Cryptology ePrint Archive: Recent Updates
-
2017/674 ( PDF )
- Transparent Memory Encryption and Authentication
- Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard
-
2017/673 ( PDF )
- Differential Fault Analysis Automation
- Sayandeep Saha, and Ujjawal Kumar, and Debdeep Mukhopadhyay, and Pallab Dasgupta
-
2017/672 ( PDF )
- Coding for interactive communication beyond threshold adversaries
- Anat Paskin-Cherniavsky and Slava Radune
-
2017/671 ( PDF )
- Guru: Universal Reputation Module for Distributed Consensus Protocols
- Alex Biryukov and Daniel Feher and Dmitry Khovratovich
-
2017/670 ( PDF )
- Private Set Intersection for Unequal Set Sizes with Mobile Applications
- Ágnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas
-
2017/669 ( PDF )
- Speeding up Elliptic Curve Scalar Multiplication without Precomputation
- Kwang Ho Kim and Junyop Choe and Song Yun Kim and Namsu Kim and Sekung Hong
-
2017/668 ( PDF )
- Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2017/667 ( PDF )
- High-speed key encapsulation from NTRU
- Andreas Hülsing and Joost Rijneveld and John Schanck and Peter Schwabe
-
2017/666 ( PDF )
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
- Katriel Cohn-Gordon and Cas Cremers and Luke Garratt and Jon Millican and Kevin Milner
-
2017/665 ( PDF )
- Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
- Michael Raskin
-
2017/664 ( PDF )
- Message Franking via Committing Authenticated Encryption
- Paul Grubbs and Jiahui Lu and Thomas Ristenpart
-
2017/663 ( PDF )
- Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
- Thomas Unterluggauer and Mario Werner and Stefan Mangard
-
2017/662 ( PDF )
- A new signature scheme based on (U|U+V) codes
- Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
-
2017/661 ( PDF )
- MuSE: Multimodal Searchable Encryption for Cloud Applications
- Bernardo Ferreira and João Leitão and Henrique Domingos
-
2017/660 ( PDF )
- Profiling Good Leakage Models For Masked Implementations
- Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou
-
2017/659 ( PDF )
- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
- Russell W. F. Lai and Sherman S. M. Chow
-
2017/658 ( PDF )
- Privacy for Targeted Advertising
- Avradip Mandal and John Mitchell and Hart Montgomery and Arnab Roy
-
2017/657 ( PDF )
- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
- Sanjit Chatterjee and Sayantan Mukherjee and Tapas Pandit
-
2017/656 ( PDF )
- iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
- Lei Fan and Hong-Sheng Zhou
-
2017/655 ( PDF )
- A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
- Jiao Hu and Ruilin Li and Chaojing Tang
-
2017/654 ( PDF )
- A Secure and Private Billing Protocol for Smart Metering
- Tom Eccles and Basel Halak
-
2017/653 ( PDF )
- Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
- Fanbao Liu and Fengmei Liu
-
2017/652 ( PDF )
- Pseudorandom Functions: Three Decades Later
- Andrej Bogdanov and Alon Rosen
-
2017/651 ( -- withdrawn -- )
- Rescuing LoRaWAN 1.0
- Gildas Avoine and Loïc Ferreira
-
2017/650 ( PDF )
- Efficient Public Trace and Revoke from Standard Assumptions
- Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehle and Shota Yamada
-
2017/649 ( PDF )
- Blockcipher-based Authenticated Encryption: How Small Can We Go?
- Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi
-
2017/648 ( PDF )
- CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
- Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ismail Khoffi and Justin Cappos and Bryan Ford
-
2017/647 ( PDF )
- A TMDTO Attack Against Lizard
- Subhamoy Maitra and Nishant Sinha and Akhilesh Siddhanti and Ravi Anand and Sugata Gangopadhyay
-
2017/646 ( PDF )
- Rational Trust Modeling
- Mehrdad Nojoumian
-
2017/645 ( PDF )
- SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
- Shay Gueron and Nicky Mouha
-
2017/644 ( PDF )
- On Space-Scarce Economy In Blockchain Systems
- Alexander Chepurnoy and Dmitry Meshkov
-
2017/643 ( PDF )
- Private Data Aggregation on a Budget
- Morten Dahl and Valerio Pastro and Mathieu Poumeyrol
-
2017/642 ( PDF )
- Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
- Nasrollah Pakniat and Mahnaz Noroozi and Ziba Eslami
-
2017/641 ( PDF )
- Integer Version of Ring-LWE and its Applications
- Gu Chunsheng
-
2017/640 ( PDF )
- Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
- Fabrice Benhamouda and Houda Ferradi and Rémi Géraud and David Naccache
-
2017/639 ( PDF )
- One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
- Jan Camenisch and Liqun Chen and Manu Drijvers and Anja Lehmann and David Novick and Rainer Urian
-
2017/638 ( PDF )
- From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
- Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
-
2017/637 ( PDF )
- Very High Order Masking: Efficient Implementation and Security Evaluation
- Anthony Journault and François-Xavier Standaert
-
2017/636 ( PDF )
- Implementing 128-bit Secure MPKC Signatures
- Ming-Shing Chen and Wen-Ding Li and Bo-Yuan Peng and Bo-Yin Yang and Chen-Mou Cheng
-
2017/635 ( PDF )
- PERUN: Virtual Payment Channels over Cryptographic Currencies
- Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski
-
2017/634 ( PDF )
- CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
- Joppe Bos and Léo Ducas and Eike Kiltz and Tancrède Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehlé
-
2017/633 ( PDF )
- CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
- Leo Ducas and Tancrede Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehle
-
2017/632 ( PDF )
- Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
- Dahmun Goudarzi and Matthieu Rivain and Damien Vergnaud and Srinivas Vivek
-
2017/631 ( PDF )
- Certifying Trapdoor Permutations, Revisited
- Ran Canetti and Amit Lichtenberg
-
2017/630 ( PDF )
- Gimli: a cross-platform permutation
- Daniel J. Bernstein and Stefan Kölbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and François-Xavier Standaert and Yosuke Todo and Benoît Viguier
-
2017/629 ( PDF )
- A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
- Romain Poussier and Yuanyuan Zhou and François-Xavier Standaert
-
2017/628 ( PDF )
- Middle-Product Learning With Errors
- Miruna Rosca and Amin Sakzad and Ron Steinfeld and Damien Stehle
-
2017/627 ( PDF )
- Sliding right into disaster: Left-to-right sliding windows leak
- Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom
-
2017/626 ( PDF )
- CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
- Hai Zhou and Ruifeng Jiang and Shuyu Kong
-
2017/625 ( PDF )
- How to Break Secure Boot on FPGA SoCs through Malicious Hardware
- Nisha Jacob and Johann Heyszl and Andreas Zankl and Carsten Rolfes and Georg Sigl
-
2017/624 ( PDF )
- Fast Leakage Assessment
- Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede
-
2017/623 ( PDF )
- Back to Massey: Impressively fast, scalable and tight security evaluation tools
- Marios O. Choudary and P.G. Popescu
-
2017/622 ( PDF )
- GIFT: A Small Present
- Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Siang Meng Sim and Yosuke Todo and Yu Sasaki
-
2017/621 ( PDF )
- Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks
- Xiaolin Xu and Bicky Shakya and Mark M. Tehranipoor and Domenic Forte
-
2017/620 ( PDF )
- The Algebraic Group Model and its Applications
- Eike Kiltz and Julian Loss
-
2017/619 ( PDF )
- Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
- Qiong Huang and Jianye Huang
-
2017/618 ( PDF )
- CacheZoom: How SGX Amplifies The Power of Cache Attacks
- Ahmad Moghimi and Gorka Irazoqui and Thomas Eisenbarth
-
2017/617 ( PDF )
- Secure Arithmetic Computation with Constant Computational Overhead
- Benny Applebaum and Ivan Damgård and Yuval Ishai and Michael Nielsen and Lior Zichron
-
2017/616 ( PDF )
- Digital Liquid Democracy: How to Vote Your Delegation Statement
- Bingsheng Zhang and Hong-Sheng Zhou
-
2017/615 ( PDF )
- A Framework to Select Parameters for Lattice-Based Cryptography
- Nabil Alkeilani Alkadri and Johannes Buchmann and Rachid El Bansarkhani and Juliane Krämer
-
2017/614 ( PDF )
- Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
- Mathias Wagner and Stefan Heyse
-
2017/613 ( PDF )
- Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
- Hocheol Shin and Dohyun Kim and Yujin Kwon and Yongdae Kim
-
2017/612 ( PDF )
- Large Modulus Ring-LWE >= Module-LWE
- Martin R. Albrecht and Amit Deo
-
2017/611 ( PDF )
- Multi-Rate Threshold FlipThem
- David Leslie and Chris Sherfield and Nigel P. Smart
-
2017/610 ( PDF )
- Differential Attacks: Using Alternative Operations
- Céline Blondeau and Roberto Civino and Massimiliano Sala
-
2017/609 ( PDF )
- On the discrete logarithm problem for prime-field elliptic curves
- Alessandro Amadori and Federico Pintore and Massimiliano Sala
-
2017/608 ( PDF )
- Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs
- Vincent Immler and Robert Specht and Florian Unterstein
-
2017/607 ( PDF )
- Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
- Edward Eaton
-
2017/606 ( PDF )
- Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
- Johannes Buchmann and Niklas Büscher and Florian Göpfert and Stefan Katzenbeisser and Juliane Krämer and Daniele Micciancio and Sander Siim and Christine van Vredendaal and Michael Walter
-
2017/605 ( PDF )
- Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
- Xavier Bultel and Pascal Lafourcade
-
2017/604 ( PDF )
- A Modular Analysis of the Fujisaki-Okamoto Transformation
- Dennis Hofheinz and Kathrin Hövelmanns and Eike Kiltz
-
2017/603 ( PDF )
- Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
- Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
-
2017/602 ( PDF )
- A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
- Sean Bowe and Ariel Gabizon and Matthew D. Green
-
2017/601 ( PDF )
- Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
- Wei Dai and Yarkın Doröz and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savaş and Berk Sunar
-
2017/600 ( PDF )
- Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
- Jeremy Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich
-
2017/599 ( PDF )
- A Subversion-Resistant SNARK
- Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac
-
2017/598 ( PDF )
- Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
- Martin Roetteler and Michael Naehrig and Krysta M. Svore and Kristin Lauter
-
2017/597 ( PDF )
- Round Optimal Concurrent MPC via Strong Simulation
- Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai
-
2017/596 ( PDF )
- A Side-Channel Assisted Cryptanalytic Attack Against QcBits
- Melissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson
-
2017/595 ( PDF )
- FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
- Wen Wang and Jakub Szefer and Ruben Niederhagen
-
2017/594 ( PDF )
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- Robert Primas and Peter Pessl and Stefan Mangard
-
2017/593 ( PDF )
- Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra
- Alessio Caminata and Elisa Gorla
-
2017/592 ( PDF )
- Speeding up lattice sieve with Xeon Phi coprocessor
- Anja Becker and Dusan Kostic
-
2017/591 ( PDF )
- On the Security of Carrier Phase-based Ranging
- Hildur Olafsdottir and Aanjhan Ranganathan and Srdjan Capkun
-
2017/590 ( PDF )
- Constant bandwidth ORAM with small block size using PIR operations
- Linru Zhang and Gongxian Zeng and Yuechen Chen and Siu-Ming Yiu and Nairen Cao and Zheli Liu
-
2017/589 ( PDF )
- An Attempt to Cryptanalyze A Partially Known Cipher Algorithm
- Juay Guan Hee
-
2017/588 ( PDF )
- Renyi Entropy Estimation Revisited
- Maciej Obremski and Maciej Skorski
-
2017/587 ( PDF )
- Subversion-zero-knowledge SNARKs
- Georg Fuchsbauer
-
2017/586 ( PDF )
- Deterministic, Stash-Free Write-Only ORAM
- Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry
-
2017/585 ( PDF )
- Internet Voting Using Zcash
- Pavel Tarasov and Hitesh Tewari
-
2017/584 ( PDF )
- Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
- Luka Malisa and Kari Kostiainen and Thomas Knell and David Sommer and Srdjan Capkun
-
2017/583 ( )
- Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
- Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
-
2017/582 ( PDF )
- (Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
- Angela Jäschke and Frederik Armknecht
-
2017/581 ( PDF )
- Parallel Collision Search with Radix Trees
- Gilles Dequen and Sorina Ionica and Monika Trimoska
-
2017/580 ( PDF )
- Analysing Relations involving small number of Monomials in AES S- Box
- Riddhi Ghosal
-
2017/579 ( PDF )
- Birthday Attack on Dual EWCDM
- Mridul Nandi
-
2017/578 ( PDF )
- TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
- Hubert Ritzdorf and Karl Wüst and Arthur Gervais and Guillaume Felley and Srdjan Capkun
-
2017/577 ( PDF )
- Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
- Steffen Schulz and André Schaller and Florian Kohnhäuser and Stefan Katzenbeisser
-
2017/576 ( PDF )
- The Security of SIMON-like Ciphers Against Linear Cryptanalysis
- Zhengbin Liu and Yongqiang Li and Mingsheng Wang
-
2017/575 ( PDF )
- Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds
- Ehsan Ebrahimi and Dominique Unruh
-
2017/574 ( PDF )
- A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
- Hamidreza Yazdanpanah, Mohammadreza Hasani Ahangar, Mahdi Azizi and Arash Ghafouri
-
2017/573 ( PDF )
- Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
- Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
-
2017/572 ( PDF )
- MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
- Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Marten van Dijk
-
2017/571 ( PDF )
- Faster Algorithms for Isogeny Problems using Torsion Point Images
- Christophe Petit
-
2017/570 ( PDF )
- Assessing the No-Knowledge Property of SpiderOak ONE
- Anders P. K. Dalskov and Claudio Orlandi
-
2017/569 ( PDF )
- Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
- Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
-
2017/568 ( PDF )
- Towards Doubly Efficient Private Information Retrieval
- Ran Canetti and Justin Holmgren and Silas Richelson
-
2017/567 ( PDF )
- Can We Access a Database Both Locally and Privately?
- Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters
-
2017/566 ( PDF )
- Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
- Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo
-
2017/565 ( PDF )
- A Formal Foundation for Secure Remote Execution of Enclaves
- Pramod Subramanyan and Rohit Sinha and Ilia Lebedev and Srinivas Devadas and Sanjit Seshia
-
2017/564 ( PDF )
- Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
- Manaar Alam and Sarani Bhattacharya and Debdeep Mukhopadhyay and Sourangshu Bhattacharya
-
2017/563 ( PDF )
- Weak is Better: Tightly Secure Short Signatures from Weak PRFs
- Jacob Alperin-Sheriff and Daniel Apon
-
2017/562 ( PDF )
- Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices
- Björn Haase and Benoît Labrique
-
2017/561 ( PDF )
- Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
- Yashvanth Kondi and Arpita Patra
-
2017/560 ( PDF )
- Notes on the design and analysis of SIMON and SPECK
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2017/559 ( PDF )
- Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
- Alexandra Boldyreva and Shan Chen and Pierre-Alain Dupont and David Pointcheval
-
2017/558 ( PDF )
- Detecting Large Integer Arithmetic for Defense Against Crypto Ransomware
- Mehmet Sabir Kiraz and Ziya Alper Genç and Erdinç Öztürk
-
2017/557 ( PDF )
- Watermarking Public-key Cryptographic Functionalities and Implementations
- Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari
-
2017/556 ( PDF )
- Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$).
