secret sharing scheme based on minimal privileged coalitions
- Yun Song , Zhihui Li
-
2012/718 ( PDF )
- Succinct Non-Interactive Arguments via Linear Interactive Proofs
- Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth
-
2012/717 ( PDF )
- Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
- Jan Camenisch and Anna Lysyanskaya and Gregory Neven
-
2012/716 ( PDF )
- Attribute-Based Functional Encryption on Lattices
- Xavier Boyen
-
2012/715 ( PDF )
- New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$
- Jingyuan Zhao and Meiqin Wang and Jiazhe Chen and Yuliang Zheng
-
2012/714 ( PDF )
- Discrete Gaussian Leftover Hash Lemma over Infinite Domains
- Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai
-
2012/713 ( PDF )
- Systematic Treatment of Remote Attestation
- Aurelien Francillon and Quan Nguyen and Kasper B. Rasmussen and Gene Tsudik
-
2012/712 ( PDF )
- On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis
- Farzaneh Abed and Eik List and Stefan Lucks
-
2012/711 ( PDF )
- Unprovable Security of Two-Message Zero Knowledge
- Kai-Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass
-
2012/710 ( PDF )
- Non Observability in the Random Oracle Model
- Prabhanjan Ananth and Raghav Bhaskar
-
2012/709 ( PDF )
- Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
- Qun-Xiong Zheng and Wen-Feng Qi
-
2012/708 ( PDF )
- Calling out Cheaters: Covert Security With Public Verifiability
- Gilad Asharov and Claudio Orlandi
-
2012/707 ( PDF )
- Cryptanalysis of WIDEA
- Gaëtan Leurent
-
2012/706 ( PDF )
- On the (In)security of the Fiat-Shamir Paradigm, Revisited
- Dana Dachman-Soled and Abhishek Jain and Yael Tauman Kalai and Adriana Lopez-Alt
-
2012/705 ( PDF )
- Why "Fiat-Shamir for Proofs" Lacks a Proof
- Nir Bitansky and Sanjam Garg and Daniel Wichs
-
2012/704 ( PDF )
- On the Non-malleability of the Fiat-Shamir Transform
- Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi
-
2012/703 ( PDF )
- Profiled Model Based Power Simulator for Side Channel Evaluation
- Nicolas Debande and Maël Berthier and Yves Bocktaels and Thanh-Ha Le
-
2012/702 ( PDF )
- Cryptanalysis of RAPP, an RFID Authentication Protocol
- Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
-
2012/701 ( PDF )
- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
- Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu
-
2012/700 ( PDF )
- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
- Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong-Sheng Zhou
-
2012/699 ( PDF )
- How Practical is Public-Key Encryption Based on LPN and Ring-LPN?
- Ivan Damgård and Sunoo Park
-
2012/698 ( PDF )
- 5PM: Secure Pattern Matching
- Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler
-
2012/697 ( PDF )
- Verifiable Elections That Scale for Free
- Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
-
2012/696 ( PDF )
- Cryptanalysis of RAKAPOSHI Stream Cipher
- Lin Ding and Jie Guan
-
2012/695 ( PDF )
- Fully Automated Analysis of Padding-Based Encryption in the Computational Model
- Gilles Barthe and Juan Manuel Crespo and Benjamin Grégoire and César Kunz and Yassine Lakhnech and Benedikt Schmidt and Santiago Zanella-Béguelin
-
2012/694 ( PDF )
- Cryptanalysis of matrix conjugation schemes
- A. D. Myasnikov and A. Ushakov
-
2012/693 ( PDF )
- Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
- Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters
-
2012/692 ( PDF )
- Generic Constructions of Integrated PKE and PEKS
- Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin
-
2012/691 ( PDF )
- Root Optimization of Polynomials in the Number Field Sieve
- Shi Bai and Richard P. Brent and Emmanuel Thomé
-
2012/690 ( PDF )
- The Weakness of Integrity Protection for LTE
- Teng Wu and Guang Gong
-
2012/689 ( PDF )
- Cryptography Using CAPTCHA Puzzles
- Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia
-
2012/688 ( PDF )
- A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
- Jintai Ding, Xiang Xie, Xiaodong Lin
-
2012/687 ( PDF )
- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
- Karyn Benson and Hovav Shacham and Brent Waters
-
2012/686 ( PDF )
- Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl
- Jian Zou and Wenling Wu and Shuang Wu and Le Dong
-
2012/685 ( PDF )
- Square root computation over even extension fields
- Gora Adj and Francisco Rodríguez-Henríquez
-
2012/684 ( PDF )
- Generic Related-key Attacks for HMAC
- Thomas Peyrin and Yu Sasaki and Lei Wang
-
2012/683 ( -- withdrawn -- )
- Fingerprint Tables: A Generalization of Rainbow Tables
- Gildas Avoine and Adrien Bourgeois and Xavier Carpent
-
2012/682 ( PDF )
- Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud
- Jiawei Yuan and Shucheng Yu
-
2012/681 ( PDF )
- Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations
- Guang Gong and Mark Aagaard and Xinxin Fan
-
2012/680 ( PDF )
- Natural Generalizations of Threshold Secret Sharing
- Oriol Farras,Carles Padro,Chaoping Xing, and An Yang
-
2012/679 ( PDF )
- Hiding the Input-Size in Secure Two-Party Computation
- Yehuda Lindell and Kobbi Nissim and Claudio Orlandi
-
2012/678 ( PDF )
- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
- Benedikt Gierlichs and Jorn-Marc Schmidt and Michael Tunstall
-
2012/677 ( PDF )
- What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher
- Jialin Huang and Xuejia Lai
-
2012/676 ( PDF )
- Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan
- Julia Borghoff
-
2012/675 ( PDF )
- Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA
- Yoshinori Aono
-
2012/674 ( PDF )
- Lecture Notes in Secret Sharing
- Carles Padro
-
2012/673 ( PDF )
- Robust Encryption, Revisited
- Pooya Farshim and Benoît Libert and Kenneth G. Paterson and Elizabeth A. Quaglia
-
2012/672 ( PDF )
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
- Itai Dinur and Orr Dunkelman and Adi Shamir
-
2012/671 ( PDF )
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- Tatsuaki Okamoto and Katsuyuki Takashima
-
2012/670 ( PDF )
- Fast Cryptography in Genus 2
- Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
-
2012/669 ( PDF )
- Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay
- Zhen Liu and Zhenfu Cao and Duncan S. Wong
-
2012/668 ( PDF )
- Construction of Differential Characteristics in ARX Designs -- Application to Skein
- Gaetan Leurent
-
2012/667 ( PDF )
- False Negative probabilities in Tardos codes
- Antonino Simone and Boris Skoric
-
2012/666 ( PS PS.GZ PDF )
- Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem
- Chenglian Liu and Ziwei Ye
-
2012/665 ( PDF )
- Uniform Compression Functions Can Fail to Preserve “Full” Entropy
- Daniel R. L. Brown
-
2012/664 ( PDF )
- PRE- Stronger Security Notion and Efficient Construction with New Property
- Jiang Zhang and Zhenfeng Zhang and Yu Chen
-
2012/663 ( PDF )
- Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?
- Alexander Rostovtsev
-
2012/662 ( PDF )
- Asynchronous Physical Unclonable Functions – AsyncPUF
- Julian Murphy
-
2012/661 ( PDF )
- Breaking Another Quasigroup-Based Cryptographic Scheme
- Markus Dichtl and Pascale Böffgen
-
2012/660 ( PDF )
- Design of Secure Image Transmission in MANET using Number Theory Based Image Compression and Quasigroup Encryption (NTICQE) Algorithm
- Munivel E and Rajeswari Mukesh
-
2012/659 ( PDF )
- Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks
- Hassan Jameel Asghar and Shujun Li and Ron Steinfeld and Josef Pierpzyk
-
2012/658 ( PDF )
- Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
- Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy
-
2012/657 ( PDF )
- Fixed Argument Pairing Inversion on Elliptic Curves
- Sungwook Kim and Jung Hee Cheon
-
2012/656 ( PDF )
- Security Evaluation of Rakaposhi Stream Cipher
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
-
2012/655 ( PDF )
- Privacy Preserving Revocable Predicate Encryption Revisited
- Kwangsu Lee and Intae Kim and Seong Oun Hwang
-
2012/654 ( PDF )
- Refine the Concept of Public Key Encryption with Delegated Search
- Qiang Tang and Yuanjie Zhao and Xiaofeng Chen and Hua Ma
-
2012/653 ( PDF )
- How powerful are the DDH hard groups?
- Periklis A. Papakonstantinou and Charles W. Rackoff and Yevgeniy Vahlis
-
2012/652 ( PDF )
- Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
- Vipul Goyal and Huijia Lin and Omkant Pandey and Rafael Pass and Amit Sahai
-
2012/651 ( -- withdrawn -- )
- TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems
- Kan Yang and Zhen Liu and Zhenfu Cao and Xiaohua Jia and Duncan S. Wong and Kui Ren
-
2012/650 ( PDF )
- Formal analysis of privacy in Direct Anonymous Attestation schemes
- Ben Smyth and Mark D. Ryan and Liqun Chen
-
2012/649 ( PDF )
- A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
- Yannick Seurin and Joana Treger
-
2012/648 ( PDF )
- Search in Encrypted Data: Theoretical Models and Practical Applications
- Qiang Tang
-
2012/647 ( PDF )
- A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions
- Daniel Smith-Tone and Cristina Tone
-
2012/646 ( PDF )
- Galindo-Garcia Identity-Based Signature, Revisited
- Sanjit Chatterjee and Chethan Kamath and Vikas Kumar
-
2012/645 ( PDF )
- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
- Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
-
2012/644 ( PDF )
- Impossibility Results for Indifferentiability with Resets
- Atul Luykx and Elena Andreeva and Bart Mennink and Bart Preneel
-
2012/643 ( PDF )
- Protocols for Multiparty Coin Toss With Dishonest Majority
- Amos Beimel and Eran Omri and Ilan Orlov
-
2012/642 ( PDF )
- Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
- Ivan Damgard and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart
-
2012/641 ( PDF )
- A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure
- Bin Wang
-
2012/640 ( PDF )
- Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function
- Gaoli Wang and Yanzhao Shen
-
2012/639 ( PDF )
- Coarse-grained integer - Smooth? Rough? Both!
- Daniel Loebenberger and Michael Nüsken
-
2012/638 ( PDF )
- Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme
- Cai-xue Zhou
-
2012/637 ( PDF )
- Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification
- Aviad Kipnis and Eliphaz Hibshoosh
-
2012/636 ( PDF )
- On the Complexity of the BKW Algorithm on LWE
- Martin R. Albrecht and Carlos Cid and Jean-Charles Faugčre and Robert Fitzpatrick and Ludovic Perret
-
2012/635 ( -- withdrawn -- )
- Secure Outsourced Attribute-based Encryption
- Jin Li and Jingwei Li and Xiaofeng Chen and Chunfu Jia and Duncan S. Wong
-
2012/634 ( PDF )
- Cryptanalysis of Double-Block-Length Hash Mode MJH
- Deukjo Hong and Daesung Kwon
-
2012/633 ( PDF )
- New Preimage Attack on MDC-4
- Deukjo Hong and Daesung Kwon
-
2012/632 ( PDF )
- Pairings on Generalized Huff Curves
- Abdoul Aziz Ciss and Djiby Sow
-
2012/631 ( PDF )
- Message-Locked Encryption and Secure Deduplication
- Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart
-
2012/630 ( PDF )
- On the Security of TLS Renegotiation
- Florian Giesen and Florian Kohlar and Douglas Stebila
-
2012/629 ( PDF )
- SCAPI: The Secure Computation Application Programming Interface
- Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell
-
2012/628 ( PDF )
- Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems
- Muhammad Yasir Malik
-
2012/627 ( PDF )
- Efficient Group Signatures in the Standard Model
- Laila El Aimani and Olivier Sanders
-
2012/626 ( PDF )
- Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis
- Xi Xiong and Haining Fan
-
2012/625 ( PDF )
- Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
- Alexandra Boldyreva and Nathan Chenette and Adam O’Neill
-
2012/624 ( PDF )
- Order-Preserving Symmetric Encryption
- Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O’Neill
-
2012/623 ( PDF )
- Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes
- David McGrew
-
2012/622 ( PDF )
- Resolving the conflict between generality and plausibility in verified computation
- Srinath Setty and Benjamin Braun and Victor Vu and Andrew J. Blumberg and Bryan Parno and Michael Walfish
-
2012/621 ( PDF )
- Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
- Kitae Jeong and HyungChul Kang and Changhoon Lee and Jaechul Sung and Seokhie Hong
-
2012/620 ( PDF )
- Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction
- Claus P. Schnorr and Taras Shevchenko
-
2012/619 ( PDF )
- Asynchronous Computational VSS with Reduced Communication Complexity
- Michael Backes and Amit Datta and Aniket Kate
-
2012/618 ( -- withdrawn -- )
- An ultra-lightweight ID-based pairwise key establishment scheme aiming at full collusion resistance
- Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez-Perez, Jaime Gutierrez, Santos Merino del Pozo
-
2012/617 ( PDF )
- Security Analysis of an Open Car Immobilizer Protocol Stack
- Stefan Tillich and Marcin Wójcik
-
2012/616 ( PDF )
- Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
- Nishanth Chandran and Sanjam Garg
-
2012/615 ( PDF )
- Polynomial time solutions of computational problems in noncommutative-algebraic cryptography
- Boaz Tsaban
-
2012/614 ( PDF )
- An arithmetic intersection formula for denominators of Igusa class polynomials
- Kristin Lauter and Bianca Viray
-
2012/613 ( PDF )
- Resource-Restricted Indifferentiability
- Grégory Demay and Peter Gaži and Martin Hirt and Ueli Maurer
-
2012/612 ( PDF )
- Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff
- Byoung-Il Kim and Jin Hong
-
2012/611 ( PDF )
- A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
- Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay
-
2012/610 ( PDF )
- Candidate Multilinear Maps from Ideal Lattices
- Sanjam Garg and Craig Gentry and Shai Halevi
-
2012/609 ( PDF )
- A NEW APPROACH TO THE DISCRETE LOGARITHM PROBLEM WITH AUXILIARY INPUTS
- Taechan Kim and Jung Hee Cheon
-
2012/608 ( PDF )
- On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting
- Marina Blanton and Mehrdad Aliasgari
-
2012/607 ( PDF )
- Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem
- Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber
-
2012/606 ( PDF )
- Quantum-Secure Message Authentication Codes
- Dan Boneh and Mark Zhandry
-
2012/605 ( PDF )
- Secure Outsourced Attribute-Based Signatures
- Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
-
2012/604 ( PDF )
- Leakage-Resilient Cryptography from Minimal Assumptions
- Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs
-
2012/603 ( PDF )
- Collecting Data while Preserving Individuals' Privacy: A Case Study
- Alexis Bonnecaze and Robert Rolland
-
2012/602 ( PDF )
- A note on invariant linear transformations in multivariate public key cryptography
- Andreas Wiemers
-
2012/601 ( PS PS.GZ PDF )
- How to Garble RAM Programs
- Steve Lu and Rafail Ostrovsky
-
2012/600 ( PDF )
- The LED Block Cipher
- Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw
-
2012/599 ( PDF )
- On the coefficients of the polynomial in the number field sieve
- Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
-
2012/598 ( PDF )
- Taking proof-based verified computation a few steps closer to practicality (extended version)
- Srinath Setty and Victor Vu and Nikhil Panpalia and Benjamin Braun and Muqeet Ali and Andrew J. Blumberg and Michael Walfish
-
2012/597 ( PDF )
- A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA
- Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj
-
2012/596 ( PDF )
- Evaluating User Privacy in Bitcoin
- Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun
-
2012/595 ( PDF )
- Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes
- Oriol Farrŕs and Carles Padró
-
2012/594 ( PDF )
- Improved Impossible Differential Attack on Reduced Version of Camellia-192/256
- Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li
-
2012/593 ( PDF )
- Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps
- Tomoko Yonemura and Taichi Isogai and Hirofumi Muratani and Yoshikazu Hanatani
-
2012/592 ( PDF )
- Attribute-Based Encryption for Circuits from Multilinear Maps
- Amit Sahai and Brent Waters
-
2012/591 ( PDF )
- Biclique Cryptanalysis Of PRESENT, LED, And KLEIN
- Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
-
2012/590 ( -- withdrawn -- )
- --withdrawn--
- --withdrawn--
-
2012/589 ( -- withdrawn -- )
- --withdrawn--
- --withdrawn--
-
2012/588 ( PDF )
- Breaking Public Keys - How to Determine an Unknown RSA Public Modulus
- Hans-Joachim Knobloch
-
2012/587 ( PDF )
- Symbolic computation in block cipher with application to PRESENT
- Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
-
2012/586 ( PDF )
- SHADE: Secure HAmming DistancE computation from oblivious transfer
- Julien Bringer and Herve Chabanne and Alain Patey
-
2012/585 ( PDF )
- On Provably Secure Code-based Signature and Signcryption Scheme
- Preetha Mathew K and Sachin Vasant and C. Pandu Rangan
-
2012/584 ( PDF )
- Quantitative Analysis of the Full Bitcoin Transaction Graph
- Dorit Ron and Adi Shamir
-
2012/583 ( PDF )
- New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
- Yannis Rouselakis and Brent Waters
-
2012/582 ( PS PS.GZ PDF )
- Using Randomizers for Batch Verification of ECDSA Signatures
- Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury
-
2012/581 ( PDF )
- On the (in)security of some smart-card-based password authentication schemes for WSN
- Ding Wang and Chun-guang Ma
-
2012/580 ( PDF )
- Cryptanalysis of the OKH Authenticated Encryption Scheme
- Peng Wang and Wenling Wu and Liting Zhang
-
2012/579 ( PDF )
- Defending Against the Unknown Enemy: Applying FlipIt to System Security
- Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos
-
2012/578 ( PDF )
- Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
- Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
-
2012/577 ( PDF )
- A Framework for Unique Ring Signatures
- Matthew Franklin and Haibin Zhang
-
2012/576 ( PDF )
- Concurrent Signature without Random Oracles
- Xiao Tan and Qiong Huang and Duncan S. Wong
-
2012/575 ( PDF )
- Nanoelectronic Solutions for Hardware Security
- Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki
-
2012/574 ( PDF )
- Quantum algorithm for the discrete logarithm problem for matrices over finite group rings
- A. D. Myasnikov and A. Ushakov
-
2012/573 ( PDF )
- Limits on the Usefulness of Random Oracles
- Iftach Haitner and Eran Omri and Hila Zarosim
-
2012/572 ( PDF )
- On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption
- Divya Gupta and Amit Sahai
-
2012/571 ( PDF )
- Improved side channel attack on the block cipher NOEKEON
- Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
-
2012/570 ( PDF )
- Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock
- Hadi Soleimany and Kaisa Nyberg
-
2012/569 ( PDF )
- Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
- San Ling and Khoa Nguyen and Damien Stehle and Huaxiong Wang
-
2012/568 ( PDF )
- On Transaction Pseudonyms with Implicit Attributes
- Stefan G. Weber
-
2012/567 ( PDF )
- Leakage Squeezing of Order Two
- Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi
-
2012/566 ( PDF )
- Quantization in Continuous-Source Zero Secrecy Leakage Helper Data Schemes
- Joep de Groot and Boris Škorić and Niels de Vreede and Jean-Paul Linnartz
-
2012/565 ( PDF )
- Packed Ciphertexts in LWE-based Homomorphic Encryption
- Zvika Brakerski and Craig Gentry and Shai Halevi
-
2012/564 ( PDF )
- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
- Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
-
2012/563 ( PDF )
- Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions
- Kai-Min Chung and Huijia Lin and Rafael Pass
-
2012/562 ( PDF )
- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
- Kwangsu Lee and Dong Hoon Lee and Moti Yung
-
2012/561 ( PDF )
- An Attack on a Fully Homomorphic Encryption Scheme
- Hu Yupu, Wang Fenghe
-
2012/560 ( PDF )
- Computational Soundness of Coinductive Symbolic Security under Active Attacks
- Mohammad Hajiabadi, Bruce M. Kapron
-
2012/559 ( PDF )
- Plaintext Awareness in Identity-Based Key Encapsulation
- Mark Manulis and Bertram Poettering and Douglas Stebila
-
2012/558 ( PDF )
- Domain-Specific Pseudonymous Signatures for the German Identity Card
- Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
-
2012/557 ( PDF )
- PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)
- Stefan Katzenbeisser, Ünal Kocabas, Vladimir Rožic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede and Christian Wachsmann
-
2012/556 ( PDF )
- Resource-based Corruptions and the Combinatorics of Hidden Diversity
- Juan Garay and David Johnson and Aggelos Kiayias and Moti Yung
-
2012/555 ( PDF )
- New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation
- Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai
-
2012/554 ( PDF )
- Security weakness in the Proof of Storage with Deduplication
- Youngjoo Shin, Junbeom Hur, Kwangjo Kim
-
2012/553 ( PDF )
- Bellcore attack in practice
- Andrey Sidorenko and Joachim van den Berg and Remko Foekema and Michiel Grashuis and Jaap de Vos
-
2012/552 ( PDF )
- Provably Secure Concurrent Error Detection Against Differential Fault Analysis
- Xiaofei Guo, Debdeep Mukhopadhyay and Ramesh Karri
-
2012/551 ( PDF )
- Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists
- Liangze Li and Hongfeng Wu and Fan Zhang
-
2012/550 ( PDF )
- Dynamic Proofs of Retrievability via Oblivious RAM
- David Cash and Alptekin Kupcu and Daniel Wichs
-
2012/549 ( PDF )
- Faster batch forgery identification
- Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk
-
2012/548 ( PDF )
- Efficient Modular NIZK Arguments from Shift and Product
- Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
-
2012/547 ( PDF )
- Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity
- Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta
-
2012/546 ( PDF )
- Rotational cryptanalysis of round-reduced Keccak
- Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny
-
2012/545 ( PDF )
- A Versatile Multi-Input Multiplier over Finite Fields
- Haibo Yi, Shaohua Tang, Lingling Xu
-
2012/544 ( PDF )
- Differential Analysis of the LED Block Cipher
- Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici
-
2012/543 ( PDF )
- Enhanced Chosen-Ciphertext Security and Applications
- Dana Dachman-Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill
-
2012/542 ( PDF )
- Salus: A System for Server-Aided Secure Function Evaluation
- Seny Kamara and Payman Mohassel and Ben Riva
-
2012/541 ( -- withdrawn -- )
- 2048XKS - A Software Oriented High Security Block Cipher
- Dieter Schmidt
-
2012/540 ( PDF )
- A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms
- Ga Won Lee and Jin Hong
-
2012/539 ( PDF )
- Efficient Implementation of RSA Algorithm with MKE
- Sami A. Nagar and Dr. Saad Alshamma
-
2012/538 ( PDF )
- Private Top-k Aggregation Protocols
- Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim
-
2012/537 ( PDF )
- Intercepting Tokens: The Empire Strikes Back in the Clone Wars
- Özgür Dagdelen and Marc Fischlin
-
2012/536 ( PDF )
- Secret Sharing and Secure Computing from Monotone Formulae
- Ivan Bjerre Damgĺrd and Jonas Kölker and Peter Bro Miltersen
-
2012/535 ( PDF )
- A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl
- Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
-
2012/534 ( PDF )
- A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes
- Maura B. Paterson and Douglas R. Stinson
-
2012/533 ( PDF )
- Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems
- Thijs Laarhoven and Joop van de Pol and Benne de Weger
-
2012/532 ( PDF )
- Pairing computation on Edwards curves with high-degree twists
- Liangze Li and Hongfeng Wu and Fan Zhang
-
2012/531 ( PDF )
- Generic Construction of Trace and Revoke Schemes
- Murat Ak and Aggelos Kiayias and Serdar Pehlivanoglu and Ali Aydin Selcuk
-
2012/530 ( PS PS.GZ PDF )
- Dynamic Searchable Symmetric Encryption
- Seny Kamara and Charalampos Papamanthou and Tom Roeder
-
2012/529 ( PDF )
- PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version)
- Julia Borghoff and Anne Canteaut and Tim Güneysu and Elif Bilge Kavun and Miroslav Knežević and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and Sřren S. Thomsen and Tolga Yalçın
-
2012/528 ( PDF )
- An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption
- Graham Enos and Yuliang Zheng
-
2012/527 ( PDF )
- Cryptanalysis of a recent two factor authentication scheme
- Michael Scott
-
2012/526 ( PDF )
- Invertible Polynomial Representation for Private Set Operations
- Jung Hee Cheon and Hyunsook Hong and Hyung Tae Lee
-
2012/525 ( PDF )
- Computing endomorphism rings of abelian varieties of dimension two
- Gaetan Bisson
-
2012/524 ( PDF )
- Tahoe – The Least-Authority Filesystem
- Zooko Wilcox-O'Hearn and Brian Warner
-
2012/523 ( PDF )
- The Curious Case of Non-Interactive Commitments
- Mohammad Mahmoody and Rafael Pass
-
2012/522 ( PDF )
- False Positive probabilities in q-ary Tardos codes: comparison of attacks
- A. Simone and B. Skoric
-
2012/521 ( PDF )
- Functional Encryption with Bounded Collusions via Multi-Party Computation
- Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
-
2012/520 ( PDF )
- Optimizing Segment Based Document Protection (Corrected Version)
- Miroslaw Kutylowski and Maciej Gebala
-
2012/519 ( PDF )
- Faster implementation of scalar multiplication on Koblitz curves
- Diego F. Aranha and Armando Faz-Hernández and Julio López and Francisco Rodríguez-Henríquez
-
2012/518 ( PDF )
- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
- Kwangsu Lee and Dong Hoon Lee and Moti Yung
-
2012/517 ( PDF )
- Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity
- Ashish Choudhury and Martin Hirt and Arpita Patra
-
2012/516 ( PDF )
- Garbling XOR Gates ``For Free'' in the Standard Model
- Benny Applebaum
-
2012/515 ( PDF )
- Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
- Mihir Bellare and Adam O'Neill
-
2012/514 ( PDF )
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Mihir Bellare and Kenneth G. Paterson and Susan Thomson
-
2012/513 ( PS PS.GZ PDF )
- Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
- Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes
-
2012/512 ( PDF )
- Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
- Ivan Damgard and Sarah Zakarias
-
2012/511 ( PDF )
- Entangled Encodings and Data Entanglement
- Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi
-
2012/510 ( PDF )
- Enabling 3-share Threshold Implementations for any 4-bit S-box
- Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann
-
2012/509 ( PDF )
- On 3-share Threshold Implementations for 4-bit S-boxes
- Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang
-
2012/508 ( PDF )
- On Limitations of Universal Simulation: Constant-Round Public-Coin Zero-Knowledge Proofs Imply Understanding Programs
- Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung
-
2012/507 ( PDF )
- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
- Josep Balasch and Baris Ege and Thomas Eisenbarth and Benoit Gérard and Zheng Gong and Tim Güneysu and Stefan Heyse and Stéphanie Kerckhof and François Koeune and Thomas Plos and Thomas Pöppelmann and Francesco Regazzoni and François-Xavier Standaert and Gilles Van Assche and Ronny Van Keer and Loďc van Oldeneel tot Oldenzeel and Ingo von Maurich
-
2012/506 ( PDF )
- Succinct Malleable NIZKs and an Application to Compact Shuffles
- Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
-
2012/505 ( PDF )
- On pseudorandomization of information-theoretically secure schemes without hardness assumptions
- Koji Nuida
-
2012/504 ( PDF )
- Scalable Deniable Group Key Establishment
- Kashi Neupane and Rainer Steinwandt and Adriana Suarez Corona
-
2012/503 ( PDF )
- Hierarchical Identity-Based (Lossy) Trapdoor Functions
- Alex Escala and Javier Herranz and Benoit Libert and Carla Rafols
-
2012/502 ( PDF )
- Are We Compromised? Modelling Security Assessment Games
- Viet Pham and Carlos Cid
-
2012/501 ( PDF )
- Privacy Amplification with Asymptotically Optimal Entropy Loss
- Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin
-
2012/500 ( PDF )
- Constant Ciphertext Length in CP-ABE
- Nishant Doshi and Devesh Jinwala
-
2012/499 ( -- withdrawn -- )
- Authenticity, Integrity and Proof of Existence for Long-Term Archiving: a Survey
- Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann
-
2012/498 ( PDF )
- Almost Perfect Algebraic Immune Functions with Good Nonlinearity
- Meicheng Liu and Dongdai Lin
-
2012/497 ( PDF )
- The low-call diet: Authenticated Encryption for call counting HSM users
- Mike Bond and George French and Nigel P. Smart and Gaven J. Watson
-
2012/496 ( PDF )
- Updating attribute in CP-ABE: A New Approach
- Nishant Doshi and Devesh Jinwala
-
2012/495 ( PDF )
- "Metaproofs" (and their Cryptographic Applications)
- Alfredo De Santis and Moti Yung
-
2012/494 ( PDF )
- Protocol Misidentification Made Easy with Format-Transforming Encryption
- Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton
-
2012/493 ( PDF )
- Efficient Query Integrity for Outsourced Dynamic Databases
- Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
-
2012/492 ( PDF )
- A Method for Generating Full Cycles by a Composition of NLFSRs
- Elena Dubrova
-
2012/491 ( PDF )
- On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown
- Lidong Han and Wei Wei and Mingjie Liu
-
2012/490 ( PS PS.GZ PDF )
- Desynchronization Attack on RAPP Ultralightweight Authentication Protocol
- Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref
-
2012/489 ( PDF )
- Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
- Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
-
2012/488 ( PDF )
- Designated Verifier Threshold Proxy Signature Scheme without Random Oracles
- Mohammad Beheshti-Atashgah \and Majid Bayat \and Mahmoud Gardeshi \and Mohammad Reza Aref
-
2012/487 ( PDF )
- Short communication: An interpretation of the Linux entropy estimator
- Benjamin Pousse
-
2012/486 ( PDF )
- Computational Soundness without Protocol Restrictions
- Michael Backes and Ankit Malik and Dominique Unruh
-
2012/485 ( PDF )
- Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
- Neil Hanley and HeeSeok Kim and Michael Tunstall
-
2012/484 ( PS PS.GZ )
- Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture
- Ding Wang, Chun-guang Ma, De-li Gu and Zhen-shan Cui
-
2012/483 ( PS PS.GZ PDF )
- An Efficient Signcryption Scheme from q-Diffie-Hellman Problems
- Jayaprakash Kar
-
2012/482 ( PDF )
- Approaches for the Parallelization of Software Implementation of Integer Multiplication
- Vladislav Kovtun and Andrew Okhrimenko
-
2012/481 ( PDF )
- Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance
- John Steinberger
-
2012/480 ( PDF )
- Short Signatures From Diffie-Hellman: Realizing Short Public Key
- Jae Hong Seo
-
2012/479 ( PDF )
- Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles
- Mohammad Reza Reyhanitabar and Willy Susilo
-
2012/478 ( PDF )
- Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol
- Wang Qinglong, Xu Li
-
2012/477 ( PDF )
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean
-
2012/476 ( PDF )
- A j-lanes tree hashing mode and j-lanes SHA-256
- Shay Gueron
-
2012/475 ( PDF )
- Efficient Signatures of Knowledge and DAA in the Standard Model
- David Bernhard and Georg Fuchsbauer and Essam Ghadafi
-
2012/474 ( PDF )
- On the Semantic Security of Functional Encryption Schemes
- Manuel Barbosa and Pooya Farshim
-
2012/473 ( PDF )
- Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
- Zhengan Huang and Shengli Liu and Baodong Qin
-
2012/472 ( PDF )
- On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme –
- Amir Moradi and Oliver Mischke
-
2012/471 ( PDF )
- A Quasigroup Based Random Number Generator for Resource Constrained Environments
- Matthew Battey and Abhishek Parakh
-
2012/470 ( PDF )
- Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime
- Sorin Iftene
-
2012/469 ( PDF )
- Perfect Keyword Privacy in PEKS Systems
- Mototsugu Nishioka
-
2012/468 ( PDF )
- Functional Encryption: New Perspectives and Lower Bounds
- Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
-
2012/467 ( PDF )
- New results on nonexistence of generalized bent functions
- Yupeng Jiang and Yingpu Deng
-
2012/466 ( PDF )
- Computational Entropy and Information Leakage
- Benjamin Fuller and Leonid Reyzin
-
2012/465 ( PDF )
- T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags
- Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
-
2012/464 ( PDF )
- Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
- Carles Padro and Leonor Vazquez and An Yang
-
2012/463 ( PDF )
- Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
- Xiang Xie and Rui Xue and Rui Zhang
-
2012/462 ( PDF )
- Perfect Ambiguous Optimistic Fair Exchange
- Yang Wang and Man Ho Au and Willy Susilo
-
2012/461 ( PDF )
- Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits
- Nir Bitansky and Alessandro Chiesa
-
2012/460 ( PDF )
- Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
- Yohei Watanabe and Takenobu Seito and Junji Shikata
-
2012/459 ( PDF )
- Barriers in Cryptography with Weak, Correlated and Leaky Sources
- Daniel Wichs
-
2012/458 ( PDF )
- Computing small discrete logarithms faster
- Daniel J. Bernstein and Tanja Lange
-
2012/457 ( PDF )
- Hush Functions Extended to Any Size Input versus Any Size Output
- Gideon Samid
-
2012/456 ( PDF )
- Crowd-Blending Privacy
- Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass
-
2012/455 ( PDF )
- Must you know the code of f to securely compute f?
- Mike Rosulek
-
2012/454 ( PDF )
- A Probabilistic Quantum Key Transfer Protocol
- Abhishek Parakh
-
2012/453 ( PDF )
- New Leakage Resilient CCA-Secure Public Key Encryption
- Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
-
2012/452 ( PDF )
- EPiC: Efficient Privacy-Preserving Counting for MapReduce
- Erik-Oliver Blass and Guevara Noubir and Triet D. Vo-Huu
-
2012/451 ( PS PS.GZ PDF )
- Stam's Conjecture and Threshold Phenomena in Collision Resistance
- John Steinberger, Xiaoming Sun, Zhe Yang
-
2012/450 ( PDF )
- Tweakable Blockciphers with Beyond Birthday-Bound Security
- Will Landecker and Thomas Shrimpton and R. Seth Terashima
-
2012/449 ( PDF )
- Long Term Confidentiality: a Survey
- Johannes Braun and Johannes Buchmann and Ciaran Mullan and Alex Wiesmaier
-
2012/448 ( PDF )
- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
- Goichiro Hanaoka and Takahiro Matsuda and Jacob C.N. Schuldt
-
2012/447 ( PDF )
- Multi-receiver Homomorphic Authentication Codes for Network Coding
- Zhaohui Tang and Hoon Wei Lim
-
2012/446 ( PS PS.GZ PDF )
- Differential Fault Analysis of AES: Towards Reaching its Limits
- Sk Subidh Ali , Debdeep Mukhopadhyay, and Michael Tunstall
-
2012/445 ( PDF )
- A note on ‘An efficient certificateless aggregate signature with constant pairing computations’
- Debiao He, Jianhua Chen, Miaomiao Tian
-
2012/444 ( PDF )
- Factorization of a 1061-bit number by the Special Number Field Sieve
- Greg Childers
-
2012/443 ( PDF )
- Improved CRT Algorithm for Class Polynomials in Genus 2
- Kristin Lauter and Damien Robert
-
2012/442 ( PDF )
- Group Signatures with Almost-for-free Revocation
- Benoit Libert and Thomas Peters and Moti Yung
-
2012/441 ( PDF )
- Adaptively Secure Multi-Party Computation with Dishonest Majority
- Sanjam Garg and Amit Sahai
-
2012/440 ( PDF )
- New Preimage Attacks Against Reduced SHA-1
- Simon Knellwolf and Dmitry Khovratovich
-
2012/439 ( PDF )
- Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
- Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
-
2012/438 ( PDF )
- Breaking and Repairing GCM Security Proofs
- Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu
-
2012/437 ( PDF )
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Amit Sahai and Hakan Seyalioglu and Brent Waters
-
2012/436 ( PDF )
- Secure Database Commitments and Universal Arguments of Quasi Knowledge
- Melissa Chase and Ivan Visconti
-
2012/435 ( PS PS.GZ PDF )
- Differential Privacy with Imperfect Randomness
- Yevgeniy Dodis and Adriana Lopez-Alt and Ilya Mironov and Salil Vadhan
-
2012/434 ( PDF )
- Algebraic (Trapdoor) One Way Functions and their Applications
- Dario Catalano and Dario Fiore and Rosario Gennaro and Konstantinos Vamvourellis
-
2012/433 ( PDF )
- Impossibility Results for Static Input Secure Computation
- Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti
-
2012/432 ( PDF )
- TorScan: Tracing Long-lived Connections and Differential Scanning Attacks
- Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
-
2012/431 ( PDF )
- On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
- Yusuke Sakai and Jacob C.N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta
-
2012/430 ( PDF )
- A formal study of two physical countermeasures against side channel attacks
- Sébastien Briais and Sylvain Guilley and Jean-Luc Danger
-
2012/429 ( PDF )
- Simple construction of epsilon-biased distribution
- Long Hoang Nguyen and Andrew William Roscoe
-
2012/428 ( PDF )
- Rational authentication protocols and their use in financial transactions
- Long Hoang Nguyen
-
2012/427 ( PDF )
- Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian
- Robert Drylo
-
2012/426 ( PDF )
- A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes
- Ed Kendall and Michelle Kendall and Wilfrid S. Kendall
-
2012/425 ( PDF )
- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
- Gautham Sekar
-
2012/424 ( PDF )
- Scalable Group Signatures with Revocation
- Benoit Libert and Thomas Peters and Moti Yung
-
2012/423 ( PDF )
- Programmable encryption and key-dependent messages
- Dominique Unruh
-
2012/422 ( PDF )
- Biclique Cryptanalysis of TWINE
- Mustafa Çoban and Ferhat Karakoç and Özkan Boztaş
-
2012/421 ( PDF )
- Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
- Ekawat Homsirikamol and Pawel Morawiecki and Marcin Rogawski and Marian Srebrny
-
2012/420 ( PDF )
- A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers
- Denise Demirel and Jeroen van de Graaf
-
2012/419 ( -- withdrawn -- )
- DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
- Kan Yang and Xiaohua Jia and Kui Ren
-
2012/418 ( PDF )
- Weaknesses of an Improvement Authentication Scheme using
- Rafael Martínez-Peláez and Francisco Rico-Novella
-
2012/417 ( PDF )
- Efficient Padding Oracle Attacks on Cryptographic Hardware
- Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay
-
2012/416 ( PDF )
- Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
- Cas Cremers and Michčle Feltz
-
2012/415 ( PDF )
- Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion
- Jialin Huang and Xuejia Lai
-
2012/414 ( PDF )
- Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials
- Yin Li and Gong-liang Chen and Xiao-ning Xie
-
2012/413 ( PDF )
- Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation
- Mukund Kalyanaraman and Michael Orshansky
-
2012/412 ( PDF )
- Probabilistic Infinite Secret Sharing
- Laszlo Csirmaz
-
2012/411 ( PDF )
- Infinite Secret Sharing -- Examples
- Alexander Dibert and Laszlo Csirmaz
-
2012/410 ( PDF )
- Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme
- Qingfeng Cheng
-
2012/409 ( PDF )
- MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes
- Rafael Misoczki and Jean-Pierre Tillich and Nicolas Sendrier and Paulo S. L. M. Barreto
-
2012/408 ( PDF )
- Efficient Implementation of Bilinear Pairings on ARM Processors
- Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, and David Jao
-
2012/407 ( PDF )
- Cross-Unlinkable Hierarchical Group Signatures
- Julien Bringer and Herve Chabanne and Alain Patey
-
2012/406 ( PDF )
- Comments on four multi-server authentication protocols using smart card
- *Jue-Sam Chou 1, Yalin Chen2, Chun-Hui Huang 3, Yu-Siang Huang4
-
2012/405 ( PDF )
- Secure Computation on Floating Point Numbers
- Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele
-
2012/404 ( PDF )
- Secret Sharing Schemes for Very Dense Graphs
- Amos Beimel and Oriol Farrŕs and Yuval Mintz
-
2012/403 ( PDF )
- Fully Private Revocable Predicate Encryption
- Juan Manuel González Nieto and Mark Manulis and Dongdong Sun
-
2012/402 ( PDF )
- Forward-Secure Hierarchical Predicate Encryption
- Juan Manuel González Nieto and Mark Manulis and Dongdong Sun
-
2012/401 ( PDF )
- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
- Martin Albrecht and Gregor Leander
-
2012/400 ( PDF )
- An Algebraic Fault Attack on the LED Block Cipher
- Philipp Jovanovic and Martin Kreuzer and Ilia Polian
-
2012/399 ( PDF )
- Differential Fault Analysis on Block Cipher Piccolo
- Kitae Jeong
-
2012/398 ( PDF )
- PIRMAP: Efficient Private Information Retrieval for MapReduce
- Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
-
2012/397 ( PDF )
- Cross-Domain Password-Based Authenticated Key Exchange Revisited
- Liqun Chen and Hoon Wei Lim and Guomin Yang
-
2012/396 ( PDF )
- On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$
- Brajesh Kumar Singh
-
2012/395 ( PDF )
- A New Efficient Authenticated ID-Based Group Key Agreement Protocol
- Morteza Arifi and Mahmoud Gardeshi and Mohammad Sabzinejad Farash
-
2012/394 ( PDF )
- An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks
- Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari
-
2012/393 ( PDF )
- A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings
- Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat
-
2012/392 ( PDF )
- ID Based Signcryption Scheme in Standard Model
- S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan
-
2012/391 ( PDF )
- Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
- Shaohui Wang,Sujuan Liu,Danwei Chen
-
2012/390 ( PDF )
- Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three
- Chol-Sun Sin
-
2012/389 ( PDF )
- Wide Strong Private RFID Identification based on Zero-Knowledge
- Roel Peeters and Jens Hermans
-
2012/388 ( PDF )
- The Arithmetic Codex
- Ignacio Cascudo and Ronald Cramer and Chaoping Xing
-
2012/387 ( PDF )
- New cryptographic constructions using generalized learning with errors problem
- Jintai ding
-
2012/386 ( PDF )
- Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards
- Rafael Martínez-Peláez and Francisco Rico-Novella
-
2012/385 ( PDF )
- CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing
- Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen
-
2012/384 ( PDF )
- Functional Encryption for Regular Languages
- Brent Waters
-
2012/383 ( PDF )
- Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited
- Junji Shikata
-
2012/382 ( PDF )
- On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
- Afonso Arriaga and Manuel Barbosa and Pooya Farshim
-
2012/381 ( -- withdrawn -- )
- A Strongly Secure Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles
- Zheng Yang
-
2012/380 ( PDF )
- Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
- Ioana Boureanu and Serge Vaudenay
-
2012/379 ( PDF )
- All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments
- Eiichiro Fujisaki
-
2012/378 ( PDF )
- Multiparty Proximity Testing with Dishonest Majority from Equality Testing
- Ran Gelles and Rafail Ostrovsky and Kina Winoto
-
2012/377 ( PDF )
- Distributed Key Generation in the Wild
- Aniket Kate and Yizhou Huang and Ian Goldberg
-
2012/376 ( PDF )
- Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem
- Colleen M. Swanson and Douglas R. Stinson
-
2012/375 ( PDF )
- How to Store some Secrets
- Reto E. Koenig and Rolf Haenni
-
2012/374 ( PDF )
- Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
- Omar Choudary and Felix Grobert and Joachim Metz
-
2012/373 ( PDF )
- Optimal Lower Bound for Differentially Private Multi-Party Aggregation
- T-H. Hubert Chan and Elaine Shi and Dawn Song
-
2012/372 ( -- withdrawn -- )
- New Preimage Attacks on Hash Modes of AES-256
- Deukjo Hong and Dong-Chan Kim and Daesung Kwon
-
2012/371 ( PDF )
- Simultaneous hashing of multiple messages
- Shay Gueron and Vlad Krasnov
-
2012/370 ( PDF )
- Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
- Renaud Dubois and Aurore Guillevic and Marine Sengelin Le Breton
-
2012/369 ( PDF )
- Factorisation of RSA-704 with CADO-NFS
- Shi Bai and Emmanuel Thomé and Paul Zimmermann
-
2012/368 ( PDF )
- Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs
- Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski and Rabia Shahid and Malik Umar Sharif
-
2012/367 ( PDF )
- On Continual Leakage of Discrete Log Representations
- Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs
-
2012/366 ( PDF )
- Securing Circuits Against Constant-Rate Tampering
- Dana Dachman-Soled and Yael Tauman Kalai
-
2012/365 ( PDF )
- Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy
- Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
-
2012/364 ( PDF )
- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions
- Ivan Damgard and Adriana Lopez-Alt
-
2012/363 ( PDF )
- A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions
- Anne Canteaut and Thomas Fuhr and María Naya-Plasencia and Pascal Paillier and Jean-René Reinhard and Marion Videau
-
2012/362 ( PDF )
- Achieving Constant Round Leakage-Resilient Zero-Knowledge
- Omkant Pandey
-
2012/361 ( PDF )
- Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
- Michele Mosca and Douglas Stebila and Berkant Ustaoglu
-
2012/360 ( PDF )
- Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics
- Céline Blondeau and Benoît Gérard and Kaisa Nyberg
-
2012/359 ( PDF )
- Another look at non-uniformity
- Neal Koblitz and Alfred Menezes
-
2012/358 ( PDF )
- PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --
- Gilles Piret and Thomas Roche and Claude Carlet
-
2012/357 ( PDF )
- Publicly Verifiable Ciphertexts
- Juan Manuel González Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila
-
2012/356 ( PDF )
- Fully Anonymous Attribute Tokens from Lattices
- Jan Camenisch and Gregory Neven and Markus Rückert
-
2012/355 ( PDF )
- Never trust a bunny
- Daniel J. Bernstein and Tanja Lange
-
2012/354 ( PDF )
- Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
- Arno Mittelbach
-
2012/353 ( PDF )
- On Reconfigurable Fabrics and Generic Side-Channel Countermeasures
- Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik
-
2012/352 ( PS PS.GZ PDF )
- On Hashing Graphs
- Ashish Kundu, Elisa Bertino
-
2012/351 ( PDF )
- SipHash: a fast short-input PRF
- Jean-Philippe Aumasson and Daniel J. Bernstein
-
2012/350 ( PDF )
- A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption
- Liangliang Xiao and I-Ling Yen
-
2012/349 ( PDF )
- A Differential Fault Attack on Grain-128a using MACs
- Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
-
2012/348 ( PDF )
- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
- Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Gregory Neven
-
2012/347 ( PDF )
- Algebraic Differential Fault Attacks on LED using a Single Fault Injection
- Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji
-
2012/346 ( PS PS.GZ PDF )
- Edwards model of elliptic curves defined over any fields
- Oumar DIAO and Emmanuel FOUOTSA
-
2012/345 ( PDF )
- Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$
- Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi
-
2012/344 ( PDF )
- Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code
- Masao KASAHARA
-
2012/343 ( PDF )
- High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions
- Tamas Gyorfi and Octavian Cret and Guillaume Hanrot and Nicolas Brisebarre
-
2012/342 ( PDF )
- Enhancing Location Privacy for Electric Vehicles (at the right time)
- Joseph Liu and Man Ho Au and Willy Susilo and Jianying Zhou
-
2012/341 ( PDF )
- From Selective to Full Security: Semi-Generic Transformations in the Standard Model
- Michel Abdalla and Dario Fiore and Vadim Lyubashevsky
-
2012/340 ( PDF )
- Deciding Epistemic and Strategic Properties of Cryptographic Protocols
- Henning Schnoor
-
2012/339 ( PDF )
- Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash
- Adi Shamir and Eldad Zinger
-
2012/338 ( PDF )
- Characterizations on Algebraic Immunity for Multi-Output Boolean Functions
- Xiao Zhong and Mingsheng Wang
-
2012/337 ( PDF )
- Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme
- Sanjay Bhattacherjee and Palash Sarkar
-
2012/336 ( PDF )
- RSA modulus generation in the two-party case
- Gerald Gavin
-
2012/335 ( PDF )
- Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition
- Yu Lou and Huiting Han and Chunming Tang and Maozhi Xu
-
2012/334 ( PDF )
- On the Traceability of Tags in SUAP RFID Authentication Protocols
- Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
-
2012/333 ( PDF )
- On the Feasibility of Extending Oblivious Transfer
- Yehuda Lindell and Hila Zarosim
-
2012/332 ( PDF )
- A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
-
2012/331 ( PDF )
- Homomorphic Authentication Codes for Network Coding
- Zhaohui Tang
-
2012/330 ( PDF )
- A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences
- Xu ZiJie and Xu Ke
-
2012/329 ( PDF )
- An Analysis of ZVP-Attack on ECC Cryptosystems
- Claude Crépeau and Raza Ali Kazmi
-
2012/328 ( PS PS.GZ PDF )
- The Multivariate Probabilistic Encryption Scheme MQQ-ENC
- Danilo Gligoroski and Simona Samardjiska
-
2012/327 ( PDF )
- Security Analysis of RAPP An RFID Authentication Protocol based on Permutation
- Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
-
2012/326 ( PDF )
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Allison Lewko and Brent Waters
-
2012/325 ( PDF )
- A note on generalized bent criteria for Boolean functions
- Sugata Gangopadhyay, Enes Pasalic and Pantelimon Stanica
-
2012/324 ( PDF )
- 3D Hardware Canaries
- Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf
-
2012/323 ( PDF )
- ML Confidential: Machine Learning on Encrypted Data
- Thore Graepel and Kristin Lauter and Michael Naehrig
-
2012/322 ( PDF )
- Revisiting Dedicated and Block Cipher based Hash Functions
- Anupam Pattanayak
-
2012/321 ( PDF )
- DECT Security Analysis
- Erik Tews
-
2012/320 ( PDF )
- The Discrete Logarithm Problem in non-representable rings
- Matan Banin and Boaz Tsaban
-
2012/319 ( PDF )
- Bounds on the Threshold Gap in Secret Sharing and its Applications
- Ignacio Cascudo and Ronald Cramer and Chaoping Xing
-
2012/318 ( PDF )
- Non-uniform cracks in the concrete: the power of free precomputation
- Daniel J. Bernstein and Tanja Lange
-
2012/317 ( PDF )
- A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)
- Markku-Juhani O. Saarinen and Daniel Engels
-
2012/316 ( PDF )
- Computationally Complete Symbolic Attacker in Action
- Gergei Bana and Pedro Adăo and Hideki Sakurada
-
2012/315 ( PDF )
- Using Variance to Analyze Visual Cryptography Schemes
- Teng Guo and Feng Liu and ChuanKun Wu and YoungChang Hou
-
2012/314 ( PDF )
- Generation of Nonlinear Feedback Shift Registers with special-purpose hardware
- Tomasz Rachwalik and Janusz Szmidt and Robert Wicik, and Janusz Zablocki
-
2012/313 ( -- withdrawn -- )
- An anonymous proxy signature scheme without random oracles
- Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
-
2012/312 ( PDF )
- Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
- Debiao He
-
2012/311 ( PDF )
- Tightly Secure Signatures and Public-Key Encryption
- Dennis Hofheinz and Tibor Jager
-
2012/310 ( PDF )
- A mathematical problem for security analysis of hash functions and pseudorandom generators
- Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata
-
2012/309 ( PDF )
- Fast and compact elliptic-curve cryptography
- Mike Hamburg
-
2012/308 ( PDF )
- Verified Security of Redundancy-Free Encryption from Rabin and RSA
- Gilles Barthe and David Pointcheval and Santiago Zanella-Béguelin
-
2012/307 ( PDF )
- Multi-Channel Broadcast Encryption
- Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh
-
2012/306 ( PDF )
- Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
- Marcel Keller and Gert Lćssře Mikkelsen and Andy Rupp
-
2012/305 ( PDF )
- Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography
- Duong Hieu Phan and Viet Cuong Trinh
-
2012/304 ( PDF )
- Actively Secure Two-Party Evaluation of any Quantum Operation
- Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail
-
2012/303 ( PDF )
- On The Distribution of Linear Biases: Three Instructive Examples
- Mohamed Ahmed Abdelraheem and Martin Aagren and Peter Beelen and Gregor Leander
-
2012/302 ( PDF )
- On instance separation in the UC-framework
- István Vajda
-
2012/301 ( PDF )
- A Public Shuffle without Private Permutations
- Myungsun Kim and Jinsu Kim and Jung Hee Cheon
-
2012/300 ( PDF )
- Threshold Implementations of all 3x3 and 4x4 S-boxes
- B. Bilgin and S.Nikova and V.Nikov and V.Rijmen and G.Stütz
-
2012/299 ( PDF )
- Differential Power Analysis on ZUC Algorithm
- TANG Ming, CHENG PingPan ,QIU ZhenLong
-
2012/298 ( PDF )
- Anonymous Credentials Light
- Foteini Baldimtsi and Anna Lysyanskaya
-
2012/297 ( PDF )
- Tamper and Leakage Resilience in the Split-State Model
- Feng-Hao Liu and Anna Lysyanskaya
-
2012/296 ( PDF )
- In the blink of an eye: There goes your AES key
- Sergei Skorobogatov and Christopher Woods
-
2012/295 ( PDF )
- Broadcast-enhanced key predistribution schemes
- Michelle Kendall and Keith M. Martin and Siaw-Lynn Ng and Maura B. Paterson and Douglas R. Stinson
-
2012/294 ( PDF )
- Two grumpy giants and a baby
- Daniel J. Bernstein and Tanja Lange
-
2012/293 ( PDF )
- New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors
- Wei Wei and Chengliang Tian and Xiaoyun Wang
-
2012/292 ( PDF )
- An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle
- Jon Passki and Tom Ritter
-
2012/291 ( PDF )
- Efficient Dynamic Provable Possession of Remote Data via Update Trees
- Yihua Zhang and Marina Blanton
-
2012/290 ( PDF )
- Fully Homomorphic Message Authenticators
- Rosario Gennaro and Daniel Wichs
-
2012/289 ( PS PS.GZ PDF )
- Ring Group Signatures
- Liqun Chen
-
2012/288 ( PDF )
- Fair Exchange of Short Signatures without Trusted Third Party
- Philippe Camacho
-
2012/287 ( PDF )
- Computationally-Fair Group and Identity-Based Key-Exchange
- Andrew C. Yao and Yunlei Zhao
-
2012/286 ( PS PS.GZ PDF )
- Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis
- Sk Subidh Ali and Debdeep Mukhopadhyay
-
2012/285 ( PDF )
- Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
- Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
-
2012/284 ( PDF )
- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
- Fabrice Ben Hamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2012/283 ( PDF )
- Some properties of q-ary functions based on spectral analysis
- Deep Singh and Maheshanand Bhaintwal
-
2012/282 ( PDF )
- ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY
- Md. Iftekhar Salam and Hoon-Jae Lee
-
2012/281 ( PDF )
- Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications
- Dario Fiore and Rosario Gennaro
-
2012/280 ( PDF )
- Improved ``Partial Sums"-based Square Attack on AES
- Michael Tunstall
-
2012/279 ( PDF )
- Concurrent Zero Knowledge in the Bounded Player Model
- Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti
-
2012/278 ( PS PS.GZ PDF )
- Improved Indifferentiability Security Bound for the JH Mode
- Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
-
2012/277 ( PS PS.GZ PDF )
- Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil
- Rkia Aouinatou (1) Mostafa Belkasmi (2)
-
2012/276 ( PDF )
- Official Arbitration with Secure Cloud Storage Application
- Alptekin Küpçü
-
2012/275 ( PDF )
- Implementing BLAKE with AVX, AVX2, and XOP
- Samuel Neves and Jean-Philippe Aumasson
-
2012/274 ( PDF )
- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
- Aleksandar Kircanski and Amr M. Youssef
-
2012/273 ( PDF )
- Public-Key Cryptography from New Multivariate Quadratic Assumptions
- Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang
-
2012/272 ( PS PS.GZ PDF )
- Passive Corruption in Statistical Multi-Party Computation
- Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub
-
2012/271 ( -- withdrawn -- )
- Homomorphic Signature for Identity Authentication in Cloud Computing
- Zhiwei Wang, Guozi Sun and Danwei Chen
-
2012/270 ( PDF )
- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings
- Enrico Thomae
-
2012/269 ( PDF )
- Quantifying Side-Channel Information Leakage from Web Applications
- Luke Mather and Elisabeth Oswald
-
2012/268 ( PDF )
- On a CCA2-secure variant of McEliece in the standard model
- Edoardo Persichetti
-
2012/267 ( PDF )
- Self-pairings on Hyperelliptic Curves
- Steven D. Galbraith and Chang-An Zhao
-
2012/266 ( PDF )
- Compilation Techniques for Efficient Encrypted Computation
- Christopher Fletcher and Marten van Dijk and Srinivas Devadas
-
2012/265 ( PDF )
- Foundations of Garbled Circuits
- Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
-
2012/264 ( PDF )
- On the (In)Security of IDEA in Various Hashing Modes
- Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang
-
2012/263 ( PDF )
- One-way Functions from Chebyshev Polynomials
- Kai-Yuen Cheong
-
2012/262 ( PDF )
- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
- I. Damgard and M. Keller and E. Larraia and C. Miles and N.P. Smart
-
2012/261 ( PDF )
- Dual Form Signatures: An Approach for Proving Security from Static Assumptions
- Michael Gerbush and Allison Lewko and Adam O'Neill and Brent Waters
-
2012/260 ( PDF )
- Transposition of AES Key Schedule
- Jialin Huang, Xuejia Lai
-
2012/259 ( PDF )
- A Novel Strong Designated Verifier Signature Scheme without Random Oracles
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
-
2012/258 ( PDF )
- Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols
- José Bacelar Almeida and Manuel Barbosa and Endre Bangerter and Gilles Barthe and Stephan Krenn and Santiago Zanella Béguelin
-
2012/257 ( -- withdrawn -- )
- The Transformation from the Galois NLFSR to the Fibonacci Configuration
- Lin Zhiqiang
-
2012/256 ( PDF )
- The myth of generic DPA...and the magic of learning
- Carolyn Whitnall and Elisabeth Oswald and François-Xavier Standaert
-
2012/255 ( PDF )
- How to Garble Arithmetic Circuits
- Benny Applebaum and Yuval Ishai and Eyal Kushilevitz
-
2012/254 ( PDF )
- FastPRP: Fast Pseudo-Random Permutations for Small Domains
- Emil Stefanov and Elaine Shi
-
2012/253 ( PDF )
- Cryptanalysis of pairing-free certificateless authenticated key agreement protocol
- Zhian Zhu
-
2012/252 ( PDF )
- Fair Private Set Intersection with a Semi-trusted Arbiter
- Changyu Dong and Liqun Chen and Jan Camenisch and Giovanni Russello
-
2012/251 ( PDF )
- The Linux Pseudorandom Number Generator Revisited
- Patrick Lacharme and Andrea Röck and Vincent Strubel and Marion Videau
-
2012/250 ( PDF )
- New Identity Based Encryption And Its Proxy Re-encryption
- Xu An Wang and Xiaoyuan Yang
-
2012/249 ( PDF )
- Binary and q-ary Tardos codes, revisited
- Boris Skoric and Jan-Jaap Oosterwijk
-
2012/248 ( PDF )
- Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
- Ghassan O. Karame and Elli Androulaki and Srdjan Capkun
-
2012/247 ( PDF )
- On Efficient Pairings on Elliptic Curves over Extension Fields
- Xusheng Zhang and Kunpeng Wang and Dongdai Lin
-
2012/246 ( PDF )
- A Secret Sharing Scheme Based on Group Presentations and the Word Problem
- Maggie Habeeb and Delaram Kahrobaei and Vladimir Shpilrain
-
2012/245 ( PDF )
- On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes
- Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen
-
2012/244 ( PDF )
- Cryptography from tensor problems
- Leonard J. Schulman
-
2012/243 ( PDF )
- COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES
- MYUNGSUN KIM and JIHYE KIM and AND JUNG HEE CHEON
-
2012/242 ( PDF )
- Less is More: Relaxed yet Composable Security Notions for Key Exchange
- C. Brzuska and M. Fischlin and N.P. Smart and B. Warinschi and S. Williams
-
2012/241 ( PDF )
- Key distribution system and attribute-based encryption
- Masahiro Yagisawa
-
2012/240 ( PDF )
- Field Switching in BGV-Style Homomorphic Encryption
- Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart
-
2012/239 ( PDF )
- Zero-Knowledge for Multivariate Polynomials
- Valerie Nachef and Jacques Patarin and Emmanuel Volte
-
2012/238 ( PDF )
- The Boomerang Attacks on the Round-Reduced Skein-512
- Hongbo Yu and Jiazhe Chen and XIaoyun Wang
-
2012/237 ( PS PS.GZ PDF )
- In the point of view security, An efficient scheme in IBE with random oracle
- Rkia Aouinatou1, Mostafa Belkasmi2
-
2012/236 ( PDF )
- On Necessary and Sufficient Conditions for Private Ballot Submission
- D. Bernhard and O. Pereira and B. Warinschi
-
2012/235 ( PDF )
- Ring-LWE in Polynomial Rings
- Leo Ducas and Alain Durmus
-
2012/234 ( PDF )
- SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
- Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
-
2012/233 ( PDF )
- A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis
- Qi Chai and Guang Gong
-
2012/232 ( PDF )
- Implementing Pairings at the 192-bit Security Level
- Diego F. Aranha and Laura Fuentes-Castańeda and Edward Knapp and Alfred Menezes and Francisco Rodríguez-Henríquez
-
2012/231 ( PDF )
- A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT
- Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin and Pengwei Wang
-
2012/230 ( PDF )
- On Ideal Lattices and Learning with Errors Over Rings
- Vadim Lyubashevsky and Chris Peikert and Oded Regev
-
2012/229 ( PDF )
- Languages with Efficient Zero-Knowledge PCP's are in SZK
- Mohammad Mahmoody and David Xiao
-
2012/228 ( PDF )
- Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
- Marten van Dijk and Ulrich Rührmair
-
2012/227 ( -- withdrawn -- )
- Secure password-based remote user authentication scheme with non-tamper resistant smart cards
- Ding Wang and Chun-guang Ma and Peng Wu
-
2012/226 ( PDF )
- ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
- Sarah Meiklejohn and C. Chris Erway and Alptekin Küpçü and Theodora Hinkle and Anna Lysyanskaya
-
2012/225 ( PDF )
- When Homomorphism Becomes a Liability
- Zvika Brakerski
-
2012/224 ( PDF )
- Shorter IBE and Signatures via Asymmetric Pairings
- Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee
-
2012/223 ( PDF )
- A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes
- Enrico Thomae
-
2012/222 ( PDF )
- A secret sharing scheme of prime numbers based on hardness of factorization
- Kai-Yuen Cheong
-
2012/221 ( PDF )
- Almost-Everywhere Secure Computation with Edge Corruptions
- Nishanth Chandran and Juan Garay and Rafail Ostrovsky
-
2012/220 ( PDF )
- Hedged Public-key Encryption: How to Protect against Bad Randomness
- Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek
-
2012/219 ( PDF )
- Private Fingerprint Matching
- Siamak F. Shahandashti and Reihaneh Safavi-Naini and Philip Ogunbona
-
2012/218 ( PDF )
- Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
- T-H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu
-
2012/217 ( PDF )
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2012/216 ( PDF )
- Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
- Duong-Hieu Phan and David Pointcheval and Siamak F. Shahandashti and Mario Strefler
-
2012/215 ( PDF )
- Quadratic Span Programs and Succinct NIZKs without PCPs
- Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova
-
2012/214 ( PDF )
- Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version)
- Shengbao Wu and Mingsheng Wang
-
2012/213 ( PDF )
- Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
- Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
-
2012/212 ( PDF )
- Perfect Algebraic Immune Functions
- Meicheng Liu and Yin Zhang and Dongdai Lin
-
2012/211 ( PDF )
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama
-
2012/210 ( PDF )
- On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks
- Yusong Du, and Fangguo Zhang
-
2012/209 ( PS PS.GZ PDF )
- Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications
- Donghoon Chang and Moti Yung
-
2012/208 ( PDF )
- A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER
- Jay Shah and Ayan Mahalanobis
-
2012/207 ( -- withdrawn -- )
- Cryptanalysis of Hummingbird-2
- Kai Zhang, Lin Ding and Jie Guan
-
2012/206 ( PDF )
- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version)
- Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou
-
2012/205 ( PDF )
- Information-flow control for programming on encrypted data
- J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman
-
2012/204 ( PDF )
- Unique Group Signatures
- Matthew Franklin and Haibin Zhang
-
2012/203 ( PDF )
- Robust biometric-based user authentication scheme for wireless sensor networks
- Debiao He
-
2012/202 ( PDF )
- Secure Similarity Coefficients Computation with Malicious Adversaries
- Bo Zhang and Fangguo Zhang
-
2012/201 ( PDF )
- Comment an Anonymous Multi-receiver Identity-based Encryption Scheme
- J.H.Zhang, Y.B.Cui
-
2012/200 ( PDF )
- Aggregate Signcryption
- Alexander W. Dent
-
2012/199 ( PDF )
- Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm
- Jean-Charles Faugčre and Pierrick Gaudry and Louise Huot and Guénaël Renault
-
2012/198 ( PDF )
- Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
- Jae Hong Seo and Jung Hee Cheon
-
2012/197 ( PDF )
- On The Security of One-Witness Blind Signature Schemes
- Foteini Baldimtsi and Anna Lysyanskaya
-
2012/196 ( PDF )
- Multi-Instance Security and its Application to Password-Based Cryptography
- Mihir Bellare and Thomas Ristenpart and Stefano Tessaro
-
2012/195 ( PDF )
- The BlueJay Ultra-Lightweight Hybrid Cryptosystem
- Markku-Juhani O. Saarinen
-
2012/194 ( PDF )
- A Multivariate based Threshold Ring Signature Scheme
- Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
-
2012/193 ( PDF )
- An Efficient Homomorphic Encryption Protocol for Multi-User Systems
- Liangliang Xiao and Osbert Bastani and I-Ling Yen
-
2012/192 ( PDF )
- Extending Order Preserving Encryption for Multi-User Systems
- Liangliang Xiao and I-Ling Yen and Dung T. Huynh
-
2012/191 ( PDF )
- Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes
- Liangliang Xiao and I-Ling Yen
-
2012/190 ( PDF )
- On the Security of an Improved Password Authentication Scheme Based on ECC
- Ding Wang and Chun-guang Ma
-
2012/189 ( PDF )
- Universally Composable Key-Management
- Steve Kremer and Robert Künnemann and Graham Steel
-
2012/188 ( PS PS.GZ PDF )
- Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification
- Xin Li
-
2012/187 ( PDF )
- SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)
- Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann
-
2012/186 ( PDF )
- Third-order nonlinearities of some biquadratic monomial Boolean functions
- Brajesh Kumar Singh
-
2012/185 ( PDF )
- Replay attacks that violate ballot secrecy in Helios
- Ben Smyth
-
2012/184 ( PDF )
- Asymptotic fingerprinting capacity in the Combined Digit Model
- Dion Boesten and Boris Skoric
-
2012/183 ( PDF )
- Differentially Private Smart Metering with Battery Recharging
- Michael Backes and Sebastian Meiser
-
2012/182 ( PDF )
- How to Construct Quantum Random Functions
- Mark Zhandry
-
2012/181 ( PDF )
- A Modular Framework for Multi-Factor Authentication and Key Exchange
- Nils Fleischhacker and Mark Manulis and Amir Azodi
-
2012/180 ( PDF )
- Yet Another SHA-3 Round 3 FPGA Results Paper
- Brian Baldwin and William P. Marnane
-
2012/179 ( PDF )
- Billion-Gate Secure Computation with Malicious Adversaries
- Benjamin Kreuter and abhi shelat and Chih-hao Shen
-
2012/178 ( PDF )
- Eperio: Mitigating Technical Complexity in Cryptographic Election Verification
- Aleksander Essex and Jeremy Clark and Urs Hengartner and Carlisle Adams
-
2012/177 ( PDF )
- Everlasting Multi-Party Computation
- Unruh, Dominique
-
2012/176 ( PS PS.GZ PDF )
- Improvements of Algebraic Attacks Based on Structured Gaussian Elimination
- Satrajit Ghosh and Abhijit Das
-
2012/175 ( PDF )
- Optimal First-Order Masking with Linear and Non-Linear Bijections
- Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY and Jean-Luc DANGER
-
2012/174 ( PDF )
- Zero Knowledge with Rubik's Cubes and Non-Abelian Groups
- Emmanuel VOLTE and Jacques PATARIN and Valérie NACHEF
-
2012/173 ( PS PS.GZ PDF )
- Automatically Verified Mechanized Proof of One-Encryption Key Exchange
- Bruno Blanchet
-
2012/172 ( PDF )
- Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
- Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz
-
2012/171 ( PS PS.GZ PDF )
- Quantum Money from Hidden Subspaces
- Scott Aaronson and Paul Christiano
-
2012/170 ( PDF )
- Approaches for the performance increasing of software implementation of integer multiplication in prime fields
- Vladislav Kovtun and Andrew Okhrimenko
-
2012/169 ( PDF )
- Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers
- Xiaopei Guo, Kejian Xu, Tongsen Sun and Xiubin Fan
-
2012/168 ( PDF )
- A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes
- Valérie Gauthier and Ayoub Otmani and Jean-Pierre Tillich
-
2012/167 ( PDF )
- Pairing-based methods for genus 2 jacobians with maximal endomorphism ring
- Sorina Ionica
-
2012/166 ( PDF )
- A List of Maximum Period NLFSRs
- Elena Dubrova
-
2012/165 ( PDF )
- Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy
- Cristina Onete
-
2012/164 ( PDF )
- On Secure Two-party Integer Division
- Morten Dahl, Chao Ning, Tomas Toft
-
2012/163 ( PDF )
- Differential propagation analysis of Keccak
- Joan Daemen and Gilles Van Assche
-
2012/162 ( PS PS.GZ PDF )
- Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network
- Jayaprakash Kar
-
2012/161 ( PDF )
- New Constructions of Low Correlation Sequences with High Linear Complexity
- Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
-
2012/160 ( -- withdrawn -- )
- New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set
- Hai Xiong, Longjiang Qu, Chao Li
-
2012/159 ( PDF )
- Hybrid Encryption in the Multi-User Setting
- G.M. Zaverucha
-
2012/158 ( PDF )
- Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
- Peter Gazi and Stefano Tessaro
-
2012/157 ( PDF )
- Attack on Fully Homomorphic Encryption over the Integers
- Gu Chunsheng
-
2012/156 ( PDF )
- Fast Embedded Software Hashing
- Dag Arne Osvik
-
2012/155 ( PS PS.GZ PDF )
- Toward Practical Group Encryption
- Laila El Aimani and Marc Joye
-
2012/154 ( PS PS.GZ PDF )
- The Joint Signature and Encryption Revisited
- Laila El Aimani
-
2012/153 ( PDF )
- A Framework for the Cryptographic Verification of Java-like Programs
- Ralf Kuesters and Tomasz Truderung and Juergen Graf
-
2012/152 ( PDF )
- On security of a Certificateless Aggregate Signature Scheme
- Limin Shen, Yinxia Sun
-
2012/151 ( PDF )
- On Boolean Ideals and Varieties with Application to Algebraic Attacks
- Alexander Rostovtsev and Alexey Mizyukin
-
2012/150 ( PDF )
- Circular chosen-ciphertext security with compact ciphertexts
- Dennis Hofheinz
-
2012/149 ( PDF )
- Attacking Scrambled Burrows-Wheeler Transform
- Martin Stanek
-
2012/148 ( PDF )
- Replacing Username/Password with Software-Only Two-Factor Authentication
- Michael Scott
-
2012/147 ( PDF )
- On Security Arguments of the Second Round SHA-3 Candidates
- Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger
-
2012/146 ( PDF )
- On Polynomial Systems Arising from a Weil Descent
- Christophe Petit and Jean-Jacques Quisquater
-
2012/145 ( PDF )
- Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
- Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryou Fujita
-
2012/144 ( PDF )
- Somewhat Practical Fully Homomorphic Encryption
- Junfeng Fan and Frederik Vercauteren
-
2012/143 ( PDF )
- Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
- Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
-
2012/142 ( PDF )
- Identity-Based Encryption with Master Key-Dependent Message Security and Applications
- David Galindo and Javier Herranz and Jorge Villar
-
2012/141 ( PDF )
- Bicliques for permutations: collision and preimage attacks in stronger settings
- Dmitry Khovratovich
-
2012/140 ( PDF )
- Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors
- Selcuk Baktir and Erkay Savas
-
2012/139 ( PDF )
- Formal verication of secure ad-hoc network routing protocols using deductive model-checking
- Ta Vinh Thong
-
2012/138 ( PDF )
- An Improved Differential Attack on Full GOST
- Nicolas T. Courtois
-
2012/137 ( PDF )
- Usable assembly language for GPUs: a success story
- Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
-
2012/136 ( PDF )
- Adaptive Key Protection in Complex Cryptosystems with Attributes
- Zilong Wang and Danfeng (Daphne) Yao and Rongquan Feng
-
2012/135 ( PDF )
- David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token
- Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade
-
2012/134 ( PDF )
- A Digital Signature Scheme for Long-Term Security
- Dimitrios Poulakis and Robert Rolland
-
2012/133 ( PDF )
- Toward Practical Private Access to Data Centers via Parallel ORAM
- Jacob R. Lorch and Bryan Parno and James Mickens and Mariana Raykova and Joshua Schiffman
-
2012/132 ( PDF )
- CFS Software Implementation
- Gregory Landais and Nicolas Sendrier
-
2012/131 ( PDF )
- Composition Theorems for CCA Cryptographic Security
- Rodolphe Lampe and Jacques Patarin
-
2012/130 ( PDF )
- Broadcast (and Round) Efficient Verifiable Secret Sharing
- Juan Garay and Clint Givens and Rafail Ostrovsky and Pavel Raykov
-
2012/129 ( PDF )
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
- Nelly Fazio and Irippuge Milinda Perera
-
2012/128 ( PDF )
- Provably Secure Distance-Bounding: an Analysis of Prominent Protocols
- Marc Fischlin and Cristina Onete
-
2012/127 ( PDF )
- Additive autocorrelation of some classes of cubic semi-bent Boolean functions
- Deep Singh and Maheshanand Bhaintwal
-
2012/126 ( PDF )
- Compact Implementation of Threefish and Skein on FPGA
- Nuray At and Jean-Luc Beuchat and Ismail San
-
2012/125 ( -- withdrawn -- )
- Short and Efficient Expressive Attribute-Based Signature in the Standard Model
- Aijun Ge and Cheng Chen and Chuangui Ma and Zhenfeng Zhang
-
2012/124 ( PS PS.GZ PDF )
- On Securing Communication From Profilers
- Sandra Diaz-Santiago and Debrup Chakraborty
-
2012/123 ( PDF )
- Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-
- A. Dehbaoui and J.M. Dutertre and B. Robisson and P. Orsatelli and P. Maurine and A. Tria
-
2012/122 ( PDF )
- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three
- Reza R. Farashahi and Hongfeng Wu and Chang-An Zhao
-
2012/121 ( PDF )
- An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps
- Mitra Fatemi and Taraneh Eghlidos and Mohammadreza Aref
-
2012/120 ( PDF )
- Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks
- Yongge Wang
-
2012/119 ( PDF )
- Accelerating the Final Exponentiation in the Computation of the Tate Pairings
- Taechan Kim, Sungwook Kim, Jung Hee Cheon
-
2012/118 ( PDF )
- Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks
- S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
-
2012/117 ( PDF )
- Universally Composable Security With Local Adversaries
- Ran Canetti and Margarita Vald
-
2012/116 ( PDF )
- Clash Attacks on the Verifiability of E-Voting Systems
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2012/115 ( PDF )
- Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing
- XU Chun-xiang and HE Xiao-hu and Daniel Abraha
-
2012/114 ( PDF )
- On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives
- Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
-
2012/113 ( PDF )
- On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model
- Bart Mennink
-
2012/112 ( PDF )
- On The Nonlinearity of Maximum-length NFSR Feedbacks
- Meltem Sonmez Turan
-
2012/111 ( PDF )
- On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks
- Yin Zhang and Meicheng Liu and Dongdai Lin
-
2012/110 ( PDF )
- Finding Optimal Formulae for Bilinear Maps
- Razvan Barbulescu and Jérémie Detrey and Nicolas Estibals and Paul Zimmermann
-
2012/109 ( -- withdrawn -- )
- Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model
- Yang Cui and Kirill Morozov
-
2012/108 ( PDF )
- On the Optimality of Lattices for the Coppersmith Technique
- Yoshinori Aono and Manindra Agrawal and Takakazu Satoh and Osamu Watanabe
-
2012/107 ( PDF )
- Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
- Guilin Wang and Jiangshan Yu and Qi Xie
-
2012/106 ( PDF )
- More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents
- Santanu Sarkar and Subhamoy Maitra
-
2012/105 ( PDF )
- Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited
- Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
-
2012/104 ( PDF )
- Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
- Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
-
2012/103 ( PDF )
- FlipIt: The Game of "Stealthy Takeover"
- Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest
-
2012/102 ( PDF )
- On the Circular Security of Bit-Encryption
- Ron Rothblum
-
2012/101 ( -- withdrawn -- )
- Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)>=3"
- Zhihui Ou
-
2012/100 ( PDF )
- Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
- Shahram Khazaei and Björn Terelius and Douglas Wikström
-
2012/099 ( PDF )
- Homomorphic Evaluation of the AES Circuit
- Craig Gentry and Shai Halevi and Nigel P. Smart
-
2012/098 ( PS PS.GZ PDF )
- Combined Attacks on the AES Key Schedule
- François Dassance and Alexandre Venelli
-
2012/097 ( PDF )
- An algorithm for factoring integers
- Yingpu Deng and Yanbin Pan
-
2012/096 ( PDF )
- The Collision Security of MDC-4
- Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel
-
2012/095 ( PDF )
- Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data
- Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer
-
2012/094 ( PDF )
- Algebraic attack on lattice based cryptosystems via solving equations over real numbers.
