Cryptology ePrint Archive: Recent Updates

2015/1018 ( PDF )
A Riddle Wrapped in an Enigma
N. Koblitz and A. Menezes
2015/1017 ( PDF )
Functional Encryption: Decentralised and Delegatable
Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
2015/1016 ( PDF )
Lifting the Security of NI-MAC Beyond Birthday Bound
Avijit Dutta and Goutam Paul
2015/1015 ( PDF )
On Bitcoin as a public randomness source
Joseph Bonneau and Jeremy Clark and Steven Goldfeder
2015/1014 ( PDF )
Fast Fourier Orthogonalization
Léo Ducas and Thomas Prest
2015/1013 ( PDF )
Inception Makes Non-malleable Codes Stronger
Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
2015/1012 ( PDF )
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
2015/1011 ( PDF )
Hierarchical Functional Encryption
Zvika Brakerski and Gil Segev
2015/1010 ( PDF )
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
2015/1009 ( PDF )
Applications of Key Recovery Cube-attack-like
Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
2015/1008 ( PDF )
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
2015/1007 ( PDF )
How to Vote Privately Using Bitcoin
Zhichao Zhao and T-H. Hubert Chan
2015/1006 ( PDF )
Confidential Benchmarking based on Multiparty Computation
Ivan Damgĺrd and Kasper Damgĺrd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
2015/1005 ( PDF )
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
Wenbin Zhang and Chik How Tan
2015/1004 ( PDF )
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
2015/1003 ( PDF )
Results on polynomial interpolation with mixed modular operations and unknown moduli
Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
2015/1002 ( PDF )
got HW crypto? On the (in)security of a Self-Encrypting Drive series
Gunnar Alendal and Christian Kison and modg
2015/1001 ( PDF )
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
2015/1000 ( PDF )
Factoring as a Service
Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
2015/999 ( PDF )
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves
2015/998 ( PDF )
All or Nothing at All
Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
2015/997 ( PDF )
Incremental Program Obfuscation
Sanjam Garg and Omkant Pandey
2015/996 ( PDF )
Multi-user Schnorr security, revisited
Daniel J. Bernstein
2015/995 ( PDF )
Updates on Sorting of Fully Homomorphic Encrypted Data
Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed
2015/994 ( -- withdrawn -- )
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/993 ( PDF )
Bi-Deniable Inner Product Encryption from LWE
Daniel Apon and Xiong Fan and Feng-Hao Liu
2015/992 ( PDF )
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
Jinsu Kim and Sungwook Kim and Jae Hong Seo
2015/991 ( PDF )
Ed3363 (HighFive) -- An alternative Elliptic Curve
Mike Scott
2015/990 ( PDF )
Encryption Switching Protocols
Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/989 ( PDF )
Fast Oblivious AES\\A dedicated application of the MiniMac protocol
Ivan Damgĺrd and Rasmus Winther Zakarias
2015/988 ( PDF )
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram
2015/987 ( PDF )
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
Yehuda Lindell and Ben Riva
2015/986 ( PDF )
Bit Coincidence Mining Algorithm
Koh-ichi Nagao
2015/985 ( PDF )
Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
Koh-ichi Nagao
2015/984 ( PDF )
Complexity of ECDLP under the First Fall Degree Assumption
Koh-ichi Nagao
2015/983 ( PDF )
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
Ping Ngai Chung and Craig Costello and Benjamin Smith
2015/982 ( PDF )
A note on constructions of bent functions from involutions
Sihem Mesnager
2015/981 ( PDF )
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
Ayantika Chatterjee and Indranil Sengupta
2015/980 ( PDF )
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
2015/979 ( PDF )
Guidelines for Using the CryptDB System Securely
Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
2015/978 ( PDF )
The OPTLS Protocol and TLS 1.3
Hugo Krawczyk and Hoeteck Wee
2015/977 ( PDF )
Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(pł)
Michał Wroński
2015/976 ( PDF )
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Alex Biryukov and Léo Perrin
2015/975 ( PDF )
Extended Functionality in Verifiable Searchable Encryption
James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick
2015/974 ( PDF )
The Conjoined Microprocessor
Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and Rémi Géraud David Naccache and Jean Vuillemin
2015/973 ( PDF )
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
Ashwin Jha and Mridul Nandi
2015/972 ( PDF )
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