- Sankhanil Dey and Ranjan Ghosh
-
2017/555 ( PDF )
- Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion
- Fabrice Benhamouda and Hugo Krawczyk and Tal Rabin
-
2017/554 ( PDF )
- Trapping ECC with Invalid Curve Bug Attacks
- Renaud Dubois
-
2017/553 ( PDF )
- Further Analysis of a Proposed Hash-Based Signature Standard
- Scott Fluhrer
-
2017/552 ( PDF )
- Fast Secure Two-Party ECDSA Signing
- Yehuda Lindell
-
2017/551 ( PDF )
- Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions
- Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
-
2017/550 ( PDF )
- Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments
- Tore Frederiksen and Benny Pinkas and Avishay Yanay
-
2017/549 ( PDF )
- ZeroTrace : Oblivious Memory Primitives from Intel SGX
- Sajin Sasy and Sergey Gorbunov and Christopher Fletcher
-
2017/548 ( PDF )
- Fully Homomorphic Encryption from the Finite Field Isomorphism Problem
- Yarkın Doröz and Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman and Berk Sunar and William Whyte and Zhenfei Zhang
-
2017/547 ( PDF )
- Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
- Seyed Farhad Aghili and Hamid Mala
-
2017/546 ( PDF )
- X509CLOUD - FRAMEWORK FOR A UBIQUITOUS PKI
- Hitesh Tewari and Arthur Hughes and Stefan Weber and Tomas Barry
-
2017/545 ( PDF )
- Resource-efficient OT combiners with active security
- Ignacio Cascudo and Ivan Damgård and Oriol Farràs and Samuel Ranellucci
-
2017/544 ( PDF )
- Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability
- Elette Boyle and Saleet Klein and Alon Rosen and Gil Segev
-
2017/543 ( PDF )
- Identity-Based Encryption from the Diffie-Hellman Assumption
- Nico Döttling and Sanjam Garg
-
2017/542 ( PDF )
- A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
- Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart
-
2017/541 ( PDF )
- Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
- Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed
-
2017/540 ( PDF )
- Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs
- Jens Groth and Mary Maller
-
2017/539 ( PDF )
- Public-Seed Pseudorandom Permutations
- Pratik Soni and Stefano Tessaro
-
2017/538 ( PDF )
- New security notions and feasibility results for authentication of quantum data
- Sumegha Garg and Henry Yuen and Mark Zhandry
-
2017/537 ( PDF )
- Information-theoretic Indistinguishability via the Chi-squared Method
- Wei Dai and Viet Tung Hoang and Stefano Tessaro
-
2017/536 ( PDF )
- HACL*: A Verified Modern Cryptographic Library
- Jean-Karim Zinzindohoué and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche
-
2017/535 ( PDF )
- ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
- Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin
-
2017/534 ( PDF )
- Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
- Zhenzhen Bao and Lei Wang and Jian Guo and Dawu Gu
-
2017/533 ( PDF )
- Quantum non-malleability and authentication
- Gorjan Alagic and Christian Majenz
-
2017/532 ( PDF )
- All-But-Many Lossy Trapdoor Functions from Lattices and Applications
- Xavier Boyen and Qinyi Li
-
2017/531 ( PDF )
- Template Attack vs Bayes Classifier
- Stjepan Picek and Annelie Heuser and Sylvain Guilley
-
2017/530 ( PDF )
- Non-Malleable Codes for Space-Bounded Tampering
- Sebastian Faust and Kristina Hostakova and Pratyay Mukherjee and Daniele Venturi
-
2017/529 ( PDF )
- Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
- Ling Song and Guohong Liao and Jian Guo
-
2017/528 ( PDF )
- Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets
- Claude Carlet
-
2017/527 ( PDF )
- Key Rotation for Authenticated Encryption
- Adam Everspaugh and Kenneth Paterson and Thomas Ristenpart and Sam Scott
-
2017/526 ( PDF )
- Evaluating web PKIs
- Jiangshan Yu and Mark Ryan
-
2017/525 ( PDF )
- Kurosawa-Desmedt Meets Tight Security
- Romain Gay and Dennis Hofheinz and Lisa Kohl
-
2017/524 ( PDF )
- Compact Structure-preserving Signatures with Almost Tight Security
- Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan
-
2017/523 ( PDF )
- Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge Proofs
- Vadim Lyubashevsky and Gregor Seiler
-
2017/522 ( PDF )
- On the Hardness of the Mersenne Low Hamming Ratio Assumption
- Marc Beunardeau and Aisling Connolly and Rémi Géraud and David Naccache
-
2017/521 ( PDF )
- Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains
- F. Betül Durak and Serge Vaudenay
-
2017/520 ( PDF )
- The Price of Low Communication in Secure Multi-Party Computation
- Juan Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas
-
2017/519 ( PDF )
- Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
- Nishanth Chandran and Juan Garay and Payman Mohassel and Satyanarayana Vusirikala
-
2017/518 ( PDF )
- qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
- Joost Renes and Benjamin Smith
-
2017/517 ( PDF )
- PRF-ODH: Relations, Instantiations, and Impossibility Results
- Jacqueline Brendel and Marc Fischlin and Felix Günther and Christian Janson
-
2017/516 ( PDF )
- Characterizations of the differential uniformity of vectorial functions by the Walsh transform
- Claude Carlet
-
2017/515 ( PDF )
- Be Adaptive, Avoid Overcommitting
- Zahra Jafargholi and Chethan Kamath and Karen Klein and Ilan Komargodski and Krzysztof Pietrzak and Daniel Wichs
-
2017/514 ( PDF )
- Identity-based Encryption from Codes with Rank Metric
- Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean-Pierre Tillich
-
2017/513 ( PDF )
- Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$
- Patrick Holzer and Thomas Wunderer
-
2017/512 ( PDF )
- PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
- Dr. M. AMUTHA PRABAKAR and Dr. B. INDRANI and M. KARTHIGAI VENI
-
2017/511 ( PDF )
- State of the Art in Lightweight Symmetric Cryptography
- Alex Biryukov and Leo Perrin
-
2017/510 ( PDF )
- Hedging Public-Key Encryption in the Real World
- Alexandra Boldyreva and Christopher Patton and Thomas Shrimpton
-
2017/509 ( PDF )
- Quantum Security of NMAC and Related Constructions
- Fang Song and Aaram Yun
-
2017/508 ( PDF )
- Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
- Victor Cauchois and Clément Gomez and Reynald Lercier
-
2017/507 ( PDF )
- Inverted Leftover Hash Lemma
- Maciej Obremski and Maciej Skórski
-
2017/506 ( PDF )
- Optimal Overcoming Weak Expectations
- Maciej Skorski
-
2017/505 ( PDF )
- Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
- Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
-
2017/504 ( PDF )
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- Craig Costello and Huseyin Hisil
-
2017/503 ( PDF )
- Encryption Switching Protocols Revisited: Switching modulo $p$
- Guilhem Castagnos and Laurent Imbert and Fabien Laguillaumie
-
2017/502 ( PDF )
- DeepSecure: Scalable Provably-Secure Deep Learning
- Bita Darvish Rouhani and M. Sadegh Riazi and Farinaz Koushanfar
-
2017/501 ( PDF )
- A Formal Treatment of Multi-key Channels
- Felix Günther and Sogol Mazaheri
-
2017/500 ( PDF )
- Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps
- Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
-
2017/499 ( PDF )
- Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample
- Fuchun Guo and Rongmao Chen and Willy Susilo and Jianchang Lai and Guomin Yang and Yi Mu
-
2017/498 ( PDF )
- Full-State Keyed Duplex With Built-In Multi-User Support
- Joan Daemen and Bart Mennink and Gilles Van Assche
-
2017/497 ( PDF )
- Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
- Itai Dinur and Niv Nadler
-
2017/496 ( PDF )
- Modes of Operation Suitable for Computing on Encrypted Data
- Dragos Rotaru and Nigel P. Smart and Martijn Stam
-
2017/495 ( PDF )
- Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy
- Tibor Jager and Martijn Stam and Ryan Stanley-Oakes and Bogdan Warinschi
-
2017/494 ( PDF )
- A Reaction Attack on the QC-LDPC McEliece Cryptosystem
- Tomas Fabsic and Viliam Hromada and Paul Stankovski and Pavol Zajac and Qian Guo and Thomas Johansson
-
2017/493 ( PDF )
- Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
- Georg T. Becker
-
2017/492 ( PDF )
- Reducing Communication Channels in MPC
- Marcel Keller and Dragos Rotaru and Nigel P. Smart and Tim Wood
-
2017/491 ( PDF )
- Laconic Oblivious Transfer and its Applications
- Chongwon Cho and Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou
-
2017/490 ( PDF )
- To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures
- Peter Pessl and Leon Groot Bruinderink and Yuval Yarom
-
2017/489 ( PDF )
- Multi Collision Resistant Hash Functions and their Applications
- Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan
-
2017/488 ( PDF )
- Multi-Collision Resistance: A Paradigm for Keyless Hash Functions
- Nir Bitansky and Yael Tauman Kalai and Omer Paneth
-
2017/487 ( PDF )
- New Linear Attacks on Block Cipher GOST
- Yi LU
-
2017/486 ( PDF )
- Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions
- Ilan Komargodski and Moni Naor and Eylon Yogev
-
2017/485 ( PDF )
- Authenticating compromisable storage systems
- Jiangshan Yu and Mark Ryan and Liqun Chen
-
2017/484 ( PDF )
- Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial
- Jung Hee Cheon and Minki Hhan and Changmin Lee
-
2017/483 ( PDF )
- A multi-start heuristic for multiplicative depth minimization of boolean circuits
- Sergiu Carpov and Pascal Aubry and Renaud Sirdey
-
2017/482 ( PDF )
- On the Statistical Leak of the GGH13 Multilinear Map and some Variants
- Léo Ducas and Alice Pellet--Mary
-
2017/481 ( PDF )
- A New Public-Key Cryptosystem via Mersenne Numbers
- Divesh Aggarwal and Antoine Joux and Anupam Prakash and Miklos Santha
-
2017/480 ( PDF )
- Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence
- Thomas Prest
-
2017/479 ( PDF )
- Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
- Keita Emura
-
2017/478 ( PDF )
- Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
- Anne Canteaut and Eran Lambooij and Samuel Neves and Shahram Rasoolzadeh and Yu Sasaki and Marc Stevens
-
2017/477 ( PDF )
- Constrained Keys for Invertible Pseudorandom Functions
- Dan Boneh and Sam Kim and David J. Wu
-
2017/476 ( PDF )
- Forward-Security under Continual Leakage
- Mihir Bellare and Adam O'Neill and Igors Stepanovs
-
2017/475 ( PDF )
- Security of Even--Mansour Ciphers under Key-Dependent Messages
- Pooya Farshim and Louiza Khati and Damien Vergnaud
-
2017/474 ( PDF )
- Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
- Bart Mennink
-
2017/473 ( PDF )
- Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
- Bart Mennink and Samuel Neves
-
2017/472 ( PDF )
- A Unified Framework for Secure Search Over Encrypted Cloud Data
- Cengiz Orencik and Erkay Savas and Mahmoud Alewiwi
-
2017/471 ( PDF )
- Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree
- Jacob Alperin-Sheriff and Jintai Ding and Albrecht Petzoldt and Daniel Smith Tone
-
2017/470 ( PDF )
- On the Relation Between SIM and IND-RoR Security Models for PAKEs
- José Becerra and Vincenzo Iovino and Dimiter Ostrev and Marjan Skrobot
-
2017/469 ( PDF )
- Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
- Hiroaki Anada and Seiko Arita
-
2017/468 ( PDF )
- Why Your Encrypted Database Is Not Secure
- Paul Grubbs and Thomas Ristenpart and Vitaly Shmatikov
-
2017/467 ( PDF )
- Access Control Encryption for General Policies from Standard Assumptions
- Sam Kim and David J. Wu
-
2017/466 ( PDF )
- Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security
- Yusuke Naito
-
2017/465 ( PDF )
- Lelantos: A Blockchain-based Anonymous Physical Delivery System
- Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong
-
2017/464 ( PDF )
- On the Structure of Unconditional UC Hybrid Protocols
- Mike Rosulek and Morgan Shirley
-
2017/463 ( PDF )
- Proving Resistance against Invariant Attacks: How to Choose the Round Constants
- Christof Beierle and Anne Canteaut and Gregor Leander and Yann Rotella
-
2017/462 ( PDF )
- Leakage-Resilient Tweakable Encryption from One-Way Functions
- Suvradip Chakraborty and Chester Rebeiro and Debdeep Mukhopadhyay and C. Pandu Rangan
-
2017/461 ( PDF )
- Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions
- Daniel Jost and Ueli Maurer
-
2017/460 ( PDF )
- Transitioning to a Quantum-Resistant Public Key Infrastructure
- Nina Bindel and Udyani Herath and Matthew McKague and Douglas Stebila
-
2017/459 ( PDF )
- Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test
- Phuong Ha Nguyen and Durga Prasad Sahoo and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay
-
2017/458 ( -- withdrawn -- )
- Fully Homomorphic Encryption Using Multivariate Polynomials
- Matthew Tamayo-Rios and Jean-Charles Faugère and Ludovic Perret and Peng Hui How and Robin Zhang
-
2017/457 ( PDF )
- Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority
- Masahito Hayashi and Takeshi Koshiba
-
2017/456 ( PDF )
- Proxy Re-Encryption and Re-Signatures from Lattices
- Xiong Fan and Feng-Hao Liu
-
2017/455 ( PDF )
- Vector Encoding over Lattices and Its Applications
- Daniel Apon and Xiong Fan and Feng-Hao Liu
-
2017/454 ( PDF )
- Algorand: Scaling Byzantine Agreements for Cryptocurrencies
- Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich
-
2017/453 ( PDF )
- Subtleties in Security Definitions for Predicate Encryption with Public Index
- Johannes Blömer and Gennadij Liske
-
2017/452 ( PDF )
- Oblivious Neural Network Predictions via MiniONN transformations
- Jian Liu and Mika Juuti and Yao Lu and N. Asokan
-
2017/451 ( PDF )
- Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
- Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan
-
2017/450 ( PDF )
- Privacy-preserving biometric authentication: challenges and directions
- Elena Pagnin and Aikaterini Mitrokotsa
-
2017/449 ( PDF )
- Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies
- Shihui Fu and Xiutao Feng and Baofeng Wu
-
2017/448 ( PDF )
- Obfuscation of Bloom Filter Queries from Ring-LWE
- Alex Davidson
-
2017/447 ( PDF )
- Block Chain based Searchable Symmetric Encryption
- Huige Li and Haibo Tian and Fangguo Zhang
-
2017/446 ( PDF )
- Secretly Embedding Trapdoors into Contract Signing Protocols
- Diana Maimut and George Teseleanu
-
2017/445 ( PDF )
- Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
- Michael Till Beck and Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
-
2017/444 ( PDF )
- CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing
- Ming Li and Jian Weng and Anjia Yang and Wei Lu
-
2017/443 ( PDF )
- Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
- Joel Alwen and Jeremiah Blocki and Ben Harsha
-
2017/442 ( PDF )
- On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i
- Jeremiah Blocki and Samson Zhou
-
2017/441 ( PDF )
- New Approach to Practical Leakage-Resilient Public-Key Cryptography
- Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan
-
2017/440 ( PDF )
- Cryptographic Security Analysis of T-310