- Jintai Ding and Dieter Schmidt
-
2012/093 ( PDF )
- Recent Results on Balanced Symmetric Boolean Functions
- Yingming Guo and Guangpu Gao and Yaqun Zhao
-
2012/092 ( PDF )
- Tolerant Algebraic Side-Channel Analysis of {AES}
- Yossef Oren and Avishai Wool
-
2012/091 ( -- withdrawn -- )
- Hardness of decision (R)LWE for any modulus
- Adeline Langlois and Damien Stehle
-
2012/090 ( PDF )
- Worst-Case to Average-Case Reductions for Module Lattices
- Adeline Langlois and Damien Stehle
-
2012/089 ( PDF )
- ECM at Work
- Joppe W. Bos and Thorsten Kleinjung
-
2012/088 ( -- withdrawn -- )
- A Lattice-Based Traitor Tracing Scheme
- San Ling and Damien Stehle
-
2012/087 ( PDF )
- Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms
- Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev
-
2012/086 ( -- withdrawn -- )
- Remarks on- An ideal multi-secret sharing scheme based on MSP
- Zhi-hui Li Jing Li
-
2012/085 ( PDF )
- Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery
- Stanislav Bulygin and Michael Walter
-
2012/084 ( PDF )
- Improved Algebraic Side-Channel Attack on AES
- Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter
-
2012/083 ( PDF )
- Optimally Robust Private Information Retrieval
- Casey Devet and Ian Goldberg and Nadia Heninger
-
2012/082 ( PDF )
- Semi-Supervised Template Attack
- Liran Lerman and Stephane Fernandes Medeiros and Nikita Veshchikov and Cedric Meuter and Gianluca Bontempi and Olivier Markowitch
-
2012/081 ( PDF )
- Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification
- Michael Backes and Fabian Bendun and Dominique Unruh
-
2012/080 ( PDF )
- Strongly Unforgeable Proxy Re-Signatures in the Standard Model
- S. Sree Vivek and S. Sharmila Deva Selvi and Guhan Balasubramanian and C. Pandu Rangan
-
2012/079 ( PDF )
- Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
- Masao KASAHARA
-
2012/078 ( PDF )
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Zvika Brakerski
-
2012/077 ( PDF )
- MAGNITUDE SQUARED COHERENCE BASED SCA
- Sebastien Tiran and Amine Dehbaoui and Philippe Maurine
-
2012/076 ( PDF )
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- Mark Zhandry
-
2012/075 ( PDF )
- Efficient identity-based threshold decryption scheme from bilinear pairings
- Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang and Guoyan Zhang
-
2012/074 ( PDF )
- Another look at HMAC
- Neal Koblitz and Alfred Menezes
-
2012/073 ( PDF )
- Efficient identity-based threshold signature scheme from bilinear pairings in the standard model
- Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
-
2012/072 ( PDF )
- Particularly Friendly Members of Family Trees
- Craig Costello
-
2012/071 ( PDF )
- Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems
- Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer
-
2012/070 ( PDF )
- Finding ECM-Friendly Curves through a Study of Galois Properties
- Razvan Barbulescu and Joppe W. Bos and Cyril Bouvier and Thorsten Kleinjung and Peter L. Montgomery
-
2012/069 ( PDF )
- Automatic Search of Attacks on round-reduced AES and Applications
- Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque
-
2012/068 ( PDF )
- Extended Security Arguments for (Ring) Signature Schemes
- Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, and Pierre-Louis Cayrel
-
2012/067 ( PDF )
- Parallelizing message schedules to accelerate the computations of hash functions
- Shay Gueron, Vlad Krasnov
-
2012/066 ( PDF )
- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
- Jiqiang Lu and Wen-She Yap and Yongzhuang Wei
-
2012/065 ( PDF )
- Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha”
- Tsukasa Ishiguro
-
2012/064 ( PDF )
- Ron was wrong, Whit is right
- Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter
-
2012/063 ( PDF )
- Randomized Partial Checking Revisited
- Shahram Khazaei and Douglas Wikström
-
2012/062 ( -- withdrawn -- )
- On the Security of Attribute Based Signature Schemes
- S Sharmila Deva Selvi and Subhashini Venugopalan and C. Pandu Rangan
-
2012/061 ( PDF )
- A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
-
2012/060 ( PDF )
- Improved Security for Linearly Homomorphic Signatures: A Generic Framework
- David Mandell Freeman
-
2012/059 ( PDF )
- Message Authentication, Revisited
- Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs
-
2012/058 ( PS PS.GZ PDF )
- Key recycling in authentication
- Christopher Portmann
-
2012/057 ( PDF )
- Anonymous Constant-Size Ciphertext HIBE From Asymmetric Pairings
- Somindu C. Ramanna and Palash Sarkar
-
2012/056 ( PDF )
- A New Pseudorandom Generator from Collision-Resistant Hash Functions
- Alexandra Boldyreva and Virendra Kumar
-
2012/055 ( -- withdrawn -- )
- Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks
- Hongbin Tang and Xinsong Liu
-
2012/054 ( PDF )
- On the performance of certain Private Set Intersection protocols
- Emiliano De Cristofaro and Gene Tsudik
-
2012/053 ( PS PS.GZ PDF )
- Beating Shannon requires BOTH efficient adversaries AND non-zero advantage
- Yevgeniy Dodis
-
2012/052 ( PDF )
- Identity-based Encryption with Efficient Revocation
- Alexandra Boldyreva and Vipul Goyal and Virendra Kumar
-
2012/051 ( PDF )
- Eavesdropping on Satellite Telecommunication Systems
- Benedikt Driessen
-
2012/050 ( PDF )
- Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture
- Jeremy Constantin and Andreas Burg and Frank K. Gurkaynak
-
2012/049 ( PDF )
- 2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160
- Yu Sasaki and Lei Wang
-
2012/048 ( PDF )
- Designing Integrated Accelerator for Stream Ciphers with Structural Similarities
- Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid
-
2012/047 ( PDF )
- Incremental Deterministic Public-Key Encryption
- Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev
-
2012/046 ( PDF )
- Modifying Boolean Functions to Ensure Maximum Algebraic Immunity
- Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis
-
2012/045 ( PDF )
- Signature Schemes Secure against Hard-to-Invert Leakage
- Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel
-
2012/044 ( PDF )
- PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems
- Jun Zhou, Zhenfu Cao
-
2012/043 ( PDF )
- A novel Group Key Transfer Protocol
- Chingfang Hsu and Bing Zeng and Qi Cheng and Guohua Cui
-
2012/042 ( PDF )
- Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing
- Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi
-
2012/041 ( -- withdrawn -- )
- A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION
- Norziana Jamil and Ramlan Mahmood and Muhammad Reza Z'aba and Nur Izura Udzir and Zuriati Ahmad Zukarnaen
-
2012/040 ( PDF )
- Single-block collision attack on MD5
- Marc Stevens
-
2012/039 ( PDF )
- Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol
- Feng Hao and Dylan Clarke
-
2012/038 ( PDF )
- Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure
- François Durvaux and Mathieu Renauld and François-Xavier Standaert and Loic van Oldeneel tot Oldenzeel and Nicolas Veyrat-Charvillon
-
2012/037 ( PDF )
- Some results on $q$-ary bent functions
- Deep Singh, Maheshanand Bhaintwal and Brajesh Kumar Singh
-
2012/036 ( PS PS.GZ PDF )
- Efficient Leakage-free Authentication of Trees, Graphs and Forests
- Ashish Kundu, Mikhail Atallah, Elisa Bertino
-
2012/035 ( PDF )
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
-
2012/034 ( PDF )
- Automatic Quantification of Cache Side-Channels
- Boris Köpf and Laurent Mauborgne and Martin Ochoa
-
2012/033 ( PDF )
- A note on hyper-bent functions via Dillon-like exponents
- Sihem Mesnager and Jean-Pierre Flori
-
2012/032 ( PS PS.GZ PDF )
- Counterexamples to Hardness Amplification Beyond Negligible
- Yevgeniy Dodis and Abhishek Jain and Tal Moran and Daniel Wichs
-
2012/031 ( PDF )
- An error in "On a new formal proof model for RFID location privacy"
- Da-Zhi Sun
-
2012/030 ( PDF )
- Fault Analysis of the KATAN Family of Block Ciphers
- Shekh Faisal Abdul-Latip and Mohammad Reza Reyhanitabar and Willy Susilo and Jennifer Seberry
-
2012/029 ( PDF )
- On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
- Yannick Seurin
-
2012/028 ( PDF )
- A First-Order Leak-Free Masking Countermeasure
- Houssem MAGHREBI and Emmanuel PROUFF and Sylvain GUILLEY and Jean-Luc DANGER
-
2012/027 ( -- withdrawn -- )
- Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack
- Ali Mackvandi and Maryam Saeed and Mansour Naddafiun
-
2012/026 ( PS PS.GZ PDF )
- Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding
- Anja Becker and Antoine Joux and Alexander May and Alexander Meurer
-
2012/025 ( PDF )
- A new remote data integrity checking scheme for cloud storage
- Xiangtao Yan and Yifa Li
-
2012/024 ( PS PS.GZ PDF )
- Variants of Waters' Dual-System Primitives Using Asymmetric Pairings
- Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar
-
2012/023 ( PS PS.GZ PDF )
- On the security of Lo et al.’s ownership transfer protocol
- Masoumeh Safkhani and Nasour Bagheri and Majid Naderi and Ali Mahani
-
2012/022 ( PS PS.GZ PDF )
- Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity
- Mihir Bellare and Stefano Tessaro
-
2012/021 ( -- withdrawn -- )
- Security Analysis of J-PAKE
- Mohsen Toorani
-
2012/020 ( PDF )
- Dickson polynomials, hyperelliptic curves and hyper-bent functions
- Jean-Pierre Flori and Sihem Mesnager
-
2012/019 ( PDF )
- Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
- Gergei Bana and Hubert Comon-Lundh
-
2012/018 ( PDF )
- Attacks and Security Proofs of EAX-Prime
- Kazuhiko Minematsu and Stefan Lucks and Hiraku Morita and Tetsu Iwata
-
2012/017 ( PDF )
- Secondary constructions on generalized bent functions
- Brajesh Kumar Singh
-
2012/016 ( -- withdrawn -- )
- Efficient Mix-Net Verication by Proofs of Random Blocks
- Denise Demirel and Melanie Volkamer and Hugo Jonker
-
2012/015 ( PS PS.GZ PDF )
- A Cryptographic Treatment of the Wiretap Channel
- Mihir Bellare and Stefano Tessaro and Alexander Vardy
-
2012/014 ( PDF )
- Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
- Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
-
2012/013 ( -- withdrawn -- )
- Higher Order Algebraic Attacks on Stream Ciphers
- Qichun Wang and Thomas Johansson
-
2012/012 ( PDF )
- Malleable Proof Systems and Applications
- Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
-
2012/011 ( PDF )
- Biclique Attack of the Full ARIA-256
- Shao-zhen Chen Tian-min Xu
-
2012/010 ( PDF )
- PayTree: "Amortized Signature" for Flexible Micro-Payments
- Charanjit Jutla and Moti Yung
-
2012/009 ( PDF )
- On the Indifferentiability of the Integrated-Key Hash Functions
- Saif Al-Kuwari
-
2012/008 ( PDF )
- Security proof with dishonest keys
- Hubert Comon-Lundh and Véronique Cortier and Guillaume Scerri
-
2012/007 ( PDF )
- Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures
- Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
-
2012/006 ( PDF )
- Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
- Susan Hohenberger and Allison Lewko and Brent Waters
-
2012/005 ( PDF )
- A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
- Benjamin Fuller and Adam O'Neill and Leonid Reyzin
-
2012/004 ( PDF )
- The new SHA-3 software shootout
- Daniel J. Bernstein and Tanja Lange
-
2012/003 ( PDF )
- On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
- Qun-Xiong Zheng, Wen-Feng Qi and Tian Tian
-
2012/002 ( PDF )
- ECC2K-130 on NVIDIA GPUs
- Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
-
2012/001 ( PDF )
- Digital Signatures from Challenge-Divided Sigma-Protocols
- Andrew C. Yao and Yunlei Zhao
-
2011/714 ( PDF )
- Position-Verification in Multi-Channel Models
- Huajun Zhang and Zongyang Zhang and Zhenfu Cao
-
2011/713 ( PDF )
- A server-aided verification signature scheme without random oracles
- Bin Wang and Qing Zhao
-
2011/712 ( PDF )
- Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
- Johann Großschädl and Dan Page and Stefan Tillich
-
2011/711 ( PDF )
- Evolutionary Construction of de Bruijn Sequences
- Meltem Sonmez Turan
-
2011/710 ( PDF )
- Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
- Alex Biryukov and Johann Großschädl
-
2011/709 ( PDF )
- Fault Attack against Miller's algorithm
- Nadia El Mrabet
-
2011/708 ( PDF )
- Computational Extractors and Pseudorandomness
- Dana Dachman-Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin
-
2011/707 ( PS PS.GZ PDF )
- Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF
- Alex Biryukov and Ilya Kizhvatov and Bin Zhang
-
2011/706 ( PDF )
- Improved Side Channel Attacks on Pairing Based Cryptography
- Johannes Blömer and Peter Günther and Gennadij Liske
-
2011/705 ( PDF )
- Differential Attacks on Generalized Feistel Schemes
- Valerie Nachef and Emmanuel Volte and Jacques Patarin
-
2011/704 ( PS PS.GZ PDF )
- Security Analysis of a PUF based RFID Authentication Protocol
- Masoumeh Safkhani and Nasour Bagheri and Majid Naderi
-
2011/703 ( PDF )
- Waters Signatures with Optimal Security Reduction
- Dennis Hofheinz and Tibor Jager and Edward Knapp
-
2011/702 ( PDF )
- Comments of an efficient and secure multi-server authentication scheme with key agreement
- Yitao Chen
-
2011/701 ( PDF )
- Decentralized Attribute-Based Signatures
- Tatsuaki Okamoto and Katsuyuki Takashima
-
2011/700 ( PDF )
- Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
- Tatsuaki Okamoto and Katsuyuki Takashima
-
2011/699 ( -- withdrawn -- )
- Public-Key Encryption with Cluster-Chain-based Keyword Search
- Peng Xu and Hai Jin and Wei Wang and Deqing Zou
-
2011/698 ( PDF )
- A generalization of the class of hyper-bent Boolean functions in binomial forms
- Chunming Tang, Yu Lou, Yanfeng Qi, Baocheng Wang, Yixian Yang
-
2011/697 ( PDF )
- SPONGENT: The Design Space of Lightweight Cryptographic Hashing
- Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
-
2011/696 ( PDF )
- Efficient Network Coding Signatures in the Standard Model
- Dario Catalano and Dario Fiore and Bogdan Warinschi
-
2011/695 ( PDF )
- Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
- S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
-
2011/694 ( PDF )
- Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation
- Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng
-
2011/693 ( PDF )
- A non-interactive deniable authentication scheme in the standard model
- Bin Wang ,Qing Zhao and Ke Dai
-
2011/692 ( PDF )
- Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions
- Cheng Chen and Zhenfeng Zhang and Dengguo Feng
-
2011/691 ( PDF )
- Yet Another Ultralightweight Authentication Protocol that is Broken
- Gildas Avoine and Xavier Carpent
-
2011/690 ( PDF )
- A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation
- Masao KASAHARA
-
2011/689 ( -- withdrawn -- )
- (Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
- Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong-Sheng Zhou
-
2011/688 ( PDF )
- Authenticated Key Exchange under Bad Randomness
- Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang
-
2011/687 ( PDF )
- Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption)
- Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld
-
2011/686 ( PDF )
- Analysis of some natural variants of the PKP Algorithm
- Rodolphe LAMPE and Jacques PATARIN
-
2011/685 ( PDF )
- Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function
- Roman Oliynykov
-
2011/684 ( PS PS.GZ PDF )
- Identification Based Encryption with RSA-OAEP. Using SEM and Without
- Rkia Aouinatou, Mostafa Belkasmi
-
2011/683 ( PDF )
- Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems
- Falko Strenzke
-
2011/682 ( PDF )
- UC framework for anonymous communication
- István Vajda
-
2011/681 ( PDF )
- Physically Uncloneable Functions in the Universal Composition Framework
- Christina Brzuska and Marc Fischlin and Heike Schröder and Stefan Katzenbeisser
-
2011/680 ( PDF )
- Better Bootstrapping in Fully Homomorphic Encryption
- Craig Gentry and Shai Halevi and Nigel P. Smart
-
2011/679 ( PDF )
- CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
- Junaid Jameel Ahmad and Shujun Li and Ahmad-Reza Sadeghi and Thomas Schneider
-
2011/678 ( PDF )
- On definitions of selective opening security
- Florian Böhl and Dennis Hofheinz and Daniel Kraschewski
-
2011/677 ( PDF )
- CommitCoin: Carbon Dating Commitments with Bitcoin
- Jeremy Clark and Aleksander Essex
-
2011/676 ( PDF )
- Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
- Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie
-
2011/675 ( PDF )
- Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
- Nico Döttling and Thilo Mie and Jörn Müller-Quade and Tobias Nilges
-
2011/674 ( PDF )
- Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval
- Colleen M. Swanson and Douglas R. Stinson
-
2011/673 ( PDF )
- Pseudorandom Signatures
- Nils Fleischhacker and Felix Günther and Franziskus Kiefer and Mark Manulis and Bertram Poettering
-
2011/672 ( PDF )
- Fast and Secure Root Finding for Code-based Cryptosystems
- Falko Strenzke
-
2011/671 ( PDF )
- Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
- Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li and Ying Man
-
2011/670 ( PDF )
- SHA-3 on ARM11 processors
- Peter Schwabe and Bo-Yin Yang and Shang-Yi Yang
-
2011/669 ( PDF )
- Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields
- Christopher Wolf and Enrico Thomae
-
2011/668 ( PDF )
- Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
- Piotr K. Tysowski and M. Anwarul Hasan
-
2011/667 ( -- withdrawn -- )
- An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
- Suleyman Kardas and Atakan Arslan and Serkan Celik and Albert Levi
-
2011/666 ( PDF )
- A Gross-Zagier formula for quaternion algebras over totally real fields
- Eyal Z. Goren and Kristin E. Lauter
-
2011/665 ( PDF )
- Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection
- Jothi Rangasamy \and Douglas Stebila \and Lakshmi Kuppusamy \and Colin Boyd \and Juan Gonzalez Nieto
-
2011/664 ( PDF )
- On the Security of ID Based Signcryption Schemes
- S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan
-
2011/663 ( PDF )
- Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption
- Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
-
2011/662 ( PDF )
- Deploying secure multi-party computation for financial data analysis
- Dan Bogdanov and Riivo Talviste and Jan Willemson
-
2011/661 ( PS PS.GZ PDF )
- New Impossible Differential Attacks on Camellia
- Dongxia Bai and Leibo Li
-
2011/660 ( PDF )
- Program Obfuscation with Leaky Hardware
- Nir Bitansky and Ran Canetti and Shafi Goldwasser and Shai Halevi and Yael Tauman Kalai and Guy N. Rothblum
-
2011/659 ( PDF )
- Formally Assessing Cryptographic Entropy
- Daniel R. L. Brown
-
2011/658 ( PDF )
- Anonymous attestation with user-controlled linkability
- D. Bernhard and G. Fuchsbauer and E. Ghadafi and N.P. Smart and B. Warinschi
-
2011/657 ( PDF )
- A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions
- Abhranil Maiti and Vikash Gunreddy and Patrick Schaumont
-
2011/656 ( PDF )
- Use Data-depend Function Build Message Expansion Function
- ZiJie Xu and Ke Xu
-
2011/655 ( PDF )
- Privacy-Preserving Stream Aggregation with Fault Tolerance
- T-H. Hubert Chan, Elaine Shi and Dawn Song
-
2011/654 ( PDF )
- Elliptic Curve Cryptography in JavaScript
- Laurie Haustenne and Quentin De Neyer and Olivier Pereira
-
2011/653 ( -- withdrawn -- )
- An Improved Certificateless Authenticated Key Agreement Protocol
- Haomin Yang and Yaoxue Zhang and Yuezhi Zhou
-
2011/652 ( PDF )
- Security Enhancement of the Vortex Family of Hash Functions
- Shay Gueron and Michael Kounavis
-
2011/651 ( PDF )
- CHECKER: On-site checking in RFID-based supply chains
- Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
-
2011/650 ( PDF )
- Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
- Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang
-
2011/649 ( PDF )
- On the Security of NMAC and Its Variants
- Fanbao Liu and Changxiang Shen and Tao Xie and Dengguo Feng
-
2011/648 ( PDF )
- Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
- Tatsuaki Okamoto and Katsuyuki Takashima
-
2011/647 ( PDF )
- Breaking $H^2$-MAC Using Birthday Paradox
- Fanbao Liu and Tao Xie and Changxiang Shen
-
2011/646 ( PDF )
- The security impact of a new cryptographic library
- Daniel J. Bernstein and Tanja Lange and Peter Schwabe
-
2011/645 ( PDF )
- Fully Homomorphic Encryption Based on Approximate Matrix GCD
- Gu Chunsheng
-
2011/644 ( PDF )
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel
-
2011/643 ( PDF )
- Some Words About Cryptographic Key Recognition In Data Streams
- Alexey Chilikov and Evgeny Alekseev
-
2011/642 ( PDF )
- Constructing differentially 4-uniform permutations over $\mbf_{2^{2m}}$ from quadratic APN permutations over $\mbf_{2^{2m+1}}$
- Yongqiang Li and Mingsheng Wang
-
2011/641 ( PDF )
- Collision for 75-step SHA-1: Intensive Parallelization with GPU
- E.A. Grechnikov and A.V. Adinetz
-
2011/640 ( PDF )
- Hummingbird: Privacy at the time of Twitter
- Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams
-
2011/639 ( PS PS.GZ PDF )
- Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks
- Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla
-
2011/638 ( PDF )
- Rubik's for cryptographers
- Christophe Petit and Jean-Jacques Quisquater
-
2011/637 ( PDF )
- Random Number Generation Based on Oscillatory Metastability in Ring Circuits
- Laszlo Hars
-
2011/636 ( -- withdrawn -- )
- Untangling RFID Privacy Models
- Iwen Coisel and Tania Martin
-
2011/635 ( PDF )
- Groestl Tweaks and their Effect on FPGA Results
- Marcin Rogawski and Kris Gaj
-
2011/634 ( PDF )
- Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
- Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat1
-
2011/633 ( PDF )
- Practical realisation and elimination of an ECC-related software bug attack
- B.B. Brumley and M. Barbosa and D. Page and F. Vercauteren
-
2011/632 ( PDF )
- A Scalable Method for Constructing Galois NLFSRs with Period $2^n-1$ using Cross-Join Pairs
- Elena Dubrova
-
2011/631 ( PDF )
- Cheating Human Vision in Visual Secret Sharing
- Yu-Chi Chen and Gwoboa Horng and Du-Shiau Tsai
-
2011/630 ( PDF )
- Indifferentiability Security of the Fast Wide Pipe Hash: Breaking the Birthday Barrier
- Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
-
2011/629 ( PDF )
- Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
- Eli Ben-Sasson and Serge Fehr and Rafail Ostrovsky
-
2011/628 ( PDF )
- Maximum Leakage Resilient IBE and IPE
- Kaoru Kurosawa and Le Trieu Phong
-
2011/627 ( PDF )
- A note on semi-bent functions with multiple trace terms and hyperelliptic curves
- Sihem Mesnager
-
2011/626 ( PDF )
- Algebraic Complexity Reduction and Cryptanalysis of GOST
- Nicolas T. Courtois
-
2011/625 ( -- withdrawn -- )
- Two RFID Privacy Models in Front of a Court
- Mohammad Hassan Habibi, Mohammad Reza Aref
-
2011/624 ( PDF )
- New attacks on Keccak-224 and Keccak-256
- Itai Dinur and Orr Dunkelman and Adi Shamir
-
2011/623 ( PDF )
- Indifferentiability of the Hash Algorithm BLAKE
- Donghoon Chang and Mridul Nandi and Moti Yung
-
2011/622 ( PDF )
- Homomorphic encryption from codes
- Andrej Bogdanov and Chin Ho Lee
-
2011/621 ( PDF )
- Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
- Zhenfu Cao, Zongyang Zhang , Yunlei Zhao
-
2011/620 ( PDF )
- Provable Security of BLAKE with Non-Ideal Compression Function
- Elena Andreeva and Atul Luykx and Bart Mennink
-
2011/619 ( PDF )
- Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64
- Bo Zhu and Guang Gong
-
2011/618 ( PDF )
- Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
- Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis
-
2011/617 ( PDF )
- Charm: A framework for Rapidly Prototyping Cryptosystems
- Joseph A. Akinyele and Matthew D. Green and Avi D. Rubin
-
2011/616 ( PDF )
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
- Jiazhe Chen and Meiqin Wang and Bart Preneel
-
2011/615 ( PDF )
- On the Joint Security of Encryption and Signature in EMV
- Jean Paul Degabriele and Anja Lehmann and Kenneth G. Paterson and Nigel P. Smart and Mario Strefler
-
2011/614 ( PS PS.GZ PDF )
- On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud
- Keke Chen
-
2011/613 ( PDF )
- Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
- Gilad Asharov and Abhishek Jain and Daniel Wichs
-
2011/612 ( PDF )
- IBAKE: Identity-Based Authenticated Key Exchange Protocol
- Vladimir Kolesnikov and Ganapathy S. Sundaram
-
2011/611 ( PDF )
- Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability
- Dana Dachman-Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam
-
2011/610 ( PDF )
- An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks
- Nicolas Veyrat-Charvillon and Benoît Gérard and Mathieu Renauld and François-Xavier Standaert
-
2011/609 ( PDF )
- The PHOTON Family of Lightweight Hash Functions
- Jian Guo and Thomas Peyrin and Axel Poschmann
-
2011/608 ( PDF )
- Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
- Patrick Longa and Francesco Sica
-
2011/607 ( PDF )
- Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}
- Carlos {Aguilar Melchor} and Slim Bettaieb and Philippe Gaborit and Javier Herranz
-
2011/606 ( -- withdrawn -- )
- $GF(2^{n})$ Subquadratic Polynomial Basis Multipliers for Some Irreducible Trinomials
- Xi Xiong and Haining Fan
-
2011/605 ( PDF )
- Efficient and Secure Delegation of Linear Algebra
- Payman Mohassel
-
2011/604 ( PDF )
- Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
- Aurore Guillevic and Damien Vergnaud
-
2011/603 ( -- withdrawn -- )
- Advanced Zero-Sum Distinguishers for the Permutations of the PHOTON Family
- Le Dong and Wenling Wu and Shuang Wu and Jian Zou
-
2011/602 ( PDF )
- Positive Results for Concurrently Secure Computation in the Plain Model
- Vipul Goyal
-
2011/601 ( PDF )
- A Multi-Receiver ID-Based Generalized Signcryption Scheme
- Caixue Zhou
-
2011/600 ( PDF )
- A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms
- Chunming Tang, Yanfeng Qi, Maozhi Xu, Baocheng Wang, Yixian Yang
-
2011/599 ( -- withdrawn -- )
- Efficient Password-Based Authenticated Key Exchange from Lattices
- Yi Ding and Lei Fan
-
2011/598 ( PDF )
- New Subexponential Algorithms for Factoring in $SL(2,\fq)$
- Jean-Charles Faugčre and Ludovic Perret and Christophe Petit and Guénaël Renault
-
2011/597 ( PDF )
- How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
- Bryan Parno and Mariana Raykova and Vinod Vaikuntanathan
-
2011/596 ( PDF )
- Parallel Homomorphic Encryption
- Seny Kamara and Mariana Raykova
-
2011/595 ( -- withdrawn -- )
- Efficient Multi-Query CPIR from Ring-LWE
- Helger Lipmaa
-
2011/594 ( PDF )
- Receipt Freeness of Pręt ŕ Voter Provably Secure
- Dalia Khader and Peter Y.A. Ryan
-
2011/593 ( PDF )
- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
- Yu Chen and Liqun Chen and Zongyang Zhang
-
2011/592 ( PS PS.GZ PDF )
- Generic Constructions for Verifiable Signcryption
- Laila El Aimani
-
2011/591 ( PDF )
- A Unified Framework for Small Secret Exponent Attack on RSA
- Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu
-
2011/590 ( PDF )
- An Efficient Broadcast Attack against NTRU
- Jianwei Li and Yanbin Pan and Mingjie Liu and Guizhen Zhu
-
2011/589 ( PDF )
- Impact of Intel's New Instruction Sets on Software Implementation of $GF(2)[x]$ Multiplication
- Chen Su and Haining Fan
-
2011/588 ( PDF )
- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
- Arpita Maitra and Goutam Paul
-
2011/587 ( PDF )
- Signatures of Correct Computation
- Charalampos Papamanthou and Elaine Shi and Roberto Tamassia
-
2011/586 ( PDF )
- TweLEX: A Tweaked Version of the LEX Stream Cipher
- Mainack Mondal and Avik Chakraborti and Nilanjan Datta and Debdeep Mukhopadhyay
-
2011/585 ( PDF )
- Iris: A Scalable Cloud File System with Efficient Integrity Checks
- Emil Stefanov and Marten van Dijk and Alina Oprea and Ari Juels
-
2011/584 ( PDF )
- A Single-Key Attack on 6-Round KASUMI
- Teruo Saito
-
2011/583 ( PDF )
- Revocable Identity-Based Encryption from Lattices
- Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Khoa Nguyen
-
2011/582 ( PDF )
- Randomness Extraction in finite fields $\mathbb{F}_{p^{n}}$
- Abdoul Aziz Ciss
-
2011/581 ( PS PS.GZ PDF )
- Standard Security Does Not Imply Security Against Selective-Opening
- Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek
-
2011/580 ( PDF )
- On a new generalization of Huff curves
- Abdoul Aziz Ciss and Djiby Sow
-
2011/579 ( PDF )
- Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements
- Yang Li and Daisuke Nakatsu and Qi Li and Kazuo Ohta and Kazuo Sakiyama
-
2011/578 ( PDF )
- ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS
- Balasingham Balamohan
-
2011/577 ( PDF )
- An Efficient Protocol for the Commit-Prove-Fair-Open functionality
- Ou Ruan , Cai Fu and Guohua Cui
-
2011/576 ( PDF )
- Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures
- Jing Liu, Qiong Huang, Bo Yang, Yang Zhang
-
2011/575 ( PDF )
- Exclusive Key Based Group Rekeying Protocols
- Jing Liu and Changji Wang
-
2011/574 ( PDF )
- Towards Efficient Provable Data Possession in Cloud Storage
- Jia Xu and Ee-Chien Chang and Jianying Zhou
-
2011/573 ( PDF )
- A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
- Masao Kasahara
-
2011/572 ( PDF )
- The ElGamal cryptosystem over circulant matrices
- Ayan Mahalanobis
-
2011/571 ( -- withdrawn -- )
- Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced Functions
- Brajesh Kumar Singh and Sugata Gangopadhyay
-
2011/570 ( PDF )
- Degree of regularity for HFE-
- Jintai Ding and Thorsten Kleinjung
-
2011/569 ( PDF )
- Analysis of the Hamming Weight of the Extended wmbNAF
- Ming Li, Ali Miri and Daming Zhu
-
2011/568 ( PDF )
- Single Layer Optical-scan Voting with Fully Distributed Trust
- Aleksander Essex and Christian Henrich and Urs Hengartner
-
2011/567 ( PDF )
- On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption
- Moon Sung Lee
-
2011/566 ( PDF )
- Fully Homomorphic Encryption with Polylog Overhead
- Craig Gentry and Shai Halevi and Nigel P. Smart
-
2011/565 ( PDF )
- Cryptographic Hash Functions: Recent Design Trends and Security Notions
- Saif Al-Kuwari and James H. Davenport and Russell J. Bradford
-
2011/564 ( PS PS.GZ PDF )
- Private-key Symbolic Encryption
- N. Ahmed and C.D. Jensen and E. Zenner
-
2011/563 ( PS PS.GZ PDF )
- On the Security of RFID Anti Cloning Security Protocol(ACSP)
- Masoumeh Safkhani and Nasour Bagheri and Majid Naderi
-
2011/562 ( PDF )
- A Group Testing Approach to Improved Corruption Localizing Hashing
- Annalisa De Bonis and Giovanni Di Crescenzo
-
2011/561 ( PS PS.GZ PDF )
- A Domain-Specific Language for Computing on Encrypted Data
- Alex Bain and John Mitchell and Rahul Sharma and Deian Stefan and Joe Zimmerman
-
2011/560 ( PDF )
- Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation
- Ching-Hua Yu and Bo-Yin Yang
-
2011/559 ( PDF )
- Instantiability of RSA-OAEP under Chosen-Plaintext Attack
- Eike Kiltz and Adam O'Neill and Adam Smith
-
2011/558 ( PDF )
- Improved Attacks on Full GOST
- Itai Dinur and Orr Dunkelman and Adi Shamir
-
2011/557 ( PDF )
- An Improved Trace Driven Instruction Cache Timing Attack on RSA
- Chen Cai-Sen, Wang Tao, Chen Xiao-Cen and Zhou Ping
-
2011/556 ( PDF )
- GF(2^n) redundant representation using matrix embedding
- Yongjia Wang and Xi Xiong and Haining Fan
-
2011/555 ( PDF )
- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
- Michelle Kendall and Keith Martin
-
2011/554 ( PDF )
- On the security models for certificateless signature schemes achieving level 3 security
- Yu-Chi Chen and Gwoboa Horng
-
2011/553 ( PDF )
- Publicly Verifiable Proofs of Sequential Work
- Mohammad Mahmoody and Tal Moran and Salil Vadhan
-
2011/552 ( PDF )
- Recyclable PUFs: Logically Reconfigurable PUFs
- Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
-
2011/551 ( PDF )
- Security Evaluation against Differential Cryptanalysis for Block Cipher Structures
- Shengbao Wu and Mingsheng Wang
-
2011/550 ( PDF )
- A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions
- Javad Alizadeh and Abdolrasoul Mirghadri
-
2011/549 ( PDF )
- 1-Resilient Boolean Function with Optimal Algebraic Immunity
- Qingfang Jin and Zhuojun Liu and Baofeng Wu
-
2011/548 ( PDF )
- On the security of MQ_DRBG
- V.O. Drelikhov and G.B. Marshalko and A.V. Pokrovskiy
-
2011/547 ( PDF )
- The Single Cycle T-functions
- Zhaopeng Dai and Zhuojun Liu
-
2011/546 ( PDF )
- Hidden Vector Encryption Fully Secure Against Unrestricted Queries
- Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
-
2011/545 ( PDF )
- Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0
- Masao Kasahara
-
2011/544 ( PDF )
- Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers
- Andres Molina-Markham and George Danezis and Kevin Fu and Prashant Shenoy and David Irwin
-
2011/543 ( PDF )
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Tatsuaki Okamoto and Katsuyuki Takashima
-
2011/542 ( PDF )
- Certificate-Based Signcryption: Security Model and Efficient Construction
- Yang Lu and Jiguo Li
-
2011/541 ( PDF )
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Orr Dunkelman, Nathan Keller, Adi Shamir
-
2011/540 ( PDF )
- Efficient Implementation of the $\eta_T$ Pairing on GPU
- Yosuke Katoh and Yun-Ju Huang and Chen-Mou Cheng and Tsuyoshi Takagi
-
2011/539 ( PDF )
- Sign Modules in Secure Arithmetic Circuits
- Ching-Hua Yu
-
2011/538 ( PDF )
- Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
- Jia Xu and Ee-Chien Chang and Jianying Zhou
-
2011/537 ( PDF )
- Lattice Signatures Without Trapdoors
- Vadim Lyubashevsky
-
2011/536 ( PDF )
- Revisiting Lower and Upper Bounds for Selective Decommitments
- Rafail Ostrovsky and Vanishree Rao and Alessandra Scafuro and Ivan Visconti
-
2011/535 ( PDF )
- Multiparty Computation from Somewhat Homomorphic Encryption
- I. Damgard and V. Pastro and N.P. Smart and S. Zakarias
-
2011/534 ( PDF )
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
- Maxime Nassar and Sylvain Guilley and Jean-Luc Danger
-
2011/533 ( PDF )
- Two-Output Secure Computation with Malicious Adversaries
- abhi shelat and Chih-hao Shen
-
2011/532 ( PDF )
- Hash Functions Based on Three Permutations: A Generic Security Analysis
- Bart Mennink and Bart Preneel
-
2011/531 ( PDF )
- Static Fault Attacks on Hardware DES Registers
- Philippe Loubet-Moundi and David Vigilant and Francis Olivier
-
2011/530 ( PDF )
- Key-Evolution Schemes Resilient to Space-Bounded Leakage
- Stefan Dziembowski and Tomasz Kazana and Daniel Wichs
-
2011/529 ( PDF )
- Secure and Efficient Proof of Storage with Deduplication
- Qingji Zheng and Shouhuai Xu
-
2011/528 ( PDF )
- Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy
- Jian-Zhu Lu, Hong-Qing Ren, and Jipeng Zhou
-
2011/527 ( -- withdrawn -- )
- Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography
- Mohsen Toorani and Maryam Saeed
-
2011/526 ( PS PS.GZ PDF )
- Universally Composable Security Analysis of OAuth v2.0
- Suresh Chari and Charanjit Jutla and Arnab Roy
-
2011/525 ( PDF )
- A Note on the Density of the Multiple Subset Sum Problems
- Yanbin Pan and Feng Zhang
-
2011/524 ( PDF )
- Security of Reduced-Round Camellia against Impossible Differential Attack
- Leibo Li, Jiazhe Chen and Xiaoyun Wang
-
2011/523 ( -- withdrawn -- )
- Security analysis of a fuzzy identity-based encryption scheme
- Miaomiao Tian and Liusheng Huang and Wei Yang
-
2011/522 ( PDF )
- A Compact S-Box Design for SMS4 Block Cipher
- Imran Abbasi, Mehreen Afzal
-
2011/521 ( PDF )
- Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions
- Daniele Micciancio and Petros Mol
-
2011/520 ( PDF )
- Houssem Maghrebi and Sylvain Guilley and Claude Carlet and Jean-Luc Danger
- Houssem maghebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger
-
2011/519 ( PDF )
- Leakage-Resilient Cryptography From the Inner-Product Extractor
- Stefan Dziembowski and Sebastian Faust
-
2011/518 ( PDF )
- Two 1-Round Protocols for Delegation of Computation
- Ran Canetti and Ben Riva and Guy N. Rothblum
-
2011/517 ( PDF )
- Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2011/516 ( PDF )
- Protecting AES with Shamir's Secret Sharing Scheme
- Louis Goubin and Ange Martinelli
-
2011/515 ( PDF )
- A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity
- Qingfang Jin and Zhuojun Liu and Baofeng Wu and Xiaoming Zhang
-
2011/514 ( PDF )
- Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols
- Mohammad Sadeq Dousti and Rasool Jalili
-
2011/513 ( PDF )
- Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
- Abhishek Jain and Omkant Pandey
-
2011/512 ( PDF )
- A Dichotomy for Local Small-Bias Generators
- Benny Applebaum and Andrej Bogdanov and Alon Rosen
-
2011/511 ( PDF )
- The Cryptographic Power of Random Selection
- Matthias Krause and Matthias Hamann
-
2011/510 ( PDF )
- On the Security of the Free-XOR Technique
- Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Hong-Sheng Zhou
-
2011/509 ( PDF )
- Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
- Emil Stefanov and Elaine Shi and Dawn Song
-
2011/508 ( PDF )
- Secure Two-Party Computation with Low Communication
- Ivan Damgård and Sebastian Faust and Carmit Hazay
-
2011/507 ( PDF )
- Relatively-Sound NIZKs and Password-Based Key-Exchange
- Charanjit Jutla and Arnab Roy
-
2011/506 ( PDF )
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Luca De Feo and David Jao and Jérôme Plűt
-
2011/505 ( PDF )
- A New Second Order Side Channel Attack Based on Linear Regression
- Julien Doget and Guillaume Dabosville and Emmanuel Prouff
-
2011/504 ( PDF )
- From Non-Adaptive to Adaptive Pseudorandom Functions
- Iftach Haitner and Itay Berman
-
2011/503 ( PDF )
- On the influence of the algebraic degree of $F^{−1}$ on the algebraic degree of $G \circ F$
- Christina Boura and Anne Canteaut
-
2011/502 ( PDF )
- Wild McEliece Incognito
- Daniel J. Bernstein and Tanja Lange and Christiane Peters
-
2011/501 ( PDF )
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Daniele Micciancio and Chris Peikert
-
2011/500 ( PDF )
- Biclique Cryptanalysis of the Block Cipher SQUARE
- Hamid Mala
-
2011/499 ( PDF )
- Duplexing the sponge: single-pass authenticated encryption and other applications
- Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche
-
2011/498 ( PDF )
- An Efficient Secure Anonymous Proxy Signature Scheme
- *Jue-Sam Chou 1, Shih-Che Hung 2, Yalin Chen
-
2011/497 ( PDF )
- Can a Program Reverse-Engineer Itself?
- Antoine Amarilli and David Naccache and Pablo Rauzy and Emil Simion
-
2011/496 ( PDF )
- On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
- Avradip Mandal and Jacques Patarin and Yannick Seurin
-
2011/495 ( PDF )
- Vector Commitments and their Applications
- Dario Catalano and Dario Fiore
-
2011/494 ( PDF )
- Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
- Carmit Hazay and Gert Læssøe Mikkelsen and Tal Rabin and Tomas Toft and Angelo Agatino Nicolosi
-
2011/493 ( PDF )
- From Point Obfuscation To 3-round Zero-Knowledge
- Nir Bitansky and Omer Paneth
-
2011/492 ( PDF )
- Rational distance-bounding protocols over noisy channels
- Long H. Nguyen
-
2011/491 ( -- withdrawn -- )
- Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid
- Qi Jiang, Jianfeng Ma, Guangsong Li and Xiang Lu
-
2011/490 ( PDF )
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Allison Lewko
-
2011/489 ( PS PS.GZ PDF )
- Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis
- A. N. Alekseychuk and L. V. Kovalchuk
-
2011/488 ( PS PS.GZ )
- A Survey of Cryptography Based on Physically Unclonable Objects
- Kai-Yuen Cheong
-
2011/487 ( PDF )
- Noiseless Database Privacy
- Raghav Bhaskar and Abhishek Bhowmick and Vipul Goyal and Srivatsan Laxman and Abhradeep Thakurta
-
2011/486 ( PDF )
- On the Joint Security of Encryption and Signature, Revisited
- Kenneth G. Paterson and Jacob C.N. Schuldt and Martijn Stam and Susan Thomson
-
2011/485 ( PDF )
- Another Look at Automated Theorem-Proving. II
- Neal Koblitz
-
2011/484 ( PDF )
- XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions
- Johannes Buchmann, Erik Dahmen, and Andreas Hülsing
-
2011/483 ( PDF )
- Adaption of Pollard's kangaroo algorithm to the FACTOR problem
- Mario Romsy
-
2011/482 ( PDF )
- Secure Computation with Sublinear Amortized Work
- Dov Gordon and Jonathan Katz and Vladimir Kolesnikov and Tal Malkin and Mariana Raykova and Yevgeniy Vahlis
-
2011/481 ( PDF )
- Close to Uniform Prime Number Generation With Fewer Random Bits
- Pierre-Alain Fouque and Mehdi Tibouchi
-
2011/480 ( PDF )
- Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis
- Sanjay Bhattacherjee and Palash Sarkar
-
2011/479 ( PDF )
- Identity-Based (Lossy) Trapdoor Functions and Applications
- Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters
-
2011/478 ( PDF )
- An efficient certificateless authenticated key agreement scheme
- Debiao He, Sahadeo Padhye, Jianhua Chen
-
2011/477 ( PDF )
- Cryptanalysis of NTRU with two public keys
- Abderrahmane Nitaj
-
2011/476 ( PDF )
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Benoit Libert and Kenneth G. Paterson and Elizabeth A. Quaglia
-
2011/475 ( PDF )
- Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis
- Nicolas T. Courtois, Daniel Hulme and Theodosis Mourouzis
-
2011/474 ( PDF )
- Improved Generic Algorithms for Hard Knapsacks
- Anja Becker and Jean-Sébastien Coron and Antoine Joux
-
2011/473 ( PS PS.GZ PDF )
- Practically Efficient Verifiable Delegation of Polynomial and its Applications
- Jia XU
-
2011/472 ( PDF )
- Forward Secure Ring Signature without Random Oracles
- Joseph K. Liu and Tsz Hon Yuen and Jianying Zhou
-
2011/471 ( PDF )
- Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme
- P. Scholl and N.P. Smart
-
2011/470 ( PDF )
- Non-malleable public key encryption in BRSIM/UC
- István Vajda
-
2011/469 ( PDF )
- Cryptanalysis of INCrypt32 in HID's iCLASS Systems
- ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han
-
2011/468 ( PDF )
- Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three
- Hongfeng Wu and Chang-An Zhao
-
2011/467 ( PDF )
- A !ew Efficient Asymmetric Cryptosystem for large data sets
- M.R.K. Ariffin, M.A. Asbullah and N.A. Abu
-
2011/466 ( PDF )
- Green Cryptanalysis: Meet-in-the-Middle Key-Recovery for the Full KASUMI Cipher
- Keting Jia and Christian Rechberger and Xiaoyun Wang
-
2011/465 ( PDF )
- Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings
- Craig Costello and Kristin Lauter and Michael Naehrig
-
2011/464 ( PDF )
- Private and Oblivious Set and Multiset Operations
- Marina Blanton and Everaldo Aguiar
-
2011/463 ( PDF )
- Decentralized Dynamic Broadcast Encryption
- Duong Hieu Phan and David Pointcheval and Mario Strefler
-
2011/462 ( PDF )
- Secure Outsourced Computation of Iris Matching
- Marina Blanton and Mehrdad Aliasgari
-
2011/461 ( PDF )
- Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving
- Fangguo Zhang and Ping Wang
-
2011/460 ( PDF )
- Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings
- Zijian Zhang and Liehuang Zhu and Lejian Liao
-
2011/459 ( PDF )
- Sufficient conditions for sound hashing using a truncated permutation
- Joan Daemen and Tony Dusenge and Gilles Van Assche
-
2011/458 ( PDF )
- Sieving for Shortest Vectors in Ideal Lattices
- Michael Schneider
-
2011/457 ( PDF )
- Resettable Statistical Zero Knowledge
- Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia
-
2011/456 ( PDF )
- Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs
- Shafi Goldwasser, Huijia Lin, Aviad Rubinstein
-
2011/455 ( PDF )
- The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption
- Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang
-
2011/454 ( PDF )
- Threshold Fully Homomorphic Encryption and Secure Computation
- Steven Myers and Mona Sergi and abhi shelat
-
2011/453 ( PDF )
- Practical Complexity Differential Cryptanalysis and Fault Analysis of AES
- Michael Tunstall
-
2011/452 ( PDF )
- The Good lower bound of Second-order nonlinearity of a class of Boolean function
- Manish Garg and Sugata Gangopadhyay
-
2011/451 ( PDF )
- Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
- Hakhyun Kim, Woongryul Jeon, Yunho Lee and Dongho Won
-
2011/450 ( -- withdrawn -- )
- R-hash : Hash Function Using Random Quadratic Polynomials Over GF (2)
- Dhananjoy Dey, Noopur Shrotriya, Indranath Sengupta
-
2011/449 ( PDF )
- Biclique Cryptanalysis of the Full AES
- Andrey Bogdanov and Dmitry Khovratovich and Christian Rechberger
-
2011/448 ( PDF )
- (Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 stream cipher
- Sourav Sen Gupta and Subhamoy Maitra and Goutam Paul and Santanu Sarkar
-
2011/447 ( PDF )
- On Verifying Dynamic Multiple Data Copies over Cloud Servers
- Ayad F. Barsoum and M. Anwar Hasan
-
2011/446 ( -- withdrawn -- )
- Privacy-Preserving Friend Search over Online Social Networks
- Huang Lin and Yuguang Fang and Zhenfu Cao
-
2011/445 ( -- withdrawn -- )
- Privacy-Preserving Friend Search over Online Social Networks
- Huang Lin and Sherman S. M. Chow and Dongsheng Xing and Yuguang Fang and Zhenfu Cao
-
2011/444 ( PDF )
- Generalised Mersenne Numbers Revisited
- Robert Granger and Andrew Moss
-
2011/443 ( PDF )
- From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again
- Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer
-
2011/442 ( PDF )
- Another Look at Tightness
- Sanjit Chatterjee and Alfred Menezes and Palash Sarkar
-
2011/441 ( PDF )
- Fully Homomorphic Encryption over the Integers with Shorter Public Keys
- Jean-Sebastien Coron and Avradip Mandal and David Naccache and Mehdi Tibouchi
-
2011/440 ( PDF )
- Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
- Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi
-
2011/439 ( PDF )
- Optimal Data Authentication from Directed Transitive Signatures
- Philippe Camacho
-
2011/438 ( PDF )
- Short Transitive Signatures for Directed Trees
- Philippe Camacho and Alejandro Hevia
-
2011/437 ( PDF )
- Approximate common divisors via lattices
- Henry Cohn and Nadia Heninger
-
2011/436 ( PDF )
- Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers
- Yuanmi Chen and Phong Q. Nguyen
-
2011/435 ( PDF )
- The IPS Compiler: Optimizations, Variants and Concrete Efficiency
- Yehuda Lindell and Benny Pinkas and Eli Oxman
-
2011/434 ( PDF )
- An Efficient Protocol for Oblivious DFA Evaluation and Applications
- Payman Mohassel and Salman Niksefat and Saeed Sadeghian and Babak Sadeghiyan
-
2011/433 ( PDF )
- Collusion-Preserving Computation
- Joel Alwen and Jonathan Katz and Ueli Maurer and Vassilis Zikas
-
2011/432 ( PS PS.GZ PDF )
- Ciphers that Securely Encipher their own Keys
- Mihir Bellare and David Cash and Sriram Keelveedhi
-
2011/431 ( PDF )
- Roots of Square: Cryptanalysis of Double-Layer Square and Square+
- Enrico Thomae and Christopher Wolf
-
2011/430 ( PDF )
- Analogues of Velu's Formulas for Isogenies on Alternate Models of Elliptic Curves
- Dustin Moody and Daniel Shumow
-
2011/429 ( PDF )
- Round-efficient Oblivious Database Manipulation
- Sven Laur and Jan Willemson and Bingsheng Zhang
-
2011/428 ( PDF )
- AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -
- Tatsuya TAKEHISA and Hiroki NOGAWA and Masakatu MORII
-
2011/427 ( PDF )
- A new attack on the KMOVcryptosystem
- Abderrahmane Nitaj
-
2011/426 ( PS PS.GZ PDF )
- Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol
- Masoumeh Safkhani and Nasour Bagheri and Somitra Kumar Sanadhya and Majid Naderi
-
2011/425 ( PDF )
- Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings
- Laurie Genelle and Emmanuel Prouff and Michaël Quisquater
-
2011/424 ( PS PS.GZ PDF )
- Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
- Masoumeh Safkhani and Nasour Bagheri and Majid Naderi
-
2011/423 ( PDF )
- Linear Cryptanalysis of PRINTcipher --- Trails and Samples Everywhere
- Martin Ĺgren and Thomas Johansson
-
2011/422 ( PDF )
- Improved Analysis of ECHO-256
- Jérémy Jean and María Naya-Plasencia and Martin Schläffer
-
2011/421 ( PDF )
- Superposition Attacks on Cryptographic Protocols
- Ivan Damgård and Jakob Funder and Jesper Buus Nielsen and Louis Salvail
-
2011/420 ( PS PS.GZ PDF )
- Unaligned Rebound Attack - Application to Keccak
- Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei
-
2011/419 ( -- withdrawn -- )
- On the security of a certificateless short signature scheme
- Miaomiao Tian and Liusheng Huang and Wei Yang
-
2011/418 ( PDF )
- An efficient RFID mutual authentication scheme based on ECC
- Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin
-
2011/417 ( PDF )
- New Data-Efficient Attacks on Reduced-Round IDEA
- Eli Biham and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2011/416 ( PDF )
- Efficient Parallelization of Lanczos Type Algorithms
- Ilya Popovyan
-
2011/415 ( PDF )
- On the Access Structures of Hyperelliptic Secret Sharing
- Lei Li and Siman Yang
-
2011/414 ( PDF )
- Fuzzy Identity Based Encryption from Lattices
- Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee
-
2011/413 ( PDF )
- Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation Protocols – Extended Version –
- Thomas Roche and Emmanuel Prouff
-
2011/412 ( PDF )
- Automatic Insertion of DPA Countermeasures
- Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall
-
2011/411 ( PDF )
- Comments on a password authentication and update scheme based on elliptic curve cryptography
- Debiao He
-
2011/410 ( PDF )
- Functional Encryption for Inner Product Predicates from Learning with Errors
- Shweta Agrawal and David Mandell Freeman and Vinod Vaikuntanathan
-
2011/409 ( PDF )
- Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption
- Xiaoyuan Yang, Weiyi Cai, Xu An Wang
-
2011/408 ( PDF )
- Resettable Cryptography in Constant Rounds -- the Case of Zero Knowledge
- Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung
-
2011/407 ( PDF )
- Oblivious RAM with O((log N)^3) Worst-Case Cost
- Elaine Shi, Hubert Chan, Emil Stefanov, Mingfei Li
-
2011/406 ( PDF )
- Composition Theorems Without Pre-Established Session Identifiers
- Ralf Kuesters and Max Tuengerthal
-
2011/405 ( PDF )
- Can Homomorphic Encryption be Practical?
- Kristin Lauter and Michael Naehrig and Vinod Vaikuntanathan
-
2011/404 ( PDF )
- A constant-round resettably-sound resettable zero-knowledge argument in the BPK model
- Seiko Arita
-
2011/403 ( PDF )
- A Fair Evaluation Framework for Comparing Side-Channel Distinguishers
- Carolyn Whitnall and Elisabeth Oswald
-
2011/402 ( PDF )
- Formalizing Group Blind Signatures and Practical Constructions without Random Oracles
- Essam Ghadafi
-
2011/401 ( PDF )
- Pseudorandom Functions and Lattices
- Abhishek Banerjee and Chris Peikert and Alon Rosen
-
2011/400 ( PDF )
- On a generalized combinatorial conjecture involving addition $\mod 2^k - 1$
- Gérard Cohen and Jean-Pierre Flori
-
2011/399 ( PDF )
- Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic
- Luk Bettale and Jean-Charles Faugčre and Ludovic Perret
-
2011/398 ( PDF )
- Hardness of Learning Problems over Burnside Groups of Exponent 3
- Nelly Fazio and Kevin Iga and Antonio Nicolosi and Ludovic Perret and William E. Skeith III
-
2011/397 ( PS PS.GZ )
- The n-Diffie-Hellman Problem and its Applications
- Liqun Chen and Yu Chen
-
2011/396 ( PDF )
- Fair Computation with Rational Players
- Amos Beimel and Adam Groce and Jonathan Katz and Ilan Orlov
-
2011/395 ( PDF )
- Improved Anonymity for Key-Trees
- Beye, Michael and Veugen, Thijs
-
2011/394 ( PDF )
- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument
- Helger Lipmaa and Bingsheng Zhang
-
2011/393 ( -- withdrawn -- )
- Analysis and Improvement of Thing's Time-Memory Trade-Off Attack
- Zhenqi Li, Dongdai Lin and Wenhao Wang
-
2011/392 ( PDF )
- An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)
- Yun Zhang, Christophe Tartary and Huaxiong Wang
-
2011/391 ( PDF )
- On the Portability of Side-Channel Attacks – An Analysis of the Xilinx Virtex 4, Virtex 5, and Spartan 6 Bitstream Encryption Mechanism
- Amir Moradi and Markus Kasper and Christof Paar
-
2011/390 ( PDF )
- On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
- Amir Moradi and Alessandro Barenghi and Timo Kasper and Christof Paar
-
2011/389 ( PDF )
- Spatial Encryption
- Mike Hamburg
-
2011/388 ( PDF )
- Modulus Fault Attacks Against RSA-CRT Signatures
- Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi
-
2011/387 ( PDF )
- Analysis of the Parallel Distinguished Point Tradeoff
- Jin Hong and Ga Won Lee and Daegun Ma
-
2011/386 ( PDF )
- How to share secrets simultaneously
- Laszlo Csirmaz
-
2011/385 ( PDF )
- Efficient Implementation of Grand Cru with TI C6x+ Processor
- Azhar Ali Khan and Ghulam Murtaza
-
2011/384 ( PDF )
- Distributed Oblivious RAM for Secure Two-Party Computation
- Steve Lu and Rafail Ostrovsky
-
2011/383 ( PDF )
- A representation of the $p$-sylow subgroup of $\perm(\F_p^n)$ and a cryptographic application
- Stefan Maubach
-
2011/382 ( PDF )
- Generic Fully Simulatable Adaptive Oblivious Transfer
- Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
-
2011/381 ( PDF )
- A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem
- Yalin Chen1, Jue-Sam Chou2, Chi-Fong Lin3, Cheng-Lun Wu4
-
2011/380 ( PDF )
- An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis
- Carolyn Whitnall and Elisabeth Oswald and Luke Mather
-
2011/379 ( -- withdrawn -- )
- Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
- Miaomiao Tian and Wei Yang and Liusheng Huang
-
2011/378 ( PS PS.GZ PDF )
- A generalization of the Lucas addition chains
- Amadou TALL
-
2011/377 ( PS PS.GZ PDF )
- Improved Generalized Birthday Attack
- Paul Kirchner
-
2011/376 ( PDF )
- Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check
- Julien Bringer and Alain Patey
-
2011/375 ( PDF )
- Complexity of universal access structures
- Laszlo Csirmaz
-
2011/374 ( PDF )
- Restoring the Differential Resistance of MD6
- Ethan Heilman
-
2011/373 ( PDF )
- An efficient characterization of a family of hyperbent functions with multiple trace terms
- Jean-Pierre Flori and Sihem Mesnager
-
2011/372 ( PDF )
- Identity based signcryption schemes without random oracles
- Prashant Kushwah and Sunder Lal
-
2011/371 ( PDF )
- Monoidic Codes in Cryptography
- Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki
-
2011/370 ( PDF )
- Socio-Rational Secret Sharing as a New Direction in Rational Cryptography
- Mehrdad Nojoumian and Douglas R. Stinson
-
2011/369 ( PS PS.GZ PDF )
- Storing Secrets on Continually Leaky Devices
- Yevgeniy Dodis and Allison Lewko and Brent Waters and Daniel Wichs
-
2011/368 ( PDF )
- High-speed high-security signatures
- Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang
-
2011/367 ( PDF )
- Decoding One Out of Many
- Nicolas Sendrier
-
2011/366 ( PDF )
- Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
- Deng Tang and Claude Carlet and Xiaohu Tang
-
2011/365 ( PDF )
- Security flaws in a biometrics-based multi-server authentication with key agreement scheme
- Debiao He
-
2011/364 ( PDF )
- The Value $4$ of Binary Kloosterman Sums
- Jean-Pierre Flori and Sihem Mesnager and Gérard Cohen
-
2011/363 ( -- withdrawn -- )
- Dynamic Group Blind Signatures
- Essam Ghadafi
-
2011/362 ( PDF )
- Practically Efficient Proof of Retrievability in Cloud Storage
- Jia XU and Ee-Chien CHANG
-
2011/361 ( PDF )
- The Exact Security of a Stateful IBE and New Compact Stateful PKE Schemes
- S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
-
2011/360 ( PDF )
- Certificateless Aggregate Signcryption Schemes
- Ziba Eslami, Nasrollah Pakniat
-
2011/359 ( PDF )
- High-Entropy Visual Identification for Touch Screen Devices
- Nathaniel Wesley Filardo and Giuseppe Ateniese
-
2011/358 ( PDF )
- Constructing a Ternary FCSR with a Given Connection Integer
- Lin Zhiqiang and Pei Dingyi
-
2011/357 ( PDF )
- Generalized Learning Problems and Applications to Non-Commutative Cryptography
- Gilbert Baumslag and Nelly Fazio and Antonio R. Nicolosi and Vladimir Shpilrain and William E. Skeith III
-
2011/356 ( PS PS.GZ PDF )
- An Efficient Attack on All Concrete KKS Proposals
- Ayoub Otmani and Jean-Pierre Tillich
-
2011/355 ( PDF )
- On the (Non-)Equivalence of UC Security Notions
- Oana Ciobotaru
-
2011/354 ( PDF )
- A coprocessor for secure and high speed modular arithmetic
- Nicolas Guillermin
-
2011/353 ( PDF )
- Hidden Pair of Bijection Signature Scheme
- Masahito Gotaishi and Shigeo Tsujii
-
2011/352 ( PDF )
- Bi-Deniable Public-Key Encryption
- Adam O'Neill and Chris Peikert and Brent Waters
-
2011/351 ( -- withdrawn -- )
- Cryptanalysis of the $AA_{\beta}$ Cryptosystem based on Linear Diophantine Equation Discrete Log Problem
- Yanbin Pan , Yingpu Deng
-
2011/350 ( PDF )
- $HB^N$: An HB-like protocol secure against man-in-the-middle attacks
- Carl Bosley and Kristiyan Haralambiev and Antonio Nicolosi
-
2011/349 ( PDF )
- Efficient Methods for Exploiting Faults Induced at AES Middle Rounds
- Chong Hee Kim
-
2011/348 ( PDF )
- Extractors Against Side-Channel Attacks: Weak or Strong?
- Marcel Medwed and Francois-Xavier Standaert
-
2011/347 ( -- withdrawn -- )
- An efficient certificateless authenticated key agreement protocol without bilinear pairings
- Debiao He
-
2011/346 ( PDF )
- Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
- Hai Huang
-
2011/345 ( PDF )
- LBlock: A Lightweight Block Cipher *
- Wenling Wu and Lei Zhang
-
2011/344 ( PDF )
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Zvika Brakerski and Vinod Vaikuntanathan
-
2011/343 ( PDF )
- Another Look at Security Definitions
- Neal Koblitz and Alfred Menezes
-
2011/342 ( PDF )
- A Domain Transformation for Structure-Preserving Signatures on Group Elements
- Melissa Chase and Markulf Kohlweiss
-
2011/341 ( -- withdrawn -- )
- An Improved Internet Voting Protocol
- Mehmet Sabir Kiraz and Süleyman Kardaş and Muhammed Ali Bingöl and Fatih Birinci
-
2011/340 ( PDF )
- Encrypting More Information in Visual Cryptography Scheme
- Feng Liu, Peng Li, ChuanKun Wu
-
2011/339 ( PDF )
- Careful with Composition: Limitations of Indifferentiability and Universal Composability
- Thomas Ristenpart and Hovav Shacham and Thomas Shrimpton
-
2011/338 ( PDF )
- Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves
- Matthieu Rivain
-
2011/337 ( PDF )
- Functional Re-encryption and Collusion-Resistant Obfuscation
- Nishanth Chandran and Melissa Chase and Vinod Vaikuntanathan
-
2011/336 ( -- withdrawn -- )
- Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
- Debiao He
-
2011/335 ( PDF )
- New look at impossibility result on Dolev-Yao models with hashes
- István Vajda
-
2011/334 ( PDF )
- On the Efficient Implementation of Pairing-Based Protocols
- Michael Scott
-
2011/333 ( PDF )
- Cryptanalysis of a key agreement protocol based on chaotic Hash
- Debiao He
-
2011/332 ( PDF )
- A depth-16 circuit for the AES S-box
- Joan Boyar and Rene Peralta
-
2011/331 ( PS PS.GZ PDF )
- Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
- Masoumeh Safkhani and Pedro Peris-Lopez and Julio Cesar Hernandez-Castro and Nasour Bagheri and Majid Naderi
-
2011/330 ( PDF )
- Simple and Asymptotically Optimal $t$-Cheater Identifiable Secret Sharing Scheme
- Ashish Choudhury
-
2011/329 ( PS PS.GZ PDF )
- Hardness of Computing Individual Bits for One-way Functions on Elliptic Curves
- Alexandre Duc and Dimitar Jetchev
-
2011/328 ( PDF )
- Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption
- Gu Chunsheng
-
2011/327 ( PDF )
- On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
- Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky
-
2011/326 ( PDF )
- SGCM: The Sophie Germain Counter Mode
- Markku-Juhani O. Saarinen
-
2011/325 ( PDF )
- New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm
- Aram Jivanyan and Gurgen Khachatryan
-
2011/324 ( PDF )
- On the Efficiency of Bit Commitment Reductions
- Samuel Ranellucci and Alain Tapp and Severin Winkler and Jürg Wullschleger
-
2011/323 ( PDF )
- A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256
- Shusheng Liu and Libin Wang and Zheng Gong
-
2011/322 ( PDF )
- A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
- Carolyn Whitnall and Elisabeth Oswald
-
2011/321 ( PDF )
- A Formal Approach to Distance-Bounding RFID Protocols
- Ulrich Duerholz and Marc Fischlin and Michael Kasper and Cristina Onete
-
2011/320 ( PDF )
- Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
- Manan Nayak and Shashank Agrawal and Kannan Srinathan
-
2011/319 ( PS PS.GZ PDF )
- Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
- Jan Camenisch and Kristiyan Haralambiev and Markulf Kohlweiss and Jorn Lapon and Vincent Naessens
-
2011/318 ( PDF )
- Scalar Multiplication on Koblitz Curves using $\tau^2-$NAF
- Sujoy Sinha Roy and Chester Rebeiro and Debdeep Mukhopadhyay and Junko Takahashi and Toshinori Fukunaga
-
2011/317 ( PDF )
- Two Simple Code-Verification Voting Protocols
- Helger Lipmaa
-
2011/316 ( PDF )
- Security of Blind Signatures Revisited
- Dominique Schröder and Dominique Unruh
-
2011/315 ( PDF )
- Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0
- Zhi Hu and Patrick Longa and Maozhi Xu
-
2011/314 ( PDF )
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi
-
2011/313 ( PDF )
- Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity
- Arpita Patra
-
2011/312 ( PDF )
- Differential Cryptanalysis of GOST
- Nicolas T. Courtois and Michal Misztal
-
2011/311 ( PDF )
- Targeted Malleability: Homomorphic Encryption for Restricted Computations
- Dan Boneh and Gil Segev and Brent Waters
-
2011/310 ( PDF )
- Universally Composable Synchronous Computation
- Jonathan Katz and Ueli Maurer and Bjoern Tackmann and Vassilis Zikas
-
2011/309 ( PDF )
- On Constructing Homomorphic Encryption Schemes from Coding Theory
- Frederik Armknecht and Daniel Augot and Ludovic Perret and Ahmad-Reza Sadeghi
-
2011/308 ( PDF )
- Provably Secure and Practical Onion Routing
- Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi
-
2011/307 ( PDF )
- Ways to restrict the differential path
- ZiJie Xu and Ke Xu
-
2011/306 ( PDF )
- Group Law Computations on Jacobians of Hyperelliptic Curves
- Craig Costello and Kristin Lauter
-
2011/305 ( PDF )
- A new attack on Jakobsson Hybrid Mix-Net
- Seyyed Amir Mortazavi
-
2011/304 ( PDF )
- Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
- Jia XU
-
2011/303 ( PDF )
- GNUC: A New Universal Composability Framework
- Dennis Hofheinz and Victor Shoup
-
2011/302 ( PDF )
- Univariate Side Channel Attacks and Leakage Modeling
- Julien Doget and Emmanuel Prouff and Matthieu Rivain and François-Xavier Standaert
-
2011/301 ( PDF )
- On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations
- Ronald Cramer and Ivan Damgard and Valerio Pastro
-
2011/300 ( PDF )
- One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
- Cas Cremers and Michele Feltz
-
2011/299 ( PDF )
- Modes of Operations for Encryption and Authentication Using Stream Ciphers Supporting an Initialisation Vector
- Palash Sarkar
-
2011/298 ( PDF )
- Local limit theorem for large deviations and statistical box-tests
- Igor Semaev
-
2011/297 ( PDF )
- NEW STATISTICAL BOX-TEST AND ITS POWER
- Igor Semaev and Mehdi M. Hassanzadeh
-
2011/296 ( PDF )
- Short Signatures From Weaker Assumptions
- Dennis Hofheinz and Tibor Jager and Eike Kiltz
-
2011/295 ( PDF )
- Counting Points on Genus 2 Curves with Real Multiplication
- P. Gaudry and D. Kohel and B. Smith
-
2011/294 ( PDF )
- Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems
- Albrecht Petzoldt and Enrico Thomae and Stanislav Bulygin and Christopher Wolf
-
2011/293 ( -- withdrawn -- )
- Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- W. Han
-
2011/292 ( PDF )
- On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve
- Namhun Koo and Gooc Hwa Jo and Soonhak Kwon
-
2011/291 ( PDF )
- Leakage-Resilient Coin Tossing
- Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai
-
2011/290 ( PDF )
- Some Results Concerning Generalized Bent Functions
- Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh
-
2011/289 ( PDF )
- Polly Cracker, Revisited
- Martin R. Albrecht and Jean-Charles Faugčre and Pooya Farshim and Gottfried Herold and Ludovic Perret
-
2011/288 ( PDF )
- On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks
- Ashish Choudhury and Arpita Patra
-
2011/287 ( PDF )
- Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
- Stanislav Bulygin
-
2011/286 ( PDF )
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
- Dmitry Khovratovich and Christian Rechberger and Alexandra Savelieva
-
2011/285 ( PDF )
- Exploiting Linear Hull in Matsui’s Algorithm 1 (extended version)
- Andrea Röck and Kaisa Nyberg
-
2011/284 ( -- withdrawn -- )
- On the Security of PPPoE Network
- Fanbao Liu and Yumeng Feng and Yuan Cao
-
2011/283 ( PDF )
- The Fault Attack ECDLP Revisited
- Mingqiang Wang and Xiaoyun Wang and Tao Zhan
-
2011/282 ( PDF )
- An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
- Itai Dinur and Tim Güneysu and Christof Paar and Adi Shamir and Ralf Zimmermann
-
2011/281 ( PDF )
- Computational Verifiable Secret Sharing Revisited
- Michael Backes and Aniket Kate and Arpita Patra
-
2011/280 ( PDF )
- DDH-like Assumptions Based on Extension Rings
- Ronald Cramer and Ivan Damgaard and Eike Kiltz and Sarah Zakarias and Angela Zottarel
-
2011/279 ( PDF )
- Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
- Craig Gentry and Shai Halevi
-
2011/278 ( PDF )
- Comparing Different Definitions of Secure Session
- Can Zhang
-
2011/277 ( PDF )
- Fully Homomorphic Encryption without Bootstrapping
- Zvika Brakerski and Craig Gentry and Vinod Vaikuntanathan
-
2011/276 ( PDF )
- Analysis of the SSH Key Exchange Protocol
- Stephen C. Williams
-
2011/275 ( PDF )
- Inverting the Square systems is exponential
- Jintai Ding
-
2011/274 ( -- withdrawn -- )
- A Splice-and-Cut Cryptanalysis of the AES
- Dmitry Khovratovich and Christian Rechberger
-
2011/273 ( PDF )
- Memory Delegation
- Kai-Min Chung and Yael Tauman Kalai and Feng-Hao Liu and Ran Raz
-
2011/272 ( PDF )
- Outsourcing Multi-Party Computation
- Seny Kamara and Payman Mohassel and Mariana Raykova
-
2011/271 ( PDF )
- Practical Key-recovery For All Possible Parameters of SFLASH
- Charles Bouillaguet and Pierre-Alain Fouque and Gilles Macario-Rat
-
2011/270 ( PDF )
- Programmable Hash Functions and Their Applications
- Dennis Hofheinz and Eike Kiltz
-
2011/269 ( PDF )
- Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
- Mihir Bellare and Sriram Keelveedhi
-
2011/268 ( PDF )
- Birthday Forgery Attack on 128-EIA3 Version 1.5
- Raja Zeshan Haider
-
2011/267 ( PDF )
- Mutual Private Set Intersection with Linear Complexity
- Myungsun Kim and Hyung Tae Lee and Jung Hee Cheon
-
2011/266 ( PDF )
- Identity-Based Decryption
- Daniel R. L. Brown
-
2011/265 ( PDF )
- Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol
- Qiushi Yang and Yvo Desmedt
-
2011/264 ( PDF )
- Round Optimal Blind Signatures
- Dominique Schröder and Dominique Unruh
-
2011/263 ( PDF )
- The Computational Square-Root Exponent Problem- Revisited
- Fangguo Zhang
-
2011/262 ( PDF )
- Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version
- Mohamed Ahmed Abdelraheem and Julia Borghoff and Erik Zenner
-
2011/261 ( PDF )
- OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
- Danilo Gligoroski and Rune Steinsmo Řdeĺrd and Rune Erlend Jensen
-
2011/260 ( PDF )
- Security \& Indistinguishability in the Presence of Traffic Analysis
- Cristina Onete and Daniele Venturi
-
2011/259 ( PDF )
- Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski
- Douglas R.~Stinson
-
2011/258 ( PDF )
- A High Speed Pairing Coprocessor Using RNS and Lazy Reduction
- Gavin Xiaoxu Yao and Junfeng Fan and Ray C.C. Cheung and Ingrid Verbauwhede
-
2011/257 ( PDF )
- Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
- Seung Geol Choi and Kyung-Wook Hwang and Jonathan Katz and Tal Malkin and Dan Rubenstein
-
2011/256 ( -- withdrawn -- )
- Leakage Resilient Secure Two-Party Computation
- Ivan Damgaard, Carmit Hazay and Arpita Patra
-
2011/255 ( PDF )
- Hiding the Policy in Cryptographic Access Control
- Sascha Müller and Stefan Katzenbeisser
-
2011/254 ( PDF )
- Using the Cloud to Determine Key Strengths
- T. Kleinjung and A.K. Lenstra and D. Page and N.P. Smart
-
2011/253 ( PDF )
- Attack Cryptosystems Based on HCDLP
- Mingqiang Wang and Xiaoyun Wang and Tao Zhan
-
2011/252 ( PDF )
- Cryptography Secure Against Related-Key Attacks and Tampering
- Mihir Bellare and David Cash and Rachel Miller
-
2011/251 ( PDF )
- Concurrently Secure Computation in Constant Rounds
- Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai
-
2011/250 ( PDF )
- A Parallel Repetition Theorem for Leakage Resilience
- Zvika Brakerski and Yael Tauman Kalai
-
2011/249 ( -- withdrawn -- )
- Breaking a certificateless key agreement protocol withour bilinear pairing
- W. Han
-
2011/248 ( PDF )
- Fast Password Recovery Attack: Application to APOP
- Fanbao Liu and Yi Liu and Tao Xie and Yumeng Feng
-
2011/247 ( PDF )
- An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2
- Qi Chai, Xinxin Fan, Guang Gong
-
2011/246 ( PDF )
- A Framework for Secure Single Sign-On
- Bernardo Machado David and Anderson C. A. Nascimento and Rafael Tonicelli
-
2011/245 ( PDF )
- On the Number of Carries Occuring in an Addition $\mod 2^k-1$
- Jean-Pierre Flori and Hugues Randriam
-
2011/244 ( PDF )
- PRISM -- Privacy-Preserving Search in MapReduce
- Erik-Oliver Blass and Roberto Di Pietro and Refik Molva and Melek Onen
-
2011/243 ( PDF )
- Affine Pairings on ARM
- Tolga Acar and Kristin Lauter and Michael Naehrig and Daniel Shumow
-
2011/242 ( PDF )
- Cryptanalysis of KeeLoq code-hopping using a Single FPGA
- Idan Sheetrit and Avishai Wool
-
2011/241 ( PDF )
- A Novel Adaptive Proactive Secret Sharing without a Trusted Party
- Xiuqun Wang
-
2011/240 ( PDF )
- Universal Composability from Essentially Any Trusted Setup
- Mike Rosulek
-
2011/239 ( PDF )
- Efficient Software Implementations of Modular Exponentiation
- Shay Gueron
-
2011/238 ( PDF )
- Attacks On a Double Length Blockcipher-based Hash Proposal
- Yiyuan Luo, Xuejia Lai
-
2011/237 ( PDF )
- The block cipher NSABC (public domain)
- Alice Nguyenova-Stepanikova and Tran Ngoc Duong
-
2011/236 ( PDF )
- Using Templates to Distinguish Multiplications from Squaring Operations
- Neil Hanley and Michael Tunstall and William P. Marnane
-
2011/235 ( PDF )
- Computer-Aided Decision-Making with Trust Relations and Trust Domains (Cryptographic Applications)
- Simon Kramer and Rajeev Goré and Eiji Okamoto
-
2011/234 ( PDF )
- Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
- Debiao He
-
2011/233 ( PDF )
- Correlated-Input Secure Hash Functions
- Vipul Goyal and Adam O'Neill and Vanishree Rao
-
2011/232 ( PDF )
- Remote Timing Attacks are Still Practical
- Billy Bob Brumley and Nicola Tuveri
-
2011/231 ( PDF )
- History-Free Sequential Aggregate Signatures
- Marc Fischlin and Anja Lehmann and Dominique Schröder
-
2011/230 ( PDF )
- All-But-Many Lossy Trapdoor Functions
- Dennis Hofheinz
-
2011/229 ( PDF )
- Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
- Md. Golam Kaosar
-
2011/228 ( PDF )
- A Framework for Practical Universally Composable Zero-Knowledge Protocols
- Jan Camenisch and Stephan Krenn and Victor Shoup
-
2011/227 ( PDF )
- Robust parent-identifying codes and combinatorial arrays
- Alexander Barg and Grigory Kabatiansky
-
2011/226 ( PDF )
- Substitution-permutation networks, pseudorandom functions, and Natural Proofs
- Eric Miles and Emanuele Viola
-
2011/225 ( PDF )
- A Simple and Efficient New Group Key Management Approach Based on Linear Geometry
- Shaohua Tang and Jintai Ding and Yujun Liang
-
2011/224 ( PDF )
- Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme
- Xu An Wang and Liqiang Wu and Xiaoyuan Yang and Huaqun Wang
-
2011/223 ( PDF )
- A Perfectly Binding Commitment Scheme Against Quantum Attacks
- Zeng Bing and Chen Liang and Tang Xueming
-
2011/222 ( PDF )
- Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations
- Kyle Brogle and Sharon Goldberg and Leonid Reyzin
-
2011/221 ( PDF )
- Protecting Drive Encryption Systems Against Memory Attacks
- Leo Dorrendorf
-
2011/220 ( PDF )
- Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks
- István Vajda
-
2011/219 ( PDF )
- On the Security of TLS-DHE in the Standard Model
- Tibor Jager, Florian Kohlar, Sven Schäge, and Jörg Schwenk
-
2011/218 ( PDF )
- Cryptographic Analysis of All 4 x 4 - Bit S-Boxes
- Markku-Juhani O. Saarinen
-
2011/217 ( PDF )
- Identity Based Deterministic Signature Scheme Without Forking-Lemma
- S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
-
2011/216 ( PDF )
- Provably Secure Group Key Management Approach Based upon Hyper-sphere
- Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang
-
2011/215 ( PDF )
- Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
- M. Barbosa and P. Farshim
-
2011/214 ( PDF )
- On ``identities'', ``names'', ``NAMES'', ``ROLES'' and Security: A Manifesto
- Charles Rackoff
-
2011/213 ( PDF )
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
- M.R. Albrecht and P. Farshim and K.G. Paterson and G.J. Watson
-
2011/212 ( PDF )
- Maiorana-McFarland Functions with High Second-Order Nonlinearity
- Nicholas Kolokotronis and Konstantinos Limniotis
-
2011/211 ( PDF )
- Security Evaluation of GOST 28147-89 In View Of International Standardisation
- Nicolas T. Courtois
-
2011/210 ( PDF )
- The preimage security of double-block-length compression functions
- Jooyoung Lee and Martijn Stam and John Steinberger
-
2011/209 ( PDF )
- Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
- Zvika Brakerski and Gil Segev
-
2011/208 ( PS PS.GZ PDF )
- Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy
- Jian Weng and Yunlei Zhao
-
2011/207 ( PDF )
- Proofs of Ownership in Remote Storage Systems
- Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
-
2011/206 ( PDF )
- Isomorphism classes of Edwards curves over finite fields
- R. Farashahi and D. Moody and H. Wu
-
2011/205 ( PDF )
- Group-oriented ring signature
- Chunbo Ma and Jun Ao
-
2011/204 ( PDF )
- Leakage Tolerant Interactive Protocols
- Nir Bitansky and Ran Canetti and Shai Halevi
-
2011/203 ( PS PS.GZ PDF )
- Key agreement based on homomorphisms of algebraic structures
- Juha Partala
-
2011/202 ( PDF )
- Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
- Markku-Juhani O. Saarinen
-
2011/201 ( PDF )
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
- Lei Wei and Christian Rechberger and Jian Guo and Hongjun Wu and Huaxiong Wang and San Ling
-
2011/200 ( PDF )
- Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version)
- Georg Neugebauer and Ulrike Meyer and Susanne Wetzel
-
2011/199 ( PDF )
- An efficient deterministic test for Kloosterman sum zeros
- Omran Ahmadi and Robert Granger
-
2011/198 ( PDF )
- Terminating BKZ
- Guillaume Hanrot and Xavier Pujol and Damien Stehlé
-
2011/197 ( PDF )
- Public Key Encryption for the Forgetful
- Puwen Wei and Yuliang Zheng and Xiaoyun Wang
-
2011/196 ( PDF )
- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware
- Ye Zhang and Chun Jason Xue and Duncan S. Wong and Nikos Mamoulis and S.M. Yiu
-
2011/195 ( -- withdrawn -- )
- An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
- Debiao He, Yitao Chen
-
2011/194 ( PS PS.GZ PDF )
- Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol
- Masoumeh Safkhani, Nasour Bagheri and Majid Naderi
-
2011/193 ( PDF )
- Security Analysis of $LMAP^{++}$, an RFID Authentication Protocol
- Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, and Somitra Kumar Sanadhya
-
2011/192 ( PDF )
- Short and Efficient Certificate-Based Signature
- Joseph K. Liu and Feng Bao and Jianying Zhou
-
2011/191 ( PDF )
- On the Security of the Winternitz One-Time Signature Scheme
- Johannes Buchmann and Erik Dahmen and Sarah Ereth and Andreas Hülsing and Markus Rückert
-
2011/190 ( PDF )
- SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS
- Peng Xu and Hai Jin
-
2011/189 ( PDF )
- SIMPL Systems as a Keyless Cryptographic and Security Primitive
- Ulrich Rührmair
-
2011/188 ( PDF )
- Physical Turing Machines and the Formalization of Physical Cryptography
- Ulrich Rührmair
-
2011/187 ( PDF )
- Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation
- Hyung Tae Lee and Jung Hee Cheon and Jin Hong
-
2011/186 ( -- withdrawn -- )
- Some aspects of multi-variable secret sharing
- Umadevi Ganugula and Prabal Paul
-
2011/185 ( PDF )
- Efficient and Secure Data Storage Operations for Mobile Cloud Computing
- Zhibin Zhou and Dijiang Huang
-
2011/184 ( PDF )
- Fortification of AES with Dynamic Mix-Column Transformation
- Ghulam Murtaza and Azhar Ali Khan and Syed Wasi Alam and Aqeel Farooqi
-
2011/183 ( -- withdrawn -- )
- Elliptic Curve Point Multiplication Using MBNR and Point Halving
- G.N.Purohit, Asmita SIngh Rawat
-
2011/182 ( PDF )
- Designated Confirmer Signatures With Unified Verification
- Guilin Wang, Fubiao Xia, and Yunlei Zhao
-
2011/181 ( PS PS.GZ PDF )
- Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack
- Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury
-
2011/180 ( PDF )
- Highly-Efficient Universally-Composable Commitments based on the DDH Assumption
- Yehuda Lindell
-
2011/179 ( PDF )
- Compact McEliece keys based on Quasi-Dyadic Srivastava codes
- Edoardo Persichetti
-
2011/178 ( PDF )
- Differential Fault Analysis of AES: Toward Reducing Number of Faults
- Chong Hee KIM
-
2011/177 ( PDF )
- Dynamic MDS Matrices for Substantial Cryptographic Strength
- Muhammad Yasir Malik and Jong-Seon No
-
2011/176 ( PDF )
- A FPGA pairing implementation using the Residue Number System
- Sylvain Duquesne and Nicolas Guillermin
-
2011/175 ( PDF )
- Analysis of reduced-SHAvite-3-256 v2
- Marine Minier, Maria Naya-Plasencia, and Thomas Peyrin
-
2011/174 ( PDF )
- On-line secret sharing
- Laszlo Csirmaz and Gabor Tardos
-
2011/173 ( -- withdrawn -- )
- An efficient certificateless short signature scheme from pairings
- Debiao He, Jianhua Chen
-
2011/172 ( PDF )
- The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- T.V. Laptyeva and S. Flach and K. Kladko
-
2011/171 ( PDF )
- On lower bounds on second--order nonliearities of bent functions obtained by using Niho power functions
- Manish Garg and Sugata Gangopadhyay
-
2011/170 ( PDF )
- Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication
- Jonathan Taverne and Armando Faz-Hernández and Diego F. Aranha and Francisco Rodríguez-Henríquez and Darrel Hankerson and Julio López
-
2011/169 ( PDF )
- Identity-Based Cryptography for Cloud Security
- Hongwei Li, Yuanshun Dai, Bo Yang
-
2011/168 ( PDF )
- A Commitment-Consistent Proof of a Shuffle
- Douglas Wikström
-
2011/167 ( PDF )
- Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach
- Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin
-
2011/166 ( PDF )
- Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance
- Jeremy Clark and Urs Hengartner
-
2011/165 ( PDF )
- Improved Side Channel Cube Attacks on PRESENT
- XinJie Zhao and Tao Wang and ShiZe Guo
-
2011/164 ( PDF )
- On the relation between the MXL family of algorithms and Gröbner basis algorithms
- Martin Albrecht and Carlos Cid and Jean-Charles Faugčre and Ludovic Perret
-
2011/163 ( -- withdrawn -- )
- Improved Integral Attacks on Reduced Round Camellia
- Yanjun Li, Wenling Wu, Liting Zhang and Lei Zhang
-
2011/162 ( PDF )
- Collision Timing Attack when Breaking 42 AES ASIC Cores
- Amir Moradi and Oliver Mischke and Christof Paar
-
2011/161 ( PDF )
- Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes
- Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Francisco Rodriguez-Henriquez and Palash Sarkar
-
2011/160 ( PDF )
- Cryptanalysis of ARMADILLO2
- Mohamed Ahmed Abdelraheem and Céline Blondeau and María Naya-Plasencia and Marion Videau and Erik Zenner
-
2011/159 ( -- withdrawn -- )
- The Block Cipher Thuca
- Isaiah Makwakwa
-
2011/158 ( PDF )
- Enhancing Data Privacy in the Cloud
- Yanbin Lu and Gene Tsudik
-
2011/157 ( PDF )
- Secure Computation on the Web: Computing without Simultaneous Interaction
- Shai Halevi and Yehuda Lindell and Benny Pinkas
-
2011/156 ( PDF )
- Strong Forward Security in Identity-Based Signcryption
- Madeline González Muńiz and Peeter Laud
-
2011/155 ( -- withdrawn -- )
- High-speed Hardware Implementation of Rainbow Signatures on FPGAs
- Shaohua Tang and Haibo Yi and Huan Chen and Guomin Chen and Jintai Ding
-
2011/154 ( -- withdrawn -- )
- The Block Cipher Vuna
- Isaiah Makwakwa
-
2011/153 ( PDF )
- Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices
- Jingguo Bi and Qi Cheng
-
2011/152 ( PDF )
- A Practical Application of Differential Privacy to Personalized Online Advertising
- Yehuda Lindell and Eran Omri
-
2011/151 ( PDF )
- Direct Exponent and Scalar Multiplication Classes of an MDS Matrix
- Murtaza, G. and Ikram, N.
-
2011/150 ( PDF )
- A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
- Jue-Sam Chou*1, Cheng-Lun Wu 2, Yalin Chen 3
-
2011/149 ( PDF )
- Generic Side-Channel Distinguishers: Improvements and Limitations
- Nicolas Veyrat-Charvillon and François-Xavier Standaert
-
2011/148 ( PDF )
- Near-Collision Attack on the Step-Reduced Compression Function of Skein-256
- Hongbo Yu and Jiazhe Chen and Ketingjia and Xiaoyun Wang
-
2011/147 ( PS PS.GZ PDF )
- The Optimal Linear Secret Sharing Scheme for Any Given Access Structure
- Tang Chunming, Gao Shuhong, Zhang Chengli
-
2011/146 ( PDF )
- ECDLP on GPU
- Lei Xu and Dongdai Lin and Jing Zou
-
2011/145 ( -- withdrawn -- )
- Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA{\beta}-cryptosystem
- M.R.K.Ariffin and N.A.Abu
-
2011/144 ( -- withdrawn -- )
- Deniable Encryption from the McEliece Assumptions
- Bernardo M. David and Anderson C. A. Nascimento
-
2011/143 ( PDF )
- Computing $(\ell,\ell)$-isogenies in polynomial time on Jacobians of genus~$2$ curves
- Romain Cosset and Damien Robert
-
2011/142 ( -- withdrawn -- )
- A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2^n)
- Haibo Yi and Shaohua Tang and Huan Chen and Guomin Chen
-
2011/141 ( PDF )
- Fast and Private Computation of Cardinality of Set Intersection and Union
- Emiliano De Cristofaro and Paolo Gasti and Gene Tsudik
-
2011/140 ( PDF )
- Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
- Martin Ĺgren
-
2011/139 ( PDF )
- Shortest Lattice Vectors in the Presence of Gaps
- Mingjie Liu and Xiaoyun Wang and Guangwu Xu and Xuexin Zheng
-
2011/138 ( PS PS.GZ PDF )
- Constant-Round Privacy Preserving Multiset Union
- Jeongdae Hong and Jung Woo Kim and Jihye Kim and Kunsoo Park and Jung Hee Cheon
-
2011/137 ( PDF )
- Towards a Game Theoretic View of Secure Computation
- Gilad Asharov and Ran Canetti and Carmit Hazay
-
2011/136 ( PDF )
- A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
- Gilad Asharov and Yehuda Lindell
-
2011/135 ( PDF )
- On isogeny classes of Edwards curves over finite fields
- Omran Ahmadi and Robert Granger
-
2011/134 ( PS PS.GZ PDF )
- Differentially Private Billing with Rebates
- George Danezis and Markulf Kohlweiss and Alfredo Rial
-
2011/133 ( PS PS.GZ PDF )
- Fully Homomorphic SIMD Operations
- N.P. Smart and F. Vercauteren
-
2011/132 ( PDF )
- Verifiable Delegation of Computation over Large Datasets
- Siavosh Benabbas and Rosario Gennaro and Yevgeniy Vahlis
-
2011/131 ( PDF )
- Trapdoor oneway functions associated with exponentiation
- Virendra Sule
-
2011/130 ( PS PS.GZ PDF )
- Ergodic Theory Over ${\F}_2[[T]]$
- Dongdai Lin, Tao Shi, and Zifeng Yang
-
2011/129 ( PDF )
- Distance Hijacking Attacks on Distance Bounding Protocols
- Cas Cremers and Kasper B. Rasmussen and Benedikt Schmidt and Srdjan Capkun
-
2011/128 ( -- withdrawn -- )
- The Ligo Block Cipher
- Isaiah Makwakwa
-
2011/127 ( PDF )
- Integer Arithmetic without Arithmetic Addition
- Gideon Samid
-
2011/126 ( PDF )
- The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
- Daniel Engels and Markku-Juhani O. Saarinen and Peter Schweitzer and Eric M. Smith
-
2011/125 ( PDF )
- A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)$\Sigma$PKC
- Masao KASAHARA
-
2011/124 ( PDF )
- A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I)
- Masao KASAHARA
-
2011/123 ( PDF )
- Linear Hulls with Correlation Zero and Linear Cryptanalysis of Block Ciphers
- Andrey Bogdanov and Vincent Rijmen
-
2011/122 ( PDF )
- Secure Multi-Party Sorting and Applications
- Kristján Valur Jónsson and Gunnar Kreitz and Misbah Uddin
-
2011/121 ( PDF )
- More Practical Fully Homomorphic Encryption
- Gu Chunsheng
-
2011/120 ( PDF )
- Faster 2-regular information-set decoding
- Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe
-
2011/119 ( -- withdrawn -- )
- Multiplicative Learning with Errors and Cryptosystems
- Gu Chunsheng
-
2011/118 ( PDF )
- New Fully Homomorphic Encryption over the Integers
- Gu Chunsheng
-
2011/117 ( PDF )
- Bounded Vector Signatures and their Applications
- Lei Wei and Scott E. Coull and Michael K. Reiter
-
2011/116 ( PDF )
- Short-output universal hash functions and their use in fast and secure message authentication
- Long Hoang Nguyen and Andrew William Roscoe
-
2011/115 ( PDF )
- Multiple Differential Cryptanalysis: Theory and Practice (Corrected)
- Céline Blondeau and Benoît Gérard
-
2011/114 ( PDF )
- Fully Homomorphic Encryption, Approximate Lattice Problem and LWE
- Gu Chunsheng
-
2011/113 ( PDF )
- Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
- Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik
-
2011/112 ( PDF )
- An efficient certificateless two-party authenticated key agreement scheme from pairings
- Debiao He, Jin Hu
-
2011/111 ( PDF )
- Generalizations of Bent Functions. A Survey
- Natalia Tokareva
-
2011/110 ( -- withdrawn -- )
- Fully Homomorphic Encryption over the Binary Polynomials
- Gu Chunsheng
-
2011/109 ( PDF )
- Secure Blind Decryption
- Matthew Green
-
2011/108 ( PDF )
- Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation
- Jannik Dreier and Florian Kerschbaum
-
2011/107 ( PDF )
- Threshold Encryption into Multiple Ciphertexts
- Martin Stanek
-
2011/106 ( PS PS.GZ PDF )
- Common Randomness and Secret Key Capacities of Two-way Channels
- Hadi Ahmadi and Reihaneh Safavi-Naini
-
2011/105 ( PDF )
- Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation
- S. Erickson and M. J. Jacobson, Jr. and A. Stein
-
2011/104 ( PDF )
- Unconditionally Secure Signature Schemes Revisited
- Colleen M. Swanson and Douglas R. Stinson
-
2011/103 ( PDF )
- Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
- István Vajda
-
2011/102 ( PDF )
- Optimal and Parallel Online Memory Checking
- Charalampos Papamanthou and Roberto Tamassia
-
2011/101 ( PDF )
- Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
- Liqun Chen and Kurt Dietrich and Hans Löhr and Ahmad-Reza Sadeghi and Christian Wachsmann and Johannes Winter
-
2011/100 ( PDF )
- A Novel Group Signature Scheme Based on MPKC
- Guangdong Yang and Shaohua Tang and Li Yang
-
2011/099 ( PDF )
- Can Code Polymorphism Limit Information Leakage?
- Antoine Amarilli and Sascha Müller and David Naccache and Daniel Page and Pablo Rauzy and Michael Tunstall
-
2011/098 ( PDF )
- Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields
- M. D. Velichka and M. J. Jacobson, Jr. and A. Stein
-
2011/097 ( PDF )
- Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture
- Shi Pu, Pu Duan, Jyh-Charn Liu
-
2011/096 ( PDF )
- Computing on Authenticated Data
- Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
-
2011/095 ( PDF )
- ALRED Blues: New Attacks on AES-Based MAC's
- Orr Dunkelman and Nathan Keller and Adi Shamir
-
2011/094 ( PS PS.GZ PDF )
- Graceful Degradation in Multi-Party Computation
- Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub
-
2011/093 ( PDF )
- Linear Cryptanalysis Using Multiple Linear Approximations
- Miia Hermelin and Kaisa Nyberg
-
2011/092 ( PS PS.GZ PDF )
- Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
- Akinori Kawachi and Christopher Portmann and Keisuke Tanaka
-
2011/091 ( PS PS.GZ PDF )
- A New Approach to Practical Active-Secure Two-Party Computation
- Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Sai Sheshank Burra
-
2011/090 ( PDF )
- Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes
- Yu Chen and Liqun Chen and Zhong Chen
-
2011/089 ( PDF )
- Octal Bent Generalized Boolean Functions
- Pantelimon Stanica and Thor Martinsen
-
2011/088 ( PS PS.GZ PDF )
- Leftover Hash Lemma, Revisited
- Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Francois-Xavier Standaert and Yu Yu
-
2011/087 ( PDF )
- On the Instantiability of Hash-and-Sign RSA Signatures
- Yevgeniy Dodis and Iftach Haitner and Aris Tentes
-
2011/086 ( PDF )
- Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher
- Xin-jie Zhao, Tao Wang, Shi-ze Guo
-
2011/085 ( -- withdrawn -- )
- Co-induction and Computational Semantics for Public-key Encryption with Key Cycles
- Mohammad Hajiabadi, Bruce M. Kapron
-
2011/084 ( PDF )
- Traitor Tracing against Public Collaboration (Full Version)
- Xingwen Zhao and Fangguo Zhang
-
2011/083 ( PDF )
- On the number of bent functions from iterative constructions: lower bounds and hypotheses
- Natalia Tokareva
-
2011/082 ( -- withdrawn -- )
- Does Pseudo-basis Extend to General Adversary?
- Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
-
2011/081 ( PDF )
- Secure Datastructures based on Multiparty Computation
- Tomas Toft
-
2011/080 ( PDF )
- Turbo Codes Can Be Asymptotically Information-Theoretically Secure
- Xiao Ma
-
2011/079 ( PDF )
- Identity-based Digital Signature Scheme Without Bilinear Pairings
- He Debiao, Chen Jianhua, Hu Jin
-
2011/078 ( PDF )
- A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
- Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
-
2011/077 ( PDF )
- DPA Leakage Evaluation and Countermeasure Plug-in
- Tang Ming and Wang Xiaorong and Qiu Zhenlong and Gao Si and Zhang Huanguo and Wu Qianhong
-
2011/076 ( PDF )
- A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
- Maura B. Paterson and Douglas R. Stinson
-
2011/075 ( -- withdrawn -- )
- A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
- Suleyman Kardas and Mehmet Sabir Kiraz and Muhammed Ali Bingol and Huseyin Demirci
-
2011/074 ( PDF )
- Really fast syndrome-based hashing
- Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe
-
2011/073 ( PDF )
- Cryptanalysis of three matrix-based key establishment protocols
- Simon R. Blackburn, Carlos Cid and Ciaran Mullan
-
2011/072 ( PDF )
- AES Variants Secure Against Related-Key Differential and Boomerang Attacks
- Jiali Choy and Aileen Zhang and Khoongming Khoo and Matt Henricksen and Axel Poschmann
-
2011/071 ( PDF )
- Information-theoretic Bounds for Differentially Private Mechanisms
- Gilles Barthe and Boris Köpf
-
2011/070 ( PDF )
- Rational authentication protocols
- Long H. Nguyen
-
2011/069 ( PDF )
- Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security
- Chao Ning and Qiuliang Xu
-
2011/068 ( PS PS.GZ PDF )
- Rational Secret Sharing with Honest Players over an Asynchronous Channel
- William K. Moses Jr. and C. Pandu Rangan
-
2011/067 ( PDF )
- On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves
- Simon R. Blackburn, Alina Ostafe and Igor E. Shparlinski
-
2011/066 ( PDF )
- Deniable Encryption with Negligible Detection Probability: An Interactive Construction
- Markus Duermuth and David Mandell Freeman
-
2011/065 ( PDF )
- Fully Simulatable Quantum-Secure Coin-Flipping and Applications
- Carolin Lunemann and Jesper Buus Nielsen
-
2011/064 ( PDF )
- Cryptographic Treatment of Private User Profiles
- Felix Günther and Mark Manulis and Thorsten Strufe
-
2011/063 ( PS PS.GZ PDF )
- Secret Keys from Channel Noise
- Hadi Ahmadi and Reihaneh Safavi-Naini
-
2011/062 ( PDF )
- Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication
- Swapnoneel Roy and Amlan K Das and Yu Li
-
2011/061 ( PS PS.GZ PDF )
- Cryptanalysis of Some Protocols for RFID Systems
- Masoumeh Safkhani, Majid Naderi, Nasour Bagheri and Somitra Kumar Sanadhya
-
2011/060 ( PDF )
- A Group Signature Scheme from Lattice Assumptions
- S. Dov Gordon and Jonathan Katz and Vinod Vaikuntanathan
-
2011/059 ( PDF )
- Extending Baby-step Giant-step algorithm for FACTOR problem
- Martin Stanek
-
2011/058 ( PDF )
- Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
- Jean-Sébastien Coron and Aline Gouget and Thomas Icart and Pascal Paillier
-
2011/057 ( PDF )
- Another Look at RSA Signatures With Affine Padding
- Jean-Sébastien Coron and David Naccache and Mehdi Tibouchi
-
2011/056 ( PDF )
- Spectral Coherence Analysis - First Experimental Results -
- Amine Dehbaoui and Sébastien Tiran and Philippe Maurine and François-Xavier Standaert and Nicolas Veyrat-Charvillon
-
2011/055 ( PDF )
- On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC
- Dongdai Lin and Jean-Charles Faugere and Ludovic Perret and Tianze Wang
-
2011/054 ( -- withdrawn -- )
- Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary
- Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
-
2011/053 ( PDF )
- Adaptive Pseudo-Free Groups and Applications
- Dario Catalano and Dario Fiore and Bogdan Warinschi
-
2011/052 ( PS PS.GZ PDF )
- Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
- Alex Escala and Javier Herranz and Paz Morillo
-
2011/051 ( -- withdrawn -- )
- Towards Strong Adaptive Corruption Security of Authenticated Key Exchange
- Zheng Yang
-
2011/050 ( -- withdrawn -- )
- Authenticated Key Exchange with Synchronized State
- Zheng Yang
-
2011/049 ( PDF )
- Unbounded HIBE and Attribute-Based Encryption
- Allison Lewko and Brent Waters
-
2011/048 ( PDF )
- A non-Abelian factorization problem and an associated cryptosystem
- Srinath Baba, Srinivas Kotyad and Raghu Teja
-
2011/047 ( PDF )
- Constructing differential 4-uniform permutations from know ones
- Yuyin Yu and Mingsheng Wang and Yongqiang Li
-
2011/046 ( PDF )
- Lower and Upper Bounds for Deniable Public-Key Encryption
- Rikke Bendlin and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi
-
2011/045 ( PDF )
- Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
- Farshid Farhat, Somayeh Salimi, Ahmad Salahi
-
2011/044 ( PDF )
- Fast Scalar Multiplication in ECC using The Multi base Number System.
- G. N. Purohit , Asmita Singh Rawat
-
2011/043 ( PDF )
- Proxy Blind Multi-signature Scheme using ECC for handheld devices
- Jayaprakash Kar
-
2011/042 ( PDF )
- Computing endomorphism rings of elliptic curves under the GRH
- Gaetan Bisson
-
2011/041 ( PS PS.GZ PDF )
- Reclaiming Privacy for Smartphone Applications (Revised Version)
- Emiliano De Cristofaro and Anthony Durussel and Imad Aad
-
2011/040 ( PDF )
- Simple and Exact Formula for Minimum Loop Length in Ate_i Pairing based on Brezing-Weng Curves
- Hoon Hong, Eunjeong Lee, Hyang-Sook Lee and Cheol-Min Park
-
2011/039 ( PDF )
- Fast Quadrupling of a Point in Elliptic Curve Cryptography
- Duc-Phong Le
-
2011/038 ( PDF )
- Cold Boot Key Recovery by Solving Polynomial Systems with Noise
- Martin Albrecht and Carlos Cid
-
2011/037 ( PDF )
- Higher-Order Differential Attack on Reduced SHA-256
- Mario Lamberger and Florian Mendel
-
2011/036 ( -- withdrawn -- )
- The Complexity Analysis of the MutantXL Family
- Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann
-
2011/035 ( PDF )
- A New Family of Implicitly Authenticated Diffie-Hellman Protocols
- Andrew C. Yao and Yunlei Zhao
-
2011/034 ( PDF )
- Secure Authentication from a Weak Key, Without Leaking Information
- Niek J. Bouman and Serge Fehr
-
2011/033 ( PS PS.GZ PDF )
- The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations
- Jean-Marc Couveignes and Jean-Gabriel Kammerer
-
2011/032 ( PDF )
- Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
- Piotr Mroczkowski and Janusz Szmidt
-
2011/031 ( PDF )
- Efficient Unconditional Asynchronous Byzantine Agreement with Optimal Resilience
- Ashish Choudhury and Arpita Patra
-
2011/030 ( PS PS.GZ PDF )
- Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains
- Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai
-
2011/029 ( PS PS.GZ PDF )
- Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs
- Benjamin Gittins
-
2011/028 ( PDF )
- The Parazoa Family: Generalizing the Sponge Hash Functions
- Elena Andreeva and Bart Mennink and Bart Preneel
-
2011/027 ( PDF )
- Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
- Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
-
2011/026 ( PDF )
- Private Discovery of Common Social Contacts
- Emiliano De Cristofaro and Mark Manulis and Bertram Poettering
-
2011/025 ( PDF )
- Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
- Mihaela Ion and Giovanni Russello and Bruno Crispo
-
2011/024 ( PDF )
- Secure evaluation of polynomial using privacy ring homomorphisms
- Alexander Rostovtsev, Alexey Bogdanov and Mikhail Mikhaylov
-
2011/023 ( PDF )
- Improved zero-sum distinguisher for full round Keccak-f permutation
- Ming Duan and Xuajia Lai
-
2011/022 ( PDF )
- Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT
- Farzaneh Abazari and Babak Sadeghian
-
2011/021 ( PDF )
- Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Jae Hong Seo and Jung Hee Cheon
-
2011/020 ( PDF )
- Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over $\F_{p^6}$
- Antoine Joux and Vanessa Vitse
-
2011/019 ( PDF )
- Collision Resistance of the JH Hash Function
- Jooyoung Lee and Deukjo Hong
-
2011/018 ( PDF )
- Homomorphic Signatures for Polynomial Functions
- Dan Boneh and David Mandell Freeman
-
2011/017 ( PDF )
- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
- Jiazhe Chen and Keting Jia and Hongbo Yu and Xiaoyun Wang
-
2011/016 ( PDF )
- An Anonymous Health Care System
- Melissa Chase and Kristin Lauter
-
2011/015 ( -- withdrawn -- )
- Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey
- Jean-Philippe Aumasson
-
2011/014 ( PDF )
- Unconditionally Reliable Message Transmission in Directed Neighbour Networks
- Shashank Agrawal and Abhinav Mehta and Kannan Srinathan
-
2011/013 ( PDF )
- Secure Message Transmission In Asynchronous Directed Networks
- Shashank Agrawal and Abhinav Mehta and Kannan Srinathan
-
2011/012 ( PDF )
- Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption
- Jens Groth
-
2011/011 ( PDF )
- After-the-Fact Leakage in Public-Key Encryption
- Shai Halevi and Huijia Lin
-
2011/010 ( PDF )
- Structured Encryption and Controlled Disclosure
- Melissa Chase and Seny Kamara
-
2011/009 ( PDF )
- Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
- Helger Lipmaa
-
2011/008 ( PDF )
- Computing Elliptic Curve Discrete Logarithms with the Negation Map
- Ping Wang and Fangguo Zhang
-
2011/007 ( PDF )
- KISS: A Bit Too Simple
- Greg Rose
-
2011/006 ( PDF )
- Exploring the Limits of Common Coins Using Frontier Analysis of Protocols
- Hemanta K. Maji and Pichayoot Ouppaphan and Manoj Prabhakaran and Mike Rosulek
-
2011/005 ( PDF )
- Is privacy compatible with truthfulness?
