Cryptology ePrint Archive: Recent Updates
-
2017/674 ( PDF )
- Transparent Memory Encryption and Authentication
- Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard
-
2017/673 ( PDF )
- Differential Fault Analysis Automation
- Sayandeep Saha, and Ujjawal Kumar, and Debdeep Mukhopadhyay, and Pallab Dasgupta
-
2017/672 ( PDF )
- Coding for interactive communication beyond threshold adversaries
- Anat Paskin-Cherniavsky and Slava Radune
-
2017/671 ( PDF )
- Guru: Universal Reputation Module for Distributed Consensus Protocols
- Alex Biryukov and Daniel Feher and Dmitry Khovratovich
-
2017/670 ( PDF )
- Private Set Intersection for Unequal Set Sizes with Mobile Applications
- Ágnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas
-
2017/669 ( PDF )
- Speeding up Elliptic Curve Scalar Multiplication without Precomputation
- Kwang Ho Kim and Junyop Choe and Song Yun Kim and Namsu Kim and Sekung Hong
-
2017/668 ( PDF )
- Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2017/667 ( PDF )
- High-speed key encapsulation from NTRU
- Andreas Hülsing and Joost Rijneveld and John Schanck and Peter Schwabe
-
2017/666 ( PDF )
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
- Katriel Cohn-Gordon and Cas Cremers and Luke Garratt and Jon Millican and Kevin Milner
-
2017/665 ( PDF )
- Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
- Michael Raskin
-
2017/664 ( PDF )
- Message Franking via Committing Authenticated Encryption
- Paul Grubbs and Jiahui Lu and Thomas Ristenpart
-
2017/663 ( PDF )
- Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
- Thomas Unterluggauer and Mario Werner and Stefan Mangard
-
2017/662 ( PDF )
- A new signature scheme based on (U|U+V) codes
- Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
-
2017/661 ( PDF )
- MuSE: Multimodal Searchable Encryption for Cloud Applications
- Bernardo Ferreira and João Leitão and Henrique Domingos
-
2017/660 ( PDF )
- Profiling Good Leakage Models For Masked Implementations
- Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou
-
2017/659 ( PDF )
- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
- Russell W. F. Lai and Sherman S. M. Chow
-
2017/658 ( PDF )
- Privacy for Targeted Advertising
- Avradip Mandal and John Mitchell and Hart Montgomery and Arnab Roy
-
2017/657 ( PDF )
- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
- Sanjit Chatterjee and Sayantan Mukherjee and Tapas Pandit
-
2017/656 ( PDF )
- iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
- Lei Fan and Hong-Sheng Zhou
-
2017/655 ( PDF )
- A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
- Jiao Hu and Ruilin Li and Chaojing Tang
-
2017/654 ( PDF )
- A Secure and Private Billing Protocol for Smart Metering
- Tom Eccles and Basel Halak
-
2017/653 ( PDF )
- Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
- Fanbao Liu and Fengmei Liu
-
2017/652 ( PDF )
- Pseudorandom Functions: Three Decades Later
- Andrej Bogdanov and Alon Rosen
-
2017/651 ( -- withdrawn -- )
- Rescuing LoRaWAN 1.0
- Gildas Avoine and Loïc Ferreira
-
2017/650 ( PDF )
- Efficient Public Trace and Revoke from Standard Assumptions
- Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehle and Shota Yamada
-
2017/649 ( PDF )
- Blockcipher-based Authenticated Encryption: How Small Can We Go?
- Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi
-
2017/648 ( PDF )
- CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
- Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ismail Khoffi and Justin Cappos and Bryan Ford
-
2017/647 ( PDF )
- A TMDTO Attack Against Lizard
- Subhamoy Maitra and Nishant Sinha and Akhilesh Siddhanti and Ravi Anand and Sugata Gangopadhyay
-
2017/646 ( PDF )
- Rational Trust Modeling
- Mehrdad Nojoumian
-
2017/645 ( PDF )
- SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
- Shay Gueron and Nicky Mouha
-
2017/644 ( PDF )
- On Space-Scarce Economy In Blockchain Systems
- Alexander Chepurnoy and Dmitry Meshkov
-
2017/643 ( PDF )
- Private Data Aggregation on a Budget
- Morten Dahl and Valerio Pastro and Mathieu Poumeyrol
-
2017/642 ( PDF )
- Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
- Nasrollah Pakniat and Mahnaz Noroozi and Ziba Eslami
-
2017/641 ( PDF )
- Integer Version of Ring-LWE and its Applications
- Gu Chunsheng
-
2017/640 ( PDF )
- Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
- Fabrice Benhamouda and Houda Ferradi and Rémi Géraud and David Naccache
-
2017/639 ( PDF )
- One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
- Jan Camenisch and Liqun Chen and Manu Drijvers and Anja Lehmann and David Novick and Rainer Urian
-
2017/638 ( PDF )
- From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
- Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
-
2017/637 ( PDF )
- Very High Order Masking: Efficient Implementation and Security Evaluation
- Anthony Journault and François-Xavier Standaert
-
2017/636 ( PDF )
- Implementing 128-bit Secure MPKC Signatures
- Ming-Shing Chen and Wen-Ding Li and Bo-Yuan Peng and Bo-Yin Yang and Chen-Mou Cheng
-
2017/635 ( PDF )
- PERUN: Virtual Payment Channels over Cryptographic Currencies
- Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski
-
2017/634 ( PDF )
- CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
- Joppe Bos and Léo Ducas and Eike Kiltz and Tancrède Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehlé
-
2017/633 ( PDF )
- CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
- Leo Ducas and Tancrede Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehle
-
2017/632 ( PDF )
- Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
- Dahmun Goudarzi and Matthieu Rivain and Damien Vergnaud and Srinivas Vivek
-
2017/631 ( PDF )
- Certifying Trapdoor Permutations, Revisited
- Ran Canetti and Amit Lichtenberg
-
2017/630 ( PDF )
- Gimli: a cross-platform permutation
- Daniel J. Bernstein and Stefan Kölbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and François-Xavier Standaert and Yosuke Todo and Benoît Viguier
-
2017/629 ( PDF )
- A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
- Romain Poussier and Yuanyuan Zhou and François-Xavier Standaert
-
2017/628 ( PDF )
- Middle-Product Learning With Errors
- Miruna Rosca and Amin Sakzad and Ron Steinfeld and Damien Stehle
-
2017/627 ( PDF )
- Sliding right into disaster: Left-to-right sliding windows leak
- Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom
-
2017/626 ( PDF )
- CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
- Hai Zhou and Ruifeng Jiang and Shuyu Kong
-
2017/625 ( PDF )
- How to Break Secure Boot on FPGA SoCs through Malicious Hardware
- Nisha Jacob and Johann Heyszl and Andreas Zankl and Carsten Rolfes and Georg Sigl
-
2017/624 ( PDF )
- Fast Leakage Assessment
- Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede
-
2017/623 ( PDF )
- Back to Massey: Impressively fast, scalable and tight security evaluation tools
- Marios O. Choudary and P.G. Popescu
-
2017/622 ( PDF )
- GIFT: A Small Present
- Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Siang Meng Sim and Yosuke Todo and Yu Sasaki
-
2017/621 ( PDF )
- Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks
- Xiaolin Xu and Bicky Shakya and Mark M. Tehranipoor and Domenic Forte
-
2017/620 ( PDF )
- The Algebraic Group Model and its Applications
- Eike Kiltz and Julian Loss
-
2017/619 ( PDF )
- Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
- Qiong Huang and Jianye Huang
-
2017/618 ( PDF )