- Nicolas T. Courtois and Klaus Schmeh and Jörg Drobick and Jacques Patarin and Maria-Bristena Oprisanu and Matteo Scarlata and Om Bhallamudi
-
2017/439 ( PDF )
- Practically Efficient Secure Single-Commodity Multi-Market Auctions
- Abdelrahaman Aly and Mathieu Van Vyve
-
2017/438 ( PDF )
- GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography
- James Howe and Máire O'Neill
-
2017/437 ( PDF )
- Slothful reduction
- Michael Scott
-
2017/436 ( PDF )
- A Uniform Class of Weak Keys for Universal Hash Functions
- Kaiyan Zheng and Peng Wang
-
2017/435 ( PDF )
- Analyzing Multi-Key Security Degradation
- Atul Luykx and Bart Mennink and Kenneth G. Paterson
-
2017/434 ( PDF )
- FourQ on embedded devices with strong countermeasures against side-channel attacks
- Zhe Liu and Patrick Longa and Geovandro Pereira and Oscar Reparaz and Hwajeong Seo
-
2017/433 ( PDF )
- Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
- Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia
-
2017/432 ( PDF )
- Statistical and Linear Independence of Binary Random Variables
- Kaisa Nyberg
-
2017/431 ( PDF )
- Understanding RUP Integrity of COLM
- Nilanjan Datta and Atul Luykx and Bart Mennink and Mridul Nandi
-
2017/430 ( PDF )
- Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping
- Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
-
2017/429 ( PDF )
- Strengthening Access Control Encryption
- Christian Badertscher and Christian Matt and Ueli Maurer
-
2017/428 ( PDF )
- Optimal Ramp Schemes and Related Combinatorial Objects
- Douglas R. Stinson
-
2017/427 ( PDF )
- Grover Meets Simon - Quantumly Attacking the FX-construction
- Gregor Leander and Alexander May
-
2017/426 ( PDF )
- FHPKE based on multivariate discrete logarithm problem
- Masahiro Yagisawa
-
2017/425 ( PDF )
- Card-Based Protocols Using Unequal Division Shuffle
- Akihiro Nishimura and Takuya Nishida and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone
-
2017/424 ( PDF )
- HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
- Markku-Juhani O. Saarinen
-
2017/423 ( PDF )
- Foundations for Actively Secure Card-based Cryptography
- Alexander Koch and Stefan Walzer
-
2017/422 ( PDF )
- PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs
- Urbi Chatterjee and Vidya Govindan and Rajat Sadhukhan and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Debashis Mahata and Mukesh Prabhu
-
2017/421 ( PDF )
- Exploring Naccache-Stern Knapsack Encryption
- Éric Brier and Rémi Géraud and David Naccache
-
2017/420 ( PDF )
- Construction and Filtration of Lightweight Formalized MDS Matrices
- Shiyi Zhang and Yongjuan Wang and Yang Gao and Tao Wang
-
2017/419 ( PDF )
- Efficient hash maps to $\mathbb{G}_2$ on BLS curves
- Alessandro Budroni and Federico Pintore
-
2017/418 ( PDF )
- Strong Authenticated Key Exchange with Auxiliary Inputs
- Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
-
2017/417 ( PDF )
- A Proof-of-Stake protocol for consensus on Bitcoin subchains
- Massimo Bartoletti and Stefano Lande and Alessandro Sebastian Podda
-
2017/416 ( PDF )
- Breaking and Fixing the HB+DB protocol
- Ioana Boureanu and David Gerault and Pascal Lafourcade and Cristina Onete
-
2017/415 ( PDF )
- Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
- Osman Bicer and Muhammed Ali Bingol and Mehmet Sabir Kiraz and Albert Levi
-
2017/414 ( PDF )
- Symmetrically and Asymmetrically Hard Cryptography
- Alex Biryukov and Leo Perrin
-
2017/413 ( PDF )
- Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
- Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava
-
2017/412 ( PDF )
- Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently
- Ximing Fu and Xiaoyun Wang and Jiazhe Chen
-
2017/411 ( PDF )
- A New Algorithm for Inversion mod $p^k$
- Çetin Kaya Koç
-
2017/410 ( PDF )
- Fast Proxy Re-Encryption for Publish/Subscribe Systems
- Yuriy Polyakov and Kurt Rohloff and Gyana Sahu and Vinod Vaikuntanthan
-
2017/409 ( PDF )
- Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
- Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges
-
2017/408 ( PDF )
- Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
- Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh
-
2017/407 ( PDF )
- SplitCommit: Implementing and Analyzing Homomorphic UC Commitments
- Peter Rindal and Roberto Trifiletti
-
2017/406 ( PDF )
- OmniLedger: A Secure, Scale-Out, Decentralized Ledger
- Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Bryan Ford
-
2017/405 ( PDF )
- Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''
- Jingjing Wang and Xiaoyu Zhang and Jingjing guo and Jianfeng Wang
-
2017/404 ( PDF )
- Short generators without quantum computers: the case of multiquadratics
- Jens Bauch and Daniel J. Bernstein and Henry de Valence and Tanja Lange and Christine van Vredendaal
-
2017/403 ( PDF )
- Condition on composite numbers easily factored with elliptic curve method
- Masaaki Shirase
-
2017/402 ( PDF )
- A New Approach to Round-Optimal Secure Multiparty Computation
- Prabhanjan Ananth and Arka Rai Choudhuri and Abhishek Jain
-
2017/401 ( PDF )
- Synthesis of Adaptive Side-Channel Attacks
- Quoc-Sang Phan and Lucas Bang and Corina S. Păsăreanu and Pasquale Malacaria and Tevfik Bultan
-
2017/400 ( PDF )
- A Leakage-Abuse Attack Against Multi-User Searchable Encryption
- Cédric Van Rompay and Refik Molva and Melek Önen
-
2017/399 ( PDF )
- Practical Evaluation of Masking Software Countermeasures on an IoT processor
- David McCann and Elisabeth Oswald
-
2017/398 ( PDF )
- Post-Quantum Security of Fiat-Shamir
- Dominique Unruh
-
2017/397 ( PDF )
- Efficient Digital Signatures From Coding Theory
- Edoardo Persichetti
-
2017/396 ( PDF )
- SecureML: A System for Scalable Privacy-Preserving Machine Learning
- Payman Mohassel and Yupeng Zhang
-
2017/395 ( PDF )
- Higher-Order Side-Channel Protected Implementations of Keccak
- Hannes Gross and David Schaffenrath and Stefan Mangard
-
2017/394 ( PDF )
- Double-spending Prevention for Bitcoin zero-confirmation transactions
- Cristina Pérez-Solà and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomartı́
-
2017/393 ( PDF )
- Privacy-Preserving Interdomain Routing at Internet Scale
- Gilad Asharov and Daniel Demmler and Michael Schapira and Thomas Schneider and Gil Segev and Scott Shenker and Michael Zohner
-
2017/392 ( PDF )
- Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE
- Sébastien Canard and Sergiu Carpov and Donald Nokam Kuate and Renaud Sirdey
-
2017/391 ( PDF )
- Another Look at Success Probability in Linear Cryptanalysis
- Subhabrata Samajder and Palash Sarkar
-
2017/390 ( PDF )
- On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations
- Yi Deng and Xuyang Song and Jingyue Yu and Yu Chen
-
2017/389 ( PDF )
- Decentralized Blacklistable Anonymous Credentials with Reputation
- Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu
-
2017/388 ( PDF )
- Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple
- Silvan Streit and Fabrizio De Santis
-
2017/387 ( PDF )
- Homomorphically Encrypted Arithmetic Operations over the Integer Ring
- Chen Xu and Jingwei Chen and Wenyuan Wu and Yong Feng
-
2017/386 ( PDF )
- Four Round Secure Computation without Setup
- Zvika Brakerski and Shai Halevi and Antigoni Polychroniadou
-
2017/385 ( PDF )
- Garbled Circuits as Randomized Encodings of Functions: a Primer
- Benny Applebaum
-
2017/384 ( PDF )
- Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
- Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang
-
2017/383 ( PDF )
- Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
- Travis Scholl
-
2017/382 ( PDF )
- A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK
- Steven Cavanaugh
-
2017/381 ( PDF )
- Quantum one-way permutation over the finite field of two elements
- Alexandre de Castro
-
2017/380 ( PDF )
- Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
- Sam Kim and David J. Wu
-
2017/379 ( PDF )
- Fault attack on Supersingular Isogeny Cryptosystems
- Yan Bo Ti
-
2017/378 ( PDF )
- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
- Marcel Keller and Emmanuela Orsini and Dragos Rotaru and Peter Scholl and Eduardo Soria-Vazquez and Srinivas Vivek
-
2017/377 ( PDF )
- Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries
- Stefan Wüller and Ulrike Meyer and Susanne Wetzel
-
2017/376 ( PDF )
- Determining the Minimum Degree of an S-box
- P. R. Mishra, Sumanta Sarkar and Indivar Gupta
-
2017/375 ( PDF )
- Do you need a Blockchain?
- Karl Wüst and Arthur Gervais
-
2017/374 ( PDF )
- Loop-abort faults on supersingular isogeny cryptosystems
- Alexandre Gélin and Benjamin Wesolowski
-
2017/373 ( PDF )
- Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption
- Ryo Hiromasa and Yutaka Kawai
-
2017/372 ( PDF )
- A crossbred algorithm for solving Boolean polynomial systems
- Antoine Joux and Vanessa Vitse
-
2017/371 ( PDF )
- On the Construction of Lightweight Orthogonal MDS Matrices
- Lijing Zhou, Licheng Wang and Yiru Sun
-
2017/370 ( PDF )
- "The Simplest Protocol for Oblivious Transfer'' Revisited
- Ziya Alper Genç and Vincenzo Iovino and Alfredo Rial
-
2017/369 ( -- withdrawn -- )
- Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
- Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
-
2017/368 ( PDF )
- Analysis of Toeplitz MDS Matrices
- Sumanta Sarkar and Habeeb Syed
-
2017/367 ( PDF )
- Forking-Free Hybrid Consensus with Generalized Proof-of-Activity
- Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, and Yu Long
-
2017/366 ( PDF )
- BitFlip: A Randomness-Rich Cipher
- Gideon Samid and Serguei Popov
-
2017/365 ( PDF )
- The Complexity of Public-Key Cryptography
- Boaz Barak
-
2017/364 ( PDF )
- Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
- Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas
-
2017/363 ( PDF )
- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF
- Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu
-
2017/362 ( PDF )
- Universally Composable Zero-Knowledge Proof of Membership
- Jesper Buus Nielsen
-
2017/361 ( PDF )
- Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
- Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
-
2017/360 ( PDF )
- Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error
- Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
-
2017/359 ( PDF )
- Conditional Disclosure of Secrets via Non-Linear Reconstruction
- Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee
-
2017/358 ( PDF )
- Almost Optimal Oblivious Transfer from QA-NIZK
- Olivier Blazy and Céline Chevalier and Paul Germouty
-
2017/357 ( PDF )
- Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model
- Nico Döttling and Jesper Buus Nielsen and Maciej Obremski
-
2017/356 ( PDF )
- XOR of PRPs in a Quantum World
- Bart Mennink and Alan Szepieniec
-
2017/355 ( PDF )
- White-Box Cryptography: Don't Forget About Grey Box Attacks
- Joppe W. Bos and Charles Hubain and Wil Michiels and Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe Teuwen
-
2017/354 ( PDF )
- Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
- Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart
-
2017/353 ( PDF )
- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
- San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
-
2017/352 ( PDF )
- A low-resource quantum factoring algorithm
- Daniel J. Bernstein and Jean-François Biasse and Michele Mosca
-
2017/351 ( PDF )
- Post-quantum RSA
- Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta
-
2017/350 ( PDF )
- The Montgomery ladder on binary elliptic curves
- Thomaz Oliveira and Julio López and Francisco Rodríguez-Henríquez
-
2017/349 ( PDF )
- LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards
- Panos Kampanakis, Scott Fluhrer
-
2017/348 ( PDF )
- Removal Attacks on Logic Locking and Camouflaging Techniques
- Muhammad Yasin and Bodhisatwa Mazumdar and Ozugr Sinanoglu and Jeyavijayan Rajendran
-
2017/347 ( PDF )
- Predictive Aging of Reliability of two Delay PUFs
- Naghmeh Karimi and Jean-Luc Danger and Florent Lozac'h and Sylvain Guilley
-
2017/346 ( PDF )
- Some cryptanalytic results on Lizard
- Subhadeep Banik and Takanori Isobe
-
2017/345 ( PDF )
- Mind the Gap: Towards Secure 1st-order Masking in Software
- Kostas Papagiannopoulos and Nikita Veshchikov
-
2017/344 ( PDF )
- DUPLO: Unifying Cut-and-Choose for Garbled Circuits
- Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti
-
2017/343 ( PDF )
- Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
- Essam Ghadafi and Jens Groth
-
2017/342 ( PDF )
- Multilinear Maps Using a Variant of Ring-LWE
- Gu Chunsheng
-
2017/341 ( PDF )
- Steganography techniques
- Dragoş Dumitrescu and Ioan-Mihail Stan and Emil Simion
-
2017/340 ( -- withdrawn -- )
- Enhancing Security by Combining Biometrics and Cryptography
- Diana Popa and Emil Simion
-
2017/339 ( PDF )
- ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
- Alan Kaminsky
-
2017/338 ( PDF )
- A Traceability Analysis of Monero's Blockchain
- Amrit Kumar and Clément Fischer and Shruti Tople and Prateek Saxena
-
2017/337 ( PDF )
- Authentication of Outsourced Linear Function Query with Efficient Updates
- Gang Sheng and Chunming Tang and Wei Gao and Yunlu Cai and Xing Hu
-
2017/336 ( PDF )
- NIST RANDOMNESS TESTS (IN)DEPENDENCE
- Carmina GEORGESCU and Alina PETRESCU-NITA and Emil SIMION and Antonela TOMA
-
2017/335 ( -- withdrawn -- )
- Privacy-Preserving Linear Regression on Distributed Data
- Irene Giacomelli and Somesh Jha and C. David Page
-
2017/334 ( PDF )
- Updating key size estimations for pairings
- Razvan Barbulescu and Sylvain Duquesne
-
2017/333 ( PDF )
- Faster Homomorphic Function Evaluation using Non-Integral Base Encoding
- Charlotte Bonte and Carl Bootland and Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
-
2017/332 ( PDF )
- Reforgeability of Authenticated Encryption Schemes
- Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
-
2017/331 ( PDF )
- Optimal attacks on qubit-based Quantum Key Recycling
- Daan Leermakers and Boris Skoric
-
2017/330 ( PDF )
- Distinguisher-Dependent Simulation in Two Rounds and its Applications
- Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum
-
2017/329 ( PDF )
- Maliciously Secure Multi-Client ORAM
- Matteo Maffei (TU Wien); Giulio Malavolta (FAU); Manuel Reinert (CISPA, Saarland University); Dominique Schröder (FAU)
-
2017/328 ( PDF )
- Evaluating Bernstein-Rabin-Winograd Polynomials
- Debrup Chakraborty and Sebati Ghosh and Palash Sarkar
-
2017/327 ( PDF )
- MQ Signatures for PKI
- Alan Szepieniec and Ward Beullens and Bart Preneel
-
2017/326 ( PDF )
- Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data
- Manuel Barbosa and Dario Catalano and Dario Fiore
-
2017/325 ( PDF )
- CHVote System Specification
- Rolf Haenni and Reto E. Koenig and Philipp Locher and Eric Dubuis
-
2017/324 ( PDF )
- Family of PRGs based on Collections of Arithmetic Progressions
- Srikanth ch, Veni Madhavan C.E. and Kumar Swamy H.V.
