Cryptology ePrint Archive: Recent Updates
-
2017/674 ( PDF )
- Transparent Memory Encryption and Authentication
- Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard
-
2017/673 ( PDF )
- Differential Fault Analysis Automation
- Sayandeep Saha, and Ujjawal Kumar, and Debdeep Mukhopadhyay, and Pallab Dasgupta
-
2017/672 ( PDF )
- Coding for interactive communication beyond threshold adversaries
- Anat Paskin-Cherniavsky and Slava Radune
-
2017/671 ( PDF )
- Guru: Universal Reputation Module for Distributed Consensus Protocols
- Alex Biryukov and Daniel Feher and Dmitry Khovratovich
-
2017/670 ( PDF )
- Private Set Intersection for Unequal Set Sizes with Mobile Applications
- Ágnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas
-
2017/669 ( PDF )
- Speeding up Elliptic Curve Scalar Multiplication without Precomputation
- Kwang Ho Kim and Junyop Choe and Song Yun Kim and Namsu Kim and Sekung Hong
-
2017/668 ( PDF )
- Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2017/667 ( PDF )
- High-speed key encapsulation from NTRU
- Andreas Hülsing and Joost Rijneveld and John Schanck and Peter Schwabe
-
2017/666 ( PDF )
- On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
- Katriel Cohn-Gordon and Cas Cremers and Luke Garratt and Jon Millican and Kevin Milner
-
2017/665 ( PDF )
- Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
- Michael Raskin
-
2017/664 ( PDF )
- Message Franking via Committing Authenticated Encryption
- Paul Grubbs and Jiahui Lu and Thomas Ristenpart
-
2017/663 ( PDF )
- Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
- Thomas Unterluggauer and Mario Werner and Stefan Mangard
-
2017/662 ( PDF )
- A new signature scheme based on (U|U+V) codes
- Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
-
2017/661 ( PDF )
- MuSE: Multimodal Searchable Encryption for Cloud Applications
- Bernardo Ferreira and João Leitão and Henrique Domingos
-
2017/660 ( PDF )
- Profiling Good Leakage Models For Masked Implementations
- Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou
-
2017/659 ( PDF )
- Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
- Russell W. F. Lai and Sherman S. M. Chow
-
2017/658 ( PDF )
- Privacy for Targeted Advertising
- Avradip Mandal and John Mitchell and Hart Montgomery and Arnab Roy
-
2017/657 ( PDF )
- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
- Sanjit Chatterjee and Sayantan Mukherjee and Tapas Pandit
-
2017/656 ( PDF )
- iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
- Lei Fan and Hong-Sheng Zhou
-
2017/655 ( PDF )
- A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
- Jiao Hu and Ruilin Li and Chaojing Tang
-
2017/654 ( PDF )
- A Secure and Private Billing Protocol for Smart Metering
- Tom Eccles and Basel Halak
-
2017/653 ( PDF )
- Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
- Fanbao Liu and Fengmei Liu
-
2017/652 ( PDF )
- Pseudorandom Functions: Three Decades Later
- Andrej Bogdanov and Alon Rosen
-
2017/651 ( -- withdrawn -- )
- Rescuing LoRaWAN 1.0
- Gildas Avoine and Loïc Ferreira
-
2017/650 ( PDF )
- Efficient Public Trace and Revoke from Standard Assumptions
- Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehle and Shota Yamada
-
2017/649 ( PDF )
- Blockcipher-based Authenticated Encryption: How Small Can We Go?
- Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi
-
2017/648 ( PDF )
- CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
- Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ismail Khoffi and Justin Cappos and Bryan Ford
-
2017/647 ( PDF )
- A TMDTO Attack Against Lizard
- Subhamoy Maitra and Nishant Sinha and Akhilesh Siddhanti and Ravi Anand and Sugata Gangopadhyay
-
2017/646 ( PDF )
- Rational Trust Modeling
- Mehrdad Nojoumian
-
2017/645 ( PDF )
- SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
- Shay Gueron and Nicky Mouha
-
2017/644 ( PDF )
- On Space-Scarce Economy In Blockchain Systems
- Alexander Chepurnoy and Dmitry Meshkov
-
2017/643 ( PDF )
- Private Data Aggregation on a Budget
- Morten Dahl and Valerio Pastro and Mathieu Poumeyrol
-
2017/642 ( PDF )
- Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
- Nasrollah Pakniat and Mahnaz Noroozi and Ziba Eslami
-
2017/641 ( PDF )
- Integer Version of Ring-LWE and its Applications
- Gu Chunsheng
-
2017/640 ( PDF )
- Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
- Fabrice Benhamouda and Houda Ferradi and Rémi Géraud and David Naccache
-
2017/639 ( PDF )
- One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
- Jan Camenisch and Liqun Chen and Manu Drijvers and Anja Lehmann and David Novick and Rainer Urian
-
2017/638 ( PDF )
- From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
- Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
-
2017/637 ( PDF )
- Very High Order Masking: Efficient Implementation and Security Evaluation
- Anthony Journault and François-Xavier Standaert
-
2017/636 ( PDF )
- Implementing 128-bit Secure MPKC Signatures
- Ming-Shing Chen and Wen-Ding Li and Bo-Yuan Peng and Bo-Yin Yang and Chen-Mou Cheng
-
2017/635 ( PDF )
- PERUN: Virtual Payment Channels over Cryptographic Currencies
- Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski
-
2017/634 ( PDF )
- CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
- Joppe Bos and Léo Ducas and Eike Kiltz and Tancrède Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehlé
-
2017/633 ( PDF )
- CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
- Leo Ducas and Tancrede Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehle
-
2017/632 ( PDF )
- Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
- Dahmun Goudarzi and Matthieu Rivain and Damien Vergnaud and Srinivas Vivek
-
2017/631 ( PDF )
- Certifying Trapdoor Permutations, Revisited
- Ran Canetti and Amit Lichtenberg
-
2017/630 ( PDF )
- Gimli: a cross-platform permutation
- Daniel J. Bernstein and Stefan Kölbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and François-Xavier Standaert and Yosuke Todo and Benoît Viguier
-
2017/629 ( PDF )
- A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
- Romain Poussier and Yuanyuan Zhou and François-Xavier Standaert
-
2017/628 ( PDF )
- Middle-Product Learning With Errors
- Miruna Rosca and Amin Sakzad and Ron Steinfeld and Damien Stehle
-
2017/627 ( PDF )
- Sliding right into disaster: Left-to-right sliding windows leak
- Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom
-
2017/626 ( PDF )
- CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
- Hai Zhou and Ruifeng Jiang and Shuyu Kong
-
2017/625 ( PDF )
- How to Break Secure Boot on FPGA SoCs through Malicious Hardware
- Nisha Jacob and Johann Heyszl and Andreas Zankl and Carsten Rolfes and Georg Sigl
-
2017/624 ( PDF )
- Fast Leakage Assessment
- Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede
-
2017/623 ( PDF )
- Back to Massey: Impressively fast, scalable and tight security evaluation tools
- Marios O. Choudary and P.G. Popescu
-
2017/622 ( PDF )
- GIFT: A Small Present
- Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Siang Meng Sim and Yosuke Todo and Yu Sasaki
-
2017/621 ( PDF )
- Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks
- Xiaolin Xu and Bicky Shakya and Mark M. Tehranipoor and Domenic Forte
-
2017/620 ( PDF )
- The Algebraic Group Model and its Applications
- Eike Kiltz and Julian Loss
-
2017/619 ( PDF )
- Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
- Qiong Huang and Jianye Huang
-
2017/618 ( PDF )
- CacheZoom: How SGX Amplifies The Power of Cache Attacks
- Ahmad Moghimi and Gorka Irazoqui and Thomas Eisenbarth
-
2017/617 ( PDF )
- Secure Arithmetic Computation with Constant Computational Overhead
- Benny Applebaum and Ivan Damgård and Yuval Ishai and Michael Nielsen and Lior Zichron
-
2017/616 ( PDF )
- Digital Liquid Democracy: How to Vote Your Delegation Statement
- Bingsheng Zhang and Hong-Sheng Zhou
-
2017/615 ( PDF )
- A Framework to Select Parameters for Lattice-Based Cryptography
- Nabil Alkeilani Alkadri and Johannes Buchmann and Rachid El Bansarkhani and Juliane Krämer
-
2017/614 ( PDF )
- Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
- Mathias Wagner and Stefan Heyse
-
2017/613 ( PDF )
- Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
- Hocheol Shin and Dohyun Kim and Yujin Kwon and Yongdae Kim
-
2017/612 ( PDF )
- Large Modulus Ring-LWE >= Module-LWE
- Martin R. Albrecht and Amit Deo
-
2017/611 ( PDF )
- Multi-Rate Threshold FlipThem
- David Leslie and Chris Sherfield and Nigel P. Smart
-
2017/610 ( PDF )
- Differential Attacks: Using Alternative Operations
- Céline Blondeau and Roberto Civino and Massimiliano Sala
-
2017/609 ( PDF )
- On the discrete logarithm problem for prime-field elliptic curves
- Alessandro Amadori and Federico Pintore and Massimiliano Sala
-
2017/608 ( PDF )
- Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs
- Vincent Immler and Robert Specht and Florian Unterstein
-
2017/607 ( PDF )
- Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
- Edward Eaton
-
2017/606 ( PDF )
- Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
- Johannes Buchmann and Niklas Büscher and Florian Göpfert and Stefan Katzenbeisser and Juliane Krämer and Daniele Micciancio and Sander Siim and Christine van Vredendaal and Michael Walter
-
2017/605 ( PDF )
- Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
- Xavier Bultel and Pascal Lafourcade
-
2017/604 ( PDF )
- A Modular Analysis of the Fujisaki-Okamoto Transformation
- Dennis Hofheinz and Kathrin Hövelmanns and Eike Kiltz
-
2017/603 ( PDF )
- Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
- Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
-
2017/602 ( PDF )
- A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
- Sean Bowe and Ariel Gabizon and Matthew D. Green
-
2017/601 ( PDF )
- Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
- Wei Dai and Yarkın Doröz and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savaş and Berk Sunar
-
2017/600 ( PDF )
- Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
- Jeremy Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich
-
2017/599 ( PDF )
- A Subversion-Resistant SNARK
- Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac
-
2017/598 ( PDF )
- Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
- Martin Roetteler and Michael Naehrig and Krysta M. Svore and Kristin Lauter
-
2017/597 ( PDF )
- Round Optimal Concurrent MPC via Strong Simulation
- Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai
-
2017/596 ( PDF )
- A Side-Channel Assisted Cryptanalytic Attack Against QcBits
- Melissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson
-
2017/595 ( PDF )
- FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
- Wen Wang and Jakub Szefer and Ruben Niederhagen
-
2017/594 ( PDF )
- Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
- Robert Primas and Peter Pessl and Stefan Mangard
-
2017/593 ( PDF )
- Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra
- Alessio Caminata and Elisa Gorla
-
2017/592 ( PDF )
- Speeding up lattice sieve with Xeon Phi coprocessor
- Anja Becker and Dusan Kostic
-
2017/591 ( PDF )
- On the Security of Carrier Phase-based Ranging
- Hildur Olafsdottir and Aanjhan Ranganathan and Srdjan Capkun
-
2017/590 ( PDF )
- Constant bandwidth ORAM with small block size using PIR operations
- Linru Zhang and Gongxian Zeng and Yuechen Chen and Siu-Ming Yiu and Nairen Cao and Zheli Liu
-
2017/589 ( PDF )
- An Attempt to Cryptanalyze A Partially Known Cipher Algorithm
- Juay Guan Hee
-
2017/588 ( PDF )
- Renyi Entropy Estimation Revisited
- Maciej Obremski and Maciej Skorski
-
2017/587 ( PDF )
- Subversion-zero-knowledge SNARKs
- Georg Fuchsbauer
-
2017/586 ( PDF )
- Deterministic, Stash-Free Write-Only ORAM
- Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry
-
2017/585 ( PDF )
- Internet Voting Using Zcash
- Pavel Tarasov and Hitesh Tewari
-
2017/584 ( PDF )
- Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
- Luka Malisa and Kari Kostiainen and Thomas Knell and David Sommer and Srdjan Capkun
-
2017/583 ( )
- Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
- Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
-
2017/582 ( PDF )
- (Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
- Angela Jäschke and Frederik Armknecht
-
2017/581 ( PDF )
- Parallel Collision Search with Radix Trees
- Gilles Dequen and Sorina Ionica and Monika Trimoska
-
2017/580 ( PDF )
- Analysing Relations involving small number of Monomials in AES S- Box
- Riddhi Ghosal
-
2017/579 ( PDF )
- Birthday Attack on Dual EWCDM
- Mridul Nandi
-
2017/578 ( PDF )
- TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
- Hubert Ritzdorf and Karl Wüst and Arthur Gervais and Guillaume Felley and Srdjan Capkun
-
2017/577 ( PDF )
- Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
- Steffen Schulz and André Schaller and Florian Kohnhäuser and Stefan Katzenbeisser
-
2017/576 ( PDF )
- The Security of SIMON-like Ciphers Against Linear Cryptanalysis
- Zhengbin Liu and Yongqiang Li and Mingsheng Wang
-
2017/575 ( PDF )
- Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds
- Ehsan Ebrahimi and Dominique Unruh
-
2017/574 ( PDF )
- A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
- Hamidreza Yazdanpanah, Mohammadreza Hasani Ahangar, Mahdi Azizi and Arash Ghafouri
-
2017/573 ( PDF )
- Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
- Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
-
2017/572 ( PDF )
- MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
- Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Marten van Dijk
-
2017/571 ( PDF )
- Faster Algorithms for Isogeny Problems using Torsion Point Images
- Christophe Petit
-
2017/570 ( PDF )
- Assessing the No-Knowledge Property of SpiderOak ONE
- Anders P. K. Dalskov and Claudio Orlandi
-
2017/569 ( PDF )
- Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
- Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
-
2017/568 ( PDF )
- Towards Doubly Efficient Private Information Retrieval
- Ran Canetti and Justin Holmgren and Silas Richelson
-
2017/567 ( PDF )
- Can We Access a Database Both Locally and Privately?
- Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters
-
2017/566 ( PDF )
- Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
- Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo
-
2017/565 ( PDF )
- A Formal Foundation for Secure Remote Execution of Enclaves
- Pramod Subramanyan and Rohit Sinha and Ilia Lebedev and Srinivas Devadas and Sanjit Seshia
-
2017/564 ( PDF )
- Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
- Manaar Alam and Sarani Bhattacharya and Debdeep Mukhopadhyay and Sourangshu Bhattacharya
-
2017/563 ( PDF )
- Weak is Better: Tightly Secure Short Signatures from Weak PRFs
- Jacob Alperin-Sheriff and Daniel Apon
-
2017/562 ( PDF )
- Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices
- Björn Haase and Benoît Labrique
-
2017/561 ( PDF )
- Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
- Yashvanth Kondi and Arpita Patra
-
2017/560 ( PDF )
- Notes on the design and analysis of SIMON and SPECK
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2017/559 ( PDF )
- Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
- Alexandra Boldyreva and Shan Chen and Pierre-Alain Dupont and David Pointcheval
-
2017/558 ( PDF )
- Detecting Large Integer Arithmetic for Defense Against Crypto Ransomware
- Mehmet Sabir Kiraz and Ziya Alper Genç and Erdinç Öztürk
-
2017/557 ( PDF )
- Watermarking Public-key Cryptographic Functionalities and Implementations
- Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari
-
2017/556 ( PDF )
- Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$).
- Sankhanil Dey and Ranjan Ghosh
-
2017/555 ( PDF )
- Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion
- Fabrice Benhamouda and Hugo Krawczyk and Tal Rabin
-
2017/554 ( PDF )
- Trapping ECC with Invalid Curve Bug Attacks
- Renaud Dubois
-
2017/553 ( PDF )
- Further Analysis of a Proposed Hash-Based Signature Standard
- Scott Fluhrer
-
2017/552 ( PDF )
- Fast Secure Two-Party ECDSA Signing
- Yehuda Lindell
-
2017/551 ( PDF )
- Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions
- Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
-
2017/550 ( PDF )
- Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments
- Tore Frederiksen and Benny Pinkas and Avishay Yanay
-
2017/549 ( PDF )
- ZeroTrace : Oblivious Memory Primitives from Intel SGX
- Sajin Sasy and Sergey Gorbunov and Christopher Fletcher
-
2017/548 ( PDF )
- Fully Homomorphic Encryption from the Finite Field Isomorphism Problem
- Yarkın Doröz and Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman and Berk Sunar and William Whyte and Zhenfei Zhang
-
2017/547 ( PDF )
- Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
- Seyed Farhad Aghili and Hamid Mala
-
2017/546 ( PDF )
- X509CLOUD - FRAMEWORK FOR A UBIQUITOUS PKI
- Hitesh Tewari and Arthur Hughes and Stefan Weber and Tomas Barry
-
2017/545 ( PDF )
- Resource-efficient OT combiners with active security
- Ignacio Cascudo and Ivan Damgård and Oriol Farràs and Samuel Ranellucci
-
2017/544 ( PDF )
- Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability
- Elette Boyle and Saleet Klein and Alon Rosen and Gil Segev
-
2017/543 ( PDF )
- Identity-Based Encryption from the Diffie-Hellman Assumption
- Nico Döttling and Sanjam Garg
-
2017/542 ( PDF )
- A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
- Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart
-
2017/541 ( PDF )
- Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
- Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed
-
2017/540 ( PDF )
- Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs
- Jens Groth and Mary Maller
-
2017/539 ( PDF )
- Public-Seed Pseudorandom Permutations
- Pratik Soni and Stefano Tessaro
-
2017/538 ( PDF )
- New security notions and feasibility results for authentication of quantum data
- Sumegha Garg and Henry Yuen and Mark Zhandry
-
2017/537 ( PDF )
- Information-theoretic Indistinguishability via the Chi-squared Method
- Wei Dai and Viet Tung Hoang and Stefano Tessaro
-
2017/536 ( PDF )
- HACL*: A Verified Modern Cryptographic Library
- Jean-Karim Zinzindohoué and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche
-
2017/535 ( PDF )
- ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
- Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin
-
2017/534 ( PDF )
- Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
- Zhenzhen Bao and Lei Wang and Jian Guo and Dawu Gu
-
2017/533 ( PDF )
- Quantum non-malleability and authentication
- Gorjan Alagic and Christian Majenz
-
2017/532 ( PDF )
- All-But-Many Lossy Trapdoor Functions from Lattices and Applications
- Xavier Boyen and Qinyi Li
-
2017/531 ( PDF )
- Template Attack vs Bayes Classifier
- Stjepan Picek and Annelie Heuser and Sylvain Guilley
-
2017/530 ( PDF )
- Non-Malleable Codes for Space-Bounded Tampering
- Sebastian Faust and Kristina Hostakova and Pratyay Mukherjee and Daniele Venturi
-
2017/529 ( PDF )
- Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
- Ling Song and Guohong Liao and Jian Guo
-
2017/528 ( PDF )
- Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets
- Claude Carlet
-
2017/527 ( PDF )
- Key Rotation for Authenticated Encryption
- Adam Everspaugh and Kenneth Paterson and Thomas Ristenpart and Sam Scott
-
2017/526 ( PDF )
- Evaluating web PKIs
- Jiangshan Yu and Mark Ryan
-
2017/525 ( PDF )
- Kurosawa-Desmedt Meets Tight Security
- Romain Gay and Dennis Hofheinz and Lisa Kohl
-
2017/524 ( PDF )
- Compact Structure-preserving Signatures with Almost Tight Security
- Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan
-
2017/523 ( PDF )
- Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge Proofs
- Vadim Lyubashevsky and Gregor Seiler
-
2017/522 ( PDF )
- On the Hardness of the Mersenne Low Hamming Ratio Assumption
- Marc Beunardeau and Aisling Connolly and Rémi Géraud and David Naccache
-
2017/521 ( PDF )
- Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains
- F. Betül Durak and Serge Vaudenay
-
2017/520 ( PDF )
- The Price of Low Communication in Secure Multi-Party Computation
- Juan Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas
-
2017/519 ( PDF )
- Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
- Nishanth Chandran and Juan Garay and Payman Mohassel and Satyanarayana Vusirikala
-
2017/518 ( PDF )
- qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
- Joost Renes and Benjamin Smith
-
2017/517 ( PDF )
- PRF-ODH: Relations, Instantiations, and Impossibility Results
- Jacqueline Brendel and Marc Fischlin and Felix Günther and Christian Janson
-
2017/516 ( PDF )
- Characterizations of the differential uniformity of vectorial functions by the Walsh transform
- Claude Carlet
-
2017/515 ( PDF )
- Be Adaptive, Avoid Overcommitting
- Zahra Jafargholi and Chethan Kamath and Karen Klein and Ilan Komargodski and Krzysztof Pietrzak and Daniel Wichs
-
2017/514 ( PDF )
- Identity-based Encryption from Codes with Rank Metric
- Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean-Pierre Tillich
-
2017/513 ( PDF )
- Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$
- Patrick Holzer and Thomas Wunderer
-
2017/512 ( PDF )
- PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
- Dr. M. AMUTHA PRABAKAR and Dr. B. INDRANI and M. KARTHIGAI VENI
-
2017/511 ( PDF )
- State of the Art in Lightweight Symmetric Cryptography
- Alex Biryukov and Leo Perrin
-
2017/510 ( PDF )
- Hedging Public-Key Encryption in the Real World
- Alexandra Boldyreva and Christopher Patton and Thomas Shrimpton
-
2017/509 ( PDF )
- Quantum Security of NMAC and Related Constructions
- Fang Song and Aaram Yun
-
2017/508 ( PDF )
- Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
- Victor Cauchois and Clément Gomez and Reynald Lercier
-
2017/507 ( PDF )
- Inverted Leftover Hash Lemma
- Maciej Obremski and Maciej Skórski
-
2017/506 ( PDF )
- Optimal Overcoming Weak Expectations
- Maciej Skorski
-
2017/505 ( PDF )
- Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
- Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
-
2017/504 ( PDF )
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- Craig Costello and Huseyin Hisil
-
2017/503 ( PDF )
- Encryption Switching Protocols Revisited: Switching modulo $p$
- Guilhem Castagnos and Laurent Imbert and Fabien Laguillaumie
-
2017/502 ( PDF )
- DeepSecure: Scalable Provably-Secure Deep Learning
- Bita Darvish Rouhani and M. Sadegh Riazi and Farinaz Koushanfar
-
2017/501 ( PDF )
- A Formal Treatment of Multi-key Channels
- Felix Günther and Sogol Mazaheri
-
2017/500 ( PDF )
- Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps
- Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
