Cryptology ePrint Archive: Recent Updates
-
2015/1018 ( PDF )
- A Riddle Wrapped in an Enigma
- N. Koblitz and A. Menezes
-
2015/1017 ( PDF )
- Functional Encryption: Decentralised and Delegatable
- Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
-
2015/1016 ( PDF )
- Lifting the Security of NI-MAC Beyond Birthday Bound
- Avijit Dutta and Goutam Paul
-
2015/1015 ( PDF )
- On Bitcoin as a public randomness source
- Joseph Bonneau and Jeremy Clark and Steven Goldfeder
-
2015/1014 ( PDF )
- Fast Fourier Orthogonalization
- Léo Ducas and Thomas Prest
-
2015/1013 ( PDF )
- Inception Makes Non-malleable Codes Stronger
- Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
-
2015/1012 ( PDF )
- An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
- Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
-
2015/1011 ( PDF )
- Hierarchical Functional Encryption
- Zvika Brakerski and Gil Segev
-
2015/1010 ( PDF )
- TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
- Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
-
2015/1009 ( PDF )
- Applications of Key Recovery Cube-attack-like
- Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
-
2015/1008 ( PDF )
- Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
- Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
-
2015/1007 ( PDF )
- How to Vote Privately Using Bitcoin
- Zhichao Zhao and T-H. Hubert Chan
-
2015/1006 ( PDF )
- Confidential Benchmarking based on Multiparty Computation
- Ivan Damgĺrd and Kasper Damgĺrd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
-
2015/1005 ( PDF )
- Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
- Wenbin Zhang and Chik How Tan
-
2015/1004 ( PDF )
- Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
- Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
-
2015/1003 ( PDF )
- Results on polynomial interpolation with mixed modular operations and unknown moduli
- Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
-
2015/1002 ( PDF )
- got HW crypto? On the (in)security of a Self-Encrypting Drive series
- Gunnar Alendal and Christian Kison and modg
-
2015/1001 ( PDF )
- Dismantling real-world ECC with Horizontal and Vertical Template Attacks
- Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
-
2015/1000 ( PDF )
- Factoring as a Service
- Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
-
2015/999 ( PDF )
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves
-
2015/998 ( PDF )
- All or Nothing at All
- Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
-
2015/997 ( PDF )
- Incremental Program Obfuscation
- Sanjam Garg and Omkant Pandey
-
2015/996 ( PDF )
- Multi-user Schnorr security, revisited
- Daniel J. Bernstein
-
2015/995 ( PDF )
- Updates on Sorting of Fully Homomorphic Encrypted Data
- Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed
-
2015/994 ( -- withdrawn -- )
- An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
- Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
-
2015/993 ( PDF )
- Bi-Deniable Inner Product Encryption from LWE
- Daniel Apon and Xiong Fan and Feng-Hao Liu
-
2015/992 ( PDF )
- Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
- Jinsu Kim and Sungwook Kim and Jae Hong Seo
-
2015/991 ( PDF )
- Ed3363 (HighFive) -- An alternative Elliptic Curve
- Mike Scott
-
2015/990 ( PDF )
- Encryption Switching Protocols
- Geoffroy Couteau, Thomas Peters, David Pointcheval
-
2015/989 ( PDF )
- Fast Oblivious AES\\A dedicated application of the MiniMac protocol
- Ivan Damgĺrd and Rasmus Winther Zakarias
-
2015/988 ( PDF )
- Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
- Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram
-
2015/987 ( PDF )
- Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
- Yehuda Lindell and Ben Riva
-
2015/986 ( PDF )
- Bit Coincidence Mining Algorithm
- Koh-ichi Nagao
-
2015/985 ( PDF )
- Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
- Koh-ichi Nagao
-
2015/984 ( PDF )
- Complexity of ECDLP under the First Fall Degree Assumption
- Koh-ichi Nagao
-
2015/983 ( PDF )
- Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
- Ping Ngai Chung and Craig Costello and Benjamin Smith
-
2015/982 ( PDF )
- A note on constructions of bent functions from involutions
- Sihem Mesnager
-
2015/981 ( PDF )
- Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
- Ayantika Chatterjee and Indranil Sengupta
-
2015/980 ( PDF )
- Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
- Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
-
2015/979 ( PDF )
- Guidelines for Using the CryptDB System Securely
- Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
