Cryptology ePrint Archive: Recent Updates

2015/1018 ( PDF )
A Riddle Wrapped in an Enigma
N. Koblitz and A. Menezes
2015/1017 ( PDF )
Functional Encryption: Decentralised and Delegatable
Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
2015/1016 ( PDF )
Lifting the Security of NI-MAC Beyond Birthday Bound
Avijit Dutta and Goutam Paul
2015/1015 ( PDF )
On Bitcoin as a public randomness source
Joseph Bonneau and Jeremy Clark and Steven Goldfeder
2015/1014 ( PDF )
Fast Fourier Orthogonalization
Léo Ducas and Thomas Prest
2015/1013 ( PDF )
Inception Makes Non-malleable Codes Stronger
Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
2015/1012 ( PDF )
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
2015/1011 ( PDF )
Hierarchical Functional Encryption
Zvika Brakerski and Gil Segev
2015/1010 ( PDF )
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
2015/1009 ( PDF )
Applications of Key Recovery Cube-attack-like
Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
2015/1008 ( PDF )
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
2015/1007 ( PDF )
How to Vote Privately Using Bitcoin
Zhichao Zhao and T-H. Hubert Chan
2015/1006 ( PDF )
Confidential Benchmarking based on Multiparty Computation
Ivan Damgård and Kasper Damgård and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
2015/1005 ( PDF )
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
Wenbin Zhang and Chik How Tan
2015/1004 ( PDF )
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
2015/1003 ( PDF )
Results on polynomial interpolation with mixed modular operations and unknown moduli
Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
2015/1002 ( PDF )
got HW crypto? On the (in)security of a Self-Encrypting Drive series
Gunnar Alendal and Christian Kison and modg
2015/1001 ( PDF )
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
2015/1000 ( PDF )
Factoring as a Service
Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
2015/999 ( PDF )
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves
2015/998 ( PDF )
All or Nothing at All
Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
2015/997 ( PDF )
Incremental Program Obfuscation
Sanjam Garg and Omkant Pandey
2015/996 ( PDF )
Multi-user Schnorr security, revisited
Daniel J. Bernstein
2015/995 ( PDF )
Updates on Sorting of Fully Homomorphic Encrypted Data
Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed
2015/994 ( -- withdrawn -- )
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/993 ( PDF )
Bi-Deniable Inner Product Encryption from LWE
Daniel Apon and Xiong Fan and Feng-Hao Liu
2015/992 ( PDF )
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
Jinsu Kim and Sungwook Kim and Jae Hong Seo
2015/991 ( PDF )
Ed3363 (HighFive) -- An alternative Elliptic Curve
Mike Scott
2015/990 ( PDF )
Encryption Switching Protocols
Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/989 ( PDF )
Fast Oblivious AES\\A dedicated application of the MiniMac protocol
Ivan Damgård and Rasmus Winther Zakarias
2015/988 ( PDF )
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram
2015/987 ( PDF )
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
Yehuda Lindell and Ben Riva
2015/986 ( PDF )
Bit Coincidence Mining Algorithm
Koh-ichi Nagao
2015/985 ( PDF )
Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
Koh-ichi Nagao
2015/984 ( PDF )
Complexity of ECDLP under the First Fall Degree Assumption
Koh-ichi Nagao
2015/983 ( PDF )
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
Ping Ngai Chung and Craig Costello and Benjamin Smith
2015/982 ( PDF )
A note on constructions of bent functions from involutions
Sihem Mesnager
2015/981 ( PDF )
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
Ayantika Chatterjee and Indranil Sengupta
2015/980 ( PDF )
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
2015/979 ( PDF )
Guidelines for Using the CryptDB System Securely
Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
2015/978 ( PDF )
The OPTLS Protocol and TLS 1.3
Hugo Krawczyk and Hoeteck Wee
2015/977 ( PDF )
Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³)
Michał Wroński
2015/976 ( PDF )
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Alex Biryukov and Léo Perrin
2015/975 ( PDF )
Extended Functionality in Verifiable Searchable Encryption
James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick
2015/974 ( PDF )
The Conjoined Microprocessor
Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and Rémi Géraud David Naccache and Jean Vuillemin
2015/973 ( PDF )
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
Ashwin Jha and Mridul Nandi
2015/972 ( PDF )
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
David Pointcheval and Olivier Sanders and Jacques Traoré
2015/971 ( PDF )
Attacks on Search RLWE
Hao Chen, Kristin Lauter, and Katherine E. Stange
2015/970 ( PDF )
Multilinear Maps over the Integers Using Modulus Switching
Gu Chunsheng
2015/969 ( PDF )
Zero-Knowledge Interactive Proof Systems for New Lattice Problems
Claude Crepéau and Raza Ali Kazmi
2015/968 ( PDF )
Differential and Linear Cryptanalysis of ARX with Partitioning -- Application to FEAL and Chaskey
Gaëtan Leurent
2015/967 ( PDF )
Freestart collision on full SHA-1
Marc Stevens and Pierre Karpman and Thomas Peyrin
2015/966 ( PDF )
Vulnerabilities of ``McEliece in the World of Escher"
Dustin Moody and Ray Perlner
2015/965 ( PDF )
Private Genome Analysis through Homomorphic Encryption
Miran Kim and Kristin Lauter
2015/964 ( PDF )
Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
Danping Shi and Lei Hu and Siwei Sun and Ling Song
2015/963 ( PDF )
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
Houda Ferradi and Rémi Géraud and David Naccache and Assia Tria
2015/962 ( PDF )
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
2015/961 ( PDF )
Short Structure-Preserving Signatures
Essam Ghadafi
2015/960 ( PDF )
More Efficient Secure Outsourcing Methods for Bilinear Maps
Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol
2015/959 ( PDF )
Cryptanalysis of the Round-Reduced Kupyna Hash Function
Jian Zou, Le Dong
2015/958 ( PDF )
One-key Double-Sum MAC with Beyond-Birthday Security
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
2015/957 ( PDF )
Delegating RAM Computations
Yael Tauman Kalai and Omer Paneth
2015/956 ( PDF )
Analysis of the Kupyna-256 Hash Function
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/955 ( PDF )
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
Mridul Nandi and Tapas Pandit
2015/954 ( PDF )
Online-Offline Homomorphic Signatures for Polynomial Functions
Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/953 ( PDF )
Gaussian Sampling Precision and Information Leakage in Lattice Cryptography
Markku-Juhani O. Saarinen
2015/952 ( PDF )
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
2015/951 ( PDF )
Nearly Optimal Robust Secret Sharing
Mahdi Cheraghchi
2015/950 ( PDF )
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Shota Goto and Junji Shikata
2015/949 ( PDF )
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali Kaafar
2015/948 ( PDF )
A Provably Secure Short Signature Scheme from Coding Theory
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/947 ( PDF )
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
2015/946 ( PDF )
Asymmetric proof-of-work based on the Generalized Birthday problem
Alex Biryukov and Dmitry Khovratovich
2015/945 ( PDF )
Secure Set-based Policy Checking and Its Application to Password Registration
Changyu Dong and Franziskus Kiefer
2015/944 ( PDF )
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
Palash Sarkar and Shashank Singh
2015/943 ( PDF )
Sandy2x: New Curve25519 Speed Records
Tung Chou
2015/942 ( PDF )
Secrecy and independence for election schemes
Ben Smyth
2015/941 ( PDF )
Cryptanalysis of the New Multilinear Map over the Integers
Brice Minaud and Pierre-Alain Fouque
2015/940 ( PDF )
Secure Association for the Internet of Things
Almog Benin and Sivan Toledo and Eran Tromer
2015/939 ( PDF )
A Decade of Lattice Cryptography
Chris Peikert
2015/938 ( PDF )
Lattice Based Cryptography for Beginners
Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim
2015/937 ( PDF )
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung
2015/936 ( -- withdrawn -- )
A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
2015/935 ( PDF )
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
Céline Blondeau and Kaisa Nyberg
2015/934 ( PDF )
Cryptanalysis of the New CLT Multilinear Maps
Jung Hee Cheon and Changmin Lee and Hansol Ryu
2015/933 ( PDF )
Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme
Jayaprakash Kar
2015/932 ( PDF )
Using Tweaks To Design Fault Resistant Ciphers
Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay
2015/931 ( PDF )
Fast and Secure Three-party Computation: The Garbled Circuit Approach
Payman Mohassel and Mike Rosulek and Ye Zhang
2015/930 ( PDF )
Nearly Sparse Linear Algebra
Antoine Joux and Cécile Pierrot
2015/929 ( PDF )
Are you The One to Share? Secret Transfer with Access Structure
Yongjun Zhao and Sherman S.M. Chow
2015/928 ( PDF )
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
Hassan Noura and Damien Couroussé
2015/927 ( PDF )
Rich Queries on Encrypted Data: Beyond Exact Matches
Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner
2015/926 ( PDF )
CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
Vadim N.Tsypyschev and Julia S.Vinogradova
2015/925 ( PDF )
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/924 ( PDF )
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
2015/923 ( PDF )
DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING
Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay
2015/922 ( PDF )
Localised Multisecret Sharing
Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
2015/921 ( PDF )
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
Kwangsu Lee and Jong Hwan Park
2015/920 ( PDF )
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese and Antonio Faonio and Seny Kamara
2015/919 ( PDF )
PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
Hung Dang and Tien Tuan Anh Dinh and Ee-Chien Chang and Beng Chin Ooi and Prateek Saxena and Shruti Tople
2015/918 ( PDF )
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk
2015/917 ( PDF )
Private Proximity Testing on Steroids: An NTRU-based Protocol
Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche
2015/916 ( PDF )
Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/915 ( PDF )
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes
Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
2015/914 ( PDF )
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2015/913 ( PDF )
Functional Signcryption: Notion, Construction, and Applications
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/912 ( PDF )
Extraction of intrinsic structure for Hardware Trojan detection
Maxime Lecomte and Jacques Fournier and Philippe Maurine
2015/911 ( PDF )
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin
2015/910 ( PDF )
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
Alonso González and Alejandro Hevia and Carla Ràfols
2015/909 ( PDF )
On the Impact of Known-Key Attacks on Hash Functions
Bart Mennink, Bart Preneel
2015/908 ( PDF )
Linear Distinguishers in the Key-less Setting: Application to PRESENT
Martin M. Lauridsen and Christian Rechberger
2015/907 ( PDF )
Cryptographic Assumptions: A Position Paper
Shafi Goldwasser and Yael Tauman Kalai
2015/906 ( PDF )
RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors
Adnan Baysal and Suhap Sahin
2015/905 ( PDF )
Mapping the Intel Last-Level Cache
Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser
2015/904 ( PDF )
Almost-tight Identity Based Encryption against Selective Opening Attack
Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen
2015/903 ( PDF )
A Note on the Indifferentiability of the 10-Round Feistel Construction
Yannick Seurin
2015/902 ( PDF )
Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques
Kexin Qiao and Lei Hu and Siwei Sun
2015/901 ( PDF )
A Unified Approach to MPC with Preprocessing using OT
Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl
2015/900 ( PDF )
New Results on Identity-based Encryption from Quadratic Residuosity
Ferucio Laurentiu Tiplea and Emil Simion
2015/899 ( PDF )
Privacy-preserving Attribute Based Searchable Encryption
Payal Chaudhari and Maniklal Das
2015/898 ( PDF )
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/897 ( PDF )
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography
Prosanta Gope
2015/896 ( PDF )
Improved Attacks on Reduced-Round Camellia-128/192/256
Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang
2015/895 ( PDF )
Rogue Decryption Failures: Reconciling AE Robustness Notions
Guy Barwell and Dan Page and Martijn Stam
2015/894 ( PDF )
Comparison of cube attacks over different vector spaces
Richard Winter and Ana Salagean and Raphael C.-W. Phan
2015/893 ( PDF )
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
2015/892 ( PDF )
Security Against Related Randomness Attacks via Reconstructive Extractors
Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee
2015/891 ( PDF )
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy
Sébastien Canard and Viet Cuong Trinh
2015/890 ( PDF )
MI-T-HFE, a New Multivariate Signature Scheme
Wenbin Zhang and Chik How Tan
2015/889 ( PDF )
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
Anamaria Costache and Nigel P. Smart
2015/888 ( PDF )
Tweak-Length Extension for Tweakable Blockciphers
Kazuhiko Minematsu and Tetsu Iwata
2015/887 ( PDF )
Round-Optimal Token-Based Secure Computation
Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2015/886 ( PDF )
Applying Cryptographic Acceleration Techniques to Error Correction
Rémi Géraud and Diana-Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion
2015/885 ( PDF )
A New Standard of Ukraine: The Kupyna Hash Function
Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov
2015/884 ( PDF )
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/883 ( -- withdrawn -- )
Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security
Avijit Dutta and Goutam Paul
2015/882 ( PDF )
Using Modular Extension to Provably Protect ECC Against Fault Attacks
Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm
2015/881 ( PDF )
Generic Security of NMAC and HMAC with Input Whitening
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/880 ( PDF )
Generic Efficient Dynamic Proofs of Retrievability
Mohammad Etemad and Alptekin Küpçü
2015/879 ( PDF )
Computing information on domain parameters from public keys selected uniformly at random
Martin Ekerå
2015/878 ( PDF )
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model
Edward Eaton and Fang Song
2015/877 ( PDF )
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
Christophe Clavier and Julien Francq and Antoine Wurcker
2015/876 ( PDF )
10-Round Feistel is Indifferentiable from an Ideal Cipher
Dana Dachman-Soled and Jonathan Katz and Aishwarya Thiruvengadam
2015/875 ( PDF )
Bent and Semi-bent Functions via Linear Translators
Neşe Koçak, Sihem Mesnager and Ferruh Özbudak
2015/874 ( PDF )
Feistel Networks: Indifferentiability at 10 Rounds
Yuanxi Dai and John Steinberger
2015/873 ( PDF )
On the Diffusion Property of Iterated Functions
Jian Liu, Sihem Mesnager, and Lusheng Chen
2015/872 ( PDF )
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
2015/871 ( PDF )
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family
Shahin Tajik and Enrico Dietz and Sven Frohmann and Helmar Dittrich and Dmitry Nedospasov and Clemens Helfmeier and Jean-Pierre Seifert and Christian Boit and Heinz-Wilhelm Hübers
2015/870 ( PDF )
Gambling, Computational Information and Encryption Security
Mohammad Hajiabadi and Bruce M. Kapron
2015/869 ( PDF )
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs
2015/868 ( PDF )
Optimally Secure Block Ciphers from Ideal Primitives
Stefano Tessaro
2015/867 ( PDF )
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
2015/866 ( PDF )
Graded Encoding, Variations on a Scheme
Shai Halevi
2015/865 ( PDF )
Card-based Cryptographic Protocols Using a Minimal Number of Cards
Alexander Koch and Stefan Walzer and Kevin Härtel
2015/864 ( PDF )
Encryption Performance Improvements of the Paillier Cryptosystem
Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets
2015/863 ( PDF )
Is There an Oblivious RAM Lower Bound?