- David Xiao
-
2011/004 ( PDF )
- A low-memory algorithm for finding short product representations in finite groups
- Gaetan Bisson and Andrew V. Sutherland
-
2011/003 ( PDF )
- On the correct use of the negation map in the Pollard rho method
- Daniel J. Bernstein and Tanja Lange and Peter Schwabe
-
2011/002 ( PDF )
- A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version)
- Gunnar Kreitz
-
2011/001 ( PDF )
- Practical Frameworks For $h$-Out-Of-$n$ Oblivious Transfer With Security Against Covert and Malicious Adversaries
- Zeng Bing and Tang Xueming and Xu Peng and Jing Jiandu
-
2010/661 ( PDF )
- Security Evaluation of MISTY Structure with SPN Round Function
- Ruilin Li and Chao Li and Jinshu Su and Bing Sun
-
2010/660 ( PDF )
- Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches
- Brian J. Matt
-
2010/659 ( PDF )
- Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation
- Mark Manulis and Bertram Poettering
-
2010/658 ( PDF )
- ABC - A New Framework for Block Ciphers
- Uri Avraham and Eli Biham and Orr Dunkelman
-
2010/657 ( PDF )
- On small secret key attack against RSA with high bits known prime factor
- Yasufumi Hashimoto
-
2010/656 ( PDF )
- A Note on Constant-Round Zero-Knowledge Proofs of Knowledge
- Yehuda Lindell
-
2010/655 ( PS PS.GZ PDF )
- On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings
- İsa Sertkaya and Ali Doğanaksoy
-
2010/654 ( PDF )
- Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version)
- Daniel Kraschewski and Jörn Müller-Quade
-
2010/653 ( PDF )
- Cubic groups
- M.A.Popov
-
2010/652 ( PDF )
- Active Domain Expansion for Normal Narrow-pipe Hash Functions
- Xigen Yao
-
2010/651 ( PDF )
- On the Impossibility of Instantiating PSS in the Standard Model
- Rishiraj Bhattacharyya and Avradip Mandal
-
2010/650 ( PDF )
- Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
- Jean-Sebastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi
-
2010/649 ( PDF )
- Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
- Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Gonzalez Nieto
-
2010/648 ( PDF )
- Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations
- Dario Fiore and Dominique Schröder
-
2010/647 ( PDF )
- Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem
- Xiaoyun Wang and Mingjie Liu and Chengliang Tian and Jingguo Bi
-
2010/646 ( PDF )
- Statistical Analysis of Second Order Differential Power Analysis
- Emmanuel Prouff and Matthieu Rivain and Régis Bévan
-
2010/645 ( PDF )
- A Timed Logic for Modeling and Reasoning about Security Protocols
- Xinfeng Lei and Rui Xue and Ting Yu
-
2010/644 ( PDF )
- A Practical Platform for Cube-Attack-like Cryptanalyses
- Bo Zhu and Wenye Yu and Tao Wang
-
2010/643 ( PDF )
- Construct MD5 Collisions Using Just A Single Block Of Message
- Tao Xie and Dengguo Feng
-
2010/642 ( PDF )
- More Insights on Blockcipher-Based Hash Functions
- Yiyuan Luo, Xuejia Lai
-
2010/641 ( PDF )
- A new algorithm for computing Groebner bases
- Shuhong Gao and Frank Volny IV and Mingsheng Wang
-
2010/640 ( PS PS.GZ PDF )
- Short collusion-secure fingerprint codes against three pirates
- Koji Nuida
-
2010/639 ( -- withdrawn -- )
- Enumerating Results of Homogeneous Rotation over $GF(p)$
- Guang-Pu Go, Xi-Yong Zhang, and Wen-Fen Liu
-
2010/638 ( PDF )
- One-Pass HMQV and Asymmetric Key-Wrapping
- Shai Halevi and Hugo Krawczyk
-
2010/637 ( PDF )
- Breaking An Identity-Based Encryption Scheme based on DHIES
- Martin R. Albrecht and Kenneth G. Paterson
-
2010/636 ( PS PS.GZ PDF )
- Differential Fault Analysis of AES using a Single Multiple-Byte Fault
- Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall
-
2010/635 ( -- withdrawn -- )
- An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme based on Symmetric Bivariate Polynomials
- Zhang Yun and Christophe Tartary
-
2010/634 ( PDF )
- ROTIV: RFID Ownership Transfer with Issuer Verification
- Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
-
2010/633 ( PDF )
- Low Data Complexity Attacks on AES
- Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Nathan Keller and Vincent Rijmen and Pierre-Alain Fouque
-
2010/632 ( PDF )
- Efficient and provably-secure certificateless signature scheme without bilinear pairings
- He Debiao, Chen Jianhua, Zhang Rui
-
2010/631 ( PDF )
- Black-box property of Cryptographic Hash Functions
- Michal Rjaško
-
2010/630 ( PDF )
- Divison Polynomials for Alternate Models of Elliptic Curves
- Dustin Moody
-
2010/629 ( PDF )
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- Donghoon Chang and Mridul Nandi and Moti Yung
-
2010/628 ( PDF )
- State convergence and keyspace reduction of the Mixer stream cipher
- Sui-Guan Teo and Kenneth Koon-Ho Wong and Leonie Simpson and Ed Dawson
-
2010/627 ( PS PS.GZ PDF )
- Secure and Efficient Protocols for Iris and Fingerprint Identification
- Marina Blanton and Paolo Gasti
-
2010/626 ( PDF )
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
- Peng Xu and Hai Jin
-
2010/625 ( PDF )
- Attacking and fixing Helios: An analysis of ballot secrecy
- Veronique Cortier and Ben Smyth
-
2010/624 ( PDF )
- No-leak authentication by the Sherlock Holmes method
- Dima Grigoriev and Vladimir Shpilrain
-
2010/623 ( PDF )
- Cryptanalysis of Skein
- Daniel J. Bernstein and Tanja Lange
-
2010/622 ( PDF )
- A new result on the distinctness of primitive sequences over Z(pq) modulo 2
- Qunxiong Zheng and Wenfeng Qi
-
2010/621 ( PDF )
- Generic Compilers for Authenticated Key Exchange (Full Version)
- Tibor Jager and Florian Kohlar and Sven Schäge and Jörg Schwenk
-
2010/620 ( -- withdrawn -- )
- Identity-based Digital Signature Scheme Without Bilinear Pairings
- He Debiao, Chen Jianhua, Hu Jin
-
2010/619 ( PDF )
- Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption
- Yang Lu
-
2010/618 ( PDF )
- A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3
- Thomas Fuhr and Henri Gilbert and Jean-René Reinhard and Marion Videau
-
2010/617 ( PDF )
- Computing Discrete Logarithms in an Interval
- Steven D. Galbraith and John M. Pollard and Raminder S. Ruprai
-
2010/616 ( PDF )
- A non-uniform birthday problem with applications to discrete logarithms
- Steven D. Galbraith and Mark Holmes
-
2010/615 ( PDF )
- Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval
- Steven D. Galbraith and Raminder S. Ruprai
-
2010/614 ( PDF )
- An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
- Simon Hoerder and Marcin Wojcik and Stefan Tillich and Dan Page
-
2010/613 ( PDF )
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Richard Lindner and Chris Peikert
-
2010/612 ( -- withdrawn -- )
- Cryptanalysis of Hummingbird-1
- Markku-Juhani O. Saarinen
-
2010/611 ( PDF )
- Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates
- Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak
-
2010/610 ( PDF )
- Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions
- Craig Gentry and Daniel Wichs
-
2010/609 ( PS PS.GZ PDF )
- The Round Complexity of General VSS
- Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
-
2010/608 ( PDF )
- A New Model of Binary Elliptic Curves with Fast Arithmetic
- Hongfeng Wu, Chunming Tang and Rongquan Feng
-
2010/607 ( PDF )
- How to Improve Rebound Attacks
- María Naya-Plasencia
-
2010/606 ( PDF )
- Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
- He Debiao,Chen Jianhua, Hu Jin
-
2010/605 ( PDF )
- A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
- Tzipora Halevi and Nitesh Saxena
-
2010/604 ( PS PS.GZ PDF )
- On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
- Shangwei Zhao,Ruyong Feng and Xiao-Shan Gao
-
2010/603 ( PDF )
- Cryptanalysis of Dual CRT-RSA
- Santanu Sarkar and Subhamoy Maitra
-
2010/602 ( PDF )
- An Improved Algebraic Attack on Hamsi-256
- Itai Dinur and Adi Shamir
-
2010/601 ( PDF )
- Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic
- Lei Li and Siman Yang
-
2010/600 ( PDF )
- Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
- Anne Broadbent and Stacey Jeffery and Alain Tapp
-
2010/599 ( PS PS.GZ PDF )
- Secure Multiparty Computation with Partial Fairness
- Amos Beimel, Eran Omri, and Ilan Orlov
-
2010/598 ( PDF )
- A Broadcast Attack against NTRU Using Ding's Algorithm
- Yanbin Pan, Yingpu Deng
-
2010/597 ( PDF )
- A New Class of Bent--Negabent Boolean Functions
- Sugata Gangopadhyay and Ankita Chaturvedi
-
2010/596 ( PDF )
- Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL
- Enrico Thomae and Christopher Wolf
-
2010/595 ( PDF )
- Attribute-Based Signatures
- Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
-
2010/594 ( PDF )
- Cache Games - Bringing Access Based Cache Attacks on AES to Practice
- Endre Bangerter and David Gullasch and Stephan Krenn
-
2010/593 ( PDF )
- Differential Attack on Five Rounds of the SC2000 Block Cipher
- Jiqiang Lu
-
2010/592 ( -- withdrawn -- )
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Richard Lindner and Chris Peikert
-
2010/591 ( PDF )
- Bonsai Trees, or How to Delegate a Lattice Basis
- David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert
-
2010/590 ( PDF )
- Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
- Andrey Bogdanov and Ilya Kizhvatov
-
2010/589 ( PS PS.GZ PDF )
- Higher-order differential properties of Keccak and Luffa
- Christina Boura and Anne Canteaut and Christophe De Cannière
-
2010/588 ( PDF )
- Improved Collisions for Reduced ECHO-256
- Martin Schläffer
-
2010/587 ( PDF )
- Group Message Authentication
- Bartosz Przydatek and Douglas Wikström
-
2010/586 ( PDF )
- Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm
- İsmail San and Nuray At
-
2010/585 ( PDF )
- Smaller decoding exponents: ball-collision decoding
- Daniel J. Bernstein and Tanja Lange and Christiane Peters
-
2010/584 ( PDF )
- VMCrypt - Modular Software Architecture for Scalable Secure Computation
- Lior Malka and Jonathan Katz
-
2010/583 ( PDF )
- Improved Preimage Attack on One-block MD4
- Jinmin Zhong and Xuejia Lai
-
2010/582 ( PDF )
- Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems
- Alexandre Berzati and Cécile Canovas-Dumas and Louis Goubin
-
2010/581 ( PDF )
- Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm
- Jintai Ding
-
2010/580 ( PDF )
- The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
- Piotr Mroczkowski and Janusz Szmidt
-
2010/579 ( PDF )
- Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion
- WeiGuo Zhang and GuoZhen Xiao
-
2010/578 ( PDF )
- L1 - An Intermediate Language for Mixed-Protocol Secure Computation
- Axel Schroepfer and Florian Kerschbaum and Guenter Mueller
-
2010/577 ( PDF )
- Discrete Logarithms, Diffie-Hellman, and Reductions
- Neal Koblitz and Alfred Menezes and Igor Shparlinski
-
2010/576 ( PDF )
- Efficient Hashing using the AES Instruction Set
- Joppe W. Bos and Onur Ozen and Martijn Stam
-
2010/575 ( PDF )
- A Discrete Logarithm Attack on Elliptic Curves
- Otto Johnston
-
2010/574 ( PDF )
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Julia Borghoff and Lars R. Knudsen and Gregor Leander and Soeren S. Thomsen
-
2010/573 ( PDF )
- On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$
- Yongqiang Li and Mingsheng Wang
-
2010/572 ( PDF )
- Cryptanalysis of splay tree based encryption
- Jean-Philippe Aumasson
-
2010/571 ( PDF )
- Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform
- Mohamed El Hadedy, Danilo Gligoroski and Svein J. Knapskog
-
2010/570 ( PDF )
- Breaking Grain-128 with Dynamic Cube Attacks
- Itai Dinur and Adi Shamir
-
2010/569 ( PDF )
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Jérémy Jean and Pierre-Alain Fouque
-
2010/568 ( PDF )
- Efficient Two-Move Blind Signatures in the Common Reference String Model
- E. Ghadafi and N.P. Smart
-
2010/567 ( PS PS.GZ PDF )
- ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS
- CLAUDE CARLET AND SIHEM MESNAGER
-
2010/566 ( PDF )
- Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles
- Yusuke Naito
-
2010/565 ( PDF )
- Self-Protecting Electronic Medical Records Using Attribute-Based Encryption
- Joseph A. Akinyele and Christoph U. Lehmann and Matthew D. Green and Matthew W. Pagano and Zachary N. J. Peterson and Aviel D. Rubin
-
2010/564 ( PDF )
- Cryptographic Randomness Testing of Block Ciphers and Hash Functions
- Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak
-
2010/563 ( PDF )
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Tatsuaki Okamoto and Katsuyuki Takashima
-
2010/562 ( PDF )
- How to Leak on Key Updates
- Allison Lewko and Mark Lewko and Brent Waters
-
2010/561 ( PS PS.GZ PDF )
- Password-Protected Secret Sharing
- Stanislaw Jarecki and Ali Bagherzandi and Nitesh Saxena and Yanbin Lu
-
2010/560 ( PDF )
- On CCA-Secure Fully Homomorphic Encryption
- J. Loftus and A. May and N.P. Smart and F. Vercauteren
-
2010/559 ( PDF )
- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
- Diego F. Aranha and Jean-Luc Beuchat and Jérémie Detrey and Nicolas Estibals
-
2010/558 ( PDF )
- Solving LWE problem with bounded errors in polynomial time
- Jintai Ding
-
2010/557 ( -- withdrawn -- )
- A Digital Signature Based on Multivariate Polynomials over Fq
- Masahiro Yagisawa
-
2010/556 ( PDF )
- Definitional Issues in Functional Encryption
- Adam O'Neill
-
2010/555 ( PDF )
- RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation
- S. Duquesne
-
2010/554 ( PDF )
- Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant
- Stéphane Jacob
-
2010/553 ( -- withdrawn -- )
- Strongly Secure Certificate-Based Encryption Scheme with Low Communication Bandwidth
- Yang Lu
-
2010/552 ( PDF )
- A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality
- Carmit Hazay and Yehuda Lindell
-
2010/551 ( PDF )
- A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries
- Carmit Hazay and Yehuda Lindell
-
2010/550 ( PDF )
- Isogenies and Cryptography
- RAZA ALI KAZMI
-
2010/549 ( PDF )
- A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
- Yalin Chen1, *Jue-Sam Chou2, Chi-Fong Lin3
-
2010/548 ( PDF )
- SHA-512/256
- Shay Gueron, Simon Johnson, Jesse Walker
-
2010/547 ( -- withdrawn -- )
- Symmetric-key Searchable keyword Concealment (SSC)
- Yacov Yacobi
-
2010/546 ( PS PS.GZ PDF )
- Timed Encryption and Its Application
- Shaoquan Jiang
-
2010/545 ( PDF )
- Optimal XOR based (2,n)-Visual Cryptography Schemes
- Feng Liu and Chuankun Wu
-
2010/544 ( PDF )
- Semantic Security Under Related-Key Attacks and Applications
- Benny Applebaum and Danny Harnik and Yuval Ishai
-
2010/543 ( PDF )
- Functional Encryption: Definitions and Challenges
- Dan Boneh and Amit Sahai and Brent Waters
-
2010/542 ( PS PS.GZ PDF )
- Squaring in cyclotomic subgroups
- Koray Karabina
-
2010/541 ( PDF )
- One-time Computable and Uncomputable Functions
- Stefan Dziembowski and Tomasz Kazana and Daniel Wichs
-
2010/540 ( PDF )
- Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption
- Anna Lysyanskaya and Aaron Segal
-
2010/539 ( PDF )
- Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves
- Reza R. Farashahi and Pierre-Alain Fouque and Igor E. Shparlinski and Mehdi Tibouchi and J. Felipe Voloch
-
2010/538 ( PDF )
- Rotational Rebound Attacks on Reduced Skein
- Dmitry Khovratovich and Ivica Nikolic and Christian Rechberger
-
2010/537 ( PDF )
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
- Yongzhuang Wei and Jiqiang Lu and Yupu Hu
-
2010/536 ( PDF )
- On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings
- Xu Guo, Sinan Huang, Leyla Nazhandali and Patrick Schaumont
-
2010/535 ( PDF )
- Linear Analysis of Reduced-Round CubeHash
- Tomer Ashur and Orr Dunkelman
-
2010/534 ( PDF )
- Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity
- Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu
-
2010/533 ( -- withdrawn -- )
- Deterministic Public-Key Encryption Revisited
- Adam O'Neill
-
2010/532 ( PDF )
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Andrey Bogdanov and Christian Rechberger
-
2010/531 ( PDF )
- Comparison of seven SHA-3 candidates software implementations on smart cards.
- Mourad Gouicem
-
2010/530 ( PDF )
- How to Read a Signature?
- Vanessa Gratzer and David Naccache
-
2010/529 ( PDF )
- Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields
- Kristin Lauter and Ning Shang
-
2010/528 ( PDF )
- Constant-Round Private Function Evaluation with Linear Complexity
- Jonathan Katz and Lior Malka
-
2010/527 ( PDF )
- The Digital Signature Scheme MQQ-SIG
- Danilo Gligoroski and Rune Steinsmo Ø degå rd and Rune Erlend Jensen and Ludovic Perret and Jean-Charles Faugère and Svein Johan Knapskog and Smile Markovski
-
2010/526 ( PDF )
- Faster Explicit Formulas for Computing Pairings over Ordinary Curves
- Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio López
-
2010/525 ( PS PS.GZ PDF )
- Torus-based compression by factor 4 and 6
- Koray Karabina
-
2010/524 ( PDF )
- Combining properties of cryptographic hash functions
- Michal Rjaško
-
2010/523 ( PDF )
- Affine Masking against Higher-Order Side Channel Analysis
- Guillaume Fumaroli and Ange Martinelli and Emmanuel Prouff and Matthieu Rivain
-
2010/522 ( PDF )
- Signatures Resilient to Continual Leakage on Memory and Computation
- Tal Malkin and Isamu Teranishiy and Yevgeniy Vahlis and Moti Yung
-
2010/521 ( PDF )
- Linear Approximations of Addition Modulo $2^n$-1
- Xiutao Feng and Chunfang Zhou and Chuankun Wu
-
2010/520 ( PDF )
- Implementing Gentry's Fully-Homomorphic Encryption Scheme
- Craig Gentry and Shai Halevi
-
2010/519 ( PDF )
- Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited
- Matthias Krause and Frederik Armknecht and Ewan Fleischmann
-
2010/518 ( PDF )
- Boolean functions with all main cryptographic properties
- Ziran Tu and Yingpu Deng
-
2010/517 ( PDF )
- Cryptanalysis of block EnRUPT
- Elias Yarrkov
-
2010/516 ( PDF )
- Key Agreement Protocols Based on Multivariate Polynomials over Fq
- Masahiro Yagisawa
-
2010/515 ( -- withdrawn -- )
-
-
-
2010/514 ( PDF )
- Semi-Homomorphic Encryption and Multiparty Computation
- Rikke Bendlin and Ivan Damgĺrd and Claudio Orlandi and Sarah Zakarias
-
2010/513 ( PDF )
- Key-Dependent Message Security: Generic Amplification and Completeness
- Benny Applebaum
-
2010/512 ( PDF )
- Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
- Jung Hee Cheon and Stanislaw Jarecki and Jae Hong Seo
-
2010/511 ( PDF )
- On the complexity of Decomposition Attack
- Koh-ichi Nagao
-
2010/509 ( PDF )
- On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware
- Maria Dubovitskaya and Alessandra Scafuro and Ivan Visconti
-
2010/508 ( PDF )
- A Fault Analytic Method against HB+
- Jose Carrijo and Rafael Tonicelli and Anderson C. A. Nascimento
-
2010/507 ( PS PS.GZ PDF )
- On isotopisms of commutative presemifields and CCZ-equivalence of functions
- Lilya Budaghyan and Tor Helleseth
-
2010/506 ( PDF )
- Quantum Preimage and Collision Attacks on CubeHash
- Gaëtan Leurent
-
2010/505 ( PS PS.GZ PDF )
- Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)
- Dominique Unruh
-
2010/504 ( PDF )
- Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
- Charles Bouillaguet and Jean-Charles Faugčre and Pierre-Alain Fouque and Ludovic Perret
-
2010/503 ( PDF )
- BiTR: Built-in Tamper Resilience
- Seung Geol Choi and Aggelos Kiayias and Tal Malkin
-
2010/502 ( PDF )
- Proving Coercion-Resistance of Scantegrity II
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2010/501 ( PDF )
- Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
- Frederik Armknecht and Stefan Katzenbeisser and Andreas Peter
-
2010/500 ( PS PS.GZ )
- ATTACKS ON THE AKACP PROTOCOL
- Konstantinos Chalkias and Foteini Baldimtsi and Dimitrios Hristu-Varsakelis and Spyros T. Halkidis and George Stephanides
-
2010/499 ( PDF )
- Secure Computations on Non-Integer Values
- M. Franz and B. Deiseroth and K. Hamacher and S. Jha and S. Katzenbeisser and H. Schroeder
-
2010/498 ( PDF )
- Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields
- Vladislav Kovtun, Sergey Kavun
-
2010/497 ( -- withdrawn -- )
- Number formula and degree level of ergodic polynomial functions over $\mathbb{Z}$/$2^{n}\mathbb{Z}$ and generalized result of linear equation on ergodic power-series T-Function
- Tao Shi and Dongdai Lin
-
2010/496 ( PDF )
- Efficient Attributes for Anonymous Credentials (Extended Version)
- Jan Camenisch and Thomas Groß
-
2010/495 ( PDF )
- A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme
- Mahabir Prasad Jhanwar
-
2010/494 ( PS PS.GZ PDF )
- Stronger Security Model of Group Key Agreement
- Jianjie Zhao, Dawu Gu and M. Choudary Gorantla
-
2010/493 ( -- withdrawn -- )
- A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA
- S.Sharmila Deva Selvi and S.Sree Vivek and C. Pandu Rangan
-
2010/492 ( PDF )
- Efficient Fully Secure Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae
- Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
-
2010/491 ( PDF )
- A Collaborative Framework for Privacy Protection in Online Social Networks
- Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail-Joon Ahn
-
2010/490 ( PDF )
- Strong designated verifier signature scheme: new definition and construction
- Zuhua Shao
-
2010/489 ( PDF )
- Loiss: A Byte-Oriented Stream Cipher
- Dengguo Feng and Xiutao Feng and Wentao Zhang and Xiubin Fan and Chuankun Wu
-
2010/488 ( PDF )
- Fully Leakage-Resilient Signatures
- Elette Boyle and Gil Segev and Daniel Wichs
-
2010/487 ( PDF )
- Constant Round Non-Malleable Protocols using One Way Functions
- Vipul Goyal
-
2010/486 ( PDF )
- A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS
- Claude Carlet and Sihem Mesnager
-
2010/485 ( PDF )
- Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials
- Hamid Mala and Mohammad Dakhilalian and Mohsen Shakiba
-
2010/484 ( PDF )
- Automata Evaluation and Text Search Protocols with Simulation Based Security
- Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen
-
2010/483 ( PDF )
- Constant-round Non-Malleable Commitments from Any One-Way Function
- Huijia Lin, Rafael Pass
-
2010/482 ( -- withdrawn -- )
- On Instantiation of the Random Oracle
- He Ge
-
2010/481 ( PDF )
- A secure email login system using virtual password
- Bhavin Tanti, Nishant doshi
-
2010/480 ( PDF )
- Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010--
- Shigeo Tsujii and Masahito Gotaishi
-
2010/479 ( PDF )
- Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
- R.M. Avanzi and S. Hoerder and D. Page and M. Tunstall
-
2010/478 ( PDF )
- Cryptanalysis of the Convex Hull Click Human Identification Protocol
- Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang
-
2010/477 ( PDF )
- On Compression of Data Encrypted with Block Ciphers
- Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and and Tal Rabin
-
2010/476 ( PDF )
- Predicate Encryption with Partial Public Keys
- Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano
-
2010/475 ( PDF )
- Pairing Computation on Elliptic Curves of Jacobi Quartic Form
- Hong Wang and Kunpeng Wang and Lijun Zhang and Bao Li
-
2010/474 ( PDF )
- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
- Sarah Meiklejohn and Hovav Shacham and David Mandell Freeman
-
2010/473 ( -- withdrawn -- )
- Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
- Hui Zhang and Chunxiang Xu and Abdur Rashid Sangi
-
2010/472 ( PDF )
- Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought
- A. Simone and B. Skoric
-
2010/471 ( -- withdrawn -- )
- Privacy-preserving Sharing of Sensitive Information
- Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik
-
2010/470 ( PDF )
- Two identification protocols based on Cayley graphs of Coxeter groups
- Feliú Sagols and Guillermo Morales-Luna
-
2010/469 ( PDF )
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
- Emiliano De Cristofaro and Jihye Kim and Gene Tsudik
-
2010/468 ( PS PS.GZ PDF )
- Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes
- Goichiro Hanaoka and Jian Weng
-
2010/467 ( PDF )
- Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles
- Xinfeng Lei and Rui Xue and Ting Yu
-
2010/466 ( PDF )
- PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
- Benwen Zhu and Bo Zhu and Kui Ren
-
2010/465 ( PDF )
- How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
- Falko Strenzke
-
2010/464 ( -- withdrawn -- )
- Weaknesses of SIP Authentication Scheme for Converged VoIP Networks
- Q. Pu
-
2010/463 ( PDF )
- Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
- Mohammad Reza Sohizadeh Abyaneh
-
2010/462 ( PDF )
- Unconditionally Secure Rational Secret Sharing in Standard Communication Networks
- Zhifang Zhang
-
2010/461 ( PDF )
- Identity Based Partial Aggregate Signature Scheme Without Pairing
- S. Sharmila Deva Selvi and S. Sree Vivek and J.Shriram and C. Pandu Rangan
-
2010/460 ( -- withdrawn -- )
- On extended algebraic immunity
- Gaofei Wu and Yuqing Zhang and Weiguo Zhang
-
2010/459 ( PDF )
- CCA2 Secure Certificateless Encryption Schemes Based on RSA
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2010/458 ( PDF )
- Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring
- Masahiro Yagisawa
-
2010/457 ( PDF )
- Improving the performance of Luffa Hash Algorithm
- Thomaz Oliveira and Julio López
-
2010/456 ( PS PS.GZ PDF )
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
- Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam Smith
-
2010/455 ( PDF )
- Optimal Verification of Operations on Dynamic Sets
- Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos
-
2010/454 ( PDF )
- Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol
- Jesse Walker and Jiangtao Li
-
2010/453 ( PDF )
- Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
- Dan Boneh and David Mandell Freeman
-
2010/452 ( PDF )
- Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
- Feng Hao and Matthew Nicolas Kreeger
-
2010/451 ( PS PS.GZ PDF )
- Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault
- Subidh Ali and Debdeep Mukhopadhyay
-
2010/450 ( PDF )
- Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary
- Kaoru Kurosawa
-
2010/449 ( PDF )
- Oblivious and Fair Server-Aided Two-Party Computation
- Amir Herzberg and Haya Shulman
-
2010/448 ( PDF )
- Sequential Rationality in Cryptographic Protocols
- Ronen Gradwohl and Noam Livne and Alon Rosen
-
2010/447 ( PDF )
- Side-channel Analysis of Six SHA-3 Candidates
- Olivier Benoit and Thomas Peyrin
-
2010/446 ( PDF )
- Short One-Time Signatures
- G.M. Zaverucha and D.R. Stinson
-
2010/445 ( PDF )
- Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
- Ekawat Homsirikamol and Marcin Rogawski and Kris Gaj
-
2010/444 ( PDF )
- New Construction of Identity-based Proxy Re-encryption
- Song Luo and Jianbin Hu and Zhong Chen
-
2010/443 ( PS PS.GZ PDF )
- Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
- Xiaohu Tang and Deng Tang and Xiangyong Zeng and Lei Hu
-
2010/442 ( PDF )
- Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
- Dan Boneh and Hart Montgomery and Ananth Raghunathan
-
2010/441 ( PDF )
- Provably Secure Higher-Order Masking of AES
- Matthieu Rivain and Emmanuel Prouff
-
2010/440 ( PDF )
- Piret and Quisquater's DFA on AES Revisited
- Christophe Giraud and Adrian Thillard
-
2010/439 ( PDF )
- Embedded Extended Visual Cryptography Schemes
- Feng Liu and Chuankun Wu
-
2010/438 ( PDF )
- Achieving Leakage Resilience Through Dual System Encryption
- Allison Lewko and Yannis Rouselakis and Brent Waters
-
2010/437 ( PDF )
- Selecting Parameters for the Rainbow Signature Scheme - Extended Version -
- Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
-
2010/436 ( PDF )
- Arithmetic of Supersingular Koblitz Curves in Characteristic Three
- Roberto Avanzi and Clemens Heuberger and Helmut Prodinger
-
2010/435 ( PDF )
- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
- Cihangir Tezcan
-
2010/434 ( PDF )
- Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
- Takanori Isobe and Taizo Shirai
-
2010/433 ( PS PS.GZ PDF )
- The PASSERINE Public Key Encryption and Authentication Mechanism
- Markku-Juhani O. Saarinen
-
2010/432 ( PDF )
- AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS
- K. Atighehchi and A. Enache and T. Muntean and G. Risterucci
-
2010/431 ( PDF )
- Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees
- Jing Liu and Bo Yang
-
2010/430 ( PDF )
- Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates
- Vlastimil Klima and Danilo Gligoroski
-
2010/429 ( PS PS.GZ PDF )
- A Family of Implementation-Friendly BN Elliptic Curves
- Geovandro C. C. F. Pereira and Marcos A. Simplício Jr and Michael Naehrig and Paulo S. L. M. Barreto
-
2010/428 ( PDF )
- Random Oracles in a Quantum World
- Dan Boneh and Ozgur Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry
-
2010/427 ( -- withdrawn -- )
- Security Improvement on a Password-Authenticated Group Key Exchange Protocol
- Junghyun Nam
-
2010/426 ( PDF )
- Parallelizing the Camellia and SMS4 Block Ciphers - Extended version
- Huihui Yap and Khoongming Khoo and Axel Poschmann
-
2010/425 ( PDF )
- KIST: A new encryption algorithm based on splay
- R. Wei and Z. Zeng
-
2010/424 ( PS PS.GZ PDF )
- CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow
- Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
-
2010/423 ( PDF )
- Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm
- LI Yun-qiang and Wang Ai-lan
-
2010/422 ( PDF )
- Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
- Jae Hyun Ahn and Matthew Green and Susan Hohenberger
-
2010/421 ( PDF )
- Binomial Sieve Series -- a Prospective Cryptographic Tool
- Gideon Samid
-
2010/420 ( PS PS.GZ PDF )
- Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks
- Stanislav Bulygin and Albrecht Petzoldt and Johannes Buchmann
-
2010/419 ( PDF )
- White-Box Cryptography and SPN ciphers. LRC method.
- Dmitry Schelkunov
-
2010/418 ( PDF )
- Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function
- *Jue-Sam Chou 1, hsien-ching Chen 2, Chun-Yun Chen 3
-
2010/417 ( PDF )
- Distinguishing Properties of Higher Order Derivatives of Boolean Functions
- Ming Duan and Xuejia Lai and Mohan Yang and Xiaorui Sun and Bo Zhu
-
2010/416 ( PDF )
- Computationally Sound Verification of Source Code
- Michael Backes and Matteo Maffei and Dominique Unruh
-
2010/415 ( PS PS.GZ PDF )
- Perfectly Balanced Boolean Functions and Golić Conjecture
- Stanislav Smyshlyaev
-
2010/414 ( PDF )
- On Strong Simulation and Composable Point Obfuscation
- Nir Bitansky and Ran Canetti
-
2010/413 ( PDF )
- Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics
- E.A.Grechnikov
-
2010/412 ( PDF )
- Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
- Margus Niitsoo
-
2010/411 ( PDF )
- Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials.
- Vivien Dubois and Jean-Gabriel Kammerer
-
2010/410 ( PDF )
- Wild McEliece
- Daniel J. Bernstein and Tanja Lange and Christiane Peters
-
2010/409 ( PDF )
- The collision security of Tandem-DM in the ideal cipher model
- Jooyoung Lee and Martijn Stam and John Steinberger
-
2010/408 ( PDF )
- Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
- Jean-François Gallais and Ilya Kizhvatov and Michael Tunstall
-
2010/407 ( PDF )
- Flaws in Differential Cryptanalysis of Reduced Round PRESENT
- Manoj Kumar and Pratibha Yadav and Meena Kumari
-
2010/406 ( PDF )
- Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf
- Julien Francq and Céline Thuillet
-
2010/405 ( PS PS.GZ PDF )
- Privacy-Preserving RFID Systems: Model and Constructions
- Sébastien Canard and Iwen Coisel and Jonathan Etrog and Marc Girault
-
2010/404 ( PDF )
- On the Insecurity of Parallel Repetition for Leakage Resilience
- Allison Lewko and Brent Waters
-
2010/403 ( -- withdrawn -- )
- Linear Secret Sharing for Hierarchical Access Structures
- Ali Aydın Selçuk and Ramazan Yılmaz
-
2010/402 ( PDF )
- On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
- Mohammad Reza Sohizadeh Abyaneh
-
2010/401 ( PDF )
- Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)
- Jan Camenisch and Thomas Groß and Peter Hladky and Christian Hoertnagl
-
2010/400 ( PDF )
- Security Analysis of a Threshold Proxy Signature Scheme
- Kitae Kim and Dahun Nyang
-
2010/399 ( PS PS.GZ PDF )
- Faster Computation of Self-pairings
- Chang-An Zhao, Fangguo Zhang and Dongqing Xie
-
2010/398 ( PDF )
- Distinguisher for Shabal's Permutation Function
- Peter Novotney
-
2010/397 ( PDF )
- Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
- Mihir Bellare and David Cash
-
2010/396 ( PS PS.GZ PDF )
- From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
- Noémie Floissac and Yann L'Hyver
-
2010/395 ( PDF )
- On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
- Zhibin Zhou and Dijiang Huang
-
2010/394 ( PDF )
- Horizontal Correlation Analysis on Exponentiation
- Christophe Clavier and Benoit Feix and Georges Gagnerot and Mylene Roussellet and Vincent Verneuil
-
2010/393 ( PDF )
- A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment
- Jue-Sam Chou 1*, Yalin Chen 2, Chun-Hui Huang 3
-
2010/392 ( PS PS.GZ PDF )
- Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission
- Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
-
2010/391 ( PDF )
- Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks
- Daniel Z. Zanger
-
2010/390 ( PDF )
- Elliptic curves in Huff's model
- Hongfeng Wu and Rongquan Feng
-
2010/389 ( PDF )
- The impossibility of computationally sound XOR
- Dominique Unruh
-
2010/388 ( PDF )
- On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
- Sanjit Chatterjee and Darrel Hankerson and Alfred Menezes
-
2010/387 ( PDF )
- A Combinatorial Analysis of HC-128
- Goutam Paul and Subhamoy Maitra and Shashwat Raizada
-
2010/386 ( PDF )
- BoostReduce - A Framework For Strong Lattice Basis Reduction
- Werner Backes and Susanne Wetzel
-
2010/385 ( PDF )
- First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version–
- Emmanuel Prouff and Robert McEvoy
-
2010/384 ( PDF )
- Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
- Danilo Gligoroski and Vlastimil Klima
-
2010/383 ( PDF )
- Huff's Model for Elliptic Curves
- Marc Joye and Mehdi Tibouchi and Damien Vergnaud
-
2010/382 ( PDF )
- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
- Pierre-Alain Fouque and Mehdi Tibouchi
-
2010/381 ( PDF )
- Security Reductions of the Second Round SHA-3 Candidates
- Elena Andreeva and Bart Mennink and Bart Preneel
-
2010/380 ( PDF )
- Analysis of an internet voting protocol
- Kristian Gjřsteen
-
2010/379 ( PDF )
- Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree
- Sorina Ionica and Antoine Joux
-
2010/378 ( PDF )
- Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation
- Jin Wang
-
2010/377 ( PDF )
- Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring
- Masahiro Yagisawa
-
2010/376 ( PS PS.GZ PDF )
- Identity Based Online/Offline Signcryption Scheme
- S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
-
2010/375 ( PDF )
- Improved Collision Attacks on the Reduced-Round Grøstl Hash Function
- Kota Ideguchi and Elmar Tischhauser and Bart Preneel
-
2010/374 ( PDF )
- Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees
- Zhen Liu and Zhenfu Cao and Duncan S. Wong
-
2010/373 ( PDF )
- Hashing into Hessian Curves
- Reza Rezaeian Farashahi
-
2010/372 ( PS PS.GZ PDF )
- Decoding square-free Goppa codes over $\F_p$
- Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki
-
2010/371 ( PDF )
- Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves
- Nicolas Estibals
-
2010/370 ( PDF )
- Finding discrete logarithms with a set orbit distinguisher
- Robert P. Gallant
-
2010/369 ( PDF )
- Double Ciphertext Mode : A Proposal for Secure Backup
- Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez
-
2010/368 ( PDF )
- Round-Optimal Password-Based Authenticated Key Exchange
- Jonathan Katz and Vinod Vaikuntanathan
-
2010/367 ( PDF )
- Starfish on Strike
- Daniel J. Bernstein and Peter Birkner and Tanja Lange
-
2010/366 ( PDF )
- Oblivious RAM Revisited
- Benny Pinkas and Tzachy Reinman
-
2010/365 ( PDF )
- TASTY: Tool for Automating Secure Two-partY computations
- Wilko Henecka and Stefan Kögl and Ahmad-Reza Sadeghi and Thomas Schneider and Immo Wehrenberg
-
2010/364 ( PDF )
- A Compact FPGA Implementation of the SHA-3 Candidate ECHO
- Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
-
2010/363 ( PDF )
- An Analysis of Affine Coordinates for Pairing Computation
- Kristin Lauter and Peter L. Montgomery and Michael Naehrig
-
2010/362 ( PS PS.GZ PDF )
- Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties
- Deng Tang and Weiguo Zhang and Xiaohu Tang
-
2010/361 ( PDF )
- On the Use of Financial Data as a Random Beacon
- Jeremy Clark and Urs Hengartner
-
2010/360 ( PS PS.GZ PDF )
- On the Security of Identity Based Threshold Unsigncryption Schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and S.Priti and C.Pandu Rangan
-
2010/359 ( PDF )
- Identity Based Self Delegated Signature - Self Proxy Signatures
- S.Sharmila Deva Selvi and S.Sree Vivek and S.Gopinath and C.Pandu Rangan
-
2010/358 ( PDF )
- The Fiat--Shamir Transform for Group and Ring Signature Schemes
- M.-F. Lee, N.P. Smart and B. Warinschi
-
2010/357 ( -- withdrawn -- )
- CCA-Secure PRE Scheme without Public Verifiability
- Jun Shao and Peng liu and Jian Weng
-
2010/356 ( PS PS.GZ PDF )
- Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes
- Pinaki Sarkar and Amrita Saha and Morshed Udan Chowdhury
-
2010/355 ( PDF )
- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
- Bozhan Su and Wenling Wu and Shuang Wu and Le Dong
-
2010/354 ( PDF )
- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves
- Jean-Luc Beuchat and Jorge Enrique González Díaz and Shigeo Mitsunari and Eiji Okamoto and Francisco Rodríguez-Henríquez and Tadanori Teruya
-
2010/353 ( PDF )
- Cryptographic Pairings Based on Elliptic Nets
- Naoki Ogura and Naoki Kanayama and Shigenori Uchiyama and Eiji Okamoto
-
2010/352 ( PDF )
- A Digital Signature Using Multivariate Functions on Quaternion Ring
- Masahiro Yagisawa
-
2010/351 ( PDF )
- Decentralizing Attribute-Based Encryption
- Allison Lewko and Brent Waters
-
2010/350 ( PS PS.GZ PDF )
- A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
- Vladimir Kolesnikov
-
2010/349 ( PS PS.GZ PDF )
- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
- Kenneth Koon-Ho Wong and Gregory V. Bard
-
2010/348 ( PDF )
- Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids
- A. N. Alekseychuk
-
2010/347 ( PDF )
- Time-Specific Encryption
- Kenneth G. Paterson and Elizabeth A. Quaglia
-
2010/346 ( PDF )
- Efficient Generalized Signcryption Schemes
- Prashant Kushwah and Sunder Lal
-
2010/345 ( PDF )
- Robust RFID Authentication Protocol with Formal Proof and Its Feasibility
- Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama and Kazuo Ohta
-
2010/344 ( PDF )
- Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves.
- Ezekiel J Kachisa
-
2010/343 ( PS PS.GZ PDF )
- Identity Based Public Verifiable Signcryption Scheme
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2010/342 ( PDF )
- Fixed Argument Pairings
- Craig Costello and Douglas Stebila
-
2010/341 ( PDF )
- A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
- Masao Kasahara
-
2010/340 ( PDF )
- A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
- Jayaprakash Kar and Banshidhar Majhi
-
2010/339 ( PDF )
- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols
- Jose Bacelar Almeida and Endre Bangerter and Manuel Barbosa and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider
-
2010/338 ( PDF )
- Efficient SIMD arithmetic modulo a Mersenne number
- Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery
-
2010/337 ( PDF )
- Practical-Titled Attack on AES-128 Using Chosen-Text Relations
- Vincent Rijmen
-
2010/336 ( PS PS.GZ PDF )
- Efficient Differential Fault Analysis for AES
- Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
-
2010/335 ( PDF )
- Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors
- Patrick Longa, and Catherine Gebotys
-
2010/334 ( PDF )
- Security Proof of AugPAKE
- SeongHan Shin and Kazukuni Kobara and Hideki Imai
-
2010/333 ( -- withdrawn -- )
- Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme
- Zhengjun Cao
-
2010/332 ( PDF )
- Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
- Aurelien Francillon and Boris Danev and Srdjan Capkun
-
2010/331 ( PDF )
- A Distinguisher for High Rate McEliece Cryptosystems
- Jean-Charles Faugère and Valérie Gauthier and Ayoub Otmani and Ludovic Perret and Jean-Pierre Tillich
-
2010/330 ( PS PS.GZ PDF )
- Distributed Rational Consensus
- Amjed Shareef
-
2010/329 ( PDF )
- On the Security of Pseudorandomized Information-Theoretically Secure Schemes
- Koji Nuida and Goichiro Hanaoka
-
2010/328 ( PDF )
- Signatures for Multi-source Network Coding
- László Czap and István Vajda
-
2010/327 ( PDF )
- Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
- Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
-
2010/326 ( PDF )
- Privacy-Preserving Multi-Objective Evolutionary Algorithms
- Daniel Funke and Florian Kerschbaum
-
2010/325 ( PDF )
- Effect of the Dependent Paths in Linear Hull
- Zhenli Dai and Meiqin Wang and Yue Sun
-
2010/324 ( PDF )
- Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
- Abdel Alim Kamal and Amr M. Youssef
-
2010/323 ( PDF )
- Security Analysis of SIMD
- Charles Bouillaguet and Pierre-Alain Fouque and Gaëtan Leurent
-
2010/322 ( PDF )
- Improved Single-Key Attacks on 8-round AES
- Orr Dunkelman and Nathan Keller and Adi Shamir
-
2010/321 ( PDF )
- Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
- Martin Schläffer
-
2010/320 ( -- withdrawn -- )
- On isotopisms of commutative presemifields and CCZ-equivalence of functions
- Lilya Budaghyan and Tor Helleseth
-
2010/319 ( PS PS.GZ PDF )
- On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
- Jian Weng and Yunlei Zhao
-
2010/318 ( PS PS.GZ PDF )
- Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost
- Ivan Damgĺrd and Claudio Orlandi
-
2010/317 ( PDF )
- A Note On Gottesman-Chuang Quantum Signature Scheme
- Zhengjun Cao
-
2010/316 ( PDF )
- A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
- Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang
-
2010/315 ( PDF )
- Efficient Techniques for High-Speed Elliptic Curve Cryptography
- Patrick Longa and Catherine Gebotys
-
2010/314 ( PDF )
- Weaknesses of a dynamic ID-based remote user authentication scheme
- He Debiao, Chen Jianhua, Hu Jin
-
2010/313 ( PS PS.GZ PDF )
- Fast Exhaustive Search for Polynomial Systems in $F_2$
- Charles Bouillaguet and Chen-Mou Cheng and Tony (Tung) Chou and Ruben Niederhagen and Adi Shamir and Bo-Yin Yang
-
2010/312 ( PDF )
- Security weakness of two authenticated key exchange protocols from pairings
- Qingfeng Cheng and Chuangui Ma
-
2010/311 ( PDF )
- Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation
- J.C. Bajard and S. Duquesne and M. Ercegovac
-
2010/310 ( -- withdrawn -- )
- The analytical property for $\zeta(s)$
- Sheng-Ping Wu
-
2010/309 ( PDF )
- Co-Z Addition Formulae and Binary Ladders on Elliptic Curves
- Raveen R. Goundar and Marc Joye and Atsuko Miyaji
-
2010/308 ( PDF )
- Attacking M&M Collective Signature Scheme
- Michal Rjaško and Martin Stanek
-
2010/307 ( PDF )
- Impossible Differential Cryptanalysis of SPN Ciphers
- Ruilin Li and Bing Sun and Chao Li
-
2010/306 ( PDF )
- On security of a remote user authentication scheme without using smart cards
- He Debiao, Chen Jianhua, Hu Jin
-
2010/305 ( PDF )
- On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
- Marten van Dijk and Ari Juels
-
2010/304 ( PDF )
- Cryptanalysis of the Compression Function of SIMD
- Hongbo Yu and Xiaoyun Wang
-
2010/303 ( PDF )
- Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange
- Ran Canetti and Sebastian Gajek
-
2010/302 ( PDF )
- Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design
- Frederik Armknecht and Carsten Elsner and Martin Schmidt
-
2010/301 ( PDF )
- On generalized Feistel networks
- Viet Tung Hoang and Phillip Rogaway
-
2010/300 ( PS PS.GZ PDF )
- Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers
- Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai
-
2010/299 ( PDF )
- Faster Fully Homomorphic Encryption
- Damien Stehle and Ron Steinfeld
-
2010/298 ( PDF )
- On the Indifferentiability of the Grøstl Hash Function
- Elena Andreeva, Bart Mennink and Bart Preneel
-
2010/297 ( PDF )
- Correlation-Enhanced Power Analysis Collision Attack
- Amir Moradi and Oliver Mischke and Thomas Eisenbarth
-
2010/296 ( PDF )
- Hash-based Multivariate Public Key Cryptosystems
- WANG Hou-Zhen and ZHANG Huan-Guo
-
2010/295 ( PDF )
- Ideal Key Derivation and Encryption in Simulation-based Security
- Ralf Kuesters and Max Tuengerthal
-
2010/294 ( PDF )
- Computing genus 2 curves from invariants on the Hilbert moduli space
- Kristin Lauter and Tonghai Yang
-
2010/293 ( PDF )
- Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
- Jacques Patarin
-
2010/292 ( PDF )
- A Low-Area yet Performant FPGA Implementation of Shabal
- Jérémie Detrey and Pierrick Gaudry and Karim Khalfallah
-
2010/291 ( PDF )
- Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
- He Debiao, Chen Jianhua, Hu Jin
-
2010/290 ( PDF )
- Intractable Problems in Cryptography
- Neal Koblitz and Alfred Menezes
-
2010/289 ( PDF )
- A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
- Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento
-
2010/288 ( PDF )
- Lattice-based Identity-Based Broadcast Encryption Scheme
- Jin Wang and Jingguo Bi
-
2010/287 ( PDF )
- Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
- Jacques Patarin
-
2010/286 ( PDF )
- On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions
- Sugata Gangopadhyay, Brajesh Kumar Singh
-
2010/285 ( PDF )
- A SAT-based preimage analysis of reduced KECCAK hash functions
- Pawel Morawiecki and Marian Srebrny
-
2010/284 ( PDF )
- Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
- Yehuda Lindell and Benny Pinkas
-
2010/283 ( PDF )
- Recursive Information Hiding in Visual Cryptography
- Sandeep Katta
-
2010/282 ( PDF )
- Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
- Kerry A. McKay and Poorvi L. Vora
-
2010/281 ( PDF )
- Protocols for Reliable and Secure Message Transmission
- Ashish Choudhury
-
2010/280 ( PDF )
- Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation
- Arpita Patra
-
2010/279 ( PDF )
- On the Round Complexity of Covert Computation
- Vipul Goyal and Abhishek Jain
-
2010/278 ( PDF )
- Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
- Zvika Brakerski and Yael Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan
-
2010/277 ( -- withdrawn -- )
- Adaptively Secure Broadcast Encryption with Short Ciphertexts
- Behzad Malek and Ali Miri
-
2010/276 ( PDF )
- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
- Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
-
2010/275 ( PDF )
- Position-Based Quantum Cryptography: Impossibility and Constructions
- Harry Buhrman, Nishanth Chandran and Serge Fehr and Ran Gelles and Vipul Goyal and Rafail Ostrovsky and Christian Schaffner
-
2010/274 ( PDF )
- Online/Offline Identity-Based Signcryption Revisited
- Joseph K. Liu, Joonsang Baek and Jianying Zhou
-
2010/273 ( PDF )
- Symmetric States and their Structure: Improved Analysis of CubeHash
- Niels Ferguson and Stefan Lucks and Kerry A. McKay
-
2010/272 ( PDF )
- Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
- Zhimin Chen and Patrick Schaumont
-
2010/271 ( PDF )
- Selecting Parameters for Secure McEliece-based Cryptosystems
- Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, and Johannes Buchmann
-
2010/270 ( PDF )
- Factorization of RSA-180
- S.A. Danilov and I.A. Popovyan
-
2010/269 ( PDF )
- LAB Form for Iterated Hash Functions
- Xigen Yao
-
2010/268 ( PDF )
- Key-Controlled Order-Preserving Encryption
- HU Mengke; GAO Juntao
-
2010/267 ( PDF )
- Two improved authenticated multiple key exchange protocols
- Feng LIU
-
2010/266 ( PDF )
- Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
- Chao Ning and Qiuliang Xu
-
2010/265 ( PS PS.GZ PDF )
- CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
- Jian Weng and Minrong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao
-
2010/264 ( PDF )
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- Hugo Krawczyk
-
2010/263 ( -- withdrawn -- )
- Lattice Reduction and Polynomial Solving
- Raphaël Marinier
-
2010/262 ( PS PS.GZ PDF )
- Cube Test Analysis of the Statistical Behavior of CubeHash and Skein
- Alan Kaminsky
-
2010/261 ( PDF )
- Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT
- Céline Blondeau and Benoît Gérard
-
2010/260 ( PDF )
- On FPGA-based implementations of Grøstl
- Bernhard Jungk and Steffen Reith
-
2010/259 ( PS PS.GZ PDF )
- Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA
- Andrey V. Pavlov
-
2010/258 ( PDF )
- On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions
- Ruchi Gode and Sugata Gangopadhyay
-
2010/257 ( PDF )
- Feasible Attack on the 13-round AES-256
- Alex Biryukov and Dmitry Khovratovich
-
2010/256 ( -- withdrawn -- )
- On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature
- Mingwu Zhang, Tsuyoshi Takagi, Bo Yang
-
2010/255 ( PS PS.GZ PDF )
- Automorphism group of the set of all bent functions
- Natalia Tokareva
-
2010/254 ( PDF )
- Cryptanalysis of XXTEA
- Elias Yarrkov
-
2010/253 ( PDF )
- Separable Hash Functions
- Sarang Aravamuthan
-
2010/252 ( PDF )
- A supplement to Liu et al.'s certificateless signcryption scheme in the standard model
- Zhengping Jin and Qiaoyan Wen and Hua Zhang
-
2010/251 ( PDF )
- Modeling Attacks on Physical Unclonable Functions
- Ulrich Rührmair and Frank Sehnke and Jan Sölter and Gideon Dror and Srinivas Devadas and Jürgen Schmidhuber
-
2010/250 ( PS PS.GZ PDF )
- Collusion Free Protocol for Rational Secret Sharing
- Amjed Shareef
-
2010/249 ( PS PS.GZ PDF )
- Rational Secret Sharing without Broadcast
- Amjed Shareef
-
2010/248 ( PDF )
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Alex Biryukov and Ivica Nikolić
-
2010/247 ( PDF )
- A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem
- Jia XU
-
2010/246 ( PDF )
- Quantifying Trust
- Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
-
2010/245 ( PDF )
- Towards a Theory of Trust Based Collaborative Search
- Yacov Yacobi
-
2010/244 ( PDF )
- Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset
- Jia XU
-
2010/243 ( PDF )
- Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
- Senshan Pan and Xiaotong Fu and Weiguo Zhang
-
2010/242 ( PDF )
- Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios
- Yang ZHANG and Jun-Liang CHEN
-
2010/241 ( PDF )
- Improved Delegation of Computation using Fully Homomorphic Encryption
- Kai-Min Chung and Yael Kalai and Salil Vadhan
-
2010/240 ( PDF )
- Weaknesses of a dynamic ID-based remote user authentication scheme
- He Debiao, Chen Jianhua, Hu Jin
-
2010/239 ( PDF )
- One-round and authenticated three-party multiple key exchange protocol from parings
- Feng LIU
-
2010/238 ( PS PS.GZ PDF )
- Collusion Free Protocol for Correlated Element Selection Problem
- Amjed Shareef and Akshay Agrawal and C. Pandu Rangan
-
2010/237 ( PS PS.GZ PDF )
- A New Security Model for Authenticated Key Agreement
- Augustin P. Sarr and Philippe Elbaz–Vincent and Jean–Claude Bajard
-
2010/236 ( PDF )
- Accountability: Definition and Relationship to Verifiability
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2010/235 ( PDF )
- Attribute-based group key establishment
- Rainer Steinwandt and Adriana Suárez Corona
-
2010/234 ( PDF )
- Efficient provable data possession for hybrid clouds
- Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
-
2010/233 ( PDF )
- Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials
- Georg Fuchsbauer
-
2010/232 ( PDF )
- On Representable Matroids and Ideal Secret Sharing
- Ching-Fang Hsu and Qi Cheng
-
2010/231 ( PS PS.GZ PDF )
- Throughput-Optimal Routing in Unreliable Networks
- Paul Bunn and Rafail Ostrovsky
-
2010/230 ( PDF )
- A calculus for game-based security proofs
- David Nowak and Yu Zhang
-
2010/229 ( PDF )
- Concurrent composition in the bounded quantum storage model
- Dominique Unruh
-
2010/228 ( PDF )
- Practical NFC Peer-to-Peer Relay Attack using Mobile Phones
- Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis
-
2010/227 ( PS PS.GZ PDF )
- A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$
- Neal Koblitz
-
2010/226 ( PDF )
- Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
- Zvika Brakerski and Shafi Goldwasser
-
2010/225 ( PDF )
- A Security Weakness in a Generic Construction of a Group Key Exchange Protocol
- Junghyun Nam
-
2010/224 ( PS PS.GZ PDF )
- Efficient Implementation of the Orlandi Protocol Extended Version
- Thomas P. Jakobsen and Marc X. Makkes and Janus Dam Nielsen
-
2010/223 ( PDF )
- Improved Differential Attacks for ECHO and Grostl
- Thomas Peyrin
-
2010/222 ( PS PS.GZ PDF )
- Some Observations on Indifferentiability
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2010/221 ( PDF )
- Solving Generalized Small Inverse Problems
- Noboru Kunihiro
-
2010/220 ( PS PS.GZ PDF )
- (If) Size Matters: Size-Hiding Private Set Intersection
- Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik
-
2010/219 ( PDF )
- Tracker: Security and Privacy for RFID-based Supply Chains
- Erik-Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva
-
2010/218 ( -- withdrawn -- )
- New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m)
- Zhen Wang and Shuqin Fan
-
2010/217 ( PDF )
- Secure Code Update for Embedded Devices via Proofs of Secure Erasure
- Daniele Perito and Gene Tsudik
-
2010/216 ( PDF )
- Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework
- Zheng Yuan and Xiaoqiu Ren
-
2010/215 ( PDF )
- On the q-Strong Diffie-Hellman Problem
- Naoki Tanaka and Taiichi Saito
-
2010/214 ( PDF )
- How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes
- Kevin D. Bowers and Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest
-
2010/213 ( PDF )
- Composable Security Analysis of OS Services
- Ran Canetti and Suresh Chari and Shai Halevi and Birgit Pfitzmann and Arnab Roy and Michael Steiner and Wietse Venema
-
2010/212 ( PDF )
- Quantum Proofs of Knowledge
- Dominique Unruh
-
2010/211 ( PDF )
- Practical-time Attack on the Full MMB Block Cipher
- Keting Jia and Jiazhe Chen and Meiqin Wang and Xiaoyun Wang
-
2010/210 ( -- withdrawn -- )
- Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE
- Yu Chen
-
2010/209 ( PDF )
- Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
- Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo-Ferrer
-
2010/208 ( PDF )
- Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves
- Richard Moloney and Aidan O'Mahony and Pierre Laurent
-
2010/207 ( PDF )
- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
- Koen Simoens and Roel Peeters and Bart Preneel
-
2010/206 ( PDF )
- Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
- Long Hoang Nguyen and Andrew William Roscoe
-
2010/205 ( PDF )
- On Protecting Cryptographic Keys Against Continual Leakage
- Ali Juma and Yevgeniy Vahlis
-
2010/204 ( PDF )
- Certificateless generalized signcryption
- Ji Huifang, Han Wenbao, Zhao Long
-
2010/203 ( PDF )
- Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure
- Bernard Colbert and Anthony H. Dekker and Lynn Margaret Batten
-
2010/202 ( PDF )
- Robust Combiner for Obfuscators
- Amir Herzberg and Haya Shulman
-
2010/201 ( -- withdrawn -- )
- Impossible Differential Cryptanalysis on E2
- Yuechuan Wei and Ruilin Li and Ping Li and Chao Li
-
2010/200 ( PDF )
- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
- Markus Rückert and Michael Schneider and Dominique Schröder
-
2010/199 ( PDF )
- A Framework for Fully-Simulatable $t$-out-of-$n$ Oblivious Transfer
- Bing Zeng and Christophe Tartary and Chingfang Hsu and Xueming Tang
-
2010/198 ( PDF )
- The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
- Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schläffer
-
2010/197 ( PDF )
- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
- Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
-
2010/196 ( PS PS.GZ PDF )
- Cryptography Against Continuous Memory Attacks
- Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs
-
2010/195 ( PDF )
- On E-Vote Integrity in the Case of Malicious Voter Computers
- Sven Heiberg, Helger Lipmaa, Filip Van Laenen
-
2010/194 ( PS PS.GZ PDF )
- Identity-Based Online/Offline Key Encapsulation and Encryption
- Sherman S.M. Chow and Joseph K. Liu and Jianying Zhou
-
2010/193 ( PDF )
- Speeding Up The Widepipe: Secure and Fast Hashing
- Mridul Nandi and Souradyuti Paul
-
2010/192 ( PDF )
- Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
- Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
-
2010/191 ( PDF )
- On Designated Verifier Signature Schemes
- Michal Rjaško and Martin Stanek
-
2010/190 ( PDF )
- J-PAKE: Authenticated Key Exchange Without PKI
- Feng Hao and Peter Ryan
-
2010/189 ( PDF )
- New generic algorithms for hard knapsacks
- Nick Howgrave-Graham and Antoine Joux
-
2010/188 ( PS PS.GZ PDF )
- Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
- Yan Zhu and Gail-Joon Ahn and Hongxin Hu and Huaixi Wang
-
2010/187 ( PS PS.GZ PDF )
- Certificateless Signcryption without Pairing
- Wenjian Xie and Zhang Zhang
-
2010/186 ( PDF )
- New software speed records for cryptographic pairings
- Michael Naehrig and Ruben Niederhagen and Peter Schwabe
-
2010/185 ( PDF )
- New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation
- Wenping Ma, Chen Yang, and Shaohui Sun
-
2010/184 ( -- withdrawn -- )
- Rational Secret Sharing AS Extensive Games
- Zhifang Zhang
-
2010/183 ( PDF )
- Preventing Pollution Attacks in Multi-Source Network Coding
- Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman
-
2010/182 ( PDF )
- A Simple BGN-type Cryptosystem from LWE
- Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
-
2010/181 ( PDF )
- Cryptanalysis of a DoS-resistant ID-based password authentication
- He Debiao, Chen Jianhua, Hu Jin
-
2010/180 ( PS PS.GZ PDF )
- The World is Not Enough: Another Look on Second-Order DPA
- Francois-Xavier Standaert and Nicolas Veyrat-Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard
-
2010/179 ( PDF )
- A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity
- Ziran Tu and Yingpu Deng
-
2010/178 ( PDF )
- Identity Based Online/Offline Encryption Scheme
- Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
-
2010/177 ( PDF )
- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
- Robert Granger
-
2010/176 ( PDF )
- A Comparison of Cryptanalytic Tradeoff Algorithms
- Jin Hong and Sunghwan Moon
-
2010/175 ( PDF )
- Sanitizable signatures with strong transparency in the standard model
- Shivank Agrawal, Swarun Kumar, Amjed Shareef and C. Pandu Rangan
-
2010/174 ( PDF )
- A Reflection on the Security of Two-Party Key Establishment Protocols
- Qiang Tang
-
2010/173 ( PDF )
- Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA
- Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
-
2010/172 ( PS PS.GZ )
- Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup
- Qixiang Mei, Bao Li,Xianhui Lu and Dingding Jia
-
2010/171 ( PDF )
- On Foundation and Construction of Physical Unclonable Functions
- Jiang Wu and Maire O'Neill
-
2010/170 ( PDF )
- On a conjecture about binary strings distribution
- Jean-Pierre Flori and Hugues Randriambololona and Gérard Cohen and Sihem Mesnager
-
2010/169 ( PDF )
- Dismantling SecureMemory, CryptoMemory and CryptoRF
- Flavio D. Garcia and Peter van Rossum and Roel Verdult and Ronny Wichers Schreur
-
2010/168 ( PDF )
- A Meet-in-the-Middle Attack on ARIA
- Xuehai Tang, Bing Sun, Ruilin Li and Chao Li
-
2010/167 ( PDF )
- Evolutionary Cipher against Differential Power Attack
- Tang ming and Meng Qinshu and Zhang Huanguo and Gao Si and Dou Qin and Shen Fei and Li Du
-
2010/166 ( PDF )
- Fault Analysis Study of the Block Cipher FOX64
- Ruilin Li and Jianxiong You and Bing Sun and Chao Li
-
2010/165 ( PDF )
- Comment on four two-party authentication protocols
- Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
-
2010/164 ( PDF )
- Black-Box Constructions of Protocols for Secure Computation
- Iftach Haitner and Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank
-
2010/163 ( PDF )
- Golay Complementary Sequences Over the QAM Constellation
- Wenping Ma ,Chen Yang and Shaohui Sun
-
2010/162 ( PS PS.GZ PDF )
- 1024XKS - A High Security Software Oriented Block Cipher Revisited
- Dieter Schmidt
-
2010/161 ( PDF )
- Stange's Elliptic Nets and Coxeter Group F4
- Daniel R. L. Brown
-
2010/160 ( PDF )
- A Flaw in The Internal State Recovery Attack on ALPHA-MAC
- Shengbao Wu and Mingsheng Wang and Zheng Yuan
-
2010/159 ( PDF )
- Identity-Based Encryption Secure against Selective Opening Attack
- Mihir Bellare and Brent Waters and Scott Yilek
-
2010/158 ( PDF )
- A variant of the F4 algorithm
- Antoine Joux and Vanessa Vitse
-
2010/157 ( PDF )
- Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$
- Antoine Joux and Vanessa Vitse
-
2010/156 ( PDF )
- Genus 2 Curves with Complex Multiplication
- Eyal Z. Goren and Kristin E. Lauter
-
2010/155 ( PDF )
- the upper bounds on differntial characteristics in block cipher SMS4
- Zhang MeiLing and Liu JingMei and Wang XinMei
-
2010/154 ( PDF )
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs
-
2010/153 ( PDF )
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia
-
2010/152 ( PDF )
- Secure and Fast Implementations of Two Involution Ciphers
- Billy Bob Brumley
-
2010/151 ( PDF )
- Ring signature with divided private key
- Stelian Flonta, Liviu-Cristian Miclea
-
2010/150 ( PDF )
- Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm
- Mohammad Sadeq Dousti
-
2010/149 ( PDF )
- On Small Subgroup Non-confinement Attack
- Feng Hao
-
2010/148 ( PDF )
- Comments on five smart card based password authentication protocols
- Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
-
2010/147 ( PDF )
- A New Framework for Password-Based Authenticated Key Exchange
- Adam Groce and Jonathan Katz
-
2010/146 ( PDF )
- Some Applications of Lattice Based Root Finding Techniques
- Santanu Sarkar and Subhamoy Maitra
-
2010/145 ( PDF )
- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
- Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
-
2010/144 ( PDF )
- New Definitions and Separations for Circular Security
- David Cash and Matthew Green and Susan Hohenberger
-
2010/143 ( PDF )
- Small Scale Variants Of The Block Cipher PRESENT
- Gregor Leander
-
2010/142 ( PDF )
- Mean value formulas for twisted Edwards curves
- Dustin Moody
-
2010/141 ( -- withdrawn -- )
- A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption
- Yu Chen
-
2010/140 ( PDF )
- Improved Agreeing-Gluing Algorithm
- Igor Semaev
-
2010/139 ( PDF )
- A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0
- Masao Kasahara
-
2010/138 ( PDF )
- On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP
- Manoj Kumar
-
2010/137 ( PDF )
- Estimating the Security of Lattice-based Cryptosystems
- Markus Rückert and Michael Schneider
-
2010/136 ( PDF )
- On Robust Key Agreement Based on Public Key Authentication
- Feng Hao
-
2010/135 ( PS PS.GZ PDF )
- On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption
- Aurélie Bauer and Jean-Sébastien Coron and David Naccache and Mehdi Tibouchi and Damien Vergnaud
-
2010/134 ( PDF )
- Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -
- Masaaki Shirase
-
2010/133 ( PDF )
- Signing on Elements in Bilinear Groups for Modular Protocol Design
- Masayuki Abe and Kristiyan Haralambiev and Miyako Ohkubo
-
2010/132 ( PS PS.GZ PDF )
- On the claimed privacy of EC-RAC III
- Junfeng Fan and Jens Hermans and Frederik Vercauteren
-
2010/131 ( PDF )
- Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation
- Jooyoung Lee and John Steinberger
-
2010/130 ( PDF )
- Low Voltage Fault Attacks to AES and RSA on General Purpose Processors
- Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi
-
2010/129 ( PDF )
- Relation for Algebraic Attack on E0 combiner
- N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
-
2010/128 ( -- withdrawn -- )
- Update-Optimal Authenticated Structures Based on Lattices
- Charalampos Papamanthou and Roberto Tamassia
-
2010/127 ( -- withdrawn -- )
- CCA-Secure Cryptosystem from Lattice
- Chen Huiyan
-
2010/126 ( PDF )
- On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
- Jian-zhu Lu and Jipeng Zhou
-
2010/125 ( PDF )
- Cryptographic Aspects of Real Hyperelliptic Curves
- M. J. Jacobson, Jr., R. Scheidler, AND A. Stein
-
2010/124 ( PDF )
- A Hardware Wrapper for the SHA-3 Hash Algorithms
- Brian Baldwin and Andrew Byrne and Liang Lu and Mark Hamilton and Neil Hanley and Maire O'Neill and William P. Marnane
-
2010/123 ( PDF )
- Delaying Mismatched Field Multiplications in Pairing Computations
- Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
-
2010/122 ( PDF )
- Security of Encryption Schemes in Weakened Random Oracle Models
- Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa
-
2010/121 ( -- withdrawn -- )
- Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
- Chen Huiyan and Li Zichen
-
2010/120 ( PDF )
- Universal One-Way Hash Functions and Average Case Complexity via Inaccessible Entropy
- Iftach Haitner and Thomas Holenstein and Omer Reingold and Salil Vadhan and Hoeteck Wee
-
2010/119 ( -- withdrawn -- )
- How to Construct Space Efficient Revocable IBE from Non-monotonic ABE
- Huang Lin and Zhenfu Cao and Muxin Zhou and Haojin Zhu
-
2010/118 ( PDF )
- Proposal of a Signature Scheme based on STS Trapdoor
- Shigeo Tsujii and Masahito Gotaishi and Kohtaro Tadaki and Ryou Fujita
-
2010/117 ( PDF )
- Cryptographic Agility and its Relation to Circular Encryption
- Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash
-
2010/116 ( PDF )
- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
- M. Abdelaziz Elaabid and Sylvain Guilley
-
2010/115 ( PDF )
- A Security Evaluation of DNSSEC with NSEC3
- Jason Bau, and John C Mitchell
-
2010/114 ( PDF )
- The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem
- Simon R. Blackburn
-
2010/113 ( PDF )
- Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
- Xu An Wang and Xiaoyuan Yang
-
2010/112 ( PDF )
- CCA-Secure PRE Scheme without Random Oracles
- Jun Shao and Zhenfu Cao and Peng Liu
-
2010/111 ( PDF )
- On zero practical significance of "Key recovery attack on full GOST block cipher with zero time and memory"
- Vladimir Rudskoy
-
2010/110 ( PDF )
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Allison Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters
-
2010/109 ( PDF )
- Practical Adaptive Oblivious Transfer from Simple Assumptions
- Matthew Green and Susan Hohenberger
-
2010/108 ( PDF )
- Perfectly Secure Oblivious RAM Without Random Oracles
- Ivan Damgård and Sigurd Meldgaard and Jesper Buus Nielsen
-
2010/107 ( PDF )
- Adaptive Concurrent Non-Malleability with Bare Public-Keys
- Andrew C. Yao and Moti Yung and Yunlei Zhao
-
2010/106 ( PDF )
- Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
- Ivan Damgĺrd and Yuval Ishai and Mikkel Krřigaard
-
2010/105 ( PDF )
- Bias in the nonlinear filter generator output sequence
- Sui-Guan Teo and Leonie Simpson and Ed Dawson
-
2010/104 ( PDF )
- Avoiding Full Extension Field Arithmetic in Pairing Computations
- Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
-
2010/103 ( PDF )
- The Extended Access Control for Machine Readable Travel Documents
- Rafik Chaabouni and Serge Vaudenay
-
2010/102 ( PDF )
- Constructing Verifiable Random Functions with Large Input Spaces
- Susan Hohenberger and Brent Waters
-
2010/101 ( PDF )
- Fair Blind Signatures without Random Oracles
- Georg Fuchsbauer and Damien Vergnaud
-
2010/100 ( PDF )
- Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security
- Brett Hemenway and Steve Lu and Rafail Ostrovsky
-
2010/099 ( PDF )
- On Homomorphic Encryption and Chosen-Ciphertext Security
- Brett Hemenway and Rafail Ostrovsky
-
2010/098 ( PDF )
- A Zero-One Law for Deterministic 2-Party Secure Computation
- Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
-
2010/097 ( PDF )
- Parallel Enumeration of Shortest Lattice Vectors
- Özgür Dagdelen and Michael Schneider
-
2010/096 ( PDF )
- Secret Sharing Extensions based on the Chinese Remainder Theorem
- Kamer Kaya and Ali Aydın Selçuk
-
2010/095 ( PDF )
- Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
- Kenneth G. Paterson and Gaven J. Watson
-
2010/094 ( PDF )
- A Random Number Generator Based on Isogenies Operations
- He Debiao, Chen Jianhua, Hu Jin
-
2010/093 ( PDF )
- New Impossible Di®erential Attacks on AES
- Zheng Yuan
-
2010/092 ( PS PS.GZ PDF )
- Security Weaknesses in Two Certificateless Signcryption Schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2010/091 ( PDF )
- Distinguishers for the Compression Function and Output Transformation of Hamsi-256
- Jean-Philippe Aumasson and Emilia Käsper and Lars Ramkilde Knudsen and Krystian Matusiewicz and Rune Odegaard and Thomas Peyrin and Martin Schläffer
-
2010/090 ( PDF )
- Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})
- Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi
-
2010/089 ( PDF )
- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
- Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai
-
2010/088 ( PDF )
- An Efficient and Parallel Gaussian Sampler for Lattices
- Chris Peikert
-
2010/087 ( PDF )
- MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions
- Christopher Wolf and Bart Preneel
-
2010/086 ( PDF )
- A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model
- Zvika Brakerski and Yael Tauman Kalai
-
2010/085 ( PDF )
- Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems
- Sk. Md. Mizanur Rahman and Mehedi Masud and Carlisle Adams and Khalil El-Khatib and Hussein Mouftah and Eiji Okamoto
-
2010/084 ( PDF )
- Attribute-based Authenticated Key Exchange
- M. Choudary Gorantla and Colin Boyd and Juan Manuel González Nieto
-
2010/083 ( PS PS.GZ PDF )
- One Round Group Key Exchange with Forward Security in the Standard Model
- M. Choudary Gorantla and Colin Boyd and Juan Manuel González Nieto
-
2010/082 ( PDF )
- Predicate-Based Key Exchange
- James Birkett and Douglas Stebila
-
2010/081 ( PDF )
- The Eris hybrid cipher
- Sandy Harris
-
2010/080 ( PDF )
- Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols
- Gergei Bana and Koji Hasebe and Mitsuhiro Okada
-
2010/079 ( PDF )
- From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
- Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
-
2010/078 ( PDF )
- Multiple Bytes Differential Fault Analysis on CLEFIA
- Xin-jie ZHAO and Tao WANG and Jing-zhe GAO
-
2010/077 ( PDF )
- ECC2K-130 on Cell CPUs
- Joppe W. Bos and Thorsten Kleinjung and Ruben Niederhagen and Peter Schwabe
-
2010/076 ( PDF )
- Private and Continual Release of Statistics
- T-H. Hubert Chan, Elaine Shi, Dawn Song
-
2010/075 ( PDF )
- A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra
- Mehdi Vasef
-
2010/074 ( PDF )
- Concurrent Knowledge Extraction in the Public-Key Model
- Andrew C. Yao and Moti Yung and Yunlei Zhao
-
2010/073 ( PDF )
- Related-Key Boomerang Attack on Block Cipher SQUARE
- Bonwook Koo, Yongjin Yeom, and Junghwan Song
-
2010/072 ( PDF )
- Approximating Addition by XOR: how to go all the way
- Didier Alquié
-
2010/071 ( PDF )
- 2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree
- Didier Alquié
-
2010/070 ( PDF )
- Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles
- Markus Rückert
-
2010/069 ( PDF )
- Type-II Optimal Polynomial Bases
- Daniel J. Bernstein and Tanja Lange
-
2010/068 ( PDF )
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
- Rosario Gennaro and Hugo Krawczyk and Tal Rabin
-
2010/067 ( PDF )
- A Pairing-Based DAA Scheme Further Reducing TPM Resources
- Ernie Brickell and Jiangtao Li
-
2010/066 ( PDF )
- Some Observations on TWIS Block Cipher
- Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li
-
2010/065 ( PDF )
- An Anonymous ID-based Encryption Revisited
- Zhengjun Cao
-
2010/064 ( PDF )
- New Advances on Privacy-Preserving Policy Reconciliation
- Ulrike Meyer and Susanne Wetzel and Sotiris Ioannidis
-
2010/063 ( PDF )
- Differential Fault Analysis on SMS4 Using a Single Fault
- Ruilin Li and Bing Sun and Chao Li and Jianxiong You
-
2010/062 ( PDF )
- Differential Cryptanalysis of SMS4 Block Cipher
- Bozhan Su and Wenling Wu and Wentao Zhang
-
2010/061 ( PDF )
- Privacy-Preserving Matching Protocols for Attributes and Strings
- Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu and Jyh-Charn Liu
-
2010/060 ( PDF )
- Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding
- Yongge Wang
-
2010/059 ( PDF )
- A New Framework for RFID Privacy
- Robert H. Deng, Yingjiu Li, Andrew C. Yao and Moti Yung and Yunlei Zhao
-
2010/058 ( PDF )
- Solinas primes of small weight for fixed sizes
- José de Jesús Angel Angel and Guillermo Morales-Luna
-
2010/057 ( PDF )
- Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
- Cagdas Calik and Meltem Sonmez Turan
-
2010/056 ( PDF )
- Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
- Xin-jie ZHAO and Tao WANG
-
2010/055 ( PDF )
- Credential Authenticated Identification and Key Exchange
- Jan Camenisch and Nathalie Casati and Thomas Gross and Victor Shoup
-
2010/054 ( PDF )
- An Improved Timing Attack with Error Detection on RSA-CRT
- Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
-
2010/053 ( PDF )
- Logical cryptoanalysis on the example of the cryptosystem DES
- A.D. Plotnikov
-
2010/052 ( -- withdrawn -- )
- Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
- FuShan Wei and QingFeng Cheng and ChuanGui Ma
-
2010/051 ( PDF )
- A Principle for Cryptographic Protocols Beyond Security, Less Parameters
- Zhengjun Cao
-
2010/050 ( PS PS.GZ PDF )
- Authenticating Aggregate Range Queries over Multidimensional Dataset
- Jia XU and Ee-Chien CHANG
-
2010/049 ( PS PS.GZ PDF )
- On Symmetric Encryption and Point Obfuscation
- Ran Canetti and Yael Tauman Kalai and Mayank Varia and Daniel Wichs
-
2010/048 ( -- withdrawn -- )
- An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
- He Debiao; Chen Jianhua; Hu Jin
-
2010/047 ( PDF )
- Lower Bounds for Straight Line Factoring
- Daniel R. L. Brown
-
2010/046 ( -- withdrawn -- )
- A New Chaos-Based Cryptosystem for Secure Transmitted Images
- Abir AWAD
-
2010/045 ( -- withdrawn -- )
- Efficient chaotic permutations for image encryption algorithms
- Abir AWAD
-
2010/044 ( -- withdrawn -- )
- A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
- Abir AWAD
-
2010/043 ( PDF )
- Differential and invertibility properties of BLAKE (full version)
- Jean-Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier
-
2010/042 ( PDF )
- A modified eCK model with stronger security for tripartite authenticated key exchange
- Qingfeng Cheng and Chuangui Ma and Fushan Wei
-
2010/041 ( PDF )
- The Effects of the Omission of Last Round's MixColumns on AES
- Orr Dunkelman and Nathan Keller
-
2010/040 ( PDF )
- Batch Groth-Sahai
- Olivier Blazy and Georg Fuchsbauer and Malika Izabachčne and Amandine Jambert and Hervé Sibert and Damien Vergnaud
-
2010/039 ( PDF )
- On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields
- Xiwang Cao and Lei Hu
-
2010/038 ( PDF )
- Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions
- Arnaud Boscher and Helena Handschuh and Elena Trichina
-
2010/037 ( PDF )
- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
- Pierre-Alain Fouque and Mehdi Tibouchi
-
2010/036 ( -- withdrawn -- )
- An Enhanced Remote User Authentication Scheme
- Keerti Srivastava and Amit K Awasthi and R.C.Mittal
-
2010/035 ( PDF )
- Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
- Goichiro Hanaoka and Kaoru Kurosawa
-
2010/034 ( PDF )
- On the order of the polynomial $x^p-x-a$
- Xiwang Cao
-
2010/033 ( PDF )
- Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
- Kristiyan Haralambiev and Tibor Jager and Eike Kiltz and Victor Shoup
-
2010/032 ( PDF )
- An Information Theoretic Perspective on the Differential Fault Analysis against AES
- Yang Li and Shigeto Gomisawa and Kazuo Sakiyama and Kazuo Ohta
-
2010/031 ( PDF )
- Class Invariants by the CRT Method
- Andreas Enge and Andrew V. Sutherland
-
2010/030 ( PDF )
- On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions
- Simon R. Blackburn and Douglas R. Stinson and Jalaj Upadhyay
-
2010/029 ( PDF )
- On Achieving the "Best of Both Worlds" in Secure Multiparty Computation
- Yuval Ishai and Jonathan Katz and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank
-
2010/028 ( PDF )
- A secure anonymous communication scheme in vehicular ad hoc networks from pairings
- *Jue-Sam Chou 1, Yalin Chen 2
-
2010/027 ( PDF )
- A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings
- Yalin Chen1, *Jue-Sam Chou2, Xian-Wu Hou3
-
2010/026 ( PDF )
- Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth
- Xin-jie Zhao and Tao Wang
-
2010/025 ( PDF )
- New Methodologies for Differential-Linear Cryptanalysis and Its Extensions
- Jiqiang Lu
-
2010/024 ( PDF )
- Authentication schemes from actions on graphs, groups, or rings
- Dima Grigoriev and Vladimir Shpilrain
-
2010/023 ( PDF )
- Differential Fault Analysis on AES with 192 and 256-Bit Keys
- Junko Takahashi and Toshinori Fukunaga
-
2010/022 ( PDF )
- Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
- Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
-
2010/021 ( PDF )
- A note on ``Improved Fast Correlation Attacks on Stream Ciphers"
- Kitae Jeong and Yuseop Lee and Jaechul Sung and Seokhie Hong
-
2010/020 ( PS PS.GZ PDF )
- Number of Jacobi quartic curves over finite fields
- Rongquan Feng, Hongfeng Wu
-
2010/019 ( PDF )
- Related-Key Boomerang and Rectangle Attacks
- Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller
-
2010/018 ( PDF )
- Scalability and Security Conflict for RFID Authentication Protocols
- Imran Erguler and Emin Anarim
-
2010/017 ( PS PS.GZ PDF )
- A new one-time signature scheme from syndrome decoding
- Paulo S. L. M. Barreto and Rafael Misoczki
-
2010/016 ( PDF )
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang
-
2010/015 ( PDF )
- Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
- Jorge Guajardo and Bart Mennink
-
2010/014 ( PDF )
- A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs
- Mridul Nandi
-
2010/013 ( PDF )
- A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
- Orr Dunkelman and Nathan Keller and Adi Shamir
-
2010/012 ( PS PS.GZ PDF )
- Differential Cache Trace Attack Against CLEFIA
- Chester Rebeiro and Debdeep Mukhopadhyay
-
2010/011 ( -- withdrawn -- )
- Related Key Cryptanalysis of the LEX Stream Cipher
- Mainack Mondal and Debdeep Mukhopadhyay
-
2010/010 ( PDF )
- Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII
- Kazuyuki Kobayashi and Jun Ikegami and Shin’ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta
-
2010/009 ( PDF )
- The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions
- Xuelian Li and Yupu Hu and Juntao Gao
-
2010/008 ( PS PS.GZ PDF )
- A DAA Scheme Requiring Less TPM Resources
- Liqun Chen
-
2010/007 ( PDF )
- Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2010/006 ( PDF )
- Factorization of a 768-bit RSA modulus
- Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thomé and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann
-
2010/005 ( PDF )
- Skew-Frobenius map on twisted Edwards curve
- Mingqiang Wang, Xiaoyun Wang,Tao Zhan, Yuliang Zheng
-
2010/004 ( PS PS.GZ PDF )
- Halving on Binary Edwards Curves
- Qiping Lin and Fangguo Zhang
-
2010/003 ( PDF )
- Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network
- Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
-
2010/002 ( PDF )
- Practical ID-based Encryption for Wireless Sensor Network
- Cheng-Kang Chu and Joseph K. Liu and Jianying Zhou and Feng Bao and Robert H. Deng
-
2010/001 ( PDF )
- Transfinite Cryptography
- Jacques Patarin
-
2009/638 ( -- withdrawn -- )
- Reducing Elliptic Curve Logarithm to Logarithm in a Finite Field $\mathbb{F}_q$ for Some Orders
- Wei Yu, Kunpeng Wang, Bao Li
-
2009/637 ( PDF )
- Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers
- Xiao-shan Gao and Zhenyu Huang
-
2009/636 ( PDF )
- Obtaining More Karatsuba-Like Formulae over The Binary Field
- Haining Fan and Ming Gu and Jiaguang Sun and Kwok-Yan Lam
-
2009/635 ( PDF )
- Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature
- Kazukuni Kobara
-
2009/634 ( PDF )
- Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3_{512}
- Charles Bouillaguet and Orr Dunkelman and Gaëtan Leurent and Pierre-Alain Fouque
-
2009/633 ( PDF )
- Traitor-Tracing on Binary Strings
- Michael J. Collins
-
2009/632 ( PDF )
- Cryptanalysis of Secure Message Transmission Protocols with Feedback
- Qiushi Yang and Yvo Desmedt
-
2009/631 ( PDF )
- Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
- DaeHun Nyang and Mun-Kyu Lee
-
2009/630 ( PDF )
- Information-Theoretically Secure Protocols and Security Under Composition
- Eyal Kushilevitz and Yehuda Lindell and Tal Rabin
-
2009/629 ( PDF )
- A Comparative Analysis of Delay Based PUF Implementations on FPGA
- Sergey Morozov and Abhranil Maiti and Patrick Schaumont,
-
2009/628 ( PS PS.GZ PDF )
- Using Sphinx to Improve Onion Routing Circuit Construction
- Aniket Kate and Ian Goldberg
-
2009/627 ( PDF )
- A Unified Method for Finding Impossible Differentials of Block Cipher Structures
- Yiyuan Luo, Zhongming Wu, Xuejia Lai and Guang Gong
-
2009/626 ( PDF )
- Approximate Integer Common Divisor Problem relates to Implicit Factorization
- Santanu Sarkar and Subhamoy Maitra
-
2009/625 ( PS PS.GZ PDF )
- Cryptographic Accumulators for Authenticated Hash Tables
- Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos
-
2009/624 ( PS PS.GZ PDF )
- Security Analysis of the PACE Key-Agreement Protocol
- Jens Bender and Marc Fischlin and Dennis Kuegler
-
2009/623 ( PDF )
- Universally Constructing 12-th Degree Extension Field for Ate Pairing
- Masaaki Shirase
-
2009/622 ( PDF )
- A Strong Blind Signature Scheme over Braid Groups
- WEI Yun, XIONG Guo-Hua, BAO Wan-Su and ZHANG Xing-Kai
-
2009/621 ( PDF )
- On the Analysis of Cryptographic Assumptions in the Generic Ring Model
- Tibor Jager and Jörg Schwenk
-
2009/620 ( PDF )
- Security of ECQV-Certified ECDSA Against Passive Adversaries
- Daniel R. L. Brown and Matthew J. Campagna and Scott A. Vanstone
-
2009/619 ( PDF )
- A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)
- Charles Bouillaguet and Pierre-Alain Fouque and Antoine Joux and Joana Treger
-
2009/618 ( PDF )
- Data-Depend Hash Algorithm
- ZiJie Xu and Ke Xu
-
2009/617 ( PDF )
- An efficient ID- based directed signature scheme from bilinear pairings
- B. Umaprasada Rao and P. Vasudeva Reddy and T. Gowri
-
2009/616 ( PS PS.GZ PDF )
- Fully Homomorphic Encryption over the Integers
- Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
-
2009/615 ( PDF )
- Faster Pairing Computations on Curves with High-Degree Twists
- Craig Costello and Tanja Lange and Michael Naehrig
-
2009/614 ( PDF )
- Secure Multiparty AES (full paper)
- Ivan Damgĺrd and Marcel Keller
-
2009/613 ( PDF )
- Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition
- Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
-
2009/612 ( PDF )
- On the Impossibility of Batch Update for Cryptographic Accumulators
- Philippe Camacho
-
2009/611 ( PDF )
- Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules
- Lan Luo,QiongHai Dai,ZhiGuang Qin and ChunXiang Xu
-
2009/610 ( PDF )
- Security Analysis of A Remote User Authentication Protocol by Liao and Wang
- Dang Nguyen Duc and Kwangjo Kim
-
2009/609 ( PDF )
- Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction
- Dang Nguyen Duc and Kwangjo Kim
-
2009/608 ( PS PS.GZ PDF )
- Non-Malleable Codes
- Stefan Dziembowski and Krzysztof Pietrzak and Daniel Wichs
-
2009/607 ( -- withdrawn -- )
- Efficient Client Puzzles based on Repeated-Squaring
- Ghassan O. Karame and Srdjan Capkun
-
2009/606 ( PDF )
- On a weakness of the Tu-Deng function and its repair
- Claude Carlet
-
2009/605 ( PDF )
- Solving the Shortest Lattice Vector Problem in Time 2^2.465n
- Xavier Pujol and Damien Stehle
-
2009/604 ( PDF )
- Composition of Zero-Knowledge Proofs with Efficient Provers
- Eleanor Birrell and Salil Vadhan
-
2009/603 ( PDF )
- An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations
- Brian Baldwin and William P. Marnane
-
2009/602 ( PS PS.GZ PDF )
- Secure Ranging With Message Temporal Integrity
- Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan Čapkun
-
2009/601 ( PDF )
- Parallel Shortest Lattice Vector Enumeration on Graphics Cards
- Jens Hermans and Michael Schneider and Johannes Buchmann and Frederik Vercauteren and Bart Preneel
-
2009/600 ( PDF )
- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
- D. Fiore and R. Gennaro and N.P. Smart
-
2009/599 ( PDF )
- Groth--Sahai proofs revisited
- E. Ghadafi, N.P. Smart and B. Warinschi
-
2009/598 ( PDF )
- On the Design and Implementation of an Efficient DAA Scheme
- L. Chen, D. Page and N.P. Smart
-
2009/597 ( PS PS.GZ PDF )
- Twisted Jacobi Intersections Curves
- Rongquan Feng, Menglong Nie, Hongfeng Wu
-
2009/596 ( PS PS.GZ PDF )
- Could SFLASH be repaired?
- Jintai Ding and Vivien Dubois and Bo-Yin Yang and Owen Chia-Hsin Chen and Chen-Mou Cheng
-
2009/595 ( PDF )
- Efficiency Limitations for $\Sigma$-Protocols for Group Homomorphisms
- Endre Bangerter and Jan Camenisch and Stephan Krenn
-
2009/594 ( PDF )
- Efficient Set Operations in the Presence of Malicious Adversaries
- Carmit Hazay and Kobbi Nissim
-
2009/593 ( PS PS.GZ PDF )
- Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
- Jin Li and Qian Wang and Cong Wang and Ning Cao and Kui Ren and Wenjing Lou
-
2009/592 ( PDF )
- From Passive to Covert Security at Low Cost
- Ivan Damgĺrd and Martin Geisler and Jesper Buus Nielsen
-
2009/591 ( PDF )
- Embedded SFE: Offloading Server and Network using Hardware Tokens
- Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
-
2009/590 ( PDF )
- More Constructions of Lossy and Correlation-Secure Trapdoor Functions
- David Mandell Freeman and Oded Goldreich and Eike Kiltz and Alon Rosen and Gil Segev
-
2009/589 ( PDF )
- Information-set decoding for linear codes over Fq
- Christiane Peters
-
2009/588 ( PS PS.GZ PDF )
- Confidential Signatures and Deterministic Signcryption
- Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam and Dominique Schroder
-
2009/587 ( PDF )
- Poly-Dragon: An efficient Multivariate Public Key Cryptosystem
- Rajesh P. Singh, A. Saikia and B.K. Sarma
-
2009/586 ( PS PS.GZ PDF )
- A mean value formula for elliptic curves
- Rongquan Feng and Hongfeng Wu
-
2009/585 ( PDF )
- An Improved Differential Fault Attack on Camellia
- ZHAO Xin-jie, WANG Tao
-
2009/584 ( PDF )
- Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers
- Yu Liu, Kaijie Wu, and Ramesh Karri
-
2009/583 ( PDF )
- Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem
- Charles Bouillaguet and Jean-Charles Faugčre and Pierre-Alain Fouque and Ludovic Perret
-
2009/582 ( PDF )
- A Game-Based Definition of Coercion-Resistance and its Applications
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2009/581 ( PDF )
- A Diagonal Fault Attack on the Advanced Encryption Standard
- Dhiman Saha and Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
-
2009/580 ( PDF )
- A complete set of addition laws\\for incomplete Edwards curves
- Daniel J. Bernstein and Tanja Lange
-
2009/579 ( PDF )
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- Cong Wang and Sherman S.-M. Chow and Qian Wang and Kui Ren and Wenjing Lou
-
2009/578 ( PS PS.GZ PDF )
- Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps
- Wenjian Xie and Zhang Zhang
-
2009/577 ( PDF )
- On the nonlinearity profile of the Dillon function
- Claude Carlet
-
2009/576 ( PDF )
- Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
- Vadim Lyubashevsky and Adriana Palacio and Gil Segev
-
2009/575 ( PDF )
- Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
- Michael Tunstall and Debdeep Mukhopadhyay
-
2009/574 ( PS PS.GZ PDF )
- Voting with unconditional privacy: CFSY for booth voting
- Jeroen van de Graaf
-
2009/573 ( PDF )
- New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields
- Leibo Li and Mingqiang Wang and Zhanjiang Xia
-
2009/572 ( -- withdrawn -- )
- On the Equivalence of Two Models for Key-Dependent-Message Encryption
- Alexander W. Dent
-
2009/571 ( PDF )
- Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
- N.P. Smart and F. Vercauteren
-
2009/570 ( PDF )
- Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model
- Adriana C. B. Pinto and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento
-
2009/569 ( PDF )
- Secure Network Coding Over the Integers
- Rosario Gennaro and Jonathan Katz and Hugo Krawczyk and Tal Rabin
-
2009/568 ( PDF )
- Ephemeral key compromise attack on the IB-KA protocol
- Qingfeng Cheng and Chuangui Ma
-
2009/567 ( PDF )
- Properties of the Discrete Differential with Cryptographic Applications
- Daniel Smith-Tone
-
2009/566 ( PDF )
- New Cryptosystems From CSP-Based Self-Distributive Systems
- Licheng Wang and Lihua Wang and Zhenfu Cao and Eiji Okamoto and Jun Shao
-
2009/565 ( PDF )
- Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
- Robert Granger and Michael Scott
-
2009/564 ( PDF )
- Optimal pairing revisited
- Mingqiang Wang and Puwen Wei and Haifeng Zhang and Yuliang Zheng
-
2009/563 ( PDF )
- A Family of $p$-ary Binomial Bent Functions
- Dabin Zheng and Xiangyong Zeng and Lei Hu
-
2009/562 ( PDF )
- How to pair with a human
- Stefan Dziembowski
-
2009/561 ( PDF )
- Improvements on two password-based authentication protocols
- Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
-
2009/560 ( PDF )
- On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme
- Manoj Kumar
-
2009/559 ( PDF )
- New Integral Distinguisher for Rijndael-256
- Yuechuan Wei and Bing Sun and Chao Li
-
2009/558 ( -- withdrawn -- )
- Quantifying Trust
- Mariusz Jakubowski AND Ramarathnam Venkatesan AND Yacov Yacobi
-
2009/557 ( -- withdrawn -- )
- Towards a Theory of Trust Based Collaborative Search
- Yacov Yacobi
-
2009/556 ( PDF )
- Constructing Tower Extensions for the implementation of Pairing-Based Cryptography
- Naomi Benger and Michael Scott
-
2009/555 ( -- withdrawn -- )
- An enhanced password authenticated key agreement protocol for wireless mobile network
- Zhigang Gao and Dengguo Feng
-
2009/554 ( PDF )
- ON A COMBINATORIAL CONJECTURE
- T. W. CUSICK, YUAN LI AND PANTELIMON STANICA
-
2009/553 ( PDF )
- Cryptanalysis of a key exchange scheme based on block matrices
- Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Pedro Taborda Duarte
-
2009/552 ( PDF )
- Preimage Attacks on Reduced DHA-256
- Jinmin Zhong and Xuejia Lai
-
2009/551 ( PDF )
- A Novel Design Method of Stream Ciphers Based on Table-Element Permutation
- Hongbo Zou
-
2009/550 ( PDF )
- How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
- Yusuke Naito and Lei Wang and Kazuo Ohta
-
2009/549 ( PDF )
- Making Collusion-Secure Codes (More) Robust against Bit Erasure
- Koji Nuida
-
2009/548 ( PS PS.GZ PDF )
- A NOTE ON YAO'S THEOREM ABOUT PSEUDORANDOM GENERATORS
- Stéphane BALLET and Robert ROLLAND
-
2009/547 ( PS PS.GZ PDF )
- Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Rosario Gennaro and Craig Gentry and Bryan Parno
-
2009/546 ( PDF )
- Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC
- Masao Kasahara
-
2009/545 ( PDF )
- Fuzzy extractors for continuous distributions
- Ileana Buhan and Jeroen Doumen and Pieter Hartel
-
2009/544 ( PS PS.GZ PDF )
- Connections between Quaternary and Binary Bent Functions
- Patrick Solé and Natalia Tokareva
-
2009/543 ( -- withdrawn -- )
- A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols
- Gildas Avoine and Muhammed Ali Bingol and Suleyman Kardas and Cedric Lauradoux and Benjamin Martin
-
2009/542 ( PDF )
- Analysis of Intermediate Field Systems
- Olivier Billet and Jacques Patarin and Yannick Seurin
-
2009/541 ( PDF )
- Breaking ECC2K-130
- Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh-Chung Chen and Chen-Mou Cheng and Gauthier van Damme and Giacomo de Meulenaer and Luis Julian Dominguez Perez and Junfeng Fan and Tim Güneysu and Frank Gurkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo-Yin Yang
-
2009/540 ( PDF )
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- David Mandell Freeman
-
2009/539 ( PDF )
- Covering Radius of Two-dimensional Lattices
- Yupeng Jiang and Yingpu Deng and Yanbin Pan
-
2009/538 ( PS PS.GZ PDF )
- Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
- Johann Großschädl and Elisabeth Oswald and Dan Page and Michael Tunstall
-
2009/537 ( PDF )
- Cryptanalysis of two knapsack public-key cryptosystems
- Jingguo Bi; Xianmeng Meng and Lidong Han
-
2009/536 ( -- withdrawn -- )
- Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
- S. Wu
-
2009/535 ( -- withdrawn -- )
- Weakness of a three-party password-based authenticated key exchange protocol
- S. Wu
-
2009/534 ( -- withdrawn -- )
- Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
- S. Wu
-
2009/533 ( PDF )
- Finding composite order ordinary elliptic curves using the Cocks-Pinch method
- D. Boneh and K. Rubin and A. Silverberg
-
2009/532 ( PDF )
- Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
- Sanjam Garg and Abishek Kumarasubramanian and Amit Sahai and Brent Waters
-
2009/531 ( PDF )
- Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations
- Henri Gilbert and Thomas Peyrin
-
2009/530 ( PDF )
- A New Proposal Against the Main of Generic Attacks
- Xigen.Yao
-
2009/529 ( PDF )
- Oblivious Transfer with Access Control
- Jan Camenisch and Maria Dubovitskaya and Gregory Neven
-
2009/528 ( PDF )
- New Fault Attack on Elliptic Curve Scalar Multiplication
- Alexey Chilikov and Oleg Taraskin
-
2009/527 ( PDF )
- An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme
- Seiko Arita
-
2009/526 ( PDF )
- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
- Jiazhe Chen and Keting Jia
-
2009/525 ( PS PS.GZ PDF )
- On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks
- Somindu C. Ramanna and Palash Sarkar
-
2009/524 ( PDF )
- Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
- Petros Mol and Scott Yilek
-
2009/523 ( PDF )
- Differential Addition in generalized Edwards Coordinates
- Benjamin Justus and Daniel Loebenberger
-
2009/522 ( PDF )
- Isogenies of Elliptic Curves: A Computational Approach
- Daniel Shumow
-
2009/521 ( PDF )
- An Efficient Secure Oblivious Transfer
- Hung-Min Sun and Yalin Chen and Jue-Sam Chou
-
2009/520 ( PDF )
- Universally Composable Incoercibility
- Dominique Unruh and Jörn Müller-Quade
-
2009/519 ( PDF )
- Secure Message Transmission with Small Public Discussion
- Juan Garay and Clint Givens and Rafail Ostrovsky
-
2009/518 ( PDF )
- Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability
- Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo
-
2009/517 ( PDF )
- New Constructions of Convertible Undeniable Signature Schemes without Random Oracles
- Qiong Huang and Duncan S. Wong
-
2009/516 ( PDF )
- Lightweight Cryptography - Cryptographic Engineering for a Pervasive World
- Axel Poschmann
-
2009/515 ( PDF )
- Blake-Wilson, Johnson and Menezes Protocol Revisited
- Hai Huang and Zhenfu Cao
-
2009/514 ( PS PS.GZ PDF )
- Generic One Round Group Key Exchange in the Standard Model
- M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonzalez Nieto and Mark Manulis
-
2009/513 ( PDF )
- On the round complexity of black-box constructions of commitments secure against selective opening attacks
- David Xiao
-
2009/512 ( PS PS.GZ PDF )
- Public-Key Encryption in the Bounded-Retrieval Model
- Joel Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs
-
2009/511 ( PDF )
- Bounded Key-Dependent Message Security
- Boaz Barak and Iftach Haitner and Dennis Hofheinz and Yuval Ishai
-
2009/510 ( PDF )
- High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein
- Stefan Tillich and Martin Feldhofer and Mario Kirschbaum and Thomas Plos and Jörn-Marc Schmidt and Alexander Szekely
-
2009/509 ( PDF )
- Practical Key Recovery Attacks On Two McEliece Variants
- Valerie Gauthier Umana and Gregor Leander
-
2009/508 ( PDF )
- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
- Severin Winkler and Juerg Wullschleger
-
2009/507 ( PDF )
- Efficient Privacy-Preserving Face Recognition
- Ahmad-Reza Sadeghi and Thomas Schneider and Immo Wehrenberg
-
2009/506 ( PDF )
- An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions
- Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
-
2009/505 ( PDF )
- Authenticated Key Exchange Protocols with Enhanced Freshness Properties
- Hai Huang, Zhenfu Cao
-
2009/504 ( PDF )
- Insecure ``Provable Secure Network Coding''
- Yongge Wang
-
2009/503 ( PDF )
- Fault Attacks Against EMV Signatures
- Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi
-
2009/502 ( PDF )
- On second order nonlinearities of cubic monomial Boolean functions
- Ruchi Gode, Sugata Gangopadhyay
-
2009/501 ( PDF )
- Fast Implementations of AES on Various Platforms
- Joppe W. Bos, Dag Arne Osvik, and Deian Stefan
-
2009/500 ( PS PS.GZ PDF )
- Key Recovery Attack on QuiSci
- Nils Reimers
-
2009/499 ( PS PS.GZ PDF )
- Underlying Assumptions and Designated Verifier Signatures
- Chifumi Sato and Takeshi Okamoto and Eiji Okamoto
-
2009/498 ( PDF )
- NTRU based group oriented signature
- Chunbo Ma and Jun Ao
-
2009/497 ( PDF )
- Cube Attack on Courtois Toy Cipher
- Piotr Mroczkowski and Janusz Szmidt
-
2009/496 ( PS PS.GZ PDF )
- Anonymous Fuzzy Identity-based Encryption for Similarity Search
- Ye Zhang and Nikos Mamoulis and David W. Cheung and S.M. Yiu and W.K. Wong
-
2009/495 ( PDF )
- Security Weakness in Two Authenticated Key Exchange Protocols
- Qingfeng Cheng and Chuangui Ma
-
2009/494 ( PDF )
- A Framework for Universally Composable Non-Committing Blind Signatures
- Masayuki Abe and Miyako Ohkubo
-
2009/493 ( PDF )
- Remarks on Some Quantum Cryptographic Schemes
- Zhengjun Cao
-
2009/492 ( PDF )
- Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2009/491 ( PDF )
- Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity
- Emiliano De Cristofaro and Gene Tsudik
-
2009/490 ( PDF )
- Cryptanalysis of Multiple-Server Password-Authenticated Key
- Sang-Gon Lee
-
2009/489 ( PDF )
- Impossible Boomerang Attack for Block Cipher Structures
- Jiali Choy and Huihui Yap
-
2009/488 ( PDF )
- Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
- Rajesh P Singh and A.Saikia and B.K.Sarma
-
2009/487 ( PDF )
- Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures
- Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
-
2009/486 ( PDF )
- Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
- Allison Lewko and Brent Waters
-
2009/485 ( PDF )
- Black-Box Circular-Secure Encryption Beyond Affine Functions
- Zvika Brakerski and Shafi Goldwasser and Yael Kalai
-
2009/484 ( PDF )
- New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256
- Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
-
2009/483 ( PDF )
- On the Security of UOV
- Jean-Charles Faugčre and Ludovic Perret
-
2009/482 ( PDF )
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Allison Lewko and Brent Waters
-
2009/481 ( PDF )
- PPS: Privacy Preserving Statistics using RFID Tags
- Erik-Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva
-
2009/480 ( PDF )
- On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited
- Sanjit Chatterjee and Alfred Menezes
-
2009/479 ( PDF )
- Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512
- Yu Sasaki and Lei Wang and Kazumaro Aoki
-
2009/478 ( PDF )
- Pseudo-cryptanalysis of the Original Blue Midnight Wish
- Søren S. Thomsen
-
2009/477 ( PDF )
- Preimages for Step-Reduced SHA-2
- Jian Guo and Krystian Matusiewicz
-
2009/476 ( PDF )
- On the Security of PAS (Predicate-based Authentication Service)
- Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang
-
2009/475 ( PS PS.GZ PDF )
- Double-Exponentiation in Factor-4 Groups and its Applications
- Koray Karabina
-
2009/474 ( PDF )
- Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
- Scott Yilek
-
2009/473 ( PS PS.GZ PDF )
- A Simple Power Analysis Attack on the Serpent Key Schedule
- Kevin J. Compton and Brian Timm and Joel VanLaven
-
2009/472 ( PDF )
- Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
- Madeline Gonzalez and Rainer Steinwandt
-
2009/471 ( PS PS.GZ PDF )
- Improving the Berlekamp algorithm for binomials \boldmath$x^{n} - a$
- Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo and Liang Cui
-
2009/470 ( PDF )
- On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2009/469 ( PDF )
- Additive Combinatorics and Discrete Logarithm Based Range Protocols
- Rafik Chaabouni and Helger Lipmaa and abhi shelat
-
2009/468 ( PDF )
- Password Based Key Exchange with Hidden Elliptic Curve Public Parameters
- Julien Bringer and Herve Chabanne and Thomas Icart
-
2009/467 ( -- withdrawn -- )
- The LPN Problem with Auxiliary Input
- Yu Yu
-
2009/466 ( PDF )
- The Certicom Challenges ECC2-X
- Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel
-
2009/465 ( PDF )
- Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
- Rishab Nithyanand and Gene Tsudik and Ersin Uzun
-
2009/464 ( PDF )
- On Key Authentic Degree of Cryptosystem
- WANG Yong, WANG Huangdeng
-
2009/463 ( PDF )
- On Linear Cryptanalysis with Many Linear Approximations
- Benoit Gérard and Jean-Pierre Tillich
-
2009/462 ( PS PS.GZ PDF )
- Certificateless KEM and Hybrid Signcryption Schemes Revisited
- S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
-
2009/461 ( PDF )
- A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC)
- Bruce Kapron and Lior Malka and Venkatesh Srinivasan
-
2009/460 ( PDF )
- Asymptotic enumeration of correlation-immune boolean functions
- E. Rodney Canfield and Zhicheng Gao and Catherine Greenhill and Brendan D. McKay and Robert W. Robinson
-
2009/459 ( PS PS.GZ PDF )
- Efficient Oblivious Polynomial Evaluation with Simulation-Based Security
- Carmit Hazay and Yehuda Lindell
-
2009/458 ( PDF )
- Security Analysis and Design of Proxy Signature Schemes over Braid Groups
- Wei Yun and Xiong Guo-hua and Zhang Xing-kai and Bao Wan-su
-
2009/457 ( PDF )
- A remark on the computation of cube roots in finite fields
- Nozomu Nishihara and Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo
-
2009/456 ( -- withdrawn -- )
- An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions
- Kimmo Halunen and Juha Kortelainen and Tuomas Kortelainen
-
2009/455 ( PS PS.GZ PDF )
- Identity-Based Hybrid Signcryption
- Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
-
2009/454 ( PDF )
- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
- Jacob C. N. Schuldt and Kanta Matsuura
-
2009/453 ( PDF )
- A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
- Vlastimil Klima and Petr Susil
-
2009/452 ( PDF )
- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
- Christian Wieschebrink
-
2009/451 ( PDF )
- Efficient Certificateless KEM in the Standard Model
- Georg Lippold, Colin Boyd, Juan González Nieto
-
2009/450 ( PDF )
- On Hierarchical Threshold Secret Sharing
- Ali Aydin Selcuk and Kerem Kaskaloglu and Ferruh Ozbudak
-
2009/449 ( PS PS.GZ PDF )
- One for All - All for One: Unifying Standard DPA Attacks
- Stefan Mangard and Elisabeth Oswald and Francois-Xavier Standaert
-
2009/448 ( PDF )
- Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds
- Ning Ding and Dawu Gu and Bart Preneel
-
2009/447 ( PDF )
- ROSSLER NONLINEAR DYNAMICAL MACHINE FOR CRYPTOGRAPHY APPLICATIONS
- Sunil Pandey and Praveen Kaushik and Dr. S.C. Shrivastava
-
2009/446 ( PDF )
- Ntrąu-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
- Ehsan Malekian and Ali Zakerolhosseini
-
2009/445 ( PDF )
- Computing Hilbert class polynomials with the Chinese Remainder Theorem
- Andrew V. Sutherland
-
2009/444 ( PDF )
- Secure and Efficient HB-CM Entity Authentication Protocol
- Zhijun Li and Guang Gong and Zhiguang Qin
-
2009/443 ( PDF )
- Rebound Attack on the Full LANE Compression Function
- Krystian Matusiewicz and Maria Naya-Plasencia and Ivica Nikolic and Yu Sasaki and Martin Schläffer
-
2009/442 ( PDF )
- Fuzzy Privacy Preserving Peer-to-Peer Reputation Management
- Rishab Nithyanand and Karthik Raman
-
2009/441 ( PDF )
- An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP
- Jayaprakash Kar and Banshidhar Majhi
-
2009/440 ( PS PS.GZ PDF )
- A Multivariate Signature Scheme with an almost cyclic public key
- Albrecht Petzoldt and Johannes Buchmann
-
2009/439 ( PS PS.GZ PDF )
- A Fast Mental Poker Protocol
- Tzer-jen Wei and Lih-Chung Wang
-
2009/438 ( PDF )
- Improved Cryptanalysis of Skein
- Jean-Philippe Aumasson and Cagdas Calik and Willi Meier and Onur Ozen and Raphael C.-W. Phan and Kerem Varici
-
2009/437 ( PS PS.GZ PDF )
- On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
- Shengbao Wang
-
2009/436 ( PS PS.GZ PDF )
- On the Connection between Signcryption and One-pass Key Establishment
- M. Choudary Gorantla and Colin Boyd and Juan Manuel González Nieto
-
2009/435 ( PS PS.GZ PDF )
- Efficient Confirmer Signatures from the ``Signature of a Commitment'' Paradigm
- Laila El Aimani
-
2009/434 ( PDF )
- Tight Bounds for Protocols with Hybrid Security
- Matthias Fitzi and Dominik Raub
-
2009/433 ( PDF )
- Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience
- Arpita Patra and C. Pandu Rangan
-
2009/432 ( -- withdrawn -- )
- Practical Distributed Key Generation Scheme
- Chen Huiyan and Li Zichen and Fang Yong
-
2009/431 ( PS PS.GZ PDF )
- On the Design of Trivium
- Yun Tian and Gongliang Chen and Jianhua Li
-
2009/430 ( PDF )
- One-time-password-authenticated key exchange
- Kenneth G. Paterson and Douglas Stebila
-
2009/429 ( PDF )
- Precise Time and Space Simulatable Zero-Knowledge
- Ning Ding and Dawu Gu
-
2009/428 ( PDF )
- Efficiently from Semi-honest to Malicious OT via OLFE
- Jürg Wullschleger
-
2009/427 ( PDF )
- Efficient Verifiable Escrow and Fair Exchange with Trusted Hardware
- Stephen R. Tate and Roopa Vishwanathan
-
2009/426 ( PDF )
- Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes
- Daniel Pasaila and Vlad Alexa and Sorin Iftene
-
2009/425 ( PDF )
- Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol
- Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri
-
2009/424 ( PDF )
- Double Voter Perceptible Blind Signature Based Electronic Voting Protocol
- Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri
-
2009/423 ( PDF )
- Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
- Atsushi Fujioka and Koutarou Suzuki and Berkant Ustaoglu
-
2009/422 ( PDF )
- Attacks on {RFID}-Based Electronic Voting Systems
- Yossef Oren and Avishai Wool
-
2009/421 ( PS PS.GZ PDF )
- How to Construct Identity-Based Signatures without the Key Escrow Problem
- Tsz Hon Yuen and Willy Susilo and Yi Mu
-
2009/420 ( PDF )
- Higher-order Masking and Shuffling for Software Implementations of Block Ciphers
- Matthieu Rivain and Emmanuel Prouff and Julien Doget
-
2009/419 ( PDF )
- An Efficient Method for Random Delay Generation in Embedded Software
- Jean-Sébastien Coron and Ilya Kizhvatov
-
2009/418 ( PDF )
- Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed?