- CacheZoom: How SGX Amplifies The Power of Cache Attacks
- Ahmad Moghimi and Gorka Irazoqui and Thomas Eisenbarth
-
2017/617 ( PDF )
- Secure Arithmetic Computation with Constant Computational Overhead
- Benny Applebaum and Ivan Damgård and Yuval Ishai and Michael Nielsen and Lior Zichron
-
2017/616 ( PDF )
- Digital Liquid Democracy: How to Vote Your Delegation Statement
- Bingsheng Zhang and Hong-Sheng Zhou
-
2017/615 ( PDF )
- A Framework to Select Parameters for Lattice-Based Cryptography
- Nabil Alkeilani Alkadri and Johannes Buchmann and Rachid El Bansarkhani and Juliane Krämer
-
2017/614 ( PDF )
- Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
- Mathias Wagner and Stefan Heyse
-
2017/613 ( PDF )
- Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
- Hocheol Shin and Dohyun Kim and Yujin Kwon and Yongdae Kim
-
2017/612 ( PDF )
- Large Modulus Ring-LWE >= Module-LWE
- Martin R. Albrecht and Amit Deo
-
2017/611 ( PDF )
- Multi-Rate Threshold FlipThem
- David Leslie and Chris Sherfield and Nigel P. Smart
-
2017/610 ( PDF )
- Differential Attacks: Using Alternative Operations
- Céline Blondeau and Roberto Civino and Massimiliano Sala
-
2017/609 ( PDF )
- On the discrete logarithm problem for prime-field elliptic curves
- Alessandro Amadori and Federico Pintore and Massimiliano Sala
-
2017/608 ( PDF )
- Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs
- Vincent Immler and Robert Specht and Florian Unterstein
-
2017/607 ( PDF )
- Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
- Edward Eaton
-
2017/606 ( PDF )
- Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
- Johannes Buchmann and Niklas Büscher and Florian Göpfert and Stefan Katzenbeisser and Juliane Krämer and Daniele Micciancio and Sander Siim and Christine van Vredendaal and Michael Walter
-
2017/605 ( PDF )
- Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
- Xavier Bultel and Pascal Lafourcade
-
2017/604 ( PDF )
- A Modular Analysis of the Fujisaki-Okamoto Transformation
- Dennis Hofheinz and Kathrin Hövelmanns and Eike Kiltz
-
2017/603 ( PDF )
- Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
- Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
-
2017/602 ( PDF )
- A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
- Sean Bowe and Ariel Gabizon and Matthew D. Green
-
2017/601 ( PDF )
- Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
- Wei Dai and Yarkın Doröz and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savaş and Berk Sunar
-
2017/600 ( PDF )
- Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
- Jeremy Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich
-
2017/599 ( PDF )
- A Subversion-Resistant SNARK
- Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac
-
2017/598 ( PDF )
- Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
- Martin Roetteler and Michael Naehrig and Krysta M. Svore and Kristin Lauter
-
2017/597 ( PDF )
- Round Optimal Concurrent MPC via Strong Simulation
- Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai
-
2017/596 ( PDF )
- A Side-Channel Assisted Cryptanalytic Attack Against QcBits
- Melissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson
-
2017/595 ( PDF )
- FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
- Wen Wang and Jakub Szefer and Ruben Niederhagen
-
2017/594 ( PDF )
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- Robert Primas and Peter Pessl and Stefan Mangard
-
2017/593 ( PDF )
- Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra
- Alessio Caminata and Elisa Gorla
-
2017/592 ( PDF )
- Speeding up lattice sieve with Xeon Phi coprocessor
- Anja Becker and Dusan Kostic
-
2017/591 ( PDF )
- On the Security of Carrier Phase-based Ranging
- Hildur Olafsdottir and Aanjhan Ranganathan and Srdjan Capkun
-
2017/590 ( PDF )
- Constant bandwidth ORAM with small block size using PIR operations
- Linru Zhang and Gongxian Zeng and Yuechen Chen and Siu-Ming Yiu and Nairen Cao and Zheli Liu
-
2017/589 ( PDF )
- An Attempt to Cryptanalyze A Partially Known Cipher Algorithm
- Juay Guan Hee
-
2017/588 ( PDF )
- Renyi Entropy Estimation Revisited
- Maciej Obremski and Maciej Skorski
-
2017/587 ( PDF )