-
2017/499 ( PDF )
- Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample
- Fuchun Guo and Rongmao Chen and Willy Susilo and Jianchang Lai and Guomin Yang and Yi Mu
-
2017/498 ( PDF )
- Full-State Keyed Duplex With Built-In Multi-User Support
- Joan Daemen and Bart Mennink and Gilles Van Assche
-
2017/497 ( PDF )
- Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
- Itai Dinur and Niv Nadler
-
2017/496 ( PDF )
- Modes of Operation Suitable for Computing on Encrypted Data
- Dragos Rotaru and Nigel P. Smart and Martijn Stam
-
2017/495 ( PDF )
- Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy
- Tibor Jager and Martijn Stam and Ryan Stanley-Oakes and Bogdan Warinschi
-
2017/494 ( PDF )
- A Reaction Attack on the QC-LDPC McEliece Cryptosystem
- Tomas Fabsic and Viliam Hromada and Paul Stankovski and Pavol Zajac and Qian Guo and Thomas Johansson
-
2017/493 ( PDF )
- Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
- Georg T. Becker
-
2017/492 ( PDF )
- Reducing Communication Channels in MPC
- Marcel Keller and Dragos Rotaru and Nigel P. Smart and Tim Wood
-
2017/491 ( PDF )
- Laconic Oblivious Transfer and its Applications
- Chongwon Cho and Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou
-
2017/490 ( PDF )
- To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures
- Peter Pessl and Leon Groot Bruinderink and Yuval Yarom
-
2017/489 ( PDF )
- Multi Collision Resistant Hash Functions and their Applications
- Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan
-
2017/488 ( PDF )
- Multi-Collision Resistance: A Paradigm for Keyless Hash Functions
- Nir Bitansky and Yael Tauman Kalai and Omer Paneth
-
2017/487 ( PDF )
- New Linear Attacks on Block Cipher GOST
- Yi LU
-
2017/486 ( PDF )
- Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions
- Ilan Komargodski and Moni Naor and Eylon Yogev
-
2017/485 ( PDF )
- Authenticating compromisable storage systems
- Jiangshan Yu and Mark Ryan and Liqun Chen
-
2017/484 ( PDF )
- Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial
- Jung Hee Cheon and Minki Hhan and Changmin Lee
-
2017/483 ( PDF )
- A multi-start heuristic for multiplicative depth minimization of boolean circuits
- Sergiu Carpov and Pascal Aubry and Renaud Sirdey
-
2017/482 ( PDF )
- On the Statistical Leak of the GGH13 Multilinear Map and some Variants
- Léo Ducas and Alice Pellet--Mary
-
2017/481 ( PDF )
- A New Public-Key Cryptosystem via Mersenne Numbers
- Divesh Aggarwal and Antoine Joux and Anupam Prakash and Miklos Santha
-
2017/480 ( PDF )
- Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence
- Thomas Prest
-
2017/479 ( PDF )
- Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
- Keita Emura
-
2017/478 ( PDF )
- Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
- Anne Canteaut and Eran Lambooij and Samuel Neves and Shahram Rasoolzadeh and Yu Sasaki and Marc Stevens
-
2017/477 ( PDF )
- Constrained Keys for Invertible Pseudorandom Functions
- Dan Boneh and Sam Kim and David J. Wu
-
2017/476 ( PDF )
- Forward-Security under Continual Leakage
- Mihir Bellare and Adam O'Neill and Igors Stepanovs
-
2017/475 ( PDF )
- Security of Even--Mansour Ciphers under Key-Dependent Messages
- Pooya Farshim and Louiza Khati and Damien Vergnaud
-
2017/474 ( PDF )
- Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
- Bart Mennink
-
2017/473 ( PDF )
- Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
- Bart Mennink and Samuel Neves
-
2017/472 ( PDF )
- A Unified Framework for Secure Search Over Encrypted Cloud Data
- Cengiz Orencik and Erkay Savas and Mahmoud Alewiwi
-
2017/471 ( PDF )
- Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree
- Jacob Alperin-Sheriff and Jintai Ding and Albrecht Petzoldt and Daniel Smith Tone
-
2017/470 ( PDF )
- On the Relation Between SIM and IND-RoR Security Models for PAKEs
- José Becerra and Vincenzo Iovino and Dimiter Ostrev and Marjan Skrobot
-
2017/469 ( PDF )
- Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
- Hiroaki Anada and Seiko Arita
-
2017/468 ( PDF )
- Why Your Encrypted Database Is Not Secure
- Paul Grubbs and Thomas Ristenpart and Vitaly Shmatikov
-
2017/467 ( PDF )
- Access Control Encryption for General Policies from Standard Assumptions
- Sam Kim and David J. Wu
-
2017/466 ( PDF )
- Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security
- Yusuke Naito
-
2017/465 ( PDF )
- Lelantos: A Blockchain-based Anonymous Physical Delivery System
- Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong
-
2017/464 ( PDF )
- On the Structure of Unconditional UC Hybrid Protocols
- Mike Rosulek and Morgan Shirley
-
2017/463 ( PDF )
- Proving Resistance against Invariant Attacks: How to Choose the Round Constants
- Christof Beierle and Anne Canteaut and Gregor Leander and Yann Rotella
-
2017/462 ( PDF )
- Leakage-Resilient Tweakable Encryption from One-Way Functions
- Suvradip Chakraborty and Chester Rebeiro and Debdeep Mukhopadhyay and C. Pandu Rangan
-
2017/461 ( PDF )
- Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions
- Daniel Jost and Ueli Maurer
-
2017/460 ( PDF )
- Transitioning to a Quantum-Resistant Public Key Infrastructure
- Nina Bindel and Udyani Herath and Matthew McKague and Douglas Stebila
-
2017/459 ( PDF )
- Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test
- Phuong Ha Nguyen and Durga Prasad Sahoo and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay
-
2017/458 ( -- withdrawn -- )
- Fully Homomorphic Encryption Using Multivariate Polynomials
- Matthew Tamayo-Rios and Jean-Charles Faugère and Ludovic Perret and Peng Hui How and Robin Zhang
-
2017/457 ( PDF )
- Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority
- Masahito Hayashi and Takeshi Koshiba
-
2017/456 ( PDF )
- Proxy Re-Encryption and Re-Signatures from Lattices
- Xiong Fan and Feng-Hao Liu
-
2017/455 ( PDF )
- Vector Encoding over Lattices and Its Applications
- Daniel Apon and Xiong Fan and Feng-Hao Liu
-
2017/454 ( PDF )
- Algorand: Scaling Byzantine Agreements for Cryptocurrencies
- Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich
-
2017/453 ( PDF )
- Subtleties in Security Definitions for Predicate Encryption with Public Index
- Johannes Blömer and Gennadij Liske
-
2017/452 ( PDF )
- Oblivious Neural Network Predictions via MiniONN transformations
- Jian Liu and Mika Juuti and Yao Lu and N. Asokan
-
2017/451 ( PDF )
- Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
- Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan
-
2017/450 ( PDF )
- Privacy-preserving biometric authentication: challenges and directions
- Elena Pagnin and Aikaterini Mitrokotsa
-
2017/449 ( PDF )
- Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies
- Shihui Fu and Xiutao Feng and Baofeng Wu
-
2017/448 ( PDF )
- Obfuscation of Bloom Filter Queries from Ring-LWE
- Alex Davidson
-
2017/447 ( PDF )
- Block Chain based Searchable Symmetric Encryption
- Huige Li and Haibo Tian and Fangguo Zhang
-
2017/446 ( PDF )
- Secretly Embedding Trapdoors into Contract Signing Protocols
- Diana Maimut and George Teseleanu
-
2017/445 ( PDF )
- Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
- Michael Till Beck and Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
-
2017/444 ( PDF )
- CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing
- Ming Li and Jian Weng and Anjia Yang and Wei Lu
-
2017/443 ( PDF )
- Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
- Joel Alwen and Jeremiah Blocki and Ben Harsha
-
2017/442 ( PDF )
- On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i
- Jeremiah Blocki and Samson Zhou
-
2017/441 ( PDF )
- New Approach to Practical Leakage-Resilient Public-Key Cryptography
- Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan
-
2017/440 ( PDF )
- Cryptographic Security Analysis of T-310
- Nicolas T. Courtois and Klaus Schmeh and Jörg Drobick and Jacques Patarin and Maria-Bristena Oprisanu and Matteo Scarlata and Om Bhallamudi
-
2017/439 ( PDF )
- Practically Efficient Secure Single-Commodity Multi-Market Auctions
- Abdelrahaman Aly and Mathieu Van Vyve
-
2017/438 ( PDF )
- GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography
- James Howe and Máire O'Neill
-
2017/437 ( PDF )
- Slothful reduction
- Michael Scott
-
2017/436 ( PDF )
- A Uniform Class of Weak Keys for Universal Hash Functions
- Kaiyan Zheng and Peng Wang
-
2017/435 ( PDF )
- Analyzing Multi-Key Security Degradation
- Atul Luykx and Bart Mennink and Kenneth G. Paterson
-
2017/434 ( PDF )
- FourQ on embedded devices with strong countermeasures against side-channel attacks
- Zhe Liu and Patrick Longa and Geovandro Pereira and Oscar Reparaz and Hwajeong Seo
-
2017/433 ( PDF )
- Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
- Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia
-
2017/432 ( PDF )
- Statistical and Linear Independence of Binary Random Variables
- Kaisa Nyberg
-
2017/431 ( PDF )
- Understanding RUP Integrity of COLM
- Nilanjan Datta and Atul Luykx and Bart Mennink and Mridul Nandi
-
2017/430 ( PDF )
- Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping
- Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
-
2017/429 ( PDF )
- Strengthening Access Control Encryption
- Christian Badertscher and Christian Matt and Ueli Maurer
-
2017/428 ( PDF )
- Optimal Ramp Schemes and Related Combinatorial Objects
- Douglas R. Stinson
-
2017/427 ( PDF )
- Grover Meets Simon - Quantumly Attacking the FX-construction
- Gregor Leander and Alexander May
-
2017/426 ( PDF )
- FHPKE based on multivariate discrete logarithm problem
- Masahiro Yagisawa
-
2017/425 ( PDF )
- Card-Based Protocols Using Unequal Division Shuffle
- Akihiro Nishimura and Takuya Nishida and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone
-
2017/424 ( PDF )
- HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
- Markku-Juhani O. Saarinen
-
2017/423 ( PDF )
- Foundations for Actively Secure Card-based Cryptography
- Alexander Koch and Stefan Walzer
-
2017/422 ( PDF )
- PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs
- Urbi Chatterjee and Vidya Govindan and Rajat Sadhukhan and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Debashis Mahata and Mukesh Prabhu
-
2017/421 ( PDF )
- Exploring Naccache-Stern Knapsack Encryption
- Éric Brier and Rémi Géraud and David Naccache
-
2017/420 ( PDF )
- Construction and Filtration of Lightweight Formalized MDS Matrices
- Shiyi Zhang and Yongjuan Wang and Yang Gao and Tao Wang
-
2017/419 ( PDF )
- Efficient hash maps to $\mathbb{G}_2$ on BLS curves
- Alessandro Budroni and Federico Pintore
-
2017/418 ( PDF )
- Strong Authenticated Key Exchange with Auxiliary Inputs
- Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
-
2017/417 ( PDF )
- A Proof-of-Stake protocol for consensus on Bitcoin subchains
- Massimo Bartoletti and Stefano Lande and Alessandro Sebastian Podda
-
2017/416 ( PDF )
- Breaking and Fixing the HB+DB protocol
- Ioana Boureanu and David Gerault and Pascal Lafourcade and Cristina Onete
-
2017/415 ( PDF )
- Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
- Osman Bicer and Muhammed Ali Bingol and Mehmet Sabir Kiraz and Albert Levi
-
2017/414 ( PDF )
- Symmetrically and Asymmetrically Hard Cryptography
- Alex Biryukov and Leo Perrin
-
2017/413 ( PDF )
- Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
- Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava
-
2017/412 ( PDF )
- Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently
- Ximing Fu and Xiaoyun Wang and Jiazhe Chen
-
2017/411 ( PDF )
- A New Algorithm for Inversion mod $p^k$
- Çetin Kaya Koç
-
2017/410 ( PDF )
- Fast Proxy Re-Encryption for Publish/Subscribe Systems
- Yuriy Polyakov and Kurt Rohloff and Gyana Sahu and Vinod Vaikuntanthan
-
2017/409 ( PDF )
- Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
- Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges
-
2017/408 ( PDF )
- Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
- Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh
-
2017/407 ( PDF )
- SplitCommit: Implementing and Analyzing Homomorphic UC Commitments
- Peter Rindal and Roberto Trifiletti
-
2017/406 ( PDF )
- OmniLedger: A Secure, Scale-Out, Decentralized Ledger
- Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Bryan Ford
-
2017/405 ( PDF )
- Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''
- Jingjing Wang and Xiaoyu Zhang and Jingjing guo and Jianfeng Wang
-
2017/404 ( PDF )
- Short generators without quantum computers: the case of multiquadratics
- Jens Bauch and Daniel J. Bernstein and Henry de Valence and Tanja Lange and Christine van Vredendaal
-
2017/403 ( PDF )
- Condition on composite numbers easily factored with elliptic curve method
- Masaaki Shirase
-
2017/402 ( PDF )
- A New Approach to Round-Optimal Secure Multiparty Computation
- Prabhanjan Ananth and Arka Rai Choudhuri and Abhishek Jain
-
2017/401 ( PDF )
- Synthesis of Adaptive Side-Channel Attacks
- Quoc-Sang Phan and Lucas Bang and Corina S. Păsăreanu and Pasquale Malacaria and Tevfik Bultan
-
2017/400 ( PDF )
- A Leakage-Abuse Attack Against Multi-User Searchable Encryption
- Cédric Van Rompay and Refik Molva and Melek Önen
-
2017/399 ( PDF )
- Practical Evaluation of Masking Software Countermeasures on an IoT processor
- David McCann and Elisabeth Oswald
-
2017/398 ( PDF )
- Post-Quantum Security of Fiat-Shamir
- Dominique Unruh
-
2017/397 ( PDF )
- Efficient Digital Signatures From Coding Theory
- Edoardo Persichetti
-
2017/396 ( PDF )
- SecureML: A System for Scalable Privacy-Preserving Machine Learning
- Payman Mohassel and Yupeng Zhang
-
2017/395 ( PDF )
- Higher-Order Side-Channel Protected Implementations of Keccak
- Hannes Gross and David Schaffenrath and Stefan Mangard
-
2017/394 ( PDF )
- Double-spending Prevention for Bitcoin zero-confirmation transactions
- Cristina Pérez-Solà and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomartı́
-
2017/393 ( PDF )
- Privacy-Preserving Interdomain Routing at Internet Scale
- Gilad Asharov and Daniel Demmler and Michael Schapira and Thomas Schneider and Gil Segev and Scott Shenker and Michael Zohner
-
2017/392 ( PDF )
- Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE
- Sébastien Canard and Sergiu Carpov and Donald Nokam Kuate and Renaud Sirdey
-
2017/391 ( PDF )
- Another Look at Success Probability in Linear Cryptanalysis
- Subhabrata Samajder and Palash Sarkar
-
2017/390 ( PDF )
- On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations
- Yi Deng and Xuyang Song and Jingyue Yu and Yu Chen
-
2017/389 ( PDF )
- Decentralized Blacklistable Anonymous Credentials with Reputation
- Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu
-
2017/388 ( PDF )
- Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple
- Silvan Streit and Fabrizio De Santis
-
2017/387 ( PDF )
- Homomorphically Encrypted Arithmetic Operations over the Integer Ring
- Chen Xu and Jingwei Chen and Wenyuan Wu and Yong Feng
-
2017/386 ( PDF )
- Four Round Secure Computation without Setup
- Zvika Brakerski and Shai Halevi and Antigoni Polychroniadou
-
2017/385 ( PDF )
- Garbled Circuits as Randomized Encodings of Functions: a Primer
- Benny Applebaum
-
2017/384 ( PDF )
- Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
- Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang
-
2017/383 ( PDF )
- Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
- Travis Scholl
-
2017/382 ( PDF )
- A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK
- Steven Cavanaugh
-
2017/381 ( PDF )
- Quantum one-way permutation over the finite field of two elements
- Alexandre de Castro
-
2017/380 ( PDF )
- Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
- Sam Kim and David J. Wu
-
2017/379 ( PDF )
- Fault attack on Supersingular Isogeny Cryptosystems
- Yan Bo Ti
-
2017/378 ( PDF )
- Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
- Marcel Keller and Emmanuela Orsini and Dragos Rotaru and Peter Scholl and Eduardo Soria-Vazquez and Srinivas Vivek
-
2017/377 ( PDF )
- Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries
- Stefan Wüller and Ulrike Meyer and Susanne Wetzel
-
2017/376 ( PDF )
- Determining the Minimum Degree of an S-box
- P. R. Mishra, Sumanta Sarkar and Indivar Gupta
-
2017/375 ( PDF )
- Do you need a Blockchain?
- Karl Wüst and Arthur Gervais
-
2017/374 ( PDF )
- Loop-abort faults on supersingular isogeny cryptosystems
- Alexandre Gélin and Benjamin Wesolowski
-
2017/373 ( PDF )
- Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption
- Ryo Hiromasa and Yutaka Kawai
-
2017/372 ( PDF )
- A crossbred algorithm for solving Boolean polynomial systems
- Antoine Joux and Vanessa Vitse
-
2017/371 ( PDF )
- On the Construction of Lightweight Orthogonal MDS Matrices
- Lijing Zhou, Licheng Wang and Yiru Sun
-
2017/370 ( PDF )
- "The Simplest Protocol for Oblivious Transfer'' Revisited
- Ziya Alper Genç and Vincenzo Iovino and Alfredo Rial
-
2017/369 ( -- withdrawn -- )
- Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
- Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
-
2017/368 ( PDF )
- Analysis of Toeplitz MDS Matrices
- Sumanta Sarkar and Habeeb Syed
-
2017/367 ( PDF )
- Forking-Free Hybrid Consensus with Generalized Proof-of-Activity
- Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, and Yu Long
-
2017/366 ( PDF )
- BitFlip: A Randomness-Rich Cipher
- Gideon Samid and Serguei Popov
-
2017/365 ( PDF )
- The Complexity of Public-Key Cryptography
- Boaz Barak
-
2017/364 ( PDF )
- Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
- Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas
-
2017/363 ( PDF )
- TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF
- Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu
-
2017/362 ( PDF )
- Universally Composable Zero-Knowledge Proof of Membership
- Jesper Buus Nielsen
-
2017/361 ( PDF )
- Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
- Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
-
2017/360 ( PDF )
- Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error
- Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
-
2017/359 ( PDF )
- Conditional Disclosure of Secrets via Non-Linear Reconstruction
- Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee
-
2017/358 ( PDF )
- Almost Optimal Oblivious Transfer from QA-NIZK
- Olivier Blazy and Céline Chevalier and Paul Germouty
-
2017/357 ( PDF )
- Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model
- Nico Döttling and Jesper Buus Nielsen and Maciej Obremski
-
2017/356 ( PDF )
- XOR of PRPs in a Quantum World
- Bart Mennink and Alan Szepieniec
-
2017/355 ( PDF )
- White-Box Cryptography: Don't Forget About Grey Box Attacks
- Joppe W. Bos and Charles Hubain and Wil Michiels and Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe Teuwen
-
2017/354 ( PDF )
- Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
- Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart
-
2017/353 ( PDF )
- Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
- San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
-
2017/352 ( PDF )
- A low-resource quantum factoring algorithm
- Daniel J. Bernstein and Jean-François Biasse and Michele Mosca
-
2017/351 ( PDF )
- Post-quantum RSA
- Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta
-
2017/350 ( PDF )
- The Montgomery ladder on binary elliptic curves
- Thomaz Oliveira and Julio López and Francisco Rodríguez-Henríquez
-
2017/349 ( PDF )
- LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards
- Panos Kampanakis, Scott Fluhrer
-
2017/348 ( PDF )
- Removal Attacks on Logic Locking and Camouflaging Techniques
- Muhammad Yasin and Bodhisatwa Mazumdar and Ozugr Sinanoglu and Jeyavijayan Rajendran
-
2017/347 ( PDF )
- Predictive Aging of Reliability of two Delay PUFs
- Naghmeh Karimi and Jean-Luc Danger and Florent Lozac'h and Sylvain Guilley
-
2017/346 ( PDF )
- Some cryptanalytic results on Lizard
- Subhadeep Banik and Takanori Isobe
-
2017/345 ( PDF )
- Mind the Gap: Towards Secure 1st-order Masking in Software
- Kostas Papagiannopoulos and Nikita Veshchikov
-
2017/344 ( PDF )
- DUPLO: Unifying Cut-and-Choose for Garbled Circuits
- Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti
-
2017/343 ( PDF )
- Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
- Essam Ghadafi and Jens Groth
-
2017/342 ( PDF )
- Multilinear Maps Using a Variant of Ring-LWE
- Gu Chunsheng
-
2017/341 ( PDF )
- Steganography techniques
- Dragoş Dumitrescu and Ioan-Mihail Stan and Emil Simion
-
2017/340 ( -- withdrawn -- )
- Enhancing Security by Combining Biometrics and Cryptography
- Diana Popa and Emil Simion
-
2017/339 ( PDF )
- ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
- Alan Kaminsky
-
2017/338 ( PDF )
- A Traceability Analysis of Monero's Blockchain
- Amrit Kumar and Clément Fischer and Shruti Tople and Prateek Saxena
-
2017/337 ( PDF )
- Authentication of Outsourced Linear Function Query with Efficient Updates
- Gang Sheng and Chunming Tang and Wei Gao and Yunlu Cai and Xing Hu
-
2017/336 ( PDF )
- NIST RANDOMNESS TESTS (IN)DEPENDENCE
- Carmina GEORGESCU and Alina PETRESCU-NITA and Emil SIMION and Antonela TOMA
-
2017/335 ( -- withdrawn -- )
- Privacy-Preserving Linear Regression on Distributed Data
- Irene Giacomelli and Somesh Jha and C. David Page
-
2017/334 ( PDF )
- Updating key size estimations for pairings
- Razvan Barbulescu and Sylvain Duquesne
-
2017/333 ( PDF )
- Faster Homomorphic Function Evaluation using Non-Integral Base Encoding
- Charlotte Bonte and Carl Bootland and Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
-
2017/332 ( PDF )
- Reforgeability of Authenticated Encryption Schemes
- Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
-
2017/331 ( PDF )
- Optimal attacks on qubit-based Quantum Key Recycling
- Daan Leermakers and Boris Skoric
-
2017/330 ( PDF )
- Distinguisher-Dependent Simulation in Two Rounds and its Applications
- Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum
-
2017/329 ( PDF )
- Maliciously Secure Multi-Client ORAM
- Matteo Maffei (TU Wien); Giulio Malavolta (FAU); Manuel Reinert (CISPA, Saarland University); Dominique Schröder (FAU)
-
2017/328 ( PDF )
- Evaluating Bernstein-Rabin-Winograd Polynomials
- Debrup Chakraborty and Sebati Ghosh and Palash Sarkar
-
2017/327 ( PDF )
- MQ Signatures for PKI
- Alan Szepieniec and Ward Beullens and Bart Preneel
-
2017/326 ( PDF )
- Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data
- Manuel Barbosa and Dario Catalano and Dario Fiore
-
2017/325 ( PDF )
- CHVote System Specification
- Rolf Haenni and Reto E. Koenig and Philipp Locher and Eric Dubuis
-
2017/324 ( PDF )
- Family of PRGs based on Collections of Arithmetic Progressions
- Srikanth ch, Veni Madhavan C.E. and Kumar Swamy H.V.
