Cryptology ePrint Archive: Recent Updates

2017/674 ( PDF )
Transparent Memory Encryption and Authentication
Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard
2017/673 ( PDF )
Differential Fault Analysis Automation
Sayandeep Saha, and Ujjawal Kumar, and Debdeep Mukhopadhyay, and Pallab Dasgupta
2017/672 ( PDF )
Coding for interactive communication beyond threshold adversaries
Anat Paskin-Cherniavsky and Slava Radune
2017/671 ( PDF )
Guru: Universal Reputation Module for Distributed Consensus Protocols
Alex Biryukov and Daniel Feher and Dmitry Khovratovich
2017/670 ( PDF )
Private Set Intersection for Unequal Set Sizes with Mobile Applications
Ágnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas
2017/669 ( PDF )
Speeding up Elliptic Curve Scalar Multiplication without Precomputation
Kwang Ho Kim and Junyop Choe and Song Yun Kim and Namsu Kim and Sekung Hong
2017/668 ( PDF )
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
Sikhar Patranabis and Debdeep Mukhopadhyay
2017/667 ( PDF )
High-speed key encapsulation from NTRU
Andreas Hülsing and Joost Rijneveld and John Schanck and Peter Schwabe
2017/666 ( PDF )
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
Katriel Cohn-Gordon and Cas Cremers and Luke Garratt and Jon Millican and Kevin Milner
2017/665 ( PDF )
Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
Michael Raskin
2017/664 ( PDF )
Message Franking via Committing Authenticated Encryption
Paul Grubbs and Jiahui Lu and Thomas Ristenpart
2017/663 ( PDF )
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Thomas Unterluggauer and Mario Werner and Stefan Mangard
2017/662 ( PDF )
A new signature scheme based on (U|U+V) codes
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2017/661 ( PDF )
MuSE: Multimodal Searchable Encryption for Cloud Applications
Bernardo Ferreira and João Leitão and Henrique Domingos
2017/660 ( PDF )
Profiling Good Leakage Models For Masked Implementations
Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou
2017/659 ( PDF )
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
Russell W. F. Lai and Sherman S. M. Chow
2017/658 ( PDF )
Privacy for Targeted Advertising
Avradip Mandal and John Mitchell and Hart Montgomery and Arnab Roy
2017/657 ( PDF )
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Sanjit Chatterjee and Sayantan Mukherjee and Tapas Pandit
2017/656 ( PDF )
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
Lei Fan and Hong-Sheng Zhou
2017/655 ( PDF )
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
Jiao Hu and Ruilin Li and Chaojing Tang
2017/654 ( PDF )
A Secure and Private Billing Protocol for Smart Metering
Tom Eccles and Basel Halak
2017/653 ( PDF )
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
Fanbao Liu and Fengmei Liu
2017/652 ( PDF )
Pseudorandom Functions: Three Decades Later
Andrej Bogdanov and Alon Rosen
2017/651 ( -- withdrawn -- )
Rescuing LoRaWAN 1.0
Gildas Avoine and Loïc Ferreira
2017/650 ( PDF )
Efficient Public Trace and Revoke from Standard Assumptions
Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehle and Shota Yamada
2017/649 ( PDF )
Blockcipher-based Authenticated Encryption: How Small Can We Go?
Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi
2017/648 ( PDF )
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ismail Khoffi and Justin Cappos and Bryan Ford
2017/647 ( PDF )
A TMDTO Attack Against Lizard
Subhamoy Maitra and Nishant Sinha and Akhilesh Siddhanti and Ravi Anand and Sugata Gangopadhyay
2017/646 ( PDF )
Rational Trust Modeling
Mehrdad Nojoumian
2017/645 ( PDF )
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
Shay Gueron and Nicky Mouha
2017/644 ( PDF )
On Space-Scarce Economy In Blockchain Systems
Alexander Chepurnoy and Dmitry Meshkov
2017/643 ( PDF )
Private Data Aggregation on a Budget
Morten Dahl and Valerio Pastro and Mathieu Poumeyrol
2017/642 ( PDF )
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
Nasrollah Pakniat and Mahnaz Noroozi and Ziba Eslami
2017/641 ( PDF )
Integer Version of Ring-LWE and its Applications
Gu Chunsheng
2017/640 ( PDF )
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
Fabrice Benhamouda and Houda Ferradi and Rémi Géraud and David Naccache
2017/639 ( PDF )
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Jan Camenisch and Liqun Chen and Manu Drijvers and Anja Lehmann and David Novick and Rainer Urian
2017/638 ( PDF )
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
2017/637 ( PDF )
Very High Order Masking: Efficient Implementation and Security Evaluation
Anthony Journault and François-Xavier Standaert
2017/636 ( PDF )
Implementing 128-bit Secure MPKC Signatures
Ming-Shing Chen and Wen-Ding Li and Bo-Yuan Peng and Bo-Yin Yang and Chen-Mou Cheng
2017/635 ( PDF )
PERUN: Virtual Payment Channels over Cryptographic Currencies
Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski
2017/634 ( PDF )
CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
Joppe Bos and Léo Ducas and Eike Kiltz and Tancrède Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehlé
2017/633 ( PDF )
CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
Leo Ducas and Tancrede Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehle
2017/632 ( PDF )
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
Dahmun Goudarzi and Matthieu Rivain and Damien Vergnaud and Srinivas Vivek
2017/631 ( PDF )
Certifying Trapdoor Permutations, Revisited
Ran Canetti and Amit Lichtenberg
2017/630 ( PDF )
Gimli: a cross-platform permutation
Daniel J. Bernstein and Stefan Kölbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and François-Xavier Standaert and Yosuke Todo and Benoît Viguier
2017/629 ( PDF )
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
Romain Poussier and Yuanyuan Zhou and François-Xavier Standaert
2017/628 ( PDF )
Middle-Product Learning With Errors
Miruna Rosca and Amin Sakzad and Ron Steinfeld and Damien Stehle
2017/627 ( PDF )
Sliding right into disaster: Left-to-right sliding windows leak
Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom
2017/626 ( PDF )
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
Hai Zhou and Ruifeng Jiang and Shuyu Kong
2017/625 ( PDF )
How to Break Secure Boot on FPGA SoCs through Malicious Hardware
Nisha Jacob and Johann Heyszl and Andreas Zankl and Carsten Rolfes and Georg Sigl
2017/624 ( PDF )
Fast Leakage Assessment
Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede
2017/623 ( PDF )
Back to Massey: Impressively fast, scalable and tight security evaluation tools
Marios O. Choudary and P.G. Popescu
2017/622 ( PDF )
GIFT: A Small Present
Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Siang Meng Sim and Yosuke Todo and Yu Sasaki
2017/621 ( PDF )
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks
Xiaolin Xu and Bicky Shakya and Mark M. Tehranipoor and Domenic Forte
2017/620 ( PDF )
The Algebraic Group Model and its Applications
Eike Kiltz and Julian Loss
2017/619 ( PDF )
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
Qiong Huang and Jianye Huang
2017/618 ( PDF )
CacheZoom: How SGX Amplifies The Power of Cache Attacks
Ahmad Moghimi and Gorka Irazoqui and Thomas Eisenbarth
2017/617 ( PDF )
Secure Arithmetic Computation with Constant Computational Overhead
Benny Applebaum and Ivan Damgård and Yuval Ishai and Michael Nielsen and Lior Zichron
2017/616 ( PDF )
Digital Liquid Democracy: How to Vote Your Delegation Statement
Bingsheng Zhang and Hong-Sheng Zhou
2017/615 ( PDF )
A Framework to Select Parameters for Lattice-Based Cryptography
Nabil Alkeilani Alkadri and Johannes Buchmann and Rachid El Bansarkhani and Juliane Krämer
2017/614 ( PDF )
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
Mathias Wagner and Stefan Heyse
2017/613 ( PDF )
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
Hocheol Shin and Dohyun Kim and Yujin Kwon and Yongdae Kim
2017/612 ( PDF )
Large Modulus Ring-LWE >= Module-LWE
Martin R. Albrecht and Amit Deo
2017/611 ( PDF )
Multi-Rate Threshold FlipThem
David Leslie and Chris Sherfield and Nigel P. Smart
2017/610 ( PDF )
Differential Attacks: Using Alternative Operations
Céline Blondeau and Roberto Civino and Massimiliano Sala