- Mihir Bellare and Dennis Hofheinz and Eike Kiltz
-
2009/417 ( PS PS.GZ PDF )
- More Differential Paths of TIB3
- Harry Wiggins and Philip Hawkes and Gregory G. Rose and Cameron McDonald
-
2009/416 ( PDF )
- KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem
- Carsten Elsner and Martin Schmidt
-
2009/415 ( PDF )
- Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash
- Ethan Heilman
-
2009/414 ( PDF )
- Security Bounds for the Design of Code-based Cryptosystems
- Matthieu Finiasz and Nicolas Sendrier
-
2009/413 ( PDF )
- Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission
- Jiang Wu and Douglas R. Stinson
-
2009/412 ( PDF )
- Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words
- Nathan Keller and Stephen D. Miller
-
2009/411 ( PDF )
- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
- Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
-
2009/410 ( PDF )
- Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
- S. Dov Gordon and Jonathan Katz and Ranjit Kumaresan and Arkady Yerukhimovich
-
2009/409 ( PS PS.GZ )
- A Tree Based Recursive Scheme for Space Efficient Secret Sharing
- Abhishek Parakh and Subhash Kak
-
2009/408 ( PS PS.GZ PDF )
- A Secure and Efficient Authenticated Diffie–Hellman Protocol
- Augustin P. Sarr and Philippe Elbaz–Vincent, and Jean–Claude Bajard
-
2009/407 ( PS PS.GZ PDF )
- Single Block Attacks and Statistical Tests on CubeHash
- Benjamin Bloom and Alan Kaminsky
-
2009/406 ( PDF )
- On-line Non-transferable Signatures Revisited
- Jacob C. N. Schuldt and Kanta Matsuura
-
2009/405 ( PDF )
- Generic Attacks on Misty Schemes -5 rounds is not enough-
- Valerie Nachef and Jacques Patarin and Joana Treger
-
2009/404 ( -- withdrawn -- )
- Pairing-Friendly Elliptic Curves With Various Discriminants
- Woo Sug Kang and Ki Taek Kim
-
2009/403 ( PS PS.GZ PDF )
- On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited)
- Laila El Aimani
-
2009/402 ( PDF )
- AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time
- Michael Vielhaber
-
2009/401 ( PDF )
- Longest Common Subsequence as Private Search
- Mark Gondree and Payman Mohassel
-
2009/400 ( PDF )
- Identity-Based Chameleon Hash Scheme Without Key Exposure
- Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Kwangjo Kim
-
2009/399 ( PDF )
- Leakage-Resilient Storage
- Francesco Davě and Stefan Dziembowski and Daniele Venturi
-
2009/398 ( PDF )
- Fast Architectures for the $\eta_T$ Pairing over Small-Characteristic Supersingular Elliptic Curves
- Jean-Luc Beuchat and Jérémie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodríguez-Henríquez
-
2009/397 ( PS PS.GZ PDF )
- Linear Cryptanalysis of Reduced-Round PRESENT
- Joo Yeon Cho
-
2009/396 ( PDF )
- Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
- Ueli Maurer and Stefano Tessaro
-
2009/395 ( PDF )
- First CPIR Protocol with Data-Dependent Computation
- Helger Lipmaa
-
2009/394 ( PDF )
- Provably Secure Convertible Undeniable Signatures with Unambiguity
- Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata
-
2009/393 ( PS PS.GZ PDF )
- Permutation Polynomials modulo $p^n$}
- Rajesh P Singh and Soumen Maity
-
2009/392 ( PDF )
- Computational Soundness for Key Exchange Protocols with Symmetric Encryption
- Ralf Kuesters and Max Tuengerthal
-
2009/391 ( PDF )
- Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
- Rikke Bendlin and Ivan Damgĺrd
-
2009/390 ( PS PS.GZ PDF )
- Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments
- Jens Groth
-
2009/389 ( PDF )
- On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
- Joppe W. Bos and Marcelo E. Kaihara and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery
-
2009/388 ( -- withdrawn -- )
- A Simple Secret Sharing Scheme for Hierarchical Threshold Access Structures
- Kerem Kaskaloglu and Ferruh Ozbudak
-
2009/387 ( PDF )
- Securing Plastic Money Using an RFID Based Protocol Stack
- Rishab Nithyanand
-
2009/386 ( PDF )
- QTRU: A Lattice Attack Resistant Version of NTRU
- Ehsan Malekian and Ali Zakerolhosseini and Atefeh Mashatan
-
2009/385 ( PDF )
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Brent Waters
-
2009/384 ( PDF )
- Practical Attacks on NESHA-256
- Orr Dunkelman and Tor E. Bjřrstad
-
2009/383 ( PDF )
- A Registration Scheme to Allocate a Unique Identification Number
- Manoj Kumar
-
2009/382 ( PDF )
- Linearization Framework for Collision Attacks: Application to CubeHash and MD6
- Eric Brier and Shahram Khazaei and Willi Meier and Thomas Peyrin
-
2009/381 ( PS PS.GZ PDF )
- A short Note on Discrete Log Problem in $\mathbbF_p$
- Habeeb Syed
-
2009/380 ( PDF )
- Untraceable Tags based on Mild Assumptions
- Carlo Blundo and Angelo De Caro and Giuseppe Persiano
-
2009/379 ( PDF )
- Protecting Circuits from Computationally Bounded and Noisy Leakage
- Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan
-
2009/378 ( PDF )
- Detectable correlations in Edon-R
- Peter Novotney and Niels Ferguson
-
2009/377 ( PDF )
- Chosen-Ciphertext Secure RSA-type Cryptosystems
- Benoit Chevallier-Mames and Marc Joye
-
2009/376 ( PDF )
- Cryptanalysis of the Tillich-Zémor hash function
- Markus Grassl and Ivana Ilic and Spyros Magliveras and Rainer Steinwandt
-
2009/375 ( PDF )
- Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes
- Masao KASAHARA
-
2009/374 ( PDF )
- Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
- Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir
-
2009/373 ( PDF )
- Utility Dependence in Correct and Fair Rational Secret Sharing
- Gilad Asharov and Yehuda Lindell
-
2009/372 ( PS PS.GZ )
- More on Key Wrapping
- Rosario Gennaro and Shai Halevi
-
2009/371 ( PDF )
- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
- Rakesh Bobba and Himanshu Khurana and Manoj Prabhakaran
-
2009/370 ( PS PS.GZ PDF )
- A study of pairing computation for elliptic curves with embedding degree 15
- Nadia El Mrabet and Nicolas Guillermin and Sorina Ionica
-
2009/369 ( PDF )
- Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets
- Boris Skoric
-
2009/368 ( PDF )
- A Simulation-Based Treatment of Authenticated Message Exchange
- Klaas Ole Kuertz and Henning Schnoor and Thomas Wilke
-
2009/367 ( PDF )
- Non-delegatable Identity-based Designated Verifier Signature
- Qiong Huang and Willy Susilo and Duncan S. Wong
-
2009/366 ( PS PS.GZ PDF )
- Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
- Yehuda Lindell and Hila Zarosim
-
2009/365 ( PDF )
- Space Efficient Secret Sharing: A Recursive Approach
- Abhishek Parakh and Subhash Kak
-
2009/364 ( PDF )
- Position Based Cryptography
- Nishanth Chandran and Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky
-
2009/363 ( PDF )
- Some Lattices Attacks on DSA and ECDSA
- Dimitrios Poulakis
-
2009/362 ( PDF )
- Toward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures
- Laila El Aimani
-
2009/361 ( PS PS.GZ PDF )
- On the Security of a Proxy Blind Signature Scheme over Braid Groups
- Manoj Kumar
-
2009/360 ( PS PS.GZ PDF )
- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure
- Ruilin Li and Bing Sun and Chao Li and Longjiang Qu
-
2009/359 ( PDF )
- Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography)
- Chris Peikert
-
2009/358 ( PDF )
- MAC Precomputation with Applications to Secure Memory
- Juan A. Garay and Vladimir Kolesnikov and Rae McLellan
-
2009/357 ( PDF )
- Impossible Differential Cryptanalysis of FOX
- Zhongming Wu and Xuejia Lai and Bo Zhu and Yiyuan Luo
-
2009/356 ( PDF )
- A Domain Extender for the Ideal Cipher
- Jean-Sebastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin
-
2009/355 ( PS PS.GZ PDF )
- Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
- Aniket Kate and Ian Goldberg
-
2009/354 ( PDF )
- Cache Timing Attacks on Camellia Block Cipher
- ZHAO Xin-jie and WANG Tao and ZHENG Yuan-yuan
-
2009/353 ( PDF )
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)
- Berkant Ustaoglu
-
2009/352 ( PDF )
- On the Duality of Probing and Fault Attacks
- Berndt M. Gammel and Stefan Mangard
-
2009/351 ( PS PS.GZ PDF )
- How to Delegate a Lattice Basis
- David Cash and Dennis Hofheinz and Eike Kiltz
-
2009/350 ( PDF )
- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
- Harikrishna Narasimhan and Venkatanathan Varadarajan and C. Pandu Rangan
-
2009/349 ( PDF )
- Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein
- Stefan Tillich and Martin Feldhofer and Wolfgang Issovits and Thomas Kern and Hermann Kureck and Michael Mühlberghuber and Georg Neubauer and Andreas Reiter and Armin Köfler and Mathias Mayrhofer
-
2009/348 ( PDF )
- A provably secure really source hiding designated verifier signature scheme based on random oracle model
- Huang-Ta Huang1, *Jue-Sam Chou2
-
2009/347 ( PDF )
- An Efficient Concurrent Repetition Theorem
- Douglas Wikström
-
2009/346 ( PDF )
- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
- Wenling Wu and Lei Zhang and Liting Zhang and Wentao Zhang
-
2009/345 ( PDF )
- Anonymous ID Based Signcryption Scheme for Multiple Receivers
- Sunder Lal and Prashant Kushwah
-
2009/344 ( PS PS.GZ PDF )
- Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009
- Xi Zhang and Min-Rong Chen and Xia Li
-
2009/343 ( PDF )
- Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications
- Kenneth Koon-Ho Wong and Gregory V. Bard and Robert H. Lewis
-
2009/342 ( PDF )
- FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, L{\sc ane}, Shabal and Spectral Hash
- Brian Baldwin and Andrew Byrne and Mark Hamilton and Neil Hanley and Robert P. McEvoy and Weibo Pan and William P. Marnane
-
2009/341 ( PDF )
- Leakage Resilient Cryptography in Practice
- Francois-Xavier Standaert and Olivier Pereira and Yu Yu and Jean-Jacques Quisquater and Moti Yung and Elisabeth Oswald
-
2009/340 ( PDF )
- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
- Eric Brier and Jean-Sebastien Coron and Thomas Icart and David Madore and Hugues Randriam and Mehdi Tibouchi
-
2009/339 ( PDF )
- A Novel ID-based Electronic Cash System from Pairings
- Jue-Sam Chou*1, Yalin Chen2 , Ming-Hsun Cho3 , Hung-Min Sun4
-
2009/338 ( PDF )
- Security weaknesses in two multi-server password based authentication protocols
- *Jue-Sam Chou1, Chun-Hui Huang2, Cheng-Chung Ding3
-
2009/337 ( PDF )
- A New Lattice-Based Cryptosystem Mixed with a Knapsack
- Yanbin Pan and Yingpu Deng and Yupeng Jiang and Ziran Tu
-
2009/336 ( PDF )
- Partial Signatures and their Applications
- Mihir Bellare and Shanshan Duan
-
2009/335 ( PDF )
- Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2009/334 ( PDF )
- Attacking Reduced Rounds of the ARIA Block Cipher
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2009/333 ( PDF )
- Hard Fault Analysis of Trivium
- Yupu Hu and Fengrong Zhang and Yiwei Zhang
-
2009/332 ( PDF )
- Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
- Ton van Deursen and Sasa Radomirovic
-
2009/331 ( PDF )
- Security Notions and Generic Constructions for Client Puzzles
- L. Chen and P. Morrissey and N.P. Smart and B. Warinschi
-
2009/330 ( -- withdrawn -- )
- NTRU, quaternion algebra, public key cryptography
- Ehsan Malekian and Ali Zakerolhosseini and Atefeh
-
2009/329 ( -- withdrawn -- )
- Efficient Approximation of Higher Order Boolean function in a Low Order Function
- Mehreen Afzal and Ashraf Masood
-
2009/328 ( PDF )
- Flowchart description of security primitives for Controlled Physical Unclonable Functions
- Boris Skoric and Marc X. Makkes
-
2009/327 ( PDF )
- Simple Adaptive Oblivious Transfer Without Random Oracle
- Kaoru Kurosawa and Ryo Nojima
-
2009/326 ( PDF )
- The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property
- Gregory V. Bard
-
2009/325 ( PDF )
- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
- Mridul Nandi
-
2009/324 ( PDF )
- Group-Oriented Fair Exchange of Signatures
- Qiong Huang and Duncan S. Wong and Willy Susilo
-
2009/323 ( PDF )
- Factoring Unbalanced Moduli with Known Bits
- Eric Brier and David Naccache and Mehdi Tibouchi
-
2009/322 ( PDF )
- Certifying Assembly with Formal Cryptographic Proofs: the Case of BBS
- Reynald Affeldt, David Nowak and Kiyoshi Yamada
-
2009/321 ( PDF )
- Tweakable Enciphering Schemes From Stream Ciphers With IV
- Palash Sarkar
-
2009/320 ( PS PS.GZ PDF )
- Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures
- Georg Fuchsbauer
-
2009/319 ( PDF )
- Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring
- Xiaofeng Chen and Haibo Tian and Fangguo Zhang
-
2009/318 ( PS PS.GZ PDF )
- The Fermat factorization method revisited
- Robert ERRA and Christophe GRENIER
-
2009/317 ( PDF )
- Related-key Cryptanalysis of the Full AES-192 and AES-256
- Alex Biryukov and Dmitry Khovratovich
-
2009/316 ( PDF )
- An Efficient Password Security of Key Exchange Protocol based on ECDLP
- Jayaprakash Kar and Banshidhar Majhi
-
2009/315 ( PDF )
- Breaking RSA-based PIN Encryption with thirty ciphertext validity queries
- N.P. Smart
-
2009/314 ( PDF )
- Secure Two-Party Computation is Practical
- B. Pinkas and T. Schneider and N.P. Smart and S. Williams
-
2009/313 ( PDF )
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- Nigel P. Smart and Bogdan Warinschi
-
2009/312 ( PS PS.GZ PDF )
- Jacobi Quartic Curves Revisited
- Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
-
2009/311 ( PDF )
- Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
- Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C
-
2009/310 ( PDF )
- RFID distance bounding protocol with mixed challenges to prevent relay attacks
- Chong Hee Kim and Gildas Avoine
-
2009/309 ( PDF )
- Fault Attacks on RSA Signatures with Partially Unknown Messages
- Jean-Sebastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier
-
2009/308 ( PDF )
- A note on the Certificateless Multi-receiver Signcryption Scheme
- S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
-
2009/307 ( PDF )
- Anonymous Signatures Revisited
- Vishal Saraswat and Aaram Yun
-
2009/306 ( PDF )
- Authentic Time-Stamps for Archival Storage
- Alina Oprea and Kevin D. Bowers
-
2009/305 ( PDF )
- Improved generic algorithms for 3-collisions
- Antoine Joux and Stefan Lucks
-
2009/304 ( PS PS.GZ PDF )
- Factor-4 and 6 Compression of Cyclotomic Subgroups
- Koray Karabina
-
2009/303 ( PDF )
- Key extraction from general non-discrete signals
- E. Verbitskiy and P. Tuyls and C. Obi and B. Schoenmakers and B. Skoric
-
2009/302 ( PDF )
- Cryptanalysis of ESSENCE
- Maria Naya-Plasencia and Andrea Röck and Jean-Philippe Aumasson and Yann Laigle-Chapuy and Gaëtan Leurent and Willi Meier and Thomas Peyrin
-
2009/301 ( PDF )
- A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
- Yuyin Yu and Mingsheng Wang
-
2009/300 ( PS PS.GZ PDF )
- Universally Composable Contributory Group Key Exchange
- M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonzàlez Nieto
-
2009/299 ( PS PS.GZ PDF )
- On the security of oscillator-based random number generators
- Mathieu Baudet and David Lubicz and Julien Micolod and André Tassiaux
-
2009/298 ( PS PS.GZ PDF )
- Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2009/297 ( -- withdrawn -- )
- A New Improved Distinguisher for HC-128
- Subhabrata Sen and Rudradev Sengupta and Subhamoy Maitra and Goutam Paul and Shashwat Raizada
-
2009/296 ( PS PS.GZ PDF )
- Perfectly Balanced Functions in Symbolic Dynamics
- O.A. Logachev and A.A. Salnikov and S.V. Smyshlyaev and V.V. Yashchenko
-
2009/295 ( PDF )
- Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
- Shucheng Yu and Kui Ren and Wenjing Lou and Jin Li
-
2009/294 ( PDF )
- Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing
- Roman Schlegel and Duncan S. Wong
-
2009/293 ( PS PS.GZ PDF )
- Enhancing Attribute-based Encryption with Attribute Hierarchy
- Jin Li and Qian Wang and Cong Wang and Kui Ren
-
2009/292 ( PDF )
- Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
- Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen and Christiane Peters and Peter Schwabe
-
2009/291 ( PS PS.GZ PDF )
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- M. Choudary Gorantla and Colin Boyd and Juan Manuel González Nieto
-
2009/290 ( PDF )
- Security Analysis of Aggregate signature and Batch verification signature schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and J.Shriram and S.Kalaivani and C.Pandu Rangan
-
2009/289 ( PDF )
- Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
- Erik Zenner
-
2009/288 ( PDF )
- Efficient Key Exchange with Tight Security Reduction
- Jiang Wu and Berkant Ustaoglu
-
2009/287 ( PDF )
- Generic Attacks on Alternating Unbalanced Feistel Schemes
- Valerie Nachef
-
2009/286 ( PDF )
- On Privacy Losses in the Trusted Agent Model (Abstract)
- Paulo Mateus and Serge Vaudenay
-
2009/285 ( PDF )
- Efficient Public Key Encryption Based on Ideal Lattices
- Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
-
2009/284 ( PS PS.GZ PDF )
- Privacy-aware Attribute-based Encryption with User Accountability
- Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan
-
2009/283 ( PDF )
- Short and Stateless Signatures from the RSA Assumption
- Susan Hohenberger and Brent Waters
-
2009/282 ( PDF )
- Leakage-Resilient Signatures
- Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy Rothblum
-
2009/281 ( PDF )
- Enabling Public Verifiability and Data Dynamics for Storage Security
- Qian Wang and Cong Wang and Jin Li and Kui Ren and Wenjing Lou
-
2009/280 ( PDF )
- Universally Anonymous IBE based on the Quadratic Residuosity Assumption
- Giuseppe Ateniese and Paolo Gasti
-
2009/279 ( PDF )
- Algebraic Side-Channel Attacks
- Mathieu Renauld and Francois-Xavier Standaert
-
2009/278 ( PDF )
- Towards Electrical, Integrated Implementations of SIMPL Systems
- Ulrich Rührmair Qingqing Chen Paolo Lugli Ulf Schlichtmann Martin Stutzmann György Csaba
-
2009/277 ( PDF )
- On the Foundations of Physical Unclonable Functions
- Ulrich Rührmair and Jan Sölter and Frank Sehnke
-
2009/276 ( PDF )
- Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
- Jean-Luc Beuchat and Emmanuel López-Trejo and Luis Martínez-Ramos and Shigeo Mitsunari and Francisco Rodríguez-Henríquez
-
2009/275 ( PDF )
- Algebraic Attacks specialized to \(\mathbb{F}_2\) (Diplomarbeit)
- Thomas Dullien
-
2009/274 ( PDF )
- A Collision-resistance Hash Function DIHA2
- Xigen.Yao
-
2009/273 ( PDF )
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Rafael Dowsley and Jörn Müller-Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento
-
2009/272 ( PDF )
- A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity
- Ziran Tu and Yingpu Deng
-
2009/271 ( PS PS.GZ PDF )
- Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems
- Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento
-
2009/270 ( PDF )
- Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model
- Rafael Tonicelli and Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Jörn Müller-Quade and Akira Otsuka and Anderson C. A. Nascimento
-
2009/269 ( PDF )
- Side-channel attacks based on linear approximations
- Thomas Roche and Cédric Tavernier
-
2009/268 ( -- withdrawn -- )
- Dealer-Free Dynamic Secret Sharing Schemes with Unconditional Security
- Mehrdad Nojoumian and Douglas R. Stinson
-
2009/267 ( PDF )
- Simulation based security in the applied pi calculus
- Stéphanie Delaune and Steve Kremer and Olivier Pereira
-
2009/266 ( PDF )
- Pseudorandomness Analysis of the Lai-Massey Scheme
- Yiyuan Luo and Xuejia Lai and Zheng Gong and Zhongming Wu
-
2009/265 ( PS PS.GZ PDF )
- Revisiting the Indifferentiability of PGV Hash Functions
- Yiyuan Luo and Zheng Gong and Ming Duan and Bo Zhu and Xuejia Lai
-
2009/264 ( PDF )
- Proposal of PPS Multivariate Public Key Cryptosystems
- Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryo Fujita and Masao Kasahara
-
2009/263 ( PS PS.GZ PDF )
- General Error Decodable Secret Sharing Scheme and Its Application
- Kaoru Kurosawa
-
2009/262 ( PDF )
- Computationally Secure Two-Round Authenticated Message Exchange
- Klaas Ole Kuertz and Henning Schnoor and Thomas Wilke
-
2009/261 ( PDF )
- Security of Cyclic Double Block Length Hash Functions including Abreast-DM
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2009/260 ( PDF )
- A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs
- Kota Ideguchi and Toru Owada and Hirotaka Yoshida
-
2009/259 ( -- withdrawn -- )
- Differential Path for SHA-1 with complexity $O(2^{52})$
- Cameron McDonald and Philip Hawkes and Josef Pieprzyk
-
2009/258 ( PS PS.GZ PDF )
- FACTORIZATION WITH GENUS 2 CURVES
- Romain COSSET
-
2009/257 ( PDF )
- FORMAT CONTROLLING ENCRYPTION USING DATATYPE PRESERVING ENCRYPTION
- Ulf T. Mattsson
-
2009/256 ( PDF )
- Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher
- Zhiqiang Liu and Dawu Gu and Jing Zhang
-
2009/255 ( PDF )
- SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions
- Ulrich Rührmair
-
2009/254 ( PDF )
- Improvement of One Quantum Encryption Scheme
- Zhengjun Cao
-
2009/253 ( PDF )
- Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
- Cas J.F. Cremers
-
2009/252 ( PDF )
- Sparse Boolean equations and circuit lattices
- Igor Semaev
-
2009/251 ( PDF )
- Format-Preserving Encryption
- Mihir Bellare and Thomas Ristenpart and Phillip Rogaway and Till Stegers
-
2009/250 ( -- withdrawn -- )
- Modifications in the Design of Trivium to Increase its Security Level
- Mehreen Afzal and Ashraf Masood
-
2009/249 ( PS PS.GZ PDF )
- Pseudo-randomness and partial information in symbolic security analysis
- Daniele Micciancio
-
2009/248 ( PDF )
- Cryptanalysis of the MST_3 Public Key Cryptosystem
- Simon R. Blackburn, Carlos Cid and Ciaran Mullan
-
2009/247 ( PS PS.GZ PDF )
- On the Necessary and Sufficient Assumptions for UC Computation
- Ivan Damgĺrd and Jesper Buus Nielsen and Claudio Orlandi
-
2009/246 ( PDF )
- On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions
- György Csaba \and Xueming Ju \and Qingqing Chen \and Wolfgang Porod \and Jürgen Schmidhuber \and Ulf Schlichtmann \and Paolo Lugli \and Ulrich Rührmair
-
2009/245 ( PDF )
- Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring
- Naoki Ogura and Shigenori Uchiyama
-
2009/244 ( PDF )
- Tardos Fingerprinting Codes in the Combined Digit Model
- Boris Skoric and Stefan Katzenbeisser and Hans Georg Schaathun and Mehmet U. Celik
-
2009/243 ( PS PS.GZ PDF )
- Faster Pairings on Special Weierstrass Curves
- Craig Costello and Huseyin Hisil and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
-
2009/242 ( PDF )
- Examples of differential multicollisions for 13 and 14 rounds of AES-256
- Alex Biryukov and Dmitry Khovratovich and Ivica Nikolić
-
2009/241 ( PDF )
- Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)
- Alex Biryukov and Dmitry Khovratovich and Ivica Nikolić
-
2009/240 ( PDF )
- Group Testing and Batch Verification
- Gregory M. Zaverucha and Douglas R. Stinson
-
2009/239 ( PDF )
- Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations
- Julien Bringer and Herve Chabanne and Jean-Luc Danger
-
2009/238 ( PDF )
- Attacks on Round-Reduced BLAKE
- LI Ji and XU Liangyu
-
2009/237 ( PDF )
- Remarks on One Arbitrated Quantum-signature Scheme
- Zhengjun Cao
-
2009/236 ( PDF )
- Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics
- Fumiyuki Momose and Jinhui Chao
-
2009/235 ( PS PS.GZ PDF )
- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2009/234 ( PDF )
- On the Randomness and Regularity of Reduced EDON-$\mathcal{R}$ Compression Function
- Rune Steinsmo \Oe degå rd and Danilo Gligoroski
-
2009/233 ( PDF )
- A strategy for recovering roots of bivariate polynomials modulo a prime
- Paula Bustillo and Domingo Gomez and Jaime Gutierrez and Alvar Ibeas
-
2009/232 ( PDF )
- MeshHash2
- Björn Fay
-
2009/231 ( PDF )
- Practical DPA Attacks on MDPL
- Elke De Mulder \and Benedikt Gierlichs \and Bart Preneel \and Ingrid Verbauwhede
-
2009/230 ( PS PS.GZ PDF )
- Adaptively Secure Broadcast
- Martin Hirt and Vassilis Zikas
-
2009/229 ( PDF )
- Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
- Giacomo de Meulenaer and Christophe Petit and Jean-Jacques Quisquater
-
2009/228 ( PDF )
- Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis
- Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede
-
2009/227 ( PS PS.GZ PDF )
- Computational soundness, co-induction, and encryption cycles
- Daniele Micciancio
-
2009/226 ( PDF )
- How to Hash into Elliptic Curves
- Thomas Icart
-
2009/225 ( PDF )
- The Security of Abreast-DM in the Ideal Cipher Model
- Jooyoung Lee and Daesung Kwon
-
2009/224 ( PDF )
- Pseudo-Cryptanalysis of Luffa
- Keting Jia and Yvo Desmedt and Lidong Han and Xiaoyun Wang
-
2009/223 ( PDF )
- How To Find Weak Input Differences For MD5 Collision Attacks
- Tao Xie and Dengguo Feng
-
2009/222 ( PDF )
- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
- Willi Geiselmann and Kenneth Matheis and Rainer Steinwandt
-
2009/221 ( PDF )
- Boneh-Boyen signatures and the Strong Diffie-Hellman problem
- David Jao and Kayo Yoshida
-
2009/220 ( PDF )
- Signature Schemes with Bounded Leakage Resilience
- Jonathan Katz
-
2009/219 ( PDF )
- Strongly Secure Certificateless Key Agreement
- Georg Lippold and Colin Boyd and Juan González Nieto
-
2009/218 ( PDF )
- Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128
- Jean-Philippe Aumasson and Itai Dinur and Luca Henzen and Willi Meier and Adi Shamir
-
2009/217 ( PDF )
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- Palash Sarkar
-
2009/216 ( PDF )
- Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher
- Palash Sarkar
-
2009/215 ( PDF )
- A Simple and Generic Construction of Authenticated Encryption With Associated Data
- Palash Sarkar
-
2009/214 ( PDF )
- An Optimally Fair Coin Toss
- Tal Moran and Moni Naor and Gil Segev
-
2009/213 ( PDF )
- Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion
- Richard Moloney and Gary McGuire and Michael Markowitz
-
2009/212 ( -- withdrawn -- )
- A Flyweight RFID Authentication Protocol
- Mike Burmester and Jorge Munilla
-
2009/211 ( PDF )
- Bringing Zero-Knowledge Proofs of Knowledge to Practice
- Endre Bangerter and Stefania Barzan and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider and Joe-Kai Tsay
-
2009/210 ( PDF )
- Sufficient conditions for sound tree and sequential hashing modes
- Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
-
2009/209 ( PS PS.GZ PDF )
- On Directed Transitive Signature
- Jia Xu
-
2009/208 ( PS PS.GZ PDF )
- PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS
- Rajesh P Singh and B.K.Sarma and A.Saikia
-
2009/207 ( -- withdrawn -- )
- Unconditionally Secure Social Secret Sharing Scheme
- Mehrdad Nojoumian and Douglas R. Stinson and Morgan Grainger
-
2009/206 ( PS PS.GZ PDF )
- On Optimized FPGA Implementations of the SHA-3 Candidate Groestl
- Bernhard Jungk, Steffen Reith, Juergen Apfelbeck
-
2009/205 ( PS PS.GZ PDF )
- Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions
- Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo
-
2009/204 ( PDF )
- GUC-Secure Join Operator in Distributed Relational Database
- TIAN Yuan
-
2009/203 ( PDF )
- Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures
- Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi and Ralf-Philipp Weinmann
-
2009/202 ( PDF )
- A GENERALIZED FRAMEWORK FOR CRISP COMMITMENT SCHEMES
- Alawi A. Al-Saggaf and Acharya H. S.
-
2009/201 ( PDF )
- Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128)
- Mohamed Abo El-Fotouh and Klaus Diepold
-
2009/200 ( PDF )
- A Survey on the Evolution of Cryptographic Protocols in ePassports
- Rishab Nithyanand
-
2009/199 ( PDF )
- Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers
- Emmanuel Bresson and Anne Canteaut and Benoit Chevallier-Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean-Francois Misarsky and Maria Naya-Plasencia and Pascal Paillier and Thomas Pornin and Jean-Rene Reinhard and Celine Thuillet and Marion Videau
-
2009/198 ( -- withdrawn -- )
- DAA: Fixing the pairing based protocols
- L Chen and P. Morrissey and N.P. Smart
-
2009/197 ( PDF )
- Practical pseudo-collisions for hash functions ARIRANG-224/384
- Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang
-
2009/196 ( PDF )
- Analysis of one quantum bit string commitment
- Zhengjun Cao
-
2009/195 ( PDF )
- Secure Evaluation of Private Linear Branching Programs with Medical Applications
- Mauro Barni and Pierluigi Failla and Vladimir Kolesnikov and Riccardo Lazzeretti and Ahmad-Reza Sadeghi and Thomas Schneider
-
2009/194 ( PDF )
- Analysis and Enhance of Anonymous Signcryption Scheme
- Mingwu Zhang and Yusheng Zhong and Pengcheng Li and Bo Yang
-
2009/193 ( PDF )
- Generalization of Barreto et al ID based Signcryption Scheme
- Sunder Lal and Prashant Kushwah
-
2009/192 ( PS PS.GZ PDF )
- Linkability of Blind Signature Schemes over Braid Groups
- Manoj Kumar
-
2009/191 ( PDF )
- New logic minimization techniques with applications to cryptology.
- Joan Boyar and Rene Peralta
-
2009/190 ( PS PS.GZ PDF )
- The discrete logarithm problem in the group of non-singular circulant matrices
- Ayan Mahalanobis
-
2009/189 ( PS PS.GZ PDF )
- Efficient Unidirectional Proxy Re-Encryption
- Sherman S.M. Chow and Jian Weng and Yanjiang Yang and Robert H. Deng
-
2009/188 ( PS PS.GZ PDF )
- Breaking and Building of Group Inside Signature
- S. Sree Vivek and S. Sharmila Deva Selvi and S.Gopinath and C. Pandu Rangan
-
2009/187 ( PS PS.GZ PDF )
- Compact McEliece Keys from Goppa Codes
- Rafael Misoczki and Paulo S. L. M. Barreto
-
2009/186 ( PDF )
- Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers
- Nicolas T. Courtois and Gregory V. Bard and Shaun V. Ault
-
2009/185 ( PDF )
- All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
- Robert P. McEvoy and Michael Tunstall and Claire Whelan and Colin C. Murphy and William P. Marnane
-
2009/184 ( PDF )
- Cryptanalysis of Dynamic SHA(2)
- Jean-Philippe Aumasson and Orr Dunkelman and Sebastiaan Indesteege and Bart Preneel
-
2009/183 ( PDF )
- Proactive Linear Integer Secret Sharing
- Rune Thorbek
-
2009/182 ( PDF )
- Extended Substitution Cipher Chaining mode (ESCC)
- Mohamed Abo El-Fotouh, Klaus Diepold
-
2009/181 ( PDF )
- PSP: Private and Secure Payment with RFID
- Erik-Oliver Blass and Anil Kurmus and Refik Molva and Thorsten Strufe
-
2009/180 ( PDF )
- Collaborative, Privacy-Preserving Data Aggregation at Scale
- Haakon Ringberg and Benny Applebaum and Michael J. Freedman and Matthew Caesar and Jennifer Rexford
-
2009/179 ( PS PS.GZ PDF )
- Near-Collision Attack on the Compression Function of Dynamic SHA2
- Hongbo Yu and Xiaoyun Wang
-
2009/178 ( PDF )
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version)
- Jiali Choy and Guanhan Chew and Khoongming Khoo and Huihui Yap
-
2009/177 ( PDF )
- Salvaging Merkle-Damgard for Practical Applications
- Yevgeniy Dodis and Thomas Ristenpart and Thomas Shrimpton
-
2009/176 ( PDF )
- A novel multi-server authentication protocol
- Yalin Chen, Chun-Hui Huang, *Jue-Sam Chou
-
2009/175 ( PDF )
- Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)
- Stefan Lucks and Erik Zenner and Andre Weimerskirch and Dirk Westhoff
-
2009/174 ( PDF )
- Making the Diffie-Hellman Protocol Identity-Based
- Dario Fiore and Rosario Gennaro
-
2009/173 ( PDF )
- Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication
- Patrick Longa and Catherine Gebotys
-
2009/172 ( PS PS.GZ )
- A new Protocol for 1-2 Oblivious Transfer
- Bjoern Grohmann
-
2009/171 ( PDF )
- On the Theory and Practice of Personal Digital Signatures
- Ivan Damgĺrd and Gert Lćssře Mikkelsen
-
2009/170 ( PDF )
- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
- Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
-
2009/169 ( PDF )
- Floating Fault analysis of Trivium under Weaker Assumptions
- Hu Yupu and Gao Juntao and Liu Qing
-
2009/168 ( PDF )
- A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH)
- Michael A. Halcrow and Niels Ferguson
-
2009/167 ( PDF )
- A new approach for FCSRs
- François Arnault and Thierry Berger and Cédric Lauradoux and Marine Minier and Benjamin Pousse
-
2009/166 ( PDF )
- I shall love you up to the death
- Valerie Nachef and Jacques Patarin
-
2009/165 ( PDF )
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
- Matthieu Rivain
-
2009/164 ( PDF )
- CCA-Secure Proxy Re-Encryption without Pairings
- Jun Shao and Zhenfu Cao
-
2009/163 ( PS PS.GZ )
- A New Key-Agreement-Protocol
- Bjoern Grohmann
-
2009/162 ( PS PS.GZ PDF )
- Certificateless Hybrid Signcryption
- Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
-
2009/161 ( PS PS.GZ PDF )
- Built-in Determined Sub-key Correlation Power Analysis
- Yuichi Komano and Hideo Shimizu and Shinichi Kawamura
-
2009/160 ( PS PS.GZ PDF )
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Joel Alwen and Yevgeniy Dodis and Daniel Wichs
-
2009/159 ( PDF )
- Hardware Implementation of the SHA-3 Candidate Skein
- Stefan Tillich
-
2009/158 ( PS PS.GZ PDF )
- Security Analysis of a Proxy Signature Scheme over Braid Groups
- Manoj Kumar
-
2009/157 ( PDF )
- Efficient Halving for Genus 3 Curves over Binary Fields
- Peter Birkner and Nicolas Thériault
-
2009/156 ( PDF )
- A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution
- Anupam Pattanayak and B. Majhi
-
2009/155 ( PDF )
- Faster Computation of the Tate Pairing
- Christophe Arene and Tanja Lange and Michael Naehrig and Christophe Ritzenthaler
-
2009/154 ( PDF )
- Algorithms to solve massively under-defined systems of multivariate quadratic equations
- Yasufumi Hashimoto
-
2009/153 ( PDF )
- A new bound for t−wise almost universal hash functions
- Long Hoang Nguyen and A. W. Roscoe
-
2009/152 ( -- withdrawn -- )
- FaceTrust: Assessing the Credibility of Online Personas via Social Networks
- Michael Sirivianos
-
2009/151 ( PDF )
- Euclid's Algorithm, Guass' Elimination and Buchberger's Algorithm
- Shaohua Zhang
-
2009/150 ( PDF )
- Efficient group authentication protocols based on human interaction
- Long Hoang Nguyen and A. W. Roscoe
-
2009/149 ( PDF )
- Secure EPC Gen2 compliant Radio Frequency Identification
- Mike Burmester and Breno de Medeiros and Jorge Munilla and Alberto Peinado
-
2009/148 ( PDF )
- Secret Handshake: Strong Anonymity Definition and Construction
- Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta
-
2009/147 ( PDF )
- Preimage Attack on ARIRANG
- Deukjo Hong and Woo-Hwan Kim and Bonwook Koo
-
2009/146 ( PS PS.GZ PDF )
- Transferable Constant-Size Fair E-Cash
- Georg Fuchsbauer and David Pointcheval and Damien Vergnaud
-
2009/145 ( PDF )
- Security of Permutation-based Compression Function lp 231
- Jooyoung Lee and Daesung Kwon
-
2009/144 ( PS PS.GZ PDF )
- On the security of Identity Based Ring Signcryption Schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2009/143 ( PDF )
- Multiple and Unlinkable Public Key Encryption without Certificates
- Soyoung Park and Sang-Ho Lee and Joohan Lee
-
2009/142 ( PDF )
- Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems
- Ronald Cramer and Dennis Hofheinz and Eike Kiltz
-
2009/141 ( PDF )
- Ideal Hierarchical Secret Sharing Schemes
- Oriol Farras and Carles Padro
-
2009/140 ( PDF )
- The Analysis of Galois Substitution Counter Mode (GSCM)
- Mohamed Abo El-Fotouh and Klaus Diepold
-
2009/139 ( PDF )
- Certificateless Group Oriented Signature Secure Against Key Replacement Attack
- Chunbo Ma and Jun Ao
-
2009/138 ( PS PS.GZ PDF )
- A Hybrid RFID Protocol against Tracking Attacks
- Jen-Chun Chang and Hsin-Lung Wu
-
2009/137 ( PDF )
- The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime
- Nicolas T. Courtois
-
2009/136 ( PDF )
- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
- Yvonne Cliff and Colin Boyd and Juan Gonzalez Nieto
-
2009/135 ( PDF )
- Practical Key Recovery Attack against Secret-prefix Edon-R
- Gaëtan Leurent
-
2009/134 ( PDF )
- A First Order Recursive Construction of Boolean Function with Optimum Algebraic Immunity
- Yindong Chen and Peizhong Lu
-
2009/133 ( -- withdrawn -- )
- Signature Schemes with Bounded Leakage Resilience
- Jonathan Katz
-
2009/132 ( -- withdrawn -- )
- A New Lattice for Implicit Factoring
- Yanbin Pan and Yingpu Deng
-
2009/131 ( PDF )
- Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited
- Anupam Pattanayak and B. Majhi
-
2009/130 ( PDF )
- Constructions of Even-variable Boolean Function with Optimum Algebraic Immunity
- Yindong Chen and Peizhong Lu
-
2009/129 ( PDF )
- Faster and Timing-Attack Resistant AES-GCM
- Emilia Kasper and Peter Schwabe
-
2009/128 ( PS PS.GZ PDF )
- Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator
- Lu Xiao and Gregory G. Rose
-
2009/127 ( PDF )
- Side Channel Cube Attacks on Block Ciphers
- Itai Dinur and Adi Shamir
-
2009/126 ( PDF )
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Siamak F Shahandashti and Reihaneh Safavi-Naini
-
2009/125 ( PDF )
- A Full Key Recovery Attack on HMAC-AURORA-512
- Yu Sasaki
-
2009/124 ( PDF )
- Practical Secure Evaluation of Semi-Private Functions
- Annika Paus and Ahmad-Reza Sadeghi and Thomas Schneider
-
2009/123 ( PDF )
- On the Complexity of Integer Factorization
- N. A. Carella, CUNY, N.Y.
-
2009/122 ( PDF )
- Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
- Jean-Luc Beuchat and Jérémie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodríguez-Henríquez
-
2009/121 ( -- withdrawn -- )
- Optimized Public Key Infrastructure -- A PKI to Support Efficient Document's Signatures
- Martín Augusto Gagliotti Vigil and Ricardo Felipe Custódio and Nelson da Silva and Ricardo Moraes
-
2009/120 ( PDF )
- On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R
- Danilo Gligoroski and Rune Steinsmo Ø degå rd
-
2009/119 ( PDF )
- A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
- Marcel Medwed
-
2009/118 ( PDF )
- A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control
- Jin Li and Kui Ren and Kwangjo Kim
-
2009/117 ( PDF )
- Changing probabilities of differentials and linear sums via isomorphisms of ciphers
- Alexander Rostovtsev
-
2009/116 ( PDF )
- Information Theoretically Secure Multi Party Set Intersection Re-Visited
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2009/115 ( PS PS.GZ PDF )
- Scalable Compilers for Group Key Establishment : Two/Three Party to Group
- S.Sree Vivek and S.Sharmila Deva Selvi, Deepanshu Shukla and C.Pandu Rangan
-
2009/114 ( PDF )
- Weakness of Key Predistribution Scheme Proposed by J. Dong et al.
- Anupam Pattanayak and B. Majhi
-
2009/113 ( PDF )
- Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform
- Niels Ferguson and Stefan Lucks
-
2009/112 ( PDF )
- A 2nd-Preimage Attack on AURORA-512
- Yu Sasaki
-
2009/111 ( PDF )
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
- Marc Stevens and Alexander Sotirov and Jacob Appelbaum and Arjen Lenstra and David Molnar and Dag Arne Osvik and Benne de Weger
-
2009/110 ( PDF )
- On the Security of Stream Cipher CryptMT v3
- Haina Zhang and Xiaoyun Wang
-
2009/109 ( PDF )
- Cryptanalysis of Stream Cipher Grain Family
- Haina Zhang and Xiaoyun Wang
-
2009/108 ( PDF )
- Further Results on Implicit Factoring in Polynomial Time
- Santanu Sarkar and Subhamoy Maitra
-
2009/107 ( PDF )
- Compact E-Cash and Simulatable VRFs Revisited
- Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya
-
2009/106 ( PDF )
- A Collision Attack on AURORA-512
- Yu Sasaki
-
2009/105 ( PDF )
- Public-Key Cryptosystems Resilient to Key Leakage
- Moni Naor and Gil Segev
-
2009/104 ( PS PS.GZ PDF )
- 1024 - A High Security Software Oriented Block Cipher
- Dieter Schmidt
-
2009/103 ( PDF )
- Constructing pairing-friendly hyperelliptic curves using Weil restriction
- David Mandell Freeman and Takakazu Satoh
-
2009/102 ( PDF )
- A Step Towards QC Blind Signatures
- Raphael Overbeck
-
2009/101 ( PDF )
- Encryption Schemes Secure under Selective Opening Attack
- Mihir Bellare and Scott Yilek
-
2009/100 ( PDF )
- Computing the endomorphism ring of an ordinary elliptic curve over a finite field
- Gaetan Bisson and Andrew V. Sutherland
-
2009/099 ( PS PS.GZ PDF )
- A Single Initialization Server for Multi-Party Cryptography
- Hugue Blier and Alain Tapp
-
2009/098 ( PDF )
- Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
- Martin Albrecht and Craig Gentry and Shai Halevi and Jonathan Katz
-
2009/097 ( PS PS.GZ PDF )
- Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures
- Brian J. Matt
-
2009/096 ( PDF )
- A note on the security of MST3
- M.I. Gonzalez Vasco and A. L. Perez del Pozo and P. Taborda Duarte
-
2009/095 ( PDF )
- Enhanced Privacy ID from Bilinear Pairing
- Ernie Brickell and Jiangtao Li
-
2009/094 ( PDF )
- On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions
- Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang
-
2009/093 ( PS PS.GZ PDF )
- Cascade Encryption Revisited
- Peter Gazi and Ueli Maurer
-
2009/092 ( PDF )
- Reducing RFID Reader Load with the Meet-in-the-Middle Strategy
- Jung Hee Cheon and Jeongdae Hong and Gene Tsudik
-
2009/091 ( PDF )
- Knapsack Cryptosystem on Elliptic Curves
- Koichiro Noro and Kunikatsu Kobayashi
-
2009/090 ( PS PS.GZ PDF )
- A Brief History of Provably-Secure Public-Key Encryption
- Alexander W. Dent
-
2009/089 ( PDF )
- A Provably Secure And Efficient Countermeasure Against Timing Attacks
- Boris Köpf and Markus Dürmuth
-
2009/088 ( PDF )
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Brett Hemenway and Benoit Libert and Rafail Ostrovsky and Damien Vergnaud
-
2009/087 ( -- withdrawn -- )
- Unconditionally Secure Asynchronous Multiparty Computation with Quadratic Communication Per Multiplication Gate
- Arpita Patra, Ashish Choudhary, C. Pandu Rangan
-
2009/086 ( PDF )
- Point Compression for Koblitz Elliptic Curves
- P. N. J. Eagle and Steven D. Galbraith and John Ong
-
2009/085 ( PDF )
- UC-Secure Source Routing Protocol
- Tao Feng and Xian Guo and Jianfeng Ma and Xinghua Li
-
2009/084 ( PDF )
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme
- Mihir Bellare and Thomas Ristenpart
-
2009/083 ( PS PS.GZ PDF )
- Multi-authority attribute based encryption with honest-but-curious central authority
- Vladimir Bozovic and Daniel Socek and Rainer Steinwandt and Viktoria I. Villanyi
-
2009/082 ( PDF )
- The Case for Quantum Key Distribution
- Douglas Stebila and Michele Mosca and Norbert Lütkenhaus
-
2009/081 ( PDF )
- Ensuring Data Storage Security in Cloud Computing
- Cong Wang and Qian Wang and Kui Ren and Wenjing Lou
-
2009/080 ( PDF )
- CoSP: A General Framework For Computational Soundness Proofs
- Michael Backes and Dennis Hofheinz and Dominique Unruh
-
2009/079 ( PDF )
- From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
- David Basin and Cas Cremers
-
2009/078 ( PDF )
- Attacks on the DECT authentication mechanisms
- Stefan Lucks and Andreas Schuler and Erik Tews and Ralf-Philipp Weinmann and Matthias Wenzel
-
2009/077 ( PDF )
- On the Security of Iterated Hashing based on Forgery-resistant Compression Functions
- Charles Bouillaguet and Orr Dunkelman and Pierre-Alain Fouque and Antoine Joux
-
2009/076 ( PDF )
- Construction of large families of pseudorandom subsets using elliptic curves
- Zhixiong Chen and Chenhuang Wu
-
2009/075 ( PDF )
- Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model
- Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta
-
2009/074 ( PDF )
- Computational Oblivious Transfer and Interactive Hashing
- Kirill Morozov and George Savvides
-
2009/073 ( PDF )
- Automatic Approach of Provable Security and its Application for OAEP+
- GU Chun-Xiang, Guang Yan, ZHU Yue-Fei
-
2009/072 ( PDF )
- Implementing cryptographic pairings: a magma tutorial
- Luis J Dominguez Perez, Ezekiel J Kachisa, and Michael Scott
-
2009/071 ( PDF )
- Secret sharing on trees: problem solved
- Laszlo Csirmaz and Gabor Tardos
-
2009/070 ( PDF )
- Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Polynomial Basis
- Omran Ahmadi and Francisco Rodr\iguez-Henriquez
-
2009/069 ( PDF )
- Optimistic Fair Exchange with Multiple Arbiters
- Alptekin Kupcu and Anna Lysyanskaya
-
2009/068 ( PDF )
- Overview of Turbo-Code Reconstruction Techniques
- Johann Barbier and Eric Filiol
-
2009/067 ( PDF )
- On fractional correlation immunity of majority functions
- Chuan-Kun Wu
-
2009/066 ( PDF )
- Adaptive Preimage Resistance and Permutation-based Hash Functions
- Jooyoung Lee and Je Hong Park
-
2009/065 ( PS PS.GZ PDF )
- Foundations of Non-Malleable Hash and One-Way Functions
- Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi
-
2009/064 ( PDF )
- On the Data Complexity of Statistical Attacks Against Block Ciphers (full version)
- Céline Blondeau and Benoît Gérard
-
2009/063 ( PS PS.GZ PDF )
- CCZ-equivalence and Boolean functions
- Lilya Budaghyan and Claude Carlet
-
2009/062 ( PDF )
- On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
- Subhamoy Maitra and Santanu Sarkar
-
2009/061 ( PDF )
- Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method
- Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita and Masahito Gotaishi and Toshinobu Kaneko
-
2009/060 ( PDF )
- Comparing Two Pairing-Based Aggregate Signature Schemes
- Sanjit Chatterjee and Darrel Hankerson and Edward Knapp and Alfred Menezes
-
2009/059 ( PDF )
- On the impossibility of graph secret sharing
- Laszlo Csirmaz
-
2009/058 ( PDF )
- On Generalization of Cheon's Algorithm
- Takakazu Satoh
-
2009/057 ( PDF )
- Anonymity in Shared Symmetric Key Primitives
- Gregory M. Zaverucha and Douglas R. Stinson
-
2009/056 ( PDF )
- Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
- David Kammler and Diandian Zhang and Peter Schwabe and Hanno Scharwaechter and Markus Langenberg and Dominik Auras and Gerd Ascheid and Rainer Leupers and Rudolf Mathar and Heinrich Meyr
-
2009/055 ( PDF )
- Universally Composable Symmetric Encryption
- Ralf Kuesters and Max Tuengerthal
-
2009/054 ( PDF )
- On the Security of Tandem-DM
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2009/053 ( PS PS.GZ PDF )
- New commutative semifields defined by PN multinomials
- Lilya Budaghyan and Tor Helleseth
-
2009/052 ( PS PS.GZ PDF )
- ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
- S.Sree Vivek and S.Sharmila Deva Selvi and C.Pandu Rangan
-
2009/051 ( PDF )
- Enhanced Target Collision Resistant Hash Functions Revisited
- Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
-
2009/050 ( PDF )
- On the Portability of Generalized Schnorr Proofs
- Jan Camenisch and Aggelos Kiayias and Moti Yung
-
2009/049 ( PDF )
- Extensions of the Cube Attack based on Low Degree Annihilators
- Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Wei Lei and Josef Pieprzyk
-
2009/048 ( PDF )
- A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials
- Palash Sarkar
-
2009/047 ( PDF )
- On Approximating Addition by Exclusive OR
- Palash Sarkar
-
2009/046 ( PDF )
- Traceability Codes
- Simon R. Blackburn and Tuvi Etzion and Siaw-Lynn Ng
-
2009/045 ( PDF )
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Carmit Hazay and Yehuda Lindell
-
2009/044 ( PDF )
- Un-Trusted-HB: Security Vulnerabilities of Trusted-HB
- Dmitry Frumkin and Adi Shamir
-
2009/043 ( PDF )
- Image Encryption by Pixel Property Separation
- Karthik Chandrashekar Iyer and Aravinda Subramanya
-
2009/042 ( PS PS.GZ PDF )
- On CCZ-equivalence and its use in secondary constructions of bent functions
- Lilya Budaghyan and Claude Carlet
-
2009/041 ( PS PS.GZ PDF )
- Proofs of Retrievability via Hardness Amplification
- Yevgeniy Dodis and Salil Vadhan and Daniel Wichs
-
2009/040 ( PDF )
- How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability
- Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta
-
2009/039 ( PDF )
- Key Insulation and Intrusion Resilience Over a Public Channel
- Mihir Bellare and Shanshan Duan and Adriana Palacio
-
2009/038 ( PDF )
- On Algebraic Relations of Serpent S-Boxes
- Bhupendra Singh and Lexy Alexander and Sanjay Burman
-
2009/037 ( PDF )
- Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice)
- M. Jason Hinek and Charles C. Y. Lam
-
2009/036 ( PDF )
- Constructions of Truly Practical Secure Protocols using Standard Smartcards
- Carmit Hazay and Yehuda Lindell
-
2009/035 ( PDF )
- Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems
- Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim
-
2009/034 ( PDF )
- On a Conditional Collision Attack on NaSHA-512
- S. Markovski, A. Mileva, V. Dimitrova and D. Gligoroski
-
2009/033 ( PDF )
- NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract)
- Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh
-
2009/032 ( PDF )
- A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor
- MITSUNARI Shigeo
-
2009/031 ( PDF )
- Adaptively Secure Two-Party Computation with Erasures
- Yehuda Lindell
-
2009/030 ( PDF )
- An efficient fuzzy extractor for limited noise
- B. Skoric and P. Tuyls
-
2009/029 ( PDF )
- Nofish - A new stream cipher
- Marius Oliver Gheorghita
-
2009/028 ( PDF )
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- Susan Hohenberger and Brent Waters
-
2009/027 ( PDF )
- Security of Verifiably Encrypted Signatures
- Markus Rückert and Dominique Schröder
-
2009/026 ( PDF )
- Collision Attacks on NaSHA-384/512
- Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang
-
2009/025 ( PS PS.GZ PDF )
- Short Redactable Signatures Using Random Trees
- Ee-Chien Chang and Chee Liang Lim and Jia Xu
-
2009/024 ( PDF )
- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
- Emmanuelle Dottax and Christophe Giraud and Matthieu Rivain and Yannick Sierra
-
2009/023 ( PDF )
- Polynomial Runtime and Composability
- Dennis Hofheinz and Dominique Unruh and Jörn Müller-Quade
-
2009/022 ( PDF )
- Correctness of Li Generalization of RSA Cryptosystem
- Roman Popovych
-
2009/021 ( PDF )
- Comparing With RSA
- Julien Cathalo and David Naccache and Jean-Jacques Quisquater
-
2009/020 ( PDF )
- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
- Jiali Choy and Khoongming Khoo and Chuan-Wen Loe
-
2009/019 ( PDF )
- Communication-Efficient Private Protocols for Longest Common Subsequence
- Matthew Franklin and Mark Gondree and Payman Mohassel
-
2009/018 ( PDF )
- Huge 2ndpreimages and collisions of khichidi-1
- prasanth Kumar Thandra, S.A.V. Satya Murty
-
2009/017 ( PDF )
- Anonymous signature scheme
- Chunbo Ma and Jun Ao
-
2009/016 ( PDF )
- Fast elliptic-curve cryptography on the Cell Broadband Engine
- Neil Costigan and Peter Schwabe
-
2009/015 ( PDF )
- Cube Attacks on Trivium
- S S Bedi and N Rajesh Pillai
-
2009/014 ( PDF )
- Key Predistribution Techniques for Grid-Based Wireless Sensor Networks
- Simon R. Blackburn and Tuvi Etzion and Keith M. Martin and Maura B. Paterson
-
2009/013 ( PDF )
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- Yehuda Lindell
-
2009/012 ( PDF )
- Avoid Mask Re-use in Masked Galois Multipliers
- D. Canright
-
2009/011 ( PDF )
- A Very Compact "Perfectly Masked" S-Box for AES (corrected)
- D. Canright and Lejla Batina
-
2009/010 ( PDF )
- Optimal Multicast Group Communication
- Zhibin Zhou and Dijiang Huang
-
2009/009 ( PS PS.GZ PDF )
- Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy
- Christoph Lucas and Dominik Raub and Ueli Maurer
-
2009/008 ( PDF )
- A note on Agrawal conjecture
- Roman Popovych
-
2009/007 ( PS PS.GZ PDF )
- Homomorphic Trapdoor Commitments to Group Elements
- Jens Groth
-
2009/006 ( PDF )
- Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n
- Vlastimil Klima
-
2009/005 ( PDF )
- Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES
- Wei Wang and Xiaoyun Wang and Guangwu Xu
-
2009/004 ( -- withdrawn -- )
- On Stateless Schemes for Message Authentication Using Pseudorandom Functions
- Palash Sarkar
-
2009/003 ( PDF )
- Separating two roles of hashing in one-way message authentication
- L. H. Nguyen and A. W. Roscoe
-
2009/002 ( PDF )
- Thermocommunication
- Julien Brouchier and Nora Dabbous and Tom Kean and Carol Marsh and David Naccache
-
2009/001 ( PDF )
- A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem
- Brian Baldwin and Richard Moloney and Andrew Byrne and Gary McGuire and William P. Marnane
-
2008/545 ( PDF )
- Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
- Vipul Goyal and Amit Sahai
-
2008/544 ( PDF )
- Comments on two multi-server authentication protocols
- *Yalin Chen 1, Chun-Hui Huang 2, Jue-Sam Chou3
-
2008/543 ( PDF )
- Odd-Char Multivariate Hidden Field Equations
- Chia-Hsin Owen Chen and Ming-Shing Chen and Jintai Ding and Fabian Werner and Bo-Yin Yang
-
2008/542 ( PDF )
- Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
- Keting Jia and Xiaoyun Wang and Zheng Yuan and Guangwu Xu
-
2008/541 ( PDF )
- Resettably-Sound Resettable Zero Knowledge Arguments for NP
- Yi Deng
-
2008/540 ( PDF )
- New Impossible Differential Attacks on AES
- Jiqiang Lu and Orr Dunkelman and Nathan Keller and Jongsung Kim
-
2008/539 ( PDF )
- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
- Jan Camenisch and Markulf Kohlweiss and Claudio Soriente
-
2008/538 ( PDF )
- Supporting Non-membership Proofs with Bilinear-map Accumulators
- Ivan Damgĺrd and Nikos Triandopoulos
-
2008/537 ( PDF )
- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
- SeongHan Shin and Kazukuni Kobara and Hideki Imai
-
2008/536 ( PS PS.GZ PDF )
- Predicate Privacy in Encryption Systems
- Emily Shen and Elaine Shi and Brent Waters
-
2008/535 ( PDF )
- A Recursive Threshold Visual Cryptography Scheme
- Abhishek Parakh and Subhash Kak
-
2008/534 ( PDF )
- Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer
- Juan A. Garay and Daniel Wichs and Hong-Sheng Zhou
-
2008/533 ( PDF )
- Collusion-Free Multiparty Computation in the Mediated Model
- Jonathan Katz and Yehuda Lindell
-
2008/532 ( PDF )
- Semi-free start collision attack on Blender
- Xu Liangyu and Li Ji
-
2008/531 ( PDF )
- Collision Attack on the Waterfall Hash Function
- Scott Fluhrer
-
2008/530 ( PDF )
- Fast hashing to G2 on pairing friendly curves
- Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa
-
2008/529 ( PDF )
- A Hardware Interface for Hashing Algorithms
- Zhimin Chen, Sergey Morozov, Patrick Schaumont
-
2008/528 ( PDF )
- Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures
- Georg Fuchsbauer and David Pointcheval
-
2008/527 ( PS PS.GZ PDF )
- Properties of Cryptographic Hash Functions
- Michal Rjaško
-
2008/526 ( PDF )
- Novel Precomputation Schemes for Elliptic Curve Cryptosystems
- Patrick Longa, and Catherine Gebotys
-
2008/525 ( PDF )
- On The Diffie-Hellman Assumption
- R. Bhaskar, K. Chandrasekaran, S. Lokam, P.L. Montgomery, R. Venkatesan, Y. Yacobi
-
2008/524 ( PDF )
- Round-Optimal Zero-Knowledge Proofs of Knowledge for NP
- Li Hongda and Feng dengguo and Li Bao and Xue Haixia
-
2008/523 ( -- withdrawn -- )
- Privacy Preserving Multiset Union with ElGamal Encryption
- Jeongdae Hong and Jung Woo Kim and Jihye Kim and Kunsoo Park and Jung Hee Cheon
-
2008/522 ( PDF )
- Twisted Edwards Curves Revisited
- Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
-
2008/521 ( PDF )
- Generating Shorter Bases for Hard Random Lattices
- Joel Alwen and Chris Peikert
-
2008/520 ( PDF )
- Cryptanalysis of the Hash Function LUX-256
- Shuang Wu and Dengguo Feng and Wenling Wu
-
2008/519 ( PDF )
- Collision attack on NaSHA-512
- Li Ji and Xu Liangyu and Guan Xu
-
2008/518 ( -- withdrawn -- )
- A NEW HASH ALGORITHM$:$ Khichidi$-$1
- Natarajan Vijayarangan
-
2008/517 ( PS PS.GZ PDF )
- Improving the Rules of the DPA Contest
- Francois-Xavier Standaert and Philippe Bulens and Giacomo de Meulenaer and Nicolas Veyrat-Charvillon
-
2008/516 ( PDF )
- Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
- Zheng Yuan and Keting Jia and Wei Wang and Xiaoyun Wang
-
2008/515 ( PDF )
- Cryptanalysis of RadioGatun
- Thomas Fuhr and Thomas Peyrin
-
2008/514 ( PS PS.GZ PDF )
- Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security
- Tapan Rai and Stanislav Bulygin
-
2008/513 ( PDF )
- Improved Cryptanalysis of SHAMATA-BC
- Adem Atalay, Orhun Kara and Ferhat Karakoç
-
2008/512 ( PS PS.GZ )
- A new class of Bent functions in Polynomial Forms
- Sihem Mesnager
-
2008/511 ( PDF )
- Classification of the SHA-3 Candidates
- Ewan Fleischmann and Christian Forler and Michael Gorski
-
2008/510 ( PDF )
- Reconstructing RSA Private Keys from Random Key Bits
- Nadia Heninger and Hovav Shacham
-
2008/509 ( PS PS.GZ PDF )
- Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings
- Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
-
2008/508 ( PDF )
- Some Formal Solutions in Side-channel Cryptanalysis - An Introduction
- Fabrice J.P.R. Pautot
-
2008/507 ( PDF )
- A non-delegatable identity-based strong designated verifier signature scheme
- Bin Wang
-
2008/506 ( PDF )
- Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary
- Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2008/505 ( PDF )
- removed
- removed
-
2008/504 ( PS PS.GZ PDF )
- The $n^c$-Unique Shortest Vector Problem is Hard
- Vadim Lyubashevsky
-
2008/503 ( PS PS.GZ PDF )
- Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets
- Yevgeniy Dodis and Daniel Wichs
-
2008/502 ( PDF )
- Extended Access Structures and Their Cryptographic Applications
- Vanesa Daza and Javier Herranz and Paz Morillo and Carla Rafols
-
2008/501 ( PDF )
- Some Observations on SHAMATA
- Ewan Fleischmann and Michael Gorski
-
2008/500 ( PDF )
- Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
- Hai Huang and Zhenfu Cao
-
2008/499 ( PDF )
- Some Observations on HC-128
- Subhamoy Maitra and Goutam Paul and Shashwat Raizada
-
2008/498 ( PDF )
- Small Odd Prime Field Multivariate PKCs
- Anna Chen an Ming-Shing Chen and Tien-Ren Chen and Chen-Mou Cheng and Jintai Ding and Eric Kuo and Frost Li and Bo-Yin Yang
-
2008/497 ( PDF )
- On the Correctness of An Approach Against Side-channel attacks
- Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang
-
2008/496 ( PDF )
- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
- Debra L. Cook and Moti Yung and Angelos Keromytis
-
2008/495 ( PDF )
- Non-Malleable Obfuscation
- Ran Canetti and Mayank Varia
-
2008/494 ( PS PS.GZ PDF )
- Key Agreement from Close Secrets over Unsecured Channels
- Bhavana Kanukurthi and Leonid Reyzin
-
2008/493 ( PDF )
- Secure Parameters for SWIFFT
- Johannes Buchmann and Richard Lindner
-
2008/492 ( PDF )
- Modeling Computational Security in Long-Lived Systems, Version 2
- Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
-
2008/491 ( PDF )
- A CM construction for curves of genus 2 with p-rank 1
- Laura Hitt O'Connor and Gary McGuire and Michael Naehrig and Marco Streng
-
2008/490 ( PDF )
- On the final exponentiation for calculating pairings on ordinary elliptic curves
- Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa
-
2008/489 ( PDF )
- HAIL: A High-Availability and Integrity Layer for Cloud Storage
- Kevin D. Bowers and Ari Juels and Alina Oprea
-
2008/488 ( PDF )
- Efficient Rational Secret Sharing in Standard Communication Networks
- Georg Fuchsbauer and Jonathan Katz and David Naccache
-
2008/487 ( PDF )
- Secure Certificateless Public Key Encryption without Redundancy
- Yinxia Sun and Futai Zhang
-
2008/486 ( PDF )
- Inside the Hypercube
- Jean-Philippe Aumasson and Eric Brier and Willi Meier and María Naya-Plasencia and Thomas Peyrin
-
2008/485 ( -- withdrawn -- )
- Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form
- Rongquan Feng and Zilong Wang and Hongfeng Wu
-
2008/484 ( PDF )
- Sharp lower bounds on the extractable randomness from non-uniform sources
- Boris Skoric and Chibuzo Obi and Evgeny Verbitskiy and Berry Schoenmakers
-
2008/483 ( PDF )
- Sharing DSS by the Chinese Remainder Theorem
- Kamer Kaya and Ali Aydın Selçuk
-
2008/482 ( PDF )
- The Generic Hardness of Subset Membership Problems under the Factoring Assumption
- Tibor Jager and Jörg Schwenk
-
2008/481 ( PS PS.GZ PDF )
- Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
- Chris Peikert
-
2008/480 ( PDF )
- ECM on Graphics Cards
- Daniel J. Bernstein and Tien-Ren Chen and Chen-Mou Cheng and Tanja Lange and Bo-Yin Yang
-
2008/479 ( PDF )
- Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols
- Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren and Shizhu Bian
-
2008/478 ( PS PS.GZ PDF )
- Attribute-Based Encryption with Key Cloning Protection
- M. J. Hinek and S. Jiang and R. Safavi-Naini and S. F. Shahandashti
-
2008/477 ( PDF )
- On a New Formal Proof Model for RFID Location Privacy (Extended Version)
- Ton van Deursen and Sasa Radomirovic
-
2008/476 ( PS PS.GZ PDF )
- The $F_f$-Family of Protocols for RFID-Privacy and Authentication
- Erik-Oliver Blass and Anil Kurmus and Refik Molva and Guevara Noubir and Abdullatif Shikfa
-
2008/475 ( PDF )
- Sphinx: A Compact and Provably Secure Mix Format
- George Danezis and Ian Goldberg
-
2008/474 ( PDF )
- Access Controls for Oblivious and Anonymous Systems
- Scott Coull and Matthew Green and Susan Hohenberger
-
2008/473 ( PDF )
- Exploring Cipherspace: Combining stream ciphers and block ciphers
- Sandy Harris
-
2008/472 ( PDF )
- Practical attacks against WEP and WPA
- Martin Beck and Erik Tews
-
2008/471 ( PDF )
- Automatic Generation of Sound Zero-Knowledge Protocols
- Endre Bangerter and Jan Camenisch and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider
-
2008/470 ( PDF )
- From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol
- Paolo D'Arco and Alfredo De Santis
-
2008/469 ( PS PS.GZ PDF )
- Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
- Stephane Manuel
-
2008/468 ( PDF )
- A CCA2 Secure Variant of the McEliece Cryptosystem
- Nico Döttling, Rafael Dowsley, Jörn Müller-Quade and Anderson C. A. Nascimento
-
2008/467 ( PDF )
- Cryptanalysis of EnRUPT
- Dmitry Khovratovich and Ivica Nikolic
-
2008/466 ( PS PS.GZ PDF )
- Combined (identity-based) public key schemes
- Maria Isabel Gonzalez Vasco and Florian Hess and Rainer Steinwandt
-
2008/465 ( PDF )
- Secure Arithmetic Computation with No Honest Majority
- Yuval Ishai and Manoj Prabhakaran and Amit Sahai
-
2008/464 ( PDF )
- Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication
- Michael Kounavis and Shay Gueron
-
2008/463 ( PDF )
- Key-Private Proxy Re-Encryption
- Giuseppe Ateniese and Karyn Benson and Susan Hohenberger
-
2008/462 ( PDF )
- Unconditionally Secure Multiparty Set Intersection Re-Visited
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2008/461 ( -- withdrawn -- )
- On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks
- Arpita Patra and Ashish Choudhary and Kannan Srinathan and C. Pandu Rangan
-
2008/460 ( PS PS.GZ PDF )
- Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension
- Donghoon Chang and Seokhie Hong and Jaechul Sung and Sangjin Lee
-
2008/459 ( PDF )
- A variant of Wiener's attack on RSA
- Andrej Dujella
-
2008/458 ( PDF )
- Complete Fairness in Multi-Party Computation Without an Honest Majority
- S. Dov Gordon and Jonathan Katz
-
2008/457 ( PDF )
- On the Composability of Statistically Secure Bit Commitments
- Rafael Dowsley and Jeroen van de Graaf and Jörn Müller-Quade and Anderson C. A. Nascimento
-
2008/456 ( PDF )
- The Diffie-Hellman problem and generalization of Verheul's theorem
- Dustin Moody
-
2008/455 ( PDF )
- New hash function designs
- Igor Semaev
-
2008/454 ( PDF )
- Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
- Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
-
2008/453 ( PDF )
- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
- Ahmad-Reza Sadeghi and Thomas Schneider
-
2008/452 ( -- withdrawn -- )
- Injective Trapdoor Functions are Necessary and Sufficient for CCA2 Secure Public-Key Cryptosystems
- Rui Xue and Dengguo Feng
-
2008/451 ( PDF )
- Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
- Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann
-
2008/450 ( PDF )
- On the Security of Fully Collusion Resistant Traitor Tracing Schemes
- Yongdong WU and Robert H. Deng
-
2008/449 ( PDF )
- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
- Joonsang Baek and Willy Susilo and Joseph K. Liu and Jianying Zhou
-
2008/448 ( PS PS.GZ PDF )
- Authenticated Adversarial Routing
- Yair Amir and Paul Bunn and Rafail Ostrovsky
-
2008/447 ( PS PS.GZ PDF )
- Divisible On-line/Off-line Signatures
- Chong-zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang
-
2008/446 ( PDF )
- Secure Random Key Pre-Distribution Against Semi-Honest Adversaries
- Mike Burmester and Reihaneh Safavi-Naini and Gelareh Taban
-
2008/445 ( PDF )
- Cryptanalysis of the Improved Cellular Message Encryption Algorithm
- Thomas Chardin and Raphaël Marinier
-
2008/444 ( PS PS.GZ PDF )
- Elliptic divisibility sequences and the elliptic curve discrete logarithm problem
- Rachel Shipsey and Christine Swart
-
2008/443 ( PDF )
- Key differentiation attacks on stream ciphers
- Enes Pasalic
-
2008/442 ( PS PS.GZ PDF )
- Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
- Anton Kargl and Stefan Pyka and Hermann Seuschek
-
2008/441 ( PDF )
- How Risky is the Random-Oracle Model?
- Gaetan Leurent and Phong Q. Nguyen
-
2008/440 ( PDF )
- Robust Encryption
- Michel Abdalla and Mihir Bellare and Gregory Neven
-
2008/439 ( PDF )
- Linear equivalence between elliptic curves in Weierstrass and Hesse form
- Alexander Rostovtsev
-
2008/438 ( PDF )
- New Related-Key Boomerang Attacks on AES
- Michael Gorski and Stefan Lucks
-
2008/437 ( PDF )
- Divisibility, Smoothness and Cryptographic Applications
- David Naccache and Igor Shparlinski
-
2008/436 ( -- withdrawn -- )
- BGKM: An Efficient Secure Broadcasting Group Key Management Scheme
- Zhibin Zhou and Dijiang Huang
-
2008/435 ( PS PS.GZ PDF )
- Obtaining and solving systems of equations in key variables only for the small variants of AES
- Stanislav Bulygin and Michael Brickenstein
-
2008/434 ( PDF )
- The computational SLR: a logic for reasoning about computational indistinguishability
- Yu Zhang
-
2008/433 ( PDF )
- On differences of quadratic residues
- Guillermo Morales-Luna
-
2008/432 ( PDF )
- Dynamic Provable Data Possession
- C. Chris Erway and Alptekin Kupcu and Charalampos Papamanthou and Roberto Tamassia
-
2008/431 ( PDF )
- Usable Optimistic Fair Exchange
- Alptekin Kupcu and Anna Lysyanskaya
-
2008/430 ( PDF )
- Cryptographic Protocol Composition via the Authentication Tests
- Joshua D. Guttman
-
2008/429 ( PDF )
- Public-Key Encryption with Efficient Amortized Updates
- Nishanth Chandran and Rafail Ostrovsky and William E. Skeith III
-
2008/428 ( PDF )
- Delegatable Anonymous Credentials
- Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham
-
2008/427 ( PDF )
- LEGO for Two Party Secure Computation
- Jesper Buus Nielsen and Claudio Orlandi
-
2008/426 ( PDF )
- On Kasami Bent Functions
- Deepmala Sharma and Sugata Gangopadhyay
-
2008/425 ( PDF )
- Efficient Asynchronous Multiparty Computation with Optimal Resilience
- Arpita Patra and Ashish Choudhury and C. Pandu Rangan
-
2008/424 ( PDF )
- Asynchronous Byzantine Agreement with Optimal Resilience
- Arpita Patra, Ashish Choudhury and C. Pandu Rangan
-
2008/423 ( PS PS.GZ PDF )
- Searchable encryption with decryption in the standard model
- Dennis Hofheinz and Enav Weinreb
-
2008/422 ( PDF )
- A New Approach for Algebraically Homomorphic Encryption
- Frederik Armknecht and Ahmad-Reza Sadeghi
-
2008/421 ( PDF )
- Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
- Kaoru Kurosawa and Kazuhiro Suzuki
-
2008/420 ( PDF )
- Oblivious Transfer from Weak Noisy Channels
- Jürg Wullschleger
-
2008/419 ( PS PS.GZ PDF )
- Parsing ambiguities in authentication and key establishment protocols
- Liqun Chen and Chris J. Mitchell
-
2008/418 ( PDF )
- Privacy-Enhancing First-Price Auctions Using Rational Cryptography
- Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos
-
2008/417 ( PDF )
- On the security of pairing-friendly abelian varieties over non-prime fields
- Naomi Benger and Manuel Charlemagne and David Freeman
-
2008/416 ( PDF )
- Almost-Asynchronous MPC with Faulty Minority
- Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
-
2008/415 ( PDF )
- Asynchronous Multiparty Computation: Theory and Implementation
- Ivan Damgĺrd, Martin Geisler, Mikkel Krřigaard, Jesper Buus Nielsen
-
2008/414 ( PDF )
- On the Number of Synchronous Rounds Required for Byzantine Agreement
- Matthias Fitzi and Jesper Buus Nielsen
-
2008/413 ( PS PS.GZ PDF )
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- Vladimir Kolesnikov and Charles Rackoff
-
2008/412 ( PDF )
- Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes
- Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
-
2008/411 ( PDF )
- Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks
- Bo Zhu, Yanfei Zheng, Yaowei Zhou and Kefei Chen
-
2008/410 ( PDF )
- On the Role of PKG for Proxy Re-encryption in Identity Based Setting
- Xu an Wang and Xiaoyuan Yang and Fagen Li
-
2008/409 ( PDF )
- A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension
- Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka
-
2008/408 ( PDF )
- The Enigmatique Toolkit
- Christopher Billings
-
2008/407 ( PS PS.GZ PDF )
- Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions
- Donghoon Chang and Jaechul Sung and Seokhie Hong and Sangjin Lee
-
2008/406 ( PDF )
- An asymptotically optimal RFID protocol against relay attacks
- Gildas Avoine and Aslan Tchamkerten
-
2008/405 ( PDF )
- Slid Pairs in Salsa20 and Trivium
- Deike Priemuth-Schmid and Alex Biryukov
-
2008/404 ( PS PS.GZ PDF )
- Pairing with Supersingular Trace Zero Varieties Revisited
- Emanuele Cesena
-
2008/403 ( PDF )
- SPICE Simulation of a "Provably Secure" True Random Number Generator
- Markus Dichtl and Bernd Meyer and Hermann Seuschek
-
2008/402 ( PDF )
- Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages
- Jean-Charles Faugčre and Ludovic Perret
-
2008/401 ( PDF )
- Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
- Mridul Nandi
-
2008/400 ( PDF )
- Comments on two password based protocols
- Yalin Chen and Hung-Min Sun and Chun-Hui Huang and Jue-Sam Chou
-
2008/399 ( PDF )
- Round Efficient Unconditionally Secure Multiparty Computation Protocol
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2008/398 ( PS PS.GZ PDF )
- Generating genus two hyperelliptic curves over large characteristic finite fields
- Takakazu Satoh
-
2008/397 ( -- withdrawn -- )
- A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature
- Uttam Kr. Mondal , Satyendra Nath Mandal and J. PalChoudhury
-
2008/396 ( PDF )
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- Subhamoy Maitra and Goutam Paul
-
2008/395 ( PDF )
- New Applications of Differential Bounds of the SDS Structure
- Jiali Choy and Khoongming Khoo
-
2008/394 ( PDF )
- Attribute-Based Ring Signatures
- Jin Li and Kwangjo Kim
-
2008/393 ( PDF )
- How Far Must You See To Hear Reliably
- Pranav K Vasishta and Anuj Gupta and Prasant Gopal and Piyush Bansal and Rishabh Mukherjee and Poornima M and Kannan Srinathan and Kishore Kothapalli
-
2008/392 ( PDF )
- GUC-Secure Set-Intersection Computation
- TIAN Yuan and WANG Ying
-
2008/391 ( PDF )
- Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
- Tao Xie FanBao Liu DengGuo Feng
-
2008/390 ( PDF )
- Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift
- Ann Hibner Koblitz and Neal Koblitz and Alfred Menezes
-
2008/389 ( PS PS.GZ )
- Optimal Subset-Difference Broadcast Encryption with Free Riders
- Murat Ak and Kamer Kaya and Ali Aydin Selcuk
-
2008/388 ( PS PS.GZ PDF )
- Double-Base Number System for Multi-Scalar Multiplications
- Christophe Doche and David R. Kohel and Francesco Sica
-
2008/387 ( -- withdrawn -- )
- None
- None
-
2008/386 ( PDF )
- Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table
- Michael Lifliand
-
2008/385 ( PDF )
- Cube Attacks on Tweakable Black Box Polynomials
- Itai Dinur and Adi Shamir
-
2008/384 ( PDF )
- Improving the Boneh-Franklin Traitor Tracing Scheme
- Pascal Junod and Alexandre Karlov and Arjen K. Lenstra
-
2008/383 ( PS PS.GZ PDF )
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Craig Gentry and Shai Halevi
-
2008/382 ( PDF )
- Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home
- Mark Manulis and Damien Leroy and Francois Koeune and Olivier Bonaventure and Jean-Jacques Quisquater
-
2008/381 ( PDF )
- New AES software speed records
- Daniel J. Bernstein and Peter Schwabe
-
2008/380 ( PDF )
- Dynamic Threshold Cryptosystem without Group Manager
- Andreas Noack and Stefan Spitz
-
2008/379 ( PDF )
- A Characterization of Chameleon Hash Functions and New, Efficient Designs
- Mihir Bellare and Todor Ristov
-
2008/378 ( PDF )
- Additively Homomorphic Encryption with d-Operand Multiplications
- Carlos Aguilar Melchor, Philippe Gaborit, and Javier Herranz
-
2008/377 ( PDF )
- TRIVIUM's output partially autocancels
- Michael Vielhaber
-
2008/376 ( PDF )
- Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol
- Cas J.F. Cremers
-
2008/375 ( PDF )
- A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
- Jan Camenisch and Nishanth Chandran and Victor Shoup
-
2008/374 ( PDF )
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto
-
2008/373 ( PS PS.GZ PDF )
- Analysis and Improvement of Authenticatable Ring Signcryption Scheme
- Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
-
2008/372 ( PDF )
- Enumeration of Balanced Symmetric Functions over GF(p)
- Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
-
2008/371 ( PDF )
- Unconditionally Reliable Message Transmission in Directed Hypergraphs
- Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2008/370 ( PDF )
- Compartmented Threshold RSA Based on the Chinese Remainder Theorem
- Sorin Iftene and Stefan Ciobaca and Manuela Grindei
-
2008/369 ( PDF )
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- Shahram Khazaei and Willi Meier
-
2008/368 ( PDF )
- Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting
- Varad Kirtane and C. Pandu Rangan
-
2008/367 ( PS PS.GZ PDF )
- {Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
- Peeter Laud and Long Ngo
-
2008/366 ( PDF )
- Unique Shortest Vector Problem for max norm is NP-hard
- Than Quang Khoat and Nguyen Hong Tan
-
2008/365 ( PDF )
- Entropy Bounds for Traffic Confirmation
- Luke O'Connor
-
2008/364 ( PDF )
- Zcipher Algorithm Specification
- Ilya O Levin
-
2008/363 ( PS PS.GZ PDF )
- An argument for Hamiltonicity
- Vadym Fedyukovych
-
2008/362 ( PDF )
- The Cost of False Alarms in Hellman and Rainbow Tradeoffs
- Jin Hong
-
2008/361 ( -- withdrawn -- )
- IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.
- William Whyte (editor) and Nick Howgrave-Graham and Jeff Hoffstein and Jill PIpher and Joseph H. Silverman and Phil Hirschhorn
-
2008/360 ( PDF )
- An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)
- Saurabh Dutta and Jyotsna Kumar mandal
-
2008/359 ( PS PS.GZ PDF )
- Argument of knowledge of a bounded error
- Vadym Fedyukovych
-
2008/358 ( PS PS.GZ PDF )
- History-Independent Cuckoo Hashing
- Moni Naor and Gil Segev and Udi Wieder
-
2008/357 ( PS PS.GZ PDF )
- A protocol for K-multiple substring matching
- Vadym Fedyukovych and Vitaliy Sharapov
-
2008/356 ( PDF )
- Using Commutative Encryption to Share a Secret
- Saied Hosseini Khayat
-
2008/355 ( PS PS.GZ PDF )
- An argument for rank metric
- Vadym Fedyukovych
-
2008/354 ( -- withdrawn -- )
- On DDos Attack against Proxy in Re-encryption and Re-signature
- Xu an Wang
-
2008/353 ( PDF )
- Weaknesses in HENKOS Stream Cipher
- Prasanth Kumar Thandra and S.A.V. Satya Murty and R Balasubramanian
-
2008/352 ( PDF )
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Alexandra Boldyreva and Serge Fehr and Adam O'Neill
-
2008/351 ( PDF )
- Flaws in Some Self-Healing Key Distribution Schemes with Revocation
- Vanesa Daza and Javier Herranz and German Saez
-
2008/350 ( PDF )
- Higher Order Differential Cryptanalysis of Multivariate Hash Functions
- Yiyuan Luo and Xuejia Lai
-
2008/349 ( PDF )
- Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
- Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp and Christopher Wolf
-
2008/348 ( PS PS.GZ )
- Iterative Probabilistic Reconstruction of RC4 Internal States
- Jovan Golic and Guglielmo Morgari
-
2008/347 ( PDF )
- Information Leakage in Optimal Anonymized and Diversified Data
- Chengfang Fang and Ee-Chien Chang
-
2008/346 ( PDF )
- Remote Integrity Check with Dishonest Storage Server
- Ee-Chien Chang and Jia Xu
-
2008/345 ( PDF )
- An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction
- Jooyoung Lee and Choon Sik Park
-
2008/344 ( PDF )
- Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption
- Jooyoung Lee and Je Hong Park
-
2008/343 ( PDF )
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Jooyoung Lee and Yongjin Yeom
-
2008/342 ( PS PS.GZ PDF )
- Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
- S. Sharmila Deva Selvi and S. Sree Vivek and Neha Jain and Pandu Rangan Chandrasekaran
-
2008/341 ( PDF )
- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
- S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and Pandu Rangan Chandrasekaran
-
2008/340 ( -- withdrawn -- )
- On construction of signature schemes based on birational permutations over noncommutative rings
- Yasufumi Hashimoto and Kouichi Sakurai
-
2008/339 ( PDF )
- High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
- Mohamed El-Hadedy and Danilo Gligoroski and Svein J. Knapskog
-
2008/338 ( PS PS.GZ PDF )
- An improvement of discrete Tardos fingerprinting codes
- Koji Nuida and Satoshi Fujitsu and Manabu Hagiwara and Takashi Kitagawa and Hajime Watanabe and Kazuto Ogawa and Hideki Imai
-
2008/337 ( PDF )
- Modified Huang-Wang's Convertible Nominative Signature Scheme
- Wei Zhao and Dingfeng Ye
-
2008/336 ( PDF )
- New attacks on ISO key establishment protocols
- Anish Mathuria and G. Sriram
-
2008/335 ( PDF )
- Public Key Cryptography from Different Assumptions
- Boaz Barak and Avi Wigderson
-
2008/334 ( PDF )
- Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields
- Darrel Hankerson and Koray Karabina and Alfred Menezes
-
2008/333 ( PDF )
- Explicit hard instances of the shortest vector problem
- Johannes Buchmann and Richard Lindner and Markus Rückert and Michael Schneider
-
2008/332 ( PDF )
- Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
- Mahalingam Ramkumar
-
2008/331 ( PDF )
- A Secure Remote User Authentication Scheme with Smart Cards
- Manoj Kumar
-
2008/330 ( -- withdrawn -- )
- Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext
- Xianhui Lu, Xuejia Lai, Dake He
-
2008/329 ( PS PS.GZ PDF )
- SMS4 Encryption Algorithm for Wireless Networks
- Whitfield Diffie and George Ledin (translators)
-
2008/328 ( PDF )
- Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance
- Hemanta Maji and Manoj Prabhakaran and Mike Rosulek
-
2008/327 ( PDF )
- Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption
- Le Trieu Phong and Wakaha Ogata
-
2008/326 ( PDF )
- Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
- M. B. Paterson and D. R. Stinson
-
2008/325 ( PDF )
- Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
- Chunbo Ma and Jun Ao
-
2008/324 ( PDF )
- RSA-TBOS Signcryption with Proxy Re-encryption.