David Pointcheval and Olivier Sanders and Jacques Traoré
2015/971 ( PDF )
Attacks on Search RLWE
Hao Chen, Kristin Lauter, and Katherine E. Stange
2015/970 ( PDF )
Multilinear Maps over the Integers Using Modulus Switching
Gu Chunsheng
2015/969 ( PDF )
Zero-Knowledge Interactive Proof Systems for New Lattice Problems
Claude Crepéau and Raza Ali Kazmi
2015/968 ( PDF )
Differential and Linear Cryptanalysis of ARX with Partitioning -- Application to FEAL and Chaskey
Gaëtan Leurent
2015/967 ( PDF )
Freestart collision on full SHA-1
Marc Stevens and Pierre Karpman and Thomas Peyrin
2015/966 ( PDF )
Vulnerabilities of ``McEliece in the World of Escher"
Dustin Moody and Ray Perlner
2015/965 ( PDF )
Private Genome Analysis through Homomorphic Encryption
Miran Kim and Kristin Lauter
2015/964 ( PDF )
Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
Danping Shi and Lei Hu and Siwei Sun and Ling Song
2015/963 ( PDF )
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
Houda Ferradi and Rémi Géraud and David Naccache and Assia Tria
2015/962 ( PDF )
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
2015/961 ( PDF )
Short Structure-Preserving Signatures
Essam Ghadafi
2015/960 ( PDF )
More Efficient Secure Outsourcing Methods for Bilinear Maps
Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol
2015/959 ( PDF )
Cryptanalysis of the Round-Reduced Kupyna Hash Function
Jian Zou, Le Dong
2015/958 ( PDF )
One-key Double-Sum MAC with Beyond-Birthday Security
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
2015/957 ( PDF )
Delegating RAM Computations
Yael Tauman Kalai and Omer Paneth
2015/956 ( PDF )
Analysis of the Kupyna-256 Hash Function
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/955 ( PDF )
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
Mridul Nandi and Tapas Pandit
2015/954 ( PDF )
Online-Offline Homomorphic Signatures for Polynomial Functions
Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/953 ( PDF )
Gaussian Sampling Precision and Information Leakage in Lattice Cryptography
Markku-Juhani O. Saarinen
2015/952 ( PDF )
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
2015/951 ( PDF )
Nearly Optimal Robust Secret Sharing
Mahdi Cheraghchi
2015/950 ( PDF )
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Shota Goto and Junji Shikata
2015/949 ( PDF )
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali Kaafar
2015/948 ( PDF )
A Provably Secure Short Signature Scheme from Coding Theory
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/947 ( PDF )
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
2015/946 ( PDF )
Asymmetric proof-of-work based on the Generalized Birthday problem
Alex Biryukov and Dmitry Khovratovich
2015/945 ( PDF )
Secure Set-based Policy Checking and Its Application to Password Registration
Changyu Dong and Franziskus Kiefer
2015/944 ( PDF )
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
Palash Sarkar and Shashank Singh
2015/943 ( PDF )
Sandy2x: New Curve25519 Speed Records
Tung Chou
2015/942 ( PDF )
Secrecy and independence for election schemes
Ben Smyth
2015/941 ( PDF )
Cryptanalysis of the New Multilinear Map over the Integers
Brice Minaud and Pierre-Alain Fouque
2015/940 ( PDF )
Secure Association for the Internet of Things
Almog Benin and Sivan Toledo and Eran Tromer
2015/939 ( PDF )
A Decade of Lattice Cryptography
Chris Peikert
2015/938 ( PDF )
Lattice Based Cryptography for Beginners
Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim
2015/937 ( PDF )
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung
2015/936 ( -- withdrawn -- )
A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
2015/935 ( PDF )
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
Céline Blondeau and Kaisa Nyberg
2015/934 ( PDF )
Cryptanalysis of the New CLT Multilinear Maps
Jung Hee Cheon and Changmin Lee and Hansol Ryu
2015/933 ( PDF )
Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme
Jayaprakash Kar
2015/932 ( PDF )
Using Tweaks To Design Fault Resistant Ciphers
Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay
2015/931 ( PDF )
Fast and Secure Three-party Computation: The Garbled Circuit Approach
Payman Mohassel and Mike Rosulek and Ye Zhang
2015/930 ( PDF )
Nearly Sparse Linear Algebra
Antoine Joux and Cécile Pierrot
2015/929 ( PDF )
Are you The One to Share? Secret Transfer with Access Structure
Yongjun Zhao and Sherman S.M. Chow
2015/928 ( PDF )
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
Hassan Noura and Damien Couroussé
2015/927 ( PDF )
Rich Queries on Encrypted Data: Beyond Exact Matches
Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner
2015/926 ( PDF )
CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
Vadim N.Tsypyschev and Julia S.Vinogradova
2015/925 ( PDF )
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/924 ( PDF )
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
2015/923 ( PDF )
DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING
Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay
2015/922 ( PDF )
Localised Multisecret Sharing
Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
2015/921 ( PDF )
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
Kwangsu Lee and Jong Hwan Park
2015/920 ( PDF )
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese and Antonio Faonio and Seny Kamara
2015/919 ( PDF )
PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
Hung Dang and Tien Tuan Anh Dinh and Ee-Chien Chang and Beng Chin Ooi and Prateek Saxena and Shruti Tople
2015/918 ( PDF )
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk
2015/917 ( PDF )
Private Proximity Testing on Steroids: An NTRU-based Protocol
Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche
2015/916 ( PDF )
Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/911 ( PDF )
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin
2015/904 ( PDF )
Almost-tight Identity Based Encryption against Selective Opening Attack
Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen
2015/898 ( PDF )
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/887 ( PDF )
Round-Optimal Token-Based Secure Computation
Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2015/882 ( PDF )
Using Modular Extension to Provably Protect ECC Against Fault Attacks
Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm
2015/855 ( -- withdrawn -- )
A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
GANESH YELLAPU
2015/854 ( PDF )
Secure Sketch Metamorphosis: Tight Unified Bounds
Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu
2015/838 ( PDF )
Offline Witness Encryption
Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
2015/830 ( PDF )
Unique Signature with Short Output from CDH Assumption
Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
2015/820 ( PDF )
Extended Nested Dual System Groups, Revisited
Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang
2015/810 ( PDF )
Improved OR Composition of Sigma-Protocols
Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2015/804 ( PDF )
SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
Sumit Chakraborty
2015/800 ( PDF )
Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
Jihoon Cho, Kyu Young Choi, and Dukjae Moon
2015/797 ( PDF )
What Security can we Achieve in 4-Rounds?
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/795 ( PDF )
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman
2015/752 ( PDF )
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov and Gil Segev
2015/750 ( PDF )
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki and Daniel Wichs and Mark Zhandry
2015/747 ( PDF )
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du
2015/743 ( PDF )
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Benoit Libert and Thomas Peters and Moti Yung
2015/740 ( PDF )
Predictable Arguments of Knowledge
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2015/737 ( PDF )
New multilinear maps from ideal lattices
Gu Chunsheng
2015/735 ( PDF )
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Ilan Komargodski and Mark Zhandry
2015/730 ( PDF )
Indistinguishability Obfuscation from Functional Encryption for Simple Functions, And a New Bootstrapping Theorem for iO
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/680 ( PDF )
Indifferentiability of Confusion-Diffusion Networks
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/679 ( PDF )
Another Look at Normal Approximations in Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/641 ( PDF )
Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Jing Li, Licheng Wang
2015/564 ( PDF )
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Victor Costan and Ilia Lebedev and Srinivas Devadas
2015/548 ( PDF )
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
2015/541 ( PDF )
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Bart Mennink and Reza Reyhanitabar and Damian Vizár
2015/527 ( PDF )
Robust Profiling for DPA-Style Attacks
Carolyn Whitnall and Elisabeth Oswald
2015/520 ( PDF )
A Constant Time, Single Round, Attribute-Based Authenticated Key Exchange in Random Oracle Model
Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
2015/499 ( PDF )
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
Dennis Hofheinz
2015/484 ( PDF )
More Rounds, Less Security?