-
2015/978 ( PDF )
- The OPTLS Protocol and TLS 1.3
- Hugo Krawczyk and Hoeteck Wee
-
2015/977 ( PDF )
- Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(pł)
- Michał Wroński
-
2015/976 ( PDF )
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Alex Biryukov and Léo Perrin
-
2015/975 ( PDF )
- Extended Functionality in Verifiable Searchable Encryption
- James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick
-
2015/974 ( PDF )
- The Conjoined Microprocessor
- Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and Rémi Géraud David Naccache and Jean Vuillemin
-
2015/973 ( PDF )
- Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
- Ashwin Jha and Mridul Nandi
-
2015/972 ( PDF )
- Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
- David Pointcheval and Olivier Sanders and Jacques Traoré
-
2015/971 ( PDF )
- Attacks on Search RLWE
- Hao Chen, Kristin Lauter, and Katherine E. Stange
-
2015/970 ( PDF )
- Multilinear Maps over the Integers Using Modulus Switching
- Gu Chunsheng
-
2015/969 ( PDF )
- Zero-Knowledge Interactive Proof Systems for New Lattice Problems
- Claude Crepéau and Raza Ali Kazmi
-
2015/968 ( PDF )
- Differential and Linear Cryptanalysis of ARX with Partitioning -- Application to FEAL and Chaskey
- Gaëtan Leurent
-
2015/967 ( PDF )
- Freestart collision on full SHA-1
- Marc Stevens and Pierre Karpman and Thomas Peyrin
-
2015/966 ( PDF )
- Vulnerabilities of ``McEliece in the World of Escher"
- Dustin Moody and Ray Perlner
-
2015/965 ( PDF )
- Private Genome Analysis through Homomorphic Encryption
- Miran Kim and Kristin Lauter
-
2015/964 ( PDF )
- Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
- Danping Shi and Lei Hu and Siwei Sun and Ling Song
-
2015/963 ( PDF )
- When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
- Houda Ferradi and Rémi Géraud and David Naccache and Assia Tria
-
2015/962 ( PDF )
- SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
- Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
-
2015/961 ( PDF )
- Short Structure-Preserving Signatures
- Essam Ghadafi
-
2015/960 ( PDF )
- More Efficient Secure Outsourcing Methods for Bilinear Maps
- Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol
-
2015/959 ( PDF )
- Cryptanalysis of the Round-Reduced Kupyna Hash Function
- Jian Zou, Le Dong
-
2015/958 ( PDF )
- One-key Double-Sum MAC with Beyond-Birthday Security
- Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
-
2015/957 ( PDF )
- Delegating RAM Computations
- Yael Tauman Kalai and Omer Paneth
-
2015/956 ( PDF )
- Analysis of the Kupyna-256 Hash Function
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/955 ( PDF )
- On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
- Mridul Nandi and Tapas Pandit
-
2015/954 ( PDF )
- Online-Offline Homomorphic Signatures for Polynomial Functions
- Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
-
2015/953 ( PDF )
- Gaussian Sampling Precision and Information Leakage in Lattice Cryptography
- Markku-Juhani O. Saarinen
-
2015/952 ( PDF )
- Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
- Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
-
2015/951 ( PDF )
- Nearly Optimal Robust Secret Sharing
- Mahdi Cheraghchi
-
2015/950 ( PDF )
- A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
- Shota Goto and Junji Shikata
-
2015/949 ( PDF )
- Private Processing of Outsourced Network Functions: Feasibility and Constructions
- Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali Kaafar
-
2015/948 ( PDF )
- A Provably Secure Short Signature Scheme from Coding Theory
- Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
-
2015/947 ( PDF )
- Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
- Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
-
2015/946 ( PDF )
- Asymmetric proof-of-work based on the Generalized Birthday problem
- Alex Biryukov and Dmitry Khovratovich
-
2015/945 ( PDF )
- Secure Set-based Policy Checking and Its Application to Password Registration
- Changyu Dong and Franziskus Kiefer
-
2015/944 ( PDF )
- New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
- Palash Sarkar and Shashank Singh
-
2015/943 ( PDF )
- Sandy2x: New Curve25519 Speed Records
- Tung Chou
-
2015/942 ( PDF )
- Secrecy and independence for election schemes
- Ben Smyth
-
2015/941 ( PDF )
- Cryptanalysis of the New Multilinear Map over the Integers
- Brice Minaud and Pierre-Alain Fouque
-
2015/940 ( PDF )
- Secure Association for the Internet of Things
- Almog Benin and Sivan Toledo and Eran Tromer
-
2015/939 ( PDF )
- A Decade of Lattice Cryptography