- Varad Kirtane and C.Pandu Rangan
-
2008/323 ( PDF )
- A new identity based proxy signature scheme
- Bin Wang
-
2008/322 ( PDF )
- Lattice-based Blind Signatures
- Markus Rückert
-
2008/321 ( PDF )
- A correction to ``Efficient and Secure Comparison for On-Line Auctions''
- Ivan Damgård and Martin Geisler and Mikkel Krøigaard
-
2008/320 ( PDF )
- Public Key Block Cipher Based on Multivariate Quadratic Quasigroups
- Danilo Gligoroski and Smile Markovski and Svein J. Knapskog
-
2008/319 ( PDF )
- Yet Another Secure Distance-Bounding Protocol
- Ventzislav Nikov and Marc Vauclair
-
2008/318 ( PDF )
- Attacking and defending the McEliece cryptosystem
- Daniel J. Bernstein and Tanja Lange and Christiane Peters
-
2008/317 ( -- withdrawn -- )
- Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving
- Abdulwahed M. Ismail and Mohamad Rushdan
-
2008/316 ( PDF )
- Signing a Linear Subspace: Signature Schemes for Network Coding
- Dan Boneh and David Freeman and Jonathan Katz and Brent Waters
-
2008/315 ( PDF )
- RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension
- Santanu Sarkar and Subhamoy Maitra and Sumanta Sarkar
-
2008/314 ( PDF )
- Scratch, Click & Vote: E2E voting over the Internet
- Miroslaw Kutylowski and Filip Zagorski
-
2008/313 ( PS PS.GZ PDF )
- A new almost perfect nonlinear function which is not quadratic
- Yves Edel and Alexander Pott
-
2008/312 ( PDF )
- Improved efficiency of Kiltz07-KEM
- Xianhui Lu, Xuejia Lai, Dake He
-
2008/311 ( PDF )
- Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers
- Orr Dunkelman and Nathan Keller
-
2008/310 ( PDF )
- Attacks on RFID Protocols
- T. van Deursen and S. Radomirovic
-
2008/309 ( PDF )
- Revocation Systems with Very Small Private Keys
- Allison Lewko and Amit Sahai and Brent Waters
-
2008/308 ( PDF )
- Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
- Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin and Steffen Reidt and Stephen D. Wolthusen
-
2008/307 ( PDF )
- Full Security:Fuzzy Identity Based Encryption
- Liming Fang and Jinyue Xia
-
2008/306 ( PDF )
- Combinatorial batch codes
- M. B. Paterson and D. R. Stinson and R. Wei
-
2008/305 ( PDF )
- Identity-Based Directed Signature Scheme from Bilinear Pairings
- Xun Sun and Jian-hua Li and Gong-liang Chen and Shu-tang Yang
-
2008/304 ( PDF )
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung
-
2008/303 ( PDF )
- Complete Fairness in Secure Two-Party Computation
- S. Dov Gordon and Carmit Hazay and Jonathan Katz and Yehuda Lindell
-
2008/302 ( PDF )
- Secure Biometric Authentication With Improved Accuracy
- M. Barbosa, S. Cauchie, T. Brouard and S. Melo de Sousa
-
2008/301 ( PDF )
- Accountability of Perfect Concurrent Signature
- Yunfeng Li, Dake He, Xianhui Lu
-
2008/300 ( PDF )
- Cheon's algorithm, pairing inversion and the discrete logarithm problem
- David J. Mireles Morales
-
2008/299 ( PDF )
- An analysis of the infrastructure in real function fields
- David J. Mireles Morales
-
2008/298 ( PDF )
- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
- Ryou Fujita and Kohtaro Tadaki and Shigeo Tsujii
-
2008/297 ( PDF )
- Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme
- Hongzhen Du and Qiaoyan Wen
-
2008/296 ( PDF )
- Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
- Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, and Huaxiong Wang
-
2008/295 ( PS PS.GZ PDF )
- Foundations of Group Key Management – Framework, Security Model and a Generic Construction
- Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Rahul Srinivasan and Pandu Rangan Chandrasekaran
-
2008/294 ( PDF )
- A New Message Recognition Protocol for Ad Hoc Pervasive Networks
- Atefeh Mashatan and Douglas R. Stinson
-
2008/293 ( PDF )
- Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary
- Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik
-
2008/292 ( PDF )
- Another approach to pairing computation in Edwards coordinates
- Sorina Ionica and Antoine Joux
-
2008/291 ( PDF )
- How to Protect Yourself without Perfect Shredding
- Ran Canetti and Dror Eiger and Shafi Goldwasser and Dah-Yoh Lim
-
2008/290 ( PDF )
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Brent Waters
-
2008/289 ( PDF )
- Sharemind: a framework for fast privacy-preserving computations
- Dan Bogdanov and Sven Laur and Jan Willemson
-
2008/288 ( PDF )
- How to Launch A Birthday Attack Against DES
- Zhengjun Cao
-
2008/287 ( PDF )
- Authenticated Byzantine Generals in Dual Failure Model
- Anuj Gupta and Prasant Gopal and Piyush Bansal and Kannan Srinathan
-
2008/286 ( PS PS.GZ )
- One-Up Problem for (EC)DSA
- Daniel R. L. Brown
-
2008/285 ( PDF )
- Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
- Jithra Adikari and Vassil Dimitrov and Laurent Imbert
-
2008/284 ( PDF )
- Breaking the Akiyama-Goto cryptosystem
- P. Ivanov and J. F. Voloch
-
2008/283 ( PDF )
- Attacks on Singelee and Preneel's protocol
- Jorge Munilla and Alberto Peinado
-
2008/282 ( PDF )
- Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
- Jihye Kim and Gene Tsudik
-
2008/281 ( PDF )
- Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher
- Taehyun Kim, Jongsung Kim, Seokhie Hong and Jaechul Sung
-
2008/280 ( PDF )
- FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three
- Jean-Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto
-
2008/279 ( PDF )
- Delegating Capabilities in Predicate Encryption Systems
- Elaine Shi and Brent Waters
-
2008/278 ( PS PS.GZ PDF )
- An Improved Robust Fuzzy Extractor
- Bhavana Kanukurthi and Leonid Reyzin
-
2008/277 ( PS PS.GZ PDF )
- A strategy for any DAA Issuer and an additional verification by a Host
- Vadym Fedyukovych
-
2008/276 ( PS PS.GZ PDF )
- Signcryption with Proxy Re-encryption
- Chandrasekar S. and Ambika K. and Pandu Rangan C.
-
2008/275 ( PDF )
- Certificate-Based Signature Schemes without Pairings or Random Oracles
- Joseph K. Liu \and Joonsang Baek \and Willy Susilo \and Jianying Zhou
-
2008/274 ( PS PS.GZ PDF )
- Twisted Ate Pairing on Hyperelliptic Curves and Applications
- Fangguo Zhang
-
2008/273 ( PDF )
- White-Box Cryptography: Formal Notions and (Im)possibility Results
- Amitabh Saxena and Brecht Wyseur and Bart Preneel
-
2008/272 ( PS PS.GZ PDF )
- A New Hash Family Obtained by Modifying the SHA-2 Family
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/271 ( PS PS.GZ PDF )
- A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/270 ( PS PS.GZ PDF )
- New Collision attacks Against Up To 24-step SHA-2
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/269 ( PS PS.GZ PDF )
- Searching for Low Weight Codewords in Linear Binary Codes
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/268 ( PDF )
- Adaptive Security in Broadcast Encryption Systems
- Craig Gentry and Brent Waters
-
2008/267 ( PDF )
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart
-
2008/266 ( PDF )
- Information-Theoretically Secure Voting Without an Honest Majority
- Anne Broadbent and Alain Tapp
-
2008/265 ( PDF )
- Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors
- Steven D. Galbraith and Michael Harrison and David J. Mireles Morales
-
2008/264 ( PDF )
- Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security
- Robin Künzler and Jörn Müller-Quade and Dominik Raub
-
2008/263 ( PS PS.GZ PDF )
- Slide Attacks on a Class of Hash Functions
- Michael Gorski and Stefan Lucks and Thomas Peyrin
-
2008/262 ( PDF )
- Statistically Reliable and Secure Message Transmission in Directed Networks
- Arpita Patra and Ashish Choudhury and C. Pandu Rangan
-
2008/261 ( PS PS.GZ PDF )
- The Hidden Root Problem
- F. Vercauteren
-
2008/260 ( PDF )
- Breaking RSA Generically is Equivalent to Factoring
- Divesh Aggarwal and Ueli Maurer
-
2008/259 ( PDF )
- 2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period
- ZHAO Lu, WEN Qiao-yan
-
2008/258 ( PDF )
- ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS
- JAIYEOLA Temitope Gbolahan and ADENIRAN John Olushola
-
2008/257 ( PDF )
- ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY
- JAIYEOLA Temitope Gbolahan
-
2008/256 ( PDF )
- ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES
- JAIYEOLA Temitope Gbolahan
-
2008/255 ( PDF )
- Embedding in Two Least Significant Bits with Wet Paper Coding
- Xin Liao and Qiao-yan Wen
-
2008/254 ( PDF )
- An Efficient Identity-based Ring Signcryption Scheme
- Zhenchao ZHU and Yuqing ZHANG and FengjiaoWANG
-
2008/253 ( PDF )
- Multi-Recipient Signcryption for Secure Wireless Group Communication
- Yiliang Han, Xiaolin Gui, Xu'an Wang
-
2008/252 ( PS PS.GZ PDF )
- Provable Security of Digital Signatures in the Tamper-Proof Device Model
- Nick Varnovsky
-
2008/251 ( PDF )
- Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols
- Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad-Reza Sadeghi and Jörg Schwenk
-
2008/250 ( PDF )
- Pairings on hyperelliptic curves with a real model
- Steven Galbraith and Xibin Lin and David Mireles
-
2008/249 ( -- withdrawn -- )
- Construction of Resilient Functions with Multiple Cryptographic Criteria
- Shaojing Fu, Chao Li, Bing sun
-
2008/248 ( PDF )
- Cryptanalysis of a client-to-client password-authenticated key agreement protocol
- Fengjiao Wang and Yuqing Zhang
-
2008/247 ( PS PS.GZ PDF )
- Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
- S. Sharmila Deva Selvi and S. Sree Vivek and Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Pandu Rangan Chandrasekaran
-
2008/246 ( PDF )
- The Random Oracle Model and the Ideal Cipher Model are Equivalent
- Jean-Sebastien Coron and Jacques Patarin and Yannick Seurin
-
2008/245 ( PS PS.GZ PDF )
- Cryptanalysis of an Authentication Scheme Using Truncated Polynomials
- Markus Grassl and Rainer Steinwandt
-
2008/244 ( PDF )
- New balanced Boolean functions satisfying all the main cryptographic criteria
- Claude Carlet and Keqin Feng
-
2008/243 ( PDF )
- On the economic payoff of forensic systems when used to trace Counterfeited Software and content
- Yacov Yacobi
-
2008/242 ( -- withdrawn -- )
- Enumeration of Homogeneous Rotation Symmetric functions over GF(p)
- Shaojing Fu Chao Li Bing Sun
-
2008/241 ( PDF )
- Practical Attacks on HB and HB+ Protocols
- Zbigniew Golebiewski and Krzysztof Majcher and Filip Zagorski and Marcin Zawada
-
2008/240 ( PDF )
- Leakage-Resilient Cryptography in the Standard Model
- Stefan Dziembowski and Krzysztof Pietrzak
-
2008/239 ( PDF )
- Recognition in Ad Hoc Pervasive Networks
- Atefeh Mashatan and Douglas R. Stinson
-
2008/238 ( PS PS.GZ PDF )
- On the Provable Security of Multi-Receiver Signcryption Schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C.Pandu Rangan
-
2008/237 ( PDF )
- Local Affinity Based Inversion of Filter Generators
- O.A. Logachev and D.S. Nazarova
-
2008/236 ( PDF )
- A Modular Security Analysis of the TLS Handshake Protocol
- P. Morrissey and N.P.Smart and B. Warinschi
-
2008/235 ( PDF )
- Constant-Round Concurrent Non-Malleable Commitments and Decommitments
- Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
-
2008/234 ( PDF )
- On the CCA1-Security of Elgamal and Damgård's Elgamal
- Helger Lipmaa
-
2008/233 ( -- withdrawn -- )
- On Resettably-Sound Resttable Zero Knowledege Arguments
- Yi Deng and Dongdai Lin
-
2008/232 ( PDF )
- Perfectly Secure Message Transmission Tolerating Mixed Adversary
- Arpita Patra and Ashish Choudhury and Ashwinkumar B. V and Kannan Srinathan and C. Pandu Rangan
-
2008/231 ( PDF )
- A Novel Probabilistic Passive Attack on the Protocols HB and HB+
- Jose Carrijo and Rafael Tonicelli and Hideki Imai and Anderson C. A. Nascimento
-
2008/230 ( PDF )
- A New Collision Differential For MD5 With Its Full Differential Path
- Tao Xie and DengGuo Feng and FanBao Liu
-
2008/229 ( PDF )
- Identification and Privacy: Zero-Knowledge is not Enough
- Julien Bringer and Herve Chabanne and Thomas Icart
-
2008/228 ( PDF )
- Revisiting Wiener's Attack -- New Weak Keys in RSA
- Subhamoy Maitra and Santanu Sarkar
-
2008/227 ( PS PS.GZ PDF )
- New Impossible Differential Cryptanalysis of ARIA
- Ruilin Li, Bing Sun, Peng Zhang and Chao Li
-
2008/226 ( PDF )
- Proxy Key Re-encapsulation Mechanism for Group Communications
- Chunbo Ma and Jun Ao
-
2008/225 ( PS PS.GZ PDF )
- Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
- S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan
-
2008/224 ( PDF )
- An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem
- Hai Huang and Zhenfu Cao
-
2008/223 ( PDF )
- On the Security of a Visual Cryptography Scheme for Color Images
- Bert W. Leung and Felix Y. Ng and Duncan S. Wong
-
2008/222 ( PDF )
- Encryption-On-Demand: Practical and Theoretical Considerations
- Gideon Samid
-
2008/221 ( PDF )
- Efficient Conversion of Secret-shared Values Between Different Fields
- Ivan Damgard and Rune Thorbek
-
2008/220 ( PS PS.GZ PDF )
- Essentially Optimal Universally Composable Oblivious Transfer
- Ivan Damgĺrd and Jesper Buus Nielsen and Claudio Orlandi
-
2008/219 ( -- withdrawn -- )
- Analysis and Details of the Random Cipher Output Mode Of Operation Primitives
- Dan P. Milleville
-
2008/218 ( PDF )
- Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation
- Wouter Castryck and Steven Galbraith and Reza Rezaeian Farashahi
-
2008/217 ( PDF )
- Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms
- Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thomé
-
2008/216 ( PDF )
- A New Multi-Linear Universal Hash Family
- Palash Sarkar
-
2008/215 ( PDF )
- On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics
- Naoki Hashizume and Fumiyuki Momose and Jinhui Chao
-
2008/214 ( PDF )
- Multi-Factor Password-Authenticated Key Exchange
- Douglas Stebila and Poornaprajna Udupi and Sheueling Chang
-
2008/213 ( PDF )
- The Multireceiver Commitment Schemes
- Shuhong Wang
-
2008/212 ( PDF )
- Reducing the Complexity of the Weil Pairing Computation
- Chang-An Zhao and Fangguo Zhang and Dongqing Xie
-
2008/211 ( PDF )
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Goichiro Hanaoka and Kaoru Kurosawa
-
2008/210 ( PDF )
- Complexity Analysis of a Fast Modular Multiexponentiation Algorithm
- Haimin Jin and Duncan S. Wong and Yinlong Xu
-
2008/209 ( PDF )
- Computing Bilinear Pairings on Elliptic Curves with Automorphisms
- Chang-An Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Bing-Long Chen
-
2008/208 ( PS PS.GZ PDF )
- Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme
- Naoki Ogura and Shigenori Uchiyama
-
2008/207 ( PDF )
- Efficient Receipt-Free Ballot Casting Resistant to Covert Channels
- Ben Adida and C. Andrew Neff
-
2008/206 ( PDF )
- Partial Fairness in Secure Two-Party Computation
- Dov Gordon and Jonathan Katz
-
2008/205 ( PS PS.GZ PDF )
- On Software Parallel Implementation of Cryptographic Pairings
- Philipp Grabher and Johann Groszschaedl and Dan Page
-
2008/204 ( PDF )
- Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem
- Yanbin Pan and Yingpu Deng
-
2008/203 ( PDF )
- Privacy-Preserving Matching of DNA Profiles
- Fons Bruekers and Stefan Katzenbeisser and Klaus Kursawe and Pim Tuyls
-
2008/202 ( PS PS.GZ PDF )
- Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing
- Zhitu Su, Hui Li and JianFeng Ma
-
2008/201 ( PDF )
- How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
- J. Wu and D.R. Stinson
-
2008/200 ( PDF )
- On The Security of The ElGamal Encryption Scheme and Damgard’s Variant
- J. Wu and D.R. Stinson
-
2008/199 ( PDF )
- Simultaneous field divisions: an extension of Montgomery's trick
- David G. Harris
-
2008/198 ( PDF )
- Security needs in embedded systems
- Anoop MS
-
2008/197 ( PDF )
- Secure Multiparty Computation for Privacy-Preserving Data Mining
- Yehuda Lindell and Benny Pinkas
-
2008/196 ( PS PS.GZ PDF )
- A New Family of Perfect Nonlinear Binomials
- Zhengbang Zha and Gohar M. Kyureghyan and Xueli Wang
-
2008/195 ( PDF )
- An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
- Jin Zhengping and Zuo Huijuan and Du hongzhen and Wen Qiaoyan
-
2008/194 ( PDF )
- Endomorphisms for faster elliptic curve cryptography on a large class of curves
- Steven D. Galbraith and Xibin Lin and Michael Scott
-
2008/193 ( -- withdrawn -- )
- A Tamper-Evident Voting Machine Resistant to Covert Channels
- Wei Han and Tao Hao and Dong Zheng and Ke-fei Chen and Xiaofeng Chen
-
2008/192 ( PDF )
- Investigating the DPA-Resistance Property of Charge Recovery Logics
- Amir Moradi and Mehrdad Khatir and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani
-
2008/191 ( -- withdrawn -- )
- None
- None
-
2008/190 ( PS PS.GZ )
- User-Sure-and-Safe Key Retrieval
- Daniel R. L. Brown
-
2008/189 ( PDF )
- How to Build a Hash Function from any Collision-Resistant Function
- Thomas Ristenpart and Thomas Shrimpton
-
2008/188 ( PDF )
- Information Leakage of Flip-Flops in DPA-Resistant Logic Styles
- Amir Moradi and Thomas Eisenbarth and Axel Poschmann and Carsten Rolfes and Christof Paar and Mohammad T. Manzuri Shalmani and Mahmoud Salmasizadeh
-
2008/187 ( PS PS.GZ PDF )
- An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
- Fagen Li and Yong Yu
-
2008/186 ( PDF )
- Privacy-Preserving Audit and Extraction of Digital Contents
- Mehul A. Shah and Ram Swaminathan and Mary Baker
-
2008/185 ( PS PS.GZ PDF )
- A New Approach to Secure Logging
- Di Ma and Gene Tsudik
-
2008/184 ( PDF )
- On the Secure Obfuscation of Deterministic Finite Automata
- W. Erik Anderson
-
2008/183 ( PDF )
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Jean-Philippe Aumasson and Willi Meier and Florian Mendel
-
2008/182 ( PDF )
- Restricted Adaptive Oblivious Transfer
- Javier Herranz
-
2008/181 ( PDF )
- Proofs of Knowledge with Several Challenge Values
- Grzegorz Stachowiak
-
2008/180 ( PDF )
- Imaginary quadratic orders with given prime factor of class number
- Alexander Rostovtsev
-
2008/179 ( -- withdrawn -- )
- An Efficient ID-based Ring Signature Scheme from Pairings
- Chunxiang Gu and Yuefei Zhu
-
2008/178 ( PDF )
- Optimal Discretization for High-Entropy Graphical Passwords
- Kemal Bicakci
-
2008/177 ( PDF )
- Algebraic Techniques in Differential Cryptanalysis
- Martin Albrecht and Carlos Cid
-
2008/176 ( PDF )
- New construction of Boolean functions with maximun algebraic immunity
- Wang yongjuan and Fan shuqin and Han wenbao
-
2008/175 ( PDF )
- Proofs of Retrievability: Theory and Implementation
- Kevin D. Bowers and Ari Juels and Alina Oprea
-
2008/174 ( PS PS.GZ PDF )
- Non-Linear Reduced Round Attacks Against SHA-2 Hash family
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/173 ( PDF )
- Full Cryptanalysis of LPS and Morgenstern Hash Function
- Christophe Petit and Kristin Lauter and Jean-Jacques Quisquater
-
2008/172 ( PDF )
- The Round Complexity of Verifiable Secret Sharing Revisited
- Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan
-
2008/171 ( PDF )
- Binary Edwards Curves
- Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi
-
2008/170 ( PDF )
- Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem
- Simon R. Blackburn
-
2008/169 ( PS PS.GZ PDF )
- Understanding Phase Shifting Equivalent Keys and Exhaustive Search
- Côme Berbain and Aline Gouget and Hervé Sibert
-
2008/168 ( PS PS.GZ PDF )
- Possibility and impossibility results for selective decommitments
- Dennis Hofheinz
-
2008/167 ( PDF )
- Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols
- Omkant Pandey
-
2008/166 ( PS PS.GZ PDF )
- Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
- Nicolas T. Courtois and Karsten Nohl and Sean O'Neil
-
2008/165 ( PDF )
- Improved lower bound on the number of balanced symmetric functions over GF(p)
- Pinhui Ke
-
2008/164 ( PDF )
- On the (Im)Possibility of Key Dependent Encryption
- Iftach Haitner and Thomas Holenstein
-
2008/163 ( PDF )
- Universally Composable Adaptive Oblivious Transfer
- Matthew Green and Susan Hohenberger
-
2008/162 ( PDF )
- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
- Michael Backes and Boris Köpf
-
2008/161 ( PDF )
- Modular polynomials for genus 2
- Reinier Broker and Kristin Lauter
-
2008/160 ( PDF )
- A Proxy Signature Scheme over Braid Groups
- Girraj Kumar Verma
-
2008/159 ( PDF )
- A non-interactive deniable authentication scheme based on designated verifier proofs
- Bin Wang
-
2008/158 ( PS PS.GZ PDF )
- DISH: Distributed Self-Healing in Unattended Sensor Networks
- Di Ma and Gene Tsudik
-
2008/157 ( PDF )
- Secure Online Elections in Practice
- Lucie Langer and Axel Schmidt and Johannes Buchmann
-
2008/156 ( PDF )
- On Black-Box Ring Extraction and Integer Factorization
- Kristina Altmann and Tibor Jager and Andy Rupp
-
2008/155 ( PDF )
- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties
- David Freeman
-
2008/154 ( -- withdrawn -- )
- The Walsh Spectrum of a New Family of APN Functions
- Yue Zhou and Chao Li
-
2008/153 ( PDF )
- Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour
- Clemens Heuberger
-
2008/152 ( PDF )
- Computational soundness of symbolic zero-knowledge proofs
- Michael Backes and Dominique Unruh
-
2008/151 ( -- withdrawn -- )
- Impossible Differential Cryptanalysis of CLEFIA
- Bing Sun,Ruilin Li, Mian Wang, Ping Li and Chao Li
-
2008/150 ( PDF )
- Robust Combiners for Software Hardening
- Amir Herzberg and Haya Shulman
-
2008/149 ( PS PS.GZ )
- Toy Factoring by Newton's Method
- Daniel R. L. Brown
-
2008/148 ( PDF )
- Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication
- Roberto M. Avanzi and Clemens Heuberger and Helmut Prodinger
-
2008/147 ( PDF )
- A Real-World Attack Breaking A5/1 within Hours
- Timo Gendrullis and Martin Novotny and Andy Rupp
-
2008/146 ( PDF )
- Dynamic SHA-2
- Xu Zijie
-
2008/145 ( PDF )
- Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System
- Jithra Adikari and Vassil S. Dimitrov and Pradeep K. Mishra
-
2008/144 ( PS PS.GZ PDF )
- A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
- Shiva Prasad Kasiviswanathan and Adam Smith
-
2008/143 ( PS PS.GZ PDF )
- Certificateless Signcryption
- M. Barbosa and P. Farshim
-
2008/142 ( PDF )
- Attacking Reduced Round SHA-256
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/141 ( PDF )
- Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality
- Arpita Patra and Ashish Choudhury and C. Pandu Rangan and Kannan Srinathan
-
2008/140 ( PDF )
- Reducing Complexity Assumptions for Oblivious Transfer
- K.Y. Cheong and Takeshi Koshiba
-
2008/139 ( PDF )
- Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM
- Liming Fang and Jiandong Wang and Yongjun Ren and Jinyue Xia and Shizhu Bian
-
2008/138 ( PDF )
- Oblivious Transfer Based on the McEliece Assumptions
- Rafael Dowsley and Jeroen van de Graaf and Jörn Müller-Quade and Anderson C. A. Nascimento
-
2008/137 ( PDF )
- More Discriminants with the Brezing-Weng Method
- Gaetan Bisson and Takakazu Satoh
-
2008/136 ( PDF )
- Constant-Size Dynamic $k$-TAA
- Man Ho Au and Willy Susilo and Yi Mu
-
2008/135 ( PS PS.GZ PDF )
- Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations
- Clemens Heuberger and James A. Muir
-
2008/134 ( PS PS.GZ PDF )
- Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption
- Alon Rosen and Gil Segev
-
2008/133 ( PDF )
- The arithmetic of characteristic 2 Kummer surfaces
- P. Gaudry and D. Lubicz
-
2008/132 ( PDF )
- A Framework for the Sound Specification of Cryptographic Tasks
- Juan A. Garay and Aggelos Kiayias and Hong-Sheng Zhou
-
2008/131 ( PS PS.GZ PDF )
- Collisions and other Non-Random Properties for Step-Reduced SHA-256
- Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger
-
2008/130 ( PS PS.GZ PDF )
- Analysis of Step-Reduced SHA-256
- Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen
-
2008/129 ( PDF )
- Controlling access to personal data through Accredited Symmetrically Private Information Retrieval
- Mohamed Layouni
-
2008/128 ( PS PS.GZ PDF )
- A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
- Hidehiko Nakagami and Ryoichi Teramura and Toshihiro Ohigashi and Hidenori Kuwakado and Masakatu Morii
-
2008/127 ( PDF )
- A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation
- Nidia Cortez-Duarte and Francisco Rodríguez-Henríquez and Jean-Luc Beuchat and Eiji Okamoto
-
2008/126 ( PDF )
- Machine Learning Attacks Against the ASIRRA CAPTCHA
- Philippe Golle
-
2008/125 ( PDF )
- Pairing Lattices
- Florian Hess
-
2008/124 ( PDF )
- A Simple Derivation for the Frobenius Pseudoprime Test
- Daniel Loebenberger
-
2008/123 ( PDF )
- Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style
- Mehrdad Khatir and Amir Moradi
-
2008/122 ( PDF )
- TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote
- Seog Chung Seo and Dong-Guk Han and Seokhie Hong
-
2008/121 ( PS PS.GZ PDF )
- New proofs for old modes
- Mark Wooding
-
2008/120 ( PDF )
- Public key encryption and encryption emulation attacks
- Denis Osin and Vladimir Shpilrain
-
2008/119 ( PDF )
- Linear Bandwidth Naccache-Stern Encryption
- Benoit Chevallier-Mames and David Naccache and Jacques Stern
-
2008/118 ( PDF )
- Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication
- Patrick Longa and Catherine Gebotys
-
2008/117 ( PDF )
- Exponentiation in pairing-friendly groups using homomorphisms
- Steven D. Galbraith and Michael Scott
-
2008/116 ( PS PS.GZ PDF )
- Chosen-Ciphertext Security via Correlated Products
- Alon Rosen and Gil Segev
-
2008/115 ( PDF )
- A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$
- Jean-Luc Beuchat and Nicolas Brisebarre and Jérémie Detrey and Eiji Okamoto and Francisco Rodríguez-Henríquez
-
2008/114 ( PDF )
- Scalable and Efficient Provable Data Possession
- Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik
-
2008/113 ( PDF )
- Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132
- Daniel Mall and Qing Zhong
-
2008/112 ( PDF )
- Democratic Group Signatures with Threshold Traceability
- Dong Zheng and Xiangxue Li and Changshe Ma and Kefei Chen and Jianhua Li
-
2008/111 ( PDF )
- THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD
- Yuriy Izbenko and Vladislav Kovtun and Alexandr Kuznetsov
-
2008/110 ( -- withdrawn -- )
- On the Design of Secure and Fast Double Block Length Hash Functions
- Zheng Gong and Xuejia Lai and Kefei Chen
-
2008/109 ( PDF )
- Collisions for Round-Reduced LAKE
- Florian Mendel and Martin Schläffer
-
2008/108 ( PDF )
- New Differential-Algebraic Attacks and Reparametrization of Rainbow
- Jintai Ding AND Bo-Yin Yang AND Owen Chen AND Ming-Shing Chen AND Doug Cheng
-
2008/107 ( PDF )
- Private Branching Programs: On Communication-Efficient Cryptocomputing
- Helger Lipmaa
-
2008/106 ( PS PS.GZ PDF )
- Knapsack cryptosystems built on NP-hard instances
- Laurent Evain
-
2008/105 ( PS PS.GZ PDF )
- Cryptanalysis of White-Box Implementations
- W. Michiels and P. Gorissen and H.D.L. Hollmann
-
2008/104 ( PS PS.GZ PDF )
- Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
- Ernie Brickell, Liqun Chen and Jiangtao Li
-
2008/103 ( -- withdrawn -- )
- Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security
- Jun Shao and Dongsheng Xing and Zhenfu Cao
-
2008/102 ( PS PS.GZ PDF )
- Degradation and Amplification of Computational Hardness
- Shai Halevi and Tal Rabin
-
2008/101 ( -- withdrawn -- )
- Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
- Arpita Patra and Ashish Choudhary and AshwinKumar B.V and C. Pandu Rangan
-
2008/100 ( PDF )
- Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields
- Patrick Longa
-
2008/099 ( PS PS.GZ PDF )
- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
- Kristin E. Lauter and Katherine E. Stange
-
2008/098 ( PDF )
- On Security Notions for Verifiable Encrypted Signature
- Xu-An Wang and Xiaoyuan Yang and Yiliang Han
-
2008/097 ( PS PS.GZ PDF )
- Fairness with an Honest Minority and a Rational Majority
- Shien Jin Ong and David Parkes and Alon Rosen and Salil Vadhan
-
2008/096 ( PS PS.GZ PDF )
- Optimal Pairings
- F. Vercauteren
-
2008/095 ( PS PS.GZ PDF )
- Strongly Unforgeable ID-based Signatures Without Random Oracles
- Chifumi Sato and Takeshi Okamoto and Eiji Okamoto
-
2008/094 ( PDF )
- Universally Composable Undeniable Signature
- Kaoru Kurosawa and Jun Furukawa
-
2008/093 ( PDF )
- New ID-based Fair Blind Signatures
- Girraj Kumar Verma
-
2008/092 ( PDF )
- An Efficient SPRP-secure Construction based on Pseudo Random Involution
- Mridul Nandi
-
2008/091 ( PDF )
- A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation
- Mridul Nandi
-
2008/090 ( PDF )
- Improving upon HCTR and matching attacks for Hash-Counter-Hash approach
- Mridul Nandi
-
2008/089 ( PDF )
- An improved preimage attack on MD2
- Søren S. Thomsen
-
2008/088 ( PDF )
- A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm
- Mahabir Prasad Jhanwar and Rana Barua
-
2008/087 ( PDF )
- Towards a Theory of White-Box Security
- Amir Herzberg and Haya Shulman and Amitabh Saxena and Bruno Crispo
-
2008/086 ( PDF )
- Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
- Arpita Patra and Ashish Choudhary and Madhu Gayatri and C. Pandu Rangan
-
2008/085 ( PDF )
- All Pairings Are in a Group
- Chang-An Zhao and Fangguo Zhang and Jiwu Huang
-
2008/084 ( PDF )
- ID based generalized signcryption
- Sunder Lal and Prashant Kushwah
-
2008/083 ( PDF )
- On the Security of Chien's Ultralightweight RFID Authentication Protocol
- Hung-Min Sun, Wei-Chih Ting, and King-Hang Wang
-
2008/082 ( PDF )
- Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes
- Roberto Araujo and Peter Y. A. Ryan
-
2008/081 ( PDF )
- Template Attacks on ECDSA
- Marcel Medwed and Elisabeth Oswald
-
2008/080 ( PDF )
- Pairing-Based Onion Routing with Improved Forward Secrecy
- Aniket Kate and Greg Zaverucha and Ian Goldberg
-
2008/079 ( PDF )
- Homomorphic Encryption with CCA Security
- Manoj Prabhakaran and Mike Rosulek
-
2008/078 ( PS PS.GZ PDF )
- A Short Proof of the PRP/PRF Switching Lemma
- Donghoon Chang and Mridul Nandi
-
2008/077 ( PDF )
- Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
- Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
-
2008/076 ( PDF )
- Results from a Search for the Best Linear Approximation of a Block Cipher
- Kashif Ali and Howard M. Heys
-
2008/075 ( PS PS.GZ PDF )
- On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak
- Jonathan J. Hoch and Adi Shamir
-
2008/074 ( PDF )
- On the Chikazawa-Inoue ID based key system
- Bae Eun Jung and Hee Jean Kim
-
2008/073 ( PDF )
- Compact Proofs of Retrievability
- Hovav Shacham and Brent Waters
-
2008/072 ( PDF )
- The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption
- Alexandre M. Deusajute and Paulo S. L. M. Barreto
-
2008/071 ( PDF )
- Blockcipher Based Hashing Revisited
- Martijn Stam
-
2008/070 ( PS PS.GZ PDF )
- Generators of Jacobians of Genus Two Curves
- Christian Robenhagen Ravnshoj
-
2008/069 ( PDF )
- HENKOS Cryptanalysis-Related keys attack
- Marius Oliver Gheorghita
-
2008/068 ( PDF )
- Multiparty Computation Goes Live
- Peter Bogetoft and Dan Lund Christensen and Ivan Damgard and Martin Geisler and Thomas Jakobsen and Mikkel Krøigaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael Schwartzbach and Tomas Toft
-
2008/067 ( PDF )
- The Twin Diffie-Hellman Problem and Applications
- David Cash and Eike Kiltz and Victor Shoup
-
2008/066 ( PDF )
- High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m)
- Junjie Jiang and Jing Chen and Jian Wang and Duncan S. Wong and Xiaotie Deng
-
2008/065 ( PS PS.GZ PDF )
- Infringing and Improving Password Security of a Three-Party Key Exchange Protocol
- Junghyun Nam
-
2008/064 ( PDF )
- Remarks on the NFS complexity
- Pavol Zajac
-
2008/063 ( PS PS.GZ PDF )
- Efficient Sequential Aggregate Signed Data
- Gregory Neven
-
2008/062 ( PDF )
- Computing Hilbert Class Polynomials
- Juliana Belding and Reinier Broker and Andreas Enge and Kristin Lauter
-
2008/061 ( PDF )
- Abelian varieties with prescribed embedding degree
- David Freeman and Peter Stevenhagen and Marco Streng
-
2008/060 ( PDF )
- Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields
- Nicholas T. Sullivan
-
2008/059 ( PDF )
- Buying random votes is as hard as buying no-votes
- Stefan Popoveniuc and Jonathan Stanton
-
2008/058 ( PDF )
- Physical Cryptanalysis of KeeLoq Code Hopping Applications
- Thomas Eisenbarth and Timo Kasper and Amir Moradi and Christof Paar and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani
-
2008/057 ( PDF )
- Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields
- Vladislav Kovtun, Jan Pelzl and Alexandr Kuznetsov
-
2008/056 ( PDF )
- Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated)
- Vladislav Kovtun, Thomas Wollinger
-
2008/055 ( -- withdrawn -- )
- cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards
- S.Sharmila Deva Selvi and S.Sree Vivek
-
2008/054 ( PS PS.GZ PDF )
- Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)
- Jin Hong and Kyung Chul Jeong and Eun Young Kwon and In-Sok Lee and Daegun Ma
-
2008/053 ( PDF )
- Breaking One-Round Key-Agreement Protocols in the Random Oracle Model
- Miroslava Sotakova
-
2008/052 ( PDF )
- New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version)
- Patrick Longa and Ali Miri
-
2008/051 ( PDF )
- New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)
- Patrick Longa and Ali Miri
-
2008/050 ( PDF )
- Multi-PKG ID based signcryption
- Sunder Lal and Prashant Kushwah
-
2008/049 ( PDF )
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Yehuda Lindell and Benny Pinkas
-
2008/048 ( PDF )
- Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
- Donghoon Chang, Jaechul Sung, Seokhie Hong and Sangjin Lee
-
2008/047 ( PS PS.GZ PDF )
- Fair Traceable Multi-Group Signatures
- Vicente Benjumea and Seung Geol Choi and Javier Lopez and Moti Yung
-
2008/046 ( PS PS.GZ PDF )
- David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
- Tal Moran and Gil Segev
-
2008/045 ( PDF )
- Threshold RSA for Dynamic and Ad-Hoc Groups
- Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin
-
2008/044 ( PDF )
- Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
- Ari Juels and Ravikanth Pappu and Bryan Parno
-
2008/043 ( PDF )
- Cryptanalysis of CRUSH hash structure
- Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
-
2008/042 ( PDF )
- Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
- Julien Bringer and Herve Chabanne
-
2008/041 ( PDF )
- A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights
- Hassan Elkamchouchi and Yasmine Abouelseoud
-
2008/040 ( PDF )
- Efficient and Generalized Pairing Computation on Abelian Varieties
- Eunjeong Lee, Hyang-Sook Lee, and Cheol-Min Park
-
2008/039 ( PDF )
- New Results on Unconditionally Secure Multireceiver Manual Authentication
- Shuhong Wang and Reihaneh Safavi-Naini
-
2008/038 ( PDF )
- A New Blind Identity-Based Signature Scheme with Message Recovery
- Hassan Elkamchouchi and Yasmine Abouelseoud
-
2008/037 ( PS PS.GZ PDF )
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
- Georg Fuchsbauer and David Pointcheval
-
2008/036 ( PDF )
- Generic Attacks on Feistel Schemes
- Jacques Patarin
-
2008/035 ( PS PS.GZ PDF )
- Efficient Fully-Simulatable Oblivious Transfer
- Yehuda Lindell
-
2008/034 ( PS PS.GZ PDF )
- Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation
- Chunming Tang and Dingyi Pei and Zhuojun Liu and Zheng-an Yao and Mingsheng Wang
-
2008/033 ( PDF )
- Lower Bounds on Signatures From Symmetric Primitives
- Boaz Barak, Mohammad Mahmoody-Ghidardy
-
2008/032 ( PS PS.GZ PDF )
- Merkle Puzzles are Optimal
- Boaz Barak, Mohammad Mahmoody-Ghidary
-
2008/031 ( PDF )
- Authenticating with Attributes
- Dalia Khader
-
2008/030 ( PS PS.GZ PDF )
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padró and Daniel Wichs
-
2008/029 ( PS PS.GZ PDF )
- Non-Cyclic Subgroups of Jacobians of Genus Two Curves
- Christian Robenhagen Ravnshoj
-
2008/028 ( PS PS.GZ PDF )
- HB#: Increasing the Security and Efficiency of HB+
- Henri Gilbert and Matthew J.B. Robshaw and Yannick Seurin
-
2008/027 ( PDF )
- Blind Signature Scheme over Braid Groups
- Girraj Kumar Verma
-
2008/026 ( PDF )
- Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$
- Mitsuru Kawazoe and Tetsuya Takahashi
-
2008/025 ( PS PS.GZ PDF )
- Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication
- Christian Robenhagen Ravnshoj
-
2008/024 ( PDF )
- Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes
- Sunder Lal and Vandani Verma
-
2008/023 ( PS PS.GZ PDF )
- General Certificateless Encryption and Timed-Release Encryption
- Sherman S.M. Chow and Volker Roth and Eleanor G. Rieffel
-
2008/022 ( PDF )
- Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods
- M. Gebhardt and G. Illies and W. Schindler
-
2008/021 ( PDF )
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
-
2008/020 ( PDF )
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Eike Kiltz and Yevgeniy Vahlis
-
2008/019 ( PS PS.GZ PDF )
- Computing Pairings Using x-Coordinates Only
- Steven D. Galbraith and Xibin Lin
-
2008/018 ( PDF )
- Disjunctive Multi-Level Secret Sharing
- Mira Belenkiy
-
2008/017 ( PS PS.GZ PDF )
- New State Recovery Attack on RC4
- Alexander Maximov and Dmitry Khovratovich
-
2008/016 ( PDF )
- ECM using Edwards curves
- Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters
-
2008/015 ( PDF )
- Practical Short Signature Batch Verification
- Anna Lisa Ferrara and Matthew Green and Susan Hohenberger and Michael Østergaard Pedersen
-
2008/014 ( PS PS.GZ PDF )
- Simulatable Adaptive Oblivious Transfer
- Jan Camenisch and Gregory Neven and abhi shelat
-
2008/013 ( PDF )
- Twisted Edwards Curves
- Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters
-
2008/012 ( PDF )
- The Encrypted Elliptic Curve Hash
- Daniel R. L. Brown
-
2008/011 ( PDF )
- A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II
- Ayan Mahalanobis
-
2008/010 ( PDF )
- A Proof of Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the ``$H_{\sigma}$ technique''--
- Jacques Patarin
-
2008/009 ( PDF )
- Generic Attacks for the Xor of k random permutations
- Jacques Patarin
-
2008/008 ( PS PS.GZ PDF )
- Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves
- Zhitu su, Hui Li and Jianfeng Ma
-
2008/007 ( PDF )
- Efficient One-round Key Exchange in the Standard Model
- Colin Boyd and Yvonne Cliff and Juan M. Gonzalez Nieto and Kenneth G. Paterson
-
2008/006 ( PDF )
- Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
- Ralf Kuesters and Max Tuengerthal
-
2008/005 ( PS PS.GZ PDF )
- Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
- Francois Mace and Francois-Xavier Standaert and Jean-Jacques Quisquater
-
2008/004 ( PDF )
- Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions
- Palash Sarkar
-
2008/003 ( PDF )
- On Collisions of Hash Functions Turbo SHA-2
- Vlastimil Klima
-
2008/002 ( PDF )
- Fuzzy Identity Based Signature
- Piyi Yang and Zhenfu Cao and Xiaolei Dong
-
2008/001 ( PS PS.GZ PDF )
- Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol
- Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo and Lihua Wang
-
2007/482 ( PDF )
- TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks
- Leonardo B. Oliveira and Michael Scott and Julio López and Ricardo Dahab
-
2007/481 ( -- withdrawn -- )
- MAC-free variant of KD04
- Xianhui Lu, Xuejia Lai, Dake He
-
2007/480 ( PDF )
- Differential Fault Analysis on the AES Key Schedule
- Junko Takahashi and Toshinori Fukunaga
-
2007/479 ( PDF )
- An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
- J. Wu and D.R. Stinson
-
2007/478 ( PDF )
- Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs
- Dafna Kidron and Yehuda Lindell
-
2007/477 ( PDF )
- Algebraic Side-Channel Collision Attacks on AES
- Andrey Bogdanov and Andrey Pyshkin
-
2007/476 ( PDF )
- Dynamic SHA
- Xu Zijie
-
2007/475 ( PDF )
- Obtaining Universally Composable Security: Towards the Bare Bones of Trust
- Ran Canetti
-
2007/474 ( PDF )
- Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path
- Martin Cochran
-
2007/473 ( PDF )
- Authenticated Key Exchange and Key Encapsulation Without Random Oracles
- Tatsuaki Okamoto
-
2007/472 ( PS PS.GZ PDF )
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- Jean-Philippe Aumasson and Simon Fischer and Shahram Khazaei and Willi Meier and Christian Rechberger
-
2007/471 ( PDF )
- Attacks on the WEP protocol
- Erik Tews
-
2007/470 ( PDF )
- Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
- Bodo Möller and Andy Rupp
-
2007/469 ( PDF )
- ID-Based Group Password-Authenticated Key Exchange
- Xun Yi and Raylin Tso and Eiji Okamoto
-
2007/468 ( -- withdrawn -- )
- On the hash function of ODH assumption
- Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
-
2007/467 ( PS PS.GZ PDF )
- Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
- André Chailloux and Dragos Florin Ciocan and Iordanis Kerenidis and Salil Vadhan
-
2007/466 ( PDF )
- Improved Impossible Differential Cryptanalysis of CLEFIA
- Wei Wang and Xiaoyun Wang
-
2007/465 ( PDF )
- A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions
- Zheng Gong and Xuejia Lai and Kefei Chen
-
2007/464 ( PDF )
- Secure Computation Without Authentication
- Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin
-
2007/463 ( PDF )
- Efficient GF(3m) Multiplication Algorithm for eta T Pairing
- Gen Takahashi and Fumitaka Hoshino and Tetsutaro Kobayashi
-
2007/462 ( PDF )
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
- Siamak F Shahandashti and Reihaneh Safavi-Naini
-
2007/461 ( PDF )
- Verifiable Attribute-based Encryption
- QiangTang and Dongyao Ji
-
2007/460 ( PS PS.GZ PDF )
- Guarantees for Customers of Incentive Anonymizing Networks
- Timothy Atkinson and Marius Silaghi
-
2007/459 ( PDF )
- Practical Anonymous Divisible E-Cash From Bounded Accumulators
- Man Ho Au and Willy Susilo and Yi Mu
-
2007/458 ( PS PS.GZ PDF )
- Saving Private Randomness in One-Way Functions and Pseudorandom Generators
- Nenad Dedic and Danny Harnik and Leonid Reyzin
-
2007/457 ( PDF )
- Comparing Implementation Efficiency of Ordinary and Squared Pairings
- Christine Abegail Antonio and Tanaka Satoru and Ken Nakamula
-
2007/456 ( -- withdrawn -- )
- Precise Zero-Knowledge in Concurrent Setting
- Ning Ding and Dawu Gu
-
2007/455 ( PDF )
- Analysis and optimization of elliptic-curve single-scalar multiplication
- Daniel J. Bernstein and Tanja Lange
-
2007/454 ( PDF )
- Efficient Certificateless Signatures Suitable for Aggregation
- Rafael Castro and Ricardo Dahab
-
2007/453 ( PDF )
- On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
- Kenneth G. Paterson and Sriramkrishnan Srinivasan
-
2007/452 ( PDF )
- Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field
- Ezekiel J. Kachisa and Edward F. Schaefer and Michael Scott
-
2007/451 ( PDF )
- Precise Concurrent Zero Knowledge
- Omkant Pandey and Rafael Pass and Amit Sahai and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam
-
2007/450 ( PDF )
- Short Group Signature without Random Oracles
- Xiaohui Liang and Zhenfu Cao and Jun Shao and Huang Lin
-
2007/449 ( PDF )
- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
- Jacques Patarin and Valérie Nachef and Côme Berbain
-
2007/448 ( PDF )
- Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description
- Sergiy Pometun
-
2007/447 ( PDF )
- Weak adaptive chosen ciphertext secure hybrid encryption scheme
- Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
-
2007/446 ( PDF )
- A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
- Carlos AGUILAR MELCHOR and Philippe GABORIT
-
2007/445 ( PDF )
- Proposal of a new efficient public key system for encryption and digital signatures
- Gerold Grünauer
-
2007/444 ( PDF )
- Tight bounds between algebraic immunity and nonlinearities of high orders
- Lobanov Mikhail
-
2007/443 ( PDF )
- Template Attacks with a Power Model
- Moulay Abdelaziz EL AABID and Sylvain GUILLEY and Philippe HOOGVORST
-
2007/442 ( PDF )
- Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems
- Neal Koblitz and Alfred Menezes
-
2007/441 ( PS PS.GZ PDF )
- Faster Group Operations on Elliptic Curves
- Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
-
2007/440 ( PDF )
- An Improved Remote User Authentication Scheme using Bilinear Pairings
- Sunder Lal and K.K.Goyal
-
2007/439 ( PDF )
- Multiparty Key Agreement Using Bilinear Map
- Nam-Su Jho and Myung-Hwan Kim and Do Won Hong and Byung-Gil Lee
-
2007/438 ( PDF )
- Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
- Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum
-
2007/437 ( PDF )
- Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
- Cuauhtemoc Mancillas-Lopez and Debrup Chakraborty and Francisco Rodriguez-Henriquez
-
2007/436 ( PS PS.GZ PDF )
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
- Gautham Sekar and Souradyuti Paul and Bart Preneel
-
2007/435 ( PS PS.GZ PDF )
- Irreducibility to the One-More Evaluation Problems: More May Be Less
- Daniel R. L. Brown
-
2007/434 ( PS PS.GZ PDF )
- Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$
- Xibin Lin and Chang-An Zhao and Fangguo Zhang and Yanming Wang
-
2007/433 ( PDF )
- An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees
- Fabien Coelho
-
2007/432 ( PDF )
- Trapdoors for Hard Lattices and New Cryptographic Constructions
- Craig Gentry and Chris Peikert and Vinod Vaikuntanathan
-
2007/431 ( PS PS.GZ PDF )
- Notions of Efficiency in Simulation Paradigm
- Tzer-jen Wei
-
2007/430 ( PDF )
- Cryptanalysis of LASH
- Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Ron Steinfeld and Jian Guo and San Ling and Huaxiong Wang
-
2007/429 ( PS PS.GZ PDF )
- On compressible pairings and their computation
- Michael Naehrig and Paulo S. L. M. Barreto and Peter Schwabe
-
2007/428 ( PDF )
- Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves
- Benjamin Smith
-
2007/427 ( PDF )
- Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros
- Sumanta Sarkar and Subhamoy Maitra
-
2007/426 ( PDF )
- Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10
- Christine Abegail Antonio, Satoru Tanaka, and Ken Nakamula
-
2007/425 ( PS PS.GZ PDF )
- On prime-order elliptic curves with embedding degrees k=3,4 and 6
- Koray Karabina and Edlyn Teske
-
2007/424 ( PS PS.GZ PDF )
- When e-th Roots Become Easier Than Factoring
- Antoine Joux and David Naccache and Emmanuel Thomé
-
2007/423 ( PDF )
- Finding Low Weight Polynomial Multiples Using Lattices
- Laila El Aimani and Joachim von zur Gathen
-
2007/422 ( PDF )
- Structural Identity-Based Encryption
- Man Ho Au and Siu-Ming Yiu
-
2007/421 ( PS PS.GZ PDF )
- The role of help in Classical and Quantum Zero-Knowledge
- André Chailloux and Iordanis Kerenidis
-
2007/420 ( PDF )
- A Critical Analysis and Improvement of AACS Drive-Host Authentication
- Jiayuan Sui and Douglas R. Stinson
-
2007/419 ( PDF )
- Cryptanalysis of the Random Number Generator of the Windows Operating System
- Leo Dorrendorf and Zvi Gutterman and Benny Pinkas
-
2007/418 ( -- withdrawn -- )
- An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
- Amit K Awasthi
-
2007/417 ( PDF )
- Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three
- Jean-Luc Beuchat and Nicolas Brisebarre and Jérémie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi
-
2007/416 ( PS PS.GZ PDF )
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung and Seokhie Hong
-
2007/415 ( PDF )
- Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
- Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
-
2007/414 ( PDF )
- Optimizing double-base elliptic-curve single-scalar multiplication
- Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters
-
2007/413 ( PDF )
- Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack
- Michael Vielhaber
-
2007/412 ( PDF )
- Proposing a Master One-Way Function
- Gideon Samid
-
2007/411 ( PDF )
- Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol
- Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
-
2007/410 ( PDF )
- Inverted Edwards coordinates
- Daniel J. Bernstein and Tanja Lange
-
2007/409 ( PDF )
- Building a Collision-Resistant Compression Function from Non-Compressing Primitives
- Thomas Shrimpton and Martijn Stam
-
2007/408 ( PDF )
- Differential Cryptanalysis of PRESENT
- Meiqin Wang
-
2007/407 ( -- withdrawn -- )
- Provably Secure Grouping-proofs for RFID tags
- Mike Burmester and Breno de Medeiros and Rossana Motta
-
2007/406 ( PS PS.GZ PDF )
- Modeling Computational Security in Long-Lived Systems
- Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
-
2007/405 ( PDF )
- Secure PRNGs from Specialized Polynomial Maps over Any $F_q$
- Michael Feng-Hao Liu and Chi-Jen Lu and Bo-Yin Yang and Jintai Ding
-
2007/404 ( PDF )
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Jonathan Katz and Amit Sahai and Brent Waters
-
2007/403 ( PDF )
- Turbo SHA-2
- Danilo Gligoroski and Svein Johan Knapskog
-
2007/402 ( PDF )
- Robust, Anonymous RFID Authentication with Constant Key-Lookup
- Mike Burmester and Breno de Medeiros and Rossana Motta
-
2007/401 ( PDF )
- Another Look at Automated Theorem-Proving
- Neal Koblitz
-
2007/400 ( PDF )
- REMARKS ON IBE SCHEME OF WANG AND CAO
- Sunder Lal and Priyam Sharma
-
2007/399 ( PDF )
- Ceremony Design and Analysis
- Carl Ellison
-
2007/398 ( -- withdrawn -- )
- A Short Signature Scheme in the Standard Model
- Li Kang and Xiaohu Tang and Xianhui Lu and Jia Fan
-
2007/397 ( PDF )
- On the security defects of an image encryption scheme
- Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen
-
2007/396 ( PDF )
- Proxy Re-Signature Schemes without Random Oracles
- Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang
-
2007/395 ( PS PS.GZ PDF )
- Second Preimage Attacks on Dithered Hash Functions
- Charles Bouillaguet and Pierre-Alain Fouque and Adi Shamir and Sebastien Zimmer
-
2007/394 ( PS PS.GZ PDF )
- Almost-everywhere Secure Computation
- Juan A. Garay and Rafail Ostrovsky
-
2007/393 ( PDF )
- Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms
- Haining Fan and Jiaguang Sun and Ming Gu and Kwok-Yan Lam
-
2007/392 ( PDF )
- Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups
- Jonathan Trostle and Andy Parrish
-
2007/391 ( PDF )
- A novel public key crypto system based on semi-modules over quotient semi-rings
- Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
-
2007/390 ( PDF )
- Implementing Cryptographic Pairings over Barreto-Naehrig Curves
- Augusto Jun Devegili and Michael Scott and Ricardo Dahab
-
2007/389 ( PDF )
- Interactive and Noninteractive Zero Knowledge Coincide in the Help Model
- Dragos Florin Ciocan and Salil Vadhan
-
2007/388 ( PS PS.GZ PDF )
- On Ciphertext Undetectability
- Peter Gazi and Martin Stanek
-
2007/387 ( -- withdrawn -- )
- Analysis of Local Optima in Block Ciphers
- John A. Clark and Juan M. E. Tapiador
-
2007/386 ( PS PS.GZ PDF )
- (Convertible) Undeniable Signatures without Random Oracles
- Tsz Hon Yuen and Man Ho Au and Joseph K. Liu and Willy Susilo
-
2007/385 ( PDF )
- On the insecurity of interchanged use of OFB and CBC modes of operation
- Danilo Gligoroski
-
2007/384 ( PS PS.GZ PDF )
- Non-Interactive Anonymous Credentials
- Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya
-
2007/383 ( PDF )
- Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol
- Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
-
2007/382 ( PDF )
- Oblivious Transfer via McEliece's PKC and Permuted Kernels
- K. Kobara and K. Morozov and R. Overbeck
-
2007/381 ( PDF )
- Cryptanalysis of Two New Instances of TTM Cryptosystem
- Xuyun Nie and Xin Jiang and Lei Hu and Jintai Ding
-
2007/380 ( PS PS.GZ PDF )
- X-FCSR: a new software oriented stream cipher based upon FCSRs
- Francois Arnault, Thierry P. Berger, Cédric Lauradoux and Marine Minier
-
2007/379 ( PDF )
- On The Inequivalence Of Ness-Helleseth APN Functions
- Xiangyong Zeng and Lei Hu and Yang Yang and Wenfeng Jiang
-
2007/378 ( PDF )
- Algebraic Structure Defectoscopy
- Sean O'Neil
-
2007/377 ( -- withdrawn -- )
- Fast Point Multiplication on Elliptic Curves of Even Order
- Rongquan Feng, Hongfeng Wu
-
2007/376 ( PDF )
- An Efficient Range-Bounded Commitment Scheme
- Zhengjun Cao
-
2007/375 ( PDF )
- Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose
- Gregory Hirshman
-
2007/374 ( PS PS.GZ PDF )
- On Factoring Arbitrary Integers with Known Bits
- Mathias Herrmann and Alexander May
-
2007/373 ( PS PS.GZ PDF )
- A Meet-in-the-Middle Collision Attack Against the New FORK-256
- Markku-Juhani O. Saarinen
-
2007/372 ( PDF )
- On the Authentication of One Popular Signcryption Scheme
- Zhengjun Cao
-
2007/371 ( PDF )
- Group-oriented encryption secure against collude attack
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2007/370 ( PDF )
- FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY
- Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu
-
2007/369 ( PDF )
- Universally Composable Multi-Party Computation with an Unreliable Common Reference String
- Vipul Goyal and Jonathan Katz
-
2007/368 ( PDF )
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Vipul Goyal
-
2007/367 ( PDF )
- Cryptanalysis of Rational Multivariate Public Key Cryptosystems
- Jintai Ding and John Wagner
-
2007/366 ( PDF )
- Breaking the Symmetry: a Way to Resist the New Differential Attack
- Jintai Ding and Bo-Yin Yang and Chen-Mou Cheng and Owen Chen and Vivien Dubois
-
2007/365 ( PS PS.GZ PDF )
- Pairings on Jacobians of Hyperelliptic Curves
- Christian Robenhagen Ravnshoj
-
2007/364 ( PDF )
- A Proof of Security of a Mesh Security Architecture
- Doug Kuhlman and Ryan Moriarty and Tony Braskich and Steve Emeott and Mahesh Tripunitara
-
2007/363 ( PDF )
- Fuzzy Private Matching (Extended Abstract)
- Łukasz Chmielewski and Jaap-Henk Hoepman
-
2007/362 ( PDF )
- Statistical Testing for Disk Encryption Modes of Operations
- Mohamed Abo El-Fotouh and Klaus Diepold
-
2007/361 ( PDF )
- Proxy Re-encryption Systems for Identity-based Encryption
- Toshihiko Matsuo
-
2007/360 ( PDF )
- Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
- Andy Rupp and Gregor Leander and Endre Bangerter and Ahmad-Reza Sadeghi and Alexander W. Dent
-
2007/359 ( PDF )
- Intrusion-Resilient Secret Sharing
- Stefan Dziembowski and Krzysztof Pietrzak
-
2007/358 ( PDF )
- Improving the Round Complexity of VSS in Point-to-Point Networks
- Jonathan Katz and Chiu-Yuen Koo and Ranjit Kumaresan
-
2007/357 ( PDF )
- A Note on Signature Standards
- Michael Braun and Anton Kargl
-
2007/356 ( PS PS.GZ PDF )
- A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
- Christophe Petit and Francois-Xavier Standaert and Olivier Pereira and Tal G. Malkin and Moti Yung
-
2007/355 ( PDF )
- Secret sharing on the infinite ladder
- Laszlo Csirmaz
-
2007/354 ( PDF )
- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
- Cheng-Kang Chu and Wen-Guey Tzeng
-
2007/353 ( PS PS.GZ PDF )
- Multiparty Computation to Generate Secret Permutations
- Chris Studholme and Ian Blake
-
2007/352 ( PS PS.GZ PDF )
- New Local Collisions for the SHA-2 Hash Family
- Somitra Kumar Sanadhya and Palash Sarkar
-
2007/351 ( PS PS.GZ PDF )
- A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
- Iftach Haitner and Jonathan J. Hoch and Gil Segev
-
2007/350 ( PS PS.GZ )
- On Tweaking Luby-Rackoff Blockciphers
- David Goldenberg and Susan Hohenberger and Moses Liskov and Elizabeth Crump Schwartz and Hakan Seyalioglu
-
2007/349 ( PS PS.GZ PDF )
- Statistically Hiding Sets
- Manoj Prabhakaran and Rui Xue
-
2007/348 ( PDF )
- A Framework for Efficient and Composable Oblivious Transfer
- Chris Peikert and Vinod Vaikuntanathan and Brent Waters
-
2007/347 ( PDF )
- Lai-Massey Scheme and Quasi-Feistel Networks
- Aaram Yun and Je Hong Park and Jooyoung Lee
-
2007/346 ( -- withdrawn -- )
- Secure multi-party computation on incomplete networks
- Shailesh Vaya
-
2007/345 ( PDF )
- Analysis of Underlying Assumptions in NIST DRBGs
- Wilson Kan
-
2007/344 ( PDF )
- Security Analysis of WAPI Authentication and Key Exchange Protocol
- Liufei Wu,Yuqing Zhang, FengjiaoWang
-
2007/343 ( PS PS.GZ PDF )
- Updated standards for validating elliptic curves
- Laura Hitt
-
2007/342 ( PDF )
- A New Security Model for Cross-Realm C2C-PAKE Protocol
- Fengjiao Wang and Yuqing Zhang
-
2007/341 ( PDF )
- Multi-Party Indirect Indexing and Applications
- Matthew Franklin and Mark Gondree and Payman Mohassel
-
2007/340 ( PDF )
- Efficient Implementation of the Pairing on Mobilephones using BREW
- Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka
-
2007/339 ( PDF )
- On the security of a class of image encryption schemes
- Chengqing Li and Guanrong Chen
-
2007/338 ( PS PS.GZ PDF )
- VHASH Security
- Wei Dai and Ted Krovetz
-
2007/337 ( PDF )
- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
- W. Bamberger and O. Welter and S. Spitz and M. Marhöfer
-
2007/336 ( PDF )
- A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat
- Onur Aciicmez and Werner Schindler
-
2007/335 ( PDF )
- Encryption Techniques for Secure Database Outsourcing
- Sergei Evdokimov and Oliver Guenther
-
2007/334 ( PDF )
- New Constructions for UC Secure Computation using Tamper-proof Hardware
- Nishanth Chandran and Vipul Goyal and Amit Sahai
-
2007/333 ( PS PS.GZ PDF )
- Towards Key-Dependent Message Security in the Standard Model
- Dennis Hofheinz and Dominique Unruh
-
2007/332 ( PS PS.GZ PDF )
- Universally Composable Multiparty Computation with Partially Isolated Parties
- Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs
-
2007/331 ( PS PS.GZ PDF )
- Isolated Proofs of Knowledge and Isolated Zero Knowledge
- Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs
-
2007/330 ( PS PS.GZ PDF )
- Remote Power Analysis of {RFID} Tags
- Yossi Oren
-
2007/329 ( PDF )
- A Tunable Broadcast Encryption Scheme
- David Lubicz and Thomas Sirvent
-
2007/328 ( PDF )
- A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
- Ivan Damgaard and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner
-
2007/327 ( PDF )
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Ivan Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner
-
2007/326 ( PDF )
- Efficient Password-based Authenticated Key Exchange without Public Information
- Jun Shao and Zhenfu Cao and Licheng Wang and Rongxing Lu
-
2007/325 ( PS PS.GZ )
- Faster and Shorter Password-Authenticated Key Exchange
- Rosario Gennaro
-
2007/324 ( PDF )
- Towards provable security for route discovery protocols in mobile ad hoc networks
- Mike Burmester and Breno de Medeiros
-
2007/323 ( PDF )
- Attribute-Based Encryption with Non-Monotonic Access Structures
- Rafail Ostrovsky and Amit Sahai and Brent Waters
-
2007/322 ( PS PS.GZ PDF )
- Identifying Ideal Lattices
- Jintai Ding and Richard Lindner
-
2007/321 ( PDF )
- Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2}
- Selcuk Kavut and Melek Diker Yucel
-
2007/320 ( PDF )
- On the Big Gap Between $|p|$ and $|q|$ in DSA
- Zhengjun Cao
-
2007/319 ( PDF )
- A New Security Definition for Public Key Encryption Schemes and Its Applications
- Guomin Yang and Duncan S. Wong and Qiong Huang and Xiaotie Deng
-
2007/318 ( PDF )
- On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks
- Michael Neve and Kris Tiri
-
2007/317 ( PDF )
- Improving Upon the TET Mode of Operation
- Palash Sarkar
-
2007/316 ( PDF )
- SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME
- Sunder Lal and Priyam Sharma
-
2007/315 ( PDF )
- Security under Key-Dependent Inputs
- Shai Halevi and Hugo Krawczyk
-
2007/314 ( -- withdrawn -- )
- Formal Certification of Code-Based Cryptographic Proofs
- G. Barthe and B. Grégoire and R. Janvier and S. Zanella Béguelin
-
2007/313 ( PS PS.GZ PDF )
- Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
- Shengbao Wang and Zhenfu Cao and Zhaohui Cheng and Kim-Kwang Raymond Choo
-
2007/312 ( PDF )
- Secure Similarity Search
- Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, and Justin Zhan
-
2007/311 ( PDF )
- A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three
- Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
-
2007/310 ( PDF )
- A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields
- Kwang Ho Kim
-
2007/309 ( PDF )
- Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
- Subhamoy Maitra
-
2007/308 ( PDF )
- Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242
- Selcuk Kavut and Melek Diker Yucel
-
2007/307 ( PS PS.GZ PDF )
- Locally Invertible Boolean Mappings
- Oleg A. Logachev
-
2007/306 ( PDF )
- Novel Approaches for Improving the Power Consumption Models in Correlation Analysis
- Thanh-Ha Le and Quoc-Thinh Nguyen-Vuong and Cécile Canovas and Jessy Clédičre
-
2007/305 ( PDF )
- On Non-Randomness of the Permutation after RC4 Key Scheduling
- Goutam Paul and Subhamoy Maitra and Rohit Srivastava
-
2007/304 ( PDF )
- A Bound on the Size of Separating Hash Families
- Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson and Gregory M. Zaverucha
-
2007/303 ( PDF )
- A Forward Secure Remote User Authentication Scheme
- Manoj Kumar
-
2007/302 ( PDF )
- Compression Functions Suitable for the Multi-Property-Preserving Transform
- Hidenori Kuwakado and Masakatu Morii
-
2007/301 ( PDF )
- On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
- Yuri Borissov and Moon Ho Lee and Svetla Nikova
-
2007/300 ( PS PS.GZ PDF )
- A Note on Automata-based Dynamic Convolutional Cryptosystems
- Renji Tao
-
2007/299 ( PDF )
- Optimizing Multiprecision Multiplication for Public Key Cryptography
- Michael Scott and Piotr Szczechowiak
-
2007/298 ( PDF )
- The Security of the Extended Codebook (XCB) Mode of Operation
- David A. McGrew and Scott R. Fluhrer
-
2007/297 ( PDF )
- Secret sharing on infinite graphs
- Laszlo Csirmaz
-
2007/296 ( PDF )
- Construction of Efficient and Secure Pairing Algorithm and its Application
- Doo Ho Choi, Dong-Guk Han, and Howon Kim
-
2007/295 ( PS PS.GZ PDF )
- Linearization Attacks Against Syndrome Based Hashes
- Markku-Juhani O. Saarinen
-
2007/294 ( PDF )
- Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function
- Julien Bringer and Herve Chabanne and Thomas Icart
-
2007/293 ( PDF )
- Fully Resilient Traitor Tracing Scheme using Key Update
- Eun Sun Yoo, Koutarou Suzuki and Myung-Hwan Kim
-
2007/292 ( PDF )
- Improved security analysis of OMAC
- Mridul Nandi
-
2007/291 ( PDF )
- Relations Among Notions of Plaintext Awareness
- James Birkett and Alexander W. Dent
-
2007/290 ( PDF )
- Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables
- Sumanta Sarkar and Subhamoy Maitra
-
2007/289 ( PDF )
- Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
- Michael Backes and Matteo Maffei and Dominique Unruh
-
2007/288 ( PS PS.GZ PDF )
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Dennis Hofheinz and Eike Kiltz
-
2007/287 ( PDF )
- The Effectiveness of Receipt-Based Attacks on ThreeBallot
- Kevin Henry and Douglas R. Stinson and Jiayuan Sui
-
2007/286 ( PDF )
- Faster addition and doubling on elliptic curves
- Daniel J. Bernstein and Tanja Lange
-
2007/285 ( PDF )
- Solving MRHS linear equations
- Håvard Raddum and Igor Semaev
-
2007/284 ( -- withdrawn -- )
- No title
- No Author
-
2007/283 ( PDF )
- Provably Secure Framework for Information Aggregation is Sensor Networks
- Mark Manulis and Joerg Schwenk
-
2007/282 ( PDF )
- Analysis of countermeasures against access driven cache attacks on AES
- Johannes Blömer \and Volker Krummel
-
2007/281 ( PDF )
- A Pollard-like pseudorandom number generator over EC
- Grzegorz Wojtenko
-
2007/280 ( PDF )
- On solving sparse algebraic equations over finite fields II
- Igor Semaev
-
2007/279 ( PDF )
- Lossy Trapdoor Functions and Their Applications
- Chris Peikert and Brent Waters
-
2007/278 ( PDF )
- A Framework for Iterative Hash Functions - HAIFA
- Eli Biham and Orr Dunkelman
-
2007/277 ( PS PS.GZ PDF )
- Cryptanalysis of a class of cryptographic hash functions
- Praveen Gauravaram and John Kelsey
-
2007/276 ( PDF )
- Prolific Codes with the Identifiable Parent Property
- Simon R. Blackburn and Tuvi Etzion and Siaw-Lynn Ng
-
2007/275 ( PDF )
- `Good' Pseudo-Random Binary Sequences from Elliptic Curves
- Zhixiong CHEN and Guozhen XIAO
-
2007/274 ( PDF )
- Group-based Proxy Re-encryption scheme
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2007/273 ( PDF )
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles
- Mihir Bellare and Sarah Shoup
-
2007/272 ( PS PS.GZ PDF )
- Cryptanalysis of a Hash Function Proposed at ICISC 2006
- Willi Geiselmann and Rainer Steinwandt
-
2007/271 ( PDF )
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Mihir Bellare and Thomas Ristenpart
-
2007/270 ( PDF )
- Secret Ballot Elections with Unconditional Integrity
- David Chaum and Jeroen van de Graaf and Peter Y. A. Ryan and Poorvi L. Vora
-
2007/269 ( PDF )
- Voting with Unconditional Privacy by Merging Pręt-ŕ-Voter and PunchScan
- Jeroen van de Graaf
-
2007/268 ( PDF )
- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
- Erik Dahmen and Katsuyuki Okeya and Daniel Schepers
-
2007/267 ( PDF )
- CRUST: Cryptographic Remote Untrusted Storage without Public Keys
- Erel Geron and Avishai Wool
-
2007/266 ( PDF )
- Filling the Gap between Voters and Cryptography in e-Voting
- Wei Han and Dong Zheng and Ke-fei Chen
-
2007/265 ( PDF )
- Which Languages Have 4-Round Zero-Knowledge Proofs?
- Jonathan Katz
-
2007/264 ( PDF )
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Thomas Ristenpart and Scott Yilek
-
2007/263 ( -- withdrawn -- )
- Efficiency Improvement for NTRU
- Johannes Buchmann and Martin Döring and Richard Lindner
-
2007/262 ( PS PS.GZ PDF )
- Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
- Yong Ho Hwang and Joseph K. Liu and Sherman S.M. Chow
-
2007/261 ( PDF )
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Subhamoy Maitra and Goutam Paul
-
2007/260 ( PDF )
- An Efficient One-move Nominative Signature Scheme
- Dennis Y. W. Liu and Qiong Huang and Duncan S. Wong
-
2007/259 ( PDF )
- Algebraic Immunity Hierarchy of Boolean Functions
- Ziran Tu and Yingpu Deng
-
2007/258 ( PDF )
- UICE: A High-Performance Cryptographic Module for SoC and RFID Applications
- Ulrich Kaiser
-
2007/257 ( PDF )
- A Forward-Secure Signature with Backward-Secure Detection
- Dai-Rui Lin and Chih-I Wang
-
2007/256 ( PDF )
- Aspects of Pairing Inversion
- S. D. Galbraith and F. Hess and F. Vercauteren
-
2007/255 ( -- withdrawn -- )
- Efficient Identity Based Signature in Standard Model
- S.Narayan
-
2007/254 ( -- withdrawn -- )
- Fully Secure Proxy Re-Encryption without Random Oracles
- Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang
-
2007/253 ( PDF )
- Choosing the correct elliptic curve in the CM method
- K. Rubin and A. Silverberg
-
2007/252 ( PDF )
- A Verifiable Voting Protocol based on Farnel
- Roberto Araujo, Ricardo Felipe Custodio, and Jeroen van de Graaf
-
2007/251 ( PS PS.GZ PDF )
- A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols
- Véronique Cortier and Ralf Kuesters and Bogdan Warinschi
-
2007/250 ( PDF )
- Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings
- Hongzhen Du and Qiaoyan Wen
-
2007/249 ( PDF )
- Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
- Serge Fehr and Christian Schaffner
-
2007/248 ( PS PS.GZ PDF )
- 1. AES seems weak. 2. Linear time secure cryptography
- Warren D. Smith
-
2007/247 ( PS PS.GZ PDF )
- A Note on the Ate Pairing
- Chang-An Zhao and Fangguo Zhang and Jiwu Huang
-
2007/246 ( PDF )
- BEDA: Button-Enabled Device Pairing
- Claudio Soriente and Gene Tsudik and Ersin Uzun
-
2007/245 ( PS PS.GZ PDF )
- Incorporating Temporal Capabilities in Existing Key Management Schemes
- Mikhail J. Atallah and Marina Blanton and Keith B. Frikken
-
2007/244 ( PDF )
- A Note on the Relay Attacks on e-passports: The Case of Czech e-passports
- Martin Hlavac and Tomas Rosa
-
2007/243 ( -- withdrawn -- )
- PORs: Proofs of Retrievability for Large Files
- Ari Juels and Burton S. Kaliski Jr.
-
2007/242 ( PDF )
- Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions
- Khoongming Khoo, Guanhan Chew, Guang Gong and Hian-Kiat Lee
-
2007/241 ( PDF )
- Attribute Based Group Signature with Revocation
- Dalia Khader
-
2007/240 ( PDF )
- A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
- George I. Davida and Jeremy A. Hansen
-
2007/239 ( PS PS.GZ PDF )
- Making Large Hash Functions From Small Compression Functions
- William R. Speirs and Ian Molloy
-
2007/238 ( PDF )
- Long-lived digital integrity using short-lived hash functions
- Stuart Haber
-
2007/237 ( PDF )
- Forward-secure Key Evolution in Wireless Sensor Networks
- Marek Klonowski and Mirosław Kutyłowski and Michał Ren and Katarzyna Rybarczyk
-
2007/236 ( PS PS.GZ PDF )
- Certificateless Ring Signatures
- Sherman S.M. Chow and Wun-She Yap
-
2007/235 ( PDF )
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Matthew Green and Susan Hohenberger
-
2007/234 ( PDF )
- Provable-Security Analysis of Authenticated Encryption in Kerberos
- Alexandra Boldyreva and Virendra Kumar
-
2007/233 ( PDF )
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
- Michael Backes and Markus Duermuth and Ralf Kuesters
-
2007/232 ( -- withdrawn -- )
- A new paradigm of chosen ciphertext secure public key encryption scheme
- Xianhui Lu, Xuejia Lai, Dake He
-
2007/231 ( PS PS.GZ PDF )
- Secure Two-Party k-Means Clustering
- Paul Bunn and Rafail Ostrovsky
-
2007/230 ( PS PS.GZ PDF )
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- Gautham Sekar and Souradyuti Paul and Bart Preneel
-
2007/229 ( PS PS.GZ PDF )
- Domain Extension of Public Random Functions: Beyond the Birthday Barrier
- Ueli Maurer and Stefano Tessaro
-
2007/228 ( PS PS.GZ PDF )
- AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM
- Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek El-Ghazawi
-
2007/227 ( PDF )
- Related-Key Statistical Cryptanalysis
- Darakhshan J. Mir and Poorvi L. Vora
-
2007/226 ( PDF )
- Generalized mix functions and orthogonal equitable rectangles
- Douglas R. Stinson
-
2007/225 ( PDF )
- On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature
- Shengli Liu and Xiaofeng Chen and Fangguo Zhang
-
2007/224 ( PDF )
- A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
- *Jue-Sam Chou 1, Guey-Chuen Lee 2, Chung-Ju Chan 3
-
2007/223 ( PS PS.GZ PDF )
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- John Black and Martin Cochran and Thomas Shrimpton
-
2007/222 ( PS PS.GZ PDF )
- Towards Security Limits in Side-Channel Attacks
- Francois-Xavier Standaert and Eric Peeters and Cedric Archambeau and Jean-Jacques Quisquater
-
2007/221 ( PS PS.GZ PDF )
- Generalized Key Delegation for Hierarchical Identity-Based Encryption
- Michel Abdalla and Eike Kiltz and Gregory Neven
-
2007/220 ( PDF )
- A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
- Fengjiao WANG and Yuqing ZHANG
-
2007/219 ( PDF )
- A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
- Liufei Wu1, 2, Yuqing Zhang1, Fengjiao Wang1
-
2007/218 ( PDF )
- Differential Cryptanalysis in Stream Ciphers
- Eli Biham and Orr Dunkelman
-
2007/217 ( PS PS.GZ PDF )
- Identity-Based Broadcast Encryption
- Ryuichi Sakai and Jun Furukawa
-
2007/216 ( PS PS.GZ PDF )
- Unlinkable Divisible Digital Cash without Trusted Third Party
- Pawel Pszona and Grzegorz Stachowiak
-
2007/215 ( PS PS.GZ PDF )
- Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free
- Jesper Buus Nielsen
-
2007/214 ( PDF )
- Matrix Power S-Box Construction
- Eligijus Sakalauskas and Kestutis Luksys
-
2007/213 ( PDF )
- Unlinkable Randomizable Signature and Its Application in Group Signature
- Sujing Zhou and Dongdai Lin
-
2007/212 ( PDF )
- The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$.
- Andrey Khalyavin
-
2007/211 ( PDF )
- Scalable Storage Scheme from Forward Key Rotation
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2007/210 ( -- withdrawn -- )
- Efficient chosen ciphertext secure PKE scheme with short ciphertext
- Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
-
2007/209 ( PDF )
- Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
- Liqun Chen and Qiang Tang
-
2007/208 ( PDF )
- RC4 State Information at Any Stage Reveals the Secret Key
- Goutam Paul and Subhamoy Maitra
-
2007/207 ( PDF )
- On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity
- Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
-
2007/206 ( PS PS.GZ PDF )
- Automatic Search of Differential Path in MD4
- Pierre-Alain Fouque and Gaetan Leurent and Phong Nguyen
-
2007/205 ( PS PS.GZ PDF )
- A kilobit special number field sieve factorization
- Kazumaro Aoki and Jens Franke and Thorsten Kleinjung and Arjen Lenstra and Dag Arne Osvik
-
2007/204 ( PDF )
- Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
- Shu Yun Lim and Chuan Chin Pu and Hyo Taek Lim and Hoon Jae Lee
-
2007/203 ( PDF )
- Kipnis-Shamir's Attack on HFE Revisited
- Xin Jiang and Jintai Ding and Lei Hu
-
2007/202 ( PDF )
- Provable Data Possession at Untrusted Stores
- Giuseppe Ateniese and Randal Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary Peterson and Dawn Song
-
2007/201 ( PDF )
- The BBG HIBE Has Limited Delegation
- Hovav Shacham
-
2007/200 ( PDF )
- ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures
- Philip Atzemoglou and Tal Malkin
-
2007/199 ( PDF )
- A Framework for Game-Based Security Proofs
- David Nowak
-
2007/198 ( PS PS.GZ PDF )
- Mutual Information Analysis -- A Universal Differential Side-Channel Attack
- Benedikt Gierlichs and Lejla Batina and Pim Tuyls
-
2007/197 ( PS PS.GZ PDF )
- On-Line Ciphers and the Hash-CBC Constructions
- Mihir Bellare and Alexandra Boldyreva and Lars Knudsen and Chanathip Namprempre
-
2007/196 ( -- withdrawn -- )
- An Efficient Certificateless Signature Scheme
- Rafael Castro and Ricardo Dahab
-
2007/195 ( PDF )
- Verifying Statistical Zero Knowledge with Approximate Implementations
- Ling Cheung and Sayan Mitra and Olivier Pereira
-
2007/194 ( PDF )
- Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
- Ernie Brickell and Jiangtao Li
-
2007/193 ( PDF )
- Some Identity Based Strong Bi-Designated Verifier Signature Schemes
- Sunder Lal and Vandani Verma
-
2007/192 ( PDF )
- Optimal Irreducible Polynomials for GF(2^m) Arithmetic
- Michael Scott
-
2007/191 ( PDF )
- Deniable Internet Key-Exchange
- Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
-
2007/190 ( PDF )
- Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption
- Tian Yuan
-
2007/189 ( PS PS.GZ PDF )
- An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
- Meng-Hui Lim and Sanggon Lee
-
2007/188 ( PDF )
- A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
- Kim-Kwang Raymond Choo
-
2007/187 ( PDF )
- Executing Modular Exponentiation on a Graphics Accelerator
- Andrew Moss and Dan Page and Nigel Smart
-
2007/186 ( PS PS.GZ PDF )
- Fully Anonymous Group Signatures without Random Oracles
- Jens Groth
-
2007/185 ( PDF )
- New FORK-256
- Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jesang Lee and Dukjae Moon and Sungtaek Chee
-
2007/184 ( PDF )
- Provable password-based tripartite key agreement protocol
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2007/183 ( PDF )
- Provably Secure Ciphertext Policy ABE
- Ling Cheung and Calvin Newport
-
2007/182 ( PDF )
- Optimistic Fair Exchange in a Multi-user Setting
- Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum
-
2007/181 ( PDF )
- A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields
- Kwang Ho Kim and So In Kim
-
2007/180 ( PDF )
- A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
- *Jue-Sam Chou 1, Yalin Chen 2, Tsung-Heng Chen 3
-
2007/179 ( PDF )
- New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three
- Kwang Ho Kim and So In Kim and Ju Song Choe
-
2007/178 ( PS PS.GZ )
- Utility Sampling for Trust Metrics in PKI
- Dakshi Agrawal and Charanjit Jutla
-
2007/177 ( PDF )
- Space-Efficient Identity Based Encryption Without Pairings
- Dan Boneh and Craig Gentry and Michael Hamburg
-
2007/176 ( PS PS.GZ PDF )
- Seven-Property-Preserving Iterated Hashing: ROX
- Elena Andreeva and Gregory Neven and Bart Preneel and Thomas Shrimpton
-
2007/175 ( PDF )
- Embedding Degree of Hyperelliptic Curves with Complex Multiplication
- Christian Robenhagen Ravnshoj
-
2007/174 ( PS PS.GZ PDF )
- Counting hyperelliptic curves that admit a Koblitz model
- Cevahir Demirkiran and Enric Nart
-
2007/173 ( PDF )
- Provable Secure Generalized Signcryption
- Xu An Wang and Xiaoyuan Yang and Yiliang Han
-
2007/172 ( PDF )
- Batch Verification of Short Signatures
- Jan Camenisch and Susan Hohenberger and Michael Østergaard Pedersen
-
2007/171 ( PDF )
- Chosen-Ciphertext Secure Proxy Re-Encryption
- Ran Canetti and Susan Hohenberger
-
2007/170 ( PDF )
- Clone Resistant Mutual Authentication for Low-Cost RFID Technology
- Stephane Lemieux and Adrian Tang
-
2007/169 ( PDF )
- On the Security of Protocols with Logarithmic Communication Complexity
- Michael Backes and Dominique Unruh
-
2007/168 ( PDF )
- Random Oracles and Auxiliary Input
- Dominique Unruh
-
2007/167 ( PDF )
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)
- Yi-Ru Liu, Wen-Guey Tzeng
-
2007/166 ( PS PS.GZ PDF )
- Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
- Junghyun Nam
-
2007/165 ( PDF )
- Inductive Proof Method for Computational Secrecy
- Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell
-
2007/164 ( PDF )
- Yet Another MicroArchitectural Attack: Exploiting I-cache
- Onur Aciicmez
-
2007/163 ( PDF )
- Secure Deniable Authenticated Key Establishment for Internet Protocols
- Meng-Hui Lim and Sanggon Lee and Youngho Park and Sangjae Moon
-
2007/162 ( PS PS.GZ PDF )
- Bingo Voting: Secure and coercion-free voting using a trusted random number generator
- Jens-Matthias Bohli and Joern Mueller-Quade and Stefan Roehrich
-
2007/161 ( PDF )
- Collusion-Resistant Group Key Management Using Attribute-Based Encryption
- Ling Cheung and Joseph A. Cooley and Roger Khazan and Calvin Newport
-
2007/160 ( PS PS.GZ )
- Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing
- Muxiang Zhang
-
2007/159 ( PDF )
- Attribute Based Group Signatures
- Dalia Khader
-
2007/158 ( PS PS.GZ PDF )
- A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
- Mridul Nandi
-
2007/157 ( PDF )
- ConSum v0: An Experimental Cipher
- David A. Madore
-
2007/156 ( PDF )
- Computational Semantics for Basic Protocol Logic - A Stochastic Approach
- Gergei Bana and Koji Hasebe and Mitsuhiro Okada
-
2007/155 ( PS PS.GZ PDF )
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Jens Groth and Amit Sahai
-
2007/154 ( PDF )
- Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions
- Danilo Gligoroski and Svein Johan Knapskog
-
2007/153 ( PS PS.GZ PDF )
- Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
- Aggelos Kiayias and Moti Yung
-
2007/152 ( PS PS.GZ PDF )
- CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
- Nicolas T. Courtois
-
2007/151 ( PS PS.GZ PDF )
- Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
- Tal Moran and Moni Naor and Gil Segev
-
2007/150 ( PS PS.GZ PDF )
- Generators of Jacobians of Hyperelliptic Curves
- Christian Robenhagen Ravnshoj
-
2007/149 ( PS PS.GZ PDF )
- Towards Generating Secure Keys for Braid Cryptography
- Ki Hyoung Ko and Jang Won Lee and Tony Thomas
-
2007/148 ( PDF )
- Practical Compact E-Cash
- Man Ho Au and Willy Susilo and Yi Mu
-
2007/147 ( PDF )
- Using decision problems in public key cryptography
- Vladimir Shpilrain and Gabriel Zapata
-
2007/146 ( PDF )
- Time Capsule Signature: Efficient and Provably Secure Constructions
- Bessie C. Hu and Duncan S. Wong and Qiong Huang and Guomin Yang and Xiaotie Deng
-
2007/145 ( PS PS.GZ PDF )
- Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
- Iftach Haitner and Jonathan J. Hoch and Omer Reingold and Gil Segev
-
2007/144 ( PS PS.GZ )
- Two New Examples of TTM
- T.Moh
-
2007/143 ( PDF )
- Offline/Online Mixing
- Ben Adida and Douglas Wikström
-
2007/142 ( PDF )
- An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
- Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee
-
2007/141 ( PDF )
- Practical Cryptanalysis of SFLASH
- Vivien Dubois and Pierre-Alain Fouque and Adi Shamir and Jacques Stern
-
2007/140 ( PDF )
- Hidden Identity-Based Signatures
- Aggelos Kiayias and Hong-Sheng Zhou
-
2007/139 ( PDF )
- The Delivery and Evidences Layer
- Amir Herzberg and Igal Yoffe
-
2007/138 ( PS PS.GZ PDF )
- Efficient Pairing Computation on Curves
- Rongquan Feng and Hongfeng Wu
-
2007/137 ( PDF )
- Multivariates Polynomials for Hashing
- Jintai Ding and Bo-yin Yang
-
2007/136 ( -- withdrawn -- )
- Fair Exchange Signature Schemes
- Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang
-
2007/135 ( PDF )
- Efficient ID-based Signature Without Trusted PKG
- Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang
-
2007/134 ( PDF )
- Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift
- Osman Kocar
-
2007/133 ( PDF )
- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
- Helger Lipmaa
-
2007/132 ( PDF )
- Equivocal Blind Signatures and Adaptive UC-Security
- Aggelos Kiayias and Hong-Sheng Zhou
-
2007/131 ( PDF )
- Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions
- Mohammad Reza Reyhanitabar and Shuhong Wang and Reihaneh Safavi-Naini
-
2007/130 ( PDF )
- Some Results on Anonymity in Hybrid Encryption
- Tian Yuan and Chen Zhi-Yu and Jin Yuee and Jin Feng and Ma Huihui
-
2007/129 ( PS PS.GZ PDF )
- An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem
- Cameron McDonald, Chris Charnes, Josef Pieprzyk
-
2007/128 ( PS PS.GZ PDF )
- Computationally Sound Mechanized Proofs of Correspondence Assertions
- Bruno Blanchet
-
2007/127 ( PS PS.GZ PDF )
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Vanesa Daza and Javier Herranz and Paz Morillo and Carla Ràfols
-
2007/126 ( PDF )
- An Interesting Member ID-based Group Signature
- Sujing Zhou and Dongdai Lin
-
2007/125 ( PDF )
- Attacking the IPsec Standards in Encryption-only Configurations
- Jean Paul Degabriele and Kenneth G. Paterson
-
2007/124 ( PDF )
- Rebuttal of overtaking VEST
- Benjamin Gittins and Howard Landman
-
2007/123 ( PDF )
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Berkant Ustaoglu
-
2007/122 ( PDF )
- On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
- Qiang Tang
-
2007/121 ( PS PS.GZ PDF )
- Certificateless Encryption Schemes Strongly Secure in the Standard Model
- Alexander W. Dent and Benoit Libert and Kenneth G. Paterson
-
2007/120 ( PDF )
- Breaking 104 bit WEP in less than 60 seconds
- Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin
-
2007/119 ( PDF )
- Rerandomizable RCCA Encryption
- Manoj Prabhakaran and Mike Rosulek
-
2007/118 ( PDF )
- Smooth Projective Hashing and Two-Message Oblivious Transfer
- Shai Halevi and Yael Tauman Kalai
-
2007/117 ( PDF )
- Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity
- Sihem Mesnager
-
2007/116 ( PDF )
- A Zero-Knowledge Identification and Key Agreement Protocol
- D.R. Stinson and J. Wu
-
2007/115 ( PDF )
- Quadratic Almost Perfect Nonlinear Functions With Many Terms
- Carl Bracken and Eimear Byrne and Nadya Markin and Gary McGuire
-
2007/114 ( PDF )
- High Efficiency Feedback Shift Register: $\sigma-$LFSR
- Guang Zeng and Wenbao Han and Kaicheng He
-
2007/113 ( PDF )
- An Enhanced ID-based Deniable Authentication Protocol on Pairings
- Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee
-
2007/112 ( PDF )
- Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field
- Koh-ichi Nagao
-
2007/111 ( PS PS.GZ PDF )
- Privacy-Preserving Distributed Set Intersection
- Qingsong Ye and Huaxiong Wang and Christophe Tartary
-
2007/110 ( PDF )
- Construction of Pairing-Friendly Elliptic Curves
- Woo Sug Kang
-
2007/109 ( PDF )
- How to Enrich the Message Space of a Cipher
- Thomas Ristenpart and Phillip Rogaway
-
2007/108 ( PDF )
- An Improved Distinguisher for Dragon
- Joo Yeon Cho and Josef Pieprzyk
-
2007/107 ( PDF )
- Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem
- Yasuyuki MURAKAMI, Takeshi NASAKO
-
2007/106 ( PDF )
- A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA
- Masao KASAHARA
-
2007/105 ( PS PS.GZ PDF )
- Isodual Reduction of Lattices
- Nicholas A. Howgrave-Graham
-
2007/104 ( PS PS.GZ PDF )
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Brecht Wyseur and Wil Michiels and Paul Gorissen and Bart Preneel
-
2007/103 ( PDF )
- Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic
- Roberto Avanzi
-
2007/102 ( PDF )
- On the Role of Scheduling in Simulation-Based Security
- Ran Canetti and Ling Cheung and Nancy Lynch and Olivier Pereira
-
2007/101 ( PS PS.GZ PDF )
- Practical Password Recovery on an MD5 Challenge and Response
- Yu Sasaki and Go Yamamoto and Kazumaro Aoki
-
2007/100 ( PS PS.GZ PDF )
- Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
- Shengbao Wang and Zhenfu Cao
-
2007/099 ( PDF )
- Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits
- Jaime Gutierrez and Alvar Ibeas
-
2007/098 ( PS PS.GZ PDF )
- Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
- Lilya Budaghyan and Claude Carlet
-
2007/097 ( PS PS.GZ PDF )
- Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves
- Christian Robenhagen Ravnshøj
-
2007/096 ( PS PS.GZ PDF )
- Somos Sequence Near-Addition Formulas and Modular Theta Functions
- R. Wm. Gosper and Rich Schroeppel
-
2007/095 ( PDF )
- Generic Certificateless Encryption in the Standard Model
- Qiong Huang and Duncan S. Wong
-
2007/094 ( PDF )
- Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants
- Xavier Boyen
-
2007/093 ( PDF )
- HAPADEP: Human Asisted Pure Audio Device Pairing
- Claudio Soriente, Gene Tsudik, Ersin Uzun
-
2007/092 ( PDF )
- PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP
- Grzegorz Wojtenko
-
2007/091 ( PDF )
- Arithmetic Operators for Pairing-Based Cryptography
- Jean-Luc Beuchat and Nicolas Brisebarre and Jérémie Detrey and Eiji Okamoto
-
2007/090 ( -- withdrawn -- )
- On the security of an image encryption scheme
- Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen
-
2007/089 ( PS PS.GZ PDF )
- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
- Ueli Maurer and Dominik Raub
-
2007/088 ( PDF )
- An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers
- Domingo Gomez and Jaime Gutierrez and Alvar Ibeas
-
2007/087 ( PDF )
- Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
- Jie Liu and Jianhua Li
-
2007/086 ( PS PS.GZ PDF )
- Non-Interactive Proofs for Integer Multiplication
- Ivan Damgard and Rune Thorbek
-
2007/085 ( PS PS.GZ PDF )
- MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
- Hongbo Yu, Xiaoyun Wang
-
2007/084 ( PS PS.GZ PDF )
- Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
- Sanjit Chatterjee and Palash Sarkar
-
2007/083 ( PDF )
- Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
- Brett Hemenway and Rafail Ostrovsky
-
2007/082 ( PS PS.GZ PDF )
- Deniable Authentication on the Internet
- Shaoquan Jiang
-
2007/081 ( PDF )
- Revisiting an Efficient Elliptic Curve Key Agreement Protocol
- Maurizio Adriano Strangio
-
2007/080 ( -- withdrawn -- )
- Weakly only Unforgeable Signature and Its Application in Group Signature
- Sujing Zhou, Dongdai Lin
-
2007/079 ( PS PS.GZ PDF )
- How To Find Many Collisions of 3-Pass HAVAL
- Kazuhiro Suzuki and Kaoru Kurosawa
-
2007/078 ( PS PS.GZ PDF )
- MPC vs. SFE: Perfect Security in a Unified Corruption Model
- Zuzana Beerliova-Trubiniova and Matthias Fitzi and Martin Hirt and Ueli Maurer and Vassilis Zikas
-
2007/077 ( -- withdrawn -- )
- On bent functions with zero second derivatives
- Sugata Gangopadhyay
-
2007/076 ( PDF )
- Almost Secure (1-Round, n-Channel) Message Transmission Scheme
- Kaoru Kurosawa and Kazuhiro Suzuki
-
2007/075 ( PS PS.GZ PDF )
- Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
- Gautham Sekar and Souradyuti Paul and Bart Preneel
-
2007/074 ( PDF )
- A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
- Hovav Shacham
-
2007/073 ( PS PS.GZ PDF )
- Public Key Encryption that Allows PIR Queries
- Dan Boneh and Eyal Kushilevitz and Rafail Ostrovsky and William E. Skeith III
-
2007/072 ( -- withdrawn -- )
- A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard
- Namin Yu and Howard M. Heys
-
2007/071 ( PS PS.GZ PDF )
- Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)
- Ahto Buldas and Sven Laur
-
2007/070 ( PS PS.GZ PDF )
- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)
- Alexander Maximov
-
2007/069 ( PDF )
- Nominative Signature: Application, Security Model and Construction
- Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo
-
2007/068 ( -- withdrawn -- )
- Efficient Hierarchical Identity Based Signature in the Standard Model
- Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong
-
2007/067 ( -- withdrawn -- )
- withdrawn
- withdrawn
-
2007/066 ( PDF )
- Low-Density Attack Revisited
- Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama
-
2007/065 ( PDF )
- How to Derive Lower Bound on Oblivious Transfer Reduction
- Kaoru Kurosawa and Wataru Kishimoto and Takeshi Koshiba
-
2007/064 ( PDF )
- Algebraic Lower Bounds for Computing on Encrypted Data
- Rafail Ostrovsky and William E. Skeith III
-
2007/063 ( PS PS.GZ PDF )
- Constructing new APN functions from known ones
- Lilya Budaghyan and Claude Carlet and Gregor Leander
-
2007/062 ( PS PS.GZ PDF )
- Algebraic and Slide Attacks on KeeLoq
- Nicolas T. Courtois and Gregory V. Bard and David Wagner
-
2007/061 ( PDF )
- Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3
- Neil Costigan and Michael Scott
-
2007/060 ( PDF )
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Yonatan Aumann and Yehuda Lindell
-
2007/059 ( PS PS.GZ PDF )
- A Survey of Single Database PIR: Techniques and Applications
- Rafail Ostrovsky and William E. Skeith III
-
2007/058 ( PS PS.GZ PDF )
- The simplest method for constructing APN polynomials EA-inequivalent to power functions
- Lilya Budaghyan
-
2007/057 ( PDF )
- Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians
- David Freeman
-
2007/056 ( PS PS.GZ )
- Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
- Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney
-
2007/055 ( PDF )
- Cryptanalysis of the KeeLoq block cipher
- Andrey Bogdanov
-
2007/054 ( PS PS.GZ PDF )
- Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
- Souradyuti Paul
-
2007/053 ( PS PS.GZ PDF )
- Compiler Assisted Elliptic Curve Cryptography
- M. Barbosa and A. Moss and D. Page
-
2007/052 ( PS PS.GZ PDF )
- Forward-Secure Sequential Aggregate Authentication
- Di Ma, and Gene Tsudik
-
2007/051 ( PDF )
- Forward-secure RFID Authentication and Key Exchange
- Tri van Le, Mike Burmester and Breno de Medeiros
-
2007/050 ( PDF )
- Special block cipher family DN and new generation SNMAC-type hash function family HDN
- Vlastimil KLIMA
-
2007/049 ( PDF )
- Security Arguments for a Class of ID-based Signatures
- jin zhou and ya-juan zhang and yue-fei zhu
-
2007/048 ( PDF )
- A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
- Daniel R. L. Brown and Kristian Gjøsteen
-
2007/047 ( PDF )
- New Constructions of Fuzzy Identity-Based Encryption
- Joonsang Baek and Willy Susilo and Jianying Zhou
-
2007/046 ( PS PS.GZ )
- Direct Reduction of String (1,2)-OT to Rabin's OT
- Kaoru Kurosawa and Takeshi Koshiba
-
2007/045 ( PDF )
- A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three
- Jean-Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
-
2007/044 ( PDF )
- Design and Primitive Specification for Shannon
- Philip Hawkes and Cameron McDonald and Michael Paddon and Gregory Rose and Miriam Wiggers de Vries
-
2007/043 ( PS PS.GZ PDF )
- Reflection Attacks on Product Ciphers
- Orhun Kara
-
2007/042 ( PDF )
- Authorship Proof for Textual Document
- J. Wu and D. R. Stinson
-
2007/041 ( PS PS.GZ PDF )
- Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
- B. Skoric and S. Katzenbeisser and M.U. Celik
-
2007/040 ( PS PS.GZ PDF )
- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
- Pradeep Kumar Mishra and Vassil Dimitrov
-
2007/039 ( PDF )
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Onur Aciicmez and Shay Gueron and Jean-Pierre Seifert
-
2007/038 ( PDF )
- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
- Joo Yeon Cho and Josef Pieprzyk
-
2007/037 ( PDF )
- Best Quadratic Approximations of Cubic Boolean Functions
- Nicholas Kolokotronis and Konstantinos Limniotis and Nicholas Kalouptsidis
-
2007/036 ( PDF )
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Eike Kiltz
-
2007/035 ( PS PS.GZ PDF )
- Cryptanalysis of white box DES implementations
- Louis Goubin and Jean-Michel Masereel and Michael Quisquater
-
2007/034 ( PDF )
- A New Type of Cipher: DICING_CSB
- Li An-Ping
-
2007/033 ( PDF )
- From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme
- Eike Kiltz
-
2007/032 ( PDF )
- An improved collision probability for CBC-MAC and PMAC
- Avradip Mandal and Mridul Nandi
-
2007/031 ( PDF )
- Improved Security Analysis of PMAC
- Mridul Nandi and Avradip Mandal
-
2007/030 ( PS PS.GZ PDF )
- Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
- Yang Cui and Eiichiro Fujisaki and Goichiro Hanaoka and Hideki Imai and Rui Zhang
-
2007/029 ( PDF )
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Debrup Chakraborty and Palash Sarkar
-
2007/028 ( PS PS.GZ )
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Debrup Chakraborty and Palash Sarkar
-
2007/027 ( -- withdrawn -- )
- Verifying Data Integrity with Few Queries to Untrusted Memory
- Nachiketh R. Potlapally
-
2007/026 ( PS PS.GZ PDF )
- Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
- Shengbao Wang and Zhenfu Cao and Maurizio Adriano Strangio and Lihua Wang
-
2007/025 ( PDF )
- Private Locally Decodable Codes
- Rafail Ostrovsky and Omkant Pandey and Amit Sahai
-
2007/024 ( PDF )
- Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers
- Gregory V. Bard, and Nicolas T. Courtois, and Chris Jefferson.