Ritam Bhaumik and Avijit Dutta and Jian Guo and Jérémy Jean and Nicky Mouha and Ivica Nikolić
2015/478 ( PDF )
How to Build Time-Lock Encryption
Tibor Jager
2015/455 ( PDF )
Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu and N.Asokan and Benny Pinkas
2015/412 ( PDF )
Survey on Cryptographic Obfuscation
Máté Horváth
2015/388 ( PDF )
Succinct Garbled RAM
Ran Canetti and Justin Holmgren
2015/363 ( PDF )
Optimally Secure Tweakable Blockciphers
Bart Mennink
2015/360 ( PDF )
Achieving Differential Privacy with Bias-Control Limited Source
Yanqing Yao, Zhoujun Li
2015/329 ( PDF )
PAGES - A Family of Block Ciiphers
Dieter Schmidt
2015/313 ( PDF )
Recovering Short Generators of Principal Ideals in Cyclotomic Rings
Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev
2015/308 ( PDF )
Authenticated Key Exchange over Bitcoin
Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao
2015/301 ( PDF )
Cryptanalysis of GGH Map
Yupu Hu and Huiwen Jia
2015/289 ( PDF )
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
Muhammed F. Esgin and Orhun Kara
2015/266 ( PDF )
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
2015/230 ( PDF )
W-SPS: Designing a Wide-Area Secure Positioning System
Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun
2015/227 ( PDF )
Tradeoff Cryptanalysis of Memory-Hard Functions
Alex Biryukov and Dmitry Khovratovich
2015/188 ( PDF )
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2015/176 ( PDF )
Key Recovery for LWE in Polynomial Time
Kim Laine and Kristin Lauter
2015/158 ( PDF )
Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Zvika Brakerski and Ilan Komargodski and Gil Segev
2015/121 ( PDF )
Multi-Client Oblivious RAM secure against Malicious Servers
Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
2015/106 ( PDF )
Provably weak instances of Ring-LWE
Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
2015/093 ( PDF )
Generalization of Statistical Criteria for Sboxes
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
2015/053 ( PDF )
Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/046 ( PDF )
On the concrete hardness of Learning with Errors
Martin R. Albrecht and Rachel Player and Sam Scott
2015/040 ( PDF )
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/017 ( PDF )
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
2014/967 ( PDF )
A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
Maciej Skorski
2014/943 ( PDF )
HaTCh: A Formal Framework of Hardware Trojan Design and Detection
Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk
2014/936 ( PDF )
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
2014/934 ( PDF )
Efficient Generic Zero-Knowledge Proofs from Commitments
Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias
2014/911 ( PDF )
A Denial of Service Attack against Fair Computations using Bitcoin Deposits
Jethro Beekman
2014/818 ( -- withdrawn -- )
Circulant Matrices and Differential Privacy
Jalaj Upadhyay
2014/800 ( PDF )
Efficient Pairings and ECC for Embedded Systems
Thomas Unterluggauer and Erich Wenger
2014/717 ( PDF )
How to Split a Secret into Unknown Shares
Ruxandra F. Olimid
2014/704 ( PDF )
A 128-bit Block Cipher Based on Three Group Arithmetics
Shenghui Su and Shuwang Lü and Daqiang Dong
2014/571 ( PDF )
How to manipulate curve standards: a white paper for the black hat
Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
2014/553 ( PDF )
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
Ran Canetti and Asaf Cohen and Yehuda Lindell
2014/543 ( PDF )
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
2014/507 ( PDF )
How to Generate and use Universal Samplers
Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry
2014/493 ( PDF )
Arithmetic on Abelian and Kummer Varieties
David Lubicz and Damien Robert
2014/483 ( PDF )
Disjunctions for Hash Proof Systems: New Constructions and Applications
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/426 ( PDF )
Towards Optimally Efficient Secret-Key Authentication from PRG
Ivan Damgård and Sunoo Park
2014/202 ( PDF )
Efficiently Verifiable Computation on Encrypted Data
Dario Fiore and Rosario Gennaro and Valerio Pastro
2014/156 ( PDF )
Non-Malleable Extractors with Shorter Seeds and Their Applications
Yanqing Yao and Zhoujun Li
2014/147 ( PDF )
The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
Razvan Barbulescu and Cécile Pierrot
2014/114 ( PDF )
Prover Anonymous and Deniable Distance-Bounding Authentication
Sebastien Gambs and Cristina Onete and Jean-Marc Robert
2014/084 ( PDF )
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
2012/722 ( PDF )
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
2012/425 ( PDF )
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
Gautham Sekar
2012/164 ( PDF )
On Secure Two-party Integer Division
Morten Dahl, Chao Ning, Tomas Toft
2010/266 ( PDF )
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
Chao Ning and Qiuliang Xu
2010/111 ( PDF )
On zero practical significance of “"Key recovery attack on full GOST block cipher with zero time and memory”"
Vladimir Rudskoy


[ Cryptology ePrint archive ]