- Subversion-zero-knowledge SNARKs
- Georg Fuchsbauer
-
2017/586 ( PDF )
- Deterministic, Stash-Free Write-Only ORAM
- Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry
-
2017/585 ( PDF )
- Internet Voting Using Zcash
- Pavel Tarasov and Hitesh Tewari
-
2017/584 ( PDF )
- Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
- Luka Malisa and Kari Kostiainen and Thomas Knell and David Sommer and Srdjan Capkun
-
2017/583 ( )
- Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
- Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
-
2017/582 ( PDF )
- (Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
- Angela Jäschke and Frederik Armknecht
-
2017/581 ( PDF )
- Parallel Collision Search with Radix Trees
- Gilles Dequen and Sorina Ionica and Monika Trimoska
-
2017/580 ( PDF )
- Analysing Relations involving small number of Monomials in AES S- Box
- Riddhi Ghosal
-
2017/579 ( PDF )
- Birthday Attack on Dual EWCDM
- Mridul Nandi
-
2017/578 ( PDF )
- TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
- Hubert Ritzdorf and Karl Wüst and Arthur Gervais and Guillaume Felley and Srdjan Capkun
-
2017/577 ( PDF )
- Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
- Steffen Schulz and André Schaller and Florian Kohnhäuser and Stefan Katzenbeisser
-
2017/576 ( PDF )
- The Security of SIMON-like Ciphers Against Linear Cryptanalysis
- Zhengbin Liu and Yongqiang Li and Mingsheng Wang
-
2017/575 ( PDF )
- Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds
- Ehsan Ebrahimi and Dominique Unruh
-
2017/574 ( PDF )
- A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
- Hamidreza Yazdanpanah, Mohammadreza Hasani Ahangar, Mahdi Azizi and Arash Ghafouri
-
2017/573 ( PDF )
- Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
- Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
-
2017/572 ( PDF )
- MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
- Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Marten van Dijk
-
2017/571 ( PDF )
- Faster Algorithms for Isogeny Problems using Torsion Point Images
- Christophe Petit
-
2017/570 ( PDF )
- Assessing the No-Knowledge Property of SpiderOak ONE
- Anders P. K. Dalskov and Claudio Orlandi
-
2017/569 ( PDF )
- Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
- Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
-
2017/568 ( PDF )
- Towards Doubly Efficient Private Information Retrieval
- Ran Canetti and Justin Holmgren and Silas Richelson
-
2017/567 ( PDF )
- Can We Access a Database Both Locally and Privately?
- Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters
-
2017/566 ( PDF )
- Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
- Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo
-
2017/565 ( PDF )
- A Formal Foundation for Secure Remote Execution of Enclaves
- Pramod Subramanyan and Rohit Sinha and Ilia Lebedev and Srinivas Devadas and Sanjit Seshia
-
2017/564 ( PDF )
- Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
- Manaar Alam and Sarani Bhattacharya and Debdeep Mukhopadhyay and Sourangshu Bhattacharya
-
2017/563 ( PDF )
- Weak is Better: Tightly Secure Short Signatures from Weak PRFs
- Jacob Alperin-Sheriff and Daniel Apon
-
2017/562 ( PDF )
- Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices
- Björn Haase and Benoît Labrique
-
2017/561 ( PDF )
- Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
- Yashvanth Kondi and Arpita Patra
-
2017/560 ( PDF )
- Notes on the design and analysis of SIMON and SPECK
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2017/559 ( PDF )
- Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
- Alexandra Boldyreva and Shan Chen and Pierre-Alain Dupont and David Pointcheval
-
2017/552 ( PDF )
- Fast Secure Two-Party ECDSA Signing
- Yehuda Lindell
-
2017/543 ( PDF )
- Identity-Based Encryption from the Diffie-Hellman Assumption
- Nico Döttling and Sanjam Garg
-
2017/542 ( PDF )
- A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
- Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart
-
2017/537 ( PDF )
- Information-theoretic Indistinguishability via the Chi-squared Method
- Wei Dai and Viet Tung Hoang and Stefano Tessaro
-
2017/535 ( PDF )
- ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
- Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin
-
2017/527 ( PDF )
- Key Rotation for Authenticated Encryption
- Adam Everspaugh and Kenneth Paterson and Thomas Ristenpart and Sam Scott
-
2017/526 ( PDF )
- Evaluating web PKIs
- Jiangshan Yu and Mark Ryan
-
2017/525 ( PDF )
- Kurosawa-Desmedt Meets Tight Security
- Romain Gay and Dennis Hofheinz and Lisa Kohl
-
2017/524 ( PDF )
- Compact Structure-preserving Signatures with Almost Tight Security
- Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan
-
2017/522 ( PDF )
- On the Hardness of the Mersenne Low Hamming Ratio Assumption
- Marc Beunardeau and Aisling Connolly and Rémi Géraud and David Naccache
-
2017/514 ( PDF )
- Identity-based Encryption from Codes with Rank Metric
- Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean-Pierre Tillich
-
2017/507 ( PDF )
- Inverted Leftover Hash Lemma
- Maciej Obremski and Maciej Skórski
-
2017/497 ( PDF )
- Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
- Itai Dinur and Niv Nadler
-
2017/496 ( PDF )
- Modes of Operation Suitable for Computing on Encrypted Data
- Dragos Rotaru and Nigel P. Smart and Martijn Stam
-
2017/491 ( PDF )
- Laconic Oblivious Transfer and its Applications
- Chongwon Cho and Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou
-
2017/488 ( PDF )
- Multi-Collision Resistance: A Paradigm for Keyless Hash Functions
- Nir Bitansky and Yael Tauman Kalai and Omer Paneth
-
2017/484 ( PDF )
- Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial
- Jung Hee Cheon and Minki Hhan and Changmin Lee
-
2017/482 ( PDF )
- On the Statistical Leak of the GGH13 Multilinear Map and some Variants
- Léo Ducas and Alice Pellet--Mary
-
2017/479 ( PDF )
- Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
- Keita Emura
-
2017/473 ( PDF )
- Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
- Bart Mennink and Samuel Neves
-
2017/466 ( PDF )
- Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security
- Yusuke Naito
-
2017/458 ( -- withdrawn -- )
- Fully Homomorphic Encryption Using Multivariate Polynomials
- Matthew Tamayo-Rios and Jean-Charles Faugère and Ludovic Perret and Peng Hui How and Robin Zhang
-
2017/455 ( PDF )
- Vector Encoding over Lattices and Its Applications
- Daniel Apon and Xiong Fan and Feng-Hao Liu
-
2017/442 ( PDF )
- On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i
- Jeremiah Blocki and Samson Zhou
-
2017/441 ( PDF )
- New Approach to Practical Leakage-Resilient Public-Key Cryptography
- Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan
-
2017/440 ( PDF )
- Cryptographic Security Analysis of T-310
- Nicolas T. Courtois and Klaus Schmeh and Jörg Drobick and Jacques Patarin and Maria-Bristena Oprisanu and Matteo Scarlata and Om Bhallamudi
-
2017/437 ( PDF )
- Slothful reduction
- Michael Scott
-
2017/426 ( PDF )
- FHPKE based on multivariate discrete logarithm problem
- Masahiro Yagisawa
-
2017/424 ( PDF )
- HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
- Markku-Juhani O. Saarinen
-
2017/418 ( PDF )
- Strong Authenticated Key Exchange with Auxiliary Inputs
- Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
-
2017/411 ( PDF )
- A New Algorithm for Inversion mod $p^k$
- Çetin Kaya Koç
-
2017/384 ( PDF )
- Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
- Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang
-
2017/371 ( PDF )
- On the Construction of Lightweight Orthogonal MDS Matrices
- Lijing Zhou, Licheng Wang and Yiru Sun
-
2017/367 ( PDF )
- Forking-Free Hybrid Consensus with Generalized Proof-of-Activity
- Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, and Yu Long
-
2017/359 ( PDF )
- Conditional Disclosure of Secrets via Non-Linear Reconstruction
- Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee
-
2017/357 ( PDF )
- Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model
- Nico Döttling and Jesper Buus Nielsen and Maciej Obremski
-
2017/354 ( PDF )
- Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
- Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart
-
2017/350 ( PDF )
- The Montgomery ladder on binary elliptic curves