-
2007/023 ( PDF )
- Efficient Hybrid Encryption from ID-Based Encryption
- Masayuki Abe and Yang Cui and Hideki Imai and Eike Kiltz
-
2007/022 ( PS PS.GZ PDF )
- On Perfectly Balanced Boolean Functions
- O. A. Logachev
-
2007/021 ( PDF )
- Two Trivial Attacks on Trivium
- Alexander Maximov and Alex Biryukov
-
2007/020 ( PDF )
- TinyTate: Identity-Based Encryption for Sensor Networks
- Leonardo B. Oliveira and Diego Aranha and Eduardo Morais and Felipe Daguano and Julio Lo'pez and Ricardo Dahab
-
2007/019 ( PDF )
- Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
- Changshe Ma, Jian Weng and Dong Zheng
-
2007/018 ( PS PS.GZ PDF )
- Strongly-Secure Identity-based Key Agreement and Anonymous Extension
- Sherman S.M. Chow and Kim-Kwang Raymond Choo
-
2007/017 ( PDF )
- Group Decryption
- Bo Qin and Qianhong Wu and Willy Susilo and Yi Mu and Yumin Wang
-
2007/016 ( -- withdrawn -- )
- VEST Ciphers
- Sean O'Neil and Benjamin Gittins and Howard A. Landman
-
2007/015 ( PS PS.GZ PDF )
- Group Encryption
- Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
-
2007/014 ( PDF )
- Invertible Universal Hashing and the TET Encryption Mode
- Shai Halevi
-
2007/013 ( PDF )
- Optimised versions of the Ate and Twisted Ate Pairings
- Seiichi Matsuda and Naoki Kanayama and Florian Hess and Eiji Okamoto
-
2007/012 ( PDF )
- Interactive two-channel message authentication based on interactive-collision Resistant hash functions
- Atefeh Mashatan and Douglas R. Stinson
-
2007/011 ( PDF )
- Universally Composable Key-evolving Signature
- Jin Zhou and TingMao Chang and YaJuan Zhang and YueFei Zhu
-
2007/010 ( PDF )
- Computing endomorphism rings of Jacobians of genus 2 curves over finite fields
- David Freeman and Kristin Lauter
-
2007/009 ( PDF )
- New Public Key Cryptosystems Using Polynomials over Non-commutative Rings
- Zhenfu Cao, Xiaolei Dong and Licheng Wang
-
2007/008 ( PS PS.GZ PDF )
- Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006
- Dong Hoon Lee and Je Hong Park and Jaewoo Han
-
2007/007 ( PDF )
- One-Round ID-Based Blind Signature Scheme without ROS Assumption
- Wei Gao and Xueli Wang and Guilin Wang and Fei Li
-
2007/006 ( PDF )
- Efficient Dynamic k-Times Anonymous Authentication
- Lan Nguyen
-
2007/005 ( PDF )
- Privacy-Protecting Coupon System Revisited
- Lan Nguyen
-
2007/004 ( PDF )
- Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
- *Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
-
2007/003 ( PS PS.GZ PDF )
- The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks
- Johann Groszschaedl and Alexander Szekely and Stefan Tillich
-
2007/002 ( -- withdrawn -- )
- Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem
- Huang Lin and Zhenfu Cao
-
2007/001 ( PS PS.GZ PDF )
- Families of genus 2 curves with small embedding degree
- Laura Hitt
-
2006/486 ( PDF )
- Inductive Trace Properties for Computational Security
- Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell
-
2006/485 ( PDF )
- Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
- Hidenori Kuwakado and Masakatu Morii
-
2006/484 ( -- withdrawn -- )
- A New Identity Based Encryption Scheme From Pairing
- Xianhui Lu , Dake He, Guomin Li
-
2006/483 ( PS PS.GZ PDF )
- New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
- Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
-
2006/482 ( PS PS.GZ PDF )
- Countermeasures for the Simple Branch Prediction Analysis
- Giovanni Agosta and Gerardo Pelosi
-
2006/481 ( PS PS.GZ PDF )
- A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
- Donghoon Chang
-
2006/480 ( PDF )
- Cryptanalysis of REESSE1+ Public Key Cryptosystem
- Shengli Liu and Fangguo Zhang
-
2006/479 ( PS PS.GZ PDF )
- Efficient Provably-Secure Hierarchical Key Assignment Schemes
- Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
-
2006/478 ( PS PS.GZ PDF )
- Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA
- Donghoon Chang
-
2006/477 ( PS PS.GZ PDF )
- Dynamic Cryptographic Hash Functions
- William R. Speirs II and Samuel S. Wagstaff, Jr.
-
2006/476 ( PS PS.GZ PDF )
- Password-Authenticated Multi-Party Key Exchange with Different Passwords
- Jeong Ok Kwon and Ik Rae Jeong and Kouichi Sakurai and Dong Hoon Lee
-
2006/475 ( PS PS.GZ PDF )
- New Technique for Solving Sparse Equation Systems
- Hĺvard Raddum and Igor Semaev
-
2006/474 ( PDF )
- Speeding up the Bilinear Pairings Computation on Curves with Automorphisms
- Chang-An Zhao and Fangguo Zhang and Jiwu Huang
-
2006/473 ( PDF )
- Identity-Based Proxy Re-encryption
- Matthew Green and Giuseppe Ateniese
-
2006/472 ( PS PS.GZ PDF )
- A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment
- Luis Teixeira d'Aguiar Norton Brandao
-
2006/471 ( PDF )
- Multiplication and Squaring on Pairing-Friendly Fields
- Augusto Jun Devegili and Colm Ó~hÉigeartaigh and Michael Scott and Ricardo Dahab
-
2006/470 ( PS PS.GZ PDF )
- On the security of a group key agreement protocol
- Qiang Tang
-
2006/469 ( PS PS.GZ PDF )
- An Attack on Disguised Elliptic Curves
- David Mireles
-
2006/468 ( PDF )
- White Box Cryptography: Another Attempt
- Julien Bringer and Herve Chabanne and Emmanuelle Dottax
-
2006/467 ( PS PS.GZ PDF )
- Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)
- Donghoon Chang and Moti Yung
-
2006/466 ( PDF )
- Prime Order Primitive Subgroups in Torus-Based Cryptography
- Jason E. Gower
-
2006/465 ( PS PS.GZ )
- Security and Composition of Cryptographic Protocols: A Tutorial
- Ran Canetti
-
2006/464 ( PDF )
- Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006
- Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik
-
2006/463 ( PS PS.GZ PDF )
- Obfuscation for Cryptographic Purposes
- Dennis Hofheinz and John Malone-Lee and Martijn Stam
-
2006/462 ( PDF )
- Improved Collision and Preimage Resistance Bounds on PGV Schemes
- Lei Duo and Chao Li
-
2006/461 ( PS PS.GZ )
- On Post-Modern Cryptography
- Oded Goldreich
-
2006/460 ( PS PS.GZ PDF )
- Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006
- Donghoon Chang
-
2006/459 ( PDF )
- Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications
- Claude Carlet
-
2006/458 ( PS PS.GZ PDF )
- Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing
- Aggelos Kiayias and Moti Yung
-
2006/457 ( PDF )
- Linear Approximating to Integer Addition
- Li An-Ping
-
2006/456 ( PDF )
- Indistinguishability Amplification
- Ueli Maurer and Krzysztof Pietrzak and Renato Renner
-
2006/455 ( PS PS.GZ PDF )
- On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation
- Jonathan Katz
-
2006/454 ( PS PS.GZ PDF )
- How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication
- Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich
-
2006/453 ( PDF )
- Key Replacement Attack on a Certificateless Signature Scheme
- Zhenfeng Zhang and Dengguo Feng
-
2006/452 ( PDF )
- Hybrid Protocol For Password-based Key Exchange in Three-party Setting
- TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
-
2006/451 ( PDF )
- Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
- Jongsung Kim
-
2006/450 ( PS PS.GZ PDF )
- Secure Cryptographic Workflow in the Standard Model
- M. Barbosa and P. Farshim
-
2006/449 ( PS PS.GZ PDF )
- Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals
- Mihir Bellare and Phillip Rogaway
-
2006/448 ( PS PS.GZ PDF )
- Universally Composable and Forward Secure RFID Authentication and Key Exchange
- Tri van Le, Mike Burmester, Breno de Medeiros
-
2006/447 ( PS PS.GZ )
- Towards a Separation of Semantic and CCA Security for Public Key Encryption
- Yael Gertner and Tal Malkin and Steven Myers
-
2006/446 ( PS PS.GZ PDF )
- New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)
- Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo
-
2006/445 ( PS PS.GZ PDF )
- A class of quadratic APN binomials inequivalent to power functions
- Lilya Budaghyan and Claude Carlet and Gregor Leander
-
2006/444 ( PS PS.GZ PDF )
- Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors
- Chris Peikert and Alon Rosen
-
2006/443 ( PS PS.GZ PDF )
- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
- Yvo Desmedt and Tanja Lange and Mike Burmester
-
2006/442 ( PDF )
- An attack on the certificateless signature scheme from EUC Workshops 2006
- Je Hong Park
-
2006/441 ( PS PS.GZ PDF )
- General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity
- Donghoon Chang, Mridul Nandi
-
2006/440 ( PDF )
- A New Type of Group Signature Scheme
- Jun Zhong Dake He
-
2006/439 ( PDF )
- A New Type of Group Blind Signature Scheme Based on Bilinear Pairings
- Jun Zhong Dake He
-
2006/438 ( PS PS.GZ PDF )
- On the pseudo-random generator ISAAC
- Jean-Philippe Aumasson
-
2006/437 ( PS PS.GZ PDF )
- On Zigzag Functions and Related Objects in New Metric
- An Braeken, Ventzislav Nikov, Svetla Nikova
-
2006/436 ( PS PS.GZ )
- Statistically-Hiding Commitment from Any One-Way Function
- Iftach Haitner and Omer Reingold
-
2006/435 ( PDF )
- Searching for Shapes in Cryptographic Protocols (extended version)
- Shaddin F. Doghmi and Joshua D. Guttman and F. Javier Thayer
-
2006/434 ( PS PS.GZ PDF )
- Balanced Boolean Functions with (more than) Maximum Algebraic Immunity
- Deepak Kumar Dalai and Subhamoy Maitra
-
2006/433 ( PS PS.GZ PDF )
- Information Theoretic Bounds on Authentication Systems in Query Model
- Reihaneh Safavi-Naini and Peter Wild
-
2006/432 ( PS PS.GZ PDF )
- Universally Composable Security with Global Setup
- Ran Canetti and Yevgeniy Dodis and Rafael Pass and Shabsi Walfish
-
2006/431 ( PDF )
- Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing
- Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
-
2006/430 ( PDF )
- From Weak to Strong Watermarking
- Nicholas Hopper and David Molnar and David Wagner
-
2006/429 ( PDF )
- On a new invariant of Boolean functions
- Sugata Gangopadhyay and Deepmala Sharma
-
2006/428 ( PS PS.GZ PDF )
- Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4
- Lilya Budaghyan and Claude Carlet and Gregor Leander
-
2006/427 ( PDF )
- Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
- Aya Comuta and Mitsuru Kawazoe and Tetsuya Takahashi
-
2006/426 ( -- withdrawn -- )
- The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant
- Christophe Tartary and Huaxiong Wang
-
2006/425 ( -- withdrawn -- )
- A protocol
- anoymous
-
2006/424 ( PDF )
- Security Analysis of Voice-over-IP Protocols
- Prateek Gupta and Vitaly Shmatikov
-
2006/423 ( PS PS.GZ PDF )
- Perfect NIZK with Adaptive Soundness
- Masayuki Abe and Serge Fehr
-
2006/422 ( PDF )
- Long-term Security and Universal Composability
- Joern Mueller-Quade and Dominique Unruh
-
2006/421 ( PDF )
- Universally Composable Three-Party Key Distribution
- Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
-
2006/420 ( PDF )
- The REESSE1+ Public Key Cryptosystem v 2.21
- Shenghui Su and Shuwang Lv
-
2006/419 ( PDF )
- Some New Hidden Ideal Cryptosystems
- Ilia Toli
-
2006/418 ( PDF )
- Analysis of Privacy-Preserving Element Reduction of Multiset
- Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon and Dowon Hong
-
2006/417 ( PS PS.GZ )
- The Recent Attack of Nie et al On TTM is Faulty
- T.Moh
-
2006/416 ( PS PS.GZ PDF )
- Authenticated Interleaved Encryption \\
- Claude Castelluccia
-
2006/415 ( PS PS.GZ PDF )
- On the Minimal Embedding Field
- Laura Hitt
-
2006/414 ( PS PS.GZ PDF )
- Zero Knowledge and Soundness are Symmetric
- Shien Jin Ong and Salil Vadhan
-
2006/413 ( PDF )
- Preimage Attack on Parallel FFT-Hashing
- Donghoon Chang
-
2006/412 ( PS PS.GZ PDF )
- Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
- Donghoon Chang
-
2006/411 ( PS PS.GZ PDF )
- Preimage Attack on Hashing with Polynomials proposed at ICISC'06
- Donghoon Chang
-
2006/410 ( PDF )
- Galois Field Commitment Scheme
- Alexandre Pinto and André Souto and Armando Matos and Luís Antunes
-
2006/409 ( PDF )
- A NEW MAC: LAMA
- Li An-Ping
-
2006/408 ( PS PS.GZ PDF )
- A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries
- Goichiro Hanaoka and Hideki Imai
-
2006/407 ( PS PS.GZ PDF )
- Cryptography in the Multi-string Model
- Jens Groth and Rafail Ostrovsky
-
2006/406 ( PDF )
- Redundancy of the Wang-Yu Sufficient Conditions
- Yuto Nakano and Hidenori Kuwakado and Masakatu Morii
-
2006/405 ( PS PS.GZ PDF )
- Universally Composable Blind Signatures in the Plain Model
- Aslak Bakke Buan and Kristian Gjø steen and Lillian Krå kmo
-
2006/404 ( PDF )
- Faugere's F5 Algorithm Revisited
- Till Stegers
-
2006/403 ( PS PS.GZ PDF )
- Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
- Willi Geiselmann and Rainer Steinwandt
-
2006/402 ( PS PS.GZ PDF )
- Algebraic Cryptanalysis of the Data Encryption Standard
- Nicolas T. Courtois and Gregory V. Bard
-
2006/401 ( -- withdrawn -- )
- On the cost of cryptanalytic attacks
- Jean-Philippe Aumasson
-
2006/400 ( PDF )
- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
- Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky and Amit Sahai
-
2006/399 ( PDF )
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Mihir Bellare and Thomas Ristenpart
-
2006/398 ( PDF )
- The Layered Games Framework for Specifications and Analysis of Security Protocols
- Amir Herzberg and Igal Yoffe
-
2006/397 ( PS PS.GZ PDF )
- Revisiting the Efficiency of Malicious Two-Party Computation
- David P. Woodruff
-
2006/396 ( PDF )
- Security Protocols with Isotropic Channels
- Madhukar Anand and Eric Cronin and Micah Sherr and Matt Blaze and Sampath Kannan
-
2006/395 ( PDF )
- Security-Focused Survey on Group Key Exchange Protocols
- Mark Manulis
-
2006/394 ( PDF )
- Identity Based Strong Designated Verifier Proxy Signature Schemes
- Sunder Lal and Vandani Verma
-
2006/393 ( -- withdrawn -- )
- The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable
- Sujing Zhou, Dongdai Lin
-
2006/392 ( PS PS.GZ PDF )
- The Tate Pairing via Elliptic Nets
- Katherine E. Stange
-
2006/391 ( PDF )
- A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security
- Ronald Cramer and Dennis Hofheinz and Eike Kiltz
-
2006/390 ( -- withdrawn -- )
- Revisit of CS98
- Xianhui Lu, Xuejia Lai, Dake He,Guomin Li
-
2006/389 ( PDF )
- Traceable Ring Signature
- Eiichiro Fujisaki and Koutarou Suzuki
-
2006/388 ( PDF )
- Survey on Security Requirements and Models for Group Key Exchange
- Mark Manulis
-
2006/387 ( PDF )
- A Note on the Security of NTRUSign
- Phong Q. Nguyen
-
2006/386 ( PS PS.GZ PDF )
- The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange
- Mark Wooding
-
2006/385 ( PDF )
- On Security Models and Compilers for Group Key Exchange Protocols
- Emmanuel Bresson and Mark Manulis and Joerg Schwenk
-
2006/384 ( PDF )
- Design and Analysis of a Hash Ring-iterative Structure
- Shenghui Su, Yixian Yang, Bo Yang, and Shaolan Zhang
-
2006/383 ( PS PS.GZ PDF )
- Traitor tracing scheme with constant ciphertext rate against powerful pirates
- Thomas Sirvent
-
2006/382 ( PS PS.GZ PDF )
- Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks
- E-yong Kim and Hwangnam Kim and Kunsoo Park
-
2006/381 ( PDF )
- Cryptanalysis on an Algorithm for Efficient Digital Signatures
- Fuw-Yi Yang
-
2006/380 ( PDF )
- On Security of Sovereign Joins
- Einar Mykletun and Gene Tsudik
-
2006/379 ( PDF )
- Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator
- Matthew J. Campagna
-
2006/378 ( PS PS.GZ PDF )
- A New Key Exchange Primitive Based on the Triple Decomposition Problem
- YesemKurt
-
2006/377 ( PS PS.GZ PDF )
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- James Birkett, Alexander W. Dent, Gregory Neven and Jacob Schuldt
-
2006/376 ( PDF )
- A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions
- Vlastimil KLIMA
-
2006/375 ( PDF )
- Distortion maps for genus two curves
- Steven D. Galbraith and Jordi Pujolàs and Christophe Ritzenthaler and Benjamin Smith
-
2006/374 ( PS PS.GZ PDF )
- Robust Final-Round Cache-Trace Attacks Against AES
- Joseph Bonneau
-
2006/373 ( PDF )
- Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
- Joseph K. Liu and Man Ho Au and Willy Susilo
-
2006/372 ( PDF )
- A taxonomy of pairing-friendly elliptic curves
- David Freeman and Michael Scott and Edlyn Teske
-
2006/371 ( PDF )
- Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3
- Robert Ronan and Colm o hEigeartaigh and Colin Murphy and Tim Kerins and Paulo S. L. M. Barreto
-
2006/370 ( PS PS.GZ PDF )
- A DoS Attack Against the Integrity-Less ESP (IPSec)
- Ventzislav Nikov
-
2006/369 ( PDF )
- RadioGatún, a belt-and-mill hash function
- Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche
-
2006/368 ( PDF )
- Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles
- Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong
-
2006/367 ( PDF )
- An Attack on a Certificateless Signature Scheme
- Xuefei Cao and Kenneth G. Paterson and Weidong Kou
-
2006/366 ( PDF )
- A Latency-Free Election Scheme
- Kristian Gjø steen
-
2006/365 ( -- withdrawn -- )
- Revisit of KD04
- Xianhui Lu, Xuejia Lai, Dake He,Guomin Li
-
2006/364 ( PDF )
- Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric
- Gregory V. Bard
-
2006/363 ( -- withdrawn -- )
- A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
- Ventzislav Nikov and Svetla Nikova and Bart Preneel
-
2006/362 ( PS PS.GZ PDF )
- Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
- Palash Sarkar and Sanjit Chatterjee
-
2006/361 ( PS PS.GZ PDF )
- Generic Construction of (Identity-based) Perfect Concurrent Signatures
- Sherman S.M. Chow and Willy Susilo
-
2006/360 ( PDF )
- Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities
- Marc Stevens and Arjen Lenstra and Benne de Weger
-
2006/359 ( PS PS.GZ )
- On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge
- Mihir Bellare and Oded Goldreich
-
2006/358 ( PDF )
- Public Key Encryption with Keyword Search based on K-Resilient IBE
- Dalia Khader
-
2006/357 ( PDF )
- Cryptanalysis of a homomorphic public-key cryptosystem over a finite group
- Su-Jeong Choi and Simon R. Blackburn and Peter R. Wild
-
2006/356 ( PS PS.GZ PDF )
- Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds
- Emilia Käsper and Sven Laur and Helger Lipmaa
-
2006/355 ( PS PS.GZ PDF )
- Concurrent Non-Malleable Zero Knowledge
- Boaz Barak and Manoj Prabhakaran and Amit Sahai
-
2006/354 ( PDF )
- A new stream cipher: DICING
- Li An-Ping
-
2006/353 ( PDF )
- Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
- Zhenjie Huang and Kefei Chen and Yumin Wang
-
2006/352 ( PDF )
- Foundations of Secure E-Commerce: The Order Layer
- Amir Herzberg and Igal Yoffe
-
2006/351 ( PDF )
- On the Power of Simple Branch Prediction Analysis
- Onur Aciicmez and Cetin Kaya Koc and Jean-Pierre Seifert
-
2006/350 ( PDF )
- Impossible Differential Cryptanalysis of ARIA and Camellia
- Wenling Wu, Wentao Zhang, and Dengguo Feng
-
2006/349 ( PS PS.GZ PDF )
- A Note On Side-Channels Resulting From Dynamic Compilation
- D. Page
-
2006/348 ( PS PS.GZ PDF )
- Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist
- Krzysztof Pietrzak
-
2006/347 ( PDF )
- Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1
- Fumiyuki Momose and Jinhui Chao
-
2006/346 ( PDF )
- Generic Transformation to Strongly Unforgeable Signatures
- Qiong Huang and Duncan S. Wong and Yiming Zhao
-
2006/345 ( PS PS.GZ PDF )
- Private and Efficient Stable Marriages (Matching)
- Atkinson, T. and Bartak,R. and Silaghi,M.-C. and Tuleu,E. and Zanker,M.
-
2006/344 ( PDF )
- A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority
- Lihua Wang and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto
-
2006/343 ( PS PS.GZ PDF )
- Verifiably Encrypted Signature Scheme with Threshold Adjudication
- M. Choudary Gorantla And Ashutosh Saxena
-
2006/342 ( PDF )
- A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings
- Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang
-
2006/341 ( PS PS.GZ PDF )
- MV3: A new word based stream cipher using rapid mixing and revolving buffers
- Nathan Keller and Stephen D. Miller and Ilya Mironov and Ramarathnam Venkatesan
-
2006/340 ( PDF )
- Cryptanalyses of Some Multimedia Encryption Schemes
- Chengqing Li
-
2006/339 ( -- withdrawn -- )
- A New family of Ideal Multipartite Access Structure Based on MSP
- Jun Xu and Jiwen Zeng and Xiaomin Zha
-
2006/338 ( PS PS.GZ PDF )
- Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings
- Fagen Li, Yupu Hu, and Shuanggen Liu
-
2006/337 ( PDF )
- An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
- D.R. Stinson and J. Wu
-
2006/336 ( PDF )
- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
- Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
-
2006/335 ( PDF )
- A ID-Based Deniable Authentication Protocol on pairings
- Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang
-
2006/334 ( PDF )
- Colliding Message Pair for 53-Step HAS-160
- Florian Mendel
-
2006/333 ( PDF )
- Discrete Logarithms in Generalized Jacobians
- S. D. Galbraith and B. A. Smith
-
2006/332 ( PDF )
- Improved Efficiency for Private Stable Matching
- Matthew Franklin and Mark Gondree and Payman Mohassel
-
2006/331 ( PDF )
- On the Security of Generalized Jacobian Cryptosystems
- Isabelle Dechene
-
2006/330 ( PS PS.GZ PDF )
- Extended Double-Base Number System with applications to Elliptic Curve Cryptography
- Christophe Doche and Laurent Imbert
-
2006/329 ( PDF )
- Designated Verifier Signature Scheme Based on Braid Groups
- Shi-hua Zou and Ji-wen Zeng and Jun-jie Quan
-
2006/328 ( PDF )
- Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
- Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto
-
2006/327 ( PDF )
- An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation
- Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
-
2006/326 ( PDF )
- Analyzing the HB and HB+ Protocols in the ``Large Error'' Case
- Jonathan Katz and Adam Smith
-
2006/325 ( PS PS.GZ PDF )
- Invisible Designated Confirmer Signatures without Random Oracles
- Victor K. Wei
-
2006/324 ( PDF )
- The Average Transmission Overhead of Broadcast Encryption
- Sarang Aravamuthan and Sachin Lodha
-
2006/323 ( PS PS.GZ PDF )
- Computational Soundness of Formal Indistinguishability and Static Equivalence
- Gergei Bana and Payman Mohassel and Till Stegers
-
2006/322 ( PDF )
- Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction
- Yassir Nawaz and Kishan Chand Gupta and Guang Gong
-
2006/321 ( PS PS.GZ PDF )
- Efficient Pseudorandom Generators Based on the DDH Assumption
- Reza Rezaeian Farashahi and Berry Schoenmakers and Andrey Sidorenko
-
2006/320 ( PDF )
- CMSS -- An Improved Merkle Signature Scheme
- Johannes Buchmann and Luis Carlos Coronado Garcia and Erik Dahmen and Martin Doering and Elena Klintsevich
-
2006/319 ( PS PS.GZ PDF )
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Scott Contini and Yiqun Lisa Yin
-
2006/318 ( PDF )
- Chameleon-Based Deniable Authenticated Key Agreement Protocol
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2006/317 ( PS PS.GZ PDF )
- Weaknesses of the FORK-256 compression function
- Krystian Matusiewicz and Scott Contini and Josef Pieprzyk
-
2006/316 ( PDF )
- A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
- Sarang Aravamuthan and Viswanatha Rao Thumparthy
-
2006/315 ( PDF )
- On the Necessity of Rewinding in Secure Multiparty Computation
- Michael Backes and Joern-Mueller Quade and Dominique Unruh
-
2006/314 ( PDF )
- Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
- Yi Deng and Giovanni Di Crescenzo and Dongdai Lin
-
2006/313 ( PDF )
- Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields
- Lars Elmegaard-Fessel
-
2006/312 ( PS PS.GZ PDF )
- ElGamal type signature schemes for n-dimensional vector spaces
- Iwan M. Duursma and SeungKook Park
-
2006/311 ( -- withdrawn -- )
- Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme
- Bennian Dou and Chungen Xu
-
2006/310 ( PDF )
- A d-Sequence based Recursive Random Number Generator
- Abhishek Parakh
-
2006/309 ( PDF )
- Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
- Vipul Goyal and Omkant Pandey and Amit Sahai and Brent Waters
-
2006/308 ( PDF )
- Efficient ID-based Threshold Signature Schemes without Pairings
- Jun Shao and Zhenfu Cao and Licheng Wang
-
2006/307 ( PDF )
- Note on Design Criteria for Rainbow-Type Multivariates
- Jintai Ding and Lei Hu and Bo-Yin Yang and Jiun-Ming Chen
-
2006/306 ( PS PS.GZ PDF )
- Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability
- Alexander W. Dent and Qiang Tang
-
2006/305 ( PS PS.GZ PDF )
- Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation
- V.S. Dimitrov and K.U. Jaervinen and M.J. Jacobson, Jr. and W.F. Chan and Z. Huang
-
2006/304 ( PS PS.GZ PDF )
- Identity-Based Encryption Gone Wild
- Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone-Lee and Gregory Neven and Nigel P. Smart
-
2006/303 ( PS PS.GZ )
- Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
- Eric Filiol
-
2006/302 ( PDF )
- Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions.
- Atefeh Mashatan and Douglas R. Stinson
-
2006/301 ( PDF )
- New features for JPEG Steganalysis
- Johann Barbier and Éric Filiol and Kichenakoumar Mayoura
-
2006/300 ( -- withdrawn -- )
- Attacks and Modifications of CJC's E-voting Scheme
- Bennian Dou and Chun-hua Chen and Roberto Araujo
-
2006/299 ( PDF )
- Efficient Implementation of Tate Pairing on a Mobile Phone using Java
- Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto
-
2006/298 ( PDF )
- A Fully Collusion Resistant Broadcast, Trace, and Revoke System
- Dan Boneh and Brent Waters
-
2006/297 ( PDF )
- Forward-Secure Signatures with Untrusted Update
- Xavier Boyen and Hovav Shacham and Emily Shen and Brent Waters
-
2006/296 ( PS PS.GZ PDF )
- On the Generic Construction of Identity-Based Signatures with Additional Properties
- David Galindo and Javier Herranz and Eike Kiltz
-
2006/295 ( PDF )
- Visual secret sharing scheme with autostereogram
- Feng Yi and Daoshun Wang and Yiqi Dai
-
2006/294 ( PDF )
- The Collision Intractability of MDC-2 in the Ideal Cipher Model
- John P Steinberger
-
2006/293 ( PS PS.GZ PDF )
- Fast Algorithms for the Free Riders Problem in Broadcast Encryption
- Zulfikar Ramzan and David P. Woodruff
-
2006/292 ( PDF )
- Ideal Multipartite Secret Sharing Schemes
- Oriol Farras and Jaume Marti-Farre and Carles Padro
-
2006/291 ( PS PS.GZ PDF )
- Hard Homogeneous Spaces
- Jean-Marc Couveignes
-
2006/290 ( PDF )
- On Authentication with HMAC and Non-Random Properties
- Christian Rechberger and Vincent Rijmen
-
2006/289 ( PDF )
- Efficient Ring Signatures without Random Oracles
- Hovav Shacham and Brent Waters
-
2006/288 ( PDF )
- Predicting Secret Keys via Branch Prediction
- Onur Aciicmez and Jean-Pierre Seifert and Cetin Kaya Koc
-
2006/287 ( PDF )
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Dan Boneh and Brent Waters
-
2006/286 ( PDF )
- Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
- Sujing Zhou and Dongdai Lin
-
2006/285 ( PS PS.GZ PDF )
- Unrestricted Aggregate Signatures
- Mihir Bellare and Chanathip Namprempre and Gregory Neven
-
2006/284 ( PS PS.GZ PDF )
- Constant Round Group Key Exchange with Logarithmic Computational Complexity
- Junghyun Nam, Youngsook Lee, and Dongho Won
-
2006/283 ( PS PS.GZ PDF )
- Does Privacy Require True Randomness?
- Carl Bosley and Yevgeniy Dodis
-
2006/282 ( -- withdrawn -- )
- Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)
- Victor K. Wei and Fangguo Zhang
-
2006/281 ( PS PS.GZ PDF )
- Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys
- Phillip Rogaway
-
2006/280 ( PS PS.GZ )
- Deniable Authentication and Key Exchange
- Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk
-
2006/279 ( PDF )
- On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique)
- Sanjit Chatterjee and Palash Sarkar
-
2006/278 ( PS PS.GZ PDF )
- Fundamental problems in provable security and cryptography
- Alexander W. Dent
-
2006/277 ( PS PS.GZ )
- On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits
- Oded Goldreich
-
2006/276 ( PS PS.GZ PDF )
- Mitigating Dictionary Attacks on Password-Protected Local Storage
- Ran Canetti and Shai Halevi and Michael Steiner
-
2006/275 ( PS PS.GZ PDF )
- A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random
- Debrup Chakraborty and Palash Sarkar
-
2006/274 ( PDF )
- An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
- Debasis Giri and P. D. Srivastava
-
2006/273 ( PS PS.GZ PDF )
- Secure Positioning of Mobile Terminals with Simplex Radio Communication
- Mikio Fujii
-
2006/272 ( PS PS.GZ PDF )
- Efficient Use of Random Delays
- Olivier Benoit and Michael Tunstall
-
2006/271 ( PDF )
- Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
- Gregory V. Bard
-
2006/270 ( PDF )
- Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
- Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng
-
2006/269 ( PS PS.GZ PDF )
- An Analysis of the Hermes8 Stream Ciphers
- Steve Babbage and Carlos Cid and Norbert Pramstaller and Havard Raddum
-
2006/268 ( PDF )
- On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
- Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto
-
2006/267 ( PS PS.GZ PDF )
- Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation
- Mihir Bellare and Tadayoshi Kohno and Victor Shoup
-
2006/266 ( PS PS.GZ PDF )
- Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
- Michael Backes and Peeter Laud
-
2006/265 ( PDF )
- Some (in)sufficient conditions for secure hybrid encryption.
- Javier Herranz and Dennis Hofheinz and Eike Kiltz
-
2006/264 ( PS PS.GZ PDF )
- A Simple and Unified Method of Proving Unpredictability
- Mridul Nandi
-
2006/263 ( PDF )
- Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems
- Dragos Trinca
-
2006/262 ( PDF )
- Logical Concepts in Cryptography
- Simon Kramer
-
2006/261 ( PS PS.GZ PDF )
- Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks
- Frederic Didier
-
2006/260 ( PDF )
- A Note On Game-Hopping Proofs
- Alexander W. Dent
-
2006/259 ( PDF )
- Simplified Submission of Inputs to Protocols
- Douglas Wikstrom
-
2006/258 ( PDF )
- Cryptanalysis of a Cognitive Authentication Scheme
- Philippe Golle and David Wagner
-
2006/257 ( PDF )
- Efficient Divisor Class Halving on Genus Two Curves
- Peter Birkner
-
2006/256 ( PDF )
- Constant-Round Concurrent NMWI and its relation to NMZK
- Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
-
2006/255 ( PDF )
- Malicious KGC Attacks in Certificateless Cryptography
- Man Ho Au and Jing Chen and Joseph K. Liu and Yi Mu and Duncan S. Wong and Guomin Yang
-
2006/254 ( PS PS.GZ PDF )
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Ilya Mironov and Lintao Zhang
-
2006/253 ( PS PS.GZ PDF )
- Hard Instances of the Constrained Discrete Logarithm Problem
- Ilya Mironov and Anton Mityagin and Kobbi Nissim
-
2006/252 ( PDF )
- On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
- Maurizio A. Strangio
-
2006/251 ( PDF )
- Accelerating Cryptanalysis with the Method of Four Russians
- Gregory V. Bard
-
2006/250 ( PDF )
- Linear Cryptanalysis of CTC
- Orr Dunkelman and Nathan Keller
-
2006/249 ( PS PS.GZ PDF )
- Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240
- Selcuk Kavut and Subhamoy Maitra and Sumanta Sarkar and Melek D. Yucel
-
2006/248 ( PDF )
- Disguising tori and elliptic curves
- Steven D. Galbraith
-
2006/247 ( -- withdrawn -- )
- Factoring Class Polynomials over the Genus Field
- Marcel Martin
-
2006/246 ( PS PS.GZ PDF )
- ON THE POSTQUANTUM CIPHER SCHEME
- Jaroslav HRUBY
-
2006/245 ( PDF )
- Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems
- K. Phani Kumar and G. Shailaja and Ashutosh Saxena
-
2006/244 ( PS PS.GZ PDF )
- Length-based cryptanalysis: The case of Thompson's Group
- Dima Ruinskiy, Adi Shamir, Boaz Tsaban
-
2006/243 ( PDF )
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- Tae Hyun Kim and Tsuyoshi Takagi and Dong-Guk Han and Ho Won Kim and Jongin Lim
-
2006/242 ( PDF )
- The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
- Haina Zhang , Shaohui Wang, Xiaoyun Wang
-
2006/241 ( PS PS.GZ PDF )
- A Stronger Definition for Anonymous Electronic Cash
- Marten Trolin
-
2006/240 ( PS PS.GZ PDF )
- Computing Zeta Functions of Nondegenerate Curves
- W. Castryck and J. Denef and F. Vercauteren
-
2006/239 ( PDF )
- Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
- Yi Deng and Dongdai Lin
-
2006/238 ( -- withdrawn -- )
- Searchable Index Schemes for Groups : Security vs. Efficiency
- Hyun-A Park, Yu Jeong Lee, and Dong Hoon Lee
-
2006/237 ( PDF )
- Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?
- Claire Whelan and Mike Scott
-
2006/236 ( PS PS.GZ PDF )
- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
- Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
-
2006/235 ( PS PS.GZ PDF )
- Application of ECM to a Class of RSA keys
- Abderrahmane Nitaj
-
2006/234 ( PDF )
- RFID Security: Tradeoffs between Security and Efficiency
- Ivan Damgård and Michael Østergaard
-
2006/233 ( PS PS.GZ PDF )
- A simple generalization of El-Gamal cryptosystem to non-abelian groups
- Ayan Mahalanobis
-
2006/232 ( PDF )
- Improvement to AKS algorithm
- Roman Popovych
-
2006/231 ( PS PS.GZ PDF )
- A handy multi-coupon system
- Sebastien Canard and Aline Gouget and Emeline Hufschmitt
-
2006/230 ( PDF )
- Another Look at Generic Groups
- Neal Koblitz and Alfred Menezes
-
2006/229 ( PDF )
- Another Look at "Provable Security". II
- Neal Koblitz and Alfred Menezes
-
2006/228 ( PS PS.GZ PDF )
- Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization
- Mihir Bellare and Amit Sahai
-
2006/227 ( PS PS.GZ PDF )
- An Elliptic Curve Processor Suitable For RFID-Tags
- L. Batina and J. Guajardo and T. Kerins and N. Mentens and P. Tuyls and I. Verbauwhede
-
2006/226 ( PDF )
- The Fairness of Perfect Concurrent Signatures
- Guilin Wang, Feng Bao, and Jianying Zhou
-
2006/225 ( PS PS.GZ PDF )
- Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
- Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
-
2006/224 ( PS PS.GZ PDF )
- Generalizations of the Karatsuba Algorithm for Efficient Implementations
- André Weimerskirch and Christof Paar
-
2006/223 ( PDF )
- What Hashes Make RSA-OAEP Secure?
- Daniel R. L. Brown
-
2006/222 ( PS PS.GZ )
- Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants
- R. Overbeck
-
2006/221 ( PS PS.GZ PDF )
- Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem
- Phillip Rogaway and Thomas Shrimpton
-
2006/220 ( PDF )
- Multi-Dimensional Montgomery Ladders for Elliptic Curves
- Daniel R. L. Brown
-
2006/219 ( PS PS.GZ PDF )
- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
- Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kai Tsay
-
2006/218 ( PS PS.GZ PDF )
- Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
- Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
-
2006/217 ( PS PS.GZ PDF )
- Statistical Analysis of the MARS Block Cipher
- Andrey Pestunov
-
2006/216 ( PDF )
- Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains
- Meloni Nicolas
-
2006/215 ( PDF )
- Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion
- Shujun Li and Chengqing Li and Kowk-Tung Lo and Guanrong Chen
-
2006/214 ( PDF )
- Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String
- Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
-
2006/213 ( PS PS.GZ PDF )
- Luby-Rackoff Ciphers from Weak Round Functions?
- Ueli Maurer and Yvonne Anne Oswald and Krzysztof Pietrzak and Johan Sjödin
-
2006/212 ( PDF )
- Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
- Kemal BICAKCI and Bruno Crispo and Andrew S. Tanenbaum
-
2006/211 ( PS PS.GZ PDF )
- A Survey of Certificateless Encryption Schemes and Security Models
- Alexander W. Dent
-
2006/210 ( PDF )
- Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
- Reza Curtmola and Juan Garay and Seny Kamara and Rafail Ostrovsky
-
2006/209 ( PS PS.GZ PDF )
- Minimal Weight and Colexicographically Minimal Integer Representations
- Clemens Heuberger and James A. Muir
-
2006/208 ( PS PS.GZ PDF )
- Private Information Retrieval Using Trusted Hardware
- Shuhong Wang and Xuhua Ding and Robert Deng and Feng Bao
-
2006/207 ( PDF )
- The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure
- Javier Herranz and Dennis Hofheinz and Eike Kiltz
-
2006/206 ( PS PS.GZ PDF )
- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
- Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang
-
2006/205 ( -- withdrawn -- )
- ID-Based Ring Signature Scheme secure in the Standard Model
- Man Ho Au and Joseph K. Liu and Y. H. Yuen and Duncan S. Wong
-
2006/204 ( PS PS.GZ )
- Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems
- Pradeep Kumar Mishra and Pinakpani Pal and Palash Sarkar.
-
2006/203 ( PS PS.GZ PDF )
- Generalization of the Selective-ID Security Model for HIBE Protocols
- Sanjit Chatterjee and Palash Sarkar
-
2006/202 ( PS PS.GZ PDF )
- Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five
- Ryuichi Harasawa, Yutaka Sueyoshi, and Aichi Kudo
-
2006/201 ( PS PS.GZ PDF )
- Efficient Tate Pairing Computation Using Double-Base Chains
- Chang'an Zhao and Fangguo Zhang and Jiwu Huang
-
2006/200 ( PDF )
- Improvement of recently proposed Remote User Authentication Schemes
- Guanfei Fang and Genxun huang
-
2006/199 ( PS PS.GZ PDF )
- Identity-based Key Agreement Protocols From Pairings
- L. Chen and Z. Cheng and N.P. Smart
-
2006/198 ( PDF )
- Cryptographically Private Support Vector Machines
- Sven Laur and Helger Lipmaa and Taneli Mielikäinen
-
2006/197 ( PDF )
- A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
- Marc P.C. Fossorier and Miodrag J. Mihaljevic and Hideki Imai and Yang Cui and Kanta Matsuura
-
2006/196 ( PDF )
- On ZK-Crypt, Book Stack, and Statistical Tests
- S.~Doroshenko \and A.~Fionov \and A.~Lubkin \and V.~Monarev \and B.~Ryabko
-
2006/195 ( PS PS.GZ PDF )
- An Efficient ID-based Digital Signature with Message Recovery Based on Pairing
- Raylin Tso and Chunxiang Gu and Takeshi Okamoto and Eiji Okamoto
-
2006/194 ( -- withdrawn -- )
- Self-Generated-Certificate Public Key Cryptosystem
- Joseph K. Liu and Man Ho Au
-
2006/193 ( PDF )
- (Hierarchical Identity-Based) Threshold Ring Signatures
- Victor K. Wei and Tsz Hon Yuen
-
2006/192 ( PDF )
- DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
- Osman Kocar
-
2006/191 ( PDF )
- A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION
- Sahadeo Padhye
-
2006/190 ( PS PS.GZ PDF )
- Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator
- Berry Schoenmakers and Andrey Sidorenko
-
2006/189 ( PDF )
- Unconditionally secure chaffing and winnowing with short authentication tags
- D. R. Stinson
-
2006/188 ( PS PS.GZ PDF )
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- Tetsu Iwata
-
2006/187 ( PS PS.GZ PDF )
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
- Jongsung Kim and Alex Biryukov and Bart Preneel and Seokhie Hong
-
2006/186 ( PDF )
- Deterministic and Efficiently Searchable Encryption
- Mihir Bellare and Alexandra Boldyreva and Adam O'Neill
-
2006/185 ( PS PS.GZ PDF )
- Statistical Zero-Knowledge Arguments for NP from Any One-Way Function
- Minh-Huyen Nguyen and Shien Jin Ong and Salil Vadhan
-
2006/184 ( PS PS.GZ PDF )
- On Signatures of Knowledge
- Melissa Chase and Anna Lysyanskaya
-
2006/183 ( PDF )
- Information-Theoretic Conditions for Two-Party Secure Function Evaluation
- Claude Crépeau and George Savvides and Christian Schaffner and Jürg Wullschleger
-
2006/182 ( PS PS.GZ PDF )
- On the Limits of Point Function Obfuscation
- Arvind Narayanan and Vitaly Shmatikov
-
2006/181 ( PS PS.GZ PDF )
- There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$
- Selçuk Kavut and Subhamoy Maitra and Melek D. Yücel
-
2006/180 ( PDF )
- Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions
- Dmitry Khovratovich
-
2006/179 ( PDF )
- FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields
- Chang Shu and Soonhak Kwon and Kris Gaj
-
2006/178 ( PS PS.GZ PDF )
- A New Cryptosystem Based On Hidden Order Groups
- Amitabh Saxena and Ben Soh
-
2006/177 ( PS PS.GZ PDF )
- On the (Im-)Possibility of Extending Coin Toss
- Dennis Hofheinz and Joern Mueller-Quade and Dominique Unruh
-
2006/176 ( PDF )
- Counting points on elliptic curves in medium characteristic
- Antoine Joux and Reynald Lercier
-
2006/175 ( PS PS.GZ PDF )
- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
- Moni Naor and Gil Segev and Adam Smith
-
2006/174 ( -- withdrawn -- )
- Frobenius expansion and the Diffie Hellman problem
- V. R. Sule
-
2006/173 ( PS PS.GZ PDF )
- Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
- Le Trieu Phong and Ogata Wakaha
-
2006/172 ( PS PS.GZ PDF )
- On Computing Products of Pairings
- R Granger and N.P. Smart
-
2006/171 ( PS PS.GZ PDF )
- Key confirmation and adaptive corruptions in the protocol security logic
- Prateek Gupta and Vitaly Shmatikov
-
2006/170 ( PDF )
- Visual Cryptography Schemes with Optimal Pixel Expansion
- Carlo Blundo and Stelvio Cimato and Alfredo De Santis
-
2006/169 ( PDF )
- Simplified pairing computation and security implications
- Steven D. Galbraith and Colm O hEigeartaigh and Caroline Sheedy
-
2006/168 ( PS PS.GZ PDF )
- How Fast can be Algebraic Attacks on Block Ciphers ?
- Nicolas T. Courtois
-
2006/167 ( PS PS.GZ PDF )
- Towards Trustworthy e-Voting using Paper Receipts
- Yunho Lee and Kwangwoo Lee and Seungjoo Kim and Dongho Won
-
2006/166 ( PDF )
- General Secret Sharing Based on the Chinese Remainder Theorem
- Sorin Iftene
-
2006/165 ( PS PS.GZ PDF )
- Pairings for Cryptographers
- S.D. Galbraith and K.G. Paterson and N.P. Smart
-
2006/164 ( PDF )
- Classification of Signature-only Signature Models
- Zhengjun Cao
-
2006/163 ( PDF )
- Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods
- Gregory V. Bard
-
2006/162 ( PS PS.GZ )
- A Summary of McEliece-Type Cryptosystems and their Security
- D. Engelbert, R. Overbeck and A. Schmidt
-
2006/161 ( PDF )
- Cryptanalysis of 4-Pass HAVAL
- Zhangyi Wang and Huanguo Zhang and Zhongping Qin and Qingshu Meng
-
2006/160 ( -- withdrawn -- )
- A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings
- L. Chen and Z. Cheng and N.P. Smart
-
2006/159 ( -- withdrawn -- )
- Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006
- Joonsang Baek and Guilin Wang
-
2006/158 ( PDF )
- An Efficient ID-based Proxy Signature Scheme from Pairings
- Chunxiang Gu and Yuefei Zhu
-
2006/157 ( PS PS.GZ PDF )
- An efficient way to access an array at a secret index
- Timothy Atkinson and Marius C. Silaghi
-
2006/156 ( PS PS.GZ PDF )
- The Hardness of the DHK Problem in the Generic Group Model
- Alexander W. Dent
-
2006/155 ( PS PS.GZ )
- Independent Zero-Knowledge Sets
- Rosario Gennaro and Silvio Micali
-
2006/154 ( PS PS.GZ PDF )
- New Public Key Authentication Frameworks with Lite Certification Authority
- Xiaolei Dong and Licheng Wang and Zhenfu Cao
-
2006/153 ( PS PS.GZ PDF )
- On the Relationships Between Notions of Simulation-Based Security
- Anupam Datta and Ralf Kuesters and John C. Mitchell and Ajith Ramanathan
-
2006/152 ( PDF )
- Pairing based Mutual Authentication Scheme Using Smart Cards
- G. Shailaja and K. Phani Kumar and Ashutosh Saxena
-
2006/151 ( PS PS.GZ PDF )
- Simulation-Based Security with Inexhaustible Interactive Turing Machines
- Ralf Kuesters
-
2006/150 ( PDF )
- Demonstrating data possession and uncheatable data transfer
- Décio Luiz Gazzoni Filho and Paulo Sérgio Licciardi Messeder Barreto
-
2006/149 ( PDF )
- A method of construction of balanced functions with optimum algebraic immunity
- C. Carlet
-
2006/148 ( PS PS.GZ PDF )
- Computational Indistinguishability between Quantum States and Its Cryptographic Application
- Akinori Kawachi and Takeshi Koshiba and Harumichi Nishimura and Tomoyuki Yamakami
-
2006/147 ( PDF )
- New Integrated proof Method on Iterated Hash Structure and New Structures
- Duo Lei
-
2006/146 ( PS PS.GZ PDF )
- Completeness of Formal Hashes in the Standard Model
- Flavio D. Garcia and Peter van Rossum
-
2006/145 ( PS PS.GZ PDF )
- PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES
- Alexander Rostovtsev and Anton Stolbunov
-
2006/144 ( PDF )
- Implementing Cryptographic Pairings on Smartcards
- Michael Scott and Neil Costigan and Wesam Abdulwahab
-
2006/143 ( PDF )
- Blinded Fault Resistant Exponentiation
- Guillaume Fumaroli and David Vigilant
-
2006/142 ( PS PS.GZ PDF )
- Rational Secret Sharing, Revisited
- S. Dov Gordon and Jonathan Katz
-
2006/141 ( PDF )
- Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers
- Shahram Khazaei and Mahdi M. Hasanzadeh and Mohammad S. Kiaei
-
2006/140 ( PS PS.GZ PDF )
- GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
- Jiejun Kong
-
2006/139 ( PS PS.GZ PDF )
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
- Francois-Xavier Standaert and Tal G. Malkin and Moti Yung
-
2006/138 ( PDF )
- Trace-Driven Cache Attacks on AES
- Onur Acıiçmez and Çetin Kaya Koç
-
2006/137 ( PDF )
- Defining Strong Privacy for RFID
- Ari Juels and Stephen A. Weis
-
2006/136 ( PDF )
- A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL
- Gregory V. Bard
-
2006/135 ( PDF )
- The Design Principle of Hash Function with Merkle-Damgård Construction
- Duo Lei, Da Lin2, Li Chao, Keqin Feng, and Longjiang Qu
-
2006/134 ( PDF )
- Identity Based Strong Designated Verifier Signature Scheme
- K. Phani Kumar and G. Shailaja and Ashutosh Saxena
-
2006/133 ( PDF )
- Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials
- Francisco Rodríguez-Henríquez and Guillermo Morales-Luna and Julio López-Hernández
-
2006/132 ( PDF )
- Conditional Reactive Simulatability
- Michael Backes and Markus Duermuth and Dennis Hofheinz and Ralf Kuesters
-
2006/131 ( PS PS.GZ PDF )
- Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
- Mike Burmester and Tri van Le and Breno de Medeiros
-
2006/130 ( PS PS.GZ )
- Simulatable Security and Polynomially Bounded Concurrent Composition
- Dennis Hofheinz and Dominique Unruh
-
2006/129 ( PDF )
- Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
- Wei Han and Dong Zheng and Ke-fei Chen
-
2006/128 ( PDF )
- On the existence of distortion maps on ordinary elliptic curves
- Denis Charles
-
2006/127 ( PS PS.GZ PDF )
- A New Cryptanalytic Time/Memory/Data Trade-off Algorithm
- Sourav Mukhopadhyay and Palash Sarkar
-
2006/126 ( PDF )
- ECGSC: Elliptic Curve based Generalized Signcryption Scheme
- Yiliang Han and Xiaoyuan Yang
-
2006/125 ( PDF )
- Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves
- Eunjeong Lee and Hyang-Sook Lee and Yoonjin Lee
-
2006/124 ( PDF )
- Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving
- K.W. Wong and Edward C.W. Lee and L.M. Cheng and Xiaofeng Liao
-
2006/123 ( PDF )
- Designated Confirmer Signatures Revisited
- Douglas Wikström
-
2006/122 ( PDF )
- Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
- Eike Kiltz
-
2006/121 ( PS PS.GZ PDF )
- Counting Prime Numbers with Short Binary Signed Representation
- José de Jesús Angel Angel and Guillermo Morales-Luna
-
2006/120 ( PDF )
- Key Privacy for Identity Based Encryption
- Jason E. Holt
-
2006/119 ( -- withdrawn -- )
- Repairing Attacks on a Password-Based Group Key Agreement
- Ratna Dutta and Rana Barua
-
2006/118 ( PS PS.GZ PDF )
- On construction of non-normal Boolean functions
- Sugata Gangopadhyay and Deepmala Sharma
-
2006/117 ( PDF )
- Conjectured Security of the ANSI-NIST Elliptic Curve RNG
- Daniel R. L. Brown
-
2006/116 ( PDF )
- Second Preimages for Iterated Hash Functions Based on a b-Block Bypass
- Mario Lamberger and Norbert Pramstaller and Vincent Rijmen
-
2006/115 ( PDF )
- Fast exponentiation via prime finite field isomorphism
- Alexander Rostovtsev
-
2006/114 ( PS PS.GZ PDF )
- Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five
- Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo
-
2006/113 ( PDF )
- A New Construction of Time Capsule Signature
- Miaomiao Zhang and Gongliang Chen and Jianhua Li and Licheng Wang and Haifeng Qian
-
2006/112 ( PS PS.GZ )
- Entity Authentication and Authenticated Key Exchange with Tree Parity Machines
- Markus Volkmer
-
2006/111 ( PS PS.GZ PDF )
- Attacking LCCC Batch Verification of RSA Signatures
- Martin Stanek
-
2006/110 ( PS PS.GZ PDF )
- The Eta Pairing Revisited
- F. Hess and N.P. Smart and F. Vercauteren
-
2006/109 ( PS PS.GZ PDF )
- A Simpler Sieving Device: Combining ECM and TWIRL
- Willi Geiselmann and Fabian Januszewski and Hubert Koepfer and Jan Pelzl and Rainer Steinwandt
-
2006/108 ( PDF )
- Efficient Public Key Encryption with Keyword Search Schemes from Pairings
- Chunxiang Gu and Yuefei Zhu and Yajuan Zhang
-
2006/107 ( PDF )
- The number field sieve for integers of low weight
- Oliver Schirokauer
-
2006/106 ( PS PS.GZ PDF )
- Further Refinement of Pairing Computation Based on Miller's Algorithm
- Chao-Liang Liu and Gwoboa Horng and Te-Yu Chen
-
2006/105 ( PDF )
- Tunnels in Hash Functions: MD5 Collisions Within a Minute
- Vlastimil Klima
-
2006/104 ( PDF )
- Fast Collision Attack on MD5
- Marc Stevens
-
2006/103 ( PS PS.GZ PDF )
- Security of VSH in the Real World
- Markku-Juhani O. Saarinen
-
2006/102 ( PS PS.GZ PDF )
- Efficient Blind and Partially Blind Signatures Without Random Oracles
- Tatsuaki Okamoto
-
2006/101 ( PS PS.GZ PDF )
- Information-theoretic analysis of coating PUFs
- B. Skoric and S. Maubach and T. Kevenaar and P. Tuyls
-
2006/100 ( PDF )
- A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability
- Zhou Sujing, Lin Dongdai
-
2006/099 ( PDF )
- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
- Dongvu Tonien and Reihaneh Safavi-Naini
-
2006/098 ( PS PS.GZ PDF )
- Gröbner Basis Based Cryptanalysis of SHA-1
- Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
-
2006/097 ( PDF )
- A Cryptographic Tour of the IPsec Standards
- Kenneth G. Paterson
-
2006/096 ( PDF )
- Sequential Aggregate Signatures and Multisignatures without Random Oracles
- Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters
-
2006/095 ( PDF )
- MAC Reforgeability
- John Black and Martin Cochran
-
2006/094 ( PS PS.GZ PDF )
- Cryptanalysis of the MEM Mode of Operation
- Peng Wang and Dengguo Feng and Wenling Wu
-
2006/093 ( PS PS.GZ PDF )
- RSA and a higher degree diophantine equation
- Abderrahmane Nitaj
-
2006/092 ( PS PS.GZ PDF )
- Cryptanalysis of RSA with constrained keys
- Abderrahmane Nitaj
-
2006/091 ( PS PS.GZ PDF )
- The Complexity of Online Memory Checking
- Moni Naor and Guy Rothblum
-
2006/090 ( PDF )
- Secure Sketch for Multi-Sets
- Ee-Chien Chang and Vadym Fedyukovych and Qiming Li
-
2006/089 ( PS PS.GZ PDF )
- A Tree-based Model of Unicast Stream Authentication
- Goce Jakimoski and Yvo Desmedt
-
2006/088 ( PDF )
- On the Feasibility of Consistent Computations
- Sven Laur and Helger Lipmaa
-
2006/087 ( PDF )
- Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons
- Barath Raghavan and Saurabh Panjwani and Anton Mityagin
-
2006/086 ( PDF )
- Analysis of the Linux Random Number Generator
- Zvi Gutterman and Benny Pinkas and Tzachy Reinman
-
2006/085 ( PS PS.GZ PDF )
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Xavier Boyen and Brent Waters
-
2006/084 ( PS PS.GZ PDF )
- Cryptography from Anonymity
- Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
-
2006/083 ( PDF )
- Browsers Defenses Against Phishing, Spoofing and Malware
- Amir Herzberg
-
2006/082 ( PS PS.GZ PDF )
- Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast
- HariGovind V. Ramasamy and Christian Cachin
-
2006/081 ( PS PS.GZ )
- Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine
- David Molnar and Tadayoshi Kohno and Naveen Sastry and David Wagner
-
2006/080 ( PDF )
- Efficient Identity-based Signatures Secure in the Standard Model
- Kenneth G. Paterson and Jacob C. N. Schuldt
-
2006/079 ( PS PS.GZ PDF )
- Towards Provably Secure Group Key Agreement Building on Group Theory
- Jens-Matthias Bohli and Benjamin Glas and Rainer Steinwandt
-
2006/078 ( PDF )
- Verifiable Random Permutations
- Yevgeniy Dodis and Prashant Puniya
-
2006/077 ( PDF )
- On Secret Sharing Schemes, Matroids and Polymatroids
- Jaume Marti-Farre and Carles Padro
-
2006/076 ( -- withdrawn -- )
- A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement
- Amitabh Saxena and Ben Soh
-
2006/075 ( PS PS.GZ PDF )
- ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM
- TOMOHIRO HARAYAMA
-
2006/074 ( PDF )
- How to Construct Sufficient Condition in Searching Collisions of MD5
- Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta
-
2006/073 ( PS PS.GZ PDF )
- Stronger Security of Authenticated Key Exchange
- Brian LaMacchia and Kristin Lauter and Anton Mityagin
-
2006/072 ( PDF )
- Cryptanalysis of the Bluetooth E0 Cipher using OBDD's
- Yaniv Shaked and Avishai Wool
-
2006/071 ( PS PS.GZ PDF )
- A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security
- Ueli Maurer and Johan Sjödin
-
2006/070 ( PDF )
- The experimental distinguishing attack on RC4
- Sergey Doroshenko and Boris Ryabko
-
2006/069 ( PS PS.GZ PDF )
- Automated Security Proofs with Sequences of Games
- Bruno Blanchet and David Pointcheval
-
2006/068 ( PDF )
- Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
- Michael Backes and Birgit Pfitzmann and Michael Waidner
-
2006/067 ( PS PS.GZ PDF )
- Scalar Multiplication on Koblitz Curves using Double Bases
- Roberto Avanzi and Francesco Sica
-
2006/066 ( PS PS.GZ PDF )
- Simple and Flexible Private Revocation Checking
- John Solis and Gene Tsudik
-
2006/065 ( PS PS.GZ PDF )
- On Expected Constant-Round Protocols for Byzantine Agreement
- Jonathan Katz and Chiu-Yuen Koo
-
2006/064 ( PS PS.GZ PDF )
- Perturbing and Protecting a Traceable Block Cipher
- Julien Bringer and Hervé Chabanne and Emmanuelle Dottax
-
2006/063 ( PS PS.GZ PDF )
- Provably Secure Universal Steganographic Systems
- Boris Ryabko and Daniil Ryabko
-
2006/062 ( -- withdrawn -- )
- A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries
- Debrup Chakraborty and Palash Sarkar
-
2006/061 ( -- withdrawn -- )
-
- Praveen Gauravaram and William Millan and Ed Dawson and Kapali Viswanathan
-
2006/060 ( -- withdrawn -- )
- An Efficient ID-based Signature Scheme from Pairings
- Chunxiang Gu and Yuefei Zhu and Xiaoyu Pan
-
2006/059 ( PS PS.GZ PDF )
- High Security Pairing-Based Cryptography Revisited
- R. Granger and D. Page and N.P. Smart
-
2006/058 ( PDF )
- Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
- Michael Backes and Sebastian Mödersheim and Birgit Pfitzmann and Luca Viganň
-
2006/057 ( PS PS.GZ PDF )
- Key Exchange Using Passwords and Long Keys
- Vladimir Kolesnikov and Charles Rackoff
-
2006/056 ( PDF )
- Key Exchange Protocols: Security Definition, Proof Method and Applications
- Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi
-
2006/055 ( PDF )
- Multicollision Attacks on some Generalized Sequential Hash Functions
- M. Nandi and D. R. Stinson
-
2006/054 ( PDF )
- How to Build a Low-Cost, Extended-Range RFID Skimmer
- Ilan Kirschenbaum and Avishai Wool
-
2006/053 ( PS PS.GZ PDF )
- Cryptanalysis of the CFVZ cryptosystem
- J. J. Climent and E. Gorla and J. Rosenthal
-
2006/052 ( PS PS.GZ PDF )
- Software mitigations to hedge AES against cache-based software side channel vulnerabilities
- Ernie Brickell and Gary Graunke and Michael Neve and Jean-Pierre Seifert
-
2006/051 ( PDF )
- Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems
- Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
-
2006/050 ( PDF )
- Secure Device Pairing based on a Visual Channel
- Nitesh Saxena and Jan-Erik Ekberg and Kari Kostiainen and N. Asokan
-
2006/049 ( PS PS.GZ )
- Crossword Puzzle Attack on NLS
- Joo Yeon Cho and Josef Pieprzyk
-
2006/048 ( PS PS.GZ PDF )
- New Results on Multipartite Access Structures
- Javier Herranz and German Saez
-
2006/047 ( PDF )
- Cryptographically Sound Theorem Proving
- Christoph Sprenger and Michael Backes and David Basin and Birgit Pfitzmann and Michael Waidner
-
2006/046 ( PS PS.GZ PDF )
- Efficient Primitives from Exponentiation in Zp
- Shaoquan Jiang
-
2006/045 ( PDF )
- Fully Collusion Resistant Traitor Tracing
- Dan Boneh and Amit Sahai and Brent Waters
-
2006/044 ( PS PS.GZ PDF )
- Linear Integer Secret Sharing and Distributed Exponentiation
- Ivan Damgard and Rune Thorbek
-
2006/043 ( PDF )
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Mihir Bellare
-
2006/042 ( PDF )
- Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
- Sourav Mukhopadhyay and Palash Sarkar
-
2006/041 ( PS PS.GZ PDF )
- Reactively Simulatable Certified Mail
- Birgit Pfitzmann and Matthias Schunter and Michael Waidner
-
2006/040 ( PDF )
- Linkable Democratic Group Signatures
- Mark Manulis and Ahmad-Reza Sadeghi and Joerg Schwenk
-
2006/039 ( PDF )
- Two-Round AES Differentials
- Joan Daemen and Vincent Rijmen
-
2006/038 ( PDF )
- Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field
- Jintai Ding and Jason E. Gower and Dieter S. Schmidt
-
2006/037 ( PS PS.GZ PDF )
- Message Authentication on 64-bit Architectures
- Ted Krovetz
-
2006/036 ( PDF )
- Vector Stream Cipher Instant Key Recovery
- Sean O'Neil
-
2006/035 ( PDF )
- Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
- Francisco Rodríguez-Henríquez and Guillermo Morales-Luna and Nazar A. Saqib and Nareli Cruz-Cortés
-
2006/034 ( PDF )
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
- Eike Kiltz and David Galindo
-
2006/033 ( PDF )
- Arithmetic of Generalized Jacobians
- Isabelle Déchčne
-
2006/032 ( PS PS.GZ PDF )
- Reducing the Number of Homogeneous Linear Equations in Finding Annihilators
- Deepak Kumar Dalai and Subhamoy Maitra
-
2006/031 ( PS PS.GZ PDF )
- On a Variation of Kurosawa-Desmedt Encryption Scheme
- Le Trieu Phong and Wakaha Ogata
-
2006/030 ( PDF )
- Improved cryptanalysis of Py
- Paul Crowley
-
2006/029 ( PS PS.GZ PDF )
- Authenticated Hybrid Encryption for Multiple Recipients
- Stéphanie Alt
-
2006/028 ( PDF )
- Cryptanalysis of recently proposed Remote User Authentication Schemes
- Thulasi Goriparthi, Manik Lal Das, Atul Negi and Ashutosh Saxena
-
2006/027 ( PS PS.GZ PDF )
- Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
- Vladimir Bayev
-
2006/026 ( PDF )
- Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
- David Freeman
-
2006/025 ( PDF )
- Signatures for Network Coding
- Denis Charles and Kamal Jain and Kristin Lauter
-
2006/024 ( PDF )
- Improving the Decoding Efficiency of Private Search
- George Danezis and Claudia Diaz
-
2006/023 ( PS PS.GZ PDF )
- A Method to Implement Direct Anonymous Attestation
- HE GE
-
2006/021 ( PDF )
- Cryptographic hash functions from expander graphs
- Denis Charles and Eyal Goren and Kristin Lauter
-
2006/020 ( PS PS.GZ PDF )
- Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
- Adam Smith
-
2006/019 ( PDF )
- Hermes8 : A Low-Complexity Low-Power Stream Cipher
- Ulrich Kaiser
-
2006/018 ( PS PS.GZ PDF )
- Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks
- Deepak Kumar Dalai and Kishan Chand Gupta and Subhamoy Maitra
-
2006/017 ( PS PS.GZ PDF )
- Threshold and Proactive Pseudo-Random Permutations
- Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung
-
2006/016 ( PDF )
- Message Modification for Step 21-23 on SHA-0
- Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta
-
2006/015 ( PS PS.GZ )
- A Family of Dunces: Trivial RFID Identification and Authentication Protocols
- Gene Tsudik
-
2006/014 ( PS PS.GZ PDF )
- Sound Computational Interpretation of Symbolic Hashes in the Standard Model
- Flavio D. Garcia and Peter van Rossum
-
2006/013 ( PDF )
- Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings
- Hung-Yu Chien
-
2006/012 ( PS PS.GZ PDF )
- Certificate-Based Encryption Without Random Oracles
- Paz Morillo and Carla R`{a}fols
-
2006/011 ( PDF )
- Formal Proof for the Correctness of RSA-PSS
- Christina Lindenberg and Kai Wirt and Johannes Buchmann
-
2006/010 ( PDF )
- Finding Characteristic Polynomials with Jump Indices
- Steve Babbage and Matthew Dodd
-
2006/009 ( PS PS.GZ PDF )
- Breaking and Fixing Public-Key Kerberos
- Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kay Tsay and Christopher Walstad
-
2006/008 ( PS PS.GZ PDF )
- A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers
- James A. Muir
-
2006/007 ( PDF )
- Further Discussions on the Security of a Nominative Signature Scheme
- Lifeng Guo and Guilin Wang and Duncan S. Wong
-
2006/006 ( PDF )
- Group Key Agreement for Ad Hoc Networks
- Lijun Liao
-
2006/005 ( PDF )
- Pairing Calculation on Supersingular Genus 2 Curves
- Colm O hEigeartaigh and Michael Scott
-
2006/004 ( PDF )
- Provably Secure Subsitution of Cryptographic Tools
- Lea Kissner and David Molnar
-
2006/003 ( PDF )
- Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography
- Dragos Trinca
-
2006/002 ( PDF )
- Geometric constructions of optimal linear perfect hash families
- S.G. Barwick and W.-A. Jackson.
-
2006/001 ( PS PS.GZ PDF )
- Homomorphic Cryptosystems and their Applications
- Doerte K. Rappe
-
2005/469 ( PDF )
- A lower bound on the higher order nonlinearity of algebraic immune functions
- C. Carlet
-
2005/468 ( PDF )
- Blind Attacks on Engineering Samples
- Vanessa Gratzer and David Naccache
-
2005/467 ( PDF )
- A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version)
- Ricardo Corin and Jerry den Hartog
-
2005/466 ( PDF )
- Cryptanalysis of the Yang -Wang's password authentication schemes
- Jue-Sam Chou and Ming-De Yang and Guey-Chuen Lee
-
2005/465 ( PDF )
- A sequence approach to constructing perfect hash families
- S.G. Barwick and W.-A. Jackson
-
2005/464 ( PS PS.GZ PDF )
- Equivalent Keys in Multivariate Quadratic Public Key Systems
- Christopher Wolf and Bart Preneel
-
2005/463 ( PDF )
- More short signatures without random oracles
- Victor K. Wei and Tsz Hon Yuen
-
2005/462 ( PS PS.GZ PDF )
- A Simplified Quadratic Frobenius Primality Test
- Martin Seysen
-
2005/461 ( PS PS.GZ PDF )
- Parallel and Concurrent Security of the HB and HB+ Protocols
- Jonathan Katz and Ji Sun Shin
-
2005/460 ( PDF )
- One-Time HNP or Attacks on a Flawed El Gamal Revisited
- Tomas Rosa
-
2005/459 ( PS PS.GZ PDF )
- A Practical Attack on the Root Problem in Braid Groups
- Anja Groch and Dennis Hofheinz and Rainer Steinwandt
-
2005/458 ( PS PS.GZ PDF )
- Seifert's RSA Fault Attack: Simplified Analysis and Generalizations
- James A. Muir
-
2005/457 ( PDF )
- Weakness of shimˇ¦s New ID-based tripartite multiple-key agreement protocol
- Jue-Sam Chou and Chu-Hsing Lin and Chia-Hung Chiu
-
2005/456 ( PDF )
- A Secure Scheme for Authenticated Encryption
- Fuw-Yi Yang
-
2005/455 ( PDF )
- Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange
- Robert W. Zhu and Xiaojian Tian and Duncan S. Wong
-
2005/454 ( PS PS.GZ PDF )
- Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics
- Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi
-
2005/453 ( PDF )
- Further Constructions of Almost Resilient Functions
- Pinhui Ke and Jie Zhang and Qiaoyan Wen
-
2005/452 ( PDF )
- Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
- Ran Canetti and Ling Cheung and Dilsun Kaynar and Moses Liskov and Nancy Lynch and Olivier Pereira and Roberto Segala
-
2005/451 ( PDF )
- Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
- Jue-Sam Chou and Yalin Chen and Ming-De Yang
-
2005/450 ( PDF )
- Improvement of Manik et al.ˇ¦s remote user authentication scheme
- Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
-
2005/449 ( PDF )
- On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count
- Longjiang Qu and Guozhu Feng and Chao Li
-
2005/448 ( PS PS.GZ PDF )
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)
- Souradyuti Paul and Bart Preneel
-
2005/447 ( PDF )
- A new key exchange protocol based on the decomposition problem
- Vladimir Shpilrain and Alexander Ushakov
-
2005/446 ( PDF )
- Democratic Group Signatures on Example of Joint Ventures
- Mark Manulis
-
2005/445 ( PS PS.GZ PDF )
- An Anonymous Authentication Scheme for Trusted Computing Platform
- HE GE
-
2005/444 ( PDF )
- Privacy-Preserving Polling using Playing Cards
- Sid Stamm and Markus Jakobsson
-
2005/443 ( PDF )
- Revised: Block Cipher Based Hash Function Construction From PGV
- Duo Lei
-
2005/442 ( PDF )
- One-Time Signatures Revisited: Have They Become Practical?
- Dalit Naor and Amir Shenhav and Avishai Wool
-
2005/441 ( PS PS.GZ PDF )
- Tight bound between nonlinearity and algebraic immunity
- Mikhail Lobanov
-
2005/440 ( -- withdrawn -- )
- HB++: a Lightweight Authentication Protocol Secure against Some Attacks
- Julien Bringer and Hervé Chabanne and Emmanuelle Dottax
-
2005/439 ( PDF )
- A note on the n-spendable extension of Ferguson's single-term off-line coins
- T. C. Lam
-
2005/438 ( PS PS.GZ PDF )
- Minimal Assumptions for Efficient Mercurial Commitments
- Yevgeniy Dodis
-
2005/437 ( -- withdrawn -- )
- On Boolean functions with maximum algebraic immunity
- Enes Pasalic
-
2005/436 ( PDF )
- A Note on the Kasami Power Function
- Doreen Hertel
-
2005/435 ( PDF )
- Concurrent Blind Signatures without Random Oracles
- Aggelos Kiayias and Hong-Sheng Zhou
-
2005/434 ( PDF )
- Prompted User Retrieval of Secret Entropy: The Passmaze Protocol
- Daniel R. L. Brown
-
2005/433 ( PDF )
- Proxy Re-Signatures: New Definitions, Algorithms, and Applications
- Giuseppe Ateniese and Susan Hohenberger
-
2005/432 ( PS PS.GZ PDF )
- On the Security of Kaweichel
- Dieter Schmidt
-
2005/431 ( PS PS.GZ PDF )
- Is it possible to have CBE from CL-PKE?
- Bo Gyeong Kang and Je Hong Park
-
2005/430 ( PDF )
- F-HASH: Securing Hash Functions Using Feistel Chaining
- Duo Lei
-
2005/429 ( PDF )
- Signature from a New Subgroup Assumption
- Victor K. Wei
-
2005/428 ( PS PS.GZ PDF )
- Loud and Clear: Human-Verifiable Authentication Based on Audio
- Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun
-
2005/427 ( PDF )
- Solutions to Key Exposure Problem in Ring Signature
- Joseph K. Liu and Duncan S. Wong
-
2005/426 ( PDF )
- On the Security of a Certificateless Public-Key Encryption
- Zhenfeng Zhang and Dengguo Feng
-
2005/425 ( PDF )
- Improved Collision Attack on Hash Function MD5
- Jie Liang and Xuejia Lai
-
2005/424 ( PS PS.GZ PDF )
- Efficient Mutual Data Authentication Using Manually Authenticated Strings
- Sven Laur and N. Asokan and Kaisa Nyberg
-
2005/423 ( -- withdrawn -- )
- ID-based signature and Key-insulated threshold signature
- Jin Li and Fangguo Zhang
-
2005/422 ( PDF )
- On Anonymity of Group Signatures
- Zhou Sujing and Lin Dongdai
-
2005/421 ( PS PS.GZ )
- Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
- Michael Backes and Birgit Pfitzmann and Andre Scedrov
-
2005/420 ( PS PS.GZ PDF )
- Efficient Scalar Multiplication by Isogeny Decompositions
- Christophe Doche and Thomas Icart and David R. Kohel
-
2005/419 ( PDF )
- Unified Point Addition Formulæ and Side-Channel Attacks
- Douglas Stebila and Nicolas Thériault
-
2005/418 ( PDF )
- Generic On-Line/Off-Line Threshold Signatures
- Chris Crutchfield and David Molnar and David Turner and David Wagner
-
2005/417 ( PS PS.GZ PDF )
- Correlation-Resistant Storage via Keyword-Searchable Encryption
- Lucas Ballard and Matthew Green and Breno de Medeiros and Fabian Monrose
-
2005/416 ( PDF )
- Cryptography in Theory and Practice: The Case of Encryption in IPsec
- Kenneth G. Paterson and Arnold K.L. Yau
-
2005/415 ( -- withdrawn -- )
- A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512
- Benjamin Gittins and Howard A. Landman and Sean O'Neil and Ron Kelson
-
2005/414 ( -- withdrawn -- )
- Authenticated Encryption Mode of VEST Ciphers
- Sean O'Neil and Benjamin Gittins
-
2005/413 ( -- withdrawn -- )
- VEST Hardware-Dedicated Stream Ciphers
- Sean O'Neil and Benjamin Gittins and Howard A. Landman
-
2005/412 ( PDF )
- Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles
- Tsz Hon Yuen and Victor K. Wei
-
2005/411 ( PDF )
- More Compact E-Cash with Efficient Coin Tracing
- Victor K. Wei
-
2005/410 ( PDF )
- Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows
- Victor K. Wei
-
2005/409 ( -- withdrawn -- )
- Intrusion-Resilient Authentication in the Limited Communication Model
- David Cash and Yan Zong Ding and Wenke Lee and Richard Lipton
-
2005/408 ( PDF )
- Compartmented Secret Sharing Based on the Chinese Remainder Theorem
- Sorin Iftene
-
2005/407 ( PDF )
- Anonymous Signature Schemes
- Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang
-
2005/406 ( PS PS.GZ PDF )
- Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited
- Dominique Unruh
-
2005/405 ( PS PS.GZ PDF )
- Building Better Signcryption Schemes with Tag-KEMs
- Tor E. Bjørstad and Alexander W. Dent
-
2005/404 ( PDF )
- Preventing Attacks on Machine Readable Travel Documents (MRTDs)
- Gaurav S. Kc and Paul A. Karger
-
2005/403 ( PDF )
- Collisions in the Original Version of a Chaotic Hash Function
- Scott Contini
-
2005/402 ( PS PS.GZ PDF )
- Some Analysis of Radix-r Representations
- Dong-Guk Han and Tsuyoshi Takagi
-
2005/401 ( PS PS.GZ PDF )
- A Computationally Sound Mechanized Prover for Security Protocols
- Bruno Blanchet
-
2005/400 ( PDF )
- Improved Collision Attack on MD5
- Yu Sasaki and Yusuke Naito and Noboru Kunihiro and Kazuo Ohta
-
2005/399 ( PS PS.GZ )
- On affine rank of spectrum support for plateaued function
- Yuriy Tarannikov
-
2005/398 ( PDF )
- Preliminary Analysis of DHA-256
- IAIK Krypto Group
-
2005/397 ( PDF )
- Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
- Neil Kauer and Tony Suarez and Yuliang Zheng
-
2005/396 ( PS PS.GZ PDF )
- Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata
- Pallavi Joshi and Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
-
2005/395 ( PDF )
- Secure Group Key Establishment Revisited
- Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
-
2005/394 ( PDF )
- How to Shuffle in Public
- Ben Adida and Douglas Wikström
-
2005/393 ( PS PS.GZ PDF )
- Multivariate Quadratic Polynomials in Public Key Cryptography
- Christopher Wolf
-
2005/392 ( PDF )
- An Efficient Variant of RSA Cryptosystem
- Sahadeo Padhye
-
2005/391 ( PS PS.GZ PDF )
- Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1
- Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto
-
2005/390 ( PS PS.GZ PDF )
- 3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
- Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto and Edward Dawson
-
2005/389 ( PS PS.GZ PDF )
- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
- KyungKeun Lee and JoongHyo Oh and SangJae Moon
-
2005/388 ( PDF )
- Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
- YongBin Zhou and DengGuo Feng
-
2005/387 ( PDF )
- On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)
- C. Carlet
-
2005/386 ( PS PS.GZ PDF )
- A New Short Signature Scheme Without Random Oracles from Bilinear Pairings
- Fangguo Zhang, Xiaofeng Chen, Willy Susilo and Yi Mu
-
2005/385 ( PDF )
- Practical Group Signatures without Random Oracles
- Giuseppe Ateniese and Jan Camenisch and Susan Hohenberger and Breno de Medeiros
-
2005/384 ( PS PS.GZ PDF )
- Some Explicit Formulae of NAF and its Left-to-Right Analogue
- Dong-Guk Han and Tetsuya Izu and Tsuyoshi Takagi
-
2005/383 ( PS PS.GZ PDF )
- Key Mixing in Block Ciphers through Addition modulo $2^n$
- Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
-
2005/382 ( PDF )
- One-Wayness Equivalent to General Factoring
- Kaoru Kurosawa and Tsuyoshi Takagi
-
2005/381 ( PDF )
- Compact Group Signatures Without Random Oracles
- Xavier Boyen and Brent Waters
-
2005/380 ( PDF )
- Breaking RSA May Be As Difficult As Factoring
- Daniel R. L. Brown
-
2005/379 ( PS PS.GZ PDF )
- Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
- Jonathan Katz and Yehuda Lindell
-
2005/378 ( PDF )
- A New Protocol for Conditional Disclosure of Secrets And Its Applications
- Sven Laur and Helger Lipmaa
-
2005/377 ( PS PS.GZ PDF )
- Exclusion-Intersection Encryption
- Sherman S.M. Chow and Siu-Ming Yiu
-
2005/376 ( PDF )
- Representing small identically self-dual matroids by self-dual codes
- Carles Padro and Ignacio Gracia
-
2005/375 ( PDF )
- Truncated differential cryptanalysis of five rounds of Salsa20
- Paul Crowley
-
2005/374 ( PDF )
- Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7
- Kunpeng Wang, Bao Li
-
2005/373 ( PS PS.GZ PDF )
- Efficient Broadcast Encryption Scheme with Log-Key Storage
- Yong Ho Hwang and Pil Joong Lee
-
2005/372 ( PDF )
- Secret color images sharing schemes based on XOR operation
- Dao-Shun Wang, Lei Zhang, Ning Ma and Lian-Sheng Huang
-
2005/371 ( PDF )
- On a Traitor Tracing Scheme from ACISP 2003
- Dongvu Tonien
-
2005/370 ( PS PS.GZ PDF )
- Resource Fairness and Composability of Cryptographic Protocols
- Juan A. Garay and Philip MacKenzie and Manoj Prabhakaran and Ke Yang
-
2005/369 ( PDF )
- Secure and {\sl Practical} Identity-Based Encryption
- David Naccache
-
2005/368 ( PDF )
- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
- David Molnar and Matt Piotrowski and David Schultz and David Wagner
-
2005/367 ( PDF )
- Searchable Keyword-Based Encryption
- Dong Jin Park, Juyoung Cha, and Pil Joong Lee
-
2005/366 ( PS PS.GZ PDF )
- Efficient Compilers for Authenticated Group Key Exchange
- Qiang Tang and Chris J. Mitchell
-
2005/365 ( PS PS.GZ PDF )
- Derandomization in Cryptography
- Boaz Barak and Shien Jin Ong and Salil Vadhan
-
2005/364 ( PS PS.GZ PDF )
- Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs
- Amitabh Saxena
-
2005/363 ( PDF )
- Elliptic Curves with Low Embedding Degree
- Florian Luca and Igor E. Shparlinski
-
2005/362 ( PS PS.GZ PDF )
- On a (Flawed) Proposal to Build More Pairing-Friendly Curves
- Michael Scott and Paulo S. L. M. Barreto
-
2005/361 ( PS PS.GZ PDF )
- Strict Avalanche Criterion Over Finite Fields
- Yuan Li and T.W.Cusick
-
2005/360 ( PS PS.GZ )
- Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
- Jens Matthias-Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
-
2005/359 ( PS PS.GZ PDF )
- An infinite class of quadratic APN functions which are not equivalent to power mappings
- L. Budaghyan and C. Carlet and P. Felke and G. Leander
-
2005/358 ( PDF )
- Normal Basis Multiplication Algorithms for GF(2n) (Full Version)
- Haining Fan and Duo Liu and Yiqi Dai
-
2005/357 ( PDF )
- Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
- Kyung-Ah Shim
-
2005/356 ( PDF )
- Exponential Memory-Bound Functions for Proof of Work Protocols
- Fabien Coelho
-
2005/355 ( PS PS.GZ PDF )
- ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
- Rongxing Lu and Zhenfu Cao
-
2005/354 ( PS PS.GZ PDF )
- Pairing-Based Two-Party Authenticated Key Agreement Protocol
- Rongxing Lu and Zhenfu Cao and Renwang Su and Jun Shao
-
2005/353 ( PS PS.GZ PDF )
- On the Security of A Group Signature Scheme
- Jianhong Zhang, Wei Zou,
-
2005/352 ( PS PS.GZ PDF )
- Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
- Danilo Gligoroski
-
2005/351 ( PS PS.GZ PDF )
- Errors in Computational Complexity Proofs for Protocols
- Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
-
2005/350 ( PS PS.GZ )
- Is SHA-1 conceptually sound?
- Charanjit S. Jutla and Anindya C. Patthak
-
2005/349 ( PS PS.GZ PDF )
- Oblivious Transfer and Linear Functions
- Ivan B. Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner
-
2005/348 ( -- withdrawn -- )
- On Proofs of Security for Certificateless Cryptosystems
- Alexander W. Dent and Caroline Kudla
-
2005/347 ( -- withdrawn -- )
- Knapsack Diffie-Hellman: A New Family of Diffie-Hellman
- Song Han and Elizabeth Chang and Tharam Dillon
-
2005/346 ( PS PS.GZ )
- Batch Verification of Validity of Bids in Homomorphic E-auction
- Kun Peng, Colin Boyd and Ed Dawson
-
2005/345 ( PDF )
- Group Signatures with Efficient Concurrent Join
- Aggelos Kiayias and Moti Yung
-
2005/344 ( PS PS.GZ PDF )
- Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems.
- Tapan Rai
-
2005/343 ( PS PS.GZ PDF )
- Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings
- Amitabh Saxena and Serguey Priymak and Ben Soh
-
2005/342 ( PDF )
- Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems
- Pu Duan and Shi Cui and Choong Wah Chan
-
2005/341 ( PS PS.GZ PDF )
- A Universally Composable Scheme for Electronic Cash
- Marten Trolin
-
2005/340 ( -- withdrawn -- )
- A New Approach to Counteract DPA Attacks on Block Ciphers
- Christophe Giraud and Emmanuel Prouff
-
2005/339 ( PS PS.GZ PDF )
- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
- Zhaohui Cheng and Liqun Chen and Richard Comley and Qiang Tang
-
2005/338 ( PDF )
- An Improved Power Analysis Attack Against Camellia's Key Schedule
- Lu Xiao and Howard M. Heys
-
2005/337 ( PDF )
- Statistical Multiparty Computation Based on Random Walks on Graphs
- Liangliang Xiao, Mulan Liu, and Zhifang Zhang
-
2005/336 ( PDF )
- Pairing-based identification schemes
- David Freeman
-
2005/335 ( PS PS.GZ PDF )
- One-Way Signature Chaining - A New Paradigm For Group Cryptosystems
- Amitabh Saxena and Ben Soh
-
2005/334 ( PS PS.GZ PDF )
- Secure Key-Updating for Lazy Revocation
- Michael Backes and Christian Cachin and Alina Oprea
-
2005/333 ( PDF )
- Universally Composable Disk Encryption Schemes
- Ivan Damgård and Kasper Dupont
-
2005/332 ( PS PS.GZ PDF )
- Classification of Cubic $(n-4)$-resilient Boolean Functions
- An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel
-
2005/331 ( PS PS.GZ PDF )
- A Fuzzy Sketch with Trapdoor
- Julien Bringer and Hervé Chabanne and Quoc Dung Do
-
2005/330 ( PDF )
- A Dedicated Processor for the eta Pairing
- Robert Ronan and Colm O hEigeartaigh and Colin Murphy and Michael Scott and Tim Kerins and W.P. Marnane
-
2005/329 ( PDF )
- Cryptographic Protocols to Prevent Spam
- Amir Herzberg
-
2005/328 ( PDF )
- On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
- Jonathan Katz and Chiu-Yuen Koo
-
2005/327 ( PS PS.GZ PDF )
- On the Security of Encryption Modes of MD4, MD5 and HAVAL
- Jongsung Kim and Alex Biryukov and Bart Preneel and Sangjin Lee
-
2005/326 ( PDF )
- A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
- Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
-
2005/325 ( PS PS.GZ PDF )
- An Effective Method to Implement Group Signature with Revocation
- HE GE
-
2005/324 ( PS PS.GZ PDF )
- Extracting bits from coordinates of a point of an elliptic curve
- Nicolas Gürel
-
2005/323 ( PDF )
- The Weil pairing on elliptic curves over C
- Steven D. Galbraith
-
2005/322 ( PDF )
- Evolutionary Design of Trace Form Bent Functions
- Min yang and Qingshu Meng and Huanguo Zhang
-
2005/321 ( PS PS.GZ PDF )
- Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)
- Liam Keliher and Jiayuan Sui
-
2005/320 ( PDF )
- Efficient Identity-Based Encryption with Tight Security Reduction
- Nuttapong Attrapadung and Benoit Chevallier-Mames and Jun Furukawa and Takeshi Gomi and Goichiro Hanaoka and Hideki Imai and Rui Zhang
-
2005/319 ( PS PS.GZ PDF )
- ID-based Restrictive Partially Blind Signatures and Applications
- Xiaofeng Chen and Fangguo Zhang and Shengli Liu
-
2005/318 ( PDF )
- Bounds on Birthday Attack Times
- Michael J. Wiener
-
2005/317 ( PS PS.GZ PDF )
- Ring Signatures without Random Oracles
- Sherman S. M. Chow and Joseph K. Liu and Victor K. Wei and Tsz Hon Yuen
-
2005/316 ( PS PS.GZ PDF )
- Collision Attack on XTR and a Countermeasure with a Fixed Pattern
- Dong-Guk Han and Tsuyoshi Takagi and Tae Hyun Kim and Ho Won Kim and Kyo Il Chung
-
2005/315 ( PDF )
- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
- David Molnar and Andrea Soppera and David Wagner
-
2005/314 ( PS PS.GZ PDF )
- Fast genus 2 arithmetic based on Theta functions
- P. Gaudry
-
2005/313 ( PS PS.GZ PDF )
- Deterministic Identity-Based Signatures for Partial Aggregation
- Javier Herranz
-
2005/312 ( PDF )
- A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations
- Xijin Tang and Yong Feng
-
2005/311 ( PDF )
- What do S-boxes Say in Differential Side Channel Attacks?