-
2017/323 ( PDF )
- Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
- Atsushi Takayasu and Yohei Watanabe
-
2017/322 ( PDF )
- Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction
- Jun Xu and Santanu Sarkar and Lei Hu
-
2017/321 ( PDF )
- Towards Practical Obfuscation of General Circuits
- Dingfeng Ye and Peng Liu and Jun Xu
-
2017/320 ( PDF )
- Speeding up Huff Form of Elliptic Curves
- Neriman Gamze Orhon and Huseyin Hisil
-
2017/319 ( PDF )
- Encrypt-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2017/318 ( -- withdrawn -- )
- Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2017/317 ( PDF )
- Solidus: Confidential Distributed Ledger Transactions via PVORM
- Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed Kosba and Ari Juels and Elaine Shi
-
2017/316 ( PDF )
- Exploring Potential 6LoWPAN Traffic Side Channels
- Yan Yan and Elisabeth Oswald and Theo Tryfonas
-
2017/315 ( PDF )
- Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)
- Bernardo Ferreira, Joaão Leitão, Henrique Domingos
-
2017/314 ( PDF )
- Post-quantum cryptography---dealing with the fallout of physics success
- Daniel J. Bernstein and Tanja Lange
-
2017/313 ( -- withdrawn -- )
- A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
- Yanqing Yao, Hua Guo, Zhoujun Li
-
2017/312 ( PDF )
- Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
- Boaz Barak and Zvika Brakerski and Ilan Komargodski and Pravesh K. Kothari
-
2017/311 ( PDF )
- Constructing Multidimensional Differential Addition Chains and their Applications
- Aaron Hutchinson and Koray Karabina
-
2017/310 ( PDF )
- KDM-Secure Public-Key Encryption from Constant-Noise LPN
- Shuai Han and Shengli Liu
-
2017/309 ( PDF )
- Perfectly Secure Message Transmission Scheme against Rational Adversaries
- Maiki Fujita and Takeshi Koshiba
-
2017/308 ( PDF )
- Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus
- Nicholas Genise and Daniele Micciancio
-
2017/307 ( PDF )
- Practical Synchronous Byzantine Consensus
- Ling Ren and Kartik Nayak and Ittai Abraham and Srinivas Devadas
-
2017/306 ( PDF )
- Cube Attacks on Non-Blackbox Polynomials Based on Division Property
- Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
-
2017/305 ( PDF )
- A Zero Knowledge Sumcheck and its Applications
- Alessandro Chiesa and Michael A. Forbes and Nicholas Spooner
-
2017/304 ( PDF )
- Provably Secure NTRUEncrypt over More General Cyclotomic Rings
- Yang Yu and Guangwu Xu and Xiaoyun Wang
-
2017/303 ( PDF )
- Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model
- Dana Dachman-Soled and Mukul Kulkarni and Aria Shahverdi
-
2017/302 ( PDF )
- Quantum preimage, 2nd-preimage, and collision resistance of SHA3
- Jan Czajkowski and Leon Groot Bruinderink and Andreas Hülsing and Christian Schaffner
-
2017/301 ( PDF )
- On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation
- Alex Lombardi and Vinod Vaikuntanathan
-
2017/300 ( PDF )
- Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies
- Iddo Bentov and Pavel Hubáček and Tal Moran and Asaf Nadler
-
2017/299 ( PDF )
- Fast Private Set Intersection from Homomorphic Encryption
- Hao Chen and Kim Laine and Peter Rindal
-
2017/298 ( PDF )
- An Investigation of Sources of Randomness Within Discrete Gaussian Sampling
- Séamus Brannigan and Neil Smyth and Tobias Oder and Felipe Valencia and Elizabeth O’Sullivan and Tim Güneysu and Francesco Regazzoni
-
2017/297 ( PDF )
- A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
- Gildas Avoine and Xavier Bultel and Sébastien Gambs and David Gérault and Pascal Lafourcade and Cristina Onete and Jean-Marc Robert
-
2017/296 ( PDF )
- Topology-Hiding Computation on all Graphs
- Adi Akavia and Rio LaVigne and Tal Moran
-
2017/295 ( PDF )
- Improved key-reconciliation method
- Ludo Tolhuizen and Ronald Rietman and Oscar Garcia-Morchon
-
2017/294 ( PDF )
- Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme
- Jung Hee Cheon and Miran Kim and Yongsoo Song
-
2017/293 ( PDF )
- Montgomery curves and the Montgomery ladder
- Daniel J. Bernstein and Tanja Lange
-
2017/292 ( PDF )
- Involutory Differentially 4-Uniform Permutations from Known Constructions
- Shihui Fu and Xiutao Feng
-
2017/291 ( PDF )
- How to Achieve Non-Malleability in One or Two Rounds
- Dakshita Khurana and Amit Sahai
-
2017/290 ( PDF )
- Double DIP: Re-Evaluating Security of Logic Encryption Algorithms
- Yuanqi Shen and Hai Zhou
-
2017/289 ( PDF )
- On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
- Matthias Krause
-
2017/288 ( PDF )
- Security of Symmetric Primitives under Incorrect Usage of Keys
- Pooya Farshim and Claudio Orlandi and Răzvan Roşie
-
2017/287 ( PDF )
- Towards Sound and Optimal Leakage Detection Procedure
- Liwei Zhang and A. Adam Ding and Francois Durvaux and Francois-Xavier Standaert and Yunsi Fei
-
2017/286 ( PDF )
- Impossible Differential Attack on Midori128 Using Rebound-like Technique
- Wenquan Bi and Zheng Li and Xiaoyang Dong and Xiaoyun Wang
-
2017/285 ( PDF )
- Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
- Kamil Doruk Gür and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savaş
-
2017/284 ( PDF )
- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
- Maik Ender and Alexander Wild and Amir Moradi
-
2017/283 ( PDF )
- On the Easiness of Turning Higher-Order Leakages into First-Order
- Thorben Moos and Amir Moradi
-
2017/282 ( PDF )
- Collapsing sponges: Post-quantum security of the sponge construction
- Dominique Unruh
-
2017/281 ( PDF )
- Practical Secure Aggregation for Privacy Preserving Machine Learning
- Keith Bonawitz and Vladimir Ivanov and Ben Kreuter and Antonio Marcedone and H. Brendan McMahan and Sarvar Patel and Daniel Ramage and Aaron Segal and Karn Seth
-
2017/280 ( PDF )
- Amortization with Fewer Equations for Proving Knowledge of Small Secrets
- Rafael del Pino and Vadim Lyubashevsky
-
2017/279 ( PDF )
- Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
- Melissa Chase and David Derler and Steven Goldfeder and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig and Greg Zaverucha
-
2017/278 ( PDF )
- New Observations on Invariant Subspace Attack
- Yunwen Liu and Vincent Rijmen
-
2017/277 ( PDF )
- Minimizing the Complexity of Goldreich's Pseudorandom Generator
- Alex Lombardi and Vinod Vaikuntanathan
-
2017/276 ( PDF )
- Obfuscating Compute-and-Compare Programs under LWE
- Daniel Wichs and Giorgos Zirdelis
-
2017/275 ( PDF )
- Simple Generic Constructions of Succinct Functional Encryption
- Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
-
2017/274 ( PDF )
- Lockable Obfuscation
- Rishab Goyal and Venkata Koppula and Brent Waters
-
2017/273 ( PDF )
- Two-Round and Non-interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles
- Huijia Lin and Rafael Pass and Pratik Soni
-
2017/272 ( PDF )
- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA
- Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht
-
2017/271 ( PDF )
- High Order Masking of Look-up Tables with Common Shares
- Jean-Sebastien Coron and Franck Rondepierre and Rina Zeitoun
-
2017/270 ( PDF )
- Rational Proofs against Rational Verifiers
- Keita Inasawa and Kenji Yasunaga
-
2017/269 ( PDF )
- Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
- Okan Seker and Thomas Eisenbarth and Rainer Steinwandt
-
2017/268 ( PDF )
- Efficient Sanitizable Signatures without Random Oracles
- Russell W. F. Lai and Tao Zhang and Sherman S. M. Chow and Dominique Schröder
-
2017/267 ( PDF )
- A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
- Seungkwang Lee
-
2017/266 ( PDF )
- From Higher-Order Differentials to Polytopic Cryptanalysis
- Tyge Tiessen
-
2017/265 ( PDF )
- Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation
- Kamalesh Acharya and Ratna Dutta
-
2017/264 ( PDF )
- How to (pre-)compute a ladder
- Thomaz Oliveira and Julio López and Hüseyin Hışıl and Francisco Rodríguez-Henríquez
-
2017/263 ( PDF )
- Bivariate attacks and confusion coefficients
- Sylvain Guilley and Liran Lerman
-
2017/262 ( PDF )
- When It’s All Just Too Much: Outsourcing MPC-Preprocessing
- Peter Scholl and Nigel P. Smart and Tim Wood
-
2017/261 ( PDF )
- Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
- Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
-
2017/260 ( PDF )
- Message-Recovery MACs and Verification-Unskippable AE
- Shoichi Hirose and Yu Sasaki and Kan Yasuda
-
2017/259 ( PDF )
- Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
- Daniele Micciancio and Michael Walter
-
2017/258 ( PDF )
- Pseudorandomness of Ring-LWE for Any Ring and Modulus
- Chris Peikert and Oded Regev and Noah Stephens-Davidowitz
-
2017/257 ( PDF )
- Threshold Fully Homomorphic Encryption
- Aayush Jain, Peter M. R. Rasmussen, Amit Sahai
-
2017/256 ( PDF )
- A Framework for Universally Composable Diffie-Hellman Key Exchange
- Ralf Kuesters and Daniel Rausch
-
2017/255 ( PDF )
- New and Old Limits for AES Known-Key Distinguishers
- Lorenzo Grassi and Christian Rechberger
-
2017/254 ( PDF )
- Towards Easy Key Enumeration
- Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou and Juan Ai
-
2017/253 ( PDF )
- A Modular Security Analysis of EAP and IEEE 802.11
- Chris Brzuska and Håkon Jacobsen
-
2017/252 ( PDF )
- High-Order Conversion From Boolean to Arithmetic Masking
- Jean-Sebastien Coron
-
2017/251 ( PDF )
- A Lattice-Based Universal Thresholdizer for Cryptographic Systems
- Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim
-
2017/250 ( PDF )
- Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
- Huijia Lin and Stefano Tessaro
-
2017/249 ( PDF )
- Proof of Luck: an Efficient Blockchain Consensus Protocol
- Mitar Milutinovic and Warren He and Howard Wu and Maxinder Kanwal
-
2017/248 ( PDF )
- IPcore implementation susceptibility: A case study of Low latency ciphers
- Dillibabu Shanmugam and Ravikumar Selvam and Suganya Annadurai
-
2017/247 ( PDF )
- Efficient Multivariate Ring Signature Schemes
- Mohamed Saied Emam Mohamed and Albrecht Petzoldt
-
2017/246 ( PDF )
- An Analysis of FV Parameters Impact Towards its Hardware Acceleration
- Joël Cathébras and Alexandre Carbon and Renaud Sirdey and Nicolas Ventroux
-
2017/245 ( PDF )
- Cache-Base Application Detection in the Cloud Using Machine Learning
- Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar
-
2017/244 ( PDF )
- Model-counting Approaches For Nonlinear Numerical Constraints
- Mateus Borges and Quoc-Sang Phan and Antonio Filieri and Corina S. Păsăreanu
-
2017/243 ( PDF )
- Key Recovery: Inert and Public
- Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines
-
2017/242 ( PDF )
- Full accounting for verifiable outsourcing
- Riad S. Wahby and Ye Ji and Andrew J. Blumberg and abhi shelat and Justin Thaler and Michael Walfish and Thomas Wies
-
2017/241 ( PDF )
- Forkable Strings are Rare
- Alexander Russell and Cristopher Moore and Aggelos Kiayias and Saad Quader
-
2017/240 ( PDF )
- Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
- Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu
-
2017/239 ( PDF )
- Boosting Authenticated Encryption Robustness With Minimal Modifications
- Tomer Ashur and Orr Dunkelman and Atul Luykx
-
2017/238 ( PDF )
- Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin
- Tim Ruffing and Pedro Moreno-Sanchez
-
2017/237 ( PDF )
- Switch Commitments: A Safety Switch for Confidential Transactions
- Tim Ruffing and Giulio Malavolta
-
2017/236 ( PDF )
- A new rank metric codes based encryption scheme
- Pierre Loidreau
-
2017/235 ( PDF )
- Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption
- Isheeta Nargis
-
2017/234 ( PDF )
- Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
- Kevin Milner and Cas Cremers and Jiangshan Yu and Mark Ryan
-
2017/233 ( PDF )
- Simplifying Design and Analysis of Complex Predicate Encryption Schemes
- Shashank Agrawal and Melissa Chase
-
2017/232 ( PDF )
- TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
- Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou
-
2017/231 ( PDF )
- EHE: nonce misuse-resistant message authentication
- Sergey Agievich
-
2017/230 ( PDF )
- Smart Contracts Make Bitcoin Mining Pools Vulnerable
- Yaron Velner and Jason Teutsch and Loi Luu
-
2017/229 ( PDF )
- Multi-Prover Interactive Proofs: Unsound Foundations
- Claude Crépeau and Nan Yang
-
2017/228 ( PDF )
- Efficient and Secure Outsourcing of Genomic Data Storage
- João Sá Sousa and Cédric Lefebvre and Zhicong Huang and Jean Louis Raisaro and Carlos Aguilar and Marc-Olivier Killijian and Jean-Pierre Hubaux
-
2017/227 ( PDF )
- Towards Shared Ownership in the Cloud
- Hubert Ritzdorf and Claudio Soriente and Ghassan O. Karame and Srdjan Marinovic and Damian Gruber and Srdjan Capkun
-
2017/226 ( PDF )
- Faster LEGO-based Secure Computation without Homomorphic Commitments
- Ruiyu Zhu and Yan Huang
-
2017/225 ( PDF )
- Bandwidth Hard Functions for ASIC Resistance
- Ling Ren and Srinivas Devadas
-
2017/224 ( PDF )
- Simple Encrypted Arithmetic Library - SEAL v2.1
- Hao Chen and Kim Laine and Rachel Player
-
2017/223 ( PDF )
- 0-RTT Key Exchange with Full Forward Secrecy
- Felix Günther and Britta Hale and Tibor Jager and Sebastian Lauer
-
2017/222 ( PDF )
- A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
- Nizamud Dina, Arif Iqbal Umar, Abdul Waheed, Noor ul Amin
-
2017/221 ( PDF )
- A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE
- Florian Göpfert and Christine van Vredendaal and Thomas Wunderer
-
2017/220 ( PDF )
- Cryptanalysis of PMACx, PMAC2x, and SIVx
- Kazuhiko Minematsu and Tetsu Iwata
-
2017/219 ( PDF )
- Attribute-Based Encryption from Identity-Based Encryption
- Chun-I Fan and Yi-Fan Tseng and Chih-Wen Lin
-
2017/218 ( PDF )
- Repeated Games for Generating Randomness in Encryption
- Kenji Yasunaga and Kosuke Yuzawa
-
2017/217 ( PDF )
- Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
- Kuo-Hui Yeh
-
2017/216 ( PDF )
- SCRAPE: Scalable Randomness Attested by Public Entities