2017/609 ( PDF )
On the discrete logarithm problem for prime-field elliptic curves
Alessandro Amadori and Federico Pintore and Massimiliano Sala
2017/608 ( PDF )
Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs
Vincent Immler and Robert Specht and Florian Unterstein
2017/607 ( PDF )
Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
Edward Eaton
2017/606 ( PDF )
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
Johannes Buchmann and Niklas Büscher and Florian Göpfert and Stefan Katzenbeisser and Juliane Krämer and Daniele Micciancio and Sander Siim and Christine van Vredendaal and Michael Walter
2017/605 ( PDF )
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
Xavier Bultel and Pascal Lafourcade
2017/604 ( PDF )
A Modular Analysis of the Fujisaki-Okamoto Transformation
Dennis Hofheinz and Kathrin Hövelmanns and Eike Kiltz
2017/603 ( PDF )
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2017/602 ( PDF )
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
Sean Bowe and Ariel Gabizon and Matthew D. Green
2017/601 ( PDF )
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
Wei Dai and Yarkın Doröz and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savaş and Berk Sunar
2017/600 ( PDF )
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
Jeremy Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich
2017/599 ( PDF )
A Subversion-Resistant SNARK
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac
2017/598 ( PDF )
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
Martin Roetteler and Michael Naehrig and Krysta M. Svore and Kristin Lauter
2017/597 ( PDF )
Round Optimal Concurrent MPC via Strong Simulation
Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai
2017/596 ( PDF )
A Side-Channel Assisted Cryptanalytic Attack Against QcBits
Melissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson
2017/595 ( PDF )
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
Wen Wang and Jakub Szefer and Ruben Niederhagen
2017/594 ( PDF )
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Robert Primas and Peter Pessl and Stefan Mangard
2017/593 ( PDF )
Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra
Alessio Caminata and Elisa Gorla
2017/592 ( PDF )
Speeding up lattice sieve with Xeon Phi coprocessor
Anja Becker and Dusan Kostic
2017/591 ( PDF )
On the Security of Carrier Phase-based Ranging
Hildur Olafsdottir and Aanjhan Ranganathan and Srdjan Capkun
2017/590 ( PDF )
Constant bandwidth ORAM with small block size using PIR operations
Linru Zhang and Gongxian Zeng and Yuechen Chen and Siu-Ming Yiu and Nairen Cao and Zheli Liu
2017/589 ( PDF )
An Attempt to Cryptanalyze A Partially Known Cipher Algorithm
Juay Guan Hee
2017/588 ( PDF )
Renyi Entropy Estimation Revisited
Maciej Obremski and Maciej Skorski
2017/587 ( PDF )
Subversion-zero-knowledge SNARKs
Georg Fuchsbauer
2017/586 ( PDF )
Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry
2017/585 ( PDF )
Internet Voting Using Zcash
Pavel Tarasov and Hitesh Tewari
2017/584 ( PDF )
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
Luka Malisa and Kari Kostiainen and Thomas Knell and David Sommer and Srdjan Capkun
2017/583 ( )
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
2017/582 ( PDF )
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
Angela Jäschke and Frederik Armknecht
2017/581 ( PDF )
Parallel Collision Search with Radix Trees
Gilles Dequen and Sorina Ionica and Monika Trimoska
2017/580 ( PDF )
Analysing Relations involving small number of Monomials in AES S- Box
Riddhi Ghosal
2017/579 ( PDF )
Birthday Attack on Dual EWCDM
Mridul Nandi
2017/578 ( PDF )
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
Hubert Ritzdorf and Karl Wüst and Arthur Gervais and Guillaume Felley and Srdjan Capkun
2017/577 ( PDF )
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
Steffen Schulz and André Schaller and Florian Kohnhäuser and Stefan Katzenbeisser
2017/576 ( PDF )
The Security of SIMON-like Ciphers Against Linear Cryptanalysis
Zhengbin Liu and Yongqiang Li and Mingsheng Wang
2017/575 ( PDF )
Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds
Ehsan Ebrahimi and Dominique Unruh
2017/574 ( PDF )
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Hamidreza Yazdanpanah, Mohammadreza Hasani Ahangar, Mahdi Azizi and Arash Ghafouri
2017/573 ( PDF )
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
2017/572 ( PDF )
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Marten van Dijk
2017/571 ( PDF )
Faster Algorithms for Isogeny Problems using Torsion Point Images
Christophe Petit
2017/570 ( PDF )
Assessing the No-Knowledge Property of SpiderOak ONE
Anders P. K. Dalskov and Claudio Orlandi
2017/569 ( PDF )
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
2017/568 ( PDF )
Towards Doubly Efficient Private Information Retrieval
Ran Canetti and Justin Holmgren and Silas Richelson
2017/567 ( PDF )
Can We Access a Database Both Locally and Privately?
Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters
2017/566 ( PDF )
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo
2017/565 ( PDF )
A Formal Foundation for Secure Remote Execution of Enclaves
Pramod Subramanyan and Rohit Sinha and Ilia Lebedev and Srinivas Devadas and Sanjit Seshia
2017/564 ( PDF )
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
Manaar Alam and Sarani Bhattacharya and Debdeep Mukhopadhyay and Sourangshu Bhattacharya
2017/563 ( PDF )
Weak is Better: Tightly Secure Short Signatures from Weak PRFs
Jacob Alperin-Sheriff and Daniel Apon
2017/562 ( PDF )
Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices
Björn Haase and Benoît Labrique
2017/561 ( PDF )
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
Yashvanth Kondi and Arpita Patra
2017/560 ( PDF )
Notes on the design and analysis of SIMON and SPECK
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2017/559 ( PDF )
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Alexandra Boldyreva and Shan Chen and Pierre-Alain Dupont and David Pointcheval
2017/552 ( PDF )
Fast Secure Two-Party ECDSA Signing
Yehuda Lindell
2017/543 ( PDF )
Identity-Based Encryption from the Diffie-Hellman Assumption
Nico Döttling and Sanjam Garg
2017/542 ( PDF )
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart
2017/537 ( PDF )
Information-theoretic Indistinguishability via the Chi-squared Method
Wei Dai and Viet Tung Hoang and Stefano Tessaro
2017/535 ( PDF )
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin
2017/527 ( PDF )
Key Rotation for Authenticated Encryption
Adam Everspaugh and Kenneth Paterson and Thomas Ristenpart and Sam Scott
2017/526 ( PDF )
Evaluating web PKIs
Jiangshan Yu and Mark Ryan
2017/525 ( PDF )
Kurosawa-Desmedt Meets Tight Security
Romain Gay and Dennis Hofheinz and Lisa Kohl
2017/524 ( PDF )
Compact Structure-preserving Signatures with Almost Tight Security
Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan
2017/522 ( PDF )
On the Hardness of the Mersenne Low Hamming Ratio Assumption
Marc Beunardeau and Aisling Connolly and Rémi Géraud and David Naccache
2017/514 ( PDF )
Identity-based Encryption from Codes with Rank Metric
Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean-Pierre Tillich
2017/507 ( PDF )
Inverted Leftover Hash Lemma
Maciej Obremski and Maciej Skórski
2017/497 ( PDF )
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
Itai Dinur and Niv Nadler
2017/496 ( PDF )
Modes of Operation Suitable for Computing on Encrypted Data
Dragos Rotaru and Nigel P. Smart and Martijn Stam
2017/491 ( PDF )
Laconic Oblivious Transfer and its Applications
Chongwon Cho and Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou
2017/488 ( PDF )
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions
Nir Bitansky and Yael Tauman Kalai and Omer Paneth
2017/484 ( PDF )
Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial
Jung Hee Cheon and Minki Hhan and Changmin Lee
2017/482 ( PDF )
On the Statistical Leak of the GGH13 Multilinear Map and some Variants
Léo Ducas and Alice Pellet--Mary
2017/479 ( PDF )
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Keita Emura
2017/473 ( PDF )
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
Bart Mennink and Samuel Neves
2017/466 ( PDF )
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security
Yusuke Naito
2017/458 ( -- withdrawn -- )
Fully Homomorphic Encryption Using Multivariate Polynomials
Matthew Tamayo-Rios and Jean-Charles Faugère and Ludovic Perret and Peng Hui How and Robin Zhang
2017/455 ( PDF )
Vector Encoding over Lattices and Its Applications
Daniel Apon and Xiong Fan and Feng-Hao Liu
2017/442 ( PDF )
On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i
Jeremiah Blocki and Samson Zhou
2017/441 ( PDF )
New Approach to Practical Leakage-Resilient Public-Key Cryptography
Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan
2017/440 ( PDF )
Cryptographic Security Analysis of T-310
Nicolas T. Courtois and Klaus Schmeh and Jörg Drobick and Jacques Patarin and Maria-Bristena Oprisanu and Matteo Scarlata and Om Bhallamudi
2017/437 ( PDF )
Slothful reduction
Michael Scott
2017/426 ( PDF )
FHPKE based on multivariate discrete logarithm problem
Masahiro Yagisawa
2017/424 ( PDF )
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
Markku-Juhani O. Saarinen
2017/418 ( PDF )
Strong Authenticated Key Exchange with Auxiliary Inputs
Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
2017/411 ( PDF )
A New Algorithm for Inversion mod $p^k$
Çetin Kaya Koç
2017/384 ( PDF )
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang
2017/371 ( PDF )
On the Construction of Lightweight Orthogonal MDS Matrices
Lijing Zhou, Licheng Wang and Yiru Sun
2017/367 ( PDF )
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity
Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, and Yu Long
2017/359 ( PDF )
Conditional Disclosure of Secrets via Non-Linear Reconstruction
Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee
2017/357 ( PDF )
Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model
Nico Döttling and Jesper Buus Nielsen and Maciej Obremski
2017/354 ( PDF )
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart
2017/350 ( PDF )
The Montgomery ladder on binary elliptic curves
Thomaz Oliveira and Julio López and Francisco Rodríguez-Henríquez
2017/344 ( PDF )
DUPLO: Unifying Cut-and-Choose for Garbled Circuits
Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti
2017/341 ( PDF )
Steganography techniques
Dragoş Dumitrescu and Ioan-Mihail Stan and Emil Simion
2017/340 ( -- withdrawn -- )
Enhancing Security by Combining Biometrics and Cryptography
Diana Popa and Emil Simion
2017/267 ( PDF )
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
Seungkwang Lee
2017/262 ( PDF )
When It’s All Just Too Much: Outsourcing MPC-Preprocessing
Peter Scholl and Nigel P. Smart and Tim Wood
2017/259 ( PDF )
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
Daniele Micciancio and Michael Walter
2017/252 ( PDF )
High-Order Conversion From Boolean to Arithmetic Masking
Jean-Sebastien Coron
2017/251 ( PDF )
A Lattice-Based Universal Thresholdizer for Cryptographic Systems
Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim
2017/250 ( PDF )
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
Huijia Lin and Stefano Tessaro
2017/229 ( PDF )
Multi-Prover Interactive Proofs: Unsound Foundations
Claude Crépeau and Nan Yang
2017/200 ( PDF )
Anonymous Attestation with Subverted TPMs
Jan Camenisch and Manu Drijvers and Anja Lehmann
2017/153 ( PDF )
Storage Efficient Substring Searchable Symmetric Encryption
Iraklis Leontiadis and Ming Li
2017/151 ( PDF )
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay
2017/150 ( PDF )
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
Elette Boyle and Niv Gilboa and Yuval Ishai
2017/140 ( PDF )
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Nina Bindel and Johannes Buchmann and Florian Göpfert and Markus Schmidt
2017/137 ( PDF )
Modifying an Enciphering Scheme after Deployment
Paul Grubbs and Thomas Ristenpart and Yuval Yarom
2017/115 ( PDF )
An efficient self-blindable attribute-based credential scheme
Sietse Ringers and Eric Verheul and Jaap-Henk Hoepman
2017/103 ( PDF )
Reconciling d+1 Masking in Hardware and Software
Hannes Gross and Stefan Mangard
2017/099 ( PDF )
Making NSEC5 Practical for DNSSEC
Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan Včelák and Leonid Reyzin and Sharon Goldberg
2017/081 ( PDF )
Estonian Voting Verification Mechanism Revisited Again
Ivo Kubjas and Tiit Pikma and Jan Willemson
2017/078 ( PDF )
LPN Decoded
Andre Esser and Robert Kübler and Alexander May
2017/060 ( PDF )
Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel and Marc Fischlin
2017/056 ( PDF )
Verifiable Classroom Voting in Practice
Feng Hao and Dylan Clarke and Brian Randell and Siamak F. Shahandashti
2017/048 ( PDF )
ROTE: Rollback Protection for Trusted Execution
Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun
2017/046 ( PDF )
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
Matthieu Giraud and Alexandre Anzala-Yamajako and Olivier Bernard and Pascal Lafourcade
2017/045 ( PDF )
Efficient Round-Optimal Blind Signatures in the Standard Model
Essam Ghadafi
2017/042 ( PDF )
Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient
Yuanxi Dai and Yannick Seurin and John Steinberger and Aishwarya Thiruvengadam
2017/039 ( PDF )
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version)
Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
2017/019 ( PDF )
SmartPool: Practical Decentralized Pooled Mining
Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena
2017/013 ( PDF )
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
Meilof Veeningen
2016/1174 ( PDF )
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
Eik List and Mridul Nandi
2016/1173 ( PDF )
Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring
Lijing Zhou, Licheng Wang and Yiru Sun
2016/1169 ( PDF )
LWE from Non-commutative Group Rings
Qi Cheng and Jun Zhang and Jincheng Zhuang
2016/1152 ( PDF )
Leak Me If You Can: Does TVLA Reveal Success Rate?
Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Sikhar Patranabis and Debdeep Mukhopadhyay
2016/1126 ( PDF )
Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
Jung Hee Cheon and Duhyeong Kim and Joohee Lee and Yongsoo Song
2016/1105 ( PDF )
Generic Transformations of Predicate Encodings: Constructions and Applications
Miguel Ambrona and Gilles Barthe and Benedikt Schmidt
2016/1096 ( PDF )
Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
Huijia Lin
2016/1068 ( PDF )
On Finding Short Cycles in Cryptographic Algorithms
Elena Dubrova and Maxim Teslenko
2016/1061 ( PDF )
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
Joan Daemen
2016/1015 ( PDF )
MaxLength Considered Harmful to the RPKI
Yossi Gilad and Omar Sagga and Sharon Goldberg
2016/1003 ( PDF )
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
Daniel Apon and Nico Döttling and Sanjam Garg and Pratyay Mukherjee
2016/977 ( PDF )
Side channels in deduplication: trade-offs between leakage and efficiency
Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Mohsen Toorani
2016/892 ( PDF )
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
Adrià Gascón and Phillipp Schoppmann and Borja Balle and Mariana Raykova and Jack Doerner and Samee Zahur and David Evans
2016/889 ( PDF )
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
2016/880 ( PDF )
Naor-Yung Paradigm with Shared Randomness and Applications
Silvio Biagioni and Daniel Masny and Daniele Venturi
2016/635 ( PDF )
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
Florian Tramer and Fan Zhang and Huang Lin and Jean-Pierre Hubaux and Ari Juels and Elaine Shi
2016/599 ( PDF )
Obfuscation from Low Noise Multilinear Maps
Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee
2016/564 ( PDF )
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
Mihir Bellare and Bjoern Tackmann
2016/545 ( PDF )
On Trees, Chains and Fast Transactions in the Blockchain
Aggelos Kiayias and Giorgos Panagiotakos
2016/458 ( PDF )
CompGC: Efficient Offline/Online Semi-honest Two-party Computation
Adam Groce and Alex Ledger and Alex J. Malozemoff and Arkady Yerukhimovich
2016/421 ( PDF )
Homomorphic Encryption for Arithmetic of Approximate Numbers
Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song
2016/341 ( PDF )
Semantically Secure Anonymity: Foundations of Re-encryption
Adam L. Young and Moti Yung
2016/209 ( PDF )
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song and Zhangjie Huang and Qianqian Yang
2016/046 ( PDF )
How To Simulate It - A Tutorial on the Simulation Proof Technique
Yehuda Lindell
2015/1162 ( PDF )
The Moral Character of Cryptographic Work
Phillip Rogaway
2015/954 ( PDF )
Online-Offline Homomorphic Signatures for Polynomial Functions
Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/806 ( PDF )
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
2015/751 ( PDF )
Fast Garbling of Circuits Under Standard Assumptions
Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
2015/486 ( PDF )
DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, and Cas Cremers
2015/126 ( PDF )
Perfect Structure on the Edge of Chaos
Nir Bitansky and Omer Paneth and Daniel Wichs
2014/765 ( PDF )
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2013/845 ( PDF )
How to Keep a Secret: Leakage Deterring Public-key Cryptography
Aggelos Kiayias and Qiang Tang
2013/183 ( PDF )
Practical Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2012/154 ( -- withdrawn -- )
The Joint Signature and Encryption Revisited
Laila El Aimani


[ Cryptology ePrint archive ]