-
2017/323 ( PDF )
- Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
- Atsushi Takayasu and Yohei Watanabe
-
2017/322 ( PDF )
- Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction
- Jun Xu and Santanu Sarkar and Lei Hu
-
2017/321 ( PDF )
- Towards Practical Obfuscation of General Circuits
- Dingfeng Ye and Peng Liu and Jun Xu
-
2017/320 ( PDF )
- Speeding up Huff Form of Elliptic Curves
- Neriman Gamze Orhon and Huseyin Hisil
-
2017/319 ( PDF )
- Encrypt-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2017/318 ( -- withdrawn -- )
- Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2017/317 ( PDF )
- Solidus: Confidential Distributed Ledger Transactions via PVORM
- Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed Kosba and Ari Juels and Elaine Shi
-
2017/316 ( PDF )
- Exploring Potential 6LoWPAN Traffic Side Channels
- Yan Yan and Elisabeth Oswald and Theo Tryfonas
-
2017/315 ( PDF )
- Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)
- Bernardo Ferreira, Joaão Leitão, Henrique Domingos
-
2017/314 ( PDF )
- Post-quantum cryptography---dealing with the fallout of physics success
- Daniel J. Bernstein and Tanja Lange
-
2017/313 ( -- withdrawn -- )
- A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
- Yanqing Yao, Hua Guo, Zhoujun Li
-
2017/312 ( PDF )
- Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
- Boaz Barak and Zvika Brakerski and Ilan Komargodski and Pravesh K. Kothari
-
2017/311 ( PDF )
- Constructing Multidimensional Differential Addition Chains and their Applications
- Aaron Hutchinson and Koray Karabina
-
2017/310 ( PDF )
- KDM-Secure Public-Key Encryption from Constant-Noise LPN
- Shuai Han and Shengli Liu
-
2017/309 ( PDF )
- Perfectly Secure Message Transmission Scheme against Rational Adversaries
- Maiki Fujita and Takeshi Koshiba
-
2017/308 ( PDF )
- Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus
- Nicholas Genise and Daniele Micciancio
-
2017/307 ( PDF )
- Practical Synchronous Byzantine Consensus
- Ling Ren and Kartik Nayak and Ittai Abraham and Srinivas Devadas
-
2017/306 ( PDF )
- Cube Attacks on Non-Blackbox Polynomials Based on Division Property
- Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
-
2017/305 ( PDF )
- A Zero Knowledge Sumcheck and its Applications
- Alessandro Chiesa and Michael A. Forbes and Nicholas Spooner
-
2017/304 ( PDF )
- Provably Secure NTRUEncrypt over More General Cyclotomic Rings
- Yang Yu and Guangwu Xu and Xiaoyun Wang
-
2017/303 ( PDF )
- Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model
- Dana Dachman-Soled and Mukul Kulkarni and Aria Shahverdi
-
2017/302 ( PDF )
- Quantum preimage, 2nd-preimage, and collision resistance of SHA3
- Jan Czajkowski and Leon Groot Bruinderink and Andreas Hülsing and Christian Schaffner
-
2017/301 ( PDF )
- On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation
- Alex Lombardi and Vinod Vaikuntanathan
-
2017/300 ( PDF )
- Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies
- Iddo Bentov and Pavel Hubáček and Tal Moran and Asaf Nadler
-
2017/299 ( PDF )
- Fast Private Set Intersection from Homomorphic Encryption
- Hao Chen and Kim Laine and Peter Rindal
-
2017/298 ( PDF )
- An Investigation of Sources of Randomness Within Discrete Gaussian Sampling
- Séamus Brannigan and Neil Smyth and Tobias Oder and Felipe Valencia and Elizabeth O’Sullivan and Tim Güneysu and Francesco Regazzoni
-
2017/297 ( PDF )
- A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
- Gildas Avoine and Xavier Bultel and Sébastien Gambs and David Gérault and Pascal Lafourcade and Cristina Onete and Jean-Marc Robert
-
2017/296 ( PDF )
- Topology-Hiding Computation on all Graphs
- Adi Akavia and Rio LaVigne and Tal Moran
-
2017/295 ( PDF )
- Improved key-reconciliation method
- Ludo Tolhuizen and Ronald Rietman and Oscar Garcia-Morchon
-
2017/294 ( PDF )
- Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme
- Jung Hee Cheon and Miran Kim and Yongsoo Song
-
2017/293 ( PDF )
- Montgomery curves and the Montgomery ladder
- Daniel J. Bernstein and Tanja Lange
-
2017/292 ( PDF )
- Involutory Differentially 4-Uniform Permutations from Known Constructions
- Shihui Fu and Xiutao Feng
-
2017/291 ( PDF )
- How to Achieve Non-Malleability in One or Two Rounds
- Dakshita Khurana and Amit Sahai
-
2017/290 ( PDF )
- Double DIP: Re-Evaluating Security of Logic Encryption Algorithms
- Yuanqi Shen and Hai Zhou
-
2017/289 ( PDF )
- On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
- Matthias Krause
-
2017/288 ( PDF )
- Security of Symmetric Primitives under Incorrect Usage of Keys
- Pooya Farshim and Claudio Orlandi and Răzvan Roşie
-
2017/287 ( PDF )
- Towards Sound and Optimal Leakage Detection Procedure
- Liwei Zhang and A. Adam Ding and Francois Durvaux and Francois-Xavier Standaert and Yunsi Fei
-
2017/286 ( PDF )
- Impossible Differential Attack on Midori128 Using Rebound-like Technique
- Wenquan Bi and Zheng Li and Xiaoyang Dong and Xiaoyun Wang
-
2017/285 ( PDF )
- Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
- Kamil Doruk Gür and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savaş
-
2017/284 ( PDF )
- SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
- Maik Ender and Alexander Wild and Amir Moradi
-
2017/283 ( PDF )
- On the Easiness of Turning Higher-Order Leakages into First-Order
- Thorben Moos and Amir Moradi
-
2017/282 ( PDF )
- Collapsing sponges: Post-quantum security of the sponge construction
- Dominique Unruh
-
2017/281 ( PDF )
- Practical Secure Aggregation for Privacy Preserving Machine Learning
- Keith Bonawitz and Vladimir Ivanov and Ben Kreuter and Antonio Marcedone and H. Brendan McMahan and Sarvar Patel and Daniel Ramage and Aaron Segal and Karn Seth
-
2017/280 ( PDF )
- Amortization with Fewer Equations for Proving Knowledge of Small Secrets
- Rafael del Pino and Vadim Lyubashevsky
-
2017/279 ( PDF )
- Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
- Melissa Chase and David Derler and Steven Goldfeder and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig and Greg Zaverucha
-
2017/278 ( PDF )
- New Observations on Invariant Subspace Attack
- Yunwen Liu and Vincent Rijmen
-
2017/277 ( PDF )
- Minimizing the Complexity of Goldreich's Pseudorandom Generator
- Alex Lombardi and Vinod Vaikuntanathan
-
2017/276 ( PDF )
- Obfuscating Compute-and-Compare Programs under LWE
- Daniel Wichs and Giorgos Zirdelis
-
2017/275 ( PDF )
- Simple Generic Constructions of Succinct Functional Encryption
- Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
-
2017/274 ( PDF )
- Lockable Obfuscation
- Rishab Goyal and Venkata Koppula and Brent Waters
-
2017/273 ( PDF )
- Two-Round and Non-interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles
- Huijia Lin and Rafael Pass and Pratik Soni
-
2017/272 ( PDF )
- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA
- Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht
-
2017/271 ( PDF )
- High Order Masking of Look-up Tables with Common Shares
- Jean-Sebastien Coron and Franck Rondepierre and Rina Zeitoun
-
2017/270 ( PDF )
- Rational Proofs against Rational Verifiers
- Keita Inasawa and Kenji Yasunaga
-
2017/269 ( PDF )
- Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
- Okan Seker and Thomas Eisenbarth and Rainer Steinwandt
-
2017/268 ( PDF )
- Efficient Sanitizable Signatures without Random Oracles
- Russell W. F. Lai and Tao Zhang and Sherman S. M. Chow and Dominique Schröder
-
2017/267 ( PDF )
- A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
- Seungkwang Lee
-
2017/266 ( PDF )
- From Higher-Order Differentials to Polytopic Cryptanalysis
- Tyge Tiessen
-
2017/265 ( PDF )
- Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation
- Kamalesh Acharya and Ratna Dutta
-
2017/264 ( PDF )
- How to (pre-)compute a ladder
- Thomaz Oliveira and Julio López and Hüseyin Hışıl and Francisco Rodríguez-Henríquez
-
2017/263 ( PDF )
- Bivariate attacks and confusion coefficients
- Sylvain Guilley and Liran Lerman
-
2017/262 ( PDF )
- When It’s All Just Too Much: Outsourcing MPC-Preprocessing
- Peter Scholl and Nigel P. Smart and Tim Wood
-
2017/261 ( PDF )
- Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
- Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
-
2017/260 ( PDF )
- Message-Recovery MACs and Verification-Unskippable AE
- Shoichi Hirose and Yu Sasaki and Kan Yasuda
-
2017/259 ( PDF )
- Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
- Daniele Micciancio and Michael Walter
-
2017/258 ( PDF )
- Pseudorandomness of Ring-LWE for Any Ring and Modulus
- Chris Peikert and Oded Regev and Noah Stephens-Davidowitz
-
2017/257 ( PDF )
- Threshold Fully Homomorphic Encryption
- Aayush Jain, Peter M. R. Rasmussen, Amit Sahai
-
2017/256 ( PDF )
- A Framework for Universally Composable Diffie-Hellman Key Exchange
- Ralf Kuesters and Daniel Rausch
-
2017/255 ( PDF )
- New and Old Limits for AES Known-Key Distinguishers
- Lorenzo Grassi and Christian Rechberger
-
2017/254 ( PDF )
- Towards Easy Key Enumeration
- Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou and Juan Ai
-
2017/253 ( PDF )
- A Modular Security Analysis of EAP and IEEE 802.11
- Chris Brzuska and Håkon Jacobsen
-
2017/252 ( PDF )
- High-Order Conversion From Boolean to Arithmetic Masking
- Jean-Sebastien Coron
-
2017/251 ( PDF )
- A Lattice-Based Universal Thresholdizer for Cryptographic Systems
- Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim
-
2017/250 ( PDF )
- Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
- Huijia Lin and Stefano Tessaro
-
2017/249 ( PDF )
- Proof of Luck: an Efficient Blockchain Consensus Protocol
- Mitar Milutinovic and Warren He and Howard Wu and Maxinder Kanwal
-
2017/248 ( PDF )
- IPcore implementation susceptibility: A case study of Low latency ciphers
- Dillibabu Shanmugam and Ravikumar Selvam and Suganya Annadurai
-
2017/247 ( PDF )
- Efficient Multivariate Ring Signature Schemes
- Mohamed Saied Emam Mohamed and Albrecht Petzoldt
-
2017/246 ( PDF )
- An Analysis of FV Parameters Impact Towards its Hardware Acceleration
- Joël Cathébras and Alexandre Carbon and Renaud Sirdey and Nicolas Ventroux
-
2017/245 ( PDF )
- Cache-Base Application Detection in the Cloud Using Machine Learning
- Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar
-
2017/244 ( PDF )
- Model-counting Approaches For Nonlinear Numerical Constraints
- Mateus Borges and Quoc-Sang Phan and Antonio Filieri and Corina S. Păsăreanu
-
2017/243 ( PDF )
- Key Recovery: Inert and Public
- Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines
-
2017/242 ( PDF )
- Full accounting for verifiable outsourcing
- Riad S. Wahby and Ye Ji and Andrew J. Blumberg and abhi shelat and Justin Thaler and Michael Walfish and Thomas Wies
-
2017/241 ( PDF )
- Forkable Strings are Rare
- Alexander Russell and Cristopher Moore and Aggelos Kiayias and Saad Quader
-
2017/240 ( PDF )
- Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
- Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu
-
2017/239 ( PDF )
- Boosting Authenticated Encryption Robustness With Minimal Modifications
- Tomer Ashur and Orr Dunkelman and Atul Luykx
-
2017/238 ( PDF )
- Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin
- Tim Ruffing and Pedro Moreno-Sanchez
-
2017/237 ( PDF )
- Switch Commitments: A Safety Switch for Confidential Transactions
- Tim Ruffing and Giulio Malavolta
-
2017/236 ( PDF )
- A new rank metric codes based encryption scheme
- Pierre Loidreau
-
2017/235 ( PDF )
- Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption
- Isheeta Nargis
-
2017/234 ( PDF )
- Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
- Kevin Milner and Cas Cremers and Jiangshan Yu and Mark Ryan
-
2017/233 ( PDF )
- Simplifying Design and Analysis of Complex Predicate Encryption Schemes
- Shashank Agrawal and Melissa Chase
-
2017/232 ( PDF )
- TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
- Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou
-
2017/231 ( PDF )
- EHE: nonce misuse-resistant message authentication
- Sergey Agievich
-
2017/230 ( PDF )
- Smart Contracts Make Bitcoin Mining Pools Vulnerable
- Yaron Velner and Jason Teutsch and Loi Luu
-
2017/229 ( PDF )
- Multi-Prover Interactive Proofs: Unsound Foundations
- Claude Crépeau and Nan Yang
-
2017/228 ( PDF )
- Efficient and Secure Outsourcing of Genomic Data Storage
- João Sá Sousa and Cédric Lefebvre and Zhicong Huang and Jean Louis Raisaro and Carlos Aguilar and Marc-Olivier Killijian and Jean-Pierre Hubaux
-
2017/227 ( PDF )
- Towards Shared Ownership in the Cloud
- Hubert Ritzdorf and Claudio Soriente and Ghassan O. Karame and Srdjan Marinovic and Damian Gruber and Srdjan Capkun
-
2017/226 ( PDF )
- Faster LEGO-based Secure Computation without Homomorphic Commitments
- Ruiyu Zhu and Yan Huang
-
2017/225 ( PDF )
- Bandwidth Hard Functions for ASIC Resistance
- Ling Ren and Srinivas Devadas
-
2017/224 ( PDF )
- Simple Encrypted Arithmetic Library - SEAL v2.1
- Hao Chen and Kim Laine and Rachel Player
-
2017/223 ( PDF )
- 0-RTT Key Exchange with Full Forward Secrecy
- Felix Günther and Britta Hale and Tibor Jager and Sebastian Lauer
-
2017/222 ( PDF )
- A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
- Nizamud Dina, Arif Iqbal Umar, Abdul Waheed, Noor ul Amin
-
2017/221 ( PDF )
- A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE
- Florian Göpfert and Christine van Vredendaal and Thomas Wunderer
-
2017/220 ( PDF )
- Cryptanalysis of PMACx, PMAC2x, and SIVx
- Kazuhiko Minematsu and Tetsu Iwata
-
2017/219 ( PDF )
- Attribute-Based Encryption from Identity-Based Encryption
- Chun-I Fan and Yi-Fan Tseng and Chih-Wen Lin
-
2017/218 ( PDF )
- Repeated Games for Generating Randomness in Encryption
- Kenji Yasunaga and Kosuke Yuzawa
-
2017/217 ( PDF )
- Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
- Kuo-Hui Yeh
-
2017/216 ( PDF )
- SCRAPE: Scalable Randomness Attested by Public Entities
- Ignacio Cascudo and Bernardo David
-
2017/215 ( PDF )
- SEVDSI: Secure, Efficient and Verifiable Data Set Intersection
- Ozgur Oksuz, Iraklis Leontiadis, Sixia Chen, Alexander Russell, Qiang Tang, and Bing Wang
-
2017/214 ( PDF )
- Low Cost Constant Round MPC Combining BMR and Oblivious Transfer
- Carmit Hazay and Peter Scholl and Eduardo Soria-Vazquez
-
2017/213 ( PDF )
- Quantum Information Set Decoding Algorithms
- Ghazal Kachigar and Jean-Pierre Tillich
-
2017/212 ( PDF )
- Montgomery curves and their arithmetic: The case of large characteristic fields
- Craig Costello and Benjamin Smith
-
2017/211 ( PDF )
- Multi-level Access in Searchable Symmetric Encryption
- James Alderman and Keith M. Martin and Sarah Louise Renwick
-
2017/210 ( PDF )
- Public Key Cryptosystems with Noisy Secret Keys
- Charles Herder and Benjamin Fuller and Marten van Dijk and Srinivas Devadas
-
2017/209 ( PDF )
- Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
- Qipeng Liu and Mark Zhandry
-
2017/208 ( PDF )
- SoK: Security Models for Pseudo-Random Number Generators
- Sylvain Ruhault
-
2017/207 ( PDF )
- Private Queries on Encrypted Genomic Data
- Gizem S Cetin and Hao Chen and Kim Laine and Kristin Lauter and Peter Rindal and Yuhou Xia
-
2017/206 ( PDF )
- Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
- Yongge Wang
-
2017/205 ( PDF )
- ZETA: Towards Tagless Authenticated Encryption
- Anindya Shankar Bhandari and Dipanwita Roy Chowdhury
-
2017/204 ( PDF )
- Linear Cryptanalysis Using Low-bias Linear Approximations
- Tomer Ashur, Daniël Bodden, and Orr Dunkelman
-
2017/203 ( PDF )
- Proofs of Useful Work
- Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
-
2017/202 ( PDF )
- Average-Case Fine-Grained Hardness
- Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
-
2017/201 ( PDF )
- Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control
- Gabriel Kaptchuk and Ian Miers and Matthew Green
-
2017/200 ( PDF )
- Anonymous Attestation with Subverted TPMs
- Jan Camenisch and Manu Drijvers and Anja Lehmann
-
2017/199 ( PDF )
- Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme
- Dustin Moody and Ray Perlner and Daniel Smith-Tone
-
2017/198 ( PDF )
- FHE with Recursive Ciphertext
- Masahiro Yagisawa
-
2017/197 ( PDF )
- A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group
- Wenying Zhang, Zhaohui Xing and Keqin Feng
-
2017/196 ( PDF )
- Attribute-based concurrent signatures
- BaoHong Li, Guoqing Xu and Yinliang Zhao
-
2017/195 ( PDF )
- Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
- Chaoyun Li and Qingju Wang
-
2017/194 ( PDF )
- Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2)
- Andrea Visconti and Chiara Valentina Schiavo and René Peralta
-
2017/193 ( PDF )
- SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
- Shuwen Deng and Doğuhan Gümüşoğlu and Wenjie Xiong and Y. Serhan Gener and Onur Demir and Jakub Szefer
-
2017/192 ( -- withdrawn -- )
- Improved Hybrid Consensus Scheme with Privacy-preserving Property
- Shuyang Tang and Zhiqiang Liu and Zhen Liu and Yu Long and Shengli Liu
-
2017/191 ( PDF )
- CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks
- David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun
-
2017/190 ( PDF )
- The first collision for full SHA-1
- Marc Stevens and Elie Bursztein and Pierre Karpman and Ange Albertini and Yarik Markov
-
2017/189 ( PDF )
- Global-Scale Secure Multiparty Computation
- Xiao Wang and Samuel Ranellucci and Jonathan Katz
-
2017/188 ( PDF )
- Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer
- Wenying Zhang and Vincent Rijmen
-
2017/187 ( PDF )
- The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives
- H. Gopalakrishna Gadiyar and R. Padma
-
2017/186 ( PDF )
- A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies
- Youngho Yoo and Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev
-
2017/185 ( PDF )
- A Virtual Wiretap Channel for Secure MessageTransmission
- Setareh Sharifian, and Reihaneh Safavi-Naini, and Fuchun Lin
-
2017/184 ( PDF )
- Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
- Guillaume Endignoux, Damian Vizár
-
2017/183 ( PDF )
- Analysis of Software Countermeasures for Whitebox Encryption
- Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Martin Bjerregaard Jepsen
-
2017/182 ( PDF )
- The Approximate $k$-List Problem
- Leif Both and Alexander May
-
2017/181 ( PDF )
- New techniques for trail bounds and application to differential trails in Keccak
- Silvia Mella and Joan Daemen and Gilles Van Assche
-
2017/180 ( PDF )
- Robust Synchronous P2P Primitives Using SGX Enclaves
- Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang
-
2017/179 ( PDF )
- REM: Resource-Efficient Mining for Blockchains
- Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse
-
2017/178 ( PDF )
- Optimal Differential Trails in SIMON-like Ciphers
- Zhengbin Liu and Yongqiang Li and Mingsheng Wang
-
2017/177 ( PDF )
- Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets
- Navid Nasr Esfahani, Ian Goldberg and D. R. Stinson
-
2017/176 ( PDF )
- Probabilistically Checkable Proofs of Proximity with Zero-Knowledge
- Yuval Ishai and Mor Weiss
-
2017/175 ( PDF )
- Analysis of Burn-in period for RC4 State Transition
- Goutam Paul and Souvik Ray
-
2017/174 ( PDF )
- Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes
- Ruiyu Zhu and Yan Huang
-
2017/173 ( PDF )
- Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
- Marc Stevens and Dan Shumow
-
2017/172 ( PDF )
- On The Exact Security of Message Authentication Using Pseudorandom Functions
- Ashwin Jha and Avradip Mandal and Mridul Nandi
-
2017/171 ( PDF )
- Quantum Key Search with Side Channel Advice
- Daniel P. Martin and Ashley Montanaro and Elisabeth Oswald and Dan Shepherd
-
2017/170 ( PDF )
- Error-free protection of EC point multiplication by modular extension
- Martin Seysen
-
2017/169 ( PDF )
- UFace: Your Universal Password That No One Can See
- Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
-
2017/168 ( PDF )
- AES-GCM-SIV: Specification and Analysis
- Shay Gueron and Adam Langley and Yehuda Lindell
-
2017/167 ( PDF )
- Cloud Storage File Recoverability
- Christian A. Gorke and Christian Janson and Frederik Armknecht and Carlos Cid
-
2017/166 ( PDF )
- A roadmap to fully homomorphic elections: Stronger security, better verifiability
- Kristian Gjøsteen and Martin Strand
-
2017/165 ( PDF )
- SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
- Dhiman Saha and Sukhendu Kuila and Dipanwita Roy Chowdhury
-
2017/164 ( PDF )
- Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
- Benny Applebaum and Barak Arkis and Pavel Raykov and Prashant Nalini Vasudevan
-
2017/163 ( PDF )
- Homomorphic Encryption without Gaussian Noise
- Anamaria Costache and Nigel P. Smart
-
2017/162 ( PDF )
- Analysis of AES, SKINNY, and Others with Constraint Programming
- Siwei Sun and David Gerault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu
-
2017/161 ( PDF )
- Security Notions for Bidirectional Channels
- Giorgia Azzurra Marson and Bertram Poettering
-
2017/160 ( PDF )
- Conditional Cube Attack on Round-Reduced ASCON
- Zheng Li and Xiaoyang Dong and Xiaoyun Wang
-
2017/159 ( PDF )
- Cube-like Attack on Round-Reduced Initialization of Ketje Sr
- Xiaoyang Dong and Zheng Li and Xiaoyun Wang and Ling Qin
-
2017/158 ( PDF )
- Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy
- Martin Potthast and Christian Forler and Eik List and Stefan Lucks
-
2017/157 ( PDF )
- Detecting General Algebraic Manipulation Attacks
- Kim Ramchen
-
2017/156 ( PDF )
- Trust Is Risk: A Decentralized Financial Trust Platform
- Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros
-
2017/155 ( PDF )
- Random Sampling Revisited: Lattice Enumeration with Discrete Pruning
- Yoshinori Aono and Phong Q. Nguyen
-
2017/154 ( PDF )
- Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
- Thorsten Kranz and Friedrich Wiemer and Gregor Leander
-
2017/153 ( PDF )
- Storage Efficient Substring Searchable Symmetric Encryption
- Iraklis Leontiadis and Ming Li
-
2017/152 ( PDF )
- Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
- Fermi Ma and Mark Zhandry
-
2017/151 ( PDF )
- Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
- Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay
-
2017/150 ( PDF )
- Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
- Elette Boyle and Niv Gilboa and Yuval Ishai
-
2017/149 ( PDF )
- Bitcoin as a Transaction Ledger: A Composable Treatment
- Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas
-
2017/148 ( PDF )
- Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data
- Olivier Sanders and Cristina Onete and Pierre-Alain Fouque
-
2017/147 ( PDF )
- Ad Hoc PSM Protocols: Secure Computation Without Coordination
- Amos Beimel and Yuval Ishai and Eyal Kushilevitz
-
2017/146 ( PDF )
- Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
- Mohammad Hajiabadi and Bruce M. Kapron
-
2017/145 ( PDF )
- The Multi-User Security of Double Encryption
- Viet Tung Hoang and Stefano Tessaro
-
2017/144 ( PDF )
- Privacy-Preserving Search of Similar Patients in Genomic Data
- Gilad Asharov and Shai Halevi and Yehuda Lindell and Tal Rabin
-
2017/143 ( PDF )
- Constraint-hiding Constrained PRFs for NC1 from LWE
- Ran Canetti and Yilei Chen
-
2017/142 ( PDF )
- Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme
- Jean-François Biasse and Thomas Espitau and Pierre-Alain Fouque and Alexandre Gélin and Paul Kirchner
-
2017/141 ( PDF )
- Partitioned Group Password-Based Authenticated Key Exchange
- Dario Fiore and Maria Isabel Gonzalez Vasco and Claudio Soriente
-
2017/140 ( PDF )
- Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
- Nina Bindel and Johannes Buchmann and Florian Göpfert and Markus Schmidt
-
2017/139 ( PDF )
- Revisiting AES Related-Key Differential Attacks with Constraint Programming
- David Gérault and Pascal Lafourcade and Marine Minier and Christine Solnon
-
2017/138 ( PDF )
- How (not) to Use Welch's T-test in Side-Channel Security Evaluations
- François-Xavier Standaert
-
2017/137 ( PDF )
- Modifying an Enciphering Scheme after Deployment
- Paul Grubbs and Thomas Ristenpart and Yuval Yarom
-
2017/136 ( PDF )
- Dispersed Cryptography and the Quotient Ring Transform
- Anna Johnston
-
2017/135 ( PDF )
- Hashing Garbled Circuits for Free
- Xiong Fan and Chaya Ganesh and Vladimir Kolesnikov
-
2017/134 ( PDF )
- A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes
- Ryan Stanley-Oakes
-
2017/133 ( PDF )
- Composable and Robust Outsourced Storage
- Christian Badertscher and Ueli Maurer
-
2017/132 ( PDF )
- Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
- Roel Peeters, Jens Hermans and Aysajan Abidin
-
2017/131 ( PDF )
- A Practical Multivariate Blind Signature Scheme
- Albrecht Petzoldt and Alan Szepieniec and Mohamed Saied Emam Mohamed
-
2017/130 ( PDF )
- Topology-Hiding Computation Beyond Logarithmic Diameter
- Adi Akavia and Tal Moran
-
2017/129 ( PDF )
- Sublinear Zero-Knowledge Arguments for RAM Programs
- Payman Mohassel and Mike Rosulek and Alessandra Scafuro
-
2017/128 ( PDF )
- New Collision Attacks on Round-Reduced Keccak
- Kexin Qiao and Ling Song and Meicheng Liu and Jian Guo
-
2017/127 ( PDF )
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
- Prabhanjan Ananth and Aayush Jain and Amit Sahai
-
2017/126 ( PDF )
- Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
- Seny Kamara and Tarik Moataz
-
2017/125 ( PDF )
- Non-Interactive Secure 2PC in the Offline/Online and Batch Settings
- Payman Mohassel and Mike Rosulek
-
2017/124 ( PDF )
- On the Exact Round Complexity of Self-Composable Two-Party Computation
- Sanjam Garg and Susumu Kiyoshima and Omkant Pandey
-
2017/123 ( PDF )
- Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
- Rishab Goyal and Venkata Koppula and Brent Waters
-
2017/122 ( PDF )
- One-Shot Verifiable Encryption from Lattices
- Vadim Lyubashevsky and Gregory Neven
-
2017/121 ( PDF )
- Twisted $\mu_4$-normal form for elliptic curves
- David Kohel
-
2017/120 ( PDF )
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
- Rishab Goyal and Venkata Koppula and Brent Waters
-
2017/119 ( PDF )
- Quantum Authentication with Key Recycling
- Christopher Portmann
-
2017/118 ( PDF )
- A New Structural-Differential Property of 5-Round AES
- Lorenzo Grassi and Christian Rechberger and and Sondre Rønjom
-
2017/117 ( PDF )
- The SM9 Cryptographic Schemes
- Zhaohui Cheng
-
2017/116 ( PDF )
- Masking Proofs are Tight (and How to Exploit it in Security Evaluations)
- Vincent Grosso and François-Xavier Standaert
-
2017/115 ( PDF )
- An efficient self-blindable attribute-based credential scheme
- Sietse Ringers and Eric Verheul and Jaap-Henk Hoepman
-
2017/114 ( PDF )
- Zero-Knowledge Proofs of Proximity
- Itay Berman and Ron D. Rothblum and Vinod Vaikuntanathan
-
2017/113 ( PDF )
- Algebraic Fault Analysis of SHA-3
- Pei Luo and Konstantinos Athanasiou and Yunsi Fei and Thomas Wahl
-
2017/112 ( PDF )
- Zero-Knowledge Proxy Re-Identification Revisited
- Xavier Bultel and Pascal Lafourcade
-
2017/111 ( PDF )
- EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves
- Jonathan Burns and Daniel Moore and Katrina Ray and Ryan Speers and Brian Vohaska
-
2017/110 ( PDF )
- A Smart Contract for Boardroom Voting with Maximum Voter Privacy
- Patrick McCorry and Siamak F. Shahandashti and Feng Hao
-
2017/109 ( PDF )
- Unilaterally-Authenticated Key Exchange
- Yevgeniy Dodis and Dario Fiore
-
2017/108 ( PDF )
- Photonic Side Channel Attacks Against RSA
- Elad Carmon and Jean-Pierre Seifert and Avishai Wool
-
2017/107 ( PDF )
- Secure Logging with Crash Tolerance
- Erik-Oliver Blass and Guevara Noubir
-
2017/106 ( PDF )
- $\mu$chain: How to Forget without Hard Forks
- Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
-
2017/105 ( PDF )
- A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem
- Ling Yang and Fuyang Fang and Xianhui Lu and Wen-Tao Zhu and Qiongxiao Wang and Shen Yan and Shiran Pan
-
2017/104 ( PDF )
- Implementing BP-Obfuscation Using Graph-Induced Encoding
- Shai Halevi and Tzipora Halevi and Victor Shoup and Noah Stephens-Davidowitz
-
2017/103 ( PDF )
- Reconciling d+1 Masking in Hardware and Software
- Hannes Gross and Stefan Mangard
-
2017/102 ( PDF )
- Quantum Authentication and Encryption with Key Recycling
- Serge Fehr and Louis Salvail
-
2017/101 ( PDF )
- Optimizing Implementations of Lightweight Building Blocks
- Jérémy Jean and Thomas Peyrin and Siang Meng Sim
-
2017/100 ( PDF )
- Private Puncturable PRFs From Standard Lattice Assumptions
- Dan Boneh and Sam Kim and Hart Montgomery
-
2017/099 ( PDF )
- Making NSEC5 Practical for DNSSEC
- Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan Včelák and Leonid Reyzin and Sharon Goldberg
-
2017/098 ( PDF )
- Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions
- Vanesa Daza and Nikolaos Makriyannis
-
2017/097 ( PDF )
- Boolean functions with restricted input and their robustness; application to the FLIP cipher
- Claude Carlet and Pierrick Méaux and Yann Rotella
-
2017/096 ( PDF )
- Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
- Shota Yamada
-
2017/095 ( PDF )
- Attacks on Secure Logging Schemes
- Gunnar Hartung
-
2017/094 ( PDF )
- Quantum Tokens for Digital Signatures
- Shalev Ben-David and Or Sattath
-
2017/093 ( PDF )
- On new multivariate cryptosystems based on hidden Eulerian equations over finite fields
- Vasyl Ustimenko
-
2017/092 ( PDF )
- Small CRT-Exponent RSA Revisited
- Atsushi Takayasu and Yao Lu and Liqiang Peng
-
2017/091 ( PDF )
- Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme
- Vincent Herbert and Caroline Fontaine
-
2017/090 ( PDF )
- Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
- Saiyu Qi and Yichen Li and Yuanqing Zheng and Yong Qi
-
2017/089 ( PDF )
- On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
- Yuri Borissov, and Peter Boyvalenkov, and Robert Tsenkov
-
2017/088 ( PDF )
- A Differential Fault Attack on Plantlet
- Subhamoy Maitra, Akhilesh Siddhanti
-
2017/087 ( PDF )
- Cryptanalysis of full round Fruit
- Sabyasachi Dey and Santanu Sarkar
-
2017/086 ( PDF )
- Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
- David Derler and Sebastian Ramacher and Daniel Slamanig
-
2017/085 ( PDF )
- Information Security Applications of Bit-Mixers
- Laszlo Hars
-
2017/084 ( PDF )
- Hardware Bit-Mixers
- Laszlo Hars
-
2017/083 ( PDF )
- Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders
- Anna Johnston
-
2017/082 ( PDF )
- Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
- Marc Fischlin and Felix Günther
-
2017/081 ( PDF )
- Estonian Voting Verification Mechanism Revisited Again
- Ivo Kubjas and Tiit Pikma and Jan Willemson
-
2017/080 ( PDF )
- From Minicrypt to Obfustopia via Private-Key Functional Encryption
- Ilan Komargodski and Gil Segev
-
2017/079 ( PDF )
- Faster Bootstrapping of FHE over the Integers
- Jung Hee Cheon and Kyoohyung Han and Duhyeong Kim
-
2017/078 ( PDF )
- LPN Decoded
- Andre Esser and Robert Kübler and Alexander May
-
2017/077 ( PDF )
- Quantum algorithms for computing short discrete logarithms and factoring RSA integers
- Martin Ekerå and Johan Håstad
-
2017/076 ( PDF )
- DFA on LS-Designs with a Practical Implementation on SCREAM (extended version)
- Benjamin Lac and Anne Canteaut and Jacques Fournier and Renaud Sirdey
-
2017/075 ( PDF )
- A First DFA on PRIDE: from Theory to Practice (extended version)
- Benjamin Lac and Marc Beunardeau and Anne Canteaut and Jacques Fournier and Renaud Sirdey
-
2017/074 ( PDF )
- Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
- Joo-Im Kim and Ji Won Yoon
-
2017/073 ( PDF )
- Visual Honey Encryption: Application to Steganography
- Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee and Kwangsu Lee
-
2017/072 ( PDF )
- How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes
- Carmen Kempka and Ryo Kikuchi and Koutarou Suzuki
-
2017/071 ( PDF )
- Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
- Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
-
2017/070 ( PDF )
- Symbolic Models for Isolated Execution Environments
- Charlie Jacomme and Steve Kremer and Guillaume Scerri
-
2017/069 ( PDF )
- The Exact Security of PMAC
- Peter Gaži and Krzysztof Pietrzak and Michal Rybár
-
2017/068 ( PDF )
- Authenticated Encryption in the Face of Protocol and Side Channel Leakage
- Guy Barwell and Daniel P. Martin and Elisabeth Oswald and Martijn Stam
-
2017/067 ( PDF )
- Computation of a 768-bit prime field discrete logarithm
- Thorsten Kleinjung and Claus Diem and Arjen K. Lenstra and Christine Priplata and Colin Stahlke
-
2017/066 ( PDF )
- Subring Homomorphic Encryption
- Seiko Arita and Sari Handa
-
2017/065 ( PDF )
- FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
- Daniel Benarroch and Zvika Brakerski and Tancrède Lepoint
-
2017/064 ( PDF )
- Fast Montgomery-like Square Root Computation for All Trinomials
- Yin Li and Yu Zhang
-
2017/063 ( PDF )
- Optimal Extension Protocols for Byzantine Broadcast and Agreement
- Chaya Ganesh and Arpita Patra
-
2017/062 ( PDF )
- Efficient Maliciously Secure Two Party Computation for Mixed Programs
- Arash Afshar and Payman Mohassel and Mike Rosulek
-
2017/061 ( PDF )
- Continuous Collision Resistance and its Applications
- Tibor Jager and Rafael Kurek
-
2017/060 ( PDF )
- Zero Round-Trip Time for the Extended Access Control Protocol
- Jacqueline Brendel and Marc Fischlin
-
2017/059 ( PDF )
- Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext
- Kamalesh Acharya and Ratna Dutta
-
2017/058 ( PDF )
- WalnutDSA(TM): A Quantum Resistant Group Theoretic Digital Signature Algorithm
- Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
-
2017/057 ( PDF )
- Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card
- Mathias Wagner and Stefan Heyse
-
2017/056 ( PDF )
- Verifiable Classroom Voting in Practice
- Feng Hao and Dylan Clarke and Brian Randell and Siamak F. Shahandashti
-
2017/055 ( PDF )
- A Probabilistic Baby-Step Giant-Step Algorithm
- Prabhat Kushwaha and Ayan Mahalanobis
-
2017/054 ( PDF )
- Attribute-Based Encryption Implies Identity-Based Encryption
- Javier Herranz
-
2017/053 ( PDF )
- Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem
- Dimitar Jetchev and Benjamin Wesolowski
-
2017/052 ( PDF )
- A short note on the security of Round-Robin Differential Phase-Shift QKD
- Boris Skoric
-
2017/051 ( PDF )
- A note on VRFs from Verifiable Functional Encryption
- Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai
-
2017/050 ( PDF )
- An Obfuscating Compiler
- Peter T. Breuer
-
2017/049 ( PDF )
- LARA - A Design Concept for Lattice-based Encryption
- El Bansarkhani Rachid
-
2017/048 ( PDF )
- ROTE: Rollback Protection for Trusted Execution
- Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun
-
2017/047 ( PDF )
- On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
- Martin R. Albrecht
-
2017/046 ( PDF )
- Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
- Matthieu Giraud and Alexandre Anzala-Yamajako and Olivier Bernard and Pascal Lafourcade
-
2017/045 ( PDF )
- Efficient Round-Optimal Blind Signatures in the Standard Model
- Essam Ghadafi
-
2017/044 ( PDF )
- Anonymous contribution of data
- Matthew McKague and David Eyers
-
2017/043 ( PDF )
- Accumulators with Applications to Anonymity-Preserving Revocation
- Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov
-
2017/042 ( PDF )
- Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient
- Yuanxi Dai and Yannick Seurin and John Steinberger and Aishwarya Thiruvengadam
-
2017/041 ( PDF )
- Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy
- Yongge Wang and Qutaibah m. Malluhi
-
2017/040 ( PDF )
- Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions
- Aggelos Kiayias and Feng-Hao Liu and Yiannis Tselekounis
-
2017/039 ( PDF )
- SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version)
- Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
-
2017/038 ( PDF )
- CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
- Fabrice Benhamouda and Florian Bourse and Helger Lipmaa
-
2017/037 ( PDF )
- Double-base scalar multiplication revisited
- Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
-
2017/036 ( PDF )
- Low-Complexity Cryptographic Hash Functions
- Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan
-
2017/035 ( PDF )
- Privacy-Preserving Classification on Deep Neural Network
- Hervé Chabanne and Amaury de Wargny and Jonathan Milgram and Constance Morel and Emmanuel Prouff
-
2017/034 ( PDF )
- Analysis of the NORX Core Permutation
- Alex Biryukov and Aleksei Udovenko and Vesselin Velichkov
-
2017/033 ( PDF )
- Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
- Peter Pessl
-
2017/032 ( PDF )
- Cryptanalysis of GlobalPlatform Secure Channel Protocols
- Mohamed Sabt and Jacques Traoré
-
2017/031 ( PDF )
- Honey Encryption for Language
- Marc Beunardeau and Houda Ferradi and Rémi Géraud and David Naccache
-
2017/030 ( PDF )
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
- Xiao Wang and Samuel Ranellucci and Jonathan Katz
-
2017/029 ( PDF )
- Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
- Gene Itkis and Emily Shen and Mayank Varia and David Wilson and Arkady Yerukhimovich
-
2017/028 ( PDF )
- A Decentralized PKI In A Mobile Ecosystem
- Varun Chandrasekaran and Lakshminarayanan Subramanian
-
2017/027 ( PDF )
- Scalable Multi-Party Private Set-Intersection
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2017/026 ( PDF )
- Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
- Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
-
2017/025 ( PDF )
- Improved Structure Preserving Signatures under Standard Bilinear Assumptions
- Charanjit S. Jutla and Arnab Roy
-
2017/024 ( PDF )
- Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases
- Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann
-
2017/023 ( PDF )
- Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
- Nuttapong Attrapadung
-
2017/022 ( PDF )
- Privacy for Distributed Databases via (Un)linkable Pseudonyms
- Jan Camenisch and Anja Lehmann
-
2017/021 ( PDF )
- A Generic Approach to Constructing and Proving Verifiable Random Functions
- Rishab Goyal and Susan Hohenberger and Venkata Koppula and Brent Waters
-
2017/020 ( PDF )
- concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
- Olivier Levillain and Maxence Tury and Nicolas Vivet
-
2017/019 ( PDF )
- SmartPool: Practical Decentralized Pooled Mining
- Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena
-
2017/018 ( PDF )
- Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs
- Nir Bitansky
-
2017/017 ( PDF )
- Improved Algorithms for the Approximate k-List Problem in Euclidean Norm
- Gottfried Herold and Elena Kirshanova
-
2017/016 ( PDF )
- Provable Security of Substitution-Permutation Networks
- Yevgeniy Dodis and Jonathan Katz and John Steinberger and Aishwarya Thiruvengadam and Zhe Zhang
-
2017/015 ( PDF )
- Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes
- Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
-
2017/014 ( PDF )
- ORAMs in a Quantum World
- Tommaso Gagliardoni and Nikolaos P. Karvelas and Stefan Katzenbeisser
-
2017/013 ( PDF )
- Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
- Meilof Veeningen
-
2017/012 ( PDF )
- Universal Samplers with Fast Verification
- Venkata Koppula and Andrew Poelstra and Brent Waters
-
2017/011 ( PDF )
- Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
- Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
-
2017/010 ( PDF )
- Circuit-Private Multi-Key FHE
- Wutichai Chongchitmate and Rafail Ostrovsky
-
2017/009 ( PDF )
- Access Control Encryption for Equality, Comparison, and More
- Georg Fuchsbauer and Romain Gay and Lucas Kowalczyk and Claudio Orlandi
-
2017/008 ( PDF )
- Externally Verifiable Oblivious RAM
- Joshua Gancher and Adam Groce and Alex Ledger
-
2017/007 ( PDF )
- Algebraic Attack Efficiency versus S-box Representation
- Hossein Arabnezhad-Khanoki and Babak Sadeghiyan and Josef Pieprzyk
-
2017/006 ( PDF )
- Reduced Mumford divisors of a genus 2 curve through its jacobian function field
- Eduardo Ruiz Duarte
-
2017/005 ( PDF )
- High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves
- Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi
-
2017/004 ( PDF )
- A New Approach for Practical Function-Private Inner Product Encryption
- Sungwook Kim and Jinsu Kim and Jae Hong Seo
-
2017/003 ( PDF )
- The STROBE protocol framework
- Mike Hamburg
-
2017/002 ( -- withdrawn -- )
- Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption
- Ping Zhang, Honggang Hu, and Peng Wang
-
2017/001 ( PDF )
- Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
- Jorge Luis Villar
-
2016/1196 ( PDF )
- MASCAT: Stopping Microarchitectural Attacks Before Execution
- Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2016/1195 ( PDF )
- Constant-Time Callees with Variable-Time Callers
- Cesar Pereida García and Billy Bob Brumley
-
2016/1194 ( PDF )
- Efficient Encryption from Random Quasi-Cyclic Codes
- Carlos Aguilar and Olivier Blazy and Jean-Christophe Deneuville and Philippe Gaborit and Gilles Zémor
-
2016/1193 ( PDF )
- Superscalar Encrypted RISC: Measure of a Secret Computer
- Peter T. Breuer and Jonathan P. Bowen
-
2016/1192 ( PDF )
- Non-Malleable Codes with Split-State Refresh
- Antonio Faonio and Jesper Buus Nielsen
-
2016/1191 ( PDF )
- On the Security of Practical and Complete Homomorphic Encrypted Computation
- P.T. Breuer and J.P. Bowen
-
2016/1190 ( PDF )
- Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
- Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam
-
2016/1189 ( PDF )
- On the Bit Security of Elliptic Curve Diffie--Hellman
- Barak Shani
-
2016/1188 ( PDF )
- Farfalle: parallel permutation-based cryptography
- Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
-
2016/1187 ( PDF )
- Optimal Ate Pairing on Elliptic Curves with Embedding Degree 9,15 and 27
- Emmanuel Fouotsa and Nadia El Mrabet and Aminatou Pecha
-
2016/1186 ( PDF )
- On the Complexity of Breaking Pseudoentropy
- Maciej Skorski
-
2016/1185 ( -- withdrawn -- )
- A Digital Signature Scheme Based On Supersingular Isogeny Problem
- Kisoon Yoon, Jihoon Kwon, and Suhri Kim
-
2016/1184 ( PDF )
- Bitcoin Private Key Locked Transactions
- Sergi Delgado-Segura and Cristina Pérez-Solà and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas
-
2016/1183 ( PDF )
- Some Results on the Known Classes of Quadratic APN Functions
- Lilya Budaghyan and Tor Helleseth and Nian Li and Bo Sun
-
2016/1182 ( PDF )
- Public Key Encryption with Equality Test in the Standard Model
- Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang and Taek-Young Youn
-
2016/1181 ( PDF )
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- Yu Sasaki and Yosuke Todo
-
2016/1180 ( PDF )
- How to Meet Big Data When Private Set Intersection Realizes Constatnt Communication Complexity
- Sumit Kumar Debnath and Ratna Dutta
-
2016/1179 ( PDF )
- Updatable Functional Encryption
- Afonso Arriaga and Vincenzo Iovino and Qiang Tang
-
2016/1178 ( PDF )
- Implementing and Proving the TLS 1.3 Record Layer
- Karthikeyan Bhargavan and Antoine Delignat-Lavaud and Cédric Fournet and Markulf Kohlweiss and Jianyang Pan and Jonathan Protzenko and Aseem Rastogi and Nikhil Swamy and Santiago Zanella-Béguelin and Jean Karim Zinzindohoué
-
2016/1177 ( PDF )
- Efficient Slide Attacks
- Achiya Bar-On and Eli Biham and Orr Dunkelman and Nathan Keller
-
2016/1176 ( PDF )
- Leakage of Signal function with reused keys in RLWE key exchange
- Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott Fluhrer and Xiaodong Lin
-
2016/1175 ( PDF )
- On the Security Notions for Homomorphic Signatures
- Dario Catalano and Dario Fiore and Luca Nizzardo
-
2016/1174 ( PDF )
- Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
- Eik List and Mridul Nandi
-
2016/1173 ( PDF )
- Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring
- Lijing Zhou, Licheng Wang and Yiru Sun
-
2016/1172 ( PDF )
- On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
- Ping Zhang and Honggang Hu
-
2016/1171 ( PDF )
- A Salad of Block Ciphers
- Roberto Avanzi
-
2016/1170 ( PDF )
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
- Christoph Dobraunig and Eik List
-
2016/1169 ( PDF )
- LWE from Non-commutative Group Rings
- Qi Cheng and Jun Zhang and Jincheng Zhuang
-
2016/1168 ( -- withdrawn -- )
- Generic Zero-Knowledge and Multivariate Quadratic Systems
- Alan Szepieniec and Bart Preneel
-
2016/1167 ( PDF )
- Mobile Commerce: Secure Multi-party Computation & Financial Cryptography
- Sumit Chakraborty
-
2016/1166 ( PDF )
- Group key exchange protocols withstanding ephemeral-key reveals
- Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Adriana Suarez Corona
-
2016/1165 ( PDF )
- Efficient Transparent Redactable Signatures with a Single Signature Invocation
- Stuart Haber and William Horne and Miaomiao Zhang
-
2016/1164 ( PDF )
- Attacking FHE-based applications by software fault injections
- Ilaria Chillotti and Nicolas Gama and Louis Goubin
-
2016/1163 ( PDF )
- Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data
- Wen-jie Lu and Shohei Kawasaki and Jun Sakuma
-
2016/1162 ( PDF )
- Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
- Jian Guo and Jérémy Jean and Ivica Nikolic and Yu Sasaki
-
2016/1161 ( PDF )
- Impossible Differential Attack on Simpira v2
- Rui Zong and Xiaoyang Dong and Xiaoyun Wang
-
2016/1160 ( PDF )
- Meet-in-the-Middle Attack on QARMA Block Cipher
- Rui Zong and Xiaoyang Dong
-
2016/1159 ( PDF )
- SPECTRE: A Fast and Scalable Cryptocurrency Protocol
- Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar
-
2016/1158 ( PDF )
- Activate Later Certificates for V2X -- Combining ITS efficiency with privacy
- Eric R. Verheul
-
2016/1157 ( PDF )
- NewHope without reconciliation
- Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe
-
2016/1156 ( PDF )
- Scripting smart contracts for distributed ledger technology
- Pablo Lamela Seijas and Simon Thompson and Darryl McAdams
-
2016/1155 ( PDF )
- Comparative Study of Various Approximations to the Covariance Matrix in Template Attacks
- Mathias Wagner and Yongbo Hu and Chen Zhang and Yeyang Zheng
-
2016/1154 ( PDF )
- Signature Schemes Based On Supersingular Isogeny Problems
- Steven D. Galbraith and Christophe Petit and Javier Silva
-
2016/1153 ( PDF )
- Attacks against search Poly-LWE
- Momonari Kudo
-
2016/1152 ( PDF )
- Leak Me If You Can: Does TVLA Reveal Success Rate?
- Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Sikhar Patranabis and Debdeep Mukhopadhyay
-
2016/1151 ( PDF )
- A Novel Multi-factor ID-based Designated Verifier Signature scheme
- Mike Scott
-
2016/1150 ( PDF )
- Simple Homomorphisms of Cocks IBE and Applications
- Rio LaVigne
-
2016/1149 ( PDF )
- Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
- Krishna Bagadia and Urbi Chatterjee and Debapriya Basu Roy and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty
-
2016/1148 ( PDF )
- Splinter: Practical Private Queries on Public Data
- Frank Wang and Catherine Yun and Shafi Goldwasser and Vinod Vaikuntanathan and Matei Zaharia
-
2016/1147 ( PDF )
- Cryptanalysis of a certificateless aggregate signature scheme
- Nasrollah Pakniat, Mahnaz Noroozi
-
2016/1146 ( PDF )
- Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme
- Zengpeng Li and Steven D. Galbraith and Chunguang Ma
-
2016/1145 ( PDF )
- Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
- Merrielle Spain and Mayank Varia
-
2016/1144 ( PDF )
- Private Projections & Variants
- Xavier Carpent and Sky Faber and Tomas Sander and Gene Tsudik
-
2016/1143 ( PDF )
- Ciphertext and Plaintext Leakage Reveals the Entire TDES Key
- Yongbo Hu and Chen Zhang and Yeyang Zheng and Mathias Wagner
-
2016/1142 ( PDF )
- New construction of single-cycle T-function families
- Shiyi ZHANG and Yongjuan WANG and Guangpu GAO
-
2016/1141 ( PDF )
- An Oblivious Parallel RAM with $O(\log^2 N)$ Parallel Runtime Blowup
- Kartik Nayak and Jonathan Katz
-
2016/1140 ( PDF )
- Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
- Xiaoyi Li and Kaitai Liang and Zhen Liu and Duncan S. Wong
-
2016/1139 ( -- withdrawn -- )
- Comments on “Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof”
- Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
-
2016/1138 ( PDF )
- Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups
- Takeshi Koshiba and Katsuyuki Takashima
-
2016/1137 ( PDF )
- New Impossible Differential Characteristic of SPECK64 using MILP
- HoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
-
2016/1136 ( PDF )
- Cryptography During the French and American Wars in Vietnam
- Phan Duong Hieu and Neal Koblitz
-
2016/1135 ( PDF )
- Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
- Thorben Moos and Amir Moradi and Bastian Richter
-
2016/1134 ( PDF )
- Privacy-preserving Hybrid Recommender System
- Qiang Tang and Husen Wang
-
2016/1133 ( PDF )
- Implementing Complete Formulas on Weierstrass Curves in Hardware
- Pedro Maat C. Massolino and Joost Renes and Lejla Batina
-
2016/1132 ( PDF )
- Some results on ACORN
- Dibyendu Roy and Sourav Mukhopadhyay
-
2016/1131 ( PDF )
- New construction of single cycle T-function families
- Shiyi ZHANG and Yongjuan WANG and Guangpu GAO
-
2016/1130 ( PDF )
- Are RNGs Achilles’ heel of RFID Security and Privacy Protocols ?
- Atakan Arslan and Suleyman Kardas and Sultan Aldirmaz and Sarp Erturk
-
2016/1129 ( PDF )
- Certificateless Public Key Encryption with Equality Test
- Xi-Jun Lin, Zhen Yan, Qi Zhang and Haipeng Qu
-
2016/1128 ( PDF )
- Modifying Shor’s algorithm to compute short discrete logarithms
- Martin Ekerå
-
2016/1127 ( PDF )
- Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
- Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang
-
2016/1126 ( PDF )
- Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
- Jung Hee Cheon and Duhyeong Kim and Joohee Lee and Yongsoo Song
-
2016/1125 ( PDF )
- Estonian Voting Verification Mechanism Revisited
- Koksal Mus and Mehmet Sabir Kiraz and Murat Cenk and Isa Sertkaya
-
2016/1124 ( PDF )
- Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
- Kazuya Imamura and Kazuhiko Minematsu and Tetsu Iwata
-
2016/1123 ( PDF )
- Dude, is my code constant time?
- Oscar Reparaz and Josep Balasch and Ingrid Verbauwhede
-
2016/1122 ( PDF )
- Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought)
- B. Skoric and M. de Vries
-
2016/1121 ( PDF )
- Insecurity of RCB: Leakage-Resilient Authenticated Encryption
- Farzaneh abed and Francesco Berti and Stefan Lucks
-
2016/1120 ( PDF )
- Cryptanalysis of Reduced round SKINNY Block Cipher
- Sadegh Sadeghi and Tahere Mohammadi and Nasour Bagheri
-
2016/1119 ( PDF )
- A Code-Based Group Signature Scheme
- Quentin Alamélou and Olivier Blazy and Stéphane Cauchie and Philippe Gaborit
-
2016/1118 ( PDF )
- Designing Optimal Implementations of Linear Layers (Full Version)
- Ruoxin Zhao and Baofeng Wu and Rui Zhang and Qian Zhang
-
2016/1117 ( PDF )
- Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling
- Joppe W. Bos and Wouter Castryck and and Ilia Iliashenko and Frederik Vercauteren
-
2016/1116 ( PDF )
- Evaluating Entropy for TRNGs: Efficient, Robust and Provably Secure
- Maciej Skorski
-
2016/1115 ( PDF )
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef
-
2016/1114 ( PDF )
- Full Disk Encryption: Bridging Theory and Practice
- Louiza Khati and Nicky Mouha and Damien Vergnaud
-
2016/1113 ( PDF )
- Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures
- Sabyasachi Dutta and Tamal Bhore and Avishek Adhikari
-
2016/1112 ( PDF )
- Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes
- Victor Cauchois and Pierre Loidreau and Nabil Merkiche
-
2016/1111 ( PDF )
- Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
- Pascal Sasdrich and Amir Moradi and Tim Güneysu
-
2016/1110 ( PDF )
- Efficient Post-Quantum Zero-Knowledge and Signatures
- Steven Goldfeder and Melissa Chase and Greg Zaverucha
-
2016/1109 ( PDF )
- Practical CCA2-Secure and Masked Ring-LWE Implementation
- Tobias Oder and Tobias Schneider and Thomas Pöppelmann and Tim Güneysu
-
2016/1108 ( PDF )
- Security Analysis of SKINNY under Related-Tweakey Settings
- Guozhen Liu and Mohona Ghosh and Ling Song
-
2016/1107 ( PDF )
- Magic Adversaries Versus Individual Reduction: Science Wins Either Way
- Yi Deng
-
2016/1106 ( PDF )
- Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption
- Romain Gay
-
2016/1105 ( PDF )
- Generic Transformations of Predicate Encodings: Constructions and Applications
- Miguel Ambrona and Gilles Barthe and Benedikt Schmidt
-
2016/1104 ( PDF )
- Practical Functional Encryption for Bilinear Forms
- Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore
-
2016/1103 ( PDF )
- A Fast Single-Key Two-Level Universal Hash Function
- Debrup Chakraborty and Sebati Ghosh and Palash Sarkar
-
2016/1102 ( PDF )
- Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography
- Alfred Menezes and Palash Sarkar and Shashank Singh
-
2016/1101 ( PDF )
- MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher
- Ling Sun, Wei Wang, Ru Liu, Meiqin Wang
-
2016/1100 ( PDF )
- Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors
- Quentin Alamélou and Paul-Edmond Berthier and Stéphane Cauchie and Benjamin Fuller and Philippe Gaborit
-
2016/1099 ( PDF )
- Improved Parameters for the Ring-TESLA Digital Signature Scheme
- Arjun Chopra
-
2016/1098 ( PDF )
- Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP
- Zhiyuan Guo and Wenling Wu and Renzhang Liu and Liting Zhang
-
2016/1097 ( PDF )
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps
- Prabhanjan Ananth and Amit Sahai
-
2016/1096 ( PDF )
- Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
- Huijia Lin
-
2016/1095 ( PDF )
- Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
- Noboru Kunihiro and Yuki Takahashi
-
2016/1094 ( PDF )
- New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
- Yohei Watanabe and Keita Emura and Jae Hong Seo
-
2016/1093 ( PDF )
- Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing
- Siva Nishok Dhanuskodi and Daniel Holcomb
-
2016/1092 ( PDF )
- Parametrizations for Families of ECM-friendly curves
- Alexandre Gélin and Thorsten Kleinjung and Arjen K. Lenstra
-
2016/1091 ( PDF )
- On the Entropy of Oscillator-Based True Random Number Generators
- Yuan Ma and Jingqiang Lin and Jiwu Jing
-
2016/1090 ( PDF )
- OleF: An Inverse-Free Online Cipher
- Ritam Bhaumik and Mridul Nandi
-
2016/1089 ( PDF )
- Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
- Jérémy Chotard and Duong Hieu Phan and David Pointcheval
-
2016/1088 ( PDF )
- How to infinitely share a secret more efficiently
- Anat Paskin-Cherniavsky
-
2016/1087 ( PDF )
- CENC is Optimally Secure
- Tetsu Iwata and Bart Mennink and Damian Vizár
-
2016/1086 ( PDF )
- An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model
- Reyhaneh Rabaninejad and Mohammad Hassan Ameri and Mahshid Delavar and Javad Mohajeri
-
2016/1085 ( PDF )
- Digital Signatures from Symmetric-Key Primitives
- David Derler and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig
-
2016/1084 ( PDF )
- Circuit OPRAM: A Unifying Framework for Statistically and Computationally Secure ORAMs and OPRAMs
- T-H. Hubert Chan and Elaine Shi
-
2016/1083 ( PDF )
- Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks
- Dingding Jia and Xianhui Lu and Bao Li
-
2016/1082 ( PDF )
- My traces learn what you did in the dark: recovering secret signals without key guesses
- Si Gao and Hua Chen and Wenling Wu and Limin Fan and Weiqiong Cao and Xiangliang Ma
-
2016/1081 ( PDF )
- Attacks to a proxy-mediated key agreement protocol based on symmetric encryption
- David Nuñez, and Isaac Agudo, and Javier Lopez
-
2016/1080 ( PDF )
- Does Coupling Affect the Security of Masked Implementations?
- Thomas De Cnudde and Begül Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen
-
2016/1079 ( PDF )
- Revisiting the Cubic UOV Signature Scheme
- Dung Hoang Duong and Takanori Yasuda and Albrecht Petzoldt and Yacheng Wang and Tsuyoshi Takagi
-
2016/1078 ( PDF )
- Construction of $n$-variable ($n\equiv 2 \bmod 4$) balanced Boolean functions with maximum absolute value in autocorrelation spectra $< 2^{\frac n2}$
- Deng Tang and Subhamoy Maitra
-
2016/1077 ( PDF )
- Blurry-ORAM: A Multi-Client Oblivious Storage Architecture
- N. P. Karvelas and Andreas Peter and Stefan Katzenbeisser
-
2016/1076 ( PDF )
- A Note on Quantum-Secure PRPs
- Mark Zhandry
-
2016/1075 ( PDF )
- Cryptanalysis of Simple Matrix Scheme for Encryption
- Chunsheng Gu
-
2016/1074 ( PDF )
- Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
- Thomas Unterluggauer and Mario Werner and Stefan Mangard
-
2016/1073 ( PDF )
- Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks
- Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer
-
2016/1072 ( PDF )
- Game-Theoretic Security for Two-Party Protocols
- Haruna Higo and Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga
-
2016/1071 ( PDF )
- Iron: Functional Encryption using Intel SGX
- Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
-
2016/1070 ( PDF )
- Preventing CLT Attacks on Obfuscation with Linear Overhead
- Rex Fernando and Peter M. R. Rasmussen and Amit Sahai
-
2016/1069 ( PDF )
- Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO
- Jesper Buus Nielsen and Thomas Schneider and Roberto Trifiletti
-
2016/1068 ( PDF )
- On Finding Short Cycles in Cryptographic Algorithms
- Elena Dubrova and Maxim Teslenko
-
2016/1067 ( PDF )
- Scalable Bias-Resistant Distributed Randomness
- Ewa Syta and Philipp Jovanovic and Eleftherios Kokoris Kogias and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Michael J. Fischer and Bryan Ford
-
2016/1066 ( PDF )
- Optimizing Semi-Honest Secure Multiparty Computation for the Internet
- Aner Ben-Efraim and Yehuda Lindell and Eran Omri
-
2016/1065 ( PDF )
- Revisiting the Efficient Key Generation of ZHFE
- Yasuhiko Ikematsu and Dung H. Duong and Albrecht Petzoldt and Tsuyoshi Takagi
-
2016/1064 ( PDF )
- Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
- David Derler and Stephan Krenn and Daniel Slamanig
-
2016/1063 ( PDF )
- Log-Structure Authenticated Data Storage with Minimal Trust
- Yuzhe Tang and Ju Chen
-
2016/1062 ( PDF )
- Catena: Efficient Non-equivocation via Bitcoin
- Alin Tomescu and Srinivas Devadas
-
2016/1061 ( PDF )
- Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
- Joan Daemen
-
2016/1060 ( PDF )
- On Analyzing Program Behavior Under Fault Injection Attacks
- Jakub Breier
-
2016/1059 ( PDF )
- The INT-RUP Security of OCB with Intermediate (Parity) Checksum
- Ping Zhang, Peng Wang, and Honggang Hu
-
2016/1058 ( PDF )
- Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
- Markku-Juhani O. Saarinen
-
2016/1057 ( PDF )
- Secure Multiparty Computation from SGX
- Raad Bahmani and Manuel Barbosa and Ferdinand Brasser and Bernardo Portela and Ahmad-Reza Sadeghi and Guillaume Scerri and Bogdan Warinschi
-
2016/1056 ( PDF )
- A Tool Kit for Partial Key Exposure Attacks on RSA
- Atsushi Takayasu and Noboru Kunihiro
-
2016/1055 ( PDF )
- A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE
- Jung Hee Cheon, Kyoo Hyung Han, Jinsu Kim, Changmin Lee, and Yongha Son
-
2016/1054 ( PDF )
- SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
- Giulio Malavolta and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
-
2016/1053 ( PDF )
- SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
- Ashutosh Dhar Dwivedi and Miloš Klouček and Pawel Morawiecki and Ivica Nikolić and Josef Pieprzyk and Sebastian Wójtowicz
-
2016/1052 ( PDF )
- Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller
- Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
-
2016/1051 ( PDF )
- Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System
- Shuai Han and Shengli Liu and Lin Lyu
-
2016/1050 ( PDF )
- Cryptographic decoding of the Leech lattice
- Alex van Poppelen
-
2016/1049 ( PDF )
- Randomized stopping times and provably secure pseudorandom permutation generators
- Michal Kulis and Pawel Lorek and Filip Zagorski
-
2016/1048 ( PDF )
- The Bitcoin Backbone Protocol with Chains of Variable Difficulty
- Juan A. Garay and Aggelos Kiayias and Nikos Leonardos
-
2016/1047 ( PDF )
- IoT Goes Nuclear: Creating a ZigBee Chain Reaction
- Eyal Ronen and Colin O’Flynn and Adi Shamir and Achi-Or Weingarten
-
2016/1046 ( PDF )
- Efficient Finite field multiplication for isogeny based post quantum cryptography
- Angshuman karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
-
2016/1045 ( PDF )
- On Fast Calculation of Addition Chains for Isogeny-Based Cryptography
- Brian Koziel, Reza Azarderakhsh, David Jao, and Mehran Mozaffari-Kermani
-
2016/1044 ( PDF )
- Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
- Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani
-
2016/1043 ( PDF )
- Concurrently Composable Security With Shielded Super-polynomial Simulators
- Brandon Broadnax and Nico Döttling and Gunnar Hartung and Jörn Müller-Quade and Matthias Nagel
-
2016/1042 ( PDF )
- "Oops, I did it again" -- Security of One-Time Signatures under Two-Message Attacks
- Leon Groot Bruinderink and Andreas Hülsing
-
2016/1041 ( PDF )
- XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data
- Chia-Mu Yu
-
2016/1040 ( PDF )
- Semi-Honest Secure Multiparty Computation Can Be Insecure with Use of Even Almost Uniformly Random Number Generators
- Koji Nuida
-
2016/1039 ( PDF )
- A Fiat-Shamir Implementation Note
- Simon Cogliani and Rémi Géraud and David Naccache
-
2016/1038 ( PDF )
- An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries
- Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
-
2016/1037 ( PDF )
- Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
- Dawid Gawel and Maciej Kosarzecki and Poorvi L. Vora and Hua Wu and Filip Zagorski
-
2016/1036 ( PDF )
- Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers
- Zhiyuan Guo and Renzhang Liu and Wenling Wu and Dongdai Lin
-
2016/1035 ( PDF )
- Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection
- Maciej Skorski
-
2016/1034 ( PDF )
- Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha
- Arka Rai Choudhuri and Subhamoy Maitra
-
2016/1033 ( PDF )
- Decentralized Anonymous Micropayments
- Alessandro Chiesa and Matthew Green and Jingcheng Liu and Peihan Miao and Ian Miers and Pratyush Mishra
-
2016/1032 ( PDF )
- Efficient Covert Two-Party Computation
- Stanislaw Jarecki
-
2016/1031 ( PDF )
- A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security
- Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen
-
2016/1030 ( PDF )
- Novel Inner Product Encryption Resistant to Partial Collusion Attacks
- Yuqiao Deng, Ge Song
-
2016/1029 ( PDF )
- Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family
- Yuqiao Deng, Ge Song
-
2016/1028 ( PDF )
- Ratcheted Encryption and Key Exchange: The Security of Messaging
- Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs
-
2016/1027 ( PDF )
- Formal Abstractions for Attested Execution Secure Processors
- Rafael Pass and Elaine Shi and Florian Tramer
-
2016/1026 ( PDF )
- Sharper Ring-LWE Signatures
- Paulo S. L. M. Barreto and Patrick Longa and Michael Naehrig and Jefferson E. Ricardini and Gustavo Zanon
-
2016/1025 ( PDF )
- An Algorithm for Counting the Number of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity
- Wenlun Pan and Zhenzhen Bao and Dongdai Lin and Feng Liu
-
2016/1024 ( PDF )
- LDA-Based Clustering as a Side-Channel Distinguisher
- Rauf Mahmudlu and Valentina Banciu and Lejla Batina and Ileana Buhan
-
2016/1023 ( PDF )
- Constant-Time Higher-Order Boolean-to-Arithmetic Masking
- Michael Hutter and Michael Tunstall
-
2016/1022 ( PDF )
- Randomized Mixed-Radix Scalar Multiplication
- Eleonora Guerrini and Laurent Imbert and Théo Winterhalter
-
2016/1021 ( PDF )
- Cryptographic Randomness on a CC2538: a Case Study
- Yan Yan and Elisabeth Oswald and Theo Tryfonas
-
2016/1020 ( PDF )
- KDM Security for Identity-Based Encryption: Constructions and Separations
- Yu Chen and Jiang Zhang and Yi Deng and Jinyong Chang
-
2016/1019 ( PDF )
- Faster Homomorphic Evaluation of Discrete Fourier Transforms
- Anamaria Costache and Nigel P. Smart and Srinivas Vivek
-
2016/1018 ( PDF )
- IKP: Turning a PKI Around with Blockchains
- Stephanos Matsumoto and Raphael M. Reischuk
-
2016/1017 ( PDF )
- Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project
- Douglas Stebila and Michele Mosca
-
2016/1016 ( PDF )
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
- Mihir Bellare and Bertram Poettering and Douglas Stebila
-
2016/1015 ( PDF )
- MaxLength Considered Harmful to the RPKI
- Yossi Gilad and Omar Sagga and Sharon Goldberg
-
2016/1014 ( PDF )
- Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme
- Liqun Chen and Thalia M. Laing and Keith M. Martin
-
2016/1013 ( PDF )
- A Formal Security Analysis of the Signal Messaging Protocol
- Katriel Cohn-Gordon and Cas Cremers and Benjamin Dowling and Luke Garratt and Douglas Stebila
-
2016/1012 ( PDF )
- Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016)
- Damien Vergnaud
-
2016/1011 ( PDF )
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
- Jean-Sébastien Coron and Moon Sung Lee and Tancrède Lepoint and Mehdi Tibouchi
-
2016/1010 ( PDF )
- Are We There Yet? On RPKI's Deployment and Security
- Yossi Gilad and Avichai Cohen and Amir Herzberg and Michael Schapira and Haya Shulman
-
2016/1009 ( PDF )
- Efficient Resettably Secure Two-Party Computation
- Tobias Nilges
-
2016/1008 ( PDF )
- KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols
- Jorge Munilla
-
2016/1007 ( PDF )
- A survey of attacks on Ethereum smart contracts
- Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli
-
2016/1006 ( PDF )
- The Security of NTP’s Datagram Protocol
- Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and Haydn Kennedy and Jonathan Gardner and Sharon Goldberg
-
2016/1005 ( PDF )
- Atomic-AES v2.0
- Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
-
2016/1004 ( PDF )
- Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
- Stefan Dziembowski and Sebastian Faust and Francois-Xavier Standaert
-
2016/1003 ( PDF )
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
- Daniel Apon and Nico Döttling and Sanjam Garg and Pratyay Mukherjee
-
2016/1002 ( PDF )
- Decryption phase in Norwegian electronic voting
- Anders Smedstuen Lund and Martin Strand
-
2016/1001 ( PDF )
- Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs
- Amit Jana and Goutam Paul
-
2016/1000 ( -- withdrawn -- )
- Solving Trapdoor Basis of Ideal Lattice from Public Basis
- Yupu Hu and Zhizhu Lian and Jiangshan Chen
-
2016/999 ( PDF )
- Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
- Kristen Dorey and Nicholas Chang-Fong and Aleksander Essex
-
2016/998 ( PDF )
- Cryptanalyses of Candidate Branching Program Obfuscators
- Yilei Chen and Craig Gentry and Shai Halevi
-
2016/997 ( PDF )
- Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems
- Carsten Baum and Ivan Damgård and Sabine Oechsner and Chris Peikert
-
2016/996 ( PDF )
- Leakage-Resilient and Misuse-Resistant Authenticated Encryption
- Francesco Berti and François Koeune and Olivier Pereira and Thomas Peters and François-Xavier Standaert
-
2016/995 ( PDF )
- Measuring small subgroup attacks against Diffie-Hellman
- Luke Valenta and David Adrian and Antonio Sanso and Shaanan Cohney and Joshua Fried and Marcella Hastings and J. Alex Halderman and Nadia Heninger
-
2016/994 ( PDF )
- Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
- Leonid Reyzin and Dmitry Meshkov and Alexander Chepurnoy and Sasha Ivanov
-
2016/993 ( PDF )
- Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks
- Liran Lerman and Olivier Markowitch and Nikita Veshchikov
-
2016/992 ( PDF )
- Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
- Matthew Amy and Olivia Di Matteo and Vlad Gheorghiu and Michele Mosca and Alex Parent and John Schanck
-
2016/991 ( PDF )
- Bootstrapping the Blockchain --- Directly
- Juan A. Garay and Aggelos Kiayias and Nikos Leonardos and Giorgos Panagiotakos
-
2016/990 ( PDF )
- Revisiting the Wrong-Key-Randomization Hypothesis
- Tomer Ashur and Tim Beyne and Vincent Rijmen
-
2016/989 ( PDF )
- Scrypt is Maximally Memory-Hard
- Joël Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro
-
2016/988 ( PDF )
- On Probabilistic Checking in Perfect Zero Knowledge
- Eli Ben-Sasson and Alessandro Chiesa and Michael A. Forbes and Ariel Gabizon and Michael Riabzev and Nicholas Spooner
-
2016/987 ( PDF )
- A Key to Success -- Success Exponents for Side-Channel Distinguishers
- Sylvain Guilley and Annelie Heuser and Olivier Rioul
-
2016/986 ( PDF )
- Fast Arithmetic Modulo $2^xp^y\pm 1$
- Joppe W. Bos and Simon Friedberger
-
2016/985 ( PDF )
- Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
- Dario Fiore and Cédric Fournet and Esha Ghosh and Markulf Kohlweiss and Olga Ohrimenko and Bryan Parno
-
2016/984 ( PDF )
- Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)
- Daniel Dinu and Léo Perrin and Aleksei Udovenko and Vesselin Velichkov and Johann Großschädl and Alex Biryukov
-
2016/983 ( PDF )
- Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions
- Avijit Dutta and Ashwin Jha and Mridul Nandi
-
2016/982 ( PDF )
- Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
- Christopher Huth and Daniela Becker and Jorge Guajardo and Paul Duplys and Tim Güneysu
-
2016/981 ( PDF )
- Efficient No-dictionary Verifiable SSE
- Wakaha Ogata and Kaoru Kurosawa
-
2016/980 ( PDF )
- TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices
- Ning Zhang and Kun Sun and Deborah Shands and Wenjing Lou and Y. Thomas Hou
-
2016/979 ( PDF )
- The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented
- Zhengjun Cao, Lihua Liu
-
2016/978 ( PDF )
- Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging
- Muhammad Yasin and Ozgur Sinanoglu and Jeyavijayan Rajendran
-
2016/977 ( PDF )
- Side channels in deduplication: trade-offs between leakage and efficiency
- Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Mohsen Toorani
-
2016/976 ( PDF )
- On Adaptively Secure Multiparty Computation with a Short CRS
- Ran Cohen and Chris Peikert
-
2016/975 ( PDF )
- (Universal) Unconditional Verifiability in E-Voting without Trusted Parties
- Gina Gallegos-Garcia and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan
-
2016/974 ( PDF )
- Server-Aided Revocable Identity-Based Encryption from Lattices
- Khoa Nguyen and Huaxiong Wang and Juanyang Zhang
-
2016/973 ( PDF )
- Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
- Jian Guo and Jérémy Jean and Ivica Nikolić and Kexin Qiao and Yu Sasaki and Siang Meng Sim
-
2016/972 ( PDF )
- Revealing Encryption for Partial Ordering
- Helene Haagh and Yue Ji and Chenxing Li and Claudio Orlandi and and Yifan Song
-
2016/971 ( PDF )
- Authenticated communication from Quantum Readout of PUFs
- B. Skoric and P.W.H. Pinkse and A.P. Mosk
-
2016/970 ( PDF )
- Statistical Analysis for Access-Driven Cache Attacks Against AES
- Liwei Zhang; A. Adam Ding; Yunsi Fei; Zhen Hang Jiang
-
2016/969 ( PDF )
- Garbling Gadgets for Boolean and Arithmetic Circuits
- Marshall Ball and Tal Malkin and Mike Rosulek
-
2016/968 ( PDF )
- System Clock and Power Supply Cross-Checking for Glitch Detection
- Pei Luo and Chao Luo and Yunsi Fei
-
2016/967 ( PDF )
- Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
- Pei Luo and Yunsi Fei
-
2016/966 ( PDF )
- High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2m)
- Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
-
2016/965 ( PDF )
- A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds
- Maciej Skorski
-
2016/964 ( PDF )
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Lorenzo Grassi and Christian Rechberger
-
2016/963 ( PDF )
- Efficient compression of SIDH public keys
- Craig Costello and David Jao and Patrick Longa and Michael Naehrig and Joost Renes and David Urbanik
-
2016/962 ( PDF )
- On Removing Graded Encodings from Functional Encryption
- Nir Bitansky and Huijia Lin and Omer Paneth
-
2016/961 ( PDF )
- A kilobit hidden SNFS discrete logarithm computation
- Joshua Fried and Pierrick Gaudry and Nadia Heninger and Emmanuel Thomé
-
2016/960 ( PDF )
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- Gorjan Alagic and Alexander Russell
-
2016/959 ( PDF )
- Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
- Shashank Agrawal and Venkata Koppula and Brent Waters
-
2016/958 ( PDF )
- SafeDeflate: compression without leaking secrets
- Michał Zieliński
-
2016/957 ( PDF )
- Computing generator in cyclotomic integer rings
- Thomas Espitau and Pierre-Alain Fouque and Alexandre Gélin and Paul Kirchner
-
2016/956 ( PDF )
- Two Simple Composition Theorems with H-coefficients
- Jacques Patarin
-
2016/955 ( PDF )
- Constant-deposit multiparty lotteries on Bitcoin
- Massimo Bartoletti and Roberto Zunino
-
2016/954 ( PDF )
- Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria
- WeiGuo Zhang and Enes Pasalic
-
2016/953 ( PDF )
- Collusion-Resistant Broadcast Encryption with Tight Reductions and Beyond
- Linfeng Zhou
-
2016/952 ( PDF )
- ISAP -- Towards Side-Channel Secure Authenticated Encryption
- Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer
-
2016/951 ( PDF )
- Revisiting Covert Multiparty Computation
- Geoffroy Couteau
-
2016/950 ( PDF )
- Orthogonalized Lattice Enumeration for Solving SVP
- Zhongxiang Zheng and Xiaoyun Wang and Guangwu Xu and Yang Yu
-
2016/949 ( PDF )
- Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings
- Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au
-
2016/948 ( PDF )
- Secure Computation in Online Social Networks
- Foteini Baldimtsi and Dimitrios Papadopoulos and Stavros Papadopoulos and Alessandra Scafuro and Nikos Triandopoulos
-
2016/947 ( PDF )
- Isogeny graphs of ordinary abelian varieties
- Ernest Hunter Brooks and Dimitar Jetchev and Benjamin Wesolowski
-
2016/946 ( PDF )
- Bitsliced Masking and ARM: Friends or Foes?