- Thomaz Oliveira and Julio López and Francisco Rodríguez-Henríquez
-
2017/344 ( PDF )
- DUPLO: Unifying Cut-and-Choose for Garbled Circuits
- Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti
-
2017/341 ( PDF )
- Steganography techniques
- Dragoş Dumitrescu and Ioan-Mihail Stan and Emil Simion
-
2017/340 ( -- withdrawn -- )
- Enhancing Security by Combining Biometrics and Cryptography
- Diana Popa and Emil Simion
-
2017/267 ( PDF )
- A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
- Seungkwang Lee
-
2017/262 ( PDF )
- When It’s All Just Too Much: Outsourcing MPC-Preprocessing
- Peter Scholl and Nigel P. Smart and Tim Wood
-
2017/259 ( PDF )
- Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
- Daniele Micciancio and Michael Walter
-
2017/252 ( PDF )
- High-Order Conversion From Boolean to Arithmetic Masking
- Jean-Sebastien Coron
-
2017/251 ( PDF )
- A Lattice-Based Universal Thresholdizer for Cryptographic Systems
- Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim
-
2017/250 ( PDF )
- Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
- Huijia Lin and Stefano Tessaro
-
2017/229 ( PDF )
- Multi-Prover Interactive Proofs: Unsound Foundations
- Claude Crépeau and Nan Yang
-
2017/200 ( PDF )
- Anonymous Attestation with Subverted TPMs
- Jan Camenisch and Manu Drijvers and Anja Lehmann
-
2017/153 ( PDF )
- Storage Efficient Substring Searchable Symmetric Encryption
- Iraklis Leontiadis and Ming Li
-
2017/151 ( PDF )
- Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
- Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay
-
2017/150 ( PDF )
- Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
- Elette Boyle and Niv Gilboa and Yuval Ishai
-
2017/140 ( PDF )
- Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
- Nina Bindel and Johannes Buchmann and Florian Göpfert and Markus Schmidt
-
2017/137 ( PDF )
- Modifying an Enciphering Scheme after Deployment
- Paul Grubbs and Thomas Ristenpart and Yuval Yarom
-
2017/115 ( PDF )
- An efficient self-blindable attribute-based credential scheme
- Sietse Ringers and Eric Verheul and Jaap-Henk Hoepman
-
2017/103 ( PDF )
- Reconciling d+1 Masking in Hardware and Software
- Hannes Gross and Stefan Mangard
-
2017/099 ( PDF )
- Making NSEC5 Practical for DNSSEC
- Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan Včelák and Leonid Reyzin and Sharon Goldberg
-
2017/081 ( PDF )
- Estonian Voting Verification Mechanism Revisited Again
- Ivo Kubjas and Tiit Pikma and Jan Willemson
-
2017/078 ( PDF )
- LPN Decoded
- Andre Esser and Robert Kübler and Alexander May
-
2017/060 ( PDF )
- Zero Round-Trip Time for the Extended Access Control Protocol
- Jacqueline Brendel and Marc Fischlin
-
2017/056 ( PDF )
- Verifiable Classroom Voting in Practice
- Feng Hao and Dylan Clarke and Brian Randell and Siamak F. Shahandashti
-
2017/048 ( PDF )
- ROTE: Rollback Protection for Trusted Execution
- Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun
-
2017/046 ( PDF )
- Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
- Matthieu Giraud and Alexandre Anzala-Yamajako and Olivier Bernard and Pascal Lafourcade
-
2017/045 ( PDF )
- Efficient Round-Optimal Blind Signatures in the Standard Model
- Essam Ghadafi
-
2017/042 ( PDF )
- Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient
- Yuanxi Dai and Yannick Seurin and John Steinberger and Aishwarya Thiruvengadam
-
2017/039 ( PDF )
- SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version)
- Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
-
2017/019 ( PDF )
- SmartPool: Practical Decentralized Pooled Mining
- Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena
-
2017/013 ( PDF )
- Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
- Meilof Veeningen
-
2016/1174 ( PDF )
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
- Eik List and Mridul Nandi
-
2016/1173 ( PDF )
- Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring
- Lijing Zhou, Licheng Wang and Yiru Sun
-
2016/1169 ( PDF )
- LWE from Non-commutative Group Rings
- Qi Cheng and Jun Zhang and Jincheng Zhuang
-
2016/1152 ( PDF )
- Leak Me If You Can: Does TVLA Reveal Success Rate?
- Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Sikhar Patranabis and Debdeep Mukhopadhyay
-
2016/1126 ( PDF )
- Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
- Jung Hee Cheon and Duhyeong Kim and Joohee Lee and Yongsoo Song
-
2016/1105 ( PDF )
- Generic Transformations of Predicate Encodings: Constructions and Applications
- Miguel Ambrona and Gilles Barthe and Benedikt Schmidt
-
2016/1096 ( PDF )
- Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
- Huijia Lin
-
2016/1068 ( PDF )
- On Finding Short Cycles in Cryptographic Algorithms
- Elena Dubrova and Maxim Teslenko
-
2016/1061 ( PDF )
- Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
- Joan Daemen
-
2016/1015 ( PDF )
- MaxLength Considered Harmful to the RPKI
- Yossi Gilad and Omar Sagga and Sharon Goldberg
-
2016/1003 ( PDF )
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
- Daniel Apon and Nico Döttling and Sanjam Garg and Pratyay Mukherjee
-
2016/977 ( PDF )
- Side channels in deduplication: trade-offs between leakage and efficiency
- Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Mohsen Toorani
-
2016/892 ( PDF )
- Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
- Adrià Gascón and Phillipp Schoppmann and Borja Balle and Mariana Raykova and Jack Doerner and Samee Zahur and David Evans
-
2016/889 ( PDF )
- Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
- Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
-
2016/880 ( PDF )
- Naor-Yung Paradigm with Shared Randomness and Applications
- Silvio Biagioni and Daniel Masny and Daniele Venturi
-
2016/635 ( PDF )
- Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
- Florian Tramer and Fan Zhang and Huang Lin and Jean-Pierre Hubaux and Ari Juels and Elaine Shi
-
2016/599 ( PDF )
- Obfuscation from Low Noise Multilinear Maps
- Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee
-
2016/564 ( PDF )
- The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
- Mihir Bellare and Bjoern Tackmann
-
2016/545 ( PDF )
- On Trees, Chains and Fast Transactions in the Blockchain
- Aggelos Kiayias and Giorgos Panagiotakos
-
2016/458 ( PDF )
- CompGC: Efficient Offline/Online Semi-honest Two-party Computation
- Adam Groce and Alex Ledger and Alex J. Malozemoff and Arkady Yerukhimovich
-
2016/421 ( PDF )
- Homomorphic Encryption for Arithmetic of Approximate Numbers
- Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song
-
2016/341 ( PDF )
- Semantically Secure Anonymity: Foundations of Re-encryption
- Adam L. Young and Moti Yung
-
2016/209 ( PDF )
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- Ling Song and Zhangjie Huang and Qianqian Yang
-
2016/046 ( PDF )
- How To Simulate It - A Tutorial on the Simulation Proof Technique
- Yehuda Lindell
-
2015/1162 ( PDF )
- The Moral Character of Cryptographic Work
- Phillip Rogaway
-
2015/954 ( PDF )
- Online-Offline Homomorphic Signatures for Polynomial Functions
- Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
-
2015/806 ( PDF )
- Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers
- Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
-
2015/751 ( PDF )
- Fast Garbling of Circuits Under Standard Assumptions
- Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
-
2015/486 ( PDF )
- DECIM: Detecting Endpoint Compromise In Messaging
- Jiangshan Yu, Mark Ryan, and Cas Cremers
-
2015/126 ( PDF )
- Perfect Structure on the Edge of Chaos
- Nir Bitansky and Omer Paneth and Daniel Wichs
-
2014/765 ( PDF )
- The Bitcoin Backbone Protocol: Analysis and Applications
- Juan Garay and Aggelos Kiayias and Nikos Leonardos
-
2013/845 ( PDF )
- How to Keep a Secret: Leakage Deterring Public-key Cryptography
- Aggelos Kiayias and Qiang Tang
-
2013/183 ( PDF )
- Practical Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2012/154 ( -- withdrawn -- )
- The Joint Signature and Encryption Revisited
- Laila El Aimani
[ Cryptology ePrint archive ]