Elette Boyle and Moni Naor
2015/862 ( PDF )
Idealizing Identity-Based Encryption
Dennis Hofheinz and Christian Matt and Ueli Maurer
2015/861 ( PDF )
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
Chun Guo and Dongdai Lin
2015/860 ( PDF )
Selective Opening Security for Receivers
Carmit Hazay and Arpita Patra and Bogdan Warinschi
2015/859 ( PDF )
Factor Base Discrete Logarithms in Kummer Extensions
Dianyan Xiao and Jincheng Zhuang and Qi Cheng
2015/858 ( PDF )
Group Signatures Without q-Assumptions
Olivier Blazy and Saqib A. Kakvi
2015/857 ( PDF )
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
Benjamin Fuller and Ariel Hamlin
2015/856 ( PDF )
MGR HASH FUNCTION
Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass
2015/855 ( -- withdrawn -- )
A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
GANESH YELLAPU
2015/854 ( PDF )
Secure Sketch Metamorphosis: Tight Unified Bounds
Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu
2015/853 ( PDF )
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Felix Heuer and Eike Kiltz and Krzysztof Pietrzak
2015/852 ( PDF )
Analysis of a key exchange protocol based on tropical matrix algebra
Matvei Kotov and Alexander Ushakov
2015/851 ( PDF )
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
Benoît Cogliati and Yannick Seurin
2015/850 ( PDF )
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable
Zhen Liu and Duncan S. Wong
2015/849 ( PDF )
Regulating the Pace of von Neumann Correctors
Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, and Amaury de Wargny
2015/848 ( PDF )
The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Meltem Sonmez Turan and Rene Peralta
2015/847 ( PDF )
Exploring Energy Efficiency of Lightweight Block Ciphers
Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
2015/846 ( PDF )
Characterization of Secure Multiparty Computation Without Broadcast
Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem
2015/845 ( PDF )
Cryptanalysis of the Quadratic Zero-Testing of GGH
Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrède Lepoint and Amit Sahai and Mehdi Tibouchi
2015/844 ( PDF )
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2015/843 ( PDF )
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
David Derler and Daniel Slamanig
2015/842 ( PDF )
On Linkability and Malleability in Self-blindable Credentials
Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers
2015/841 ( PDF )
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices
Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
2015/840 ( PDF )
Related-key Impossible Differential Analysis of Full Khudra
Qianqian Yang and Lei Hu and Siwei Sun and Ling Song
2015/839 ( PDF )
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?
David Wong
2015/838 ( PDF )
Offline Witness Encryption
Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
2015/837 ( PDF )
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation
Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA
2015/836 ( PDF )
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
Benjamin Wesolowski and Pascal Junod
2015/835 ( PDF )
On near prime-order elliptic curves with small embedding degrees
Duc-Phong Le and Nadia El Mrabet and Chik How Tan
2015/834 ( PDF )
Authentication Using Side-Channel Information
Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata
2015/833 ( PDF )
Efficient Key Authentication Service for Secure End-to-end Communications
Mohammad Etemad and Alptekin Küpçü
2015/832 ( PDF )
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
David McCann, Kerstin Eder, Elisabeth Oswald
2015/831 ( PDF )
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk
2015/830 ( PDF )
Unique Signature with Short Output from CDH Assumption
Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
2015/829 ( PDF )
Reducing Multilinear Map Levels in Constrained PRFs and ABE
Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
2015/828 ( PDF )
State-recovery analysis of Spritz
Ralph Ankele and Stefan Koelbl and Christian Rechberger
2015/827 ( PDF )
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee
2015/826 ( PDF )
Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
Dario Catalano and Dario Fiore and Luca Nizzardo
2015/825 ( PDF )
The Emperor's New Password Creation Policies
Ding Wang and Ping Wang
2015/824 ( PDF )
Efficient Fully Structure-Preserving Signatures for Large Messages
Jens Groth
2015/823 ( PDF )
Efficient (ideal) lattice sieving using cross-polytope LSH
Anja Becker and Thijs Laarhoven
2015/822 ( PDF )
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Akshayaram Srinivasan and C. Pandu Rangan
2015/821 ( PDF )
A general framework for building noise-free homomorphic cryptosystems
Gérald Gavin
2015/820 ( PDF )
Extended Nested Dual System Groups, Revisited
Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang
2015/819 ( PDF )
Improving the Big Mac Attack on Elliptic Curve Cryptography
Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
2015/818 ( PDF )
cuHE: A Homomorphic Encryption Accelerator Library
Wei Dai and Berk Sunar
2015/817 ( PDF )
Secure Multi-party Graph Computation
Varsha Bhat and Harsimran Singh and S.R.S. Iyengar
2015/816 ( PDF )
Analysis of Keyless Massive MIMO-based Cryptosystem Security
Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev
2015/815 ( PDF )
On the Power of Hierarchical Identity-Based Encryption
Mohammad Mahmoody and Ameer Mohammed
2015/814 ( PDF )
CLKS: Certificateless Keyword Search on Encrypted Data
Qingji Zheng and Xiangxue Li and Aytac Azgin
2015/813 ( PDF )
Revisiting Turning Online Cipher Off
Ritam Bhaumik and Mridul Nandi
2015/812 ( PDF )
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob
Alex Biryukov and Léo Perrin and Aleksei Udovenko
2015/811 ( PDF )
Key-recovery attacks against the MAC algorithm Chaskey
Chrysanthi Mavromati
2015/810 ( PDF )
Improved OR Composition of Sigma-Protocols
Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2015/809 ( PDF )
New Techniques for Electronic Voting
Alan Szepieniec and Bart Preneel
2015/808 ( PDF )
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
Mihir Bellare and Joseph Jaeger and Daniel Kane
2015/807 ( PDF )
Fair Distributed Computation of Reactive Functions
Juan Garay and Björn Tackmann and Vassilis Zikas
2015/806 ( PDF )
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
2015/805 ( PDF )
A classification of elliptic curves with respect to the GHS attack in odd characteristic
Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
2015/804 ( PDF )
SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
Sumit Chakraborty
2015/803 ( PDF )
Statistical and Algebraic Properties of DES
Stian Fauskanger and Igor Semaev
2015/802 ( PDF )
Ciphertext-only attack on d*d Hill in O(d13^d)
Shahram Khazaei and Siavash Ahmadi
2015/801 ( PDF )
Scalar Blinding on Elliptic Curves based on Primes with Special Structure
Scott Fluhrer
2015/800 ( PDF )
Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
Jihoon Cho, Kyu Young Choi, and Dukjae Moon
2015/799 ( PDF )
Secure Binary Field Multiplication
Hwajeong Seo and Chien-Ning Chen and Zhe Liu and Yasuyuki Nogami and Taehwan Park and Jongseok Choi and Howon Kim
2015/798 ( PDF )
A Stateless Cryptographically-Secure Physical Unclonable Function
Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
2015/797 ( PDF )
What Security can we Achieve in 4-Rounds?