- Wouter de Groot and Kostas Papagiannopoulos and Antonio de La Piedra and Erik Schneider and Lejla Batina
-
2016/945 ( PDF )
- High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers
- Kostas Papapagiannopoulos
-
2016/944 ( PDF )
- High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
- Jun Furukawa and Yehuda Lindell and Ariel Nof and Or Weinstein
-
2016/943 ( PDF )
- Stadium: A Distributed Metadata-Private Messaging System
- Nirvan Tyagi and Yossi Gilad and Matei Zaharia and Nickolai Zeldovich
-
2016/942 ( PDF )
- Optimizing Secure Computation Programs with Private Conditionals
- Peeter Laud and Alisa Pankova
-
2016/941 ( PDF )
- A New Class of Differentially 4-uniform Permutations from the Inverse Function
- Jian Bai and Dingkang Wang
-
2016/940 ( PDF )
- Fast Actively Secure OT Extension for Short Secrets
- Arpita Patra and Pratik Sarkar and Ajith Suresh
-
2016/939 ( PDF )
- Key Reconciliation Protocols for Error Correction of Silicon PUF Responses
- Brice Colombier and Lilian Bossuet, and David Hély and Viktor Fischer
-
2016/938 ( PDF )
- Kummer for Genus One over Prime Order Fields
- Sabyasachi Karati and Palash Sarkar
-
2016/937 ( PDF )
- A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences
- Nur Azman Abu and Shekh Faisal Abdul-Latip and Muhammad Rezal Kamel Ariffin
-
2016/936 ( PDF )
- Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring
- Vadim N. Tsypyschev
-
2016/935 ( PDF )
- Concealing Secrets in Embedded Processors Designs
- Hannes Gross and Manuel Jelinek and Stefan Mangard and Thomas Unterluggauer and Mario Werner
-
2016/934 ( PDF )
- Cryptography with Updates
- Prabhanjan Ananth and Aloni Cohen and Abhishek Jain
-
2016/933 ( PDF )
- Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection
- Michele Orrù and Emmanuela Orsini and Peter Scholl
-
2016/932 ( PDF )
- Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks
- Jakub Breier and Dirmanto Jap and Shivam Bhasin
-
2016/931 ( PDF )
- Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (Extended Version)
- Jakub Breier and Xiaolu Hou
-
2016/930 ( PDF )
- Scalable Private Set Intersection Based on OT Extension
- Benny Pinkas and Thomas Schneider and Michael Zohner
-
2016/929 ( PDF )
- A Generalized Ideal Secret Sharing Scheme
- Tanujay Sha
-
2016/928 ( PDF )
- The complexity of the connected graph access structure on seven participants
- Massoud Hadian Dehkordi and Ali Safi
-
2016/927 ( PDF )
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
-
2016/926 ( PDF )
- LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
- Matthias Hamann and Matthias Krause and Willi Meier
-
2016/925 ( PDF )
- Secure Channel Injection and Anonymous Proofs of Account Ownership
- Liang Wang and Rafael Pass and abhi shelat and Thomas Ristenpart
-
2016/924 ( PDF )
- Bit Coincidence Mining Algorithm II
- Koh-ichi Nagao
-
2016/923 ( PDF )
- Attacking embedded ECC implementations through cmov side channels
- Erick Nascimento and Lukasz Chmielewski and David Oswald and Peter Schwabe
-
2016/922 ( PDF )
- Leakage Characterizing and Detecting Based on Communication Theory
- Wei Yang and Yuchen Cao and Ke Ma and Hailong Zhang and Yongbin Zhou and Baofeng Li
-
2016/921 ( PDF )
- Breaking Cryptographic Implementations Using Deep Learning Techniques
- Houssem Maghrebi and Thibault Portigliatti and Emmanuel Prouff
-
2016/920 ( PDF )
- Breaking Web Applications Built On Top of Encrypted Data
- Paul Grubbs and Richard McPherson and Muhammad Naveed and Thomas Ristenpart and Vitaly Shmatikov
-
2016/919 ( PDF )
- Snow White: Provably Secure Proofs of Stake
- Phil Daian and Rafael Pass and Elaine Shi
-
2016/918 ( PDF )
- The Sleepy Model of Consensus
- Rafael Pass and Elaine Shi
-
2016/917 ( PDF )
- Hybrid Consensus: Efficient Consensus in the Permissionless Model
- Rafael Pass and Elaine Shi
-
2016/916 ( PDF )
- FruitChains: A Fair Blockchain
- Rafael Pass and Elaine Shi
-
2016/915 ( PDF )
- Transparency Overlays and Applications
- Melissa Chase and Sarah Meiklejohn
-
2016/914 ( PDF )
- Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
- Gora Adj and Isaac Canales-Martínez and Nareli Cruz-Cortés and Alfred Menezes and Thomaz Oliveira and Luis Rivera-Zamarripa and Francisco Rodríguez-Henríquez
-
2016/913 ( PDF )
- Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15
- Boru Gong and Yunlei Zhao
-
2016/912 ( PDF )
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Gilles Barthe and François Dupressoir and Sebastian Faust and Benjamin Grégoire and François-Xavier Standaert and Pierre-Yves Strub
-
2016/911 ( PDF )
- The Shortest Signatures Ever
- Mohamed Saied Emam Mohamed and Albrecht Petzoldt
-
2016/910 ( PDF )
- The closest vector problem in tensored root lattices of type A and in their duals
- Léo Ducas and Wessel P.J. van Woerden
-
2016/909 ( PDF )
- Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation
- Bo-Yuan Peng and Yuan-Che Hsu and Yu-Jia Chen and Di-Chia Chueh and Chen-Mou Cheng and Bo-Yin Yang
-
2016/908 ( PDF )
- Secure Error-Tolerant Graph Matching Protocols
- Kalikinkar Mandal and Basel Alomair and Radha Poovendran
-
2016/907 ( PDF )
- Cut-and-Choose for Garbled RAM
- Peihan Miao
-
2016/906 ( PDF )
- On Basing Search SIVP on NP-Hardness
- Tianren Liu
-
2016/905 ( PDF )
- Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI$^+$ protocols
- Masoumeh Safkhani and Nasour Bagheri
-
2016/904 ( PDF )
- Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2016/903 ( PDF )
- From Indifferentiability to Constructive Cryptography (and Back)
- Ueli Maurer and Renato Renner
-
2016/902 ( PDF )
- Universally Composable Cryptographic Role-Based Access Control
- Bin Liu and Bogdan Warinschi
-
2016/901 ( PDF )
- Distance Bounding based on PUF
- Mathilde Igier and Serge Vaudenay
-
2016/900 ( PDF )
- Quantifying Web Adblocker Privacy
- Arthur Gervais and Alexandros Filios and Vincent Lenders and Srdjan Capkun
-
2016/899 ( PDF )
- Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains
- Kittiphop Phalakarn and Kittiphon Phalakarn and Vorapong Suppakitpaisarn
-
2016/898 ( PDF )
- Physical Unclonable Functions based on Temperature Compensated Ring Oscillators
- Sha Tao and Elena Dubrova
-
2016/897 ( PDF )
- An efficient somewhat homomorphic encryption scheme based on factorization
- Gérald Gavin
-
2016/896 ( PDF )
- Security Analysis of Anti-SAT
- Muhammad Yasin and Bodhisatwa Mazumdar and Ozgur Sinanoglu and Jeyavijayan Rajendran
-
2016/895 ( PDF )
- Leakage-Abuse Attacks against Order-Revealing Encryption
- Paul Grubbs and Kevin Sekniqi and Vincent Bindschaedler and Muhammad Naveed and Thomas Ristenpart
-
2016/894 ( PDF )
- Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation
- Chun Guo and Dongdai Lin
-
2016/893 ( PDF )
- Building web applications on top of encrypted data using Mylar
- Raluca Ada Popa and Emily Stark and Jonas Helfer and Steven Valdez and Nickolai Zeldovich and M. Frans Kaashoek and Hari Balakrishnan
-
2016/892 ( PDF )
- Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
- Adrià Gascón and Phillipp Schoppmann and Borja Balle and Mariana Raykova and Jack Doerner and Samee Zahur and David Evans
-
2016/891 ( PDF )
- Tightly Secure IBE under Constant-size Master Public Key
- Jie Chen and Junqing Gong and Jian Weng
-
2016/890 ( PDF )
- A Parallel Variant of LDSieve for the SVP on Lattices
- Artur Mariano and Thijs Laarhoven and Christian Bischof
-
2016/889 ( PDF )
- Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
- Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
-
2016/888 ( PDF )
- Finding closest lattice vectors using approximate Voronoi cells
- Thijs Laarhoven
-
2016/887 ( PDF )
- A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size $2^{4k+2}$
- Anne Canteaut and Sébastien Duval and Léo Perrin
-
2016/886 ( PDF )
- A Robust and Sponge-Like PRNG with Improved Efficiency
- Daniel Hutchinson
-
2016/885 ( PDF )
- Short Stickelberger Class Relations and application to Ideal-SVP
- Ronald Cramer and Léo Ducas and Benjamin Wesolowski
-
2016/884 ( PDF )
- Robust, low-cost, auditable random number generation for embedded system security
- Ben Lampert and Riad S. Wahby and Shane Leonard and Philip Levis
-
2016/883 ( PDF )
- DEMO: Integrating MPC in Big Data Workflows
- Nikolaj Volgushev and Malte Schwarzkopf and Andrei Lapets and Mayank Varia and Azer Bestavros
-
2016/882 ( PDF )
- MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption
- Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao
-
2016/881 ( PDF )
- Near Collisions in the RC4 Stream Cipher
- Anindya Shankar Bhandari
-
2016/880 ( PDF )
- Naor-Yung Paradigm with Shared Randomness and Applications
- Silvio Biagioni and Daniel Masny and Daniele Venturi
-
2016/879 ( PDF )
- Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption
- Benoît Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang
-
2016/878 ( PDF )
- Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
- Jian Guo and Meicheng Liu and Ling Song
-
2016/877 ( PDF )
- How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones
- Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, and Keisuke Tanaka
-
2016/876 ( PDF )
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
- Lei Wang and Jian Guo and Guoyan Zhang and Jingyuan Zhao and Dawu Gu
-
2016/875 ( PDF )
- Depth-Robust Graphs and Their Cumulative Memory Complexity
- Joël Alwen and Jeremiah Blocki and Krzysztof Pietrzak
-
2016/873 ( PDF )
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
- Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang
-
2016/872 ( PDF )
- Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction
- Fuchun Guo and Willy Susilo and Yi Mu and Rongmao Chen and Jianchang Lai and Guomin Yang
-
2016/871 ( PDF )
- Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions
- Xavier Boyen and Christopher Carr and Thomas Haines
-
2016/870 ( PDF )
- Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds
- Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
-
2016/869 ( PDF )
- Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials
- Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr
-
2016/868 ( PDF )
- Selective-Opening Security in the Presence of Randomness Failures
- Viet Tung Hoang and Jonathan Katz and Adam O’Neill and Mohammad Zaheri
-
2016/867 ( PDF )
- A survey on physiological-signal-based security for medical devices
- Eduard Marin and Enrique Argones Rúa and Dave Singelée and Bart Preneel
-
2016/866 ( PDF )
- A Shuffle Argument Secure in the Generic Model
- Prastudy Fauzi and Helger Lipmaa and Michał Zając
-
2016/865 ( PDF )
- Reverse Cycle Walking and Its Applications
- Sarah Miracle and Scott Yilek
-
2016/864 ( PDF )
- Salvaging Weak Security Bounds for Blockcipher-Based Constructions
- Thomas Shrimpton and R. Seth Terashima
-
2016/863 ( PDF )
- More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22
- Shuangyi Zhu and Yuan Ma and Jingqiang Lin and Jia Zhuang and Jiwu Jing
-
2016/862 ( -- withdrawn -- )
- Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof
- Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan
-
2016/861 ( PDF )
- Secure Stable Matching at Scale
- Jack Doerner and David Evans and abhi shelat
-
2016/860 ( PDF )
- Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
- Junqing Gong and Xiaolei Dong and Jie Chen and Zhenfu Cao
-
2016/859 ( PDF )
- On the Security of Supersingular Isogeny Cryptosystems
- Steven D. Galbraith and Christophe Petit and Barak Shani and Yan Bo Ti
-
2016/858 ( PDF )
- A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
- Qian Guo and Thomas Johansson and Paul Stankovski
-
2016/857 ( PDF )
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Zejun Xiang and Wentao Zhang and Zhenzhen Bao and Dongdai Lin
-
2016/856 ( PDF )
- Spritz---a spongy RC4-like stream cipher and hash function.
- Ronald L. Rivest and Jacob C. N. Schuldt
-
2016/855 ( PDF )
- Combinatorial Repairability for Threshold Schemes
- Douglas R. Stinson and Ruizhong Wei
-
2016/854 ( PDF )
- Algebraic Security Analysis of Key Generation with Physical Unclonable Functions
- Matthias Hiller and Michael Pehl and Gerhard Kramer and Georg Sigl
-
2016/853 ( PDF )
- Stronger Security Variants of GCM-SIV
- Tetsu Iwata and Kazuhiko Minematsu
-
2016/852 ( PDF )
- Faster LLL-type Reduction of Lattice Bases
- Arnold Neumaier and Damien Stehle
-
2016/851 ( PDF )
- A New Algorithm for the Unbalanced Meet-in-the-Middle Problem
- Ivica Nikolic and Yu Sasaki
-
2016/850 ( PDF )
- Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy
- Conor Patrick and Bilgiday Yuce and Nahid Farhady Ghalaty and Patrick Schaumont
-
2016/849 ( PDF )
- Asymptotically Tight Bounds for Composing ORAM with PIR
- Ittai Abraham and Christopher W. Fletcher and Kartik Nayak and Benny Pinkas and Ling Ren
-
2016/848 ( PDF )
- From Weakly Selective to Selective Security in Compact Functional Encryption, Revisited
- Linfeng Zhou
-
2016/847 ( PDF )
- On the smallest ratio problem of lattice bases
- Jianwei Li
-
2016/846 ( PDF )
- Survey of Approaches for Security Verification of Hardware/Software Systems
- Onur Demir and Wenjie Xiong and Faisal Zaghloul and Jakub Szefer
-
2016/845 ( PDF )
- Selective Opening Security from Simulatable Data Encapsulation
- Felix Heuer and Bertram Poettering
-
2016/844 ( PDF )
- Secure and Efficient Construction of Broadcast Encryption with Dealership
- Kamalesh Acharya and Ratna Dutta
-
2016/843 ( PDF )
- Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Shuichi Katsumata and Shota Yamada
-
2016/842 ( PDF )
- Improved, Black-Box, Non-Malleable Encryption from Semantic Security
- Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee
-
2016/841 ( PDF )
- A Methodology for the Characterisation of Leakages in Combinatorial Logic
- Guido Bertoni and Marco Martinoli
-
2016/840 ( PDF )
- Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
- Melissa Chase and Mary Maller and Sarah Meiklejohn
-
2016/839 ( PDF )
- On the Division Property of SIMON48 and SIMON64
- Zejun Xiang and Wentao Zhang and Dongdai Lin
-
2016/838 ( PDF )
- Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things
- Masoumeh Safkhani and Nasour Bagheri
-
2016/837 ( PDF )
- Fully Homomorphic Encryption over the Integers Revisited
- Jung Hee Cheon and Damien Stehle
-
2016/836 ( PDF )
- The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem
- H. Gopalakrishna Gadiyar and R. Padma
-
2016/835 ( PDF )
- Lightweight Diffusion Layer: Importance of Toeplitz Matrices
- Sumanta Sarkar and Habeeb Syed
-
2016/834 ( PDF )
- A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism
- Russell W. F. Lai and Raymond K. H. Tai and Harry W. H. Wong and Sherman S. M. Chow
-
2016/833 ( PDF )
- Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
- Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide Yamamoto
-
2016/832 ( PDF )
- Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
- Colin Chaigneau and Henri Gilbert
-
2016/831 ( PDF )
- Reducing the Number of Non-linear Multiplications in Masking Schemes
- Jürgen Pulkus and Srinivas Vivek
-
2016/830 ( PDF )
- IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality
- Ian Miers and Payman Mohassel
-
2016/829 ( PDF )
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
- Shuai Han and Shengli Liu and Lin Lyu
-
2016/828 ( PDF )
- Faster Key Recovery Attack on Round-Reduced PRINCE
- Shahram Rasoolzadeh and Håvard Raddum
-
2016/827 ( PDF )
- Security Analysis of BLAKE2's Modes of Operation
- Atul Luykx and Bart Mennink and Samuel Neves
-
2016/826 ( PDF )
- Rotational Cryptanalysis in the Presence of Constants
- Tomer Ashur and Yunwen Liu
-
2016/825 ( PDF )
- Revisiting Cascade Ciphers in Indifferentiability Setting
- Chun Guo and Dongdai Lin and Meicheng Liu
-
2016/824 ( PDF )
- P2P Mixing and Unlinkable Bitcoin Transactions
- Tim Ruffing and Pedro Moreno-Sanchez and Aniket Kate
-
2016/823 ( PDF )
- Post-Quantum Attribute-Based Signatures from Lattice Assumptions
- Rachid El Bansarkhani and Ali El Kaafarani
-
2016/822 ( PDF )
- A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo and Akbar Majidi
-
2016/821 ( PDF )
- Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials
- Duggirala Meher Krishna and Duggirala Ravi
-
2016/820 ( PDF )
- Separating Computational and Statistical Differential Privacy in the Client-Server Model
- Mark Bun and Yi-Hsiu Chen and Salil Vadhan
-
2016/819 ( PDF )
- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
- Shashank Agrawal and Manoj Prabhakaran and Ching-Hua Yu
-
2016/818 ( PDF )
- Composable Adaptive Secure Protocols without Setup under Polytime Assumptions
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2016/817 ( PDF )
- Secure Obfuscation in a Weak Multilinear Map Model
- Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry
-
2016/816 ( PDF )
- Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
- Mark Bun and Thomas Steinke
-
2016/815 ( PDF )
- Secure Multiparty RAM Computation in Constant Rounds
- Sanjam Garg and Divya Gupta and Peihan Miao and Omkant Pandey
-
2016/814 ( PDF )
- Adaptive Security of Yao's Garbled Circuits
- Zahra Jafargholi and Daniel Wichs
-
2016/813 ( PDF )
- Fast Pseudorandom Functions Based on Expander Graphs
- Benny Applebaum and Pavel Raykov
-
2016/812 ( PDF )
- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
- Dana Dachman-Soled
-
2016/811 ( PDF )
- MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers
- Ling Sun and Wei Wang and Meiqin Wang
-
2016/810 ( PDF )
- Fault Injection using Crowbars on Embedded Systems
- Colin O'Flynn
-
2016/809 ( PDF )
- Binary AMD Circuits from Secure Multiparty Computation
- Daniel Genkin; Yuval Ishai; Mor Weiss
-
2016/808 ( PDF )
- Simulating Auxiliary Inputs, Revisited
- Maciej Skorski
-
2016/807 ( PDF )
- Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016
- Hyunjin Ahn, Dong-Guk Han
-
2016/806 ( PDF )
- Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack
- Mohammad Hadi Valizadeh
-
2016/805 ( PDF )
- Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
- Carmit Hazay and Avishay Yanai
-
2016/804 ( PDF )
- Multi-Key Homomorphic Authenticators
- Dario Fiore and Aikaterini Mitrokotsa and Luca Nizzardo and Elena Pagnin
-
2016/803 ( PDF )
- Biometric Based Network Security Using MIPS Cryptography Processor
- Kirat Pal Singh
-
2016/802 ( -- withdrawn -- )
- Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated
- Hung Dang and Erick Purwanto and Ee-Chien Chang
-
2016/801 ( PDF )
- Blind Web Search: How far are we from a privacy preserving search engine?