- Ignacio Cascudo and Bernardo David
-
2017/215 ( PDF )
- SEVDSI: Secure, Efficient and Verifiable Data Set Intersection
- Ozgur Oksuz, Iraklis Leontiadis, Sixia Chen, Alexander Russell, Qiang Tang, and Bing Wang
-
2017/214 ( PDF )
- Low Cost Constant Round MPC Combining BMR and Oblivious Transfer
- Carmit Hazay and Peter Scholl and Eduardo Soria-Vazquez
-
2017/213 ( PDF )
- Quantum Information Set Decoding Algorithms
- Ghazal Kachigar and Jean-Pierre Tillich
-
2017/212 ( PDF )
- Montgomery curves and their arithmetic: The case of large characteristic fields
- Craig Costello and Benjamin Smith
-
2017/211 ( PDF )
- Multi-level Access in Searchable Symmetric Encryption
- James Alderman and Keith M. Martin and Sarah Louise Renwick
-
2017/210 ( PDF )
- Public Key Cryptosystems with Noisy Secret Keys
- Charles Herder and Benjamin Fuller and Marten van Dijk and Srinivas Devadas
-
2017/209 ( PDF )
- Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
- Qipeng Liu and Mark Zhandry
-
2017/208 ( PDF )
- SoK: Security Models for Pseudo-Random Number Generators
- Sylvain Ruhault
-
2017/207 ( PDF )
- Private Queries on Encrypted Genomic Data
- Gizem S Cetin and Hao Chen and Kim Laine and Kristin Lauter and Peter Rindal and Yuhou Xia
-
2017/206 ( PDF )
- Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
- Yongge Wang
-
2017/205 ( PDF )
- ZETA: Towards Tagless Authenticated Encryption
- Anindya Shankar Bhandari and Dipanwita Roy Chowdhury
-
2017/204 ( PDF )
- Linear Cryptanalysis Using Low-bias Linear Approximations
- Tomer Ashur, Daniël Bodden, and Orr Dunkelman
-
2017/203 ( PDF )
- Proofs of Useful Work
- Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
-
2017/202 ( PDF )
- Average-Case Fine-Grained Hardness
- Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
-
2017/201 ( PDF )
- Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control
- Gabriel Kaptchuk and Ian Miers and Matthew Green
-
2017/200 ( PDF )
- Anonymous Attestation with Subverted TPMs
- Jan Camenisch and Manu Drijvers and Anja Lehmann
-
2017/199 ( PDF )
- Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme
- Dustin Moody and Ray Perlner and Daniel Smith-Tone
-
2017/198 ( PDF )
- FHE with Recursive Ciphertext
- Masahiro Yagisawa
-
2017/197 ( PDF )
- A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group
- Wenying Zhang, Zhaohui Xing and Keqin Feng
-
2017/196 ( PDF )
- Attribute-based concurrent signatures
- BaoHong Li, Guoqing Xu and Yinliang Zhao
-
2017/195 ( PDF )
- Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
- Chaoyun Li and Qingju Wang
-
2017/194 ( PDF )
- Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2)
- Andrea Visconti and Chiara Valentina Schiavo and René Peralta
-
2017/193 ( PDF )
- SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
- Shuwen Deng and Doğuhan Gümüşoğlu and Wenjie Xiong and Y. Serhan Gener and Onur Demir and Jakub Szefer
-
2017/192 ( -- withdrawn -- )
- Improved Hybrid Consensus Scheme with Privacy-preserving Property
- Shuyang Tang and Zhiqiang Liu and Zhen Liu and Yu Long and Shengli Liu
-
2017/191 ( PDF )
- CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks
- David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun
-
2017/190 ( PDF )
- The first collision for full SHA-1
- Marc Stevens and Elie Bursztein and Pierre Karpman and Ange Albertini and Yarik Markov
-
2017/189 ( PDF )
- Global-Scale Secure Multiparty Computation
- Xiao Wang and Samuel Ranellucci and Jonathan Katz
-
2017/188 ( PDF )
- Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer
- Wenying Zhang and Vincent Rijmen
-
2017/187 ( PDF )
- The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives
- H. Gopalakrishna Gadiyar and R. Padma
-
2017/186 ( PDF )
- A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies
- Youngho Yoo and Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev
-
2017/185 ( PDF )
- A Virtual Wiretap Channel for Secure MessageTransmission
- Setareh Sharifian, and Reihaneh Safavi-Naini, and Fuchun Lin
-
2017/184 ( PDF )
- Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
- Guillaume Endignoux, Damian Vizár
-
2017/183 ( PDF )
- Analysis of Software Countermeasures for Whitebox Encryption
- Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Martin Bjerregaard Jepsen
-
2017/182 ( PDF )
- The Approximate $k$-List Problem
- Leif Both and Alexander May
-
2017/181 ( PDF )
- New techniques for trail bounds and application to differential trails in Keccak
- Silvia Mella and Joan Daemen and Gilles Van Assche
-
2017/180 ( PDF )
- Robust Synchronous P2P Primitives Using SGX Enclaves
- Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang
-
2017/179 ( PDF )
- REM: Resource-Efficient Mining for Blockchains
- Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse
-
2017/178 ( PDF )
- Optimal Differential Trails in SIMON-like Ciphers
- Zhengbin Liu and Yongqiang Li and Mingsheng Wang
-
2017/177 ( PDF )
- Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets
- Navid Nasr Esfahani, Ian Goldberg and D. R. Stinson
-
2017/176 ( PDF )
- Probabilistically Checkable Proofs of Proximity with Zero-Knowledge
- Yuval Ishai and Mor Weiss
-
2017/175 ( PDF )
- Analysis of Burn-in period for RC4 State Transition
- Goutam Paul and Souvik Ray
-
2017/174 ( PDF )
- Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes
- Ruiyu Zhu and Yan Huang
-
2017/173 ( PDF )
- Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
- Marc Stevens and Dan Shumow
-
2017/172 ( PDF )
- On The Exact Security of Message Authentication Using Pseudorandom Functions
- Ashwin Jha and Avradip Mandal and Mridul Nandi
-
2017/171 ( PDF )
- Quantum Key Search with Side Channel Advice
- Daniel P. Martin and Ashley Montanaro and Elisabeth Oswald and Dan Shepherd
-
2017/170 ( PDF )
- Error-free protection of EC point multiplication by modular extension
- Martin Seysen
-
2017/169 ( PDF )
- UFace: Your Universal Password That No One Can See
- Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
-
2017/168 ( PDF )
- AES-GCM-SIV: Specification and Analysis
- Shay Gueron and Adam Langley and Yehuda Lindell
-
2017/167 ( PDF )
- Cloud Storage File Recoverability
- Christian A. Gorke and Christian Janson and Frederik Armknecht and Carlos Cid
-
2017/166 ( PDF )
- A roadmap to fully homomorphic elections: Stronger security, better verifiability
- Kristian Gjøsteen and Martin Strand
-
2017/165 ( PDF )
- SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
- Dhiman Saha and Sukhendu Kuila and Dipanwita Roy Chowdhury
-
2017/164 ( PDF )
- Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
- Benny Applebaum and Barak Arkis and Pavel Raykov and Prashant Nalini Vasudevan
-
2017/163 ( PDF )
- Homomorphic Encryption without Gaussian Noise
- Anamaria Costache and Nigel P. Smart
-
2017/162 ( PDF )
- Analysis of AES, SKINNY, and Others with Constraint Programming
- Siwei Sun and David Gerault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu
-
2017/161 ( PDF )
- Security Notions for Bidirectional Channels
- Giorgia Azzurra Marson and Bertram Poettering
-
2017/160 ( PDF )
- Conditional Cube Attack on Round-Reduced ASCON
- Zheng Li and Xiaoyang Dong and Xiaoyun Wang
-
2017/159 ( PDF )
- Cube-like Attack on Round-Reduced Initialization of Ketje Sr
- Xiaoyang Dong and Zheng Li and Xiaoyun Wang and Ling Qin
-
2017/158 ( PDF )
- Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy
- Martin Potthast and Christian Forler and Eik List and Stefan Lucks
-
2017/157 ( PDF )
- Detecting General Algebraic Manipulation Attacks
- Kim Ramchen
-
2017/156 ( PDF )
- Trust Is Risk: A Decentralized Financial Trust Platform
- Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros
-
2017/155 ( PDF )
- Random Sampling Revisited: Lattice Enumeration with Discrete Pruning
- Yoshinori Aono and Phong Q. Nguyen
-
2017/154 ( PDF )
- Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
- Thorsten Kranz and Friedrich Wiemer and Gregor Leander
-
2017/153 ( PDF )
- Storage Efficient Substring Searchable Symmetric Encryption
- Iraklis Leontiadis and Ming Li
-
2017/152 ( PDF )
- Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
- Fermi Ma and Mark Zhandry
-
2017/151 ( PDF )
- Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
- Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay
-
2017/150 ( PDF )
- Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
- Elette Boyle and Niv Gilboa and Yuval Ishai
-
2017/149 ( PDF )
- Bitcoin as a Transaction Ledger: A Composable Treatment
- Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas
-
2017/148 ( PDF )
- Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data
- Olivier Sanders and Cristina Onete and Pierre-Alain Fouque
-
2017/147 ( PDF )
- Ad Hoc PSM Protocols: Secure Computation Without Coordination
- Amos Beimel and Yuval Ishai and Eyal Kushilevitz
-
2017/146 ( PDF )
- Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
- Mohammad Hajiabadi and Bruce M. Kapron
-
2017/145 ( PDF )
- The Multi-User Security of Double Encryption
- Viet Tung Hoang and Stefano Tessaro
-
2017/144 ( PDF )
- Privacy-Preserving Search of Similar Patients in Genomic Data
- Gilad Asharov and Shai Halevi and Yehuda Lindell and Tal Rabin
-
2017/143 ( PDF )
- Constraint-hiding Constrained PRFs for NC1 from LWE
- Ran Canetti and Yilei Chen
-
2017/142 ( PDF )
- Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme
- Jean-François Biasse and Thomas Espitau and Pierre-Alain Fouque and Alexandre Gélin and Paul Kirchner
-
2017/141 ( PDF )
- Partitioned Group Password-Based Authenticated Key Exchange
- Dario Fiore and Maria Isabel Gonzalez Vasco and Claudio Soriente
-
2017/140 ( PDF )
- Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
- Nina Bindel and Johannes Buchmann and Florian Göpfert and Markus Schmidt
-
2017/139 ( PDF )
- Revisiting AES Related-Key Differential Attacks with Constraint Programming
- David Gérault and Pascal Lafourcade and Marine Minier and Christine Solnon
-
2017/138 ( PDF )
- How (not) to Use Welch's T-test in Side-Channel Security Evaluations
- François-Xavier Standaert
-
2017/137 ( PDF )
- Modifying an Enciphering Scheme after Deployment
- Paul Grubbs and Thomas Ristenpart and Yuval Yarom
-
2017/136 ( PDF )
- Dispersed Cryptography and the Quotient Ring Transform
- Anna Johnston
-
2017/135 ( PDF )
- Hashing Garbled Circuits for Free
- Xiong Fan and Chaya Ganesh and Vladimir Kolesnikov
-
2017/134 ( PDF )
- A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes
- Ryan Stanley-Oakes
-
2017/133 ( PDF )
- Composable and Robust Outsourced Storage
- Christian Badertscher and Ueli Maurer
-
2017/132 ( PDF )
- Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
- Roel Peeters, Jens Hermans and Aysajan Abidin
-
2017/131 ( PDF )
- A Practical Multivariate Blind Signature Scheme
- Albrecht Petzoldt and Alan Szepieniec and Mohamed Saied Emam Mohamed
-
2017/130 ( PDF )
- Topology-Hiding Computation Beyond Logarithmic Diameter
- Adi Akavia and Tal Moran
-
2017/129 ( PDF )
- Sublinear Zero-Knowledge Arguments for RAM Programs
- Payman Mohassel and Mike Rosulek and Alessandra Scafuro
-
2017/128 ( PDF )
- New Collision Attacks on Round-Reduced Keccak
- Kexin Qiao and Ling Song and Meicheng Liu and Jian Guo
-
2017/127 ( PDF )
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
- Prabhanjan Ananth and Aayush Jain and Amit Sahai
-
2017/126 ( PDF )
- Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
- Seny Kamara and Tarik Moataz
-
2017/125 ( PDF )
- Non-Interactive Secure 2PC in the Offline/Online and Batch Settings
- Payman Mohassel and Mike Rosulek
-
2017/124 ( PDF )
- On the Exact Round Complexity of Self-Composable Two-Party Computation
- Sanjam Garg and Susumu Kiyoshima and Omkant Pandey
-
2017/123 ( PDF )
- Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
- Rishab Goyal and Venkata Koppula and Brent Waters
-
2017/122 ( PDF )
- One-Shot Verifiable Encryption from Lattices
- Vadim Lyubashevsky and Gregory Neven
-
2017/121 ( PDF )
- Twisted $\mu_4$-normal form for elliptic curves
- David Kohel
-
2017/120 ( PDF )
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
- Rishab Goyal and Venkata Koppula and Brent Waters
-
2017/119 ( PDF )
- Quantum Authentication with Key Recycling
- Christopher Portmann
-
2017/118 ( PDF )
- A New Structural-Differential Property of 5-Round AES
- Lorenzo Grassi and Christian Rechberger and and Sondre Rønjom
-
2017/117 ( PDF )
- The SM9 Cryptographic Schemes
- Zhaohui Cheng
-
2017/116 ( PDF )
- Masking Proofs are Tight (and How to Exploit it in Security Evaluations)
- Vincent Grosso and François-Xavier Standaert
-
2017/115 ( PDF )
- An efficient self-blindable attribute-based credential scheme
- Sietse Ringers and Eric Verheul and Jaap-Henk Hoepman
-
2017/114 ( PDF )
- Zero-Knowledge Proofs of Proximity
- Itay Berman and Ron D. Rothblum and Vinod Vaikuntanathan
-
2017/113 ( PDF )
- Algebraic Fault Analysis of SHA-3
- Pei Luo and Konstantinos Athanasiou and Yunsi Fei and Thomas Wahl
-
2017/112 ( PDF )
- Zero-Knowledge Proxy Re-Identification Revisited
- Xavier Bultel and Pascal Lafourcade
-
2017/111 ( PDF )
- EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves
- Jonathan Burns and Daniel Moore and Katrina Ray and Ryan Speers and Brian Vohaska
-
2017/110 ( PDF )
- A Smart Contract for Boardroom Voting with Maximum Voter Privacy
- Patrick McCorry and Siamak F. Shahandashti and Feng Hao
-
2017/109 ( PDF )
- Unilaterally-Authenticated Key Exchange
- Yevgeniy Dodis and Dario Fiore
-
2017/108 ( PDF )
- Photonic Side Channel Attacks Against RSA
- Elad Carmon and Jean-Pierre Seifert and Avishai Wool
-
2017/107 ( PDF )
- Secure Logging with Crash Tolerance
- Erik-Oliver Blass and Guevara Noubir
-
2017/106 ( PDF )
- $\mu$chain: How to Forget without Hard Forks
- Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
-
2017/105 ( PDF )
- A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem