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/796 ( PDF )
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi
2015/795 ( PDF )
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman
2015/794 ( PDF )
Safe-Errors on SPA Protected implementations with the Atomicity Technique
Pierre-Alain Fouque and Sylvain Guilley and Cédric Murdica and David Naccache
2015/793 ( PDF )
Algorithmic Information Theory for Obfuscation Security
Rabih Mohsen and Alexandre Miranda Pinto
2015/792 ( PDF )
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz and Vanishree Rao and Daniel Wichs
2015/791 ( PDF )
On the Equivalence of Obfuscation and Multilinear Maps
Omer Paneth and Amit Sahai
2015/790 ( PDF )
On weak and strong 2^k-bent Boolean functions
Pantelimon Stanica
2015/789 ( PDF )
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator
Gangqiang Yang and Mark D. Aagaard and Guang Gong
2015/788 ( PDF )
Cracking-Resistant Password Vaults using Natural Language Encoders
Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart
2015/787 ( PDF )
Backtracking-Assisted Multiplication
Houda Ferradi and Rémi Géraud and Diana Maimut and David Naccache and Hang Zhou
2015/786 ( PDF )
Buying AES Design Resistance with Speed and Energy
Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto
2015/785 ( PDF )
Double-Speed Barrett Moduli
Rémi Géraud and Diana Maimut and David Naccache
2015/784 ( PDF )
Threshold FlipThem: When the winner does not need to take all
David Leslie and Chris Sherfield and Nigel P. Smart
2015/783 ( PDF )
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
Ivan Tjuawinata and Tao Huang and Hongjun Wu
2015/782 ( PDF )
Secure two-party computation in applied pi-calculus: models and verification
Sergiu Bursuc
2015/781 ( PDF )
Twisted Hessian curves
Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange
2015/780 ( PDF )
Multilinear Maps from Obfuscation
Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson
2015/779 ( PDF )
A Simple Scheme, for Strengthening Product-sum Type PKC
Masao KASAHARA
2015/778 ( PDF )
Modular Inversion Hidden Number Problem -- Correction and Improvements
Santanu Sarkar
2015/777 ( PDF )
Arithmetic Walsh Transform of Boolean Functions with Linear Structures
Qinglan Zhao and Dong Zheng and Xiangxue Li and Xiaoli Dong
2015/776 ( PDF )
Functional Encryption for Turing Machines
Prabhanjan Ananth and Amit Sahai
2015/775 ( PDF )
Efficient MDS Diffusion Layers Through Decomposition of Matrices
S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo
2015/774 ( PDF )
Revisiting Prime Power RSA
Santanu Sarkar
2015/773 ( PDF )
Distinguishing a truncated random permutation from a random function
Shoni Gilboa and Shay Gueron
2015/772 ( PDF )
Non-Malleable Encryption: Simpler, Shorter, Stronger
Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
2015/771 ( PDF )
A SAT-based Public Key Cryptography Scheme
Sebastian E. Schmittner
2015/770 ( PDF )
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
2015/769 ( PDF )
On the Hardness of Learning with Rounding over Small Modulus
Andrej Bogdanov and Siyao Guo and Daniel Masny and Silas Richelson and Alon Rosen
2015/768 ( PDF )
Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar
2015/767 ( PDF )
Dual EC: A Standardized Back Door
Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen
2015/766 ( PDF )
Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng
2015/765 ( PDF )
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Victoria Fehr and Marc Fischlin
2015/764 ( PDF )
On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2})
Jincheng Zhuang and Qi Cheng
2015/763 ( PDF )
Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and Takafumi Aoki
2015/762 ( PDF )
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef
2015/761 ( PDF )
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
William Diehl
2015/760 ( PDF )
Investigating SRAM PUFs in large CPUs and GPUs
Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen
2015/759 ( PDF )
Cryptanalysis of Gu's ideal multilinear map
Alice Pellet-Mary and Damien Stehle
2015/758 ( PDF )
Ring-LWE Cryptography for the Number Theorist
Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
2015/757 ( PDF )
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks
Matthias Hamann and Matthias Krause
2015/756 ( PDF )
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/755 ( PDF )
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen
2015/754 ( PDF )
Related-Key Attack on Full-Round PICARO
Anne Canteaut and Virginie Lallemand and María Naya-Plasencia
2015/753 ( PDF )
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen
2015/752 ( PDF )
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov and Gil Segev
2015/751 ( PDF )
Fast Garbling of Circuits Under Standard Assumptions
Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
2015/750 ( PDF )
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki and Daniel Wichs and Mark Zhandry
2015/749 ( PDF )
Affine Equivalence and its Application to Tightening Threshold Implementations
Pascal Sasdrich and Amir Moradi and Tim Güneysu
2015/748 ( PDF )
A More Cautious Approach to Security Against Mass Surveillance
Jean Paul Degabriele and Pooya Farshim and Bertram Poettering
2015/747 ( PDF )
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du
2015/746 ( PDF )
A 2^{70} Attack on the Full MISTY1
Achiya Bar-On
2015/745 ( PDF )
Faster ECC over F_{2^571} (feat. PMULL)
Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
2015/744 ( PDF )
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
Ege Gulcan and Aydin Aysu and Patrick Schaumont
2015/743 ( PDF )
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Benoit Libert and Thomas Peters and Moti Yung
2015/742 ( PDF )
A Matrix Decomposition Method for Optimal Normal Basis Multiplication
Can Kızılkale and Ömer Eǧecioǧlu and Çetin Kaya Koç
2015/741 ( PDF )
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
2015/740 ( PDF )
Predictable Arguments of Knowledge
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2015/739 ( PDF )
Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation
Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang
2015/738 ( PDF )
Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO)
Kazuhiko Minematsu
2015/737 ( PDF )
New multilinear maps from ideal lattices
Gu Chunsheng
2015/736 ( -- withdrawn -- )
Solving LWE via List Decoding
Mingqiang Wang and Xiaoyun Wang and Kunxian Xia and Jincheng Zhuang
2015/735 ( PDF )
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Ilan Komargodski and Mark Zhandry
2015/734 ( PDF )
On the Security of Extended Generalized Feistel Networks
Manoj Kumar and Saibal K. Pal and Anupama Panigrahi
2015/733 ( PDF )
Fully Homomorphic Encryption on Octonion Ring
Masahiro Yagisawa
2015/732 ( PDF )
Compact Implementations of LEA Block Cipher for Low-End Microprocessors
Hwajeong Seo and Zhe Liu and Jongseok Choi and Taehwan Park and and Howon Kim
2015/731 ( PDF )
Same Value Analysis on Edwards Curves
Rodrigo Abarzúa and Santi Martínez and Valeria Mendoza
2015/730 ( PDF )
Indistinguishability Obfuscation from Functional Encryption for Simple Functions, And a New Bootstrapping Theorem for iO
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/729 ( PDF )
Towards Provably-Secure Remote Memory Attestation
Alexandra Boldyreva and Taesoo Kim and Richard Lipton and Bogdan Warinschi
2015/728 ( PDF )
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas
2015/727 ( PDF )
DPA, Bitslicing and Masking at 1 GHz
Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede
2015/726 ( PDF )
Compositions of linear functions and applications to hashing
Vladimir Shpilrain and Bianca Sosnovski
2015/725 ( PDF )
The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable
Eric Verheul and Sietse Ringers and Jaap-Henk Hoepman
2015/724 ( PDF )
A masked ring-LWE implementation
Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2015/723 ( PDF )
Cryptanalysis of Feistel Networks with Secret Round Functions
Alex Biryukov and Gaëtan Leurent and Léo Perrin
2015/722 ( PDF )
Oblivious Substring Search with Updates
Tarik Moataz and Erik-Oliver Blass
2015/721 ( PDF )
KDM-Security via Homomorphic Smooth Projective Hashing
Hoeteck Wee
2015/720 ( PDF )
Output-Compressing Randomized Encodings and Applications
Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang
2015/719 ( PDF )
Consolidating masking schemes
Oscar Reparaz and Begül Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede
2015/718 ( PDF )
Efficient Asynchronous Accumulators for Distributed PKI
Leonid Reyzin and Sophia Yakoubov
2015/717 ( PDF )
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/716 ( PDF )
Linear Cryptanalysis of Reduced-Round SIMECK Variants
Nasour Bagheri
2015/715 ( PDF )
New Circular Security Counterexamples from Decision Linear and Learning with Errors
Allison Bishop and Susan Hohenberger and Brent Waters
2015/714 ( PDF )
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
Masao KASAHARA
2015/713 ( PDF )
Light-hHB: A New Version of hHB with Improved Session Key Exchange
Ka Ahmad Khoureich
2015/712 ( PDF )
On Limitations of the Fiat­–Shamir Transformation
David Bernhard and Bogdan Warinschi
2015/711 ( PDF )
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)
Anne Canteaut and Sébastien Duval and Gaëtan Leurent
2015/710 ( PDF )
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Bernardo Ferreira and João Rodrigues and João Leitão and Henrique Domingos
2015/709 ( PDF )
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
Luka Malisa and Kari Kostiainen and Srdjan Capkun
2015/708 ( PDF )
Choosing Parameters for NTRUEncrypt
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2015/707 ( PDF )
Reconciling User Privacy and Implicit Authentication for Mobile Devices
Siamak F. Shahandashti and Reihaneh Safavi-Naini and Nashad Ahmed Safa
2015/706 ( PDF )
A Brief Comparison of Simon and Simeck
Stefan Kölbl and Arnab Roy
2015/705 ( PDF )
Linear Overhead Robust MPC with Honest Majority Using Preprocessing
Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
2015/704 ( PDF )
Indistinguishability Obfuscation: from Approximate to Exact
Nir Bitansky and Vinod Vaikuntanathan
2015/703 ( PDF )
Point-Function Obfuscation: A Framework and Generic Constructions
Mihir Bellare and Igors Stepanovs
2015/702 ( PDF )
Demystifying incentives in the consensus computer
Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena
2015/701 ( PDF )
Differential Privacy in distribution and instance-based noise mechanisms
Sébastien Canard and Baptiste Olivier
2015/700 ( PDF )
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
Jimmy Jose and Dipanwita RoyChowdhury
2015/699 ( PDF )
FURISC: FHE Encrypted URISC Design
Ayantika Chatterjee and Indranil Sengupta
2015/698 ( PDF )
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa
Subhamoy Maitra
2015/697 ( PDF )
On the Security of a Self-healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/696 ( PDF )
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
Miguel Morales Sandoval and Arturo Diaz Perez
2015/695 ( PDF )
Cliptography: Clipping the Power of Kleptographic Attacks
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou
2015/694 ( PDF )
On the Complexity of Additively Homomorphic UC Commitments
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
2015/693 ( PDF )
Foundations of Reactive Garbling Schemes
Jesper Buus Nielsen and Samuel Ranellucci
2015/692 ( PDF )
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
2015/691 ( PDF )
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth
2015/690 ( PDF )
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/689 ( PDF )
Counting Keys in Parallel After a Side Channel Attack
Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam
2015/688 ( PDF )
Binary Field Multiplication on ARMv8
Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
2015/687 ( PDF )
Classical Cryptographic Protocols in a Quantum World
Sean Hallgren and Adam Smith and Fang Song
2015/686 ( PDF )
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
Azeem Irshad and Muhammad Sher and Shahzad Ashraf and Shahzad faisal and Mahmood Ul Hassan
2015/685 ( PDF )
On the discrete logarithm problem in finite fields of fixed characteristic
Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
2015/684 ( PDF )
A One-time Stegosystem and Applications to Efficient Covert Communication
Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha Shashidhar
2015/683 ( PDF )
Security of Linear Secret-Sharing Schemes against Mass Surveillance
Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci
2015/682 ( PDF )
Integral Cryptanalysis on Full MISTY1
Yosuke Todo
2015/681 ( PDF )
ANONIZE: A Large-Scale Anonymous Survey System
Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat
2015/680 ( PDF )
Indifferentiability of Confusion-Diffusion Networks
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/679 ( PDF )
Another Look at Normal Approximations in Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/678 ( PDF )
Optimizing MAKWA on GPU and CPU
Thomas Pornin
2015/677 ( PDF )
EdDSA for more curves
Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang
2015/676 ( PDF )
Quantum Cryptanalysis of NTRU
Scott Fluhrer
2015/675 ( PDF )
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
2015/674 ( PDF )
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
Peeter Laud and Alisa Pankova
2015/673 ( PDF )
Decaf: Eliminating cofactors through point compression
Mike Hamburg
2015/672 ( PDF )
Function-Hiding Inner Product Encryption
Allison Bishop and Abhishek Jain and Lucas Kowalczyk
2015/671 ( PDF )
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data
Peeter Laud and Alisa Pankova
2015/670 ( PDF )
Smart Security Management in Secure Devices
Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
2015/669 ( PDF )
GMU Hardware API for Authenticated Ciphers
Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj
2015/668 ( PDF )
The Fallacy of Composition of Oblivious RAM and Searchable Encryption
Muhammad Naveed
2015/667 ( PDF )
De Bruijn Sequences from Nonlinear Feedback Shift Registers
Ming Li and Dongdai Lin
2015/666 ( PDF )
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques
Huaifeng Chen and Xiaoyun Wang
2015/665 ( PDF )
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption.