- Gizem S. Çetin and Wei Dai and Yarkın Doröz and William J. Martin and Berk Sunar
-
2016/800 ( PDF )
- Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
- Bar Alon and Eran Omri
-
2016/799 ( PDF )
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection
- Vladimir Kolesnikov and Ranjit Kumaresan and Mike Rosulek and Ni Trieu
-
2016/798 ( PDF )
- On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
- Karthikeyan Bhargavan and Gaëtan Leurent
-
2016/797 ( PDF )
- An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market
- Aysajan Abidin and Abdelrahaman Aly and Sara Cleemput and Mustafa A. Mustafa
-
2016/796 ( PDF )
- Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings
- Vadim Lyubashevsky
-
2016/795 ( PDF )
- Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings
- Huijia Lin and Vinod Vaikuntanathan
-
2016/794 ( PDF )
- Message-recovery attacks on Feistel-based Format Preserving Encryption
- Mihir Bellare and Viet Tung Hoang and Stefano Tessaro
-
2016/793 ( PDF )
- Side-Channel Analysis of Keymill
- Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Florian Mendel
-
2016/792 ( PDF )
- Key-Homomorphic Signatures and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge
- David Derler and Daniel Slamanig
-
2016/791 ( PDF )
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Ilan Komargodski
-
2016/790 ( PDF )
- Conditional Cube Attack on Reduced-Round Keccak Sponge Function
- Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao
-
2016/789 ( PDF )
- An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm
- Kirat Pal Singh, Shiwani Dod
-
2016/788 ( PDF )
- On the security of Cubic UOV and its variants
- Yasufumi Hashimoto
-
2016/787 ( PDF )
- On the security of new vinegar-like variant of multivariate signature scheme
- Yasufumi Hashimoto
-
2016/786 ( PDF )
- What Else is Revealed by Order-Revealing Encryption?
- F. Betül Durak and Thomas M. DuBuisson and David Cash
-
2016/785 ( PDF )
- Optimization of Bootstrapping in Circuits
- Fabrice Benhamouda and Tancrède Lepoint and Claire Mathieu and Hang Zhou
-
2016/784 ( PDF )
- Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2016/783 ( PDF )
- On the Memory-Hardness of Data-Independent Password-Hashing Functions
- Joël Alwen and Peter Gaži and Chethan Kamath and Karen Klein and Georg Osang and Krzysztof Pietrzak and Leonid Reyzin and Michal Rolínek and Michal Rybár
-
2016/782 ( PDF )
- Challenges for Ring-LWE
- Eric Crockett and Chris Peikert
-
2016/781 ( PDF )
- Privately Matching $k$-mers
- Justin Bedő and Thomas Conway and Kim Ramchen and Vanessa Teague
-
2016/780 ( PDF )
- Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
- Mohammmad Hassan Ameri and Javad Mohajeri and Mahmoud Salmasizadeh
-
2016/779 ( PDF )
- Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction
- Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2016/778 ( PDF )
- Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning
- Sumit Chakraborty
-
2016/777 ( PDF )
- Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers
- Ping Ngai Chung and Craig Costello and Benjamin Smith
-
2016/776 ( PDF )
- Homomorphic Tallying for the Estonian Internet Voting System
- Arnis Parsovs
-
2016/775 ( PDF )
- Cryptanalysis of a Homomorphic Encryption Scheme
- Sonia Bogos and John Gaspoz and Serge Vaudenay
-
2016/774 ( PDF )
- TV-PUF : A Fast Lightweight Aging-Resistant Threshold Voltage PUF
- Tanujay Saha and Vikash Sehwag
-
2016/773 ( PDF )
- Alternative Implementations of Secure Real Numbers
- Vassil Dimitrov and Liisi Kerik and Toomas Krips and Jaak Randmets and Jan Willemson
-
2016/772 ( PDF )
- Time-Frequency Analysis for Second-Order Attacks
- Pierre BELGARRIC and Shivam BHASIN and Nicolas BRUNEAU and Jean-Luc DANGER and Nicolas DEBANDE and Sylvain GUILLEY and Annelie HEUSER and Zakaria NAJM and Olivier RIOUL
-
2016/771 ( PDF )
- How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
- David Bernhard and Olivier Pereira and Bogdan Warinschi
-
2016/770 ( PDF )
- KangarooTwelve: fast hashing based on Keccak-p
- Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
-
2016/769 ( PDF )
- Low-temperature data remanence attacks against intrinsic SRAM PUFs
- Nikolaos Athanasios Anagnostopoulos and Stefan Katzenbeisser and Markus Rosenstihl and André Schaller and Sebastian Gabmeyer and Tolga Arul
-
2016/768 ( PDF )
- High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
- Toshinori Araki and Jun Furukawa and Yehuda Lindell and Ariel Nof and Kazuma Ohara
-
2016/767 ( PDF )
- A conjecture about Gauss sums and bentness of binomial Boolean functions
- Jean-Pierre Flori
-
2016/766 ( PDF )
- Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions
- Benoît Libert and Somindu C. Ramanna and Moti Yung
-
2016/765 ( PDF )
- Cryptographic Voting — A Gentle Introduction
- David Bernhard and Bogdan Warinschi
-
2016/764 ( PDF )
- ANOTEL: Cellular Networks with Location Privacy (Extended Version)
- Tim Dittler and Florian Tschorsch and Stefan Dietzel and Björn Scheuermann
-
2016/763 ( PDF )
- Human Public-Key Encryption
- Houda Ferradi and Rémi Géraud and David Naccache
-
2016/762 ( PDF )
- Faster Secure Two-Party Computation in the Single-Execution Setting
- Xiao Wang and Alex J. Malozemoff and Jonathan Katz
-
2016/761 ( PDF )
- Two-party authenticated key exchange protocol using lattice-based cryptography
- Xiaopeng Yang and Wenping Ma
-
2016/760 ( PDF )
- Simultaneous Secrecy and Reliability Amplification for a General Channel Model
- Russell Impagliazzo; Ragesh Jaiswal; Valentine Kabanets; Bruce M. Kapron; Valerie King; Stefano Tessaro
-
2016/759 ( PDF )
- Towards Practical Attacks on Argon2i and Balloon Hashing
- Joël Alwen and Jeremiah Blocki
-
2016/758 ( PDF )
- A new hope on ARM Cortex-M
- Erdem Alkim and Philipp Jakubeit and Peter Schwabe
-
2016/757 ( PDF )
- Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends
- Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton Andrade
-
2016/756 ( PDF )
- Adapting Helios for provable ballot privacy
- David Bernhard and Véronique Cortier and Olivier Pereira and Ben Smyth and Bogdan Warinschi
-
2016/755 ( PDF )
- Auditable Data Structures
- Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia
-
2016/754 ( PDF )
- Practical Key Recovery Attack on MANTIS-5
- Christoph Dobraunig and Maria Eichlseder and Daniel Kales and Florian Mendel
-
2016/753 ( PDF )
- Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices
- Shi Bai and Damien Stehle and Weiqiang Wen
-
2016/752 ( PDF )
- ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security
- Adnan Baysal and Ünal Kocabaş
-
2016/751 ( PDF )
- Feistel Like Construction of Involutory Binary Matrices With High Branch Number
- Adnan Baysal and Mustafa Çoban and Mehmet Özen
-
2016/750 ( PDF )
- Public-Key Based Lightweight Swarm Authentication
- Simon Cogliani and Bao Feng and Houda Ferradi and Rémi Géraud and Diana Maimut and David Naccache and Rodrigo Portella do Canto and Guilin Wang
-
2016/749 ( PDF )
- Revocable Hierarchical Identity-Based Encryption with Adaptive Security
- Kwangsu Lee
-
2016/748 ( PDF )
- A Generic Dynamic Provable Data Possession Framework
- Mohammad Etemad and Alptekin Küpçü
-
2016/747 ( PDF )
- Beyond Bitcoin -- Part II: Blockchain-based systems without mining
- Pasquale Forte and Diego Romano and Giovanni Schmid
-
2016/746 ( PDF )
- Improved Private Set Intersection against Malicious Adversaries
- Peter Rindal and Mike Rosulek
-
2016/745 ( PDF )
- Novel differentially private mechanisms for graphs
- Solenn Brunet and Sébastien Canard and Sébastien Gambs and Baptiste Olivier
-
2016/744 ( PDF )
- A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity
- Xi Chen, Longjiang Qu, Chao Li and Jiao Du
-
2016/743 ( PDF )
- Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
- Md Iftekhar Salam and Harry Bartlett and Ed Dawson and Josef Pieprzyk and Leonie Simpson and Kenneth Koon-Ho Wong
-
2016/742 ( PDF )
- LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
- Johannes Braun and Johannes Buchmann and Denise Demirel and Mikio Fujiwara and Matthias Geihs and Shiho Moriai and Masahide Sasaki and Atsushi Waseda
-
2016/741 ( PDF )
- MARKOV MODELING OF MOVING TARGET DEFENSE GAMES
- Hoda Maleki and Saeed Valizadeh and William Koch and Azer Bestavros and Marten van Dijk
-
2016/740 ( PDF )
- Software Benchmarking of the 2$^{\text{nd}}$ round CAESAR Candidates
- Ankele, Ralph and Ankele, Robin
-
2016/739 ( PDF )
- Unconditionally Secure Signatures
- Ryan Amiri and Aysajan Abidin and Petros Wallden and Erika Andersson
-
2016/738 ( PDF )
- FHPKE with Zero Norm Noises based on DLA&CDH
- Masahiro Yagisawa
-
2016/737 ( PDF )
- Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques
- Edgar González and Guillermo Morales-Luna and Feliú D. Sagols
-
2016/736 ( PDF )
- Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation
- Martine De Cock and Rafael Dowsley and Caleb Horst and Raj Katti and Anderson C. A. Nascimento and Stacey C. Newman and Wing-Sea Poon
-
2016/735 ( PDF )
- Efficient Robust Secret Sharing from Expander Graphs
- Brett Hemenway and Rafail Ostrovsky
-
2016/734 ( PDF )
- Efficient Oblivious Transfer Protocols based on White-Box Cryptography
- Aram Jivanyan and Gurgen Khachatryan and Andriy Oliynyk and Mykola Raievskyi
-
2016/733 ( PDF )
- Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates
- Thomas Wunderer
-
2016/732 ( PDF )
- Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64
- Yosuke Todo and Gregor Leander and Yu Sasaki
-
2016/731 ( PDF )
- SRMAP and ISLAP Authentication Protocols: Attacks and Improvements
- Mohammad Mardani Shahrbabak and Shahab Abdolmaleky
-
2016/730 ( PDF )
- Leakage-Resilient Public-Key Encryption from Obfuscation
- Dana Dachman-Soled and S. Dov Gordon and Feng-Hao Liu and Adam O’Neill and Hong-Sheng Zhou
-
2016/729 ( PDF )
- Attacks on cMix - Some Small Overlooked Details
- Herman Galteland and Stig F. Mjølsnes and Ruxandra F. Olimid
-
2016/728 ( PDF )
- Sophos - Forward Secure Searchable Encryption
- Raphael Bost
-
2016/727 ( PDF )
- Improvements on the Individual Logarithm Step in Extended Tower Number Field Sieve
- Yuqing Zhu and Jincheng Zhuang and Chang Lv and Dongdai Lin
-
2016/726 ( PDF )
- Local Bounds for the Optimal Information Ratio of Secret Sharing Schemes
- Oriol Farràs and Jordi Ribes-González and Sara Ricci
-
2016/725 ( PDF )
- Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA
- Mustafa Khairallah and Maged Ghoneima
-
2016/724 ( PDF )
- SPORT: Sharing Proofs of Retrievability across Tenants
- Frederik Armknecht and Jens-Matthias Bohli and David Froelicher and Ghassan O. Karame
-
2016/723 ( PDF )
- Robust Multi-Property Combiners for Hash Functions
- Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak
-
2016/722 ( PDF )
- Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512
- Li Lin and Wenling Wu
-
2016/721 ( PDF )
- Strong Hardness of Privacy from Weak Traitor Tracing
- Lucas Kowalczyk and Tal Malkin and Jonathan Ullman and Mark Zhandry
-
2016/720 ( PDF )
- A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption
- Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee
-
2016/719 ( PDF )
- Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
- Tobias Schneider and Amir Moradi and François-Xavier Standaert and Tim Güneysu
-
2016/718 ( PDF )
- Leakage-Abuse Attacks Against Searchable Encryption
- David Cash and Paul Grubbs and Jason Perry and Thomas Ristenpart
-
2016/717 ( PDF )
- Comparison between Subfield and Straightforward Attacks on NTRU
- Paul Kirchner and Pierre-Alain Fouque
-
2016/716 ( PDF )
- 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
- Tuyet Duong and Lei Fan and Hong-Sheng Zhou
-
2016/715 ( PDF )
- Uniform First-Order Threshold Implementations
- Tim Beyne and Begül Bilgin
-
2016/714 ( PDF )
- All the AES You Need on Cortex-M3 and M4
- Peter Schwabe and Ko Stoffelen
-
2016/713 ( PDF )
- Tuple lattice sieving
- Shi Bai and Thijs Laarhoven and Damien Stehle
-
2016/712 ( PDF )
- A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems
- Basel Halak and Said Subhan Waizi and Asad Islam
-
2016/711 ( PDF )
- A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
- Hugo Krawczyk
-
2016/710 ( PDF )
- Keymill: Side-Channel Resilient Key Generator
- Mostafa Taha, Arash Reyhani-Masoleh and Patrick Schaumont
-
2016/709 ( PDF )
- Differential Fault Analysis of SHA3-224 and SHA3-256
- Pei Luo and Yunsi Fei and Liwei Zhang and A. Adam Ding
-
2016/708 ( PDF )
- From 5-pass MQ-based identification to MQ-based signatures
- Ming-Shing Chen and Andreas Hülsing and Joost Rijneveld and Simona Samardjiska and Peter Schwabe
-
2016/707 ( PDF )
- Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher
- Dana Dachman-Soled and Angela Park and Ben San Nicolas
-
2016/706 ( PDF )
- Memory Erasability Amplification
- Jan Camenisch, Robert R. Enderlein, and Ueli Maurer
-
2016/705 ( -- withdrawn -- )
- New construction of single cycle T-function families
- Shiyi ZHANG and Yongjuan WANG and Guangpu GAO
-
2016/704 ( PDF )
- High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem
- Nicolas T. Courtois
-
2016/703 ( PDF )
- (In-)Secure messaging with the Silent Circle instant messaging protocol
- Sebastian R. Verschoor and Tanja Lange
-
2016/702 ( PDF )
- Mirror Theory and Cryptography
- Jacques Patarin
-
2016/701 ( PDF )
- Bolt: Anonymous Payment Channels for Decentralized Currencies
- Matthew Green and Ian Miers
-
2016/700 ( PDF )
- Side-Channel Protections for Cryptographic Instruction Set Extensions
- Sami Saab, Pankaj Rohatgi, and Craig Hampel
-
2016/699 ( PDF )
- A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
- Zhengjun Cao and Lihua Liu
-
2016/698 ( PDF )
- A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
- Zhengjun Cao and Lihua Liu
-
2016/697 ( PDF )
- Ciphertext Forgery on HANUMAN
- Damian Vizár
-
2016/696 ( PDF )
- Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
- Süleyman Kardaş and Mehmet Sabır Kiraz
-
2016/695 ( PDF )
- Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation
- Ivan Damgård and Jesper Buus Nielsen and Michael Nielsen and Samuel Ranellucci
-
2016/694 ( PDF )
- Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials
- Yin Li and Xingpo Ma and Yu Zhang and Chuanda Qi
-
2016/693 ( PDF )
- Identity-Based Key Aggregate Cryptosystem from Multilinear Maps
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2016/692 ( PDF )
- Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
- Jiguo Li, Hong Yuan and Yichen Zhang
-
2016/691 ( PDF )
- Targeted Homomorphic Attribute Based Encryption
- Zvika Brakerski and David Cash and Rotem Tsabary and Hoeteck Wee
-
2016/690 ( PDF )
- When Are Three Voters Enough for Privacy Properties?