- Cecile Canovas and Jessy Clediere
-
2005/310 ( PS PS.GZ PDF )
- Meta Ring Signature
- Hiroyuki OKAZAKI and Ryuichi SAKAI and Masao KASAHARA
-
2005/309 ( PS PS.GZ PDF )
- A New Efficient ID-Based Authenticated Key Agreement Protocol
- Quan Yuan and Songping Li
-
2005/308 ( PDF )
- Adaptable Group-Oriented Signature
- Chunbo Ma, Jun Ao, and Dake He
-
2005/307 ( PS PS.GZ PDF )
- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited
- K. Bentahar
-
2005/306 ( PDF )
- Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes---
- Yasuyuki MURAKAMI, Masao KASAHARA
-
2005/305 ( PDF )
- Steganography with Imperfect Samplers
- Anna Lysyanskaya and Maria Meyerovich
-
2005/304 ( PS PS.GZ PDF )
- Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
- Adam Bender and Jonathan Katz and Ruggero Morselli
-
2005/303 ( PDF )
- Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
- Kevin Fu and Seny Kamara and Tadayoshi Kohno
-
2005/302 ( PS PS.GZ PDF )
- Elliptic Curves for Pairing Applications
- Angela Murphy and Noel Fitzpatrick
-
2005/301 ( PDF )
- On the Hardware Implementation of the MICKEY-128 Stream Cipher
- Paris Kitsos
-
2005/300 ( PS PS.GZ PDF )
- Towards Security Two-part Authenticated Key Agreement Protocols
- Songping Li and Quan Yuan and Jin Li
-
2005/299 ( PDF )
- Nonlinearity of the Round Function
- Marcin Kontak and Janusz Szmidt
-
2005/298 ( PDF )
- Keeping Denial-of-Service Attackers in the Dark
- Gal Badishi and Amir Herzberg and Idit Keidar
-
2005/297 ( PS PS.GZ PDF )
- DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining
- Maithili Narasimha and Gene Tsudik
-
2005/296 ( PS PS.GZ PDF )
- A Key Establishment IP-Core for Ubiquitous Computing
- Markus Volkmer and Sebastian Wallner
-
2005/295 ( PS PS.GZ PDF )
- Hidden Exponent RSA and Efficient Key Distribution
- HE GE
-
2005/294 ( PS PS.GZ PDF )
- On Fairness in Simulatability-based Cryptographic Systems
- Michael Backes and Dennis Hofheinz and Jörn Müller-Quade and Dominique Unruh
-
2005/293 ( PDF )
- Speeding Up Pairing Computation
- Colm O hEigeartaigh
-
2005/292 ( PDF )
- Improved Integral Cryptanalysis of FOX Block Cipher
- Wu Wenling, Zhang Wentao, and Feng Dengguo
-
2005/291 ( PDF )
- Cryptography In the Bounded Quantum-Storage Model
- Ivan Damgård and Serge Fehr and Louis Salvail and Christian Schaffner
-
2005/290 ( PS PS.GZ PDF )
- Perfect Non-Interactive Zero Knowledge for NP
- Jens Groth and Rafail Ostrovsky and Amit Sahai
-
2005/289 ( PS PS.GZ PDF )
- Overview of Key Agreement Protocols
- Ratna Dutta and Rana Barua
-
2005/288 ( PS PS.GZ PDF )
- Direct Chosen Ciphertext Security from Identity-Based Techniques
- Xavier Boyen and Qixiang Mei and Brent Waters
-
2005/287 ( PS PS.GZ PDF )
- Provable Efficient Certificateless Public Key Encryption
- Yijuan Shi and Jianhua Li
-
2005/286 ( PS PS.GZ PDF )
- Concurrent Zero Knowledge without Complexity Assumptions
- Daniele Micciancio and Shien Jin Ong and Amit Sahai and Salil Vadhan
-
2005/285 ( PS PS.GZ PDF )
- Generalizations of RSA public key cryptosystems
- Li Banghe
-
2005/284 ( PS PS.GZ PDF )
- Foundations and Applications for Secure Triggers
- Ariel Futoransky and Emiliano Kargieman and Carlos Sarraute and Ariel Waissbein
-
2005/283 ( PS PS.GZ PDF )
- Revisiting Oblivious Signature-Based Envelopes
- Samad Nasserian, Gene Tsudik
-
2005/282 ( PS PS.GZ PDF )
- Spreading Alerts Quietly and the Subgroup Escape Problem
- James Aspnes and Zoë Diamadi and Kristian Gjřsteen and René Peralta and Aleksandr Yampolskiy
-
2005/281 ( PDF )
- Herding Hash Functions and the Nostradamus Attack
- John Kelsey and Tadayoshi Kohno
-
2005/280 ( PS PS.GZ PDF )
- Partitioned Cache Architecture as a Side-Channel Defence Mechanism
- D. Page
-
2005/279 ( PS PS.GZ PDF )
- Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model
- Bao Li and Hongda Li and Guangwu Xu and Haixia Xu
-
2005/278 ( PS PS.GZ PDF )
- A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications
- Katja Schmidt-Samoa
-
2005/277 ( PS PS.GZ PDF )
- Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions
- Fumiyuki Momose and Jinhui Chao
-
2005/276 ( PDF )
- Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
- Jung Hee Cheon and Dong Hoon Lee
-
2005/275 ( PDF )
- Explicit Construction of Secure Frameproof Codes
- Dongvu Tonien and Reihaneh Safavi-Naini
-
2005/274 ( PDF )
- Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign
- Jeff Hoffstein and Nick Howgrave-Graham and Jill Pipher and Joseph H. Silverman and William Whyte
-
2005/273 ( PDF )
- CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III
- P G Vaidya and Sajini Anand
-
2005/272 ( PDF )
- An Authentication Protocol For Mobile Agents Using Bilinear Pairings
- Amitabh Saxena and Ben Soh
-
2005/271 ( PS PS.GZ PDF )
- Cache attacks and Countermeasures: the Case of AES
- Dag Arne Osvik and Adi Shamir and Eran Tromer
-
2005/270 ( PS PS.GZ PDF )
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
-
2005/269 ( PS PS.GZ PDF )
- Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing
- Junghyun Nam, Seungjoo Kim, and Dongho Won
-
2005/268 ( PDF )
- Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI
- Shujun Li and Heung-Yeung Shum
-
2005/267 ( PS PS.GZ PDF )
- Stream Cipher Design based on Jumping Finite State Machines
- Cees J.A. Jansen
-
2005/266 ( PS PS.GZ PDF )
- A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code
- Charanjit S. Jutla and Anindya C. Patthak
-
2005/265 ( PS PS.GZ PDF )
- Security Analysis of KEA Authenticated Key Exchange Protocol
- Kristin Lauter and Anton Mityagin
-
2005/264 ( PS PS.GZ PDF )
- On an authentication scheme based on the Root Problem in the braid group
- Boaz Tsaban
-
2005/263 ( PDF )
- Wang's sufficient conditions of MD5 are not sufficient
- Jun Yajima and Takeshi Shimoyama
-
2005/262 ( PS PS.GZ PDF )
- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
- Ivan Damgård and Yuval Ishai
-
2005/261 ( PS PS.GZ PDF )
- The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model
- Alexander W. Dent
-
2005/260 ( PS PS.GZ PDF )
- Powered Tate Pairing Computation
- Bo Gyeong Kang and Je Hong Park
-
2005/259 ( PS PS.GZ PDF )
- Efficient Delegation of Pairing Computation
- Bo Gyeong Kang and Moon Sung Lee and Je Hong Park
-
2005/258 ( PS PS.GZ PDF )
- Relations Among Notions of Security for Identity Based Encryption Schemes
- Nuttapong Attrapadung and Yang Cui and Goichiro Hanaoka and Hideki Imai and Kanta Matsuura and Peng Yang and Rui Zhang
-
2005/257 ( PS PS.GZ PDF )
- TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY
- Jin Hong and Woo-Hwan Kim
-
2005/256 ( PDF )
- Fuzzy Universal Hashing and Approximate Authentication
- Reihaneh Safavi-Naini and Dongvu Tonien
-
2005/255 ( PDF )
- Inoculating Multivariate Schemes Against Differential Attacks
- Jintai Ding and Jason E. Gower
-
2005/254 ( PS PS.GZ PDF )
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone-Lee and Gregory Neven and Pascal Paillier and Haixia Shi
-
2005/253 ( PS PS.GZ PDF )
- Security Notions for Identity Based Encryption
- David Galindo and Ichiro Hasuo
-
2005/252 ( PDF )
- Faster Pairings using an Elliptic Curve with an Efficient Endomorphism
- Michael Scott
-
2005/251 ( PS PS.GZ PDF )
- Feistel Schemes and Bi-Linear Cryptanalysis
- Nicolas Courtois
-
2005/250 ( PDF )
- The topology of covert conflict
- Shishir Nagaraja, Ross Anderson
-
2005/249 ( -- withdrawn -- )
- Efficient Certificateless Public Key Encryption
- Yijuan Shi and Jianhua Li
-
2005/248 ( PS PS.GZ PDF )
- Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing
- Michael Szydlo and Yiqun Lisa Yin
-
2005/247 ( PS PS.GZ PDF )
- A Simple and Provably Good Code for SHA Message Expansion
- Charanjit S. Jutla and Anindya C. Patthak
-
2005/246 ( PS PS.GZ PDF )
- A Verifiable Secret Shuffle of Homomorphic Encryptions
- Jens Groth
-
2005/245 ( PS PS.GZ PDF )
- On the Algebraic Immunity of Symmetric Boolean Functions
- An Braeken and Bart Preneel
-
2005/244 ( PS PS.GZ PDF )
- Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
- Boaz Tsaban
-
2005/243 ( PS PS.GZ PDF )
- Cryptanalysis of Sfinks
- Nicolas T. Courtois
-
2005/242 ( PS PS.GZ PDF )
- Private Searching On Streaming Data
- Rafail Ostrovsky and William E. Skeith III
-
2005/241 ( PS PS.GZ )
- On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities
- Hao Chen and Liqing Xu
-
2005/240 ( PS PS.GZ PDF )
- Attack on Okamoto et al.'s New Short Signature Schemes
- Fangguo Zhang and Xiaofeng Chen
-
2005/239 ( PDF )
- A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
- Raylin Tso and Ying Miao and Takeshi Okamoto and Eiji Okamoto
-
2005/238 ( -- withdrawn -- )
- Simple and Provable Secure Strong Designated Verifier Signature Schemes
- Raylin Tso and Takeshi Okamoto and Eiji Okamoto
-
2005/237 ( PDF )
- An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
- Henri Gilbert and Matt Robshaw and Herve Sibert
-
2005/236 ( PDF )
- Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves
- Pu Duan and Shi Cui and Choong Wah Chan
-
2005/235 ( PS PS.GZ PDF )
- Tree Parity Machine Rekeying Architectures for Embedded Security
- Markus Volkmer and Sebastian Wallner
-
2005/234 ( PDF )
- LILI-II is not Broken
- William Millan and Ed Dawson
-
2005/233 ( PDF )
- On the Entropy of Arcfour Keys
- Luke O'Connor
-
2005/232 ( PS PS.GZ PDF )
- Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines
- Markus Volkmer and Sebastian Wallner
-
2005/231 ( PS PS.GZ PDF )
- Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
- Boaz Tsaban
-
2005/230 ( -- withdrawn -- )
- Yet Another Short Signatures Without Random Oracles from Bilinear Pairings
- Fangguo Zhang and Xiaofeng Chen
-
2005/229 ( PS PS.GZ PDF )
- Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
- Deepak Kumar Dalai and Subhamoy Maitra and Sumanta Sarkar
-
2005/228 ( PS PS.GZ PDF )
- Efficient Doubling on Genus 3 Curves over Binary Fields
- Xinxin Fan and Thomas Wollinger and Yumin Wang
-
2005/227 ( PS PS.GZ PDF )
- Threshold Ring Signatures Efficient for Large Sets of Signers
- K. Maneva-Jakimoska and G. Jakimoski and M. Burmester
-
2005/226 ( PS PS.GZ PDF )
- Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
- Liqun Chen and Zhaohui Cheng
-
2005/225 ( PDF )
- Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving
- Roberto M. Avanzi and Clemens Heuberger and Helmut Prodinger
-
2005/224 ( PS PS.GZ PDF )
- An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction
- L. Chen and Z. Cheng and J. Malone-Lee and N.P. Smart
-
2005/223 ( PS PS.GZ PDF )
- Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups
- Ayan Mahalanobis
-
2005/222 ( PS PS.GZ PDF )
- Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis
- Min Feng and Bin B.Zhu and Maozhi Xu and Shipeng Li
-
2005/221 ( PS PS.GZ PDF )
- Constant Round Dynamic Group Key Agreement
- Ratna Dutta and Rana Barua
-
2005/220 ( PS PS.GZ )
- Limits of the Cryptographic Realization of Dolev-Yao-style XOR
- Michael Backes and Birgit Pfitzmann
-
2005/219 ( PS PS.GZ PDF )
- Cryptanalysis of a 32-bit RC4-like Stream Cipher
- Hongjun Wu
-
2005/218 ( PS PS.GZ PDF )
- The conjugacy problem and related problems in lattice-ordered groups
- W. Charles Holland and Boaz Tsaban
-
2005/217 ( PS PS.GZ PDF )
- Efficient Identity-Based Key Encapsulation to Multiple Parties
- M. Barbosa and P. Farshim
-
2005/216 ( PDF )
- A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret
- Hassan Jameel and Sungyoung Lee
-
2005/215 ( PS PS.GZ PDF )
- Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes
- Jason E. Holt
-
2005/214 ( PS PS.GZ PDF )
- TMTO With Multiple Data: Analysis and New Single Table Trade-offs
- Sourav Mukhopadhyay and Palash Sarkar
-
2005/213 ( -- withdrawn -- )
- A Counter-based MAC Revisited: Towards Better Security
- Eonkyung Lee
-
2005/212 ( PDF )
- Probability distributions of Correlation and Differentials in Block Ciphers
- Joan Daemen and Vincent Rijmen
-
2005/211 ( PDF )
- Games and the Impossibility of Realizable Ideal Functionality
- Anupam Datta and Ante Derek and John C. Mitchell and Ajith Ramanathan and Andre Scedrov
-
2005/210 ( PS PS.GZ PDF )
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
- John Black
-
2005/209 ( PS PS.GZ PDF )
- Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
- Jin Wook Byun and Dong Hoon Lee
-
2005/208 ( -- withdrawn -- )
- On Finding Roots Without Factoring and A Special Purpose Factoring Algorithm
- Daniel R. L. Brown
-
2005/207 ( PS PS.GZ PDF )
- Some Thoughts on Time-Memory-Data Tradeoffs
- Alex Biryukov
-
2005/206 ( PDF )
- On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols
- Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
-
2005/205 ( PDF )
- Another look at HMQV
- Alfred Menezes
-
2005/204 ( PS PS.GZ PDF )
- An Algebraic Masking Method to Protect AES Against Power Attacks
- Nicolas Courtois and Louis Goubin
-
2005/203 ( PS PS.GZ PDF )
- On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions
- Nicolas Courtois and Blandine Debraize and Eric Garrido
-
2005/202 ( PS PS.GZ PDF )
- The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES
- Nicolas Courtois
-
2005/201 ( PS PS.GZ PDF )
- On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants
- Zhaohui Cheng and Liqun Chen
-
2005/200 ( PDF )
- Block ciphers sensitive to Groebner Basis Attacks
- Johannes Buchmann and Andrei Pychkine and Ralf-Philipp Weinmann
-
2005/199 ( -- withdrawn -- )
- Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security
- Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa
-
2005/198 ( PS PS.GZ PDF )
- Universally Composable Time-Stamping Schemes with Audit
- Ahto Buldas and Peeter Laud and Märt Saarepera and Jan Willemson
-
2005/197 ( PDF )
- Weaknesses in two group Diffie-Hellman key exchange protocols
- Qiang Tang and Liqun Chen
-
2005/196 ( PS PS.GZ PDF )
- Universally Composable Password-Based Key Exchange
- Ran Canetti and Shai Halevi and Jonathan Katz and Yehuda Lindell and Philip MacKenzie
-
2005/195 ( PS PS.GZ PDF )
- Twin RSA
- Arjen K. Lenstra and Benjamin M.M. de Weger
-
2005/194 ( PDF )
- Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography
- Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, and Tomohiko Uyematsu
-
2005/193 ( PS PS.GZ PDF )
- VSH, an Efficient and Provable Collision Resistant Hash Function
- Scott Contini and Arjen K. Lenstra and Ron Steinfeld
-
2005/192 ( PS PS.GZ PDF )
- On the security and the efficiency of the Merkle signature scheme
- Carlos Coronado
-
2005/191 ( PDF )
- Public Key Encryption with Keyword Search Revisited
- Joonsang Baek and Reihaneh Safavi-Naini and Willy Susilo
-
2005/190 ( PDF )
- Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA"
- SeongHan Shin and Kazukuni Kobara and Hideki Imai
-
2005/189 ( PDF )
- A Weak-Randomizer Attack on RSA-OAEP with e = 3
- Daniel R. L. Brown
-
2005/188 ( PS PS.GZ PDF )
- Group Signature where Group Manager, Members and Open Authority are Identity-Based
- Victor K. Wei and Tsz Hon Yuen and Fangguo Zhang
-
2005/187 ( PDF )
- How To Exchange Secrets with Oblivious Transfer
- Michael O. Rabin
-
2005/186 ( -- withdrawn -- )
- Linkability of Several Blind Signature Schemes
- Xuesheng Zhong
-
2005/185 ( PDF )
- Security properties of two provably secure conference key agreement protocols
- Qiang Tang and Chris J. Mitchell
-
2005/184 ( PDF )
- Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families
- Dongvu Tonien and Reihaneh Safavi-Naini
-
2005/183 ( PDF )
- PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications
- Thierry Moreau
-
2005/182 ( PDF )
- Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol
- Chih-I Wang, Chun-I Fan, and D. J. Guan
-
2005/181 ( PS PS.GZ PDF )
- A plausible approach to computer-aided cryptographic proofs
- Shai Halevi
-
2005/180 ( PDF )
- A Note on Secure Key Issuing in ID-based Cryptography
- XU Chunxiang and ZHOU Junhui and QIN Zhiguang
-
2005/179 ( PS PS.GZ PDF )
- Intrusion-Resilience via the Bounded-Storage Model
- Stefan Dziembowski
-
2005/178 ( PDF )
- Analyzing Unlinkability of Some Group Signatures
- Zhou Sujing and Lin Dongdai
-
2005/177 ( PDF )
- Secret sharing on the $d$-dimensional cube
- Laszlo Csirmaz
-
2005/176 ( PDF )
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Hugo Krawczyk
-
2005/175 ( PS PS.GZ PDF )
- A 32-bit RC4-like Keystream Generator
- Yassir Nawaz and Kishan Chand Gupta and Guang Gong
-
2005/174 ( PS PS.GZ PDF )
- On the Automatic Construction of Indistinguishable Operations
- Manuel Barbosa and Dan Page
-
2005/173 ( PDF )
- Weaknesses in a leakage-resilient authenticated key transport protocol
- Qiang Tang and Chris J. Mitchell
-
2005/172 ( -- withdrawn -- )
- Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy
- Radu Sion and Bogdan Carbunar
-
2005/171 ( PS PS.GZ PDF )
- Towards computationally sound symbolic analysis of key exchange protocols
- Prateek Gupta and Vitaly Shmatikov
-
2005/170 ( PDF )
- Unclonable Group Identification
- Ivan Damgård and Kasper Dupont and Michael Østergaard Pedersen
-
2005/169 ( PS PS.GZ PDF )
- Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control
- Shai Halevi and Paul A. Karger and Dalit Naor
-
2005/168 ( PS PS.GZ PDF )
- Dynamic k-Times Anonymous Authentication
- Lan Nguyen and Rei Safavi-Naini
-
2005/167 ( -- withdrawn -- )
- Efficient Computation of the Tate Pairing on Hyperelliptic Curves for Cryptosystems
- YoungJu Choie and Jaemyung Kim and Eunjeong Lee
-
2005/166 ( PDF )
- Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems
- Eunjeong Lee and Yoonjin Lee
-
2005/165 ( PDF )
- CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER
- Makoto Matsumoto and Takuji Nishimura and Mariko Hagita and Mutsuo Saito
-
2005/164 ( PDF )
- A Distinguish attack on COSvd Ciphers
- Mohammad Ali Orumiehchi ha and Dr.R. Mirghadri
-
2005/163 ( PDF )
- Modeling Insider Attacks on Group Key-Exchange Protocols
- Jonathan Katz and Ji Sun Shin
-
2005/162 ( PS PS.GZ PDF )
- A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem
- Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa
-
2005/161 ( PDF )
- Multiple forgery attacks against Message Authentication Codes
- David A. McGrew and Scott R. Fluhrer
-
2005/160 ( PS PS.GZ PDF )
- First Steps Toward a Cryptography-Aware Language and Compiler
- M. Barbosa and R. Noad and D. Page and N.P. Smart
-
2005/159 ( PS PS.GZ PDF )
- On Constructing Parallel Pseudorandom Generators from One-Way Functions
- Emanuele Viola
-
2005/158 ( PDF )
- Geometric Cryptosystem
- Arkady Berenstein and Leon Chernyak
-
2005/157 ( PDF )
- FOX Algorithm Implementation: a hardware design approach
- Colm O'Keeffe and Emanuel Popovici
-
2005/156 ( PDF )
- On the security of some password-based key agreement schemes
- Qiang Tang and Chris J. Mitchell
-
2005/155 ( PS PS.GZ )
- Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays
- Eli Biham and Jennifer Seberry
-
2005/154 ( PS PS.GZ PDF )
- Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol
- Marius C. Silaghi and Gerhard Friedrich
-
2005/153 ( PDF )
- On Security of Koyama Schemes
- Sahadeo Padhye
-
2005/152 ( PS PS.GZ PDF )
- On High-Rate Cryptographic Compression Functions
- Richard Ostertag and Martin Stanek
-
2005/151 ( PDF )
- Improved Collision Attack on MD4
- Yusuke Naito and Yu Sasaki and Noboru Kunihiro and Kazuo Ohta
-
2005/150 ( PS PS.GZ PDF )
- Secure Delegation of Elliptic-Curve Pairing
- Benoit Chevallier-Mames and Jean-Sebastien Coron and Noel McCullagh and David Naccache and Michael Scott
-
2005/149 ( PDF )
- Conditionally Verifiable Signatures
- Aldar C-F. Chan and Ian F. Blake
-
2005/148 ( PDF )
- On Universal Composable Security of Time-Stamping Protocols
- Toshihiko Matsuo and Shin'ichiro Matsuo
-
2005/147 ( PDF )
- Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware
- Jong Youl Choi and Philippe Golle and Markus Jakobsson
-
2005/146 ( PDF )
- A High Speed Architecture for Galois/Counter Mode of Operation (GCM)
- Bo Yang, Sambit Mishra, Ramesh Karri
-
2005/145 ( PDF )
- Small Secure Sketch for Point-Set Difference
- Ee-Chien Chang and Qiming Li
-
2005/144 ( PS PS.GZ PDF )
- Kaweichel, an Extension of Blowfish for 64-Bit Architectures
- Dieter Schmidt
-
2005/143 ( PDF )
- Multiparty Computation Based on Connectivity of Graphs
- Liangliang Xiao and Mulan Liu and Zhifang Zhang
-
2005/142 ( PDF )
- Broadcast Encryption with Random Key Pre-distribution Schemes
- Mahalingam Ramkumar
-
2005/141 ( PDF )
- Enhanced password-based key establishment protocol
- Qiang Tang and Chris J. Mitchell
-
2005/140 ( PS PS.GZ PDF )
- How to Split a Shared Secret into Shared Bits in Constant-Round
- Ivan Damgård and Matthias Fitzi and Jesper Buus Nielsen and Tomas Toft
-
2005/139 ( PDF )
- Scaling security in pairing-based protocols
- Michael Scott
-
2005/138 ( PDF )
- I-HARPS: An Efficient Key Pre-distribution Scheme
- Mahalingam Ramkumar
-
2005/137 ( PS PS.GZ )
- A Sender Verifiable Mix-Net and a New Proof of a Shuffle
- Douglas Wikström
-
2005/136 ( PDF )
- Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
- Jung Hee Cheon and Nam-su Jho and Myung-Hwan Kim and Eun Sun Yoo
-
2005/135 ( PS PS.GZ PDF )
- Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model
- Jacques Patarin and Paul Camion
-
2005/134 ( PDF )
- Broadcast Authentication With Hashed Random Preloaded Subsets
- Mahalingam Ramkumar
-
2005/133 ( PS PS.GZ PDF )
- Pairing-Friendly Elliptic Curves of Prime Order
- Paulo S. L. M. Barreto and Michael Naehrig
-
2005/132 ( PS PS.GZ PDF )
- Formal Notions of Anonymity for Peer-to-peer Networks
- Jiejun Kong
-
2005/131 ( PS PS.GZ PDF )
- Dynamic Group Key Agreement in Tree-Based Setting
- Ratna Dutta and Rana Barua
-
2005/130 ( -- withdrawn -- )
- Results on Rotation Symmetric Boolean Functions on Even Number Variable
- pinhui ke,changzhu ling,wenqiao yan
-
2005/129 ( PS PS.GZ PDF )
- On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases
- Zhaohui Cheng and Manos Nistazakis and Richard Comley and Luminita Vasiu
-
2005/128 ( -- withdrawn -- )
- Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials
- Xijin Tang and Yong Feng
-
2005/127 ( PDF )
- Browser Model for Security Analysis of Browser-Based Protocols
- Thomas Groß and Birgit Pfitzmann and Ahmad-Reza Sadeghi
-
2005/126 ( PDF )
- On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator
- Shahram Khazaei, Mahmood Salmasizadeh and Javad Mohajeri
-
2005/125 ( PS PS.GZ PDF )
- SPA Resistant Left-to-Right Integer Recodings
- Nicolas Thériault
-
2005/124 ( PS PS.GZ PDF )
- Append-Only Signatures
- Eike Kiltz and Anton Mityagin and Saurabh Panjwani and Barath Raghavan
-
2005/123 ( PS PS.GZ PDF )
- Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
- Lan Nguyen
-
2005/122 ( PDF )
- Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004
- Xinyi Huang and Willy Susilo and Yi Mu
-
2005/121 ( PDF )
- Pass-thoughts: Authenticating With Our Minds
- Julie Thorpe and P.C. van Oorschot and Anil Somayaji
-
2005/120 ( PDF )
- On Designatedly Verified (Non-interactive) Watermarking Schemes
- Malapati Raja Sekhar and Takeshi Okamoto and Eiji Okamato
-
2005/119 ( PS PS.GZ PDF )
- Index Calculus in Class Groups of Plane Curves of Small Degree
- Claus Diem
-
2005/118 ( PS PS.GZ PDF )
- Results on Rotation Symmetric Bent Functions
- Deepak Kumar Dalai and Subhamoy Maitra
-
2005/117 ( PS PS.GZ PDF )
- Boneh-Franklin Identity Based Encryption Revisited
- David Galindo
-
2005/116 ( PS PS.GZ PDF )
- On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems
- Nigel Smart and Frederik Vercauteren
-
2005/115 ( PS PS.GZ PDF )
- Characteristics of Key-Dependent S-Boxes: the Case of Twofish
- Marco Macchetti
-
2005/114 ( PS PS.GZ PDF )
- Intrusion-Resilient Secure Channels
- Gene Itkis and Robert McNerney Jr. and Scott W. Russell
-
2005/113 ( PS PS.GZ PDF )
- Partially Fixed Point Multiplication
- Majid Khabbazian, T. Aaron Gulliver and Vijay K. Bhargava
-
2005/112 ( PS PS.GZ PDF )
- On the relationship between squared pairings and plain pairings
- Bo Gyeong Kang and Je Hong Park
-
2005/111 ( PDF )
- Weak Composite Diffie-Hellman is not Weaker than Factoring
- Kooshiar Azimian, Javad Mohajeri and Mahmoud Salmasizadeh
-
2005/110 ( PS PS.GZ PDF )
- Diffie-Hellman key exchange protocol and non-abelian nilpotent groups.
- Ayan Mahalanobis
-
2005/109 ( PDF )
- A Public Key Cryptosystem Based on Singular Cubic Curve
- Sahadeo Padhye
-
2005/108 ( PS PS.GZ PDF )
- Efficient Identity-Based and Authenticated Key Agreement Protocol
- Yongge Wang
-
2005/107 ( PDF )
- A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher
- Ophir Levy and Avishai Wool
-
2005/106 ( PS PS.GZ PDF )
- How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation
- Boaz Barak and Amit Sahai
-
2005/105 ( PS PS.GZ PDF )
- On Error Correction in the Exponent
- Chris Peikert
-
2005/104 ( PS PS.GZ )
- On estimating the lattice security of NTRU
- Nick Howgrave-Graham and Jeff Hoffstein and Jill Pipher and William Whyte
-
2005/103 ( PS PS.GZ PDF )
- Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
- Fangguo Zhang and Xiaofeng Chen
-
2005/102 ( PDF )
- Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications
- Vlastimil Klima
-
2005/101 ( PDF )
- Soundness and Completeness of Formal Logics of Symmetric Encryption
- Gergei Bana
-
2005/100 ( PDF )
- almost enumeration of 8-variable bent functions
- Qingshu Meng and Huanguo Zhang and Jingsong Cui and Min Yang
-
2005/099 ( PDF )
- Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes
- Miodrag J. Mihaljevic and Marc P.C. Fossorier and Hideki Imai
-
2005/098 ( PS PS.GZ PDF )
- Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme
- Yassine Lakhnech and Laurent Mazare
-
2005/097 ( PS PS.GZ PDF )
- Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation
- Yassine Lakhnech and Laurent Mazare
-
2005/096 ( PS PS.GZ PDF )
- Almost Perfect Nonlinear Monomials over GF($2^n$) for Infinitely Many $n$
- David Jedlicka
-
2005/095 ( PS PS.GZ PDF )
- Security and Privacy Issues in E-passports
- Ari Juels and David Molnar and David Wagner
-
2005/094 ( PS PS.GZ PDF )
- A Survey on ID-Based Cryptographic Primitives
- M. Choudary Gorantla and Raju Gangishetti and Ashutosh Saxena
-
2005/093 ( PDF )
- An ID-Based Key Agreement Scheme from pairing
- Guohong Xie
-
2005/092 ( PS PS.GZ )
- PRF Domain Extension Using DAGs
- Charanjit Jutla
-
2005/091 ( PDF )
- Distributed Phishing Attacks
- Markus Jakobsson and Adam Young
-
2005/090 ( PS PS.GZ PDF )
- Rediscovery of Time Memory Tradeoffs
- Jin Hong and Palash Sarkar
-
2005/089 ( PDF )
- Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions
- Hans Dobbertin and Gregor Leander
-
2005/088 ( PDF )
- The MAC function Pelican 2.0
- Joan Daemen and Vincent Rijmen
-
2005/087 ( PDF )
- AES side channel attack protection using random isomorphisms
- Rostovtsev A.G. and Shemyakina O.V.
-
2005/086 ( PDF )
- Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia)
- Henry Ng
-
2005/085 ( -- withdrawn -- )
- A new structural attack for GPT and variants
- R. Overbeck
-
2005/084 ( PS PS.GZ PDF )
- On Resistance of DES to Related-Key Differential Cryptanalysis
- Goce Jakimoski and Yvo Desmedt
-
2005/083 ( PDF )
- Security notions for disk encryption
- Kristian Gjřsteen
-
2005/082 ( PS PS.GZ PDF )
- Some properties of an FSE 2005 Hash Proposal
- Lars R. Knudsen
-
2005/081 ( -- withdrawn -- )
- Smashing SMASH
- Norbert Pramstaller and Christian Rechberger and Vincent Rijmen
-
2005/080 ( PDF )
- A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification
- R. Venkatesh and C. Sanjeevakumar and M. Kasi Rajan and L. Sudarsan and N. Srinivasan
-
2005/079 ( PS PS.GZ PDF )
- Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism
- Marius C Silaghi
-
2005/078 ( PS PS.GZ PDF )
- Duality between Multiplication and Modular Reduction
- Wieland Fischer and Jean-Pierre Seifert
-
2005/077 ( PS PS.GZ PDF )
- Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations
- Christopher Wolf and Bart Preneel
-
2005/076 ( PDF )
- Pairing-Based Cryptography at High Security Levels
- Neal Koblitz and Alfred Menezes
-
2005/075 ( PDF )
- Finding MD5 Collisions – a Toy For a Notebook
- Vlastimil Klima
-
2005/074 ( PS PS.GZ PDF )
- Computationally sound implementations of equational theories against passive adversaries
- Mathieu Baudet and Véronique Cortier and Steve Kremer
-
2005/073 ( PS PS.GZ PDF )
- BROADCAST ENCRYPTION $\pi$
- Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, and Eun Sun Yoo
-
2005/072 ( PS PS.GZ PDF )
- Practical Lattice Basis Sampling Reduction
- Johannes Buchmann and Christoph Ludwig
-
2005/071 ( -- withdrawn -- )
- A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields
- Dabi Zou and Dongdai Lin
-
2005/070 ( PDF )
- On public-key cryptosystems based on combinatorial group theory
- Jean-Camille Birget and Spyros S. Magliveras and Michal Sramka
-
2005/069 ( PS PS.GZ PDF )
- Fast Elliptic Curve Point Multiplication using Double-Base Chains
- V. S. Dimitrov and L. Imbert and P. K. Mishra
-
2005/068 ( PS PS.GZ PDF )
- N-adic Summation-Shrinking Generator. Basic properties and empirical evidences.
- Zhaneta Tasheva and Borislav Bedzhev and Borislav Stoyanov
-
2005/067 ( PDF )
- Colliding X.509 Certificates
- Arjen Lenstra and Xiaoyun Wang and Benne de Weger
-
2005/066 ( PS PS.GZ PDF )
- Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation
- Eike Kiltz
-
2005/065 ( PS PS.GZ PDF )
- Efficient hardware for the Tate pairing calculation in characteristic three
- T. Kerins and W. P. Marnane and E. M. Popovici and P. S. L. M. Barreto
-
2005/064 ( PDF )
- On Efficient Key Agreement Protocols
- Anish Mathuria and Vipul Jain
-
2005/063 ( -- withdrawn -- )
- On the Key Schedule of Blowfish
- Dieter Schmidt
-
2005/062 ( -- withdrawn -- )
- Cryptanalysis of One Fair E-cash System
- LiHua Liu and Zhengjun Cao
-
2005/061 ( PS PS.GZ PDF )
- Key Derivation and Randomness Extraction
- Olivier Chevassut and Pierre-Alain Fouque and Pierrick Gaudry and David Pointcheval
-
2005/060 ( PDF )
- Compact E-Cash
- Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya
-
2005/059 ( PDF )
- Secret sharing schemes on graphs
- Laszlo Csirmaz
-
2005/058 ( PS PS.GZ PDF )
- Generic Constructions of Identity-Based and Certificateless KEMs
- K. Bentahar and P. Farshim and J. Malone-Lee and N.P. Smart
-
2005/057 ( PDF )
- Tight Reductions among Strong Die-Hellman Assumptions
- Victor K. Wei
-
2005/056 ( PS PS.GZ PDF )
- Deniable Authentication with RSA and Multicasting
- Daniel R. L. Brown
-
2005/055 ( PS PS.GZ PDF )
- Untraceability of Two Group Signature Schemes
- Zhengjun Cao
-
2005/054 ( -- withdrawn -- )
- Comment on cryptanalysis of Tseng et al.ˇ¦s authenticated encryption schemes
- Yi-Hwa Chen and Jinn-Ke Jan
-
2005/053 ( PDF )
- An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
- Hung-Min Sun and Mu-En Wu
-
2005/052 ( PDF )
- Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
- Ziv Kfir and Avishai Wool
-
2005/051 ( PS PS.GZ PDF )
- A Note on Shor's Quantum Algorithm for Prime Factorization
- Zhengjun Cao
-
2005/050 ( PDF )
- David Chaum's Voter Verification using Encrypted Paper Receipts
- Poorvi L. Vora
-
2005/049 ( PDF )
- Adversarial Model for Radio Frequency Identification
- Gildas Avoine
-
2005/048 ( PDF )
- Cryptanalysis of two identification schemes based on an ID-based cryptosystem
- Qiang Tang and Chris J. Mitchell
-
2005/047 ( PDF )
- Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
- Qiang Tang and Chris J. Mitchell
-
2005/046 ( PDF )
- New Approaches for Deniable Authentication
- Mario Di Raimondo and Rosario Gennaro
-
2005/045 ( PDF )
- Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
- Nick Howgrave-Graham and Joseph H. Silverman and William Whyte
-
2005/044 ( PS PS.GZ PDF )
- On the affine classification of cubic bent functions
- Sergey Agievich
-
2005/043 ( PS PS.GZ PDF )
- An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption
- Hsiao-Ying Lin and Wen-Guey Tzeng
-
2005/042 ( PS PS.GZ PDF )
- Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
- Logachev~O.A. and Salnikov~A.A. and Yaschenko~V.V.
-
2005/041 ( PS PS.GZ PDF )
- On the Security of a Group Signature Scheme with Strong Separability
- Lihua Liu and Zhengjun Cao
-
2005/040 ( PS PS.GZ PDF )
- Unfairness of a protocol for certified delivery
- Juan M. Estevez-Tapiador and Almudena Alcaide
-
2005/039 ( PDF )
- Distinguishing Stream Ciphers with Convolutional Filters
- Joan Daemen and Gilles Van Assche
-
2005/038 ( -- withdrawn -- )
- Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants
- Yi-Hwa Chen and Jinn-Ke Jan
-
2005/037 ( PS PS.GZ PDF )
- Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
- Claude Castelluccia and Einar Mykletun and Gene Tsudik
-
2005/036 ( PS PS.GZ PDF )
- Concurrent Composition of Secure Protocols in the Timing Model
- Yael Kalai and Yehuda Lindell and Manoj Prabhakaran
-
2005/035 ( PS PS.GZ PDF )
- An Efficient CDH-based Signature Scheme With a Tight Security Reduction
- Benoit Chevallier-Mames
-
2005/034 ( PDF )
- Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication)
- Gene Tsudik and Shouhuai Xu
-
2005/033 ( PDF )
- An Attack on CFB Mode Encryption As Used By OpenPGP
- Serge Mister and Robert Zuccherato
-
2005/032 ( PS PS.GZ PDF )
- On the Notion of Statistical Security in Simulatability Definitions
- Dennis Hofheinz and Dominique Unruh
-
2005/031 ( PS PS.GZ PDF )
- The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
- Iwan Duursma and Negar Kiyavash
-
2005/030 ( PDF )
- Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves.
- A. A. Kalele and V. R. Sule
-
2005/029 ( PS PS.GZ PDF )
- A model and architecture for pseudo-random generation with applications to /dev/random
- Boaz Barak and Shai Halevi
-
2005/028 ( PDF )
- Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
- Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger
-
2005/027 ( PS PS.GZ PDF )
- Tag-KEM/DEM: A New Framework for Hybrid Encryption
- Masayuki ABE and Rosario Gennaro and Kaoru Kurosawa
-
2005/026 ( PS PS.GZ )
- Techniques for random maskin in hardware
- Jovan Dj. Golic
-
2005/025 ( PS PS.GZ PDF )
- Analysis of Affinely Equivalent Boolean Functions
- Meng Qing-shu and Yang min and Zhang Huan-guo and Liu Yu-zhen
-
2005/024 ( PDF )
- Weak keys of the Diffe Hellman key exchange I
- A. A. Kalele and V. R. Sule
-
2005/023 ( PDF )
- A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
- Masao Kasahara
-
2005/022 ( PS PS.GZ PDF )
- An Improved and Efficient Countermeasure against Power Analysis Attacks
- ChangKyun Kim and JaeCheol Ha and SangJae Moon and Sung-Ming Yen and Wei-Chih Lien and Sung-Hyun Kim
-
2005/021 ( PS PS.GZ )
- Partial Hiding in Public-Key Cryptography
- Eabhnat Ní Fhloinn and Michael Purser
-
2005/020 ( PS PS.GZ PDF )
- (De)Compositions of Cryptographic Schemes and their Applications to Protocols
- R. Janvier and Y. Lakhnech and L. Mazare
-
2005/019 ( PDF )
- The Full Abstraction of the UC Framework
- Jesús F. Almansa
-
2005/018 ( PDF )
- Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
- Dan Boneh and Craig Gentry and Brent Waters
-
2005/017 ( PDF )
- Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
- Roberto M. Avanzi
-
2005/016 ( PS PS.GZ PDF )
- Narrow T-functions
- Magnus Daum
-
2005/015 ( PS PS.GZ PDF )
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Dan Boneh and Xavier Boyen and Eu-Jin Goh
-
2005/014 ( PS PS.GZ )
- A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
- Ludovic Perret
-
2005/013 ( PDF )
- Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols
- Hung-Yu Chien
-
2005/012 ( PS PS.GZ PDF )
- Efficient Certificateless Public Key Encryption
- Zhaohui Cheng and Richard Comley
-
2005/011 ( PDF )
- An Improved Elegant Method to Re-initialize Hash Chains
- Yuanchao Zhao and Daoben Li
-
2005/010 ( PS PS.GZ PDF )
- Update on SHA-1
- Vincent Rijmen and Elisabeth Oswald
-
2005/009 ( PDF )
- Mixing properties of triangular feedback shift registers
- Bernd Schomburg
-
2005/008 ( PS PS.GZ PDF )
- Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
- J. Wu and R. Wei
-
2005/007 ( PS PS.GZ PDF )
- The Misuse of RC4 in Microsoft Word and Excel
- Hongjun Wu
-
2005/006 ( PS PS.GZ )
- A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$.
- Pradeep Kumar Mishra and Kishan Chand Gupta
-
2005/005 ( PS PS.GZ PDF )
- A sufficient condition for key-privacy
- Shai Halevi
-
2005/004 ( PS PS.GZ PDF )
- Benes and Butterfly schemes revisited
- Jacques Patarin and Audrey Montreuil
-
2005/003 ( PDF )
- Cryptanalysis of Hiji-bij-bij (HBB)
- Vlastimil Klima
-
2005/002 ( PS PS.GZ PDF )
- Logcrypt: Forward Security and Public Verification for Secure Audit Logs
- Jason E. Holt and Kent E. Seamons
-
2005/001 ( PS PS.GZ PDF )
- On Obfuscating Point Functions
- Hoeteck Wee
-
2004/377 ( PS PS.GZ PDF )
- New Distributed Ring Signatures for General Families of Signing Subsets
- Javier Herranz and Germán Sáez
-
2004/376 ( PDF )
- Cryptanalysis of RCES/RSES Image Encryption Scheme
- Shujun Li and Chengqing Li and Guanrong Chen and Kwok-Tung Lo
-
2004/375 ( PS PS.GZ PDF )
- Efficient Pairing Computation on Supersingular Abelian Varieties
- Paulo S. L. M. Barreto and Steven Galbraith and Colm O hEigeartaigh and Michael Scott
-
2004/374 ( PDF )
- A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
- Shujun Li and Chengqing Li and Guanrong Chen and Nikolaos G. Bourbakis and Kwok-Tung Lo
-
2004/373 ( PS PS.GZ PDF )
- Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs
- Chunming Tang and Dingyi Pei and Zhuojun Liu
-
2004/372 ( -- withdrawn -- )
- On The Security of Two Key-Updating Signature Schemes
- Xingyang Guo
-
2004/371 ( PDF )
- Construction and Traversal of Hash Chain with Public Links
- Vipul Goyal
-
2004/370 ( PDF )
- Tracing-by-Linking Group Signautres
- Victor K. Wei
-
2004/369 ( PDF )
- SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks
- Filipe Rosado da-Fonseca
-
2004/368 ( PS PS.GZ PDF )
- Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience
- Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek
-
2004/367 ( PS PS.GZ PDF )
- On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
- Patrick Felke
-
2004/366 ( PDF )
- Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key
- Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
-
2004/365 ( PS PS.GZ PDF )
- Ordinary abelian varieties having small embedding degree
- Steven D. Galbraith, and J. McKee and P. Valenca
-
2004/364 ( PS PS.GZ PDF )
- Finding good differential patterns for attacks on SHA-1
- Krystian Matusiewicz and Josef Pieprzyk
-
2004/363 ( PDF )
- Rethinking the security of some authenticated group key agreement schemes
- Qiang Tang and Chris J. Mitchell
-
2004/362 ( PDF )
- A new security proof for Damgĺrd's ElGamal
- Kristian Gjřsteen
-
2004/361 ( PS PS.GZ PDF )
- Superfluous Keys in Multivariate Quadratic Asymmetric Systems
- Christopher Wolf and Bart Preneel
-
2004/360 ( PS PS.GZ PDF )
- Equivalent Keys in HFE, C$^*$, and variations
- Christopher Wolf and Bart Preneel
-
2004/359 ( PS PS.GZ PDF )
- Secure Computation of the Mean and Related Statistics
- Eike Kiltz and Gregor Leander and John Malone-Lee
-
2004/358 ( PS PS.GZ PDF )
- Reusable Cryptographic Fuzzy Extractors
- Xavier Boyen
-
2004/357 ( PDF )
- MD5 To Be Considered Harmful Someday
- Dan Kaminsky
-
2004/356 ( PDF )
- Practical Attacks on Digital Signatures Using MD5 Message Digest
- Ondrej Mikle
-
2004/355 ( PDF )
- A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates
- Pei-yih Ting and Po-Yueh Hung
-
2004/354 ( PS PS.GZ )
- Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra
- Alexander Maximov
-
2004/353 ( PS PS.GZ PDF )
- Direct Division in Factor Rings
- Patrick Fitzpatrick and Christopher Wolf
-
2004/352 ( PS PS.GZ PDF )
- Practical Cryptography in High Dimensional Tori
- Marten van Dijk and Robert Granger and Dan Page and Karl Rubin and Alice Silverberg and Martijn Stam and David Woodruff
-
2004/351 ( -- withdrawn -- )
- Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security
- ZhenFeng ZHANG and YongBin ZHOU and DengGuo FENG
-
2004/350 ( PS PS.GZ PDF )
- Multivariable public--key cryptosystems
- Jintai Ding and Dieter Schmidt
-
2004/349 ( PS PS.GZ PDF )
- A DPA Attack on the Improved Ha-Moon Algorithm
- Dong Jin PARK and Pil Joong LEE
-
2004/348 ( PS PS.GZ PDF )
- A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
- Junghyun Nam, Seungjoo Kim, and Dongho Won
-
2004/347 ( PS PS.GZ PDF )
- Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields''
- Marco Macchetti
-
2004/346 ( PS PS.GZ PDF )
- Random Switching Logic: A Countermeasure against DPA based on Transition Probability
- Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa
-
2004/345 ( PS PS.GZ PDF )
- On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited
- Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock and Greg Maitland
-
2004/344 ( PDF )
- Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures
- Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte
-
2004/343 ( PDF )
- Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
- Kim-Kwang Raymond Choo
-
2004/342 ( PS PS.GZ PDF )
- A comb method to render ECC resistant against Side Channel Attacks
- Mustapha Hedabou and Pierre Pinel and Lucien Bénéteau
-
2004/341 ( PS PS.GZ PDF )
- Reducing Complexity Assumptions for Statistically-Hiding Commitment
- Omer Horvitz and Jonathan Katz and Chiu-Yuen Koo and Ruggero Morselli
-
2004/340 ( PDF )
- Request for Review of Key Wrap Algorithms
- Morris Dworkin
-
2004/339 ( PS PS.GZ )
- Divisors in Residue Classes, Constructively
- Don Coppersmith and Nick Howgrave-Graham and S. V. Nagaraj
-
2004/338 ( PS PS.GZ PDF )
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai
-
2004/337 ( PDF )
- Security on Generalized Feistel Scheme with SP Round Function
- Wu Wenling and Zhang Wentao and Lin Dongdai
-
2004/336 ( PS PS.GZ PDF )
- Oblivious Transfer Is Symmetric
- Stefan Wolf and Jürg Wullschleger
-
2004/335 ( PS PS.GZ )
- Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions
- Haitner Iftach and Shaltiel Ronen
-
2004/334 ( PDF )
- Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)
- Ran Canetti and Jonathan Herzog
-
2004/333 ( PS PS.GZ PDF )
- Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem
- Marius-Calin Silaghi
-
2004/332 ( PDF )
- Sequences of games: a tool for taming complexity in security proofs
- Victor Shoup
-
2004/331 ( PDF )
- Code-Based Game-Playing Proofs and the Security of Triple Encryption
- Mihir Bellare and Phillip Rogaway
-
2004/330 ( PS PS.GZ )
- Multicollision Attacks on Generalized Hash Functions
- M. Nandi and D. R. Stinson
-
2004/329 ( PS PS.GZ PDF )
- Hardness amplification of weakly verifiable puzzles
- Ran Canetti and Shai Halevi and Michael Steiner
-
2004/328 ( -- withdrawn -- )
- Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model
- Mridul Nandi and Wonil Lee and Kouichi Sakurai and Sangjin Lee
-
2004/327 ( PS PS.GZ PDF )
- Efficient Identity Based Ring Signature
- Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui
-
2004/326 ( PS PS.GZ PDF )
- Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme
- Zhengjun Cao
-
2004/325 ( PS PS.GZ PDF )
- Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules
- Mitsuhiro HATTORI and Shoichi HIROSE and Susumu YOSHIDA
-
2004/324 ( PDF )
- On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions
- G. Laccetti and G. Schmid
-
2004/323 ( PS PS.GZ PDF )
- A note on López-Dahab coordinates
- Tanja Lange
-
2004/322 ( PS PS.GZ PDF )
- Separable and Anonymous Identity-Based Key Issuing
- Ai-fen Sui and Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow and W.W. Tsang and C.F. Chong and K.H. Pun and H.W. Chan
-
2004/321 ( PDF )
- The conjugacy search problem in public key cryptography: unnecessary and insufficient
- Vladimir Shpilrain and Alexander Ushakov
-
2004/320 ( PS PS.GZ PDF )
- Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
- Alfonso De Gregorio
-
2004/319 ( PS PS.GZ PDF )
- Badger - A Fast and Provably Secure MAC
- Martin Boesgaard and Ove Scavenius and Thomas Pedersen and Thomas Christensen and Erik Zenner
-
2004/318 ( PS PS.GZ PDF )
- Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
- Martin Hirt and Jesper Buus Nielsen
-
2004/317 ( PS PS.GZ PDF )
- Adaptively-Secure, Non-Interactive Public-Key Encryption
- Ran Canetti and Shai Halevi and Jonathan Katz
-
2004/316 ( PS PS.GZ PDF )
- On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme
- Zhengjun Cao
-
2004/315 ( PDF )
- Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes
- Qin Wang, Zhenfu Cao
-
2004/314 ( PDF )
- A Technical Comparison of IPSec and SSL
- AbdelNasir Alshamsi and Takamichi Saito
-
2004/313 ( PS PS.GZ PDF )
- Cryptanalysis of a threshold proxy signature with known signers
- Fuw-Yi Yang, Jinn-Ke Jan, and Woei-Jiunn Jeng
-
2004/312 ( PS PS.GZ PDF )
- Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves
- David Jao and Stephen D. Miller and Ramarathnam Venkatesan
-
2004/311 ( PS PS.GZ PDF )
- Hierarchical Group Signatures
- Marten Trolin and Douglas Wikstrom
-
2004/310 ( PS PS.GZ PDF )
- A Verifiable Random Function With Short Proofs and Keys
- Yevgeniy Dodis and Aleksandr Yampolskiy
-
2004/309 ( PS PS.GZ PDF )
- The Power of Verification Queries in Message Authentication and Authenticated Encryption
- Mihir Bellare and Oded Goldreich and Anton Mityagin
-
2004/308 ( PDF )
- Cryptanalysis of Noel McCullagh and Paulo S. L. M. BarretoˇŻs two-party identity-based key agreement
- Guohong Xie
-
2004/307 ( PS PS.GZ PDF )
- Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme
- Zhengjun Cao
-
2004/306 ( PS PS.GZ )
- The Static Diffie-Hellman Problem
- Daniel R. L. Brown and Robert P. Gallant
-
2004/305 ( PS PS.GZ PDF )
- A note on efficient computation of cube roots in characteristic 3
- Paulo S. L. M. Barreto
-
2004/304 ( PDF )
- Second Preimages on n-bit Hash Functions for Much Less than 2^n Work
- John Kelsey and Bruce Schneier
-
2004/303 ( PS PS.GZ PDF )
- Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields
- Soonhak Kwon
-
2004/302 ( PDF )
- Security of Wang-Li Threshold Signature Scheme
- Lifeng Guo
-
2004/301 ( PS PS.GZ PDF )
- VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
- Bartosz Zoltak
-
2004/300 ( PS PS.GZ )
- Relating Symbolic and Cryptographic Secrecy
- Michael Backes and Birgit Pfitzmann
-
2004/299 ( PS PS.GZ PDF )
- Security Flaws in a Pairing-based Group Signature Scheme
- Zhengjun Cao and Sherman S.M. Chow
-
2004/298 ( PDF )
- Nominative Proxy Signature Schemes
- Zuo-Wen Tan,Zhuo-Jun Liu
-
2004/297 ( PS PS.GZ PDF )
- Post-Quantum Signatures
- Johannes Buchmann and Carlos Coronado and Martin Döring and Daniela Engelbert and Christoph Ludwig and Raphael Overbeck and Arthur Schmidt and Ulrich Vollmer and Ralf-Philipp Weinmann
-
2004/296 ( PS PS.GZ PDF )
- Designs of Efficient Secure Large Hash Values
- Mridul Nandi
-
2004/295 ( PS PS.GZ PDF )
- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
- Jiang Wu and Ruizhong Wei
-
2004/294 ( PS PS.GZ PDF )
- Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher
- Souradyuti Paul and Bart Preneel
-
2004/293 ( PS PS.GZ )
- Provably Secure Authentication of Digital Media Through Invertible Watermarks
- Jana Dittmann and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith
-
2004/292 ( PS PS.GZ PDF )
- Asynchronous Proactive RSA
- Ruishan Zhang and Kefei Chen
-
2004/291 ( PS PS.GZ PDF )
- The Rabbit Stream Cipher - Design and Security Analysis
- Martin Boesgaard and Thomas Pedersen and Mette Vesterager and Erik Zenner
-
2004/290 ( PS PS.GZ PDF )
- The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
- Wakaha Ogata and Kaoru Kurosawa and Swee-Huay Heng
-
2004/289 ( PDF )
- Fault attack on the DVB Common Scrambling Algorithm
- Kai Wirt
-
2004/288 ( -- withdrawn -- )
- A New Designated Confirmer Signature Variant with Intended Recipient
- Yong Li and Dingyi Pei
-
2004/287 ( PS PS.GZ PDF )
- Almost Ideal Contrast Visual Cryptography with Reversing
- Duong Quang Viet and Kaoru Kurosawa
-
2004/286 ( PS PS.GZ )
- Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions
- Daniele Micciancio
-
2004/285 ( PS PS.GZ PDF )
- Generation of random Picard curves for cryptography
- Annegret Weng
-
2004/284 ( PS PS.GZ PDF )
- ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS
- Qingshu Meng and Huanguo Zhang and Min Yang and Jingsong Cui
-
2004/283 ( PS PS.GZ PDF )
- Fault and Side-Channel Attacks on Pairing Based Cryptography
- D. Page and F. Vercauteren
-
2004/282 ( PS PS.GZ PDF )
- New Monotone Span Programs from Old
- Ventzislav Nikov and Svetla Nikova
-
2004/281 ( PS PS.GZ PDF )
- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
- Patrick P. Tsang and Victor K. Wei
-
2004/280 ( PS PS.GZ PDF )
- Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme
- Zhengjun Cao
-
2004/279 ( PS PS.GZ PDF )
- Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic
- Jean-Claude Bajard and Laurent Imbert and Graham A. Jullien
-
2004/278 ( PDF )
- The Extended Codebook (XCB) Mode of Operation
- David A. McGrew and Scott R. Fluhrer
-
2004/277 ( PDF )
- Experimenting with Faults, Lattices and the DSA
- David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan
-
2004/276 ( PDF )
- Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions
- C. Carlet
-
2004/275 ( PDF )
- An e-Voting Scheme with Improved Resistance to Bribe and Coercion
- Wei-Chi Ku and Chun-Ming Ho
-
2004/274 ( PDF )
- A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS
- Meng Qing-shu and Yang min and Zhang huan-guo and Cui jing-song
-
2004/273 ( PDF )
- Cryptanalysis of Threshold-Multisignature schemes
- Lifeng Guo
-
2004/272 ( PDF )
- A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security
- Tom Shrimpton
-
2004/271 ( PDF )
- The Mundja Streaming MAC
- Philip Hawkes and Michael Paddon and Gregory G. Rose
-
2004/270 ( PS PS.GZ PDF )
- An Enhanced and Secure Protocol for Authenticated Key Exchange
- Fuw-Yi Yang and Jinn-Ke Jan
-
2004/269 ( PDF )
- Cryptanalysis of Threshold-Multisignature Schemes
- Lifeng Guo
-
2004/268 ( PS PS.GZ PDF )
- Untraceability of Wang-Fu Group Signature Scheme
- Zhengjun Cao and Lihua Liu
-
2004/267 ( PS PS.GZ PDF )
- Separable Linkable Threshold Ring Signatures
- Patrick P. Tsang and Victor K. Wei and Tony K. Chan and Man Ho Au and Joseph K. Liu and Duncan S. Wong
-
2004/266 ( PS PS.GZ PDF )
- A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods
- M. Khabbazian and T.A. Gulliver
-
2004/265 ( PDF )
- sSCADA: Securing SCADA Infrastructure Communications
- Yongge Wang and Bei-Tseng Chu
-
2004/264 ( PDF )
- Musings on the Wang et al. MD5 Collision
- Philip Hawkes and Michael Paddon and Gregory G. Rose
-
2004/263 ( PS PS.GZ PDF )
- Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems
- Christopher Wolf and Bart Preneel
-
2004/262 ( PS PS.GZ PDF )
- Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
- Lihua Liu and Zhengjun Cao
-
2004/261 ( PS PS.GZ PDF )
- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
- Dan Boneh and Jonathan Katz
-
2004/260 ( PS PS.GZ PDF )
- Secure Group Communications over Combined Wired/Wireless Networks
- Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, and Dongho Won
-
2004/259 ( PS PS.GZ PDF )
- On Boolean Functions with Generalized Cryptographic Properties
- An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
-
2004/258 ( PS PS.GZ PDF )
- Escrow-Free Encryption Supporting Cryptographic Workflow
- S.S. Al-Riyami and J. Malone-Lee and N.P. Smart
-
2004/257 ( PS PS.GZ PDF )
- A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
- Junghyun Nam, Seungjoo Kim, and Dongho Won
-
2004/256 ( PDF )
- On the supports of the Walsh transforms of Boolean functions
- Claude Carlet and Sihem Mesnager
-
2004/255 ( PS PS.GZ PDF )
- A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
- Izuru Kitamura and Masanobu Katagi and Tsuyoshi Takagi
-
2004/254 ( PS PS.GZ )
- New paradigms for digital generation and post-processing of random data
- Jovan Dj. Golic
-
2004/253 ( PDF )
- Design Principles for Iterated Hash Functions
- Stefan Lucks
-
2004/252 ( PS PS.GZ PDF )
- Security Proofs for Identity-Based Identification and Signature Schemes
- Mihir Bellare and Chanathip Namprempre and Gregory Neven
-
2004/251 ( PS PS.GZ PDF )
- Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
- Junghyun Nam, Seungjoo Kim, and Dongho Won
-
2004/250 ( PDF )
- Identity Based Threshold Proxy Signature
- Jing Xu and Zhenfeng Zhang and Dengguo Feng
-
2004/249 ( PS PS.GZ PDF )
- Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
- Zhaohui Cheng and Richard Comley
-
2004/248 ( PS PS.GZ PDF )
- Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties
- An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel
-
2004/247 ( PS PS.GZ )
- Vectorial fast correlation attacks
- Jovan Dj. Golic and Guglielmo Morgari
-
2004/246 ( PS PS.GZ PDF )
- Upper and Lower Bounds on Black-Box Steganography
- Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell
-
2004/245 ( PDF )
- On codes, matroids and secure multi-party computation from linear secret sharing schemes
- Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jimenez Urroz and Gregor Leander and Jaume Marti-Farre and Carles Padro
-
2004/244 ( PS PS.GZ PDF )
- Signcryption in Hierarchical Identity Based Cryptosystem
- Sherman S.M. Chow and Tsz Hon Yuen and Lucas C.K. Hui and S.M. Yiu
-
2004/243 ( PDF )
- On the Key Exposure Problem in Chameleon Hashes
- Giuseppe Ateniese and Breno de Medeiros
-
2004/242 ( PS PS.GZ PDF )
- Combinatorial group theory and public key cryptography
- Vladimir Shpilrain and Gabriel Zapata
-
2004/241 ( PDF )
- A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2
- Colm O hEigeartaigh
-
2004/240 ( PS PS.GZ PDF )
- A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields
- Seigo Arita and Kazuto Matsuo and Koh-ichi Nagao and Mahoro Shimura
-
2004/239 ( PDF )
- Geometric Key Establishment
- Arkady Berenstein and Leon Chernyak
-
2004/238 ( PDF )
- Security Analysis of A Dynamic ID-based Remote User Authentication Scheme
- Amit K Awasthi and Sunder Lal
-
2004/237 ( PS PS.GZ PDF )
- Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC
- Christopher Wolf and An Braeken and Bart Preneel
-
2004/236 ( PDF )
- Forgery Attacks on Chang et al.'s signature scheme with message recovery
- FU Xiaotong, XU Chunxiang and XIAO Guozhen
-
2004/235 ( PDF )
- Cryptographic Implications of Hess' Generalized GHS Attack
- Alfred Menezes and Edlyn Teske
-
2004/234 ( PDF )
- On the security of some nonrepudiable threshold proxy signature schemes with known signers
- Zuo-Wen Tan and Zhuo-Jun Liu
-
2004/233 ( PS PS.GZ PDF )
- Password-Based Authenticated Key Exchange in the Three-Party Setting
- Michel Abdalla and Pierre-Alain Fouque and David Pointcheval
-
2004/232 ( PS PS.GZ PDF )
- Extending the Resynchronization Attack
- Frederik Armknecht and Joseph Lano and Bart Preneel
-
2004/231 ( PS PS.GZ PDF )
- Timed-Release and Key-Insulated Public Key Encryption
- Jung Hee Cheon and Nicholas Hopper and Yongdae Kim and Ivan Osipkov
-
2004/230 ( PS PS.GZ PDF )
- A Provable Secure Scheme for Partially Blind Signatures
- Fuw-Yi Yang and Jinn-Ke Jan
-
2004/229 ( PS PS.GZ PDF )
- Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes
- Xin L¨ą and Zhi Ma and Dengguo Feng
-
2004/228 ( PS PS.GZ PDF )
- DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$
- Honggang Hu and Dengguo Feng
-
2004/227 ( PS PS.GZ PDF )
- Sign Change Fault Attacks On Elliptic Curve Cryptosystems
- Johannes Blömer and Martin Otto and Jean-Pierre Seifert
-
2004/226 ( PS PS.GZ PDF )
- Lower Bounds for Non-Black-Box Zero Knowledge
- Boaz Barak and Yehuda Lindell and Salil Vadhan
-
2004/225 ( PS PS.GZ )
- Vectorial Boolean functions and induced algebraic equations
- Jovan Dj. Golic
-
2004/224 ( PS PS.GZ PDF )
- The Polynomial Composition Problem in (Z/nZ)[X]
- Marc Joye and David Naccache and Stephanie Porte
-
2004/223 ( PDF )
- Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves
- Xinxin Fan and Yumin Wang
-
2004/222 ( PS PS.GZ PDF )
- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
- An Braeken and Christopher Wolf and Bart Preneel
-
2004/221 ( PS PS.GZ PDF )
- Towards Plaintext-Aware Public-Key Encryption without Random Oracles
- Mihir Bellare and Adriana Palacio
-
2004/220 ( PS PS.GZ PDF )
- On Oleshchuk's Public Key Cryptosystem
- Heiko Stamer and Friedrich Otto
-
2004/219 ( PS PS.GZ PDF )
- Entropic Security and the Encryption of High Entropy Messages
- Yevgeniy Dodis and Adam Smith
-
2004/218 ( PDF )
- Plaintext-Simulatability
- Eiichiro Fujisaki
-
2004/217 ( PS PS.GZ PDF )
- Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice
- Aggelos Kiayias and Moti Yung
-
2004/216 ( PS PS.GZ PDF )
- Tree Parity Machine Rekeying Architectures
- Markus Volkmer and Sebastian Wallner
-
2004/215 ( PS PS.GZ PDF )
- Transitive Signatures: New Schemes and Proofs
- Mihir Bellare and Gregory Neven
-
2004/214 ( PS PS.GZ PDF )
- Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality
- An Braeken, Christopher Wolf, and Bart Preneel
-
2004/213 ( PS PS.GZ PDF )
- Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery
- Fangguo Zhang
-
2004/212 ( PS PS.GZ PDF )
- ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
- Danfeng Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya
-
2004/211 ( PS PS.GZ PDF )
- Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
- Ian F. Blake and Aldar C-F. Chan
-
2004/210 ( PS PS.GZ PDF )
- Hybrid Cryptography
- Alexander W. Dent
-
2004/209 ( PS PS.GZ PDF )
- The Security and Efficiency of Micciancio's Cryptosystem
- Christoph Ludwig
-
2004/208 ( PS PS.GZ PDF )
- Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring
- Jean-Sebastien Coron and Alexander May
-
2004/207 ( PDF )
- On Corrective Patterns for the SHA-2 Family
- Philip Hawkes and Michael Paddon and Gregory G. Rose
-
2004/206 ( PDF )
- ID-Based Proxy Signature Using Bilinear Pairings
- Jing Xu and Zhenfeng Zhang and Dengguo Feng
-
2004/205 ( PDF )
- Direct Anonymous Attestation
- Ernie Brickell and Jan Camenisch and Liqun Chen
-
2004/204 ( PS PS.GZ PDF )
- Authenticated tree parity machine key exchange
- Markus Volkmer and Andre Schaumburg
-
2004/203 ( PS PS.GZ PDF )
- How to Cheat at Chess: A Security Analysis of the Internet Chess Club
- John Black and Martin Cochran and Ryan Gardner
-
2004/202 ( PS PS.GZ PDF )
- Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions
- Yuri Borissov, An Braeken, Svetla Nikova
-
2004/201 ( PS PS.GZ PDF )
- Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing
- Chunming Tang and Dingyi Pei and Zhuojun Liu and Yong He
-
2004/200 ( PS PS.GZ PDF )
- On Cheating Immune Secret Sharing
- An Braeken, Svetla Nikova, Ventzislav Nikov
-
2004/199 ( PDF )
- Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
- Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu
-
2004/198 ( PDF )
- Long Modular Multiplication for Cryptographic Applications
- Laszlo Hars
-
2004/197 ( PS PS.GZ PDF )
- SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation
- Helmut Kahl
-
2004/196 ( PS PS.GZ PDF )
- Password Based Key Exchange with Mutual Authentication
- Shaoquan Jiang and Guang Gong
-
2004/195 ( PS PS.GZ PDF )
- Signed Binary Representations Revisited
- Katsuyuki Okeya and Katja Schmidt-Samoa and Christian Spahn and Tsuyoshi Takagi
-
2004/194 ( PDF )
- A Note on An Encryption Scheme of Kurosawa and Desmedt
- Rosario Gennaro and Victor Shoup
-
2004/193 ( PDF )
- The Security and Performance of the Galois/Counter Mode of Operation (Full Version)
- David A. McGrew and John Viega
-
2004/192 ( -- withdrawn -- )
- Security Pitfalls of an efficient remote user authentication scheme using smart cards
- Manoj Kumar
-
2004/191 ( PS PS.GZ )
- Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations
- Pradeep Kumar Mishra
-
2004/190 ( PS PS.GZ PDF )
- Distributed Ring Signatures for Identity-Based Scenarios
- Javier Herranz and Germán Sáez
-
2004/189 ( PDF )
- Computing Modular Polynomials
- Denis Charles and Kristin Lauter
-
2004/188 ( PS PS.GZ PDF )
- Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design
- Vincent Carlier and Hervé Chabanne and Emmanuelle Dottax
-
2004/187 ( PS PS.GZ PDF )
- Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version
- Mathieu Ciet and Michael Neve and Eric Peeters and Jean-Jacques Quisquater
-
2004/186 ( -- withdrawn -- )
- A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy
- Manoj Kumar
-
2004/185 ( PS PS.GZ PDF )
- On the Existence of low-degree Equations for Algebraic Attacks
- Frederik Armknecht
-
2004/184 ( PS PS.GZ PDF )
- ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
- Amit K Awasthi and Sunder Lal
-
2004/183 ( PS PS.GZ PDF )
- A New Forward Secure Signature Scheme
- Bo Gyeong Kang and Je Hong Park and Sang Geun Hahn
-
2004/182 ( PS PS.GZ PDF )
- Simpler Session-Key Generation from Short Random Passwords
- Minh-Huyen Nguyen and Salil Vadhan
-
2004/181 ( PS PS.GZ PDF )
- On the Composition of Authenticated Byzantine Agreement
- Yehuda Lindell and Anna Lysyanskaya and Tal Rabin
-
2004/180 ( PDF )
- Efficient Identity-Based Encryption Without Random Oracles
- Brent R. Waters
-
2004/179 ( PS PS.GZ PDF )
- Identity Based Threshold Ring Signature
- Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu
-
2004/178 ( PDF )
- Optimal Updating of Ideal Threshold Schemes
- S. G. Barwick and W.-A. Jackson and K. M. Martin and C. M. O'Keefe
-
2004/177 ( PDF )
- Updating the Parameters of a Threshold Scheme by Minimal Broadcast
- S. G. Barwick and W.-A. Jackson and K. M. Martin
-
2004/176 ( PDF )
- A Biometric Identity Based Signature Scheme
- Andrew Burnett and Adam Duffy and Tom Dowling
-
2004/175 ( PDF )
- A Proof of Yao's Protocol for Secure Two-Party Computation
- Yehuda Lindell and Benny Pinkas
-
2004/174 ( PS PS.GZ PDF )
- Short Group Signatures
- Dan Boneh and Xavier Boyen and Hovav Shacham
-
2004/173 ( PS PS.GZ PDF )
- Secure Identity Based Encryption Without Random Oracles
- Dan Boneh and Xavier Boyen
-
2004/172 ( PS PS.GZ PDF )
- Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
- Dan Boneh and Xavier Boyen
-
2004/171 ( PS PS.GZ PDF )
- Short Signatures Without Random Oracles
- Dan Boneh and Xavier Boyen
-
2004/170 ( PS PS.GZ PDF )
- Efficient Consistency Proofs for Generalized Queries on a Committed Database
- Rafail Ostrovsky and Charles Rackoff and Adam Smith
-
2004/169 ( PDF )
- Regional Blackouts: Protection of Broadcast Content on 3G Networks.
- Alexander W. Dent and Allan Tomlinson
-
2004/168 ( PS PS.GZ )
- Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack
- T.Moh and J.M.Chen and Boyin Yang
-
2004/167 ( PS PS.GZ PDF )
- A Secure and Efficient Key Exchange Protocol for Mobile Communications
- Fuw-Yi Yang and Jinn-Ke Jan
-
2004/166 ( PDF )
- FRMAC, a Fast Randomized Message Authentication Code
- Eliane Jaulmes and Reynald Lercier
-
2004/165 ( PDF )
- A comparison of MNT curves and supersingular curves
- D. Page and N.P. Smart and F. Vercauteren
-
2004/164 ( PDF )
- ID-based Cryptography from Composite Degree Residuosity
- Man Ho Au and Victor K. Wei
-
2004/163 ( -- withdrawn -- )
- On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards
- Manoj Kumar
-
2004/162 ( PS PS.GZ PDF )
- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
- Ivan Damgaard and Thomas Pedersen and Louis Salvail
-
2004/161 ( PS PS.GZ PDF )
- Improvement of ThLeriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus
- Ko-ichi Nagao
-
2004/160 ( PS PS.GZ PDF )
- Scalable Public-Key Tracing and Revoking
- Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung
-
2004/159 ( PS PS.GZ PDF )
- Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
- Gergely Acs and Levente Buttyan and Istvan Vajda
-
2004/158 ( PDF )
- Mobile Terminal Security
- Olivier Benoit and Nora Dabbous and Laurent Gauteron and Pierre Girard and Helena Handschuh and David Naccache and Stéphane Socié and Claire Whelan
-
2004/157 ( PS PS.GZ PDF )
- Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three
- R. Granger and D. Page and M. Stam
-
2004/156 ( PDF )
- Quantum cryptography: a practical information security perspective
- Kenneth G. Paterson and Fred Piper and Ruediger Schack
-
2004/155 ( PDF )
- Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks
- Amir Herzberg and Ahmad Gbara
-
2004/154 ( PDF )
- Controlling Spam by Secure Internet Content Selection
- Amir Herzberg
-
2004/153 ( PS PS.GZ PDF )
- A double large prime variation for small genus hyperelliptic index calculus
- P. Gaudry and E. Thomé and N. Thériault and C. Diem
-
2004/152 ( PDF )
- Another Look at ``Provable Security''
- Neal Koblitz and Alfred Menezes
-
2004/151 ( PDF )
- Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$
- Mitsuhiro Haneda and Mitsuru Kawazoe and Tetsuya Takahashi
-
2004/150 ( PS PS.GZ PDF )
- An Authenticated Certificateless Public Key Encryption Scheme
- Young-Ran Lee and Hyang-Sook Lee
-
2004/149 ( PDF )
- Secure and Efficient AES Software Implementation for Smart Caards
- E. Trichina and L. Korkishko
-
2004/148 ( PDF )
- Provably Secure Delegation-by-Certification Proxy Signature Schemes
- Zuowen Tan and Zhuojun Liu
-
2004/147 ( PS PS.GZ PDF )
- Key Recovery Method for CRT Implementation of RSA
- Matthew J. Campagna and Amit Sethi
-
2004/146 ( PS PS.GZ )
- Near-Collisions of SHA-0
- Eli Biham, Rafi Chen
-
2004/145 ( PS PS.GZ PDF )
- Electromagnetic Side Channels of an FPGA Implementation of AES
- Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax and Hervé Pelletier
-
2004/144 ( PS PS.GZ )
- Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables
- Alexander Maximov and Martin Hell and Subhamoy Maitra
-
2004/143 ( PS PS.GZ PDF )
- Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash
- Nicolas T. Courtois
-
2004/142 ( -- withdrawn -- )
- Elliptic Curve based Signcryption and its Multi-party Schemes
- Yiliang HAN and Xiaoyuan YANG
-
2004/141 ( PS PS.GZ PDF )
- Elastic AES
- Debra L. Cook and Moti Yung and Angelos D. Keromytis
-
2004/140 ( -- withdrawn -- )
- Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher
- P. Kitsos and M. D. Galanis and O. Koufopavlou
-
2004/139 ( PS PS.GZ PDF )
- New Notions of Security: Achieving Universal Composability without Trusted Setup
- Manoj Prabhakaran and Amit Sahai
-
2004/138 ( PS PS.GZ PDF )
- How to Disembed a Program?
- Benoit Chevallier-Mames and David Naccache and Pascal Paillier and David Pointcheval
-
2004/137 ( PDF )
- New GF(2n) Parallel Multiplier Using Redundant Representation
- Haining Fan and Yiqi Dai
-
2004/136 ( PDF )
- CompChall: Addressing Password Guessing Attacks
- Vipul Goyal and Virendra Kumar and Mayank Singh and Ajith Abraham and Sugata Sanyal
-
2004/135 ( PDF )
- More Efficient Server Assisted One Time Signatures
- Vipul Goyal
-
2004/134 ( PDF )
- Secure and Efficient Masking of AES - A Mission Impossible?
- Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller
-
2004/133 ( PS PS.GZ PDF )
- Secret Handshakes from CA-Oblivious Encryption
- Claude Castelluccia and Stanislaw Jarecki and Gene Tsudik
-
2004/132 ( PS PS.GZ PDF )
- On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
- R. Granger and D. Page and M. Stam
-
2004/131 ( PS PS.GZ PDF )
- A New ID-based Signature with Batch Verification
- Jung Hee Cheon and Yongdae Kim and Hyo Jin Yoon
-
2004/130 ( PS PS.GZ PDF )
- Private Inference Control
- David Woodruff and Jessica Staddon
-
2004/129 ( PS PS.GZ PDF )
- Generalizing Kedlaya's order counting based on Miura Theory
- Joe Suzuki
-
2004/128 ( PS PS.GZ PDF )
- Elastic Block Ciphers
- Debra L. Cook and Moti Yung and Angelos D. Keromytis
-
2004/127 ( PS PS.GZ PDF )
- DDH-based Group Key Agreement in a Mobile Environment
- Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won
-
2004/126 ( PDF )
- Two Software Normal Basis Multiplication Algorithms for GF(2n)
- Haining Fan and Yiqi Dai
-
2004/125 ( PS PS.GZ PDF )
- EME*: extending EME to handle arbitrary-length messages with associated data
- Shai Halevi
-
2004/124 ( PS PS.GZ )
- Universally Composable DKG with Linear Number of Exponentiations
- Douglas Wikström
-
2004/123 ( PS PS.GZ PDF )
- On security of XTR public key cryptosystems against Side Channel Attacks
- Dong-Guk Han and Jongin Lim and Kouichi Sakurai
-
2004/122 ( PDF )
- A New Two-Party Identity-Based Authenticated Key Agreement
- Noel McCullagh and Paulo S. L. M. Barreto
-
2004/121 ( PS PS.GZ PDF )
- Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
- Tsz Hon Yuen and Victor K. Wei
-
2004/120 ( PS PS.GZ PDF )
- Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup
- Bartosz Zoltak
-
2004/119 ( PS PS.GZ PDF )
- Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
- Masayuki Abe and Serge Fehr
-
2004/118 ( PS PS.GZ PDF )
- Fast addition on non-hyperelliptic genus $3$ curves
- Stéphane Flon and Roger Oyono and Christophe Ritzenthaler
-
2004/117 ( PS PS.GZ PDF )
- Efficient and Forward-Secure Identity-Based Signcryption
- Noel McCullagh and Paulo S. L. M. Barreto
-
2004/116 ( PS PS.GZ PDF )
- On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions
- Ran Canetti and Eyal Kushilevitz and Yehuda Lindell
-
2004/115 ( PS PS.GZ PDF )
- Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange
- Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won
-
2004/114 ( PS PS.GZ )
- Improved Identity-Based Signcryption
- Liqun Chen and John Malone-Lee
-
2004/113 ( PS PS.GZ PDF )
- On the Security and Composability of the One Time Pad
- Dominik Raub and Rainer Steinwandt and Joern Mueller-Quade
-
2004/112 ( PDF )
- Relation between XL algorithm and Groebner Bases Algorithms
- M. Sugita and M. Kawazoe and H. Imai
-
2004/111 ( PS PS.GZ PDF )
- The Vulnerability of SSL to Chosen Plaintext Attack
- Gregory V. Bard
-
2004/110 ( PDF )
- Designing Against the `Overdefined System of Equations' Attack
- Carlisle Adams
-
2004/109 ( PDF )
- Concealing Complex Policies with Hidden Credentials
- Robert Bradshaw and Jason Holt and Kent Seamons
-
2004/108 ( PS PS.GZ PDF )
- Two Improved Partially Blind Signature Schemes from Bilinear Pairings
- Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
-
2004/107 ( PS PS.GZ PDF )
- Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic
- Bertrand BYRAMJEE and Sylvain DUQUESNE
-
2004/106 ( PDF )
- Capacity and Examples of Template Protecting Biometric Authentication Systems
- P. Tuyls and J. Goseling
-
2004/105 ( PS PS.GZ PDF )
- Receipt-Free Homomorphic Elections and Write-in Ballots
- Alessandro Acquisti
-
2004/104 ( PS PS.GZ PDF )
- Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings
- Lan Nguyen and Rei Safavi-Naini
-
2004/103 ( PS PS.GZ PDF )
- Cryptanalysis of SFlash v3
- Jintai Ding and Dieter Schmidt
-
2004/102 ( PS PS.GZ PDF )
- The Exact Security of an Identity Based Signature and its Applications
- Benoît Libert and Jean-Jacques Quisquater
-
2004/101 ( PS PS.GZ PDF )
- Provably Secure Masking of AES
- Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel
-
2004/100 ( PDF )
- The Sorcerer’s Apprentice Guide to Fault Attacks
- Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall and Claire Whelan
-
2004/099 ( PS PS.GZ PDF )
- Secure Hashed Diffie-Hellman over Non-DDH Groups
- Rosario Gennaro and Hugo Krawczyk and Tal Rabin
-
2004/098 ( PS PS.GZ PDF )
- Attacking a Public Key Cryptosystem Based on Tree Replacement
- María Isabel González Vasco and David Pérez García
-
2004/097 ( PDF )
- How To Re-initialize a Hash Chain
- Vipul Goyal
-
2004/096 ( -- withdrawn -- )
- On the Ambiguity of Concurrent Signatures
- Yi Mu and Fangguo Zhang and Willy Susilo
-
2004/095 ( PS PS.GZ PDF )
- GNFS Factoring Statistics of RSA-100, 110, ..., 150
- Kazumaro Aoki and Yuji Kida and Takeshi Shimoyama and Hiroki Ueda
-
2004/094 ( PS PS.GZ PDF )
- Block Ciphers and Stream Ciphers: The State of the Art
- Alex Biryukov
-
2004/093 ( PS PS.GZ PDF )
- A Provably Secure Nyberg-Rueppel Signature Variant with Applications
- Giuseppe Ateniese and Breno de Medeiros
-
2004/092 ( PS PS.GZ PDF )
- A New Stream Cipher HC-256
- Hongjun Wu
-
2004/091 ( PDF )
- Signature Bouquets: Immutability for Aggregated/Condensed Signatures
- Einar Mykletun and Maithili Narasimha and Gene Tsudik
-
2004/090 ( PDF )
- Provably Secure Authenticated Tree Based Group Key Agreement Protocol
- Ratna Dutta and Rana Barua and and Palash Sarkar
-
2004/089 ( PS PS.GZ PDF )
- Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance
- Mahalingam Ramkumar and Nasir Memon
-
2004/088 ( -- withdrawn -- )
- Efficient Batch Verification of Signature Schemes based on Bilinear Maps
- Noel McCullagh
-
2004/087 ( PS PS.GZ PDF )
- Using primitive subgroups to do more with fewer bits
- K. Rubin and A. Silverberg
-
2004/086 ( PDF )
- Fuzzy Identity Based Encryption
- Amit Sahai and Brent Waters
-
2004/085 ( PDF )
- The CS2 Block Cipher
- Tom St Denis
-
2004/084 ( PDF )
- Evaluating elliptic curve based KEMs in the light of pairings
- David Galindo and Sebastia Martin and Jorge L. Villar
-
2004/083 ( PDF )
- Scan Based Side Channel Attack on Data Encryption Standard
- Bo Yang and Kaijie Wu and Ramesh Karri
-
2004/082 ( PDF )
- The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
- Michael Backes and Birgit Pfitzmann and Michael Waidner
-
2004/081 ( PDF )
- Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers
- Philip Hawkes and Gregory G. Rose
-
2004/080 ( PDF )
- HENKOS Stream Cipher
- Marius Oliver Gheorghita
-
2004/079 ( PDF )
- Pairing-Based One-Round Tripartite Key Agreement Protocols
- Zhaohui Cheng and Luminita Vasiu and Richard Comley
-
2004/078 ( PS PS.GZ PDF )
- Analysis of the WinZip encryption method
- Tadayoshi Kohno
-
2004/077 ( PS PS.GZ PDF )
- Foundations of Group Signatures: The Case of Dynamic Groups
- Mihir Bellare and Haixia Shi and Chong Zhang
-
2004/076 ( PS PS.GZ PDF )
- Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders
- Aggelos Kiayias and Moti Yung
-
2004/075 ( PDF )
- An Hybrid Mode of Operation
- Alexis W. Machado
-
2004/074 ( PS PS.GZ PDF )
- Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael
- Liam Keliher and Henk Meijer and Stafford Tavares
-
2004/073 ( PS PS.GZ )
- Index calculus for abelian varieties and the elliptic curve discrete logarithm problem
- Pierrick Gaudry
-
2004/072 ( PS PS.GZ PDF )
- Asymmetric Cryptography: Hidden Field Equations
- Christopher Wolf and Bart Preneel
-
2004/071 ( PS PS.GZ PDF )
- An IBE Scheme to Exchange Authenticated Secret Keys
- Benits Jr, Waldyr and Terada, Routo
-
2004/070 ( PS PS.GZ PDF )
- Easy decision-Diffie-Hellman groups
- Steven D Galbraith and Victor Rotger
-
2004/069 ( PS PS.GZ )
- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
- Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai
-
2004/068 ( PDF )
- Synthesis of Secure FPGA Implementations
- Kris Tiri and Ingrid Verbauwhede
-
2004/067 ( PDF )
- Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis
- Kris Tiri and Ingrid Verbauwhede
-
2004/066 ( PDF )
- A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s.
- Kris Tiri and Ingrid Verbauwhede
-
2004/065 ( PS PS.GZ PDF )
- Refinements of Miller's Algorithm for Computing Weil/Tate Pairing
- Ian Blake, Kumar Murty, and Guangwu Xu
-
2004/064 ( PS PS.GZ PDF )
- Pairing-Based Cryptographic Protocols : A Survey
- Ratna Dutta and Rana Barua and Palash Sarkar
-
2004/063 ( PS PS.GZ PDF )
- An Oblivious Transfer Protocol with Log-Squared Communication
- Helger Lipmaa
-
2004/062 ( PS PS.GZ PDF )
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- John Black and Martin Cochran and Thomas Shrimpton
-
2004/061 ( PS PS.GZ PDF )
- TTS: Rank Attacks in Tame-Like Multivariate PKCs
- Bo-Yin Yang and Jiun-Ming Chen
-
2004/060 ( PS PS.GZ PDF )
- Positive Results and Techniques for Obfuscation
- Benjamin Lynn and Manoj Prabhakaran and Amit Sahai
-
2004/059 ( PS PS.GZ )
- Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
- Michael Backes and Birgit Pfitzmann
-
2004/058 ( PS PS.GZ PDF )
- Generating more MNT elliptic curves
- Michael Scott and Paulo S.L.M Barreto
-
2004/057 ( PS PS.GZ PDF )
- On Multiple Linear Approximations
- Alex Biryukov and Christophe De Cannière and Michael Quisquater
-
2004/055 ( PS PS.GZ PDF )
- Redundant Trinomials for Finite Fields of Characteristic $2$
- Christophe Doche
-
2004/054 ( PS PS.GZ PDF )
- Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
- Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
-
2004/053 ( PS PS.GZ PDF )
- Efficient and Universally Composable Committed Oblivious Transfer and Applications
- Juan Garay and Philip MacKenzie and Ke Yang
-
2004/052 ( PS PS.GZ PDF )
- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
- Tal Malkin and Satoshi Obana and Moti Yung
-
2004/051 ( PS PS.GZ PDF )
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Yan-Cheng Chang and Michael Mitzenmacher
-
2004/050 ( PS PS.GZ PDF )
- Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
- Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
-
2004/049 ( PS PS.GZ )
- Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
- Christophe Clavier
-
2004/048 ( PS PS.GZ PDF )
- Tail-MAC: A Message Authentication Scheme for Stream Ciphers
- Bartosz Zoltak
-
2004/047 ( PS PS.GZ )
- On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes
- Yodai Watanabe
-
2004/046 ( PS PS.GZ PDF )
- Revision of Tractable Rational Map Cryptosystem
- Lih-Chung Wang and Fei-Hwang Chang
-
2004/045 ( PS PS.GZ PDF )
- Lower Bounds and Impossibility Results for Concurrent Self Composition
- Yehuda Lindell
-
2004/044 ( PS PS.GZ PDF )
- Transitive Signatures Based on Non-adaptive Standard Signatures
- Zhou Sujing
-
2004/043 ( PS PS.GZ PDF )
- Multi-sequences with d-perfect property
- Xiutao Feng, Quanlong Wang and Zongduo Dai
-
2004/042 ( -- withdrawn -- )
- Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge
- Joseph K. Liu and Victor K. Wei and Duncan S. Wong
-
2004/041 ( PS PS.GZ )
- Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries
- Cheng-Kang Chu and Wen-Guey Tzeng
-
2004/040 ( PS PS.GZ PDF )
- Cryptanalysis of a timestamp-based password authentication scheme
- Lizhen Yang, Kefei Chen
-
2004/039 ( PDF )
- A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups
- Victor K. Wei
-
2004/038 ( PS PS.GZ PDF )
- Chameleon Hashing without Key Exposure
- Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim
-
2004/037 ( PS PS.GZ )
- A Provably Secure Scheme for Restrictive Partially Blind Signatures
- Fuw-Yi Yang and Jinn-Ke Jan
-
2004/036 ( PS PS.GZ PDF )
- Single Database Private Information Retrieval with Logarithmic Communication
- Yan-Cheng Chang
-
2004/035 ( PS PS.GZ PDF )
- Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
- Phillip Rogaway and Thomas Shrimpton
-
2004/034 ( PDF )
- s(n) An Arithmetic Function of Some Interest, and Related Arithmetic
- Gideon Samid
-
2004/033 ( PS PS.GZ PDF )
- New Approaches to Password Authenticated Key Exchange based on RSA
- Muxiang Zhang
-
2004/032 ( PS PS.GZ PDF )
- Compressed Pairings
- Michael Scott and Paulo S. L. M. Barreto
-
2004/031 ( PS PS.GZ PDF )
- Summation polynomials and the discrete logarithm problem on elliptic curves
- Igor Semaev
-
2004/030 ( PDF )
- Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$.
- Colin Stahlke
-
2004/029 ( PDF )
- Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
- Guido Bertoni and Luca Breveglieri and Thomas Wollinger and Christof Paar
-
2004/028 ( PS PS.GZ )
- Custodian-Hiding Verifiable Encryption
- Joseph K. Liu and Victor K. Wei and Duncan S. Wong
-
2004/027 ( PDF )
- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
- Joseph K. Liu and Victor K. Wei and Duncan S. Wong
-
2004/026 ( PS PS.GZ PDF )
- The CSQUARE Transform
- Tom St Denis
-
2004/025 ( PDF )
- Clarifying Obfuscation: Improving the Security of White-Box Encoding
- Hamilton E. Link and William D. Neumann
-
2004/024 ( PS PS.GZ PDF )
- Exponential S-boxes
- Sergey Agievich and Andrey Afonenko
-
2004/023 ( PDF )
- RDS: Remote Distributed Scheme for Protecting Mobile Agents
- Asnat Dadon-Elichai
-
2004/022 ( PS PS.GZ PDF )
- Privacy-Enhanced Searches Using Encrypted Bloom Filters
- Steven M. Bellovin and William R. Cheswick
-
2004/021 ( PS PS.GZ PDF )
- Externalized Fingerprint Matching
- Claude Barral and Jean-Sébastien Coron and David Naccache
-
2004/020 ( PS PS.GZ PDF )
- Optimal Signcryption from Any Trapdoor Permutation
- Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish
-
2004/019 ( PS PS.GZ PDF )
- New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
- Tetsu Iwata and Tadayoshi Kohno
-
2004/018 ( PS PS.GZ PDF )
- Corrections of the NIST Statistical Test Suite for Randomness
- Song-Ju Kim and Ken Umeno and Akio Hasegawa
-
2004/017 ( PS PS.GZ )
- Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints
- M. Scott
-
2004/016 ( PS PS.GZ PDF )
- A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer
- Dennis Hofheinz and Joern Mueller-Quade
-
2004/015 ( PDF )
- An AGM-type elliptic curve point counting algorithm in characteristic three
- Trond Stølen Gustavsen and Kristian Ranestad
-
2004/014 ( PS PS.GZ PDF )
- Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions
- Sugata Gangopadhyay and Subhamoy Maitra
-
2004/013 ( PS PS.GZ PDF )
- Cryptanalysis of a Provably Secure Cryptographic Hash Function
- Jean-Sebastien Coron and Antoine Joux
-
2004/012 ( PS PS.GZ PDF )
- Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
- Maria Isabel Gonzalez Vasco and Rainer Steinwandt
-
2004/011 ( PDF )
- Known-Plaintext Attack Against a Permutation Based Video
- Adam J. Slagell
-
2004/010 ( PDF )
- Fast Pseudo-Hadamard Transforms
- Tom St Denis
-
2004/009 ( PS PS.GZ PDF )
- Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness
- Juan A. Garay and Philip MacKenzie and Ke Yang
-
2004/008 ( PS PS.GZ PDF )
- The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
- Mihir Bellare and Adriana Palacio
-
2004/007 ( PS PS.GZ PDF )
- Traceable Signatures
- Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
-
2004/006 ( PS PS.GZ )
- Protocol Initialization for the Framework of Universal Composability
- Boaz Barak and Yehuda Lindell and Tal Rabin
-
2004/005 ( PDF )
- Universal Undeniable Signatures
- Huafei Zhu
-
2004/004 ( -- withdrawn -- )
- None
- None
-
2004/003 ( PS PS.GZ )
- On the Role of the Inner State Size in Stream Ciphers
- Erik Zenner
-
2004/002 ( PS PS.GZ PDF )
- Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation
- Yuichi Komano and Kazuo Ohta
-
2003/265 ( PDF )
- Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications
- Yunlei ZHAO
-
2003/264 ( PS PS.GZ )
- Inversion of Several Field Elements: A New Parallel Algorithm
- Pradeep Kumar Mishra and Palash Sarkar
-
2003/263 ( PS PS.GZ PDF )
- Security Analysis of Lal and Awasthi's Proxy Signature Schemes
- Manik Lal Das and Ashutosh Saxena and V P Gulati
-
2003/262 ( PS PS.GZ PDF )
- A Secure Modified ID-Based Undeniable Signature Scheme
- Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
-
2003/261 ( PS PS.GZ PDF )
- A provably secure ID-based ring signature scheme
- Javier Herranz and Germán Sáez
-
2003/260 ( PDF )
- An Improved ID-based Authenticated Group Key Agreement Scheme
- Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
-
2003/259 ( PS PS.GZ PDF )
- Attack on Two ID-based Authenticated Group Key Agreement Schemes
- Fangguo Zhang and Xiaofeng Chen
-
2003/258 ( PDF )
- Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices.
- Marcin Rogawski
-
2003/257 ( PDF )
- Trading Inversions for Multiplications in Elliptic Curve Cryptography
- Mathieu Ciet and Marc Joye and Kristin Lauter and Peter L. Montgomery
-
2003/256 ( -- withdrawn -- )
- On the Security of a Multi-Party Certified Email Protocol
- Jianying Zhou
-
2003/255 ( PS PS.GZ PDF )
- Improved Constructions for Universal Re-encryption.