Romain Gay and Iordanis Kerenidis and Hoeteck Wee
2015/664 ( PDF )
Secure Multi-Party Shuffling
Mahnush Movahedi and Jared Saia and Mahdi Zamani
2015/663 ( PDF )
Analyzing the Efficiency of Biased-Fault Based Attacks
Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
2015/662 ( PDF )
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves
Ryutaroh Matsumoto
2015/661 ( PDF )
Cryptanalysis of a modern rotor machine in a multicast setting
Shane Kepley and David Russo and Rainer Steinwandt
2015/660 ( PDF )
A Hybrid Gaussian Sampler for Lattices over Rings
Léo Ducas and Thomas Prest
2015/659 ( PDF )
Diversity and Transparency for ECC
Jean-Pierre Flori and Jérôme Plût and Jean-René Reinhard and Martin Ekerå
2015/658 ( PDF )
Single-Cycle Implementations of Block Ciphers
Pieter Maene and Ingrid Verbauwhede
2015/657 ( PDF )
Randomizing the Montgomery Powering Ladder
Duc-Phong Le, Chik How Tan and Michael Tunstall
2015/656 ( PDF )
Cryptanalysis of a Markov Chain Based User Authentication Scheme
Ruhul Amin and G.P. Biswas
2015/655 ( PDF )
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
2015/654 ( PDF )
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng
2015/653 ( PDF )
Homomorphic Signature Schemes - A survey
Giulia Traverso and Denise Demirel and Johannes Buchmann
2015/652 ( PDF )
Modelling ciphersuite and version negotiation in the TLS protocol
Benjamin Dowling and Douglas Stebila
2015/651 ( PDF )
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller
2015/650 ( PDF )
A New Encryption Standard of Ukraine: The Kalyna Block Cipher
Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov and Ruslan Mordvinov and Dmytro Kaidalov
2015/649 ( PDF )
On the Hardness of Proving CCA-security of Signed ElGamal
David Bernhard and Marc Fischlin and Bogdan Warinschi
2015/648 ( PDF )
Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard and Marc Fischlin and Bogdan Warinschi
2015/647 ( PDF )
Efficient ephemeral elliptic curve cryptographic keys
Andrea Miele and Arjen K. Lenstra
2015/646 ( PDF )
Decomposition attack on SASASASAS
Alex Biryukov and Dmitry Khovratovich
2015/645 ( PDF )
Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy
Clémentine Gritti, Willy Susilo, Thomas Plantard and Rongmao Chen
2015/644 ( PDF )
The Pythia PRF Service
Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart
2015/643 ( PDF )
Short Accountable Ring Signatures Based on DDH
Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit
2015/642 ( PDF )
A New Partial Key Exposure Attack on Multi-power RSA
Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol
2015/641 ( PDF )
Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Jing Li, Licheng Wang
2015/640 ( PDF )
Very-efficient simulatable flipping of many coins into a well
Luís T. A. N. Brandão
2015/639 ( PDF )
Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings
Hao Chen
2015/638 ( PDF )
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta
2015/637 ( PDF )
A Novel Cyberspace-Oriented Access Control Model
Fenghua Li and Yanchao Wang and Rongna Xie and Jinbo Xiong and Fangfang Shan
2015/636 ( PDF )
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes
Matthias Krause
2015/635 ( PDF )
Microcash: Efficient Off-Line Small Payments
Chris Pavlovski and Colin Boyd
2015/634 ( PDF )
Phasing: Private Set Intersection using Permutation-based Hashing
Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner
2015/633 ( PDF )
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/632 ( PDF )
More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji
2015/631 ( PDF )
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
Thomas Pöppelmann and Michael Naehrig and Andrew Putnam and Adrian Macias
2015/630 ( PDF )
Unconditionally Secure Computation with Reduced Interaction
Ivan Damgård and Jesper Buus Nielsen
2015/629 ( PDF )
BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme
Véronique Cortier and Georg Fuchsbauer and David Galindo
2015/628 ( PDF )
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
Daniel Cabarcas and Denise Demirel and Florian Göpfert and Jean Lancrenon and Thomas Wunderer
2015/627 ( PDF )
On Necessary Padding with IO
Justin Holmgren
2015/626 ( PDF )
Practical Round-Optimal Blind Signatures in the Standard Model
Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
2015/625 ( PDF )
Ed448-Goldilocks, a new elliptic curve
Mike Hamburg
2015/624 ( PDF )
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff
2015/623 ( PDF )
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand
2015/622 ( PDF )
Random Digit Representation of Integers
Nicolas Méloni and M. Anwar Hasan
2015/621 ( PDF )
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
Sarani Bhattacharya, Debdeep Mukhopadhyay
2015/620 ( PDF )
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions
Susumu Kiyoshima
2015/619 ( PDF )
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
Seher Tutdere and Osmanbey Uzunkol
2015/618 ( PDF )
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
Juan Carlos Ku-Cauich  Guillermo Morales-Luna  Horacio Tapia-Recillas
2015/617 ( PDF )
Generalised tally-based decoders for traitor tracing and group testing
Boris Skoric and Wouter de Groot
2015/616 ( PDF )
The leaking battery: A privacy analysis of the HTML5 Battery Status API
Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia Diaz
2015/615 ( PDF )
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati
2015/614 ( PDF )
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
Fangguo Zhang
2015/613 ( PDF )
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei
2015/612 ( PDF )
The Simeck Family of Lightweight Block Ciphers
Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong
2015/611 ( PDF )
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Shijun Zhao and Qianying Zhang
2015/610 ( PDF )
McBits: fast constant-time code-based cryptography
Daniel J. Bernstein and Tung Chou and Peter Schwabe
2015/609 ( PDF )
Experimental Study of DIGIPASS GO3 and the Security of Authentication
Igor Semaev
2015/608 ( -- withdrawn -- )
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Benoit Libert and Damien Stehle
2015/607 ( PDF )
Netcoin - A Traceable P2P Electronic Cash System
Hitesh Tewari and Eamon O Nuallain
2015/606 ( PDF )
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon
2015/605 ( PDF )
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm
Steven D. Galbraith and Ping Wang and Fangguo Zhang
2015/604 ( PDF )
Structure-Preserving Signatures from Standard Assumptions, Revisited
Eike Kiltz and Jiaxin Pan and Hoeteck Wee
2015/603 ( PDF )
Complementary Dual Codes for Counter-measures to Side-Channel Attacks
Claude Carlet and Sylvain Guilley
2015/602 ( PDF )
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhay
2015/601 ( PDF )
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
Mei Wang, Zheng Yuan,Xiao Feng
2015/600 ( PDF )
Predictive Models for Min-Entropy Estimation
John Kelsey and Kerry A. McKay and Meltem Sonmez Turan
2015/599 ( PDF )
The Chain Rule for HILL Pseudoentropy, Revisited
Krzysztof Pietrzak and Maciej Skorski
2015/598 ( PDF )
Combining Differential Privacy and Secure Multiparty Computation
Martin Pettai and Peeter Laud
2015/597 ( PDF )
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
Amir Moradi and Alexander Wild
2015/596 ( PDF )
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations
Jean-Sebastien Coron and Craig Gentry and Shai Halevi and Tancrede Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi
2015/595 ( -- withdrawn -- )
Differential Fault Intensity Analysis
Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa Taha and Patrick Schaumont
2015/594 ( PDF )
Disk Encryption: Do We Need to Preserve Length?
Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
2015/593 ( PDF )
A Physical Approach for Stochastic Modeling of TERO-based TRNG
Patrick HADDAD and Viktor FISCHER and Florent BERNARD and Jean NICOLAI
2015/592 ( PDF )
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel
2015/591 ( PDF )
How much randomness can be extracted from memoryless Shannon entropy sources?
Maciej Skorski
2015/590 ( PDF )
TriviA: A Fast and Secure Authenticated Encryption Scheme
Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
2015/589 ( PDF )
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
A.-M. Leventi-Peetz and J.-V. Peetz
2015/588 ( PDF )
An analysis of the $C$ class of bent functions
Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic
2015/587 ( PDF )
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Trupil Limbasiya and Nishant Doshi
2015/586 ( PDF )
SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System
Yuan Zhang and Chunxiang Xu and Shui Yu and Hongwei Li and Xiaojun Zhang
2015/585 ( PDF )
SIMON and SPECK: Block Ciphers for the Internet of Things
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2015/584 ( PDF )
How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Denise Demirel and Jean Lancrenon
2015/583 ( PDF )
Secure Key Generation from Biased PUFs
Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems
2015/582 ( PDF )
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita-Rotaru
2015/581 ( PDF )
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation
Christina Brzuska and Arno Mittelbach
2015/580 ( PDF )
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss
2015/579 ( PDF )
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
Mridul Nandi
2015/578 ( PDF )
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun
2015/577 ( PDF )
Twist Insecurity
Manfred Lochter, Andreas Wiemers
2015/576 ( PDF )
The Carnac protocol -- or how to read the contents of a sealed envelope
Michael Scott and Brian Spector
2015/575 ( PDF )
Known-key Distinguisher on Full PRESENT
Céline Blondeau and Thomas Peyrin and Lei Wang
2015/574 ( PDF )
Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
2015/573 ( PDF )
Last fall degree, HFE, and Weil descent attacks on ECDLP
Ming-Deh A. Huang and Michiel Kosters and Sze Ling Yeo
2015/572 ( PDF )
On Public Key Encryption from Noisy Codewords
Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi
2015/571 ( PDF )
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
Tobias Schneider and Amir Moradi and Tim Güneysu
2015/570 ( PDF )
Constant Communication ORAM with Small Blocksize
Tarik Moataz and Travis Mayberry and Erik-Oliver Blass
2015/569 ( PDF )
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2015/568 ( PDF )
Cryptanalysis of Reduced-Round Whirlwind (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2015/567 ( PDF )
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
Henri Gilbert and Jérôme Plût and Joana Treger
2015/566 ( PDF )
A Framework for Identity-Based Encryption with Almost Tight Security
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/565 ( PDF )
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
Craig Costello and Patrick Longa
2015/564 ( PDF )
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Victor Costan and Ilia Lebedev and Srinivas Devadas
2015/563 ( PDF )
Privacy in the Genomic Era
Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang
2015/562 ( PDF )
PUDA – Privacy and Unforgeability for Data Aggregation
Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/561 ( PDF )
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J. Longo and E. De Mulder and D. Page and M. Tunstall
2015/560 ( PDF )
Generic Construction of UC-Secure Oblivious Transfer
Olivier Blazy and Céline Chevalier
2015/559 ( PDF )
Concurrent Secure Computation with Optimal Query Complexity
Ran Canetti and Vipul Goyal and Abhishek Jain
2015/558 ( PDF )
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
2015/557 ( PDF )
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
Takanori Isobe and Kyoji Shibutani
2015/556 ( PDF )
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates
Sujoy Sinha Roy and Kimmo Järvinen and Ingrid Verbauwhede
2015/555 ( PDF )
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
Tapas Pandit and Sumit Kumar Pandey and Rana Barua
2015/554 ( PDF )
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
2015/553 ( PDF )
Round-Optimal Black-Box Two-Party Computation
Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro
2015/552 ( PDF )
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
Paul Kirchner and Pierre-Alain Fouque
2015/551 ( PDF )
Quantum homomorphic encryption for circuits of low $T$-gate complexity
Anne Broadbent and Stacey Jeffery
2015/550 ( PDF )
Upending Stock Market Structure Using Secure Multi-Party Computation
Charanjit S. Jutla
2015/549 ( PDF )
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices
Amir Hassani Karbasi, Reza Ebrahimi Atani
2015/548 ( PDF )
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
2015/547 ( PDF )
Secure Computation of MIPS Machine Code
Xiao Shaun Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz
2015/546 ( PDF )
Actively Secure OT Extension with Optimal Overhead
Marcel Keller and Emmanuela Orsini and Peter Scholl
2015/545 ( PDF )
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
Qinglong Zhang and Zongbin Liu and and Cunqing Ma and Changting Li and Jiwu Jing
2015/544 ( PDF )
Alternative cubics' rules with an algebraic appeal
Daniel R. L. Brown
2015/543 ( PDF )
Bloom Filters in Adversarial Environments
Moni Naor and Eylon Yogev
2015/542 ( PDF )
Improved Side-Channel Analysis of Finite-Field Multiplication
Sonia Belaïd and Jean-Sébastien Coron and Pierre-Alain Fouque and Benoît Gérard and Jean-Gabriel Kammerer and Emmanuel Prouff
2015/541 ( PDF )