- Chris Peikert
-
2015/938 ( PDF )
- Lattice Based Cryptography for Beginners
- Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim
-
2015/937 ( PDF )
- End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
- Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung
-
2015/936 ( -- withdrawn -- )
- A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
- Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
-
2015/935 ( PDF )
- Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
- Céline Blondeau and Kaisa Nyberg
-
2015/934 ( PDF )
- Cryptanalysis of the New CLT Multilinear Maps
- Jung Hee Cheon and Changmin Lee and Hansol Ryu
-
2015/933 ( PDF )
- Cryptanalysis of Provably Secure Certicateless Short Signature Scheme
- Jayaprakash Kar
-
2015/932 ( PDF )
- Using Tweaks To Design Fault Resistant Ciphers
- Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay
-
2015/931 ( PDF )
- Fast and Secure Three-party Computation: The Garbled Circuit Approach
- Payman Mohassel and Mike Rosulek and Ye Zhang
-
2015/930 ( PDF )
- Nearly Sparse Linear Algebra
- Antoine Joux and Cécile Pierrot
-
2015/929 ( PDF )
- Are you The One to Share? Secret Transfer with Access Structure
- Yongjun Zhao and Sherman S.M. Chow
-
2015/928 ( PDF )
- HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
- Hassan Noura and Damien Couroussé
-
2015/927 ( PDF )
- Rich Queries on Encrypted Data: Beyond Exact Matches
- Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner
-
2015/926 ( PDF )
- CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
- Vadim N.Tsypyschev and Julia S.Vinogradova
-
2015/925 ( PDF )
- Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
- Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
-
2015/924 ( PDF )
- Masking Large Keys in Hardware: A Masked Implementation of McEliece
- Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
-
2015/923 ( PDF )
- DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING
- Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay
-
2015/922 ( PDF )
- Localised Multisecret Sharing
- Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
-
2015/921 ( PDF )
- Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
- Kwangsu Lee and Jong Hwan Park
-
2015/920 ( PDF )
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
- Giuseppe Ateniese and Antonio Faonio and Seny Kamara
-
2015/919 ( PDF )
- PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
- Hung Dang and Tien Tuan Anh Dinh and Ee-Chien Chang and Beng Chin Ooi and Prateek Saxena and Shruti Tople
-
2015/918 ( PDF )
- Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
- Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk
-
2015/917 ( PDF )
- Private Proximity Testing on Steroids: An NTRU-based Protocol
- Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche
-
2015/916 ( PDF )
- Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
- Subhabrata Samajder and Palash Sarkar
-
2015/911 ( PDF )
- Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
- Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin
-
2015/904 ( PDF )
- Almost-tight Identity Based Encryption against Selective Opening Attack
- Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen
-
2015/898 ( PDF )
- Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
- Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2015/887 ( PDF )
- Round-Optimal Token-Based Secure Computation
- Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
-
2015/882 ( PDF )
- Using Modular Extension to Provably Protect ECC Against Fault Attacks
- Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm
-
2015/855 ( -- withdrawn -- )
- A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
- GANESH YELLAPU
-
2015/854 ( PDF )
- Secure Sketch Metamorphosis: Tight Unified Bounds
- Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu
-
2015/838 ( PDF )
- Offline Witness Encryption
- Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
-
2015/830 ( PDF )
- Unique Signature with Short Output from CDH Assumption
- Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
-
2015/820 ( PDF )
- Extended Nested Dual System Groups, Revisited
- Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang
-
2015/810 ( PDF )
- Improved OR Composition of Sigma-Protocols
- Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
-
2015/804 ( PDF )
- SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
- Sumit Chakraborty
-
2015/800 ( PDF )
- Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
- Jihoon Cho, Kyu Young Choi, and Dukjae Moon
-
2015/797 ( PDF )
- What Security can we Achieve in 4-Rounds?