- Ling Yang and Fuyang Fang and Xianhui Lu and Wen-Tao Zhu and Qiongxiao Wang and Shen Yan and Shiran Pan
-
2017/104 ( PDF )
- Implementing BP-Obfuscation Using Graph-Induced Encoding
- Shai Halevi and Tzipora Halevi and Victor Shoup and Noah Stephens-Davidowitz
-
2017/103 ( PDF )
- Reconciling d+1 Masking in Hardware and Software
- Hannes Gross and Stefan Mangard
-
2017/102 ( PDF )
- Quantum Authentication and Encryption with Key Recycling
- Serge Fehr and Louis Salvail
-
2017/101 ( PDF )
- Optimizing Implementations of Lightweight Building Blocks
- Jérémy Jean and Thomas Peyrin and Siang Meng Sim
-
2017/100 ( PDF )
- Private Puncturable PRFs From Standard Lattice Assumptions
- Dan Boneh and Sam Kim and Hart Montgomery
-
2017/099 ( PDF )
- Making NSEC5 Practical for DNSSEC
- Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan Včelák and Leonid Reyzin and Sharon Goldberg
-
2017/098 ( PDF )
- Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions
- Vanesa Daza and Nikolaos Makriyannis
-
2017/097 ( PDF )
- Boolean functions with restricted input and their robustness; application to the FLIP cipher
- Claude Carlet and Pierrick Méaux and Yann Rotella
-
2017/096 ( PDF )
- Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
- Shota Yamada
-
2017/095 ( PDF )
- Attacks on Secure Logging Schemes
- Gunnar Hartung
-
2017/094 ( PDF )
- Quantum Tokens for Digital Signatures
- Shalev Ben-David and Or Sattath
-
2017/093 ( PDF )
- On new multivariate cryptosystems based on hidden Eulerian equations over finite fields
- Vasyl Ustimenko
-
2017/092 ( PDF )
- Small CRT-Exponent RSA Revisited
- Atsushi Takayasu and Yao Lu and Liqiang Peng
-
2017/091 ( PDF )
- Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme
- Vincent Herbert and Caroline Fontaine
-
2017/090 ( PDF )
- Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
- Saiyu Qi and Yichen Li and Yuanqing Zheng and Yong Qi
-
2017/089 ( PDF )
- On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
- Yuri Borissov, and Peter Boyvalenkov, and Robert Tsenkov
-
2017/088 ( PDF )
- A Differential Fault Attack on Plantlet
- Subhamoy Maitra, Akhilesh Siddhanti
-
2017/087 ( PDF )
- Cryptanalysis of full round Fruit
- Sabyasachi Dey and Santanu Sarkar
-
2017/086 ( PDF )
- Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
- David Derler and Sebastian Ramacher and Daniel Slamanig
-
2017/085 ( PDF )
- Information Security Applications of Bit-Mixers
- Laszlo Hars
-
2017/084 ( PDF )
- Hardware Bit-Mixers
- Laszlo Hars
-
2017/083 ( PDF )
- Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders
- Anna Johnston
-
2017/082 ( PDF )
- Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
- Marc Fischlin and Felix Günther
-
2017/081 ( PDF )
- Estonian Voting Verification Mechanism Revisited Again
- Ivo Kubjas and Tiit Pikma and Jan Willemson
-
2017/080 ( PDF )
- From Minicrypt to Obfustopia via Private-Key Functional Encryption
- Ilan Komargodski and Gil Segev
-
2017/079 ( PDF )
- Faster Bootstrapping of FHE over the Integers
- Jung Hee Cheon and Kyoohyung Han and Duhyeong Kim
-
2017/078 ( PDF )
- LPN Decoded
- Andre Esser and Robert Kübler and Alexander May
-
2017/077 ( PDF )
- Quantum algorithms for computing short discrete logarithms and factoring RSA integers
- Martin Ekerå and Johan Håstad
-
2017/076 ( PDF )
- DFA on LS-Designs with a Practical Implementation on SCREAM (extended version)
- Benjamin Lac and Anne Canteaut and Jacques Fournier and Renaud Sirdey
-
2017/075 ( PDF )
- A First DFA on PRIDE: from Theory to Practice (extended version)
- Benjamin Lac and Marc Beunardeau and Anne Canteaut and Jacques Fournier and Renaud Sirdey
-
2017/074 ( PDF )
- Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
- Joo-Im Kim and Ji Won Yoon
-
2017/073 ( PDF )
- Visual Honey Encryption: Application to Steganography
- Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee and Kwangsu Lee
-
2017/072 ( PDF )
- How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes
- Carmen Kempka and Ryo Kikuchi and Koutarou Suzuki
-
2017/071 ( PDF )
- Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
- Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
-
2017/070 ( PDF )
- Symbolic Models for Isolated Execution Environments
- Charlie Jacomme and Steve Kremer and Guillaume Scerri
-
2017/069 ( PDF )
- The Exact Security of PMAC
- Peter Gaži and Krzysztof Pietrzak and Michal Rybár
-
2017/068 ( PDF )
- Authenticated Encryption in the Face of Protocol and Side Channel Leakage
- Guy Barwell and Daniel P. Martin and Elisabeth Oswald and Martijn Stam
-
2017/067 ( PDF )
- Computation of a 768-bit prime field discrete logarithm
- Thorsten Kleinjung and Claus Diem and Arjen K. Lenstra and Christine Priplata and Colin Stahlke
-
2017/066 ( PDF )
- Subring Homomorphic Encryption
- Seiko Arita and Sari Handa
-
2017/065 ( PDF )
- FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
- Daniel Benarroch and Zvika Brakerski and Tancrède Lepoint
-
2017/064 ( PDF )
- Fast Montgomery-like Square Root Computation for All Trinomials
- Yin Li and Yu Zhang
-
2017/063 ( PDF )
- Optimal Extension Protocols for Byzantine Broadcast and Agreement
- Chaya Ganesh and Arpita Patra
-
2017/062 ( PDF )
- Efficient Maliciously Secure Two Party Computation for Mixed Programs
- Arash Afshar and Payman Mohassel and Mike Rosulek
-
2017/061 ( PDF )
- Continuous Collision Resistance and its Applications
- Tibor Jager and Rafael Kurek
-
2017/060 ( PDF )
- Zero Round-Trip Time for the Extended Access Control Protocol
- Jacqueline Brendel and Marc Fischlin
-
2017/059 ( PDF )
- Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext
- Kamalesh Acharya and Ratna Dutta
-
2017/058 ( PDF )
- WalnutDSA(TM): A Quantum Resistant Group Theoretic Digital Signature Algorithm
- Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
-
2017/057 ( PDF )
- Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card
- Mathias Wagner and Stefan Heyse
-
2017/056 ( PDF )
- Verifiable Classroom Voting in Practice
- Feng Hao and Dylan Clarke and Brian Randell and Siamak F. Shahandashti
-
2017/055 ( PDF )
- A Probabilistic Baby-Step Giant-Step Algorithm
- Prabhat Kushwaha and Ayan Mahalanobis
-
2017/054 ( PDF )
- Attribute-Based Encryption Implies Identity-Based Encryption
- Javier Herranz
-
2017/053 ( PDF )
- Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem
- Dimitar Jetchev and Benjamin Wesolowski
-
2017/052 ( PDF )
- A short note on the security of Round-Robin Differential Phase-Shift QKD
- Boris Skoric
-
2017/051 ( PDF )
- A note on VRFs from Verifiable Functional Encryption
- Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai
-
2017/050 ( PDF )
- An Obfuscating Compiler
- Peter T. Breuer
-
2017/049 ( PDF )
- LARA - A Design Concept for Lattice-based Encryption
- El Bansarkhani Rachid
-
2017/048 ( PDF )
- ROTE: Rollback Protection for Trusted Execution
- Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun
-
2017/047 ( PDF )
- On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
- Martin R. Albrecht
-
2017/046 ( PDF )
- Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
- Matthieu Giraud and Alexandre Anzala-Yamajako and Olivier Bernard and Pascal Lafourcade
-
2017/045 ( PDF )
- Efficient Round-Optimal Blind Signatures in the Standard Model
- Essam Ghadafi
-
2017/044 ( PDF )
- Anonymous contribution of data
- Matthew McKague and David Eyers
-
2017/043 ( PDF )
- Accumulators with Applications to Anonymity-Preserving Revocation
- Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov
-
2017/042 ( PDF )
- Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient
- Yuanxi Dai and Yannick Seurin and John Steinberger and Aishwarya Thiruvengadam
-
2017/041 ( PDF )
- Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy
- Yongge Wang and Qutaibah m. Malluhi
-
2017/040 ( PDF )
- Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions
- Aggelos Kiayias and Feng-Hao Liu and Yiannis Tselekounis
-
2017/039 ( PDF )
- SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version)
- Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
-
2017/038 ( PDF )
- CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
- Fabrice Benhamouda and Florian Bourse and Helger Lipmaa
-
2017/037 ( PDF )
- Double-base scalar multiplication revisited
- Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
-
2017/036 ( PDF )
- Low-Complexity Cryptographic Hash Functions
- Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan
-
2017/035 ( PDF )
- Privacy-Preserving Classification on Deep Neural Network
- Hervé Chabanne and Amaury de Wargny and Jonathan Milgram and Constance Morel and Emmanuel Prouff
-
2017/034 ( PDF )
- Analysis of the NORX Core Permutation
- Alex Biryukov and Aleksei Udovenko and Vesselin Velichkov
-
2017/033 ( PDF )
- Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
- Peter Pessl
-
2017/032 ( PDF )
- Cryptanalysis of GlobalPlatform Secure Channel Protocols
- Mohamed Sabt and Jacques Traoré
-
2017/031 ( PDF )
- Honey Encryption for Language
- Marc Beunardeau and Houda Ferradi and Rémi Géraud and David Naccache
-
2017/030 ( PDF )
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
- Xiao Wang and Samuel Ranellucci and Jonathan Katz
-
2017/029 ( PDF )
- Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
- Gene Itkis and Emily Shen and Mayank Varia and David Wilson and Arkady Yerukhimovich
-
2017/027 ( PDF )
- Scalable Multi-Party Private Set-Intersection
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2017/026 ( PDF )
- Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
- Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
-
2017/025 ( PDF )
- Improved Structure Preserving Signatures under Standard Bilinear Assumptions
- Charanjit S. Jutla and Arnab Roy
-
2017/024 ( PDF )
- Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases
- Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann
-
2017/023 ( PDF )
- Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
- Nuttapong Attrapadung
-
2017/022 ( PDF )
- Privacy for Distributed Databases via (Un)linkable Pseudonyms
- Jan Camenisch and Anja Lehmann
-
2017/021 ( PDF )
- A Generic Approach to Constructing and Proving Verifiable Random Functions
- Rishab Goyal and Susan Hohenberger and Venkata Koppula and Brent Waters
-
2017/020 ( PDF )
- concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
- Olivier Levillain and Maxence Tury and Nicolas Vivet
-
2017/019 ( PDF )
- SmartPool: Practical Decentralized Pooled Mining
- Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena
-
2017/018 ( PDF )
- Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs
- Nir Bitansky
-
2017/017 ( PDF )
- Improved Algorithms for the Approximate k-List Problem in Euclidean Norm
- Gottfried Herold and Elena Kirshanova
-
2017/016 ( PDF )
- Provable Security of Substitution-Permutation Networks
- Yevgeniy Dodis and Jonathan Katz and John Steinberger and Aishwarya Thiruvengadam and Zhe Zhang
-
2017/015 ( PDF )
- Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes
- Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
-
2017/014 ( PDF )
- ORAMs in a Quantum World
- Tommaso Gagliardoni and Nikolaos P. Karvelas and Stefan Katzenbeisser
-
2017/013 ( PDF )
- Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
- Meilof Veeningen
-
2017/012 ( PDF )
- Universal Samplers with Fast Verification
- Venkata Koppula and Andrew Poelstra and Brent Waters
-
2017/011 ( PDF )
- Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
- Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
-
2017/010 ( PDF )
- Circuit-Private Multi-Key FHE
- Wutichai Chongchitmate and Rafail Ostrovsky
-
2017/009 ( PDF )
- Access Control Encryption for Equality, Comparison, and More
- Georg Fuchsbauer and Romain Gay and Lucas Kowalczyk and Claudio Orlandi
-
2017/007 ( PDF )
- Algebraic Attack Efficiency versus S-box Representation
- Hossein Arabnezhad-Khanoki and Babak Sadeghiyan and Josef Pieprzyk
-
2017/003 ( PDF )
- The STROBE protocol framework
- Mike Hamburg
-
2017/002 ( -- withdrawn -- )
- Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption
- Ping Zhang, Honggang Hu, and Peng Wang
-
2016/1196 ( PDF )
- MASCAT: Stopping Microarchitectural Attacks Before Execution
- Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2016/1195 ( PDF )
- Constant-Time Callees with Variable-Time Callers
- Cesar Pereida García and Billy Bob Brumley
-
2016/1193 ( PDF )
- Superscalar Encrypted RISC: Measure of a Secret Computer
- Peter T. Breuer and Jonathan P. Bowen
-
2016/1191 ( PDF )
- On the Security of Practical and Complete Homomorphic Encrypted Computation
- P.T. Breuer and J.P. Bowen
-
2016/1189 ( PDF )
- On the Bit Security of Elliptic Curve Diffie--Hellman
- Barak Shani
-
2016/1186 ( PDF )
- On the Complexity of Breaking Pseudoentropy
- Maciej Skorski
-
2016/1176 ( PDF )
- Leakage of Signal function with reused keys in RLWE key exchange
- Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott Fluhrer and Xiaodong Lin
-
2016/1174 ( PDF )
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
- Eik List and Mridul Nandi
-
2016/1173 ( PDF )
- Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring
- Lijing Zhou, Licheng Wang and Yiru Sun
-
2016/1169 ( PDF )
- LWE from Non-commutative Group Rings
- Qi Cheng and Jun Zhang and Jincheng Zhuang
-
2016/1168 ( -- withdrawn -- )
- Generic Zero-Knowledge and Multivariate Quadratic Systems
- Alan Szepieniec and Bart Preneel
-
2016/1159 ( PDF )
- SPECTRE: A Fast and Scalable Cryptocurrency Protocol
- Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar
-
2016/1156 ( PDF )
- Scripting smart contracts for distributed ledger technology
- Pablo Lamela Seijas and Simon Thompson and Darryl McAdams
-
2016/1154 ( PDF )
- Signature Schemes Based On Supersingular Isogeny Problems
- Steven D. Galbraith and Christophe Petit and Javier Silva
-
2016/1152 ( PDF )
- Leak Me If You Can: Does TVLA Reveal Success Rate?
- Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Sikhar Patranabis and Debdeep Mukhopadhyay
-
2016/1150 ( PDF )
- Simple Homomorphisms of Cocks IBE and Applications
- Rio LaVigne
-
2016/1148 ( PDF )
- Splinter: Practical Private Queries on Public Data
- Frank Wang and Catherine Yun and Shafi Goldwasser and Vinod Vaikuntanathan and Matei Zaharia
-
2016/1140 ( PDF )
- Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
- Xiaoyi Li and Kaitai Liang and Zhen Liu and Duncan S. Wong
-
2016/1136 ( PDF )
- Cryptography During the French and American Wars in Vietnam
- Phan Duong Hieu and Neal Koblitz
-
2016/1131 ( PDF )
- New construction of single cycle T-function families
- Shiyi ZHANG and Yongjuan WANG and Guangpu GAO
-
2016/1127 ( PDF )
- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
- Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang
-
2016/1126 ( PDF )
- Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
- Jung Hee Cheon and Duhyeong Kim and Joohee Lee and Yongsoo Song
-
2016/1118 ( PDF )
- Designing Optimal Implementations of Linear Layers (Full Version)
- Ruoxin Zhao and Baofeng Wu and Rui Zhang and Qian Zhang
-
2016/1117 ( PDF )
- Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling
- Joppe W. Bos and Wouter Castryck and and Ilia Iliashenko and Frederik Vercauteren
-
2016/1115 ( PDF )
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef
-
2016/1114 ( PDF )
- Full Disk Encryption: Bridging Theory and Practice
- Louiza Khati and Nicky Mouha and Damien Vergnaud
-
2016/1107 ( PDF )
- Magic Adversaries Versus Individual Reduction: Science Wins Either Way
- Yi Deng
-
2016/1106 ( PDF )
- Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption
- Romain Gay
-
2016/1105 ( PDF )
- Generic Transformations of Predicate Encodings: Constructions and Applications
- Miguel Ambrona and Gilles Barthe and Benedikt Schmidt
-
2016/1100 ( PDF )
- Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors
- Quentin Alamélou and Paul-Edmond Berthier and Stéphane Cauchie and Benjamin Fuller and Philippe Gaborit
-
2016/1099 ( PDF )
- Improved Parameters for the Ring-TESLA Digital Signature Scheme
- Arjun Chopra
-
2016/1096 ( PDF )
- Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
- Huijia Lin
-
2016/1094 ( PDF )
- New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
- Yohei Watanabe and Keita Emura and Jae Hong Seo
-
2016/1092 ( PDF )
- Parametrizations for Families of ECM-friendly curves
- Alexandre Gélin and Thorsten Kleinjung and Arjen K. Lenstra
-
2016/1085 ( PDF )
- Digital Signatures from Symmetric-Key Primitives
- David Derler and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig
-
2016/1084 ( PDF )
- Circuit OPRAM: A Unifying Framework for Statistically and Computationally Secure ORAMs and OPRAMs
- T-H. Hubert Chan and Elaine Shi
-
2016/1079 ( PDF )
- Revisiting the Cubic UOV Signature Scheme
- Dung Hoang Duong and Takanori Yasuda and Albrecht Petzoldt and Yacheng Wang and Tsuyoshi Takagi
-
2016/1071 ( PDF )
- Iron: Functional Encryption using Intel SGX
- Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
-
2016/1070 ( PDF )
- Preventing CLT Attacks on Obfuscation with Linear Overhead
- Rex Fernando and Peter M. R. Rasmussen and Amit Sahai
-
2016/1068 ( PDF )
- On Finding Short Cycles in Cryptographic Algorithms
- Elena Dubrova and Maxim Teslenko
-
2016/1067 ( PDF )
- Scalable Bias-Resistant Distributed Randomness
- Ewa Syta and Philipp Jovanovic and Eleftherios Kokoris Kogias and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Michael J. Fischer and Bryan Ford
-
2016/1063 ( PDF )
- Log-Structure Authenticated Data Storage with Minimal Trust
- Yuzhe Tang and Ju Chen
-
2016/1062 ( PDF )
- Catena: Efficient Non-equivocation via Bitcoin
- Alin Tomescu and Srinivas Devadas
-
2016/1061 ( PDF )
- Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
- Joan Daemen
-
2016/1058 ( PDF )
- Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
- Markku-Juhani O. Saarinen
-
2016/1047 ( PDF )
- IoT Goes Nuclear: Creating a ZigBee Chain Reaction
- Eyal Ronen and Colin O’Flynn and Adi Shamir and Achi-Or Weingarten
-
2016/1043 ( PDF )
- Concurrently Composable Security With Shielded Super-polynomial Simulators
- Brandon Broadnax and Nico Döttling and Gunnar Hartung and Jörn Müller-Quade and Matthias Nagel
-
2016/1042 ( PDF )
- "Oops, I did it again" -- Security of One-Time Signatures under Two-Message Attacks
- Leon Groot Bruinderink and Andreas Hülsing
-
2016/1033 ( PDF )
- Decentralized Anonymous Micropayments
- Alessandro Chiesa and Matthew Green and Jingcheng Liu and Peihan Miao and Ian Miers and Pratyush Mishra
-
2016/1032 ( PDF )
- Efficient Covert Two-Party Computation
- Stanislaw Jarecki
-
2016/1028 ( PDF )
- Ratcheted Encryption and Key Exchange: The Security of Messaging
- Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs
-
2016/1027 ( PDF )
- Formal Abstractions for Attested Execution Secure Processors
- Rafael Pass and Elaine Shi and Florian Tramer
-
2016/1023 ( PDF )
- Constant-Time Higher-Order Boolean-to-Arithmetic Masking
- Michael Hutter and Michael Tunstall
-
2016/1020 ( PDF )
- KDM Security for Identity-Based Encryption: Constructions and Separations
- Yu Chen and Jiang Zhang and Yi Deng and Jinyong Chang
-
2016/1019 ( PDF )
- Faster Homomorphic Evaluation of Discrete Fourier Transforms
- Anamaria Costache and Nigel P. Smart and Srinivas Vivek
-
2016/1015 ( PDF )
- MaxLength Considered Harmful to the RPKI
- Yossi Gilad and Omar Sagga and Sharon Goldberg
-
2016/1010 ( PDF )
- Are We There Yet? On RPKI's Deployment and Security
- Yossi Gilad and Avichai Cohen and Amir Herzberg and Michael Schapira and Haya Shulman
-
2016/1006 ( PDF )
- The Security of NTP’s Datagram Protocol
- Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and Haydn Kennedy and Jonathan Gardner and Sharon Goldberg
-
2016/1005 ( PDF )
- Atomic-AES v2.0
- Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
-
2016/1003 ( PDF )
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
- Daniel Apon and Nico Döttling and Sanjam Garg and Pratyay Mukherjee
-
2016/998 ( PDF )
- Cryptanalyses of Candidate Branching Program Obfuscators
- Yilei Chen and Craig Gentry and Shai Halevi
-
2016/997 ( PDF )
- Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems
- Carsten Baum and Ivan Damgård and Sabine Oechsner and Chris Peikert
-
2016/996 ( PDF )
- Leakage-Resilient and Misuse-Resistant Authenticated Encryption
- Francesco Berti and François Koeune and Olivier Pereira and Thomas Peters and François-Xavier Standaert
-
2016/995 ( PDF )
- Measuring small subgroup attacks against Diffie-Hellman
- Luke Valenta and David Adrian and Antonio Sanso and Shaanan Cohney and Joshua Fried and Marcella Hastings and J. Alex Halderman and Nadia Heninger
-
2016/994 ( PDF )
- Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
- Leonid Reyzin and Dmitry Meshkov and Alexander Chepurnoy and Sasha Ivanov
-
2016/987 ( PDF )
- A Key to Success -- Success Exponents for Side-Channel Distinguishers
- Sylvain Guilley and Annelie Heuser and Olivier Rioul
-
2016/977 ( PDF )
- Side channels in deduplication: trade-offs between leakage and efficiency
- Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Mohsen Toorani
-
2016/975 ( PDF )
- (Universal) Unconditional Verifiability in E-Voting without Trusted Parties
- Gina Gallegos-Garcia and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan
-
2016/964 ( PDF )
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Lorenzo Grassi and Christian Rechberger
-
2016/963 ( PDF )
- Efficient compression of SIDH public keys
- Craig Costello and David Jao and Patrick Longa and Michael Naehrig and Joost Renes and David Urbanik
-
2016/962 ( PDF )
- On Removing Graded Encodings from Functional Encryption
- Nir Bitansky and Huijia Lin and Omer Paneth
-
2016/959 ( PDF )
- Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
- Shashank Agrawal and Venkata Koppula and Brent Waters
-
2016/957 ( PDF )
- Computing generator in cyclotomic integer rings
- Thomas Espitau and Pierre-Alain Fouque and Alexandre Gélin and Paul Kirchner
-
2016/956 ( PDF )
- Two Simple Composition Theorems with H-coefficients
- Jacques Patarin
-
2016/955 ( PDF )
- Constant-deposit multiparty lotteries on Bitcoin
- Massimo Bartoletti and Roberto Zunino
-
2016/953 ( PDF )
- Collusion-Resistant Broadcast Encryption with Tight Reductions and Beyond
- Linfeng Zhou
-
2016/952 ( PDF )
- ISAP -- Towards Side-Channel Secure Authenticated Encryption
- Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer
-
2016/951 ( PDF )
- Revisiting Covert Multiparty Computation
- Geoffroy Couteau
-
2016/950 ( PDF )
- Orthogonalized Lattice Enumeration for Solving SVP
- Zhongxiang Zheng and Xiaoyun Wang and Guangwu Xu and Yang Yu
-
2016/944 ( PDF )
- High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
- Jun Furukawa and Yehuda Lindell and Ariel Nof and Or Weinstein
-
2016/938 ( PDF )
- Kummer for Genus One over Prime Order Fields
- Sabyasachi Karati and Palash Sarkar
-
2016/931 ( PDF )
- Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (Extended Version)
- Jakub Breier and Xiaolu Hou
-
2016/926 ( PDF )
- LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
- Matthias Hamann and Matthias Krause and Willi Meier
-
2016/919 ( PDF )
- Snow White: Provably Secure Proofs of Stake
- Phil Daian and Rafael Pass and Elaine Shi
-
2016/918 ( PDF )
- The Sleepy Model of Consensus
- Rafael Pass and Elaine Shi
-
2016/917 ( PDF )
- Hybrid Consensus: Efficient Consensus in the Permissionless Model
- Rafael Pass and Elaine Shi
-
2016/916 ( PDF )
- FruitChains: A Fair Blockchain
- Rafael Pass and Elaine Shi
-
2016/913 ( PDF )
- Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15
- Boru Gong and Yunlei Zhao
-
2016/912 ( PDF )
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Gilles Barthe and François Dupressoir and Sebastian Faust and Benjamin Grégoire and François-Xavier Standaert and Pierre-Yves Strub
-
2016/907 ( PDF )
- Cut-and-Choose for Garbled RAM
- Peihan Miao
-
2016/899 ( PDF )
- Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains
- Kittiphop Phalakarn and Kittiphon Phalakarn and Vorapong Suppakitpaisarn
-
2016/895 ( PDF )
- Leakage-Abuse Attacks against Order-Revealing Encryption
- Paul Grubbs and Kevin Sekniqi and Vincent Bindschaedler and Muhammad Naveed and Thomas Ristenpart
-
2016/894 ( PDF )
- Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation
- Chun Guo and Dongdai Lin
-
2016/892 ( PDF )
- Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
- Adrià Gascón and Phillipp Schoppmann and Borja Balle and Mariana Raykova and Jack Doerner and Samee Zahur and David Evans
-
2016/891 ( PDF )
- Tightly Secure IBE under Constant-size Master Public Key
- Jie Chen and Junqing Gong and Jian Weng
-
2016/889 ( PDF )
- Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
- Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
-
2016/887 ( PDF )
- A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size $2^{4k+2}$
- Anne Canteaut and Sébastien Duval and Léo Perrin
-
2016/885 ( PDF )
- Short Stickelberger Class Relations and application to Ideal-SVP
- Ronald Cramer and Léo Ducas and Benjamin Wesolowski
-
2016/880 ( PDF )
- Naor-Yung Paradigm with Shared Randomness and Applications
- Silvio Biagioni and Daniel Masny and Daniele Venturi
-
2016/875 ( PDF )
- Depth-Robust Graphs and Their Cumulative Memory Complexity
- Joël Alwen and Jeremiah Blocki and Krzysztof Pietrzak
-
2016/871 ( PDF )
- Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions
- Xavier Boyen and Christopher Carr and Thomas Haines
-
2016/870 ( PDF )
- Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds
- Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
-
2016/859 ( PDF )
- On the Security of Supersingular Isogeny Cryptosystems
- Steven D. Galbraith and Christophe Petit and Barak Shani and Yan Bo Ti
-
2016/849 ( PDF )
- Asymptotically Tight Bounds for Composing ORAM with PIR
- Ittai Abraham and Christopher W. Fletcher and Kartik Nayak and Benny Pinkas and Ling Ren
-
2016/848 ( PDF )
- From Weakly Selective to Selective Security in Compact Functional Encryption, Revisited
- Linfeng Zhou
-
2016/843 ( PDF )
- Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Shuichi Katsumata and Shota Yamada
-
2016/842 ( PDF )
- Improved, Black-Box, Non-Malleable Encryption from Semantic Security
- Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee
-
2016/825 ( PDF )
- Revisiting Cascade Ciphers in Indifferentiability Setting
- Chun Guo and Dongdai Lin and Meicheng Liu
-
2016/823 ( PDF )
- Post-Quantum Attribute-Based Signatures from Lattice Assumptions
- Rachid El Bansarkhani and Ali El Kaafarani
-
2016/822 ( PDF )
- A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo and Akbar Majidi
-
2016/811 ( PDF )
- MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers
- Ling Sun and Wei Wang and Meiqin Wang
-
2016/802 ( -- withdrawn -- )
- Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated
- Hung Dang and Erick Purwanto and Ee-Chien Chang
-
2016/794 ( PDF )
- Message-recovery attacks on Feistel-based Format Preserving Encryption
- Mihir Bellare and Viet Tung Hoang and Stefano Tessaro
-
2016/793 ( PDF )
- Side-Channel Analysis of Keymill
- Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Florian Mendel
-
2016/792 ( PDF )
- Key-Homomorphic Signatures and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge
- David Derler and Daniel Slamanig
-
2016/790 ( PDF )
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
- Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao
-
2016/788 ( PDF )
- On the security of Cubic UOV and its variants
- Yasufumi Hashimoto
-
2016/782 ( PDF )
- Challenges for Ring-LWE
- Eric Crockett and Chris Peikert
-
2016/781 ( PDF )
- Privately Matching $k$-mers
- Justin Bedő and Thomas Conway and Kim Ramchen and Vanessa Teague
-
2016/772 ( PDF )
- Time-Frequency Analysis for Second-Order Attacks
- Pierre BELGARRIC and Shivam BHASIN and Nicolas BRUNEAU and Jean-Luc DANGER and Nicolas DEBANDE and Sylvain GUILLEY and Annelie HEUSER and Zakaria NAJM and Olivier RIOUL
-
2016/762 ( PDF )
- Faster Secure Two-Party Computation in the Single-Execution Setting
- Xiao Wang and Alex J. Malozemoff and Jonathan Katz
-
2016/757 ( PDF )
- Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends
- Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton Andrade
-
2016/742 ( PDF )
- LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
- Johannes Braun and Johannes Buchmann and Denise Demirel and Mikio Fujiwara and Matthias Geihs and Shiho Moriai and Masahide Sasaki and Atsushi Waseda
-
2016/736 ( PDF )
- Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation
- Martine De Cock and Rafael Dowsley and Caleb Horst and Raj Katti and Anderson C. A. Nascimento and Stacey C. Newman and Wing-Sea Poon
-
2016/726 ( PDF )
- Local Bounds for the Optimal Information Ratio of Secret Sharing Schemes
- Oriol Farràs and Jordi Ribes-González and Sara Ricci
-
2016/720 ( PDF )
- A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption
- Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee
-
2016/716 ( PDF )
- 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
- Tuyet Duong and Lei Fan and Hong-Sheng Zhou
-
2016/696 ( PDF )
- Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
- Süleyman Kardaş and Mehmet Sabır Kiraz
-
2016/695 ( PDF )
- Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation
- Ivan Damgård and Jesper Buus Nielsen and Michael Nielsen and Samuel Ranellucci
-
2016/694 ( PDF )
- Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials
- Yin Li and Xingpo Ma and Yu Zhang and Chuanda Qi
-
2016/682 ( PDF )
- Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations
- Steven D. Galbraith, Joel Laity and Barak Shani
-
2016/681 ( PDF )
- Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack
- Ronald Cramer, Ivan Damgard, Chaoping Xing, Chen Yuan
-
2016/659 ( PDF )
- Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE
- Joppe Bos and Craig Costello and Léo Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila
-
2016/655 ( PDF )
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
- Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au
-
2016/654 ( PDF )
- Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks
- Shweta Agrawal
-
2016/649 ( PDF )
- Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
- Behzad Abdolmaleki and Karim Baghery and Shahram Khazaei and Mohammad Reza Aref
-
2016/646 ( PDF )
- Computational integrity with a public random string from quasi-linear PCPs
- Eli Ben-Sasson and Iddo Ben-Tov and Alessandro Chiesa and Ariel Gabizon and Daniel Genkin and Matan Hamilis and Evgenya Pergament and Michael Riabzev and Mark Silberstein and Eran Tromer and Madars Virza
-
2016/643 ( PDF )
- On the Computational Overhead of MPC with Dishonest Majority
- Jesper Buus Nielsen and Samuel Ranellucci
-
2016/636 ( PDF )
- Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
- Saikrishna Badrinarayanan and Dakshita Khurana and Rafail Ostrovsky and Ivan Visconti
-
2016/635 ( PDF )
- Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
- Florian Tramer and Fan Zhang and Huang Lin and Jean-Pierre Hubaux and Ari Juels and Elaine Shi
-
2016/633 ( PDF )
- Making Smart Contracts Smarter
- Loi Luu and Duc-Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor
-
2016/620 ( PDF )
- Secure Data Exchange: A Marketplace in the Cloud