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Bart Mennink and Reza Reyhanitabar and Damian Vizár
2015/540 ( PDF )
PICO: An Ultra lightweight and Low power encryption design for pervasive computing
Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil
2015/539 ( PDF )
Tweaking Even-Mansour Ciphers
Benoît Cogliati and Rodolphe Lampe and Yannick Seurin
2015/538 ( PDF )
Pairing Based Mutual Healing in Wireless Sensor Networks
Sarita Agrawal and Jay Patel and Manik Lal Das
2015/537 ( PDF )
Towards Easy Leakage Certification
François Durvaux and François-Xavier Standaert
2015/536 ( PDF )
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
François Durvaux and François-Xavier Standaert
2015/535 ( PDF )
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Vincent Grosso and François-Xavier Standaert
2015/534 ( PDF )
Problems, solutions and experience of the first international student's Olympiad in cryptography
Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia Tokareva and Valeria Vitkup
2015/533 ( PDF )
Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
Xiaoshuang Ma and Kexin Qiao
2015/531 ( PDF )
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
Mohammad Hajiabadi, Bruce M. Kapron
2015/530 ( PDF )
Practical Free-Start Collision Attacks on 76-step SHA-1
Pierre Karpman and Thomas Peyrin and Marc Stevens
2015/529 ( PDF )
Power Analysis Attacks against IEEE 802.15.4 Nodes
Colin O'Flynn and Zhizhang Chen
2015/528 ( PDF )
Spacecoin: A Cryptocurrency Based on Proofs of Space
Sunoo Park and Krzysztof Pietrzak and Joël Alwen and Georg Fuchsbauer and Peter Gazi
2015/527 ( PDF )
Robust Profiling for DPA-Style Attacks
Carolyn Whitnall and Elisabeth Oswald
2015/526 ( PDF )
Generic Key Recovery Attack on Feistel Scheme
Takanori Isobe and Kyoji Shibutani
2015/525 ( PDF )
Short Randomizable Signatures
David Pointcheval and Olivier Sanders
2015/524 ( PDF )
Secure Key Exchange Protocol based on Virtual Proof of Reality
Yansong Gao
2015/523 ( PDF )
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai
2015/522 ( PDF )
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search
Anja Becker, Nicolas Gama, Antoine Joux
2015/521 ( PDF )
Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency
Sergey Gorbunov and Silvio Micali
2015/520 ( PDF )
A Constant Time, Single Round, Attribute-Based Authenticated Key Exchange in Random Oracle Model
Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
2015/519 ( PDF )
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
Yongge Wang
2015/518 ( PDF )
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
Ren Zhang
2015/517 ( PDF )
Subversion-Resilient Signature Schemes
Giuseppe Ateniese and Bernardo Magri and Daniele Venturi
2015/516 ( PDF )
Key-Recovery Attacks on ASASA
Brice Minaud and Patrick Derbez and Pierre-Alain Fouque and Pierre Karpman
2015/515 ( PDF )
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
Thomas Espitau and Pierre-Alain Fouque and Pierre Karpman
2015/514 ( PDF )
Time-Lock Puzzles from Randomized Encodings
Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters
2015/513 ( PDF )
Computing Individual Discrete Logarithms Faster in $GF(p^n)$
Aurore Guillevic
2015/512 ( PDF )
Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply
Sami Saab, Andrew Leiserson, and Michael Tunstall
2015/511 ( PDF )
Near Collision Side Channel Attacks
Baris Ege and Thomas Eisenbarth and Lejla Batina
2015/510 ( PDF )
Equivoe-T: Transposition Equivocation Cryptography
Gideon Samid
2015/509 ( PDF )
A flaw in a theorem about Schnorr signatures
Daniel R. L. Brown
2015/508 ( PDF )
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra
2015/507 ( PDF )
Decomposing the ASASA Block Cipher Construction
Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander
2015/506 ( PDF )
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire
2015/505 ( PDF )
The Tower Number Field Sieve
Razvan Barbulescu and Pierrick Gaudry and Thorsten Kleinjung
2015/504 ( PDF )
The Iterated Random Permutation Problem with Applications to Cascade Encryption
Brice Minaud and Yannick Seurin
2015/503 ( PDF )
The Norwegian Internet Voting Protocol: A new Instantiation
Kristian Gjøsteen and Anders Smedstuen Lund
2015/502 ( PDF )
Centrally Banked Cryptocurrencies
George Danezis and Sarah Meiklejohn
2015/501 ( PDF )
Multi-Prover Commitments Against Non-Signaling Attacks
Serge Fehr and Max Fillinger
2015/500 ( PDF )
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure
Alberto Battistello and Christophe Giraud
2015/499 ( PDF )
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
Dennis Hofheinz
2015/498 ( PDF )
Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Jiajun Zhang and Haining Fan
2015/497 ( PDF )
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost
Zhangxiang Hu and Payman Mohassel and Mike Rosulek
2015/496 ( PDF )
Quantifying Location Privacy Leakage from Transaction Prices
Arthur Gervais and Hubert Ritzdorf and Mario Lucic and Srdjan Capkun
2015/495 ( PDF )
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
Sondre Rønjom
2015/494 ( -- withdrawn -- )
Cryptanalysis of the LSH and SHA-V Hash Functions
Yonglin Hao and Hongbo Yu
2015/493 ( PDF )
Fault Tolerant Infective Countermeasure for AES
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay
2015/492 ( PDF )
Masking vs. Multiparty Computation: How Large is the Gap for AES?
Vincent Grosso and François-Xavier Standaert and Sebastian Faust
2015/491 ( PDF )
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
Nishanth Chandran and Melissa Chase and Feng-Hao Liu and Ryo Nishimaki and Keita Xagawa
2015/490 ( PDF )
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Sonam Devgan Kaul and Amit K. Awasthi
2015/489 ( PDF )
Scalable and private media consumption with Popcorn
Trinabh Gupta and Natacha Crooks and Srinath Setty and Lorenzo Alvisi and Michael Walfish
2015/488 ( PDF )
On Black-Box Complexity of Universally Composable Security in the CRS model
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/487 ( PDF )
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs and Stefano Tessaro
2015/486 ( PDF )
How to detect unauthorised usage of a key
Jiangshan Yu and Mark Ryan and Cas Cremers
2015/485 ( PDF )
Turning Online Ciphers Off
Elena Andreeva and Guy Barwell and Dan Page and Martijn Stam
2015/484 ( PDF )
More Rounds, Less Security?
Ritam Bhaumik and Avijit Dutta and Jian Guo and Jérémy Jean and Nicky Mouha and Ivica Nikolić
2015/483 ( PDF )
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Shi Bai and Adeline Langlois and Tancrède Lepoint and Damien Stehlé and Ron Steinfeld
2015/482 ( PDF )
Time-release Protocol from Bitcoin and Witness Encryption for SAT
Jia Liu and Flavio Garcia and Mark Ryan
2015/481 ( PDF )
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers
Theodosis Mourouzis and Guangyan Song and Nicolas Courtois and Michalis Christofii
2015/480 ( PDF )
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
Berry Schoenmakers, Meilof Veeningen, and Niels de Vreede
2015/479 ( PDF )
A Provably Secure Group Signature Scheme from Code-Based Assumptions
Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang
2015/478 ( PDF )
How to Build Time-Lock Encryption
Tibor Jager
2015/477 ( PDF )
Authentication Key Recovery in Galois/Counter Mode (GCM)
John Mattsson
2015/476 ( PDF )
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
Bart Mennink
2015/475 ( PDF )
Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences
Eleonora Guerrini and Laurent Imbert and Théo Winterhalter
2015/474 ( PDF )
Fully Homomorphic Encryption without bootstrapping
Masahiro Yagisawa
2015/473 ( PDF )
VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS
Mehak Khurana and Meena Kumari
2015/472 ( PDF )
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer
Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart
2015/471 ( PDF )
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott
2015/470 ( PDF )
On the power of Public-key Functional Encryption with Function Privacy
Vincenzo Iovino and Karol Zebrowski
2015/469 ( PDF )
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
Andrew Miller and Rob Jansen
2015/468 ( PDF )
Practical Fully Homomorphic Encryption without Noise Reduction
Dongxi Liu
2015/467 ( PDF )
The Oblivious Machine - or: How to Put the C into MPC
Marcel Keller
2015/466 ( PDF )
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang
2015/465 ( PDF )
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
Hwajeong Seo and Zhe Liu and Johann Groschadl and Howon Kim
2015/464 ( PDF )
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Florian Tschorsch and Björn Scheuermann
2015/463 ( PDF )
Multilinear Maps Using Random Matrix
Gu Chunsheng
2015/462 ( PDF )
Accelerating SWHE based PIRs using GPUs
Wei Dai, Yarkın Doröz and Berk Sunar
2015/461 ( PDF )
Cryptanalysis of the multilinear map on the ideal lattices
Jung Hee Cheon and Changmin Lee
2015/460 ( PDF )
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi
2015/459 ( PDF )
New Observation on Division Property
Bing Sun and Xin Hai and Wenyu Zhang and Lei Cheng and Zhichao Yang
2015/458 ( PDF )
A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS
Sheena Sathyan and Shaji R S Professor
2015/457 ( PDF )
Generic Conversions from CPA to CCA secure Functional Encryption
Mridul Nandi and Tapas Pandit
2015/456 ( PDF )
Collateral damage of Facebook Apps: an enhanced privacy scoring model
Iraklis Symeonids, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel
2015/455 ( PDF )
Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu and N.Asokan and Benny Pinkas
2015/454 ( PDF )
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO
Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
2015/453 ( PDF )
An Optimization of Gu Map-1
Yupu Hu and Huiwen Jia
2015/452 ( PDF )
Masks will Fall Off -- Higher-Order Optimal Distinguishers
Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul
2015/451 ( PDF )
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
Sihong Su and Xiaohu Tang
2015/450 ( PDF )
Adaptively Secure Computation with Partial Erasures
Carmit Hazay and Yehuda Lindell and Arpita Patra
2015/449 ( PDF )
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions
Ruoxin Zhao and Rui Zhang and Yongqiang Li and Baofeng Wu
2015/448 ( PDF )
A Comment on Gu Map-1
Yupu Hu and Huiwen Jia
2015/447 ( PDF )
A New Model for Error-Tolerant Side-Channel Cube Attacks
Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede
2015/446 ( PDF )
On the Amortized Complexity of Zero-knowledge Protocols
Ronald Cramer and Ivan Damgård and Marcel Keller
2015/445 ( PDF )
XLS is not a Strong Pseudorandom Permutation
Mridul Nandi
2015/444 ( PDF )
Revisiting Security Claims of XLS and COPA
Mridul Nandi
2015/443 ( PDF )
Security Evaluation and Enhancement of Bistable Ring PUFs
Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, and Wayne Burleson
2015/442 ( PDF )
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
2015/441 ( PDF )
FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
Devu Manikantan Shila and Vivek Venugopalan and Cameron D Patterson
2015/440 ( PDF )
Message-Locked Encryption for Lock-Dependent Messages
Martín Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev
2015/439 ( PDF )
On Concurrently Secure Computation in the Multiple Ideal Query Model
Vipul Goyal and Abhishek Jain
2015/438 ( PDF )
A Hybrid Approach for Proving Noninterference of Java Programs
Ralf Kuesters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr
2015/437 ( PDF )
A Note on the Unsoundness of vnTinyRAM's SNARK
Bryan Parno
2015/436 ( PDF )
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks
Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
2015/435 ( PDF )
On the (Fast) Algebraic Immunity of Boolean Power Functions
Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
2015/434 ( PDF )
Dickson Polynomials that are Involutions
Pascale Charpin and Sihem Mesnager and Sumanta Sarkar
2015/433 ( PDF )
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
Wentao Zhang and. Zhenzhen Bao and. Vincent Rijmen and. Meicheng Liu
2015/432 ( -- withdrawn -- )
Non-Repudiable Proofs of Storage in Cloud
Hongyuan Wang and Liehuang Zhu and Yijia Lilong and Chang Xu
2015/431 ( PDF )
Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung and Goichiro Hanaoka and Shota Yamada
2015/430 ( PDF )
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
Alex Biryukov and Daniel Dinu and Dmitry Khovratovich
2015/429 ( PDF )
Cryptanalysis of Round-Reduced LED
Ivica Nikolić and Lei Wang and Shuang Wu
2015/428 ( PDF )
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
Philipp Jovanovic and Samuel Neves
2015/427 ( PDF )
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Mudit Bhargava and Ken Mai
2015/426 ( PDF )
Complementing Feistel Ciphers
Alex Biryukov and Ivica Nikolic
2015/425 ( PDF )
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
Stefan Heyse and Ingo von Maurich and Tim Güneysu
2015/424 ( PDF )
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Begül Bilgin and Andrey Bogdanov and Miroslav Knežević and Florian Mendel and Qingju Wang
2015/423 ( PDF )
On the Implementation of Unified Arithmetic on Binary Huff Curves
Santosh Ghosh, Amit Kumar, Amitabh Das and Ingrid Verbauwhede
2015/422 ( PDF )
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
Marina Blanton and Fattaneh Bayatbabolghani
2015/421 ( PDF )
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism
Zhe Liu and Husen Wang and Johann Großschädl and Zhi Hu and Ingrid Verbauwhede
2015/420 ( PDF )
What Information is Leaked under Concurrent Composition?