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2015/795 ( PDF )
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
- Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman
-
2015/752 ( PDF )
- On Constructing One-Way Permutations from Indistinguishability Obfuscation
- Gilad Asharov and Gil Segev
-
2015/750 ( PDF )
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Ryo Nishimaki and Daniel Wichs and Mark Zhandry
-
2015/747 ( PDF )
- Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
- Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du
-
2015/743 ( PDF )
- Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
- Benoit Libert and Thomas Peters and Moti Yung
-
2015/740 ( PDF )
- Predictable Arguments of Knowledge
- Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
-
2015/737 ( PDF )
- New multilinear maps from ideal lattices
- Gu Chunsheng
-
2015/735 ( PDF )
- Cutting-Edge Cryptography Through the Lens of Secret Sharing
- Ilan Komargodski and Mark Zhandry
-
2015/730 ( PDF )
- Indistinguishability Obfuscation from Functional Encryption for Simple Functions, And a New Bootstrapping Theorem for iO
- Prabhanjan Ananth and Abhishek Jain and Amit Sahai
-
2015/680 ( PDF )
- Indifferentiability of Confusion-Diffusion Networks
- Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
-
2015/679 ( PDF )
- Another Look at Normal Approximations in Cryptanalysis
- Subhabrata Samajder and Palash Sarkar
-
2015/641 ( PDF )
- Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
- Jing Li, Licheng Wang
-
2015/564 ( PDF )
- Sanctum: Minimal Hardware Extensions for Strong Software Isolation
- Victor Costan and Ilia Lebedev and Srinivas Devadas
-
2015/548 ( PDF )
- Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
- Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
-
2015/541 ( PDF )
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
- Bart Mennink and Reza Reyhanitabar and Damian Vizár
-
2015/527 ( PDF )
- Robust Profiling for DPA-Style Attacks
- Carolyn Whitnall and Elisabeth Oswald
-
2015/520 ( PDF )
- A Constant Time, Single Round, Attribute-Based Authenticated Key Exchange in Random Oracle Model
- Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
-
2015/499 ( PDF )
- Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
- Dennis Hofheinz
-
2015/484 ( PDF )
- More Rounds, Less Security?
- Ritam Bhaumik and Avijit Dutta and Jian Guo and Jérémy Jean and Nicky Mouha and Ivica Nikolić
-
2015/478 ( PDF )
- How to Build Time-Lock Encryption
- Tibor Jager
-
2015/455 ( PDF )
- Secure Deduplication of Encrypted Data without Additional Independent Servers
- Jian Liu and N.Asokan and Benny Pinkas
-
2015/412 ( PDF )
- Survey on Cryptographic Obfuscation
- Máté Horváth
-
2015/388 ( PDF )
- Succinct Garbled RAM
- Ran Canetti and Justin Holmgren
-
2015/363 ( PDF )
- Optimally Secure Tweakable Blockciphers
- Bart Mennink
-
2015/360 ( PDF )
- Achieving Differential Privacy with Bias-Control Limited Source
- Yanqing Yao, Zhoujun Li
-
2015/329 ( PDF )
- PAGES - A Family of Block Ciiphers
- Dieter Schmidt
-
2015/313 ( PDF )
- Recovering Short Generators of Principal Ideals in Cyclotomic Rings
- Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev
-
2015/308 ( PDF )
- Authenticated Key Exchange over Bitcoin
- Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao
-
2015/301 ( PDF )
- Cryptanalysis of GGH Map
- Yupu Hu and Huiwen Jia
-
2015/289 ( PDF )
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
- Muhammed F. Esgin and Orhun Kara
-
2015/266 ( PDF )
- GRECS: Graph Encryption for Approximate Shortest Distance Queries
- Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
-
2015/230 ( PDF )
- W-SPS: Designing a Wide-Area Secure Positioning System
- Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun
-
2015/227 ( PDF )
- Tradeoff Cryptanalysis of Memory-Hard Functions
- Alex Biryukov and Dmitry Khovratovich
-
2015/188 ( PDF )
- New Techniques for SPHFs and Efficient One-Round PAKE Protocols
- Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2015/176 ( PDF )
- Key Recovery for LWE in Polynomial Time
- Kim Laine and Kristin Lauter
-
2015/158 ( PDF )
- Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
- Zvika Brakerski and Ilan Komargodski and Gil Segev
-
2015/121 ( PDF )
- Multi-Client Oblivious RAM secure against Malicious Servers
- Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
-
2015/106 ( PDF )
- Provably weak instances of Ring-LWE
- Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
-
2015/093 ( PDF )
- Generalization of Statistical Criteria for Sboxes
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
-
2015/053 ( PDF )
- Tight Bounds for Keyed Sponges and Truncated CBC
- Peter Gai and Krzysztof Pietrzak and Stefano Tessaro
-
2015/046 ( PDF )
- On the concrete hardness of Learning with Errors
- Martin R. Albrecht and Rachel Player and Sam Scott
-
2015/040 ( PDF )
- Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
- Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2015/017 ( PDF )
- Simple Functional Encryption Schemes for Inner Products
- Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
-
2014/967 ( PDF )
- A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
- Maciej Skorski
-
2014/943 ( PDF )
- HaTCh: A Formal Framework of Hardware Trojan Design and Detection
- Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk
-
2014/936 ( PDF )
- Outsourcing Secure Two-Party Computation as a Black Box
- Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
-
2014/934 ( PDF )
- Efficient Generic Zero-Knowledge Proofs from Commitments
- Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias
-
2014/911 ( PDF )
- A Denial of Service Attack against Fair Computations using Bitcoin Deposits
- Jethro Beekman
-
2014/818 ( -- withdrawn -- )
- Circulant Matrices and Differential Privacy
- Jalaj Upadhyay
-
2014/800 ( PDF )
- Efficient Pairings and ECC for Embedded Systems
- Thomas Unterluggauer and Erich Wenger
-
2014/717 ( PDF )
- How to Split a Secret into Unknown Shares
- Ruxandra F. Olimid
-
2014/704 ( PDF )
- A 128-bit Block Cipher Based on Three Group Arithmetics
- Shenghui Su and Shuwang Lü and Daqiang Dong
-
2014/571 ( PDF )
- How to manipulate curve standards: a white paper for the black hat
- Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
-
2014/553 ( PDF )
- A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
- Ran Canetti and Asaf Cohen and Yehuda Lindell
-
2014/543 ( PDF )
- A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
- Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
-
2014/507 ( PDF )
- How to Generate and use Universal Samplers
- Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry
-
2014/493 ( PDF )
- Arithmetic on Abelian and Kummer Varieties
- David Lubicz and Damien Robert
-
2014/483 ( PDF )
- Disjunctions for Hash Proof Systems: New Constructions and Applications
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/426 ( PDF )
- Towards Optimally Efficient Secret-Key Authentication from PRG
- Ivan Damgård and Sunoo Park
-
2014/202 ( PDF )
- Efficiently Verifiable Computation on Encrypted Data
- Dario Fiore and Rosario Gennaro and Valerio Pastro
-
2014/156 ( PDF )
- Non-Malleable Extractors with Shorter Seeds and Their Applications
- Yanqing Yao and Zhoujun Li
-
2014/147 ( PDF )
- The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
- Razvan Barbulescu and Cécile Pierrot
-
2014/114 ( PDF )
- Prover Anonymous and Deniable Distance-Bounding Authentication
- Sebastien Gambs and Cristina Onete and Jean-Marc Robert
-
2014/084 ( PDF )
- RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
- Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
-
2012/722 ( PDF )
- Hardness Preserving Reductions via Cuckoo Hashing
- Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
-
2012/425 ( PDF )
- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
- Gautham Sekar
-
2012/164 ( PDF )
- On Secure Two-party Integer Division
- Morten Dahl, Chao Ning, Tomas Toft
-
2010/266 ( PDF )
- Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
- Chao Ning and Qiuliang Xu
-
2010/111 ( PDF )
- On zero practical significance of "Key recovery attack on full GOST block cipher with zero time and memory"
- Vladimir Rudskoy
[ Cryptology ePrint archive ]