- Ran Gilad-Bachrach and Kim Laine and Kristin Lauter and Peter Rindal and Mike Rosulek
-
2016/614 ( PDF )
- Better Two-Round Adaptive Multi-Party Computation
- Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam
-
2016/599 ( PDF )
- Obfuscation from Low Noise Multilinear Maps
- Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee
-
2016/597 ( PDF )
- Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version
- Margaux Dugardin; Sylvain Guilley; Jean-Luc Danger; Zakaria Najm; Olivier Rioul
-
2016/592 ( PDF )
- Subspace Trail Cryptanalysis and its Applications to AES
- Lorenzo Grassi and Christian Rechberger and Sondre Rønjom
-
2016/578 ( PDF )
- Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security
- Viet Tung Hoang and Stefano Tessaro
-
2016/575 ( PDF )
- TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub
- Ethan Heilman and Leen Alshenibr and Foteini Baldimtsi and Alessandra Scafuro and Sharon Goldberg
-
2016/564 ( PDF )
- The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
- Mihir Bellare and Bjoern Tackmann
-
2016/561 ( PDF )
- Compactness vs Collusion Resistance in Functional Encryption
- Baiyu Li and Daniele Micciancio
-
2016/557 ( PDF )
- On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
- Dahmun Goudarzi and Matthieu Rivain
-
2016/545 ( PDF )
- On Trees, Chains and Fast Transactions in the Blockchain
- Aggelos Kiayias and Giorgos Panagiotakos
-
2016/544 ( PDF )
- Efficient Secure Comparison Protocols
- Geoffroy Couteau
-
2016/532 ( PDF )
- Cryptanalysis of GOST2
- Tomer Ashur and Achiya Bar-On and Orr Dunkelman
-
2016/517 ( PDF )
- ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab
- David McCann and Carolyn Whitnall and Elisabeth Oswald
-
2016/495 ( PDF )
- Cross&Clean: Amortized Garbled Circuits with Constant Overhead
- Jesper Buus Nielsen and Claudio Orlandi
-
2016/483 ( PDF )
- Proofs of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures
- Hiroaki Anada and Seiko Arita and Kouichi Sakurai
-
2016/482 ( PDF )
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
- Shashank Agrawal and David J. Wu
-
2016/466 ( PDF )
- AnNotify: A Private Notification Service
- Ania Piotrowska and Jamie Hayes and Nethanel Gelernter and George Danezis and Amir Herzberg
-
2016/463 ( PDF )
- Authenticated Encryption with Variable Stretch
- Reza Reyhanitabar and Serge Vaudenay and Damian Vizár
-
2016/458 ( PDF )
- CompGC: Efficient Offline/Online Semi-honest Two-party Computation
- Adam Groce and Alex Ledger and Alex J. Malozemoff and Arkady Yerukhimovich
-
2016/457 ( PDF )
- Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption
- Wei Yuan
-
2016/444 ( PDF )
- The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
- Roberto Avanzi
-
2016/431 ( PDF )
- Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme
- David Bernhard, Oksana Kulyk, Melanie Volkamer
-
2016/425 ( PDF )
- Multi-Input Inner-Product Functional Encryption from Pairings
- Michel Abdalla and Romain Gay and Mariana Raykova and Hoeteck Wee
-
2016/421 ( PDF )
- Homomorphic Encryption for Arithmetic of Approximate Numbers
- Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song
-
2016/415 ( PDF )
- Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
- Nina Bindel and Johannes Buchmann and Juliane Krämer
-
2016/404 ( PDF )
- A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
- Subhabrata Samajder and Palash Sarkar
-
2016/373 ( PDF )
- Adaptive partitioning
- Dennis Hofheinz
-
2016/369 ( PDF )
- Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex
- Ronald Cramer and Chaoping Xing and Chen Yuan
-
2016/366 ( PDF )
- \(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers
- Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina
-
2016/355 ( PDF )
- Fruit: Ultra-Lightweight Stream Cipher with Shorter Internal State
- Vahid Amin Ghafari, Honggang Hu, and Ying Chen
-
2016/348 ( PDF )
- A Note on Non-Perfect Secret Sharing
- Oriol Farràs and Sebastià Martín and Carles Padró
-
2016/341 ( PDF )
- Semantically Secure Anonymity: Foundations of Re-encryption
- Adam L. Young and Moti Yung
-
2016/321 ( PDF )
- Algebraic Decomposition for Probing Security
- Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
-
2016/303 ( PDF )
- From Obfuscation to the Security of Fiat-Shamir for Proofs
- Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum
-
2016/278 ( PDF )
- Various Proxy Re-Encryption Schemes from Lattices
- Xiong Fan and Feng-Hao Liu
-
2016/276 ( PDF )
- Arithmetic coding and blinding countermeasures for lattice signatures
- Markku-Juhani O. Saarinen
-
2016/249 ( PDF )
- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
- Amir Moradi and Tobias Schneider
-
2016/234 ( PDF )
- Trick or Tweak: On the (In)security of OTR’s Tweaks
- Raphael Bost and Olivier Sanders
-
2016/233 ( PDF )
- Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE and Threshold-IBE
- Charanjit S. Jutla and Arnab Roy
-
2016/228 ( PDF )
- On a decentralized trustless pseudo-random number generation algorithm
- Serguei Popov
-
2016/209 ( PDF )
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- Ling Song and Zhangjie Huang and Qianqian Yang
-
2016/189 ( PDF )
- Yao's millionaires' problem and public-key encryption without computational assumptions
- Dima Grigoriev and Laszlo B. Kish and Vladimir Shpilrain
-
2016/186 ( PDF )
- Lightweight MDS Generalized Circulant Matrices (Full Version)
- Meicheng Liu and Siang Meng Sim
-
2016/168 ( PDF )
- Town Crier: An Authenticated Data Feed for Smart Contracts
- Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi
-
2016/166 ( PDF )
- Per-Session Security: Password-Based Cryptography Revisited
- Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
-
2016/165 ( -- withdrawn -- )
- PrAd: Enabling Privacy-Aware Location based Advertising
- Hung Dang and Ee-Chien Chang
-
2016/161 ( PDF )
- Revisiting Structure Graphs: Applications to CBC-MAC and EMAC
- Ashwin Jha and Mridul Nandi
-
2016/156 ( PDF )
- More Efficient Constant-Round Multi-Party Computation from BMR and SHE
- Yehuda Lindell and Nigel P. Smart and Eduardo Soria-Vazquez
-
2016/154 ( PDF )
- Fully-Anonymous Short Dynamic Group Signatures Without Encryption
- David Derler and Daniel Slamanig
-
2016/119 ( PDF )
- Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices
- Christof Beierle and Thorsten Kranz and Gregor Leander
-
2016/111 ( PDF )
- Scalable and Secure Logistic Regression via Homomorphic Encryption
- Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
-
2016/108 ( PDF )
- An Efficient Toolkit for Computing Private Set Operations
- Alex Davidson and Carlos Cid
-
2016/102 ( PDF )
- Breaking the Sub-Exponential Barrier in Obfustopia
- Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan and Mark Zhandry
-
2016/086 ( PDF )
- Intel SGX Explained
- Victor Costan and Srinivas Devadas
-
2016/081 ( PDF )
- A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
- Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
-
2016/046 ( PDF )
- How To Simulate It - A Tutorial on the Simulation Proof Technique
- Yehuda Lindell
-
2016/035 ( PDF )
- Rational Proofs of Space-Time
- Tal Moran and Ilan Orlov
-
2016/027 ( PDF )
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
- Dan Boneh and Henry Corrigan-Gibbs and Stuart Schechter
-
2016/025 ( PDF )
- Human-readable Proof of the Related-Key Security of AES-128
- Khoongming Khoo and Eugene Lee and Thomas Peyrin and Siang Meng Sim
-
2015/1224 ( PDF )
- Twisted Polynomials and Forgery Attacks on GCM
- Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, and Elmar Tischhauser
-
2015/1221 ( -- withdrawn -- )
- Unclonable encryption revisited ($4 \times 2 = 8$)
- Boris Skoric
-
2015/1218 ( -- withdrawn -- )
- $Area-Time$ Efficient Hardware Implementation of Elliptic Curve Cryptosystem
- Anissa Sghaier and Medien Zeghid and Belgacem Bouallegue and Adel Baganne and Mohsen Machhout
-
2015/1214 ( PDF )
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- Britta Hale and Tibor Jager and Sebastian Lauer and Jörg Schwenk
-
2015/1187 ( PDF )
- On an almost-universal hash function family with applications to authentication and secrecy codes
- Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and László Tóth
-
2015/1178 ( PDF )
- Textbook Non-Malleable Commitments
- Vipul Goyal and Omkant Pandey and Silas Richelson
-
2015/1167 ( PDF )
- Constraining Pseudorandom Functions Privately
- Dan Boneh and Kevin Lewi and David J. Wu
-
2015/1166 ( PDF )
- Ceremonies for End-to-End Verifiable Elections
- Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
-
2015/1162 ( PDF )
- The Moral Character of Cryptographic Work
- Phillip Rogaway
-
2015/1156 ( -- withdrawn -- )
- An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
- Dipanjan Das and Priyanka Bose and S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
-
2015/1130 ( PDF )
- A Note on Perfect Correctness by Derandomization
- Nir Bitansky and Vinod Vaikuntanathan
-
2015/1127 ( PDF )
- Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups
- Mikhail Anokhin
-
2015/1125 ( PDF )
- Practical Order-Revealing Encryption with Limited Leakage
- Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu
-
2015/1099 ( PDF )
- Device-Enhanced Password Protocols with Optimal Online-Offline Protection
- Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena
-
2015/1093 ( PDF )
- C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs
- Ahmed Kosba and Zhichao Zhao and Andrew Miller and Yi Qian and Hubert Chan and Charalampos Papamanthou and Rafael Pass and abhi shelat and Elaine Shi
-
2015/1073 ( PDF )
- Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs
- David Derler and Daniel Slamanig
-
2015/1049 ( PDF )
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Thomas Peyrin and Yannick Seurin
-
2015/1035 ( PDF )
- CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
- Britta Hale and Christopher Carr and Danilo Gligoroski
-
2015/1023 ( PDF )
- Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization
- Prabhanjan Ananth and Abhishek Jain and Amit Sahai
-
2015/1021 ( PDF )
- New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption
- Katsuyuki Takashima
-
2015/997 ( PDF )
- Incremental Program Obfuscation
- Sanjam Garg and Omkant Pandey
-
2015/958 ( -- withdrawn -- )
- Building Single-Key Beyond Birthday Bound Message Authentication Code
- Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
-
2015/957 ( PDF )
- Delegating RAM Computations
- Yael Tauman Kalai and Omer Paneth
-
2015/955 ( PDF )
- On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
- Mridul Nandi and Tapas Pandit
-
2015/954 ( PDF )
- Online-Offline Homomorphic Signatures for Polynomial Functions
- Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
-
2015/952 ( PDF )
- Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
- Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
-
2015/935 ( PDF )
- Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity
- Céline Blondeau and Kaisa Nyberg
-
2015/919 ( -- withdrawn -- )
- Privacy-preserving computation with trusted computing via Scramble-then-Compute
- Hung Dang and Anh Dinh and Ee-Chien Chang and Beng Chin Ooi
-
2015/914 ( PDF )
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
- Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
-
2015/859 ( PDF )
- Factor Base Discrete Logarithms in Kummer Extensions
- Dianyan Xiao and Jincheng Zhuang and Qi Cheng
-
2015/808 ( PDF )
- Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
- Mihir Bellare and Joseph Jaeger and Daniel Kane
-
2015/806 ( PDF )
- Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers
- Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
-
2015/755 ( PDF )
- Revisiting TESLA in the quantum random oracle model
- Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen and Edward Eaton and Gus Gutoski and Juliane Krämer and Filip Pawlega
-
2015/751 ( PDF )
- Fast Garbling of Circuits Under Standard Assumptions
- Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
-
2015/740 ( PDF )
- Predictable Arguments of Knowledge
- Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
-
2015/739 ( -- withdrawn -- )
- Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
- Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang
-
2015/709 ( PDF )
- Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
- Luka Malisa and Kari Kostiainen and Srdjan Capkun
-
2015/701 ( PDF )
- Differentially private instance-based noise mechanisms in practice
- Sébastien Canard and Baptiste Olivier and Tony Quertier
-
2015/694 ( PDF )
- On the Complexity of Additively Homomorphic UC Commitments
- Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
-
2015/693 ( PDF )
- Foundations of Reactive Garbling Schemes
- Jesper Buus Nielsen and Samuel Ranellucci
-
2015/639 ( -- withdrawn -- )
- Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings
- Hao Chen
-
2015/636 ( PDF )
- On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks
- Matthias Hamann and Matthias Krause
-
2015/623 ( -- withdrawn -- )
- Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
- Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand
-
2015/564 ( PDF )
- Sanctum: Minimal Hardware Extensions for Strong Software Isolation
- Victor Costan and Ilia Lebedev and Srinivas Devadas
-
2015/486 ( PDF )
- DECIM: Detecting Endpoint Compromise In Messaging
- Jiangshan Yu, Mark Ryan, and Cas Cremers
-
2015/485 ( PDF )
- Turning Online Ciphers Off
- Elena Andreeva and Guy Barwell and Ritam Bhaumik and Mridul Nandi and Dan Page and Martijn Stam
-
2015/413 ( PDF )
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- Shashank Agrawal and Melissa Chase
-
2015/353 ( PDF )
- Matrix Computational Assumptions in Multilinear Groups
- Paz Morillo and Carla Ràfols and Jorge L. Villar
-
2015/243 ( PDF )
- Reliable communication via semilattice properties of partial knowledge
- Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
-
2015/233 ( PDF )
- Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
- Ben Smyth and Steven Frink and Michael R. Clarkson
-
2015/174 ( PDF )
- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers
- Chenyang Tu and Lingchen Zhang and Neng Gao and Zeyi Liu and Yuan Ma and Zongbin Liu
-
2015/126 ( PDF )
- Perfect Structure on the Edge of Chaos
- Nir Bitansky and Omer Paneth and Daniel Wichs
-
2015/121 ( PDF )
- Multi-Client Oblivious RAM secure against Malicious Servers
- Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
-
2015/073 ( PDF )
- Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
- Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin
-
2014/1020 ( PDF )
- Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
-
2014/1004 ( PDF )
- CONIKS: Bringing Key Transparency to End Users
- Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
-
2014/989 ( PDF )
- Controlled Homomorphic Encryption: Definition and Construction
- Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti
-
2014/793 ( PDF )
- Robust Authenticated-Encryption: AEZ and the Problem that it Solves
- Viet Tung Hoang and Ted Krovetz and Phillip Rogaway
-
2014/765 ( PDF )
- The Bitcoin Backbone Protocol: Analysis and Applications
- Juan Garay and Aggelos Kiayias and Nikos Leonardos
-
2014/741 ( PDF )
- Eliminating Leakage in Reverse Fuzzy Extractors
- André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser
-
2014/733 ( PDF )
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann
-
2014/704 ( PDF )
- A 128-bit Block Cipher Based on Three Group Arithmetics
- Shenghui Su and Shuwang Lü and Daqiang Dong
-
2014/472 ( PDF )
- How to Watermark Cryptographic Functions
- Ryo Nishimaki
-
2013/845 ( PDF )
- How to Keep a Secret: Leakage Deterring Public-key Cryptography
- Aggelos Kiayias and Qiang Tang
-
2013/839 ( PDF )
- Lattice Decoding Attacks on Binary LWE
- Shi Bai and Steven D. Galbraith
-
2013/717 ( PDF )
- NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
-
2013/659 ( -- withdrawn -- )
- A provable secure anonymous proxy signature scheme without random oracles
- Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
-
2013/628 ( PDF )
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Kazuhiko Minematsu
-
2013/394 ( PDF )
- A Public Key Cryptoscheme Using Bit-pair Shadows
- Shenghui Su and Shuwang Lü and Maozhi Xu and Tao Xie
-
2013/351 ( PDF )
- Time-Optimal Interactive Proofs for Circuit Evaluation
- Justin Thaler
-
2013/327 ( PDF )
- A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
- Shenghui Su and Tao Xie and Shuwang Lü
-
2013/321 ( PDF )
- Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
- Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote
-
2013/275 ( PDF )
- The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
- Johannes Braun and Gregor Rynkowski
-
2013/274 ( -- withdrawn -- )
- A time series approach for profiling attack
- Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch
-
2013/269 ( PDF )
- CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
- Jonathan Trostle
-
2013/183 ( PDF )
- Practical Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2012/577 ( PDF )
- A Framework for Unique Ring Signatures
- Matthew Franklin and Haibin Zhang
-
2012/154 ( -- withdrawn -- )
- The Joint Signature and Encryption Revisited
- Laila El Aimani
-
2011/230 ( PDF )
- All-But-Many Lossy Trapdoor Functions
- Dennis Hofheinz
-
2010/287 ( PDF )
- Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
- Jacques Patarin
-
2007/128 ( PDF )
- Computationally Sound Mechanized Proofs of Correspondence Assertions
- Bruno Blanchet
[ Cryptology ePrint archive ]