Vipul Goyal and Divya Gupta and Abhishek Jain
2015/419 ( PDF )
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava
2015/418 ( PDF )
Optimized Interpolation Attacks on LowMC
Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang
2015/417 ( PDF )
Order-Revealing Encryption and the Hardness of Private Learning
Mark Bun and Mark Zhandry
2015/416 ( PDF )
HETest: A Homomorphic Encryption Testing Framework
Mayank Varia and Sophia Yakoubov and Yang Yang
2015/415 ( PDF )
STRIBOB / WHIRLBOB Security Analysis Addendum
Markku-Juhani O. Saarinen
2015/414 ( PDF )
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
Mridul Nandi
2015/413 ( PDF )
A study of Pair Encodings: Predicate Encryption in prime order groups
Shashank Agrawal and Melissa Chase
2015/412 ( PDF )
Survey on Cryptographic Obfuscation
Máté Horváth
2015/411 ( PDF )
Side-Channel Analysis of MAC-Keccak Hardware Implementations
Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser
2015/410 ( PDF )
Efficient Ring-LWE Encryption on 8-bit AVR Processors
Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Großschädl and Howon Kim and Ingrid Verbauwhede
2015/409 ( PDF )
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
Jie Chen and Romain Gay and Hoeteck Wee
2015/408 ( PDF )
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
Franck Rondepierre
2015/407 ( PDF )
Higher-order cryptanalysis of LowMC
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/406 ( PDF )
Computation-Trace Indistinguishability Obfuscation and its Applications
Yu-Chi Chen and Sherman S. M. Chow and Kai-Min Chung and Russell W. F. Lai and Wei-Kai Lin and Hong-Sheng Zhou
2015/405 ( PDF )
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schröder
2015/404 ( PDF )
Zero-Knowledge Accumulators and Set Operations
Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos
2015/403 ( PDF )
Sequential Secret Sharing as a New Hierarchical Access Structure
Mehrdad Nojoumian and Douglas R. Stinson
2015/402 ( PDF )
Success through confidence: Evaluating the effectiveness of a side-channel attack
Adrian Thillard and Emmanuel Prouff and Thomas Roche
2015/401 ( PDF )
Simple Chosen-Ciphertext Security from Low-Noise LPN
Eike Kiltz and Daniel Masny and Krzysztof Pietrzak
2015/400 ( PDF )
Expiration and Revocation of Keys for Attribute-based Signatures (Full Version)
Stephen R. Tate and Roopa Vishwanathan
2015/399 ( PDF )
New attacks on RSA with Moduli $N=p^rq$
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/398 ( PDF )
Factoring RSA moduli with weak prime factors
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/397 ( PDF )
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
Peter Gazi and Jooyoung Lee and Yannick Seurin and John Steinberger and Stefano Tessaro
2015/396 ( PDF )
Generalizing Homomorphic MACs for Arithmetic Circuits
Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo
2015/395 ( PDF )
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys
Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schröder and Mark Simkin
2015/394 ( PDF )
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
2015/393 ( PDF )
Biclique cryptanalysis of MIBS-80 and PRESENT-80
Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba
2015/392 ( PDF )
Forgery Attacks on round-reduced ICEPOLE-128
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/391 ( PDF )
On the Communication Complexity of Secure Computation
Deepesh Data and Manoj M. Prabhakaran and Vinod M. Prabhakaran
2015/390 ( PDF )
Dual System Encryption Framework in Prime-Order Groups
Nuttapong Attrapadung
2015/389 ( PDF )
Keccak
Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
2015/388 ( PDF )
Succinct Garbled RAM
Ran Canetti and Justin Holmgren
2015/387 ( PDF )
Method to Protect Passwords in Databases for Web Applications
Scott Contini
2015/386 ( PDF )
Privately Evaluating Decision Trees and Random Forests
David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter
2015/385 ( PDF )
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas
2015/384 ( PDF )
Condensed Unpredictability
Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak
2015/383 ( PDF )
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
Rafael Pass and abhi shelat
2015/382 ( PDF )
High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers
Thomas Pöppelmann and Tobias Oder and Tim Güneysu
2015/381 ( PDF )
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
Sumit Chakraborty
2015/380 ( PDF )
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
Céline Blondeau and Aslí Bay and Serge Vaudenay
2015/379 ( PDF )
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
2015/378 ( PDF )
PAC Learning of Arbiter PUFs
Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
2015/377 ( PDF )
Cluster Computing in Zero Knowledge
Alessandro Chiesa and Eran Tromer and Madars Virza
2015/375 ( PDF )
Bounds on surmising remixed keys
Daniel R. L. Brown
2015/374 ( PDF )
On the Impossibility of Tight Cryptographic Reductions
Christoph Bader and Tibor Jager and Yong Li and Sven Schäge
2015/373 ( PDF )
Publicly Verifiable Software Watermarking
Aloni Cohen and Justin Holmgren and Vinod Vaikuntanathan
2015/372 ( PDF )
Security Analysis of PRINCE
Jeremy Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu
2015/371 ( PDF )
Constant-Round MPC with Fairness and Guarantee of Output Delivery
S. Dov Gordon and Feng-Hao Liu and Elaine Shi
2015/370 ( PDF )
Financial Cryptography: Discriminatory Pricing Mechanism
Sumit Chakraborty
2015/369 ( PDF )
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
Nir Bitansky and Omer Paneth
2015/368 ( PDF )
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
Evgeny Sidorov
2015/367 ( PDF )
Improved Higher-Order Differential Attacks on MISTY1
Achiya Bar-On
2015/366 ( PDF )
A random zoo: sloth, unicorn, and trx
Arjen K. Lenstra and Benjamin Wesolowski
2015/365 ( PDF )
On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
2015/364 ( PDF )
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
Qiang Tang and Jun Wang
2015/363 ( PDF )
Optimally Secure Tweakable Blockciphers
Bart Mennink
2015/360 ( PDF )
Achieving Differential Privacy with Bias-Control Limited Source
Yanqing Yao, Zhoujun Li
2015/355 ( PDF )
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni and Andreas Hülsing and Christian Schaffner
2015/353 ( PDF )
Matrix Computational Assumptions in Multilinear Groups
Paz Morillo and Carla Ràfols and Jorge L. Villar
2015/351 ( PDF )
Database Outsourcing with Hierarchical Authenticated Data Structures
Mohammad Etemad and Alptekin Küpçü
2015/348 ( PDF )
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation
An­dre­as Gor­nik and Amir Mo­ra­di and Jür­gen Oehm and Chris­tof Paar
2015/345 ( PDF )
Two Round Mutliparty Computation via Multi-Key FHE
Pratyay Mukherjee and Daniel Wichs
2015/344 ( PDF )
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
Ryo Nishimaki and Daniel Wichs
2015/342 ( PDF )
Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext
Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo
2015/341 ( PDF )
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
Gilad Asharov and Gil Segev
2015/337 ( PDF )
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
Sujoy Sinha Roy and Kimmo Järvinen and Frederik Vercauteren and Vassil Dimitrov and Ingrid Verbauwhede
2015/335 ( PDF )
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2015/334 ( PDF )
On the Correlation Intractability of Obfuscated Pseudorandom Functions
Ran Canetti and Yilei Chen and Leonid Reyzin
2015/332 ( PDF )
Security Intelligence for Broadcast : Threat Analytics
Sumit Chakraborty
2015/329 ( PDF )
PAGES - A Family of Block Ciiphers
Dieter Schmidt
2015/324 ( PDF )
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys
Divesh Aggarwal and Alexander Golovnev
2015/323 ( -- withdrawn -- )
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange
Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan
2015/321 ( -- withdrawn -- )
Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles
Paolo D'Arco and Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Clauido Soriente
2015/320 ( PDF )
Hybrid Publicly Verifiable Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2015/315 ( PDF )
Query-Complexity Amplification for Random Oracles
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2015/313 ( PDF )
Recovering Short Generators of Principal Ideals in Cyclotomic Rings
Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev
2015/311 ( PDF )
Tagged One-Time Signatures: Tight Security and Optimal Tag Size
Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo
2015/309 ( PDF )
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
2015/308 ( PDF )
Authenticated Key Exchange over Bitcoin
Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao
2015/307 ( PDF )
Black-Box Garbled RAM
Sanjam Garg and Steve Lu and Rafail Ostrovsky
2015/303 ( PDF )
The Design Space of Lightweight Cryptography
Nicky Mouha
2015/301 ( PDF )
Cryptanalysis of GGH Map
Yupu Hu and Huiwen Jia
2015/298 ( PDF )
Random Linear Code Based Public Key Encryption Scheme RLCE
Yongge Wang
2015/290 ( PDF )
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Joseph A. Akinyele and Christina Garman and Susan Hohenberger
2015/289 ( PDF )
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
Muhammed F. Esgin and Orhun Kara
2015/281 ( PDF )
Secret Sharing and Statistical Zero Knowledge
Vinod Vaikuntanathan and Prashant Nalini Vasudevan
2015/275 ( PDF )
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems
Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai
2015/269 ( PDF )
Ideal Multilinear Maps Based on Ideal Lattices
Gu Chunsheng
2015/267 ( PDF )
The Simplest Protocol for Oblivious Transfer
Tung Chou and Claudio Orlandi
2015/266 ( PDF )
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
2015/264 ( PDF )
BlindBox: Deep Packet Inspection over Encrypted Traffic
Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy
2015/263 ( PDF )
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
Ethan Heilman. Alison Kendler, Aviv Zohar, Sharon Goldberg
2015/258 ( PDF )
Lightweight MDS Involution Matrices
Siang Meng Sim and Khoongming Khoo and Frédérique Oggier and Thomas Peyrin
2015/247 ( PDF )
Subgroup security in pairing-based cryptography
Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and Geovandro C. C. F. Pereira and Gustavo Zanon
2015/246 ( PDF )
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee
2015/243 ( PDF )
Reliable Message Transmission under Partial Knowledge
Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
2015/235 ( PDF )
Performance and Security Improvements for Tor: A Survey
Mashael AlSabah and Ian Goldberg
2015/233 ( PDF )
Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
Ben Smyth and Steven Frink and Michael R. Clarkson
2015/232 ( PDF )
Cryptanalysis of Full Sprout
Virginie Lallemand and María Naya-Plasencia
2015/230 ( PDF )
W-SPS: Designing a Wide-Area Secure Positioning System
Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun
2015/229 ( PDF )
Improving GGH Public Key Scheme Using Low Density Lattice Codes
Reza Hooshmand
2015/227 ( PDF )
Tradeoff Cryptanalysis of Memory-Hard Functions
Alex Biryukov and Dmitry Khovratovich
2015/225 ( PDF )
Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/224 ( PDF )
GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records
Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder
2015/221 ( PDF )
Tighter, faster, simpler side-channel security evaluations beyond computing power
Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal
2015/211 ( PDF )
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
Thijs Laarhoven and Benne de Weger
2015/210 ( PDF )
Secure and Efficient Initialization and Authentication Protocols for SHIELD
Chenglu Jin and Marten van Dijk
2015/209 ( PDF )
Triathlon of Lightweight Block Ciphers for the Internet of Things
Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Léo Perrin and Johann Großschädl and Alex Biryukov
2015/207 ( PDF )
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
Tobias Schneider and Amir Moradi
2015/206 ( PDF )
Efficient and Secure Delegation of Group Exponentiation to a Single Server
Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain
2015/202 ( PDF )
Adaptively Secure Coin-Flipping, Revisited
Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park
2015/197 ( PDF )
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
N. Nalla Anandakumar
2015/189 ( PDF )
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Vizár
2015/188 ( PDF )
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2015/181 ( PDF )
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda Alkhzaimi and Chao Li
2015/178 ( PDF )
On Time and Order in Multiparty Computation
Pablo Daniel Azar and Shafi Goldwasser and Sunoo Park
2015/176 ( PDF )
Key Recovery for LWE in Polynomial Time
Kim Laine and Kristin Lauter
2015/173 ( PDF )
Indistinguishability Obfuscation from Compact Functional Encryption
Prabhanjan Ananth and Abhishek Jain
2015/167 ( PDF )
Post-Zeroizing Obfuscation: The case of Evasive Circuits
Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry
2015/163 ( PDF )
Indistinguishability Obfuscation from Functional Encryption
Nir Bitansky and Vinod Vaikuntanathan
2015/162 ( PDF )
New Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2015/158 ( PDF )
Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Zvika Brakerski and Ilan Komargodski and Gil Segev
2015/157 ( PDF )
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Nuttapong Attrapadung and Shota Yamada
2015/155 ( PDF )
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor
2015/153 ( PDF )
Functional Encryption from (Small) Hardware Tokens
Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou
2015/150 ( PDF )
Insynd: Privacy-Preserving Transparency Logging Using Balloons
Tobias Pulls and Roel Peeters
2015/145 ( PDF )
Observations on the SIMON block cipher family
Stefan Kölbl and Gregor Leander and Tyge Tiessen
2015/143 ( PDF )
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs
Erich Wenger and Paul Wolfger
2015/140 ( PDF )
The Random Oracle Model: A Twenty-Year Retrospective
Neal Koblitz and Alfred Menezes
2015/134 ( PDF )
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions
Pierre Karpman
2015/121 ( PDF )
Multi-Client Oblivious RAM secure against Malicious Servers
Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
2015/107 ( PDF )
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
Attila A. Yavuz and Jorge Guajardo
2015/106 ( PDF )
Provably weak instances of Ring-LWE
Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
2015/104 ( PDF )
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Rafael Dowsley and Jörn Müller-Quade and Tobias Nilges
2015/101 ( PDF )
Multi-Key Security: The Even-Mansour Construction Revisited
Nicky Mouha and Atul Luykx
2015/099 ( PDF )
Universally Composable Firewall Architectures using Trusted Hardware
Dirk Achenbach and Jörn Müller-Quade and Jochen Rill
2015/093 ( PDF )
Generalization of Statistical Criteria for Sboxes
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
2015/090 ( PDF )
Structural Evaluation by Generalized Integral Property
Yosuke Todo
2015/088 ( PDF )
Structural Weaknesses in the Open Smart Grid Protocol
Klaus Kursawe and Christiane Peters
2015/083 ( PDF )
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
Massimo Chenal and Qiang Tang
2015/077 ( PDF )
On the Primary Constructions of Vectorial Boolean Bent Functions
Yuwei Xu and Chuankun Wu
2015/069 ( PDF )
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
Benoît Cogliati and Yannick Seurin
2015/058 ( PDF )
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
Berry Schoenmakers and Meilof Veeningen
2015/056 ( PDF )
Better Algorithms for LWE and LWR
Alexandre Duc and Florian Tramèr and Serge Vaudenay
2015/053 ( PDF )
Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/046 ( PDF )
On the concrete hardness of Learning with Errors
Martin R. Albrecht and Rachel Player and Sam Scott
2015/040 ( PDF )
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/034 ( PDF )
Suit up! Made-to-Measure Hardware Implementations of Ascon
Hannes Groß and Erich Wenger and Christoph Dobraunig and Christoph Ehrenhöfer
2015/023 ( PDF )
Multilinear Maps Using Ideal Lattices without Encodings of Zero
Gu Chunsheng
2015/017 ( PDF )
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
2015/008 ( PDF )
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Satrajit Ghosh and Aniket Kate
2015/007 ( PDF )
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Tobias Pulls and Roel Peeters
2015/006 ( PDF )
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Jan Camenisch and Robert R. Enderlein and Gregory Neven
2015/005 ( PDF )
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs
2014/1029 ( PDF )
On the Cryptographic Hardness of Finding a Nash Equilibrium
Nir Bitansky and Omer Paneth and Alon Rosen
2014/1026 ( PDF )
Lattices with Symmetry
H. W. Lenstra, Jr. and A. Silverberg
2014/1025 ( PDF )
XPIR: Private Information Retrieval for Everyone
Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian
2014/1020 ( PDF )
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
2014/1004 ( PDF )
CONIKS: Bringing Key Transparency to End Users
Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
2014/1001 ( -- withdrawn -- )
Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE
Xiaopeng Yang, Wenping Ma, and Chengli Zhang
2014/998 ( PDF )
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
Gus Gutoski and Douglas Stebila
2014/997 ( PDF )
Constants Count: Practical Improvements to Oblivious RAM
Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas
2014/977 ( PDF )
A Survey on Lightweight Entity Authentication with Strong PUFs
Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede
2014/972 ( PDF )
A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Haining Fan
2014/967 ( PDF )
A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
Maciej Skorski
2014/946 ( PDF )
On a new fast public key cryptosystem
Samir Bouftass
2014/943 ( PDF )
HaTCh: A Formal Framework of Hardware Trojan Design and Detection
Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk
2014/936 ( PDF )
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
2014/934 ( PDF )
Efficient Generic Zero-Knowledge Proofs from Commitments
Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias
2014/930 ( PDF )
Immunizing Multilinear Maps Against Zeroizing Attacks
Dan Boneh and David J. Wu and Joe Zimmerman
2014/928 ( PDF )
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois
2014/926 ( PDF )
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Keita Emura and Takuya Hayashi
2014/914 ( PDF )
Cryptography with One-Way Communication
Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2014/911 ( PDF )
A Denial of Service Attack against Fair Computations using Bitcoin Deposits
Jethro Beekman
2014/896 ( PDF )
Efficiently Making Secure Two-Party Computation Fair
Handan Kılınç and Alptekin Küpçü
2014/885 ( PDF )
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
Marios O. Choudary and Markus G. Kuhn
2014/881 ( PDF )
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2014/869 ( PDF )
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Werner Schindler
2014/866 ( -- withdrawn -- )
Self-Destruct Non-Malleability
Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
2014/865 ( PDF )
Impossibility of Black-Box Simulation Against Leakage Attacks
Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
2014/857 ( PDF )
Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
2014/847 ( PDF )
Reflections on Slide with a Twist Attacks
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2014/838 ( PDF )
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan
2014/834 ( PDF )
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman
2014/833 ( PDF )
Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability
Essam Ghadafi
2014/831 ( PDF )
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean and Ivica Nikolić and Thomas Peyrin
2014/825 ( -- withdrawn -- )
Towards Optimal Bounds for Implicit Factorization Problem
Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin
2014/822 ( PDF )
Ballot secrecy with malicious bulletin boards
David Bernhard and Ben Smyth
2014/821 ( PDF )
Non-malleable Reductions and Applications
Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski
2014/819 ( PDF )
Riding on Asymmetry: Efficient ABE for Branching Programs
Sergey Gorbunov and Dhinakaran Vinayagamurthy
2014/818 ( -- withdrawn -- )
Circulant Matrices and Differential Privacy
Jalaj Upadhyay
2014/810 ( PDF )
Simulation-Based Secure Functional Encryption in the Random Oracle Model
Vincenzo Iovino and Karol Zebrowski
2014/809 ( PDF )
Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
Ignacio Cascudo and Ivan Damgård and Oriol Farràs and Samuel Ranellucci
2014/807 ( PDF )
Leakage-resilient non-malleable codes
Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
2014/804 ( PDF )
Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
Jacob Alperin-Sheriff
2014/800 ( PDF )
Efficient Pairings and ECC for Embedded Systems
Thomas Unterluggauer and Erich Wenger
2014/798 ( PDF )
Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
Michael Clear and Ciarán McGoldrick
2014/792 ( PDF )
General Overview of the First-Round CAESAR Candidates for Authenticated Encryption
{Farzaneh Abed, Christian Forler, Stefan Lucks
2014/786 ( PDF )
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Chun Guo and Dongdai Lin
2014/780 ( PDF )
Deterministic Public-Key Encryption under Continual Leakage
Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters
2014/771 ( PDF )
Succinct Randomized Encodings and their Applications
Nir Bitansky and Sanjam Garg and Sidharth Telang
2014/767 ( PDF )
Algebraic Attacks on Human Identification Protocols
Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk
2014/765 ( PDF )
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2014/754 ( PDF )
Bilinear Entropy Expansion from the Decisional Linear Assumption
Lucas Kowalczyk and Allison Bishop Lewko
2014/748 ( PDF )
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
Mehmet Sabır Kiraz and Osmanbey Uzunkol
2014/744 ( PDF )
Sieving for shortest vectors in lattices using angular locality-sensitive hashing
Thijs Laarhoven
2014/740 ( -- withdrawn -- )
Non-existence of [n; 5] type Generalized Bent function.