- Peter Fairbrother
-
2003/254 ( PDF )
- Committing Encryption and Publicly-Verifiable SignCryption
- Yitchak Gertner and Amir Herzberg
-
2003/253 ( PDF )
- Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
- Roberto Maria Avanzi
-
2003/252 ( PS PS.GZ PDF )
- On Simulation-Sound Trapdoor Commitments
- Philip MacKenzie and Ke Yang
-
2003/251 ( PDF )
- Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields
- EunKyung Jeong
-
2003/250 ( PS PS.GZ PDF )
- Breaking the Stream Cipher Whitenoise
- Hongjun Wu
-
2003/249 ( PS PS.GZ PDF )
- Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004)
- Stephen Boren and Andre Brisson
-
2003/248 ( PS PS.GZ PDF )
- Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n)
- Izuru Kitamura and Masanobu Katagi
-
2003/247 ( PDF )
- ID-based Authenticated Two Round Multi-Party Key Agreement
- Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
-
2003/246 ( PS PS.GZ PDF )
- Quantum Digital Signature Based on Quantum One-way Functions
- Xin L¨ą and Deng-Guo Feng
-
2003/245 ( PS PS.GZ PDF )
- A Key Substitution Attack on SFLASH^{v3}
- Willi Geiselmann and Rainer Steinwandt
-
2003/244 ( PS PS.GZ PDF )
- Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks
- Tri Van Le and Kaoru Kurosawa
-
2003/243 ( PS PS.GZ PDF )
- An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures
- Guilin Wang
-
2003/242 ( PDF )
- Improved Weil and Tate pairings for elliptic and hyperelliptic curves
- Kirsten Eisentraeger and Kristin Lauter and Peter L. Montgomery
-
2003/241 ( PS PS.GZ PDF )
- Hybrid Broadcast Encryption and Security Analysis
- Shaoquan Jiang ang Guang Gong
-
2003/240 ( PS PS.GZ PDF )
- How to Break and Repair a Universally Composable Signature Functionality
- Michael Backes and Dennis Hofheinz
-
2003/239 ( PS PS.GZ PDF )
- Universally Composable Signatures, Certification and Authentication
- Ran Canetti
-
2003/238 ( PDF )
- Chameleon Signature from Bilinear Pairing
- Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
-
2003/237 ( PS PS.GZ PDF )
- Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
- Benoit Chevallier-Mames and Mathieu Ciet and Marc Joye
-
2003/236 ( PDF )
- Combinational Logic Design for AES SubByte Transformation on Masked Data
- Elena Trichina
-
2003/235 ( PS PS.GZ PDF )
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
-
2003/234 ( PS PS.GZ )
- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
- Gene Itkis and Peng Xie
-
2003/233 ( PS PS.GZ PDF )
- Public Key Steganography
- Luis von Ahn and Nicholas J. Hopper
-
2003/232 ( PS PS.GZ PDF )
- The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm
- Chunming Tang and Zhuojun Liu and Jinwang Liu
-
2003/231 ( PS PS.GZ PDF )
- Public-Key Steganography with Active Attacks
- Michael Backes and Christian Cachin
-
2003/230 ( PS PS.GZ PDF )
- A Fast Provably Secure Cryptographic Hash Function
- Daniel Augot and Matthieu Finiasz and Nicolas Sendrier
-
2003/229 ( PS PS.GZ PDF )
- Algebraic Attacks on Summation Generators
- Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and Dukjae Moon
-
2003/228 ( PDF )
- Verifiably Committed Signatures Provably Secure in The Standard Complexity Model
- Huafei Zhu
-
2003/227 ( PS PS.GZ PDF )
- Attacks on a Secure Group Communication Scheme With Hierarchical Access Control
- Willi Geiselmann and Rainer Steinwandt
-
2003/226 ( PS PS.GZ PDF )
- On the Security of a Group Signature Scheme with Forward Security
- Guilin Wang
-
2003/225 ( PS PS.GZ )
- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
- Palash Sarkar
-
2003/224 ( -- withdrawn -- )
-
-
-
2003/223 ( PS PS.GZ PDF )
- Cryptanalysis of a Cryptosystem based on Drinfeld modules
- Simon R. Blackburn, Carlos Cid and Steven D. Galbraith
-
2003/222 ( PS PS.GZ PDF )
- A Verifiable Secret Sharing Scheme with Statistical zero-knowledge
- Chunming Tang and Zhuojun Liu and Mingsheng Wang
-
2003/221 ( PS PS.GZ PDF )
- A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism
- Jung Hee Cheon and Hyun Soo Nam
-
2003/220 ( PS PS.GZ PDF )
- A short comment on the affine parts of SFLASH^{v3}
- Willi Geiselmann and Rainer Steinwandt
-
2003/219 ( PS PS.GZ PDF )
- Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
- Jean-Sebastien Coron
-
2003/218 ( PDF )
- A Security Evaluation of Whitenoise
- David Wagner
-
2003/217 ( PS PS.GZ PDF )
- Chemical Combinatorial Attacks on Keyboards
- Eric Brier and David Naccache and Pascal Paillier
-
2003/216 ( PS PS.GZ PDF )
- Secure Indexes
- Eu-Jin Goh
-
2003/215 ( PDF )
- Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC
- Bo Yang and Ramesh Karri and David Mcgrew
-
2003/214 ( PS PS.GZ )
- Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols
- Rosario Gennaro
-
2003/213 ( PS PS.GZ PDF )
- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$
- Y.Choie and E.Jeong
-
2003/212 ( PS PS.GZ PDF )
- High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
- Jan Pelzl and Thomas Wollinger and Christof Paar
-
2003/211 ( PS PS.GZ PDF )
- SFLASHv3, a fast asymmetric signature scheme
- Nicolas T. Courtois, Louis Goubin and Jacques Patarin
-
2003/210 ( PS PS.GZ PDF )
- On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
- Ventzislav Nikov and Svetla Nikova
-
2003/209 ( PS PS.GZ PDF )
- Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003
- Daniel Augot and Matthieu Finiasz and Pierre Loidreau
-
2003/208 ( PS PS.GZ PDF )
- ID-Based Chameleon Hashes from Bilinear Pairings
- Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
-
2003/207 ( PS PS.GZ PDF )
- Security Flaws in Several Group Signatures Proposed by Popescu
- Guilin Wang, and Sihan Qing
-
2003/206 ( PS PS.GZ PDF )
- Identity Based Undeniable Signatures
- Benoît Libert and Jean-Jacques Quisquater
-
2003/205 ( PS PS.GZ PDF )
- Improved Cryptanalysis of SecurID
- Scott Contini and Yiqun Lisa Yin
-
2003/204 ( PDF )
- A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials
- ZENG Xiangyong and HU Lei
-
2003/203 ( PS PS.GZ PDF )
- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors
- Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi
-
2003/202 ( PS PS.GZ PDF )
- Yet Another Sieving Device
- Willi Geiselmann and Rainer Steinwandt
-
2003/201 ( PDF )
- an attack on a multisignature scheme
- Zheng dong & KF.chen
-
2003/200 ( PDF )
- Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature
- Zheng Dong , Shengli Liu & kefei Chen
-
2003/199 ( PS PS.GZ PDF )
- Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
- Simon R. Blackburn and Kenneth G. Paterson
-
2003/198 ( PS PS.GZ PDF )
- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
- Kishan Chand Gupta and Palash Sarkar
-
2003/197 ( PS PS.GZ PDF )
- Revisiting fully distributed proxy signature schemes
- Javier Herranz and German Saez
-
2003/196 ( PS PS.GZ PDF )
- Security Analysis of Some Proxy Signatures
- Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
-
2003/195 ( PDF )
- Public Key Encryption with keyword Search
- Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano
-
2003/194 ( PS PS.GZ PDF )
- Security Analysis of Several Group Signature Schemes
- Guilin Wang
-
2003/193 ( PS PS.GZ PDF )
- Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
- Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk
-
2003/192 ( PS PS.GZ PDF )
- Universal Designated-Verifier Signatures
- Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk
-
2003/191 ( PS PS.GZ )
- Projective Coordinates Leak
- David Naccache and Nigel Smart and Jacques Stern
-
2003/190 ( -- withdrawn -- )
- Extending Joux's Protocol to Multi Party Key Agreement
- Rana Barua and Ratna Dutta and Palash Sarkar
-
2003/189 ( PDF )
- Cryptanalysis of publicly verifiable authenticated encryption
- Zuhua Shao
-
2003/188 ( PDF )
- A New Forward Secure Signature Scheme using Bilinear Maps
- Fei Hu and Chwan-Hwa Wu and J. D. Irwin
-
2003/187 ( PS PS.GZ PDF )
- Resource Bounded Unprovability of Computational Lower Bounds
- Tatsuaki Okamoto and Ryo Kashima
-
2003/186 ( PS PS.GZ PDF )
- Safe Prime Generation with a Combined Sieve
- Michael J. Wiener
-
2003/185 ( PS PS.GZ PDF )
- VMPC Stream Cipher
- Bartosz Zoltak
-
2003/184 ( PS PS.GZ PDF )
- What do DES S-boxes Say to Each Other ?
- Nicolas T. Courtois and Guilhem Castagnos and Louis Goubin
-
2003/183 ( PDF )
- Certificate-Based Encryption and the Certificate Revocation Problem
- Craig Gentry
-
2003/182 ( PS PS.GZ PDF )
- Chosen-Ciphertext Security from Identity-Based Encryption
- Ran Canetti, Shai Halevi, and Jonathan Katz
-
2003/181 ( PS PS.GZ PDF )
- On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
- Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai
-
2003/180 ( PS PS.GZ )
- Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
- Pradeep Kumar Mishra and Palash Sarkar
-
2003/179 ( PS PS.GZ PDF )
- VMPC One-Way Function
- Bartosz Zoltak
-
2003/178 ( PDF )
- Constructing Optimistic Fair Exchange Protocols from Committed Signatures
- Huafei Zhu
-
2003/177 ( PS PS.GZ PDF )
- Building Secure Cryptographic Transforms, or How to Encrypt and MAC
- Tadayoshi Kohno and Adriana Palacio and John Black
-
2003/176 ( PS PS.GZ PDF )
- Patterson-Wiedemann Construction Revisited
- S. Gangopadhyay and P. H. Keskar and S. Maitra
-
2003/175 ( PS PS.GZ PDF )
- Double-Speed Safe Prime Generation
- David Naccache
-
2003/174 ( PS PS.GZ PDF )
- Relaxing Chosen-Ciphertext Security
- Ran Canetti and Hugo Krawczyk and Jesper Nielsen
-
2003/173 ( PS PS.GZ PDF )
- Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration
- Palash Sarkar
-
2003/172 ( PS PS.GZ PDF )
- NAEP: Provable Security in the Presence of Decryption Failures
- Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte
-
2003/171 ( PS PS.GZ PDF )
- Scalable Protocols for Authenticated Group Key Exchange
- Jonathan Katz and Moti Yung
-
2003/170 ( PS PS.GZ PDF )
- HARPS: HAshed Random Preloaded Subset Key Distribution
- Mahalingam Ramkumar and Nasir Memon
-
2003/169 ( PS PS.GZ PDF )
- Properties of the Transformation Semigroup of the Solitaire Stream Cipher
- Boris Pogorelov and Marina Pudovkina
-
2003/168 ( PS PS.GZ )
- Robust discretization, with an application to graphical passwords
- Jean-Camille Birget and Dawei Hong and Nasir Memon
-
2003/167 ( PDF )
- Identity-based Chameleon Hash and Applications
- Giuseppe Ateniese and Breno de Medeiros
-
2003/166 ( PS PS.GZ PDF )
- A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves
- Igor Semaev
-
2003/165 ( PDF )
- Commitment Capacity of Discrete Memoryless Channels
- Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
-
2003/164 ( PS PS.GZ PDF )
- Identity-Based Threshold Decryption
- Joonsang Baek and Yuliang Zheng
-
2003/163 ( PS PS.GZ PDF )
- Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography
- Xavier Boyen
-
2003/162 ( PS PS.GZ PDF )
- Cryptanalysis of the Alleged SecurID Hash Function
- Alex Biryukov and Joseph Lano and Bart Preneel
-
2003/161 ( PS PS.GZ PDF )
- Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
- Ueli Maurer and Renato Renner and Clemens Holenstein
-
2003/160 ( PS PS.GZ PDF )
- A More Secure and Efficacious TTS Signature Scheme
- Jiun-Ming Chen and Bo-Yin Yang
-
2003/159 ( PS PS.GZ PDF )
- An efficient variant of the RSA cryptosystem
- Cesar Alison Monteiro Paixăo
-
2003/158 ( PS PS.GZ )
- A Sufficient Condition and Optimal Domain Extension of UOWHF
- Mridul Nandi
-
2003/157 ( PS PS.GZ )
- Some RSA-based Encryption Schemes with Tight Security Reduction
- Kaoru Kurosawa and Tsuyoshi Takagi
-
2003/156 ( PS PS.GZ PDF )
- Efficient Provably Secure Public Key Steganography
- Tri Van Le
-
2003/155 ( PDF )
- A Formal Proof of Zhu's Signature Scheme
- huafei zhu
-
2003/154 ( PS PS.GZ )
- ManTiCore: Encryption with Joint Cipher-State Authentication
- Cheryl Beaver and Timothy Draelos and Richard Schroeppel and Mark Torgerson
-
2003/153 ( PDF )
- Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem
- Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG
-
2003/152 ( PDF )
- Optimal Statistical Power Analysis
- Eric Brier and Christophe Clavier and Francis Olivier
-
2003/151 ( PDF )
- Secret sharing schemes on sparse homogeneous access structures with rank three
- Jaume Martí-Farré and Carles Padró
-
2003/150 ( PS PS.GZ PDF )
- On the random-oracle methodology as applied to length-restricted signature schemes
- Ran Canetti and Oded Goldreich and Shai Halevi
-
2003/149 ( -- withdrawn -- )
- Forward-Secure Hierarchical ID-Based Cryptography
- Danfeng Yao and Anna Lysyanskaya
-
2003/148 ( PS PS.GZ PDF )
- A Tweakable Enciphering Mode
- Shai Halevi and Phillip Rogaway
-
2003/147 ( PS PS.GZ PDF )
- A Parallelizable Enciphering Mode
- Shai Halevi and Phillip Rogaway
-
2003/146 ( PS PS.GZ PDF )
- Breaking and Repairing Optimistic Fair Exchange from PODC 2003
- Yevgeniy Dodis and Leonid Reyzin
-
2003/145 ( PS PS.GZ )
- Symmetric Authentication Within a Simulatable Cryptographic Library
- Michael Backes and Birgit Pfitzmann and Michael Waidner
-
2003/144 ( PS PS.GZ PDF )
- ID-based tripartite key agreement with signatures
- Divya Nalla
-
2003/143 ( PS PS.GZ PDF )
- Elliptic curves suitable for pairing based cryptography
- Friederike Brezing and Annegret Weng
-
2003/142 ( PS PS.GZ )
- A New Tree based Domain Extension of UOWHF
- Mridul Nandi
-
2003/141 ( PS PS.GZ PDF )
- General Composition and Universal Composability in Secure Multiparty Computation
- Yehuda Lindell
-
2003/140 ( PS PS.GZ PDF )
- Trading-Off Type-Inference Memory Complexity Against Communication
- Konstantin Hyppönen and David Naccache and Elena Trichina and Alexei Tchoulkine
-
2003/139 ( PDF )
- On the Randomness of the Editing Generator
- Enjian Bai and Guozhen Xiao
-
2003/138 ( PS PS.GZ )
- Permutation graphs, fast forward permutations, and
- Boaz Tsaban
-
2003/137 ( PS PS.GZ )
- Bernoulli numbers and the probability of a birthday surprise
- Boaz Tsaban
-
2003/136 ( PS PS.GZ )
- Efficient linear feedback shift registers with maximal period
- Boaz Tsaban and Uzi Vishne
-
2003/135 ( PS PS.GZ PDF )
- Collision Attack on Reduced-Round Camellia
- Wen-Ling Wu and Deng-Guo Feng
-
2003/134 ( -- withdrawn -- )
- Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions
- Sugata Gangopadhyay and Subhamoy Maitra
-
2003/133 ( PS PS.GZ PDF )
- Minimum Distance between Bent and 1-resilient Boolean Functions
- Soumen Maity and Subhamoy Maitra
-
2003/132 ( PS PS.GZ )
- Guaranteeing the diversity of number generators
- Adi Shamir and Boaz Tsaban
-
2003/131 ( PS PS.GZ PDF )
- Homomorphic public-key systems based on subgroup membership problems
- Kristian Gjřsteen
-
2003/130 ( PS PS.GZ PDF )
- On the Pseudorandomness of KASUMI Type Permutations
- Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa
-
2003/129 ( PS PS.GZ PDF )
- Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03
- Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
-
2003/128 ( PS PS.GZ )
- Weak Fields for ECC
- Alfred Menezes and Edlyn Teske and Annegret Weng
-
2003/127 ( PDF )
- Using Information Theory Approach to Randomness Testing
- B. Ya. Ryabko and V.A. Monarev
-
2003/126 ( PS PS.GZ PDF )
- Certificateless Public Key Cryptography
- Sattam S. Al-Riyami and Kenneth G. Paterson
-
2003/125 ( PS PS.GZ PDF )
- Algebraic Attacks on Combiners with Memory and Several Outputs
- Nicolas T. Courtois
-
2003/124 ( PS PS.GZ )
- A General Correlation Theorem
- Kishan Chand Gupta and Palash Sarkar
-
2003/123 ( PS PS.GZ PDF )
- Assessing security of some group based cryptosystems
- Vladimir Shpilrain
-
2003/122 ( PDF )
- Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols
- Kyungah Shim
-
2003/121 ( PS PS.GZ )
- A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
- Michael Backes and Birgit Pfitzmann
-
2003/120 ( PS PS.GZ PDF )
- Physically Observable Cryptography
- Silvio Micali and Leonid Reyzin
-
2003/119 ( PS PS.GZ PDF )
- How Secure Are FPGAs in Cryptographic Applications?
- Thomas Wollinger and Christof Paar
-
2003/118 ( PS PS.GZ )
- Visual Crypto Displays Enabling Secure Communications
- Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk
-
2003/117 ( PDF )
- An identity-based ring signature scheme from bilinear pairings
- Chih-Yin Lin and Tzong-Chen Wu
-
2003/116 ( PS PS.GZ PDF )
- A New ID-based Group Signature Scheme from Bilinear Pairings
- Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim
-
2003/115 ( PDF )
- Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
- Kyungah Shim
-
2003/114 ( PS PS.GZ )
- Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions
- Michael Backes
-
2003/113 ( PS PS.GZ PDF )
- Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings
- Hung-Min Sun and Bin-Tsan Hsieh
-
2003/112 ( PS PS.GZ )
- Accumulating Composites and Improved Group Signing
- Gene Tsudik and Shouhuai Xu
-
2003/111 ( -- withdrawn -- )
- Further Cryptanalysis of some Proxy Signature Schemes
- Jiqiang Lv and Jingwei Liu and Xinmei Wang
-
2003/110 ( PDF )
- Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key
- Yukio Itakura and Shigeo Tsujii
-
2003/109 ( PS PS.GZ PDF )
- Crytanalysis of SAFER++
- Alex Biryukov and Christophe De Cannière and Gustaf Dellkrantz
-
2003/108 ( PS PS.GZ PDF )
- Novel Cyclic and Algebraic Properties of AES
- Tri Van Le
-
2003/107 ( PS PS.GZ PDF )
- Fujisaki-Okamoto IND-CCA hybrid encryption revisited
- David Galindo and Sebastià Martín and Paz Morillo and Jorge L. Villar
-
2003/106 ( PS PS.GZ PDF )
- CWC: A high-performance conventional authenticated encryption mode
- Tadayoshi Kohno and John Viega and Doug Whiting
-
2003/105 ( PS PS.GZ )
- On Diophantine Complexity and Statistical Zero-Knowledge Arguments
- Helger Lipmaa
-
2003/104 ( PS PS.GZ PDF )
- New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing
- Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin
-
2003/103 ( PS PS.GZ PDF )
- Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
- Zhongliang Chen
-
2003/102 ( PDF )
- Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
- J. Hughes, and A. Tannenbaum
-
2003/101 ( -- withdrawn -- )
- Cryptanalysis of HFE
- Ilia Toli
-
2003/100 ( PS PS.GZ PDF )
- Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model
- Yehuda Lindell
-
2003/099 ( PS PS.GZ PDF )
- Algorithms in Braid Groups
- Matthew J. Campagna
-
2003/098 ( PDF )
- Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
- Vlastimil Klima and Tomas Rosa
-
2003/097 ( PS PS.GZ PDF )
- Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves
- Jan Pelzl and Thomas Wollinger and Christof Paar
-
2003/096 ( PDF )
- Secure Proxy Signature Schemes for Delegation of Signing Rights
- Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi
-
2003/095 ( PS PS.GZ PDF )
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Yevgeniy Dodis and Nelly Fazio
-
2003/094 ( PS PS.GZ PDF )
- Trace Zero Subvariety for Cryptosystems
- Tanja Lange
-
2003/093 ( PS PS.GZ PDF )
- Simple Stateless Steganography
- Leonid Reyzin and Scott Russell
-
2003/092 ( PS PS.GZ PDF )
- Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol
- Muxiang Zhang
-
2003/091 ( PS PS.GZ PDF )
- Sequential Aggregate Signatures from Trapdoor Permutations
- Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham
-
2003/090 ( PDF )
- A Structured Multisignature Scheme from the Gap Diffie-Hellman Group
- Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang
-
2003/089 ( PS PS.GZ PDF )
- Efficient Public Key Generation for Multivariate Cryptosystems
- Christopher Wolf
-
2003/088 ( PDF )
- Elliptic Curve Point Multiplication
- A.G.Rostovtsev and E.B.Makhovenko
-
2003/087 ( PS PS.GZ PDF )
- A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
- huafei zhu
-
2003/086 ( PS PS.GZ PDF )
- On the Selection of Pairing-Friendly Groups
- Paulo S. L. M. Barreto and Ben Lynn and Michael Scott
-
2003/085 ( PS PS.GZ )
- A defect of the implementation schemes of the TTM cryptosystem
- Jintai Ding, Dieter Schmidt
-
2003/084 ( PS PS.GZ )
- Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem
- Jintai Ding, Timonthy Hodges
-
2003/083 ( PS PS.GZ PDF )
- A Forward-Secure Public-Key Encryption Scheme
- Ran Canetti and Shai Halevi and Jonathan Katz
-
2003/082 ( PS PS.GZ PDF )
- Stronger Security Bounds for OMAC, TMAC and XCBC
- Tetsu Iwata and Kaoru Kurosawa
-
2003/081 ( PDF )
- Primitive Specification for SOBER-128
- Philip Hawkes and Greg Rose
-
2003/080 ( PS PS.GZ PDF )
- Non-interactive and Reusable Non-malleable Commitment Schemes
- Ivan Damgĺrd and Jens Groth
-
2003/079 ( PS PS.GZ PDF )
- Fast arithmetic on Jacobians of Picard curves
- Stéphane Flon and Roger Oyono
-
2003/078 ( PS PS.GZ PDF )
- Relation among simulator-based and comparison-based definitions of semantic security
- Yodai Watanabe and Junji Shikata
-
2003/077 ( PS PS.GZ PDF )
- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem
- Mihir Bellare and Alexandra Boldyreva and Adriana Palacio
-
2003/076 ( PS PS.GZ PDF )
- Goldbach’s Conjecture on ECDSA Protocols
- N. Vijayarangan, Nitin Agarwal, S. Kasilingam
-
2003/075 ( PS PS.GZ )
- Almost Security of Cryptographic Boolean Functions
- Kaoru Kurosawa
-
2003/074 ( PDF )
- Divisible Voting Scheme
- Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata
-
2003/073 ( PDF )
- A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures
- Sunder Lal and Amit K Awasthi
-
2003/072 ( PDF )
- Proxy Blind Signature Scheme
- Amit K Awasthi and Sunder Lal
-
2003/071 ( PS PS.GZ PDF )
- How to Protect Against a Militant Spammer
- Markus Jakobsson and John Linn and Joy Algesheimer
-
2003/070 ( PS PS.GZ PDF )
- A Critique of CCM
- P. Rogaway and D. Wagner
-
2003/069 ( PS PS.GZ )
- EAX: A Conventional Authenticated-Encryption Mode
- M. Bellare and P. Rogaway and D. Wagner
-
2003/068 ( PS PS.GZ PDF )
- On the Security of Some Proxy Signature Schemes
- Hung-Min Sun and Bin-Tsan Hsieh
-
2003/067 ( PS PS.GZ PDF )
- Forking Lemmas in the Ring Signatures' Scenario
- Javier Herranz and Germán Sáez
-
2003/066 ( PS PS.GZ PDF )
- Signcryption scheme for Identity-based Cryptosystems
- Divya Nalla, K.C.Reddy
-
2003/065 ( PS PS.GZ PDF )
- Hash Function Balance and its Impact on Birthday Attacks
- Mihir Bellare and Tadayoshi Kohno
-
2003/064 ( PS PS.GZ PDF )
- On the Optimality of Linear, Differential and Sequential Distinguishers
- Pascal Junod
-
2003/063 ( PS PS.GZ PDF )
- Initiator-Resilient Universally Composable Key Exchange
- Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt
-
2003/062 ( PS PS.GZ )
- Extending Joux's Protocol to Multi Party Key Agreement
- Rana Barua and Ratna Dutta and Palash Sarkar
-
2003/061 ( PDF )
- Hidden Polynomial Cryptosystems
- Ilia Toli
-
2003/060 ( PS PS.GZ PDF )
- Isomorphism Classes of Picard Curves over Finite Fields
- Jong Won Lee
-
2003/059 ( -- withdrawn -- )
- A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack
- Huafei Zhu and Bao Feng and Robert H. Deng
-
2003/058 ( PS PS.GZ PDF )
- An Elliptic Curve Trapdoor System
- Edlyn Teske
-
2003/057 ( PS PS.GZ )
- Secure Multiplication of Shared Secrets in the Exponent
- Mario Di Raimondo and Rosario Gennaro
-
2003/056 ( PS PS.GZ PDF )
- Computing of Trust in Distributed Networks
- Huafei Zhu and Bao Feng and Robert H. Deng
-
2003/055 ( PDF )
- A New Approach to Prevent Blackmailing in E-Cash
- Xiaofeng Chen and Fangguo Zhang and Yumin Wang
-
2003/054 ( PS PS.GZ PDF )
- ID based Cryptosystems with Pairing on Elliptic Curve
- Ryuichi SAKAI and Masao KASAHARA
-
2003/053 ( PS PS.GZ )
- Tate-pairing implementations for tripartite key agreement
- Iwan Duursma and Hyang-Sook Lee
-
2003/052 ( PDF )
- Attacking RSA-based Sessions in SSL/TLS
- Vlastimil Klima and Ondrej Pokorny and Tomas Rosa
-
2003/051 ( PS PS.GZ )
- How to Predict the Output of a Hardware Random Number Generator
- Markus Dichtl
-
2003/050 ( PS PS.GZ PDF )
- Concealment and its Applications to Authenticated Encryption
- Yevgeniy Dodis and Jee Hea An
-
2003/049 ( PS PS.GZ PDF )
- Hidden Number Problem in Small Subgroups
- Igor Shparlinski and Arne Winterhof
-
2003/048 ( PS PS.GZ PDF )
- Compounding Secret Sharing Schemes
- E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
-
2003/047 ( PS PS.GZ PDF )
- A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme
- Masao KASAHARA and Ryuichi SAKAI
-
2003/046 ( PS PS.GZ PDF )
- Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers
- Guilin Wang, and Bo Zhu
-
2003/045 ( PDF )
- An algorithm to obtain an RSA modulus with a large private key
- L. Hernández Encinas and J. Muñoz Masqué and A. Queiruga Dios
-
2003/044 ( -- withdrawn -- )
- Signcryption scheme for Identity-based Cryptosystems
- Divya Nalla, K.C.Reddy
-
2003/043 ( -- withdrawn -- )
- Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings
- Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish
-
2003/042 ( PS PS.GZ )
- Timed Fair Exchange of Standard Signatures
- Juan A. Garay and Carl Pomerance
-
2003/041 ( PS PS.GZ )
- A new statistical distinguisher for the shrinking generator
- Jovan Dj. Golic and Renato Menicocci
-
2003/040 ( PS PS.GZ )
- Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function
- Kishan Chand Gupta and Palash Sarkar
-
2003/039 ( PS PS.GZ PDF )
- Torus-based cryptography
- Karl Rubin and Alice Silverberg
-
2003/038 ( PS PS.GZ PDF )
- Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
- Kazukuni Kobara and Hideki Imai
-
2003/037 ( PS PS.GZ PDF )
- Strengthening Zero-Knowledge Protocols using Signatures
- Juan A. Garay and Philip MacKenzie and Ke Yang
-
2003/036 ( PS PS.GZ PDF )
- Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
- Jean-Sebastien Coron
-
2003/035 ( PDF )
- On alternative approach for verifiable secret sharing
- Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk
-
2003/034 ( PS PS.GZ PDF )
- On the (In)security of the Fiat-Shamir Paradigm
- Shafi Goldwasser and Yael Tauman
-
2003/033 ( PDF )
- Integral Cryptanalysis on reduced-round Safer++
- Gilles Piret and Jean-Jacques Quisquater
-
2003/032 ( PS PS.GZ )
- A Framework for Password-Based Authenticated Key Exchange
- Rosario Gennaro and Yehuda Lindell
-
2003/031 ( PS PS.GZ PDF )
- Cryptographic Tamper Evidence
- Gene Itkis
-
2003/030 ( PS PS.GZ PDF )
- Efficient Multi-Party Computation over Rings
- Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz
-
2003/029 ( -- withdrawn -- )
- Universal Padding Schemes for RSA with Optimal Bandwidth of Message Recovery
- Wenbo Mao and John Malone-Lee
-
2003/028 ( PS PS.GZ PDF )
- Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
- Mathieu Ciet and Marc Joye
-
2003/027 ( PS PS.GZ )
- Cryptographic Randomized Response Techniques
- Andris Ambainis and Markus Jakobsson and Helger Lipmaa
-
2003/026 ( PS PS.GZ PDF )
- Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)
- Jan Pelzl and Thomas Wollinger and Jorge Guajardo and Christof Paar
-
2003/025 ( PS PS.GZ )
- Homomorphic public-key cryptosystems and encrypting boolean circuits
- D.Grigoriev. I.Ponomarenko
-
2003/024 ( PS PS.GZ PDF )
- On Modeling IND-CCA Security in Cryptographic Protocols
- Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt
-
2003/023 ( PS PS.GZ PDF )
- New identity based signcryption schemes from pairings
- Benoît Libert and Jean-Jacques Quisquater
-
2003/022 ( PS PS.GZ PDF )
- Did Filiol Break AES ?
- Nicolas T. Courtois and Robert T. Johnson and Pascal Junod and Thomas Pornin and Michael Scott
-
2003/021 ( PS PS.GZ )
- Interleaving Cryptography and Mechanism Design: The Case of Online Auctions
- Edith Elkind and Helger Lipmaa
-
2003/020 ( PS PS.GZ PDF )
- Attacks based on Conditional Correlations against the Nonlinear Filter Generator
- Bernhard Löhlein
-
2003/019 ( PS PS.GZ PDF )
- A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem
- Jung Hee Cheon and Byungheup Jun
-
2003/018 ( PS PS.GZ PDF )
- An Authenticated Group Key Agreement Protocol on Braid groups
- HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
-
2003/017 ( PS PS.GZ )
- Perfect Hash Families with Few Functions
- Simon R. Blackburn
-
2003/016 ( PS PS.GZ PDF )
- A Threshold GQ Signature Scheme
- Cheng-Kang Chu and Li-Shan Liu and Wen-Guey Tzeng
-
2003/015 ( PS PS.GZ PDF )
- A Universally Composable Cryptographic Library
- Michael Backes and Birgit Pfitzmann and Michael Waidner
-
2003/014 ( PS PS.GZ )
- Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation
- Palash Sarkar
-
2003/013 ( PS PS.GZ PDF )
- Security Constraints on the Oswald-Aigner Exponentiation Algorithm
- Colin D. Walter
-
2003/012 ( PS PS.GZ PDF )
- The number of initial states of the RC4 cipher with the same cycle structure
- Marina Pudovkina
-
2003/011 ( PS PS.GZ PDF )
- Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme
- Fangguo Zhang and Kwangjo Kim
-
2003/010 ( PDF )
- Differential Fault Analysis on A.E.S.
- P. Dusart, G. Letourneux and O. Vivolo
-
2003/009 ( PS PS.GZ )
- Domain Extenders for UOWHF: A Finite Binary Tree Algorithm
- Palash Sarkar
-
2003/008 ( PS PS.GZ )
- DFA on AES
- Christophe Giraud
-
2003/007 ( -- withdrawn -- )
- A Price Negotiable Transaction System
- Huafei Zhu
-
2003/006 ( PS PS.GZ PDF )
- Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case
- Ventzislav Nikov, Svetla Nikova, Bart Preneel
-
2003/005 ( PS PS.GZ PDF )
- Distributing the Encryption and Decryption of a Block Cipher
- Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang and Peter R. Wild
-
2003/004 ( PS PS.GZ PDF )
- ID-based tripartite Authenticated Key Agreement Protocols from pairings
- Divya Nalla, and K.C.Reddy
-
2003/003 ( PS PS.GZ )
- Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case
- Eric FILIOL
-
2003/002 ( PS PS.GZ PDF )
- Imperfect Decryption and an Attack on the NTRU Encryption Scheme
- John Proos
-
2003/001 ( PDF )
- A Mode of Operation with Partial Encryption and Message Integrity
- Philip Hawkes and Gregory G. Rose
-
2002/195 ( PS PS.GZ )
- An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes
- H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen, P. Tuyls
-
2002/194 ( PS PS.GZ )
- A polarisation based Visual Crypto System and its Secret Sharing Schemes
- P. Tuyls, H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen
-
2002/193 ( PS PS.GZ PDF )
- A Note on Ideal Tripartite Access Structures
- Michael J. Collins
-
2002/192 ( PS PS.GZ PDF )
- Security Proofs for an Efficient Password-Based Key Exchange
- Emmanuel Bresson and Olivier Chevassut and David Pointcheval
-
2002/191 ( PS PS.GZ )
- A Linearization Attack on the Bluetooth Key Stream Generator
- Frederik Armknecht
-
2002/190 ( PS PS.GZ )
- Parallelizable Authentication Trees
- Eric Hall and Charanjit S. Jutla
-
2002/189 ( PS PS.GZ )
- Bit-Slice Auction Circuit
- Kaoru Kurosawa and Wakaha Ogata
-
2002/188 ( PS PS.GZ PDF )
- Key recovery attacks on NTRU without ciphertext validation routine
- Daewan Han and Jin Hong and Jae Woo Han and Daesung Kwon
-
2002/187 ( PS PS.GZ PDF )
- Entity Authentication Schemes Using Braid Word Reduction
- Hervé SIBERT and Patrick DEHORNOY and Marc GIRAULT
-
2002/186 ( PS PS.GZ )
- Zero-Knowledge twenty years after its invention
- Oded Goldreich
-
2002/185 ( PDF )
- Turing, a fast stream cipher
- Greg Rose and Philip Hawkes
-
2002/184 ( PS PS.GZ PDF )
- Identity Based Authenticated Key Agreement Protocols from Pairings
- Liqun Chen and Caroline Kudla
-
2002/183 ( PS PS.GZ PDF )
- Simple backdoors to RSA key generation
- Claude Crépeau and Alain Slakmon
-
2002/182 ( PS PS.GZ PDF )
- Oblivious Keyword Search
- Wakaha Ogata and Kaoru Kurosawa
-
2002/181 ( PS PS.GZ PDF )
- Counting Points for Hyperelliptic Curves of type $y^2=x^5+ax$ over Finite Prime Fields
- Eisaku Furukawa and Mitsuru Kawazoe and Tetsuya Takahashi
-
2002/180 ( PS PS.GZ PDF )
- OMAC: One-Key CBC MAC
- Tetsu Iwata and Kaoru Kurosawa
-
2002/179 ( PS PS.GZ PDF )
- Parallel Algorithm for Multiplication on Elliptic Curves
- Juan Manuel Garcia Garcia and Rolando Menchaca Garcia
-
2002/178 ( PS PS.GZ PDF )
- Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433)
- Fangguo Zhang, Shengli Liu and Kwangjo Kim
-
2002/177 ( PDF )
- two attacks on xia-you Group Signature
- Jianhong Zhang Jilin Wang Yumin Wang
-
2002/176 ( PS PS.GZ PDF )
- Theoretical Analysis of ``Correlations in RC6''
- Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
-
2002/175 ( PS PS.GZ )
- Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
- Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham
-
2002/174 ( PS PS.GZ PDF )
- A Designer's Guide to KEMs
- Alexander W. Dent
-
2002/173 ( PDF )
- Efficient Group Signatures without Trapdoors
- Giuseppe Ateniese and Breno de Medeiros
-
2002/172 ( PS PS.GZ PDF )
- PECDSA. How to build a DL-based digital signature scheme with the best proven security
- Louis Granboulan
-
2002/171 ( PS PS.GZ PDF )
- Statistical weaknesses in the alleged RC4 keystream generator
- Marina Pudovkina
-
2002/170 ( PS PS.GZ )
- An Analysis of RMAC
- Jack Lloyd
-
2002/169 ( PS PS.GZ PDF )
- Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
- D. Page
-
2002/168 ( PS PS.GZ PDF )
- New Signature Scheme Using Conjugacy Problem
- Ki Hyoung Ko and Doo Ho Choi and Mi Sung Cho and Jang Won Lee
-
2002/167 ( PS PS.GZ PDF )
- Cryptanalysis of Two New Signature Schemes
- Fangguo Zhang and Kwangjo Kim
-
2002/166 ( PS PS.GZ PDF )
- Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms
- Ho-Kyu Lee and Hyang-Sook Lee and Young-Ran Lee
-
2002/165 ( PDF )
- Coercion-Resistant Electronic Elections
- Ari Juels and Dario Catalano and Markus Jakobsson
-
2002/164 ( PS PS.GZ PDF )
- Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
- Mike Scott
-
2002/163 ( PS PS.GZ PDF )
- Man-in-the-Middle in Tunnelled Authentication Protocols
- N. Asokan and Valtteri Niemi and Kaisa Nyberg
-
2002/162 ( PS PS.GZ PDF )
- On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
- Salil P. Vadhan
-
2002/161 ( PS PS.GZ PDF )
- Practical Verifiable Encryption and Decryption of Discrete Logarithms
- Jan Camenisch and Victor Shoup
-
2002/160 ( PS PS.GZ PDF )
- Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
- Matt Blaze
-
2002/159 ( PS PS.GZ PDF )
- Related-Key and Key-Collision Attacks Against RMAC
- Tadayoshi Kohno
-
2002/158 ( PS PS.GZ )
- The Book of Rijndaels
- Elad Barkan and Eli Biham
-
2002/157 ( PS PS.GZ )
- In How Many Ways Can You Write Rijndael?
- Elad Barkan and Eli Biham
-
2002/156 ( -- withdrawn -- )
- Validating Digital Signatures without Time-Stamping and Certificate Revocation
- Jianying Zhou, Feng Bao, and Robert Deng
-
2002/155 ( PS PS.GZ PDF )
- Secure Bilinear Diffie-Hellman Bits
- Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
-
2002/154 ( PS PS.GZ PDF )
- On multi-exponentiation in cryptography
- Roberto M. Avanzi
-
2002/153 ( PS PS.GZ PDF )
- Weighted Coordinates on Genus 2 Hyperelliptic Curves
- Tanja Lange
-
2002/152 ( PS PS.GZ PDF )
- A note on Weak Keys of PES, IDEA and some Extended Variants
- Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle
-
2002/151 ( PDF )
- Selective disclosure credential sets
- Jason E. Holt and Kent E. Seamons
-
2002/150 ( PS PS.GZ PDF )
- Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes
- Guilin Wang, Jianying Zhou, and Robert H. Deng
-
2002/149 ( PS PS.GZ PDF )
- About Filliol's Observations on DES, AES and Hash Functions (draft)
- Nicolas T. Courtois
-
2002/148 ( PS PS.GZ PDF )
- The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP)
- Phillip Rogaway
-
2002/147 ( PS PS.GZ PDF )
- Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves
- Tanja Lange
-
2002/146 ( PS PS.GZ PDF )
- Bauer-Berson-Feiertag attack revisited
- Jun-Bum Shin and Kwang H. Lee
-
2002/145 ( PS PS.GZ )
- Cryptanalysis of MQV with partially known nonces
- P.J. Leadbitter, N.P. Smart
-
2002/144 ( PS PS.GZ PDF )
- On Some Algebraic Structures in the AES Round Function
- A.M. Youssef and S.E. Tavares
-
2002/143 ( PS PS.GZ PDF )
- An Attack on the Isomorphisms of Polynomials Problem with One Secret
- Willi Geiselmann and Willi Meier and Rainer Steinwandt
-
2002/142 ( PDF )
- On the Applicability of Distinguishing Attacks Against Stream Ciphers
- Greg Rose and Philip Hawkes
-
2002/141 ( PS PS.GZ PDF )
- Applying General Access Structure to Proactive Secret Sharing Schemes
- Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle
-
2002/140 ( PS PS.GZ PDF )
- Universally Composable Two-Party and Multi-Party Secure Computation
- Ran Canetti and Yehuda Lindell and Rafail Ostrovsky and Amit Sahai
-
2002/139 ( PS PS.GZ )
- Reaction Attacks on Public Key Cryptosystems Based on the Word Problem
- Maria Isabel Gonzalez Vasco and Rainer Steinwandt
-
2002/138 ( PS PS.GZ PDF )
- On the Security of HFE, HFEv- and Quartz
- Nicolas T. Courtois and Magnus Daum and Patrick Felke
-
2002/137 ( PS PS.GZ PDF )
- Provably Secure Steganography
- Nicholas J. Hopper and John Langford and Luis von Ahn
-
2002/136 ( PS PS.GZ )
- Practical Non-Interactive Key Distribution Based on Pairings
- Régis Dupont and Andreas Enge
-
2002/135 ( PDF )
- Folklore, Practice and Theory of Robust Combiners
- Amir Herzberg
-
2002/134 ( PS PS.GZ PDF )
- Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
- Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and Reto Strobl
-
2002/133 ( PS PS.GZ PDF )
- Efficient Construction of (Distributed) Verifiable Random Functions
- Yevgeniy Dodis
-
2002/132 ( PS PS.GZ )
- Tight Lower Bound on Linear Authenticated Encryption
- Charanjit S. Jutla
-
2002/131 ( PS PS.GZ PDF )
- An Improved Pseudorandom Generator Based on Hardness of Factoring
- Nenad Dedic and Leonid Reyzin and Salil Vadhan
-
2002/130 ( PS PS.GZ PDF )
- OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives
- Kazukuni Kobara and Hideki Imai
-
2002/129 ( PDF )
- Key-collisions in (EC)DSA: Attacking Non-repudiation
- Tomas Rosa
-
2002/128 ( PS PS.GZ PDF )
- Perfectly Secure Message Transmission Revisited
- Yvo Desmedt and Yongge Wang
-
2002/127 ( PDF )
- Power of a Public Random Permutation and its Application to Authenticated-Encryption
- Kaoru Kurosawa
-
2002/126 ( PS PS.GZ PDF )
- Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
- Ahmad-Reza Sadeghi and Michael Steiner
-
2002/125 ( PS PS.GZ PDF )
- The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
- Olivier Billet and Marc Joye
-
2002/124 ( PS PS.GZ PDF )
- On Optimal Hash Tree Traversal for Interval Time-Stamping
- Helger Lipmaa
-
2002/123 ( PS PS.GZ )
- New covering radius of Reed-Muller codes for $t$-resilient functions
- Kaoru Kurosawa, Tetsu Iwata and Takayuki Yoshiwara
-
2002/122 ( PS PS.GZ PDF )
- ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
- Fangguo Zhang, Shengli Liu and Kwangjo Kim
-
2002/121 ( PS PS.GZ PDF )
- Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae
- Tanja Lange
-
2002/120 ( PS PS.GZ )
- Security Analysis of IKE's Signature-based Key-Exchange Protocol
- Ran Canetti and Hugo Krawczyk
-
2002/119 ( PDF )
- Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes
- Bodo Möller
-
2002/118 ( PS PS.GZ PDF )
- Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme
- Alexandra Boldyreva
-
2002/117 ( PS PS.GZ )
- Diffie-Hellman Problems and Bilinear Maps
- Jung Hee Cheon and Dong Hoon Lee
-
2002/116 ( PS PS.GZ )
- How to convert any ID-based Signature Schemes
- Claude Castelluccia
-
2002/115 ( PS PS.GZ )
- Universal Padding Schemes for RSA
- Jean-Sébastien Coron and Marc Joye and David Naccache and Pascal Paillier
-
2002/114 ( PS PS.GZ )
- Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three
- N.P. Smart and J. Westwood
-
2002/113 ( PS PS.GZ )
- A Note on the Bilinear Diffie-Hellman Assumption
- Yacov Yacobi
-
2002/112 ( PS PS.GZ )
- An Efficient Procedure to Double and Add Points on an Elliptic Curve
- Kirsten Eisentraeger, Kristin Lauter, and Peter L. Montgomery
-
2002/111 ( PS PS.GZ )
- On Linear Redundancy in the AES S-Box
- Joanne Fuller and William Millan
-
2002/110 ( PS PS.GZ )
- The GGM Construction does NOT yield Correlation Intractable Function Ensembles
- Oded Goldreich
-
2002/109 ( PDF )
- A New Class of Unsafe Primes
- Qi Cheng
-
2002/108 ( -- withdrawn -- )
- Clock-Controlled Alternating Step Generator
- Ali Adel Kanso
-
2002/107 ( PS PS.GZ PDF )
- Efficient Arithmetic on Hyperelliptic Curves
- Tanja Lange
-
2002/106 ( PS PS.GZ PDF )
- Secret sharing schemes on access structures with intersection number equal to one
- Jaume Marti-Farre and Carles Padro
-
2002/105 ( PS PS.GZ PDF )
- An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2
- Jan Denef and Frederik Vercauteren
-
2002/104 ( PS PS.GZ PDF )
- Forward-Secure Signatures with Fast Key Update
- Anton Kozlov and Leonid Reyzin
-
2002/103 ( PS PS.GZ PDF )
- On the Power of Claw-Free Permutations
- Yevgeniy Dodis and Leonid Reyzin
-
2002/102 ( PS PS.GZ PDF )
- Applying General Access Structure to Metering Schemes
- Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle
-
2002/101 ( PS PS.GZ PDF )
- An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property
- Simon R. Blackburn
-
2002/100 ( PS PS.GZ )
- Encryption-Scheme Security in the Presence of Key-Dependent Messages
- J. Black and P. Rogaway and T. Shrimpton
-
2002/099 ( PS PS.GZ )
- A New Statistical Testing for Symmetric Ciphers and Hash Functions
- Eric Filiol
-
2002/098 ( PS PS.GZ PDF )
- Identity-Based Signcryption
- John Malone-Lee
-
2002/097 ( -- withdrawn -- )
- A new public key encryption scheme provably secure against adaptive chosen cipher-text attack
- Huafei Zhu
-
2002/096 ( PS PS.GZ PDF )
- Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank
- James Xiao and Yongxin Zhou
-
2002/095 ( -- withdrawn -- )
- The (a, b)-Shrinking Generator
- Ali Adel Kanso
-
2002/094 ( PS PS.GZ )
- Building curves with arbitrary small MOV degree over finite prime fields
- R. Dupont and A. Enge and F. Morain
-
2002/093 ( PS PS.GZ PDF )
- A Fuzzy Vault Scheme
- Ari Juels and Madhu Sudan
-
2002/092 ( PS PS.GZ PDF )
- TMAC: Two-Key CBC MAC
- Kaoru Kurosawa and Tetsu Iwata
-
2002/091 ( PS PS.GZ )
- Multiplicative Masking and Power Analysis of AES
- Jovan Dj. Golić
-
2002/090 ( PS PS.GZ PDF )
- Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol
- Daniele Micciancio and Erez Petrank
-
2002/089 ( PS PS.GZ )
- On Chosen Ciphertext Security of Multiple Encryptions
- Oded Goldreich, Yoad Lustig and Moni Naor
-
2002/088 ( PS PS.GZ PDF )
- Constructing Elliptic Curves with Prescribed Embedding Degrees
- Paulo S. L. M. Barreto and Ben Lynn and Michael Scott
-
2002/087 ( PS PS.GZ PDF )
- Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
- Nicolas T. Courtois
-
2002/086 ( PS PS.GZ PDF )
- Adapting the weaknesses of the Random Oracle model to the Generic Group model.
- Alexander W. Dent
-
2002/085 ( PS PS.GZ )
- Efficient and Player-Optimal Strong Consensus
- Matthias Fitzi and Juan A. Garay
-
2002/084 ( PDF )
- Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer
- Amir Herzberg
-
2002/083 ( PS PS.GZ PDF )
- A semantically secure elliptic curve RSA scheme with small expansion factor
- David Galindo and Sebastià Martín and Paz Morillo and Jorge L. Villar
-
2002/082 ( PS PS.GZ )
- Authentication of Quantum Messages
- Howard Barnum and Claude Crepeau and Daniel Gottesman and Adam Smith and Alain Tapp
-
2002/081 ( PS PS.GZ PDF )
- Some Applications of Threshold Signature Schemes to Distributed Protocols
- Vanesa Daza and Javier Herranz and Germán Sáez
-
2002/080 ( PS PS.GZ PDF )
- Applications of Multilinear Forms to Cryptography
- Dan Boneh and Alice Silverberg
-
2002/079 ( PS PS.GZ )
- On the efficiency of the Clock Control Guessing Attack
- Erik Zenner
-
2002/078 ( PS PS.GZ PDF )
- Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm
- Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre
-
2002/077 ( PS PS.GZ PDF )
- Key-Insulated Public-Key Cryptosystems
- Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung
-
2002/076 ( PDF )
- Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP
- Vlastimil Klima and Tomas Rosa
-
2002/075 ( PDF )
- Fault based cryptanalysis of the Advanced Encryption Standard
- J.\ Blöemer and J.-P.\ Seifert
-
2002/074 ( PS PS.GZ )
- How to repair ESIGN
- Louis Granboulan
-
2002/073 ( PS PS.GZ PDF )
- Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures
- C.\ Aumüller and P.\ Bier and P. Hofreiter and W. Fischer and J.-P. Seifert
-
2002/072 ( PS PS.GZ PDF )
- Authenticated Identity-Based Encryption
- Ben Lynn
-
2002/071 ( PDF )
- Further Results and Considerations on Side Channel Attacks on RSA
- Vlastimil Klima and Tomas Rosa
-
2002/070 ( PS PS.GZ PDF )
- Weak Keys in MST1
- Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Consuelo Martinez and Rainer Steinwandt
-
2002/069 ( PS PS.GZ PDF )
- A Distributed and Computationally Secure Key Distribution Scheme
- Vanesa Daza and Javier Herranz and Carles Padró and Germán Sáez
-
2002/068 ( PS PS.GZ )
- Improved key recovery of level 1 of the Bluetooth Encryption System
- Scott Fluhrer
-
2002/067 ( PS PS.GZ PDF )
- (Not So) Random Shuffles of RC4
- Ilya Mironov
-
2002/066 ( PS PS.GZ )
- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
- John Black and Phillip Rogaway and Thomas Shrimpton
-
2002/065 ( PS PS.GZ PDF )
- Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization
- Chanathip Namprempre
-
2002/064 ( PS PS.GZ PDF )
- Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold
- Mihir Bellare and Adriana Palacio
-
2002/063 ( PS PS.GZ )
- On some Attacks on Multi-prime RSA
- M Jason Hinek and Mo King Low and Edlyn Teske
-
2002/062 ( PS PS.GZ PDF )
- ABC - A Block Cipher
- Dieter Schmidt
-
2002/061 ( PDF )
- Strengthened Encryption in the CBC Mode
- Vlastimil Klima and Tomas Rosa
-
2002/060 ( PS PS.GZ PDF )
- A Forward-Secure Public-Key Encryption Scheme
- Jonathan Katz
-
2002/059 ( PS PS.GZ )
- Universally Composable Notions of Key Exchange and Secure Channels
- Ran Canetti and Hugo Krawczyk
-
2002/058 ( PS PS.GZ )
- Construction of UOWHF: Tree Hashing Revisited
- Palash Sarkar
-
2002/057 ( PS PS.GZ PDF )
- A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions
- Yehuda Lindell
-
2002/056 ( PS PS.GZ PDF )
- Hierarchical ID-Based Cryptography
- Craig Gentry and Alice Silverberg
-
2002/055 ( PS PS.GZ PDF )
- Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity
- Manoj Prabhakaran and Amit Sahai
-
2002/054 ( PS PS.GZ PDF )
- SiBIR: Signer-Base Intrusion-Resilient Signatures
- Gene Itkis and Leonid Reyzin
-
2002/053 ( PS PS.GZ PDF )
- Extended Validity and Consistency in Byzantine Agreement
- Matthias Fitzi and Martin Hirt and Thomas Holenstein and Jürg Wullschleger
-
2002/052 ( PS PS.GZ PDF )
- A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order
- Stefan Lucks
-
2002/051 ( PS PS.GZ PDF )
- Fully Distributed Proxy Signature Schemes
- Javier Herranz and Germán Sáez
-
2002/050 ( PS PS.GZ PDF )
- Secret sharing schemes with three or four minimal qualified subsets
- Jaume Martí-Farré and Carles Padró
-
2002/049 ( PS PS.GZ PDF )
- Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
- Alexander Kholosha and Henk C.A. van Tilborg
-
2002/048 ( PS PS.GZ PDF )
- Towards a Uniform Description of Several Group Based Cryptographic Primitives
- Maria Isabel Gonzalez Vasco and Consuelo Martinez and Rainer Steinwandt
-
2002/047 ( PS PS.GZ )
- Universal Composition with Joint State
- Ran Canetti and Tal Rabin
-
2002/046 ( PS PS.GZ PDF )
- On the Security of Joint Signature and Encryption
- Jee Hea An and Yevgeniy Dodis and Tal Rabin
-
2002/045 ( PS PS.GZ PDF )
- Cryptanalysis of S-DES
- Dr. K. S. Ooi, Brain Chin Vito
-
2002/044 ( PS PS.GZ PDF )
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Nicolas Courtois and Josef Pieprzyk
-
2002/043 ( PS PS.GZ PDF )
- Strict Polynomial-time in Simulation and Extraction
- Boaz Barak and Yehuda Lindell
-
2002/042 ( PS PS.GZ )
- A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack
- Edith Elkind and Amit Sahai
-
2002/041 ( PS PS.GZ )
- New Results on Boomerang and Rectangle Attack
- Eli Biham and Orr Dunkelman and Nathan Keller
-
2002/040 ( PS PS.GZ PDF )
- Secure Computation Without Agreement
- Shafi Goldwasser and Yehuda Lindell
-
2002/039 ( PS PS.GZ )
- Partial Key Escrow Monitoring Scheme
- Jiang Shaoquan and Zhang Yufeng
-
2002/038 ( -- withdrawn -- )
- A Distributed RSA Signature Scheme for General Access Structures
- Javier Herranz and Carles Padró and Germán Sáez
-
2002/037 ( PS PS.GZ PDF )
- An efficient semantically secure elliptic curve cryptosystem based on KMOV
- David Galindo and Sebastià Martín and Paz Morillo and Jorge L. Villar
-
2002/036 ( PS PS.GZ )
- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
- Ronald Cramer and Serge Fehr
-
2002/035 ( PS PS.GZ PDF )
- Tripartite Authenticated Key Agreement Protocols from Pairings
- Sattam S. Al-Riyami and Kenneth G. Paterson
-
2002/034 ( PS PS.GZ PDF )
- An OAEP Variant With a Tight Security Proof
- Jakob Jonsson
-
2002/033 ( PS PS.GZ )
- Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
- Yodai Watanabe and Junji Shikata and Hideki Imai
-
2002/032 ( PS PS.GZ )
- Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields
- Y. Choie and E. Jeong and E. Lee
-
2002/031 ( PS PS.GZ )
- A Parallelizable Design Principle for Cryptographic Hash Functions
- Palash Sarkar and Paul J. Schellenberg
-
2002/030 ( PS PS.GZ )
- Adaptive chi-square test and its application to some cryptographic problems.
- Boris Ryabko
-
2002/029 ( PS PS.GZ PDF )
- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
- Joy Algesheimer and Jan Camenisch and Victor Shoup
-
2002/028 ( PS PS.GZ PDF )
- A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack
- Jung Hee Cheon
-
2002/027 ( PS PS.GZ PDF )
- Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications
- Jonathan Katz
-
2002/026 ( PS PS.GZ )
- Generic Groups, Collision Resistance, and ECDSA
- Daniel R. L. Brown
-
2002/025 ( PS PS.GZ PDF )
- Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking
- Markus Jakobsson and Ari Juels and Ron Rivest
-
2002/024 ( -- withdrawn -- )
- Timed Release of Standard Digital Signatures
- Juan Garay and Markus Jakobsson
-
2002/023 ( PS PS.GZ PDF )
- Almost Optimal Hash Sequence Traversal
- Don Coppersmith and Markus Jakobsson
-
2002/022 ( PS PS.GZ PDF )
- From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
- Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip Namprempre
-
2002/021 ( PS PS.GZ )
- Spectral Analysis of Boolean Functions under Non-uniformity of Arguments
- Kanstantsin Miranovich
-
2002/020 ( PS PS.GZ PDF )
- Cryptanalysis of stream ciphers with linear masking
- Don Coppersmith and Shai Halevi and Charanjit Jutla
-
2002/019 ( PS PS.GZ PDF )
- Scream: a software-efficient stream cipher
- Shai Halevi and Don Coppersmith and Charanjit Jutla
-
2002/018 ( PS PS.GZ )
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Jae Choon Cha and Jung Hee Cheon
-
2002/017 ( PS PS.GZ PDF )
- The Cramer-Shoup Strong-RSA Signature Scheme Revisited
- Marc Fischlin
-
2002/016 ( PDF )
- Content Extraction Signatures
- Ron Steinfeld and Laurence Bull and Yuliang Zheng
-
2002/015 ( PDF )
- Security proofs of cryptographic protocols
- Eva Jencusova
-
2002/014 ( PS PS.GZ PDF )
- Better than BiBa: Short One-time Signatures with Fast Signing and Verifying
- Leonid Reyzin and Natan Reyzin
-
2002/013 ( PS PS.GZ PDF )
- Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups
- Ivan Damgard and Maciej Koprowski
-
2002/012 ( PS PS.GZ PDF )
- Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings
- F. Hess
-
2002/011 ( PS PS.GZ )
- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages
- Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval and Christophe Tymen
-
2002/010 ( PS PS.GZ )
- Cut and Paste Attacks with Java
- Serge Lefranc and David Naccache
-
2002/009 ( PS PS.GZ PDF )
- Tree-based Group Key Agreement
- Yongdae Kim and Adrian Perrig and Gene Tsudik
-
2002/008 ( PS PS.GZ PDF )
- Efficient Algorithms for Pairing-Based Cryptosystems
- Paulo S.L.M. Barreto and Hae Y. Kim and Ben Lynn and Michael Scott
-
2002/007 ( PS PS.GZ PDF )
- Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks
- Wieland Fischer and Christophe Giraud and Erik Woodward Knudsen and Jean-Pierre Seifert
-
2002/006 ( PDF )
- The best and worst of supersingular abelian varieties in cryptology
- Karl Rubin and Alice Silverberg
-
2002/005 ( PS PS.GZ )
- Cryptanalysis of Stream Cipher COS (2,128) Mode I
- Hongjun Wu and Feng Bao
-
2002/004 ( PS PS.GZ PDF )
- ID-based Signatures from Pairings on Elliptic Curves
- Kenneth G. Paterson
-
2002/003 ( PS PS.GZ )
- Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher
- Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle
-
2002/002 ( PS PS.GZ PDF )
- Evaluating Security of Voting Schemes in the Universal Composability Framework
- Jens Groth
-
2002/001 ( PS PS.GZ PDF )
- Fractal Hash Sequence Representation and Traversal
- Markus Jakobsson
-
2001/113 ( PDF )
- Efficient Revocation of Anonymous Group Membership
- Jan Camenisch and Anna Lysyanskaya
-
2001/112 ( PS PS.GZ PDF )
- A Proposal for an ISO Standard for Public Key Encryption
- Victor Shoup
-
2001/111 ( PS PS.GZ )
- An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing
- N.P. Smart
-
2001/110 ( PS PS.GZ )
- RSA hybrid encryption schemes
- Louis Granboulan
-
2001/109 ( PDF )
- New Notions of Soundness and Simultaneous Resettability in the Public-Key Model
- Yunlei ZHAO
-
2001/108 ( PS PS.GZ PDF )
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Ronald Cramer and Victor Shoup
-
2001/107 ( PS PS.GZ PDF )
- Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
- Yehuda Lindell
-
2001/106 ( PS PS.GZ PDF )
- Cryptanalysis of the COS (2,128) Stream Ciphers
- Steve Babbage
-
2001/105 ( PS PS.GZ )
- Universal Arguments and their Applications
- Boaz Barak and Oded Goldreich
-
2001/104 ( PS PS.GZ )
- Concurrent Zero-Knowledge With Timing, Revisited
- Oded Goldreich
-
2001/103 ( PS PS.GZ PDF )
- Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems
- Antonio Bellezza
-
2001/102 ( PS PS.GZ PDF )
- An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates
- Ivan Damgård and Gudmund Frandsen
-
2001/101 ( PDF )
- Quasi-Efficient Revocation of Group Signatures
- Giuseppe Ateniese and Dawn Song and Gene Tsudik
-
2001/100 ( PS PS.GZ )
- A Note on Girault's Self-Certified Model
- Shahrokh Saeednia
-
2001/099 ( PS PS.GZ )
- Linear Code Implies Public-Key Traitor Tracing
- Kaoru Kurosawa and Takuya Yoshida
-
2001/098 ( PS PS.GZ PDF )
- Fast hashing onto elliptic curves over fields of characteristic 3
- Paulo S. L. M. Barreto and Hae Yong Kim
-
2001/097 ( PS PS.GZ )
- An Efficient MAC for Short Messages
- Sarvar Patel
-
2001/096 ( PS PS.GZ )
- Constructing elliptic curves with a given number of points over a finite field
- Amod Agashe and Kristin Lauter and Ramarathnam Venkatesan
-
2001/095 ( PS PS.GZ PDF )
- Secure Vickrey Auctions without Threshold Trust
- Helger Lipmaa and N. Asokan and Valtteri Niemi
-
2001/094 ( PS PS.GZ )
- Slope packings and coverings, and generic algorithms for the discrete logarithm problem
- M. Chateauneuf and A.C.H. Ling and D.R. Stinson
-
2001/093 ( PS PS.GZ PDF )
- Threshold Cryptosystems Based on Factoring
- Jonathan Katz and Moti Yung
-
2001/092 ( PS PS.GZ PDF )
- BDD-based Cryptanalysis of Keystream Generators
- Matthias Krause
-
2001/091 ( PS PS.GZ PDF )
- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
- Ivan Damgĺrd and Jesper B. Nielsen
-
2001/090 ( PS PS.GZ PDF )
- Identity Based Encryption From the Weil Pairing
- Dan Boneh and Matthew Franklin
-
2001/089 ( PS PS.GZ )
- Linear broadcast encryption schemes
- Carles Padró and Ignacio Gracia and Sebastiŕ Martín and Paz Morillo
-
2001/088 ( PS PS.GZ PDF )
- Improving the trade-off between storage and communication in broadcast encryption schemes
- Ignacio Gracia and Sebastiŕ Martín and Carles Padró
-
2001/087 ( PS PS.GZ )
- A Linear Algebraic Approach to Metering Schemes
- C. Blundo and S. Martěn and B. Masucci and C. Padrň
-
2001/086 ( PS PS.GZ )
- Statistical Zero-Knowledge Proofs from Diophantine Equations
- Helger Lipmaa
-
2001/085 ( PS PS.GZ PDF )
- Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
- Ronald Cramer and Victor Shoup
-
2001/084 ( PS PS.GZ )
- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
- Markus Maurer and Alfred Menezes and Edlyn Teske
-
2001/083 ( PS PS.GZ )
- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices
- Maria Fedorova and Yuriy Tarannikov
-
2001/082 ( PDF )
- A Description of Protocols for Private Credentials
- Ariel Glenn and Ian Goldberg and Frédéric Légaré and Anton Stiglic
-
2001/081 ( PS PS.GZ PDF )
- A Sufficient Condition for Secure Ping--Pong Protocols
- Masao Mori
-
2001/080 ( PS PS.GZ )
- COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers
- Eric Filiol and Caroline Fontaine
-
2001/079 ( PS PS.GZ )
- Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses
- Jee Hea An
-
2001/078 ( PS PS.GZ PDF )
- The COS Stream Ciphers are Extremely Weak
- Steve Babbage
-
2001/077 ( PS PS.GZ PDF )
- A Time-Memory Tradeoff Attack Against LILI-128
- Markku-Juhani Olavi Saarinen
-
2001/076 ( PS PS.GZ )
- Communication Complexity and Secure Function Evaluation
- Moni Naor and Kobbi Nissim
-
2001/075 ( PS PS.GZ )
- Pseudo-Random Functions and Factoring
- Moni Naor and Omer Reingold and Alon Rosen
-
2001/074 ( PS PS.GZ )
- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction
- Eliane Jaulmes and Antoine Joux and Frederic Valette
-
2001/073 ( PS PS.GZ )
- Efficient oblivious transfer schemes
- Wen-Guey Tzeng
-
2001/072 ( PS PS.GZ PDF )
- On the Goubin-Courtois Attack on TTM
- T.Moh and Jiun-Ming Chen
-
2001/071 ( PS PS.GZ )
- Multi-Recipient Public-Key Encryption with Shortened Ciphertext
- Kaoru Kurosawa
-
2001/070 ( PS PS.GZ PDF )
- Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract)
- Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shinichi Kawamura
-
2001/069 ( PS PS.GZ )
- On the (Im)possibility of Obfuscating Programs
- Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil Vadhan and Ke Yang
-
2001/068 ( PS PS.GZ PDF )
- SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers
- J.Nakahara Jr and P.S.L.M.Barreto and B.Preneel and J.Vandewalle and H.Y.Kim
-
2001/067 ( PDF )
- An Attack on A Traitor Tracing Scheme
- Jeff Jianxin Yan and Yongdong Wu
-
2001/066 ( PS PS.GZ )
- IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN GROUPS
- SEONG-HUN PAENG and DAESUNG KWON and KIL-CHAN HA and JAE HEON KIM
-
2001/065 ( PS PS.GZ PDF )
- Analysis of chosen plaintext attacks on the WAKE Stream Cipher
- Marina Pudovkina
-
2001/064 ( PS PS.GZ )
- An Integer Commitment Scheme based on Groups with Hidden Order
- Ivan Damgard and Eiichiro Fujisaki
-
2001/063 ( PS PS.GZ PDF )
- Resettably-Sound Zero-Knowledge and its Applications
- Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda Lindell
-
2001/062 ( PS PS.GZ PDF )
- Optimal security proofs for PSS and other signature schemes
- Jean-Sébastien Coron
-
2001/061 ( PS PS.GZ PDF )
- Clock-Controlled Shift Registers for Key-Stream Generation
- Alexander Kholosha
-
2001/060 ( PS PS.GZ PDF )
- The Security of Practical Two-Party RSA Signature Schemes
- Mihir Bellare and Ravi Sandhu
-
2001/059 ( PDF )
- Revocation and Tracing Schemes for Stateless Receivers
- Dalit Naor and Moni Naor and Jeff Lotspiech
-
2001/058 ( PS PS.GZ PDF )
- Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank
- Nicolas T. Courtois
-
2001/057 ( PS PS.GZ PDF )
- On the Security of the SPEKE Password-Authenticated Key Exchange Protocol
- Philip MacKenzie
-
2001/056 ( PS PS.GZ PDF )
- On the Complexity of Matsui's Attack
- P. Junod
-
2001/055 ( PS PS.GZ PDF )
- Universally Composable Commitments
- Ran Canetti and Marc Fischlin
-
2001/054 ( PS PS.GZ )
- Extending the GHS Weil Descent Attack
- S.D. Galbraith and F. Hess and N.P. Smart
-
2001/053 ( PS PS.GZ )
- Security Proofs for the RSA-PSS Signature Scheme and Its Variants
- Jakob Jonsson
-
2001/052 ( PDF )
- Differential Probability of Modular Addition with a Constant Operand
- Alexis Warner Machado
-
2001/051 ( PS PS.GZ )
- Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds
- Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
-
2001/050 ( PS PS.GZ )
- Elliptic curve Paillier schemes
- Steven D Galbraith
-
2001/049 ( PS PS.GZ PDF )
- A known plaintext attack on the ISAAC keystream generator
- Marina Pudovkina
-
2001/048 ( PS PS.GZ PDF )
- Forward-Secure Signatures with Optimal Signing and Verifying
- Gene Itkis and Leonid Reyzin
-
2001/047 ( PS PS.GZ )
- ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM
- T.MOH
-
2001/046 ( PS PS.GZ )
- The simple ideal cipher system
- Boris Ryabko
-
2001/045 ( PS PS.GZ )
- The order of encryption and authentication for protecting communications (Or: how secure is SSL?)
- Hugo Krawczyk
-
2001/044 ( PS PS.GZ )
- Optimistic Asynchronous Multi-Party Contract Signing with Reduced Number of Rounds
- Birgit Baum-Waidner
-
2001/043 ( PS PS.GZ PDF )
- Cryptanalysis of the Vesta-2M Stream Cipher
- Marina Pudovkina
-
2001/042 ( PS PS.GZ )
- Simple Forward-Secure Signatures From Any Signature Scheme
- Hugo Krawczyk
-
2001/041 ( PS PS.GZ PDF )
- Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent
- Michael Jacobson and Alfred Menezes and Andreas Stein
-
2001/040 ( PS PS.GZ )
- Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
- Ran Canetti and Hugo Krawczyk
-
2001/039 ( PDF )
- Robust Software Tokens: Towards Securing a Digital Identity
- Taekyoung Kwon
-
2001/038 ( PS PS.GZ )
- Flaws in differential cryptanalysis of Skipjack
- Louis Granboulan
-
2001/037 ( PS PS.GZ PDF )
- EMpowering Side-Channel Attacks
- Josyula R. Rao and Pankaj Rohatgi
-
2001/036 ( PS PS.GZ )
- Anti-persistence: History Independent Data Structures
- Moni Naor and Vanessa Teague
-
2001/035 ( PS PS.GZ PDF )
- Forward-Security in Private-Key Cryptography
- Mihir Bellare and Bennet Yee
-
2001/034 ( PS PS.GZ )
- Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures
- Tal Malkin and Daniele Micciancio and Sara Miner
-
2001/033 ( PS PS.GZ PDF )
- Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs
- Liam Keliher and Henk Meijer and Stafford Tavares
-
2001/032 ( PS PS.GZ PDF )
- Efficient and Non-Interactive Non-Malleable Commitment
- Giovanni Di Crescenzo and Jonathan Katz and Rafail Ostrovsky and Adam Smith
-
2001/031 ( PS PS.GZ PDF )
- Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
- Jonathan Katz and Rafail Ostrovsky and Moti Yung
-
2001/030 ( PS PS.GZ PDF )
- On the Power of Nonlinear Secret-Sharing
- Amos Beimel and Yuval Ishai
-
2001/029 ( PS PS.GZ PDF )
- On multivariate signature-only public key cryptosystems
- Nicolas T. Courtois
-
2001/028 ( PS PS.GZ PDF )
- Efficient Encryption for Rich Message Spaces Under General Assumptions
- Alexander Russell and Hong Wang
-
2001/027 ( PS PS.GZ PDF )
- A Block-Cipher Mode of Operation for Parallelizable Message Authentication
- John Black and Phillip Rogaway
-
2001/026 ( PS PS.GZ PDF )
- OCB Mode
- Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz
-
2001/025 ( -- withdrawn -- )
- Cryptanalysis of some elliptic curve based cryptosystems of Paillier
- Steven D. Galbraith
-
2001/024 ( PS PS.GZ )
- Secure Multiparty Computation of Approximations
- Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright
-
2001/023 ( PS PS.GZ PDF )
- Robustness for Free in Unconditional Multi-Party Computation
- Martin Hirt and Ueli Maurer
-
2001/022 ( PS PS.GZ PDF )
- Optimistic Asynchronous Atomic Broadcast
- Klaus Kursawe and Victor Shoup
-
2001/021 ( PS PS.GZ )
- The Rectangle Attack - Rectangling the Serpent
- Biham Eli, Orr Dunkelman, Nathan Keller
-
2001/020 ( PS PS.GZ )
- Some observations on the theory of cryptographic hash functions
- D.R. Stinson
-
2001/019 ( PS PS.GZ PDF )
- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
- Jan Camenisch and Anna Lysyanskaya
-
2001/018 ( PS PS.GZ )
- Analysis of a Subset Sum Randomizer
- Peter Gemmell and Anna Johnston
-
2001/017 ( PS PS.GZ PDF )
- On adaptive vs. non-adaptive security of multiparty protocols
- Ran Canetti and Ivan Damgard and Stefan Dziembowski and Yuval Ishai and Tal Malkin
-
2001/016 ( PS PS.GZ )
- Efficient Traitor Tracing Algorithms using List Decoding
- Alice Silverberg and Jessica Staddon and Judy Walker
-
2001/015 ( PS PS.GZ PDF )
- An observation regarding Jutla's modes of operation
- Shai Halevi
-
2001/014 ( PS PS.GZ PDF )
- Timed-Release Cryptography
- Wenbo Mao
-
2001/013 ( PS PS.GZ )
- Digitally Watermarking RSA Moduli
- Anna M. Johnston
-
2001/012 ( PS PS.GZ PDF )
- Ciphers with Arbitrary Finite Domains
- John Black and Phillip Rogaway
-
2001/011 ( PS PS.GZ PDF )
- New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation
- Wenbo Mao
-
2001/010 ( PS PS.GZ )
- How to achieve a McEliece-based Digital Signature Scheme
- Nicolas Courtois, Matthieu Finiasz and Nicolas Sendrier
-
2001/009 ( PS PS.GZ )
- Robust key-evolving public key encryption schemes
- Wen-Guey Tzeng, Zhi-Jia Tzeng
-
2001/008 ( PS PS.GZ PDF )
- Fully Distributed Threshold RSA under Standard Assumptions
- Pierre-Alain Fouque and Jacques Stern
-
2001/007 ( PS PS.GZ )
- Are 'Strong' Primes Needed for RSA
- Ron RIvest & Robert Silverman
-
2001/006 ( PS PS.GZ PDF )
- Secure and Efficient Asynchronous Broadcast Protocols
- Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup
-
2001/005 ( PS PS.GZ PDF )
- A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme
- Ilya Mironov
-
2001/004 ( -- withdrawn -- )
- MinRank problem and Zero-knowledge authentication
- Nicolas T. Courtois
-
2001/003 ( PS PS.GZ )
- Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
- Antoine Joux and Kim Nguyen
-
2001/002 ( PS PS.GZ PDF )
- The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme
- M. Bellare and C. Namprempre and D. Pointcheval and M. Semanko
-
2001/001 ( PS PS.GZ PDF )
- Efficient Algorithms for Computing Differential Properties of Addition
- Helger Lipmaa, Shiho Moriai
-
2000/069 ( PS PS.GZ )
- New constructions of resilient Boolean functions with maximal nonlinearity
- Yuriy Tarannikov
-
2000/068 ( PDF )
- A Content Certified E-mail Protocol with a Public Mailbox
- Tak-Ming Law
-
2000/067 ( PDF )
- Universally Composable Security: A New Paradigm for Cryptographic Protocols
- Ran Canetti
-
2000/066 ( PS PS.GZ )
- A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
- Birgit Pfitzmann and Michael Waidner
-
2000/065 ( PS PS.GZ )
- How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes
- Masashi Mitomo and Kaoru Kurosawa
-
2000/064 ( PS PS.GZ )
- On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators
- Oded Goldreich and Vered Rosen
-
2000/063 ( PS PS.GZ )
- Candidate One-Way Functions Based on Expander Graphs
- Oded Goldreich
-
2000/062 ( -- withdrawn -- )
- Non-Deforming Digital Watermarks
- Gideon Samid
-
2000/061 ( PS PS.GZ PDF )
- RSA-OAEP is Secure under the RSA Assumption
- Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern
-
2000/060 ( PS PS.GZ PDF )
- OAEP Reconsidered
- Victor Shoup
-
2000/059 ( PDF )
- Essential Shannon Security with Keys Smaller Than the Encrypted Message
- Gideon Samid
-
2000/058 ( PS PS.GZ )
- Graph-Based Authentication of Digital Streams
- Sara Miner and Jessica Staddon
-
2000/057 ( PS PS.GZ PDF )
- Session-Key Generation using Human Passwords Only
- Oded Goldreich and Yehuda Lindell
-
2000/056 ( PS PS.GZ )
- A Complete Problem for Statistical Zero Knowledge
- Amit Sahai and Salil Vadhan
-
2000/055 ( PS PS.GZ PDF )
- Multiparty Computation from Threshold Homomorphic Encryption
- Ronald Cramer and Ivan Damgård and Jesper Buus Nielsen
-
2000/054 ( PS PS.GZ )
- Correlation Immune Boolean Functions with Very High Nonlinearity
- Subhamoy Maitra
-
2000/053 ( PS PS.GZ PDF )
- A Construction of Resilient Functions with High Nonlinearity
- Thomas Johansson and Enes Pasalic
-
2000/052 ( PDF )
- CRYPTANALYSIS OF THE A5/2 ALGORITHM
- Slobodan Petrovic and Amparo Fúster-Sabater
-
2000/051 ( PS PS.GZ )
- Reducing the Gate Count of Bitslice DES
- Matthew Kwan
-
2000/050 ( PS PS.GZ )
- Spectral Analysis of High Order Correlation Immune Functions
- Yuriy Tarannikov and Denis Kirienko
-
2000/049 ( PS PS.GZ )
- Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
- Palash Sarkar
-
2000/048 ( PS PS.GZ )
- New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity
- Enes Pasalic and Thomas Johansson and Subhamoy Maitra and Palash Sarkar
-
2000/047 ( PS PS.GZ )
- Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property
- Subhamoy Maitra
-
2000/046 ( PS PS.GZ PDF )
- The Saturation Attack - a Bait for Twofish
- Stefan Lucks
-
2000/045 ( PS PS.GZ PDF )
- Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions
- Ronald Cramer and Ivan Damgård and Philip MacKenzie
-
2000/044 ( PS PS.GZ PDF )
- Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
- Victor Boyko and Philip MacKenzie and Sarvar Patel
-
2000/043 ( PS PS.GZ )
- Constructions and Bounds for Unconditionally Secure Commitment Schemes
- C. Blundo and B. Masucci and D.R. Stinson and R. Wei
-
2000/042 ( PS PS.GZ )
- Constructing Pseudo-Random Permutations with a Prescribed Structure
- Moni Naor and Omer Reingold
-
2000/041 ( PS PS.GZ )
- On Symmetrically Private Information Retrieval
- Sanjeev Kumar Mishra
-
2000/040 ( PS PS.GZ )
- Decimation Attack of Stream Ciphers
- Eric FILIOL
-
2000/039 ( PS PS.GZ )
- Encryption Modes with Almost Free Message Integrity
- Charanjit S. Jutla
-
2000/038 ( PS PS.GZ )
- On the Complexity of Verifiable Secret Sharing and Multi-Party Computation
- Ronald Cramer and Ivan Damgård and Stefan Dziembowski
-
2000/037 ( PS PS.GZ )
- General Secure Multi-Party Computation from any Linear Secret Sharing Scheme
- Ronald Cramer and Ivan Damgård and Ueli Maurer
-
2000/036 ( PS PS.GZ )
- Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation
- Jean-Pierre Seifert
-
2000/035 ( PS PS.GZ )
- Electronic Jury Voting Protocols
- Alejandro Hevia and Marcos Kiwi
-
2000/034 ( PS PS.GZ PDF )
- Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography
- Christian Cachin and Klaus Kursawe and Victor Shoup
-
2000/033 ( PS PS.GZ PDF )
- The Complete Distribution of Linear Probabilities of MARS' s-box
- Kazumaro Aoki
-
2000/032 ( PS PS.GZ )
- Anonymous Fingerprinting with Direct Non-Repudiation
- Birgit Pfitzmann, Ahmad-Reza Sadeghi
-
2000/031 ( PS PS.GZ PDF )
- Forward Security in Threshold Signature Schemes
- Michel Abdalla and Sara Miner and Chanathip Namprempre
-
2000/030 ( -- withdrawn -- )
- Secure Multiparty Computation of Approximations
- Joan Feigenbaum and Jessica Fong and Martin Strauss and Rebecca N. Wright
-
2000/029 ( PS PS.GZ )
- Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
- Anand Desai and Sara Miner
-
2000/028 ( PS PS.GZ PDF )
- An Information-Theoretic Model for Steganography
- Christian Cachin
-
2000/027 ( PS PS.GZ PDF )
- Accountable Certificate Management using Undeniable Attestations
- Ahto Buldas and Peeter Laud and Helger Lipmaa
-
2000/026 ( PS PS.GZ PDF )
- Authentication and Key Agreement via Memorable Password
- Taekyoung Kwon
-
2000/025 ( PS PS.GZ PDF )
- Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
- Mihir Bellare and Chanathip Namprempre
-
2000/024 ( PS PS.GZ )
- Security of the Most Significant Bits of the Shamir Message Passing Scheme
- Maria Isabel Gonzalez Vasco and Igor E. Shparlinski
-
2000/023 ( PS PS.GZ PDF )
- Security of Polynomial Transformations of the Diffie--Hellman Key
- Igor Shparlinski
-
2000/022 ( PS PS.GZ )
- ACE: The Advanced Cryptographic Engine
- Thomas Schweinberger and Victor Shoup
-
2000/021 ( PS PS.GZ PDF )
- An Efficient Identification Scheme Based on Permuted Patterns
- Shahrokh Saeednia
-
2000/020 ( PS PS.GZ )
- On the Security of Diffie--Hellman Bits
- Maria Isabel Gonzalez Vasco and Igor E. Shparlinski
-
2000/019 ( PS PS.GZ )
- Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently
- Anna Lysyanskaya
-
2000/018 ( -- withdrawn -- )
- Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP
- A. Aiello, S. Bhatt, R. Ostrovsky, S. Rajagopalan.
-
2000/017 ( PS PS.GZ PDF )
- Lower Bounds on the Efficiency of Generic Cryptographic Constructions
- Rosario Gennaro and Luca Trevisan
-
2000/016 ( -- withdrawn -- )
- Cryptanalysis of RSA with small prime difference
- Benne de Weger
-
2000/015 ( PS PS.GZ PDF )
- Identification Protocols Secure Against Reset Attacks
- Mihir Bellare and Marc Fischlin and Shafi Goldwasser and Silvio Micali
-
2000/014 ( PS PS.GZ PDF )
- Authenticated Key Exchange Secure Against Dictionary Attacks
- Mihir Bellare and David Pointcheval and Phillip Rogaway
-
2000/013 ( PS PS.GZ PDF )
- Concurrent Zero-Knowledge in Poly-logarithmic Rounds
- Joe Kilian and Erez Petrank
-
2000/012 ( -- withdrawn -- )
- Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature Scheme from Crypto'97
- DaeHun Nyang and JooSeok Song
-
2000/011 ( PDF )
- Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext
- Gideon Samid
-
2000/010 ( PS PS.GZ PDF )
- The Security of Chaffing and Winnowing
- Mihir Bellare and Alexandra Boldyreva
-
2000/009 ( PS PS.GZ )
- New Directions in Design of Resilient Boolean Functions
- Palash Sarkar and Subhamoy Maitra
-
2000/008 ( PS PS.GZ )
- Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes
- Ivan Damgård and Mads Jurik
-
2000/007 ( PS PS.GZ PDF )
- Public Electronic Contract Protocol
- Tak-Ming Law
-
2000/006 ( PS PS.GZ PDF )
- An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure
- Tak-Ming Law
-
2000/005 ( PS PS.GZ )
- On Resilient Boolean Functions with Maximal Possible Nonlinearity
- Yuriy Tarannikov
-
2000/004 ( PS PS.GZ )
- Combinatorial Properties of Frameproof and Traceability Codes
- J.N. Staddon and D.R. Stinson and R. Wei
-
2000/003 ( -- withdrawn -- )
- Implications of the Nontriviality of Entropy Approximation
- Marc Fischlin
-
2000/002 ( PS PS.GZ PDF )
- A New Forward-Secure Digital Signature Scheme
- Michel Abdalla and Leonid Reyzin
-
2000/001 ( PS PS.GZ )
- On Security Preserving Reductions -- Revised Terminology
- Oded Goldreich
-
1999/024 ( PS PS.GZ )
- A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion
- M. Bellare and R. Impagliazzo
-
1999/023 ( PS PS.GZ )
- Concurrent Zero-Knowledge
- Cynthia Dwork, Moni Naor and Amit Sahai
-
1999/022 ( PS PS.GZ )
- Resettable Zero-Knowledge
- Ran Canetti, Oded Goldreich, Shafi Goldwasser and Silvio Micali
-
1999/021 ( PS PS.GZ )
- Public-Key Cryptography and Password Protocols: The Multi-User Case
- Maurizio Kliban Boyarsky
-
1999/020 ( PS PS.GZ PDF )
- Improving the Exact Security of Digital Signature Schemes
- Silvio Micali and Leonid Reyzin
-
1999/019 ( PS PS.GZ )
- Security of all RSA and Discrete Log Bits
- Johan Hastad and Mats Naslund
-
1999/018 ( PS PS.GZ )
- Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
- Mihir Bellare and Amit Sahai
-
1999/017 ( PS PS.GZ )
- A Composition Theorem for Universal One-Way Hash Functions
- Victor Shoup
-
1999/016 ( PS PS.GZ )
- A forward-secure digital signature scheme
- Mihir Bellare and Sara Miner
-
1999/015 ( PS PS.GZ )
- Interleaved Zero-Knowledge in the Public-Key Model
- Oded Goldreich, Shafi Goldwasser and Silvio Micali
-
1999/014 ( PS PS.GZ )
- Concurrent Zero-Knowledge is Easy in Practice
- Ivan Damgard
-
1999/013 ( PS PS.GZ )
- Secure Hash-and-Sign Signatures without the Random Oracle
- Rosario Gennaro, Shai Halevi and Tal Rabin
-
1999/012 ( PS PS.GZ )
- On Formal Models for Secure Key Exchange
- Victor Shoup
-
1999/011 ( PS PS.GZ )
- Practical Threshold Signatures
- Victor Shoup
-
1999/010 ( PS PS.GZ )
- A Relationship between One-Wayness and Correlation Intractability
- Satoshi Hada and Toshiaki Tanaka
-
1999/009 ( PS PS.GZ )
- On the Existence of 3-Round Zero-Knowledge Protocols
- Satoshi Hada and Toshiaki Tanaka
-
1999/008 ( PS PS.GZ )
- Verifiable Encryption and Applications to Group Signatures and Signature Sharing
- Jan Camenisch and Ivan Damgaard
-
1999/007 ( PS PS.GZ )
- DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem
- Michel Abdalla, Mihir Bellare and Phillip Rogaway
-
1999/006 ( -- withdrawn -- )
- Fast Proof of Plaintext-Knowledge and Deniable Authentication Based on Chinese Remainder Theorem
- Roger Fischlin
-
1999/005 ( PS PS.GZ )
- Lattice Based Cryptography: A Global Improvement
- Daniele Micciancio
-
1999/004 ( PS PS.GZ )
- Public-key cryptography and password protocols
- Shai Halevi, Hugo Krawczyk
-
1999/003 ( PS PS.GZ )
- An error in the mixed adversary protocol by Fitzi, Hirt and Maurer
- Ivan Damgard
-
1999/002 ( PS PS.GZ )
- Chinese Remaindering with Errors
- Oded Goldreich, Dana Ron and Madhu Sudan
-
1999/001 ( PS PS.GZ )
- Signature Schemes Based on the Strong RSA Assumption
- Ronald Cramer and Victor Shoup
-
1998/026 ( PS PS.GZ )
- Comparing Entropies in Statistical Zero-Knowledge with Applications to the Structure of SZK
- Oded Goldreich and Salil Vadhan
-
1998/025 ( PS PS.GZ )
- Secure Distributed Storage and Retrieval
- Juan A. Garay, Rosario Gennaro, Charanjit Jutla, and Tal Rabin
-
1998/024 ( PS PS.GZ )
- The Disparity between Work and Entropy in Cryptology
- John Pliam
-
1998/023 ( PS PS.GZ )
- Security amplification by composition: The case of doubly-iterated, ideal ciphers
- William Aiello, Mihir Bellare, Giovanni Di Crescenzo and Ramarathnam Venkatesan
-
1998/022 ( PS PS.GZ )
- Insecurity of Quantum Computations
- Hoi-Kwong Lo
-
1998/021 ( PS PS.GZ )
- Relations among Notions of Security for Public-Key Encryption Schemes
- Mihir Bellare,Anand Desai, David Pointcheval and Phillip Rogaway
-
1998/020 ( PS PS.GZ )
- Almost All Discrete Log Bits Are Simultaneously Secure
- Claus P. Schnorr
-
1998/019 ( PS PS.GZ )
- Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems
- Mihir Bellare, Shai Halevi, Amit Sahai and Salil Vadhan
-
1998/018 ( PS PS.GZ )
- Security and Composition of Multi-party Cryptographic Protocols
- Ran Canetti
-
1998/017 ( PS PS.GZ )
- Making An Empty Promise With A Quantum Computer (Or, A Brief Review on the Impossibility of Quantum Bit Commitment)
- H. F. Chau and H.-K. Lo
-
1998/016 ( -- withdrawn -- )
- Quantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances
- Hoi-Kwong Lo and H. F. Chau
-
1998/015 ( PS PS.GZ )
- More on Proofs of Knowledge
- Shai Halevi and Silvio Micali
-
1998/014 ( PS PS.GZ )
- Randomness versus Fault-Tolerance
- Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosen
-
1998/013 ( PS PS.GZ )
- A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Data Replication)
- Yael Gertner, Shafi Goldwasser, Tal Malkin
-
1998/012 ( PS PS.GZ )
- Maintaining Authenticated Communication in the Presence of Break-ins
- Ran Canetti, Shai Halevi, Amir Herzberg
-
1998/011 ( PS PS.GZ PDF )
- The Random Oracle Methodology, Revisited
- Ran Canetti, Oded Goldreich, Shai Halevi
-
1998/010 ( PS PS.GZ )
- Chameleon Hashing and Signatures
- Hugo Krawczyk and Tal Rabin
-
1998/009 ( PS PS.GZ )
- A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
- Mihir Bellare, Ran Canetti, and Hugo Krawczyk
-
1998/008 ( PS PS.GZ )
- An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products
- Rosario Gennaro and Daniele Micciancio and Tal Rabin
-
1998/007 ( PS PS.GZ )
- Fast Batch Verification for Modular Exponentiation and Digital Signatures
- Mihir Bellare, Juan A. Garay, and Tal Rabin
-
1998/006 ( PS PS.GZ )
- A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
- Ronald Cramer and Victor Shoup
-
1998/005 ( PS PS.GZ )
- On the possibility of basing Cryptography on the assumption that $P \neq NP$
- Oded Goldreich and Shafi Goldwasser
-
1998/004 ( PS PS.GZ )
- Universal Service Providers for Database Private Information Retrieval
- Giovanni Di-Crescenzo and Yuval Ishai and Rafail Ostrovsky
-
1998/003 ( PS PS.GZ )
- Private Information Retrieval by Keywords
- Benny Chor, Niv Gilboa, and Moni Naor
-
1998/002 ( PS PS.GZ )
- The Graph Clustering Problem has a Perfect Zero-Knowledge Proof
- A. De Santis, G. Di Crescenzo, O. Goldreich, and G. Persiano.
-
1998/001 ( PS PS.GZ )
- On Protocol Divertibility
- Gerrit Bleumer
-
1997/015 ( PS PS.GZ )
- Optimistic fair Exchange of Digital Signatures
- N. Asokan, V. Shoup, M. Waidner
-
1997/014 ( PS PS.GZ )
- Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
- Eli Biham, Dan Boneh and Omer Reingold
-
1997/013 ( PS PS.GZ )
- Visual Authentication and Identification
- Moni Naor, Benny Pinkas.
-
1997/012 ( PS PS.GZ )
- Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.
- Oded Goldreich, Birgit Pfitzmann, and Ronald L. Rivest
-
1997/011 ( PS PS.GZ )
- Identity Escrow
- Joe Kilian and Erez Petrank
-
1997/010 ( PS PS.GZ )
- CBC MAC for Real-Time Data Sources
- Erez Petrank and Charles Rackoff
-
1997/009 ( PS PS.GZ )
- Collision-Resistant Hashing: Towards Making UOWHFs Practical
-
-
1997/008 ( PS PS.GZ )
- Factoring via Strong Lattice Reduction Algorithms
- Harald Ritter, Carsten Roessner
-
1997/007 ( PS PS.GZ )
- Towards realizing random oracles: Hash functions that hide all partial information
- Ran Canetti
-
1997/006 ( PS PS.GZ )
- Protecting Data Privacy in Private Information Retrieval Schemes
- Yuval Ishai and Eyal Kushilevitz
-
1997/005 ( PS PS.GZ )
- A Probabilistic Error-Correcting Scheme
- S. Decatur, O. Goldreich, D. Ron
-
1997/004 ( PS PS.GZ PDF )
- A note on negligible functions
- Mihir Bellare
-
1997/003 ( PS PS.GZ )
- Efficient Cryptographic Protocols Based on Noisy Channels.
- Claude Crepeau
-
1997/002 ( PS PS.GZ )
- Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function
- Mihir Bellare and Markus Jakobsson and Moti Yung
-
1997/001 ( PS PS.GZ )
- A New Paradigm for Collision-free Hashing: Incrementality at Reduced Cost
- Mihir Bellare and Daniele Micciancio
-
1996/016 ( PS PS.GZ )
- Public-Key Cryptosystems from Lattice Reduction Problems
- Oded Goldreich, Shafi Goldwasser, and Shai Halevi
-
1996/015 ( PS PS.GZ )
- Verifiable Partial Key Escrow
- Mihir Bellare and Shafi Goldwasser
-
1996/014 ( PS PS.GZ )
- The Graph Clustering Problem has a Perfect Zero-Knowledge Proof
- Oded Goldreich
-
1996/013 ( PS PS.GZ )
- On the Contrast in Visual Cryptography Schemes
- Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson
-
1996/012 ( PS PS.GZ )
- Proactive RSA
- Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung
-
1996/011 ( PS PS.GZ )
- On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited
- Moni Naor and Omer Reingold
-
1996/010 ( PS PS.GZ )
- Oblivious Transfers and Intersecting Codes
- Gilles Brassard, Claude Crepeau, Miklos Santha
-
1996/009 ( PS PS.GZ )
- Collision-Free Hashing from Lattice Problems
- Oded Goldreich, Shafi Goldwasser, and Shai Halevi
-
1996/008 ( PS PS.GZ )
- Access Control and Signatures via Quorum Secret Sharing
- Moni Naor and Avishai Wool
-
1996/007 ( PS PS.GZ )
- Visual Cryptography II: Improving the Contrast Via the Cover Base
- Moni Naor and Adi Shamir
-
1996/006 ( PS PS.GZ )
- Upper bound on the communication complexity of private information retrieval
- Andris Ambainis
-
1996/005 ( PS PS.GZ )
- Private Information Storage
- Rafail Ostrovsky, Victor Shoup
-
1996/004 ( PS PS.GZ )
- Linear Zero-Knowledge - A note on Efficient Zero-Knowledge Proofs and Arguments
- Ronald Cramer and Ivan Damgaard
-
1996/003 ( PS PS.GZ )
- On Monotone Function Closure of Statistical Zero-Knowledge
- Ronald Cramer and Ivan Damgaard
-
1996/002 ( PS PS.GZ )
- Deniable Encryption
- Ran Canetti, Cynthia Dwork, Moni Naor, Rafi Ostrovsky
-
1996/001 ( PS PS.GZ )
- Incoercible Multiparty Computation
- Ran Canetti and Rosario Gennaro
[ Cryptology ePrint archive ]