Shashi Kant Pandey and P.R Mishra and B.K Dass
2014/717 ( PDF )
How to Split a Secret into Unknown Shares
Ruxandra F. Olimid
2014/710 ( PDF )
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
Yehuda Lindell
2014/704 ( PDF )
A 128-bit Block Cipher Based on Three Group Arithmetics
Shenghui Su and Shuwang Lü and Daqiang Dong
2014/698 ( PDF )
HIMMO - A lightweight collusion-resistant key predistribution scheme
Oscar Garcia-Morchon and Domingo Gomez-Perez and Jaime Gutierrez and Ronald Rietman and Berry Schoenmakers and Ludo Tolhuizen
2014/685 ( PDF )
Bit Security of the CDH Problems over Finite Field
Mingqiang Wang and Tao Zhan and Haibin Zhang
2014/674 ( PDF )
Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
2014/672 ( PDF )
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Xiao Wang and Hubert Chan and Elaine Shi
2014/662 ( PDF )
Outsourced Pattern Matching
Sebastian Faust and Carmit Hazay and Daniele Venturi
2014/641 ( PDF )
The Multiple Number Field Sieve with Conjugation Method
Cécile Pierrot
2014/638 ( PDF )
Substring-Searchable Symmetric Encryption
Melissa Chase and Emily Shen
2014/635 ( PDF )
Type 2 Structure-Preserving Signature Schemes Revisited
Sanjit Chatterjee and Alfred Menezes
2014/631 ( PDF )
Zipf’s Law in Passwords
Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
2014/616 ( PDF )
Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Zhen Liu and Duncan S. Wong
2014/605 ( PDF )
On the Possibilities and Limitations of Computational Fuzzy Extractors
Kenji Yasunaga and Kosuke Yuzawa
2014/603 ( PDF )
Recursive Trees for Practical ORAM
Tarik Moataz and Erik-Oliver Blass and Guevara Noubir
2014/598 ( PDF )
Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi
2014/595 ( PDF )
Scalable Zero Knowledge via Cycles of Elliptic Curves
Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
2014/594 ( PDF )
Oblivious Parallel RAM and Applications
Elette Boyle and Kai-Min Chung and Rafael Pass
2014/583 ( PDF )
Template Attacks Based On Priori Knowledge
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/576 ( PDF )
Vernam Two
Dan P. Milleville
2014/571 ( PDF )
How to manipulate curve standards: a white paper for the black hat
Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
2014/564 ( -- withdrawn -- )
A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
Massoud Hadian Dehkordi and Reza Ghasemi
2014/562 ( PDF )
hHB: a Harder HB+ Protocol
Ka Ahmad Khoureich
2014/553 ( PDF )
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
Ran Canetti and Asaf Cohen and Yehuda Lindell
2014/543 ( PDF )
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
2014/521 ( PDF )
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
Susan Hohenberger and Venkata Koppula and Brent Waters
2014/515 ( -- withdrawn -- )
Ideal Social Secret Sharing Using Birkhoff Interpolation Method
Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian
2014/507 ( PDF )
How to Generate and use Universal Samplers
Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry
2014/501 ( PDF )
WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time
Markku--Juhani O. Saarinen and Billy Bob Brumley
2014/497 ( PDF )
NREPO:Normal Basis Recomputing with Permuted Operands
Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin and Ramesh Karri
2014/494 ( PDF )
Hardness of k-LWE and Applications in Traitor Tracing
San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld
2014/493 ( PDF )
Arithmetic on Abelian and Kummer Varieties
David Lubicz and Damien Robert
2014/488 ( PDF )
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue and Kenneth G. Paterson
2014/483 ( PDF )
Disjunctions for Hash Proof Systems: New Constructions and Applications
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/480 ( PDF )
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
2014/478 ( PDF )
Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
Benny Applebaum and Eyal Widder
2014/472 ( PDF )
How to Watermark Cryptographic Functions
Ryo Nishimaki
2014/448 ( PDF )
Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
Ning Wang and Xiaoyun Wang and Keting Jia and Jingyuan Zhao
2014/445 ( PDF )
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Ràfols and Andy Rupp
2014/438 ( PDF )
Security of Symmetric Encryption against Mass Surveillance
Mihir Bellare and Kenneth Paterson and Phillip Rogaway
2014/426 ( PDF )
Towards Optimally Efficient Secret-Key Authentication from PRG
Ivan Damgård and Sunoo Park
2014/395 ( PDF )
Lightweight and Privacy-Preserving Delegatable Proofs of Storage
Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong
2014/394 ( PDF )
Relational Hash
Avradip Mandal and Arnab Roy
2014/393 ( PDF )
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
2014/381 ( PDF )
Using Indistinguishability Obfuscation via UCEs
Christina Brzuska and Arno Mittelbach
2014/343 ( PDF )
Solving Linear Equations Modulo Unknown Divisors: Revisited
Yao Lu and Rui Zhang and Liqiang Peng and Dongdai Lin
2014/333 ( PDF )
An optimal representation for the trace zero subgroup
Elisa Gorla and Maike Massierer
2014/324 ( PDF )
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
Sandro Coretti and Ueli Maurer and Björn Tackmann and Daniele Venturi
2014/283 ( PDF )
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie
2014/270 ( PDF )
Faster Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen
2014/268 ( PDF )
New bit-parallel Montgomery multiplier for trinomials using squaring operation
Yin Li and Yiyang Chen
2014/264 ( PDF )
Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
Janaka Alawatugoda and Colin Boyd and Douglas Stebila
2014/250 ( PDF )
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Boaz Tsaban and Noam Lifshitz
2014/230 ( PDF )
Isogeny graphs with maximal real multiplication
Sorina Ionica and Emmanuel Thomé
2014/228 ( PDF )
Cryptanalysis of SP Networks with Partial Non-Linear Layers
Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban
2014/220 ( PDF )
Total Break of Zorro using Linear and Differential Attacks
Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
2014/216 ( PDF )
Implementation and Improvement of the Partial Sum Attack on 6-round AES
Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala
2014/213 ( PDF )
Secret-Sharing for NP
Ilan Komargodski and Moni Naor and Eylon Yogev
2014/203 ( PDF )
Privacy-Preserving Implicit Authentication
Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti
2014/202 ( PDF )
Efficiently Verifiable Computation on Encrypted Data
Dario Fiore and Rosario Gennaro and Valerio Pastro
2014/156 ( PDF )
Non-Malleable Extractors with Shorter Seeds and Their Applications
Yanqing Yao and Zhoujun Li
2014/147 ( PDF )
The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
Razvan Barbulescu and Cécile Pierrot
2014/130 ( PDF )
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig
2014/124 ( PDF )
On the Information Ratio of Non-Perfect Secret Sharing Schemes
Oriol Farràs and Torben Hansen and Tarik Kaced and Carles Padró
2014/114 ( PDF )
Prover Anonymous and Deniable Distance-Bounding Authentication
Sebastien Gambs and Cristina Onete and Jean-Marc Robert
2014/097 ( PDF )
A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups
Koji Nuida
2014/087 ( PDF )
AnoA: A Framework For Analyzing Anonymous Communication Protocols
Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi
2014/084 ( PDF )
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
2014/041 ( PDF )
Cryptanalysis via algebraic spans
Adi Ben-Zvi and Arkadius Kalka and Boaz Tsaban
2014/020 ( PDF )
(De-)Constructing TLS
Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi
2014/014 ( PDF )
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther and Bertram Poettering
2013/879 ( PDF )
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
2013/876 ( PDF )
Public-Key Encryption with Lazy Parties
Kenji Yasunaga
2013/874 ( PDF )
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga
2013/862 ( PDF )
How to Delegate Computations: The Power of No-Signaling Proofs
Yael Tauman Kalai and Ran Raz and Ron D. Rothblum
2013/830 ( PDF )
Property Preserving Symmetric Encryption Revisited
Sanjit Chatterjee and M. Prem Laxman Das
2013/796 ( PDF )
Proofs of Space
Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak
2013/744 ( PDF )
Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results
Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai
2013/703 ( PDF )
Limits of Extractability Assumptions with Distributional Auxiliary Input
Elette Boyle and Rafael Pass
2013/593 ( PDF )
Efficient One-Sided Adaptively Secure Computation
Carmit Hazay and Arpita Patra
2013/559 ( PDF )
A Definitional Framework for Functional Encryption
Christian Matt and Ueli Maurer
2013/554 ( PDF )
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
Pablo Rauzy and Sylvain Guilley and Zakaria Najm
2013/424 ( PDF )
Instantiating Random Oracles via UCEs
Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
2013/398 ( PDF )
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Colin Boyd and Cas Cremers and Michèle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila
2013/366 ( PDF )
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin
2013/333 ( PDF )
Double-authentication-preventing signatures
Bertram Poettering and Douglas Stebila
2013/303 ( PDF )
Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
Shivam Bhasin and Claude Carlet and Sylvain Guilley
2013/292 ( PDF )
A Leakage Resilient MAC
Daniel P. Martin and Elisabeth Oswald and Martijn Stam and Marcin Wojcik
2013/282 ( PDF )
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Goutam Paul and Anupam Chattopadhyay
2013/269 ( PDF )
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Jonathan Trostle
2013/228 ( PDF )
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park
2013/127 ( PDF )
Oblivious PAKE: Efficient Handling of Password Trials
Franziskus Kiefer and Mark Manulis
2013/119 ( PDF )
Speeding up Ate Pairing Computation in Affine Coordinates
Duc-Phong Le and Chik How Tan
2013/007 ( PDF )
A Matrix Approach for Constructing Quadratic APN Functions
Yuyin Yu and Mingsheng Wang and Yongqiang Li
2012/729 ( PDF )
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
Nir Bitansky and Omer Paneth
2012/722 ( PDF )
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
2012/511 ( PDF )
Entangled Encodings and Data Entanglement
Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi
2012/460 ( PDF )
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
Yohei Watanabe and Takenobu Seito and Junji Shikata
2012/425 ( PDF )
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
Gautham Sekar
2012/278 ( PS PS.GZ PDF )
Improved Indifferentiability Security Bound for the JH Mode
Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
2012/164 ( PDF )
On Secure Two-party Integer Division
Morten Dahl, Chao Ning, Tomas Toft
2012/134 ( PDF )
A Digital Signature Scheme for Long-Term Security
Dimitrios Poulakis and Robert Rolland
2011/446 ( -- withdrawn -- )
Privacy-Preserving Friend Search over Online Social Networks
Huang Lin and Yuguang Fang and Zhenfu Cao
2011/445 ( -- withdrawn -- )
Privacy-Preserving Friend Search over Online Social Networks
Huang Lin and Sherman S. M. Chow and Dongsheng Xing and Yuguang Fang and Zhenfu Cao
2010/487 ( PDF )
Constant Round Non-Malleable Protocols using One Way Functions
Vipul Goyal
2010/397 ( PDF )
Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
Mihir Bellare and David Cash
2010/266 ( PDF )
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
Chao Ning and Qiuliang Xu
2010/111 ( PDF )
On zero practical significance of “"Key recovery attack on full GOST block cipher with zero time and memory”"
Vladimir Rudskoy
2009/411 ( PDF )
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
2009/358 ( PDF )
MAC Precomputation with Applications to Secure Memory
Juan A. Garay and Vladimir Kolesnikov and Rae McLellan


[ Cryptology ePrint archive ]