- Myrto Arapinis and Véronique Cortier and Steve Kremer
-
2016/689 ( PDF )
- New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations
- Tingting Cui and Keting Jia and Kai Fu and Shiyao Chen and Meiqin Wang
-
2016/688 ( PDF )
- Bounded KDM Security from iO and OWF
- Antonio Marcedone and Rafael Pass and abhi shelat
-
2016/686 ( PDF )
- The Lightest 4x4 MDS Matrices over GL(4, $\mathbb{F}_2$)
- Ting Li and Jian Bai and Yao sun and Dingkang Wang and Dongdai Lin
-
2016/685 ( PDF )
- Overlaying Circuit Clauses for Secure Computation
- W. Sean Kennedy and Vladimir Kolesnikov and Gordon Wilfong
-
2016/683 ( PDF )
- Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs
- Rasmus Dahlberg and Tobias Pulls and Roel Peeters
-
2016/682 ( PDF )
- Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations
- Steven D. Galbraith, Joel Laity and Barak Shani
-
2016/681 ( PDF )
- Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack
- Ronald Cramer, Ivan Damgard, Chaoping Xing, Chen Yuan
-
2016/676 ( PDF )
- Cryptanalysis of Reduced-Round Midori64 Block Cipher
- Xiaoyang Dong and Yanzhao Shen
-
2016/675 ( PDF )
- Accelerating Homomorphic Computations on Rational Numbers
- Angela Jäschke and Frederik Armknecht
-
2016/672 ( -- withdrawn -- )
- Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves
- Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
-
2016/670 ( PDF )
- DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities
- Siamak F. Shahandashti and Feng Hao
-
2016/669 ( PDF )
- NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on ARM
- Brian Koziel, Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani and David Jao
-
2016/666 ( PDF )
- Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity
- WeiGuo Zhang and LuYang Li and Enes Pasalic
-
2016/663 ( PDF )
- Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
- Jan Camenisch and Manu Drijvers and Anja Lehmann
-
2016/660 ( PDF )
- The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
- Christof Beierle and Jérémy Jean and Stefan Kölbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim
-
2016/659 ( PDF )
- Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE
- Joppe Bos and Craig Costello and Léo Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila
-
2016/658 ( PDF )
- Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
- Kevin Atighehchi and Alexis Bonnecaze
-
2016/655 ( PDF )
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
- Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au
-
2016/654 ( PDF )
- Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks
- Shweta Agrawal
-
2016/651 ( PDF )
- Pen and Paper Arguments for SIMON and SIMON-like Designs
- Christof Beierle
-
2016/649 ( PDF )
- Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
- Behzad Abdolmaleki and Karim Baghery and Shahram Khazaei and Mohammad Reza Aref
-
2016/646 ( PDF )
- Computational integrity with a public random string from quasi-linear PCPs
- Eli Ben-Sasson and Iddo Ben-Tov and Alessandro Chiesa and Ariel Gabizon and Daniel Genkin and Matan Hamilis and Evgenya Pergament and Michael Riabzev and Mark Silberstein and Eran Tromer and Madars Virza
-
2016/645 ( PDF )
- FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors
- Patrick Longa
-
2016/644 ( PDF )
- How to Backdoor Diffie-Hellman
- David Wong
-
2016/643 ( PDF )
- On the Computational Overhead of MPC with Dishonest Majority
- Jesper Buus Nielsen and Samuel Ranellucci
-
2016/641 ( PDF )
- Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs
- Pawel Swierczynski and Georg T. Becker and Amir Moradi and Christof Paar
-
2016/636 ( PDF )
- Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
- Saikrishna Badrinarayanan and Dakshita Khurana and Rafail Ostrovsky and Ivan Visconti
-
2016/635 ( PDF )
- Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
- Florian Tramer and Fan Zhang and Huang Lin and Jean-Pierre Hubaux and Ari Juels and Elaine Shi
-
2016/633 ( PDF )
- Making Smart Contracts Smarter
- Loi Luu and Duc-Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor
-
2016/628 ( PDF )
- On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing
- Liliya R. Ahmetzyanova and Evgeny K. Alekseev and Igor B. Oshkin and Stanislav V. Smyshlyaev and Lolita A. Sonina
-
2016/622 ( PDF )
- Function-Revealing Encryption
- Marc Joye and Alain Passelègue
-
2016/621 ( PDF )
- 4-Round Concurrent Non-Malleable Commitments from One-Way Functions
- Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti
-
2016/620 ( PDF )
- Secure Data Exchange: A Marketplace in the Cloud
- Ran Gilad-Bachrach and Kim Laine and Kristin Lauter and Peter Rindal and Mike Rosulek
-
2016/619 ( PDF )
- 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
- Kevin Lewi and Alex J. Malozemoff and Daniel Apon and Brent Carmer and Adam Foltzer and Daniel Wagner and David W. Archer and Dan Boneh and Jonathan Katz and Mariana Raykova
-
2016/616 ( PDF )
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
- Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Victor Lomné and Florian Mendel
-
2016/614 ( PDF )
- Better Two-Round Adaptive Multi-Party Computation
- Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam
-
2016/613 ( PDF )
- A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
- Qian Ge and Yuval Yarom and David Cock and Gernot Heiser
-
2016/612 ( PDF )
- Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
- Kevin Lewi and David J. Wu
-
2016/610 ( PDF )
- The GGM Function Family is Weakly One-Way
- Aloni Cohen and Saleet Klein
-
2016/599 ( PDF )
- Obfuscation from Low Noise Multilinear Maps
- Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee
-
2016/597 ( PDF )
- Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version
- Margaux Dugardin; Sylvain Guilley; Jean-Luc Danger; Zakaria Najm; Olivier Rioul
-
2016/594 ( PDF )
- "Make Sure DSA Signing Exponentiations Really are Constant-Time''
- Cesar Pereida García and Billy Bob Brumley and Yuval Yarom
-
2016/592 ( PDF )
- Subspace Trail Cryptanalysis and its Applications to AES
- Lorenzo Grassi and Christian Rechberger and Sondre Rønjom
-
2016/585 ( PDF )
- Breaking the Circuit Size Barrier for Secure Computation Under DDH
- Elette Boyle; Niv Gilboa; Yuval Ishai
-
2016/578 ( PDF )
- Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security
- Viet Tung Hoang and Stefano Tessaro
-
2016/576 ( -- withdrawn -- )
- Indistinguishability Obfuscation Does Not Reduce to Structured Languages
- Gilad Asharov and Alon Rosen and Gil Segev
-
2016/575 ( PDF )
- TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub
- Ethan Heilman and Leen Alshenibr and Foteini Baldimtsi and Alessandra Scafuro and Sharon Goldberg
-
2016/574 ( PDF )
- Structure vs Hardness through the Obfuscation Lens
- Nir Bitansky and Akshay Degwekar and Vinod Vaikuntanathan
-
2016/567 ( PDF )
- Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
- Takashi Yamakawa; Shota Yamada; Goichiro Hanaoka; Noboru Kunihiro
-
2016/564 ( PDF )
- The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
- Mihir Bellare and Bjoern Tackmann
-
2016/561 ( PDF )
- Compactness vs Collusion Resistance in Functional Encryption
- Baiyu Li and Daniele Micciancio
-
2016/558 ( PDF )
- From Cryptomania to Obfustopia through Secret-Key Functional Encryption
- Nir Bitansky and Ryo Nishimaki and Alain Passelègue and Daniel Wichs
-
2016/557 ( PDF )
- On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
- Dahmun Goudarzi and Matthieu Rivain
-
2016/553 ( -- withdrawn -- )
- Storage Efficient Substring Searchable Symmetric Encryption
- Iraklis Leontiadis and Ming Li
-
2016/549 ( PDF )
- Short and Adjustable Signatures
- Xiong Fan and Juan Garay and Payman Mohassel
-
2016/545 ( PDF )
- On Trees, Chains and Fast Transactions in the Blockchain
- Aggelos Kiayias and Giorgos Panagiotakos
-
2016/544 ( PDF )
- Efficient Secure Comparison Protocols
- Geoffroy Couteau
-
2016/543 ( PDF )
- ObliviSync: Practical Oblivious File Backup and Synchronization
- Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche
-
2016/542 ( PDF )
- MPC-Friendly Symmetric Key Primitives
- Lorenzo Grassi and Christian Rechberger and Dragos Rotaru and Peter Scholl and Nigel P. Smart
-
2016/541 ( PDF )
- Big-Key Symmetric Encryption: Resisting Key Exfiltration
- Mihir Bellare and Daniel Kane and Phillip Rogaway
-
2016/540 ( PDF )
- Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
- Alberto Battistello and Jean-Sebastien Coron and Emmanuel Prouff and Rina Zeitoun
-
2016/532 ( PDF )
- Cryptanalysis of GOST2
- Tomer Ashur and Achiya Bar-On and Orr Dunkelman
-
2016/530 ( PDF )
- Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption
- Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou
-
2016/529 ( PDF )
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
- Antonio Faonio and Daniele Venturi
-
2016/527 ( PDF )
- Secure Outsourcing of Circuit Manufacturing
- Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi
-
2016/526 ( PDF )
- Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree
- Taechan Kim and Jinhyuck Jeong
-
2016/524 ( PDF )
- Single-Key to Multi-Key Functional Encryption with Polynomial Loss
- Sanjam Garg and Akshayaram Srinivasan
-
2016/523 ( PDF )
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Jiang Zhang and Yu Chen and Zhenfeng Zhang
-
2016/518 ( PDF )
- Attribute-based Key Exchange with General Policies
- Vladimir Kolesnikov and Hugo Krawczyk and Yehuda Lindell and Alex J. Malozemoff and Tal Rabin
-
2016/517 ( PDF )
- ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab
- David McCann and Carolyn Whitnall and Elisabeth Oswald
-
2016/510 ( PDF )
- A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes
- Jean-Claude Bajard and Julien Eynard and Anwar Hasan and Vincent Zucca
-
2016/509 ( PDF )
- Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
- Xiaoyang Dong and Xiaoyun Wang
-
2016/508 ( PDF )
- Collapse-binding quantum commitments without random oracles
- Dominique Unruh
-
2016/505 ( PDF )
- MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
- Marcel Keller and Emmanuela Orsini and Peter Scholl
-
2016/504 ( PDF )
- Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography
- Patrick Longa and Michael Naehrig
-
2016/498 ( PDF )
- Towards Tightly Secure Short Signature and IBE
- Xavier Boyen and Qinyi Li
-
2016/495 ( PDF )
- Cross&Clean: Amortized Garbled Circuits with Constant Overhead
- Jesper Buus Nielsen and Claudio Orlandi
-
2016/493 ( PDF )
- Partition-Based Trapdoor Ciphers
- Arnaud Bannier and Nicolas Bodin and Eric Filiol
-
2016/492 ( PDF )
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Martin Albrecht and Lorenzo Grassi and Christian Rechberger and Arnab Roy and Tyge Tiessen
-
2016/488 ( PDF )
- Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE
- Husen Wang and Qiang Tang
-
2016/486 ( PDF )
- Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
- Hannes Gross and Stefan Mangard and Thomas Korak
-
2016/483 ( PDF )
- Proofs of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures
- Hiroaki Anada and Seiko Arita and Kouichi Sakurai
-
2016/482 ( PDF )
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
- Shashank Agrawal and David J. Wu
-
2016/481 ( PDF )
- Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
- Amir Moradi and Tobias Schneider
-
2016/480 ( PDF )
- Achieving Better Privacy for the 3GPP AKA Protocol
- Pierre-Alain Fouque and Cristina Onete and Benjamin Richard
-
2016/471 ( PDF )
- NTRU Modular Lattice Signature Scheme on CUDA GPUs
- Wei Dai and John Schanck and Berk Sunar and William Whyte and Zhenfei Zhang
-
2016/466 ( PDF )
- AnNotify: A Private Notification Service
- Ania Piotrowska and Jamie Hayes and Nethanel Gelernter and George Danezis and Amir Herzberg
-
2016/464 ( PDF )
- Beaver: A Decentralized Anonymous Marketplace with Secure Reputation
- Kyle Soska and Albert Kwon and Nicolas Christin and Srinivas Devadas
-
2016/463 ( PDF )
- Authenticated Encryption with Variable Stretch
- Reza Reyhanitabar and Serge Vaudenay and Damian Vizár
-
2016/459 ( PDF )
- Non-Interactive RAM and Batch NP Delegation from any PIR
- Zvika Brakerski and Justin Holmgren and Yael Kalai
-
2016/458 ( PDF )
- CompGC: Efficient Offline/Online Semi-honest Two-party Computation
- Adam Groce and Alex Ledger and Alex J. Malozemoff and Arkady Yerukhimovich
-
2016/457 ( PDF )
- Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption
- Wei Yuan
-
2016/454 ( PDF )
- Analysis of the Blockchain Protocol in Asynchronous Networks
- Rafael Pass and Lior Seeman and abhi shelat
-
2016/452 ( PDF )
- Secure Logging Schemes and Certificate Transparency
- Benjamin Dowling and Felix Günther and Udyani Herath and Douglas Stebila
-
2016/451 ( PDF )
- Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
- Wacław Banasik and Stefan Dziembowski and Daniel Malinowski
-
2016/446 ( -- withdrawn -- )
- Quantum key distribution with combined conjugate coding and information overloading
- Boris Skoric
-
2016/444 ( PDF )
- The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
- Roberto Avanzi
-
2016/443 ( PDF )
- Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography
- Simon Cogliani and Houda Ferradi and Rémi Géraud and David Naccache
-
2016/432 ( PDF )
- Two-Input Functional Encryption for Inner Products from Bilinear Maps
- Kwangsu Lee and Dong Hoon Lee
-
2016/431 ( PDF )
- Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme
- David Bernhard, Oksana Kulyk, Melanie Volkamer
-
2016/427 ( PDF )
- Privacy Preserving Network Analysis of Distributed Social Networks
- Varsha Bhat Kukkala and Jaspal Singh Saini and S.R.S. Iyengar
-
2016/425 ( PDF )
- Multi-Input Inner-Product Functional Encryption from Pairings
- Michel Abdalla and Romain Gay and Mariana Raykova and Hoeteck Wee
-
2016/421 ( PDF )
- Homomorphic Encryption for Arithmetic of Approximate Numbers
- Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song
-
2016/415 ( PDF )
- Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
- Nina Bindel and Johannes Buchmann and Juliane Krämer
-
2016/411 ( PDF )
- Polymorphic Encryption and Pseudonymisation for Personalised Healthcare
- Eric Verheul and Bart Jacobs and Carlo Meijer and Mireille Hildebrandt and Joeri de Ruiter
-
2016/410 ( PDF )
- Efficient Quantum-Resistant Trust Infrastructure based on HIMMO
- Oscar Garcia-Morchon and Sauvik Bhattacharya and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Maarten Bodlaender
-
2016/405 ( PDF )
- Multiple Differential Cryptanalysis: A Rigorous Analysis
- Subhabrata Samajder and Palash Sarkar
-
2016/404 ( PDF )
- A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
- Subhabrata Samajder and Palash Sarkar
-
2016/403 ( PDF )
- On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
- Sanjit Chatterjee and Alfred Menezes and Francisco Rodriguez-Henriquez
-
2016/400 ( PDF )
- Towards Secure Quadratic Voting
- Sunoo Park and Ronald L. Rivest
-
2016/393 ( PDF )
- De Bruijn Sequences, Adjacency Graphs and Cyclotomy
- Ming Li and Dongdai Lin
-
2016/390 ( PDF )
- Obfuscation without the Vulnerabilities of Multilinear Maps
- Sanjam Garg and Pratyay Mukherjee and Akshayaram Srinivasan
-
2016/382 ( PDF )
- Faster elliptic-curve discrete logarithms on FPGAs
- Daniel J. Bernstein and Susanne Engels and Tanja Lange and Ruben Niederhagen and Christof Paar and Peter Schwabe and Ralf Zimmermann
-
2016/375 ( PDF )
- Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
- Alon Rosen and Gil Segev and Ido Shahaf
-
2016/373 ( PDF )
- Adaptive partitioning
- Dennis Hofheinz
-
2016/372 ( PDF )
- NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
- Mihir Bellare and Georg Fuchsbauer and Alessandra Scafuro
-
2016/369 ( PDF )
- Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex
- Ronald Cramer and Chaoping Xing and Chen Yuan
-
2016/366 ( PDF )
- \(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers
- Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina
-
2016/361 ( PDF )
- Functional Encryption for Bounded Collusions, Revisited
- Shweta Agrawal and Alon Rosen
-
2016/360 ( PDF )
- Another Look at Tightness II: Practical Issues in Cryptography
- Sanjit Chatterjee and Neal Koblitz and Alfred Menezes and Palash Sarkar
-
2016/357 ( PDF )
- State Management for Hash-Based Signatures
- David McGrew and Panos Kampanakis and Scott Fluhrer and Stefan-Lukas Gazdag and Denis Butin and Johannes Buchmann
-
2016/356 ( PDF )
- More Efficient Constructions for Inner-Product Encryption
- Somindu C. Ramanna
-
2016/355 ( PDF )
- Fruit: Ultra-Lightweight Stream Cipher with Shorter Internal State
- Vahid Amin Ghafari, Honggang Hu, and Ying Chen
-
2016/351 ( PDF )
- How (Not) to Instantiate Ring-LWE
- Chris Peikert
-
2016/350 ( PDF )
- Probabilistic Termination and Composability of Cryptographic Protocols
- Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas
-
2016/348 ( PDF )
- A Note on Non-Perfect Secret Sharing
- Oriol Farràs and Sebastià Martín and Carles Padró
-
2016/341 ( PDF )
- Semantically Secure Anonymity: Foundations of Re-encryption
- Adam L. Young and Moti Yung
-
2016/339 ( PDF )
- Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
- Zvika Brakerski and Renen Perlman
-
2016/333 ( PDF )
- Proof of Space from Stacked Expanders
- Ling Ren and Srinivas Devadas
-
2016/321 ( PDF )
- Algebraic Decomposition for Probing Security
- Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
-
2016/317 ( PDF )
- Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
- Rishab Goyal and Venkata Koppula and Brent Waters
-
2016/315 ( PDF )
- Flattening NTRU for Evaluation Key Free Homomorphic Encryption
- Yarkın Doröz and Berk Sunar
-
2016/303 ( PDF )
- From Obfuscation to the Security of Fiat-Shamir for Proofs
- Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum
-
2016/301 ( PDF )
- Constrained Pseudorandom Functions for Unconstrained Inputs
- Apoorvaa Deshpande and Venkata Koppula and Brent Waters
-
2016/300 ( PDF )
- Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme
- Leon Groot Bruinderink and Andreas Hülsing and Tanja Lange and Yuval Yarom
-
2016/281 ( PDF )
- Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
- Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev
-
2016/278 ( PDF )
- Various Proxy Re-Encryption Schemes from Lattices
- Xiong Fan and Feng-Hao Liu
-
2016/276 ( PDF )
- Arithmetic coding and blinding countermeasures for lattice signatures
- Markku-Juhani O. Saarinen
-
2016/253 ( PDF )
- Run-time Accessible DRAM PUFs in Commodity Devices
- Wenjie Xiong and André Schaller and Nikolaos A. Anagnostopoulos and Muhammad Umair Saleem and Sebastian Gabmeyer and Stefan Katzenbeisser and Jakub Szefer
-
2016/250 ( PDF )
- Fixed Point Arithmetic in SHE Scheme
- A. Costache and N.P. Smart and S. Vivek and A. Waller
-
2016/249 ( PDF )
- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
- Amir Moradi and Tobias Schneider
-
2016/247 ( -- withdrawn -- )
- Public Veriable Function Secret Sharing
- Wang Qiang and Zhou Fucai and Chen Chunyu and Li Fuxiang and Xu Zifeng
-
2016/244 ( PDF )
- Cryptanalysis of Simpira v1
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2016/234 ( PDF )
- Trick or Tweak: On the (In)security of OTR’s Tweaks
- Raphael Bost and Olivier Sanders
-
2016/233 ( PDF )
- Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE and Threshold-IBE
- Charanjit S. Jutla and Arnab Roy
-
2016/230 ( PDF )
- ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
- Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer and Yuval Yarom
-
2016/228 ( PDF )
- On a decentralized trustless pseudo-random number generation algorithm
- Serguei Popov
-
2016/223 ( PDF )
- Still Wrong Use of Pairings in Cryptography
- Mehmet Sabır Kiraz and Osmanbey Uzunkol
-
2016/221 ( PDF )
- On Post-Compromise Security
- Katriel Cohn-Gordon and Cas Cremers and Luke Garratt
-
2016/213 ( PDF )
- 3-Message Zero Knowledge Against Human Ignorance
- Nir Bitansky and Zvika Brakerski and Yael Kalai and Omer Paneth and Vinod Vaikuntanathan
-
2016/209 ( PDF )
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- Ling Song and Zhangjie Huang and Qianqian Yang
-
2016/208 ( PDF )
- Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions
- Sandro Coretti and Juan Garay and Martin Hirt and Vassilis Zikas
-
2016/207 ( PDF )
- Fault analysis and weak key-IV attack on Sprout
- Dibyendu Roy and Sourav Mukhopadhyay
-
2016/199 ( PDF )
- The Honey Badger of BFT Protocols
- Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song
-
2016/198 ( PDF )
- Optimizing S-box Implementations for Several Criteria using SAT Solvers
- Ko Stoffelen
-
2016/196 ( PDF )
- Multi-Key FHE from LWE, Revisited
- Chris Peikert and Sina Shiehian
-
2016/194 ( PDF )
- How to Share a Secret, Infinitely
- Ilan Komargodski and Moni Naor and Eylon Yogev
-
2016/189 ( PDF )
- Yao's millionaires' problem and public-key encryption without computational assumptions
- Dima Grigoriev and Laszlo B. Kish and Vladimir Shpilrain
-
2016/186 ( PDF )
- Lightweight MDS Generalized Circulant Matrices (Full Version)
- Meicheng Liu and Siang Meng Sim
-
2016/185 ( PDF )
- On the Influence of Message Length in PMAC's Security Bounds
- Atul Luykx and Bart Preneel and Alan Szepieniec and Kan Yasuda
-
2016/180 ( PDF )
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- Dennis Hofheinz and Tibor Jager and Andy Rupp
-
2016/175 ( PDF )
- Online/Offline OR Composition of Sigma Protocols
- Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
-
2016/168 ( PDF )
- Town Crier: An Authenticated Data Feed for Smart Contracts
- Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi
-
2016/166 ( PDF )
- Per-Session Security: Password-Based Cryptography Revisited
- Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
-
2016/165 ( -- withdrawn -- )
- PrAd: Enabling Privacy-Aware Location based Advertising
- Hung Dang and Ee-Chien Chang
-
2016/163 ( PDF )
- ZKBoo: Faster Zero-Knowledge for Boolean Circuits
- Irene Giacomelli and Jesper Madsen and Claudio Orlandi
-
2016/161 ( PDF )
- Revisiting Structure Graphs: Applications to CBC-MAC and EMAC
- Ashwin Jha and Mridul Nandi
-
2016/157 ( PDF )
- Key Derivation for Squared-Friendly Applications: Lower Bounds
- Maciej Skorski
-
2016/156 ( PDF )
- More Efficient Constant-Round Multi-Party Computation from BMR and SHE
- Yehuda Lindell and Nigel P. Smart and Eduardo Soria-Vazquez
-
2016/154 ( PDF )
- Fully-Anonymous Short Dynamic Group Signatures Without Encryption
- David Derler and Daniel Slamanig
-
2016/145 ( PDF )
- Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
- Jeremiah Blocki and Hong-Sheng Zhou
-
2016/137 ( PDF )
- Rate-1, Linear Time and Additively Homomorphic UC Commitments
- Ignacio Cascudo and Ivan Damgård and Bernardo David and Nico Döttling and Jesper Buus Nielsen
-
2016/134 ( PDF )
- More Practical and Secure History-Independent Hash Tables
- Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia
-
2016/132 ( PDF )
- Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
- Shahram Rasoolzadeh and Håvard Raddum
-
2016/128 ( PDF )
- Removing the Strong RSA Assumption from Arguments over the Integers
- Geoffroy Couteau and Thomas Peters and David Pointcheval
-
2016/125 ( PDF )
- Compact Identity Based Encryption from LWE
- Daniel Apon and Xiong Fan and Feng-Hao Liu
-
2016/123 ( PDF )
- Robust Password-Protected Secret Sharing
- Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval
-
2016/122 ( PDF )
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function
- Shay Gueron and Nicky Mouha
-
2016/121 ( -- withdrawn -- )
- Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
- Tibor Jager
-
2016/120 ( PDF )
- Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
- Ignacio Cascudo and Ivan Damgård and Felipe Lacerda and Samuel Ranellucci
-
2016/119 ( PDF )
- Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices
- Christof Beierle and Thorsten Kranz and Gregor Leander
-
2016/112 ( PDF )
- On the (In)security of SNARKs in the Presence of Oracles
- Dario Fiore and Anca Nitulescu
-
2016/111 ( PDF )
- Scalable and Secure Logistic Regression via Homomorphic Encryption
- Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
-
2016/108 ( PDF )
- An Efficient Toolkit for Computing Private Set Operations
- Alex Davidson and Carlos Cid
-
2016/106 ( PDF )
- Access Control Encryption: Enforcing Information Flow with Cryptography
- Ivan Damgård and Helene Haagh and Claudio Orlandi
-
2016/102 ( PDF )
- Breaking the Sub-Exponential Barrier in Obfustopia
- Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan and Mark Zhandry
-
2016/101 ( PDF )
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Benoit Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang
-
2016/098 ( PDF )
- Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications
- Stefan Kölbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger
-
2016/088 ( PDF )
- On Linear Hulls and Trails
- Tomer Ashur and Vincent Rijmen
-
2016/086 ( PDF )
- Intel SGX Explained
- Victor Costan and Srinivas Devadas
-
2016/081 ( PDF )
- A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
- Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
-
2016/080 ( PDF )
- Cryptanalysis of PRINCE with Minimal Data
- Shahram Rasoolzadeh and Håvard Raddum
-
2016/077 ( PDF )
- Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN
- Shahram Rasoolzadeh and Håvard Raddum
-
2016/054 ( PDF )
- Fully Homomorphic Public-Key Encryption with Two Ciphertexts based on Discrete Logarithm Problem
- Masahiro Yagisawa
-
2016/048 ( PDF )
- Better Preprocessing for Secure Multiparty Computation
- Carsten Baum and Ivan Damgård and Tomas Toft and Rasmus Zakarias
-
2016/046 ( PDF )
- How To Simulate It - A Tutorial on the Simulation Proof Technique
- Yehuda Lindell
-
2016/035 ( PDF )
- Rational Proofs of Space-Time
- Tal Moran and Ilan Orlov
-
2016/034 ( PDF )
- Universal Composition with Responsive Environments
- Jan Camenisch and Robert R. Enderlein and Stephan Krenn and Ralf Kuesters and Daniel Rausch
-
2016/030 ( PDF )
- An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
- Sedat Akleylek and Nina Bindel and Johannes Buchmann and Juliane Krämer and Giorgia Azzurra Marson
-
2016/027 ( PDF )
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
- Dan Boneh and Henry Corrigan-Gibbs and Stuart Schechter
-
2016/025 ( PDF )
- Human-readable Proof of the Related-Key Security of AES-128
- Khoongming Khoo and Eugene Lee and Thomas Peyrin and Siang Meng Sim
-
2015/1254 ( PDF )
- Identity-based Hierarchical Key-insulated Encryption without Random Oracles
- Yohei Watanabe and Junji Shikata
-
2015/1253 ( PDF )
- Non-Malleable Functions and Their Applications
- Yu Chen and Baodong Qin and Jiang Zhang and Yi Deng and Sherman S. M. Chow
-
2015/1248 ( PDF )
- Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
- Janaka Alawatugoda
-
2015/1247 ( PDF )
- Missing a trick: Karatsuba variations
- Mike Scott
-
2015/1240 ( -- withdrawn -- )
- Exploiting PUF Unreliability to Secure Wireless Sensing
- Yansong Gao, Hua Ma, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
-
2015/1230 ( PDF )
- Indistinguishable Proofs of Work or Knowledge
- Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
-
2015/1224 ( PDF )
- Twisted Polynomials and Forgery Attacks on GCM
- Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, and Elmar Tischhauser
-
2015/1221 ( -- withdrawn -- )
- Unclonable encryption revisited ($4 \times 2 = 8$)
- Boris Skoric
-
2015/1218 ( -- withdrawn -- )
- $Area-Time$ Efficient Hardware Implementation of Elliptic Curve Cryptosystem
- Anissa Sghaier and Medien Zeghid and Belgacem Bouallegue and Adel Baganne and Mohsen Machhout
-
2015/1214 ( PDF )
- Simple Security Definitions for and Constructions of 0-RTT Key Exchange
- Britta Hale and Tibor Jager and Sebastian Lauer and Jörg Schwenk
-
2015/1192 ( PDF )
- A Guide to Fully Homomorphic Encryption
- Frederik Armknecht and Colin Boyd and Christopher Carr and Kristian Gjøsteen and Angela Jäschke and Christian A. Reuter and Martin Strand
-
2015/1187 ( PDF )
- On an almost-universal hash function family with applications to authentication and secrecy codes
- Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and László Tóth
-
2015/1186 ( PDF )
- Restricted linear congruences
- Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and Roberto Tauraso and László Tóth
-
2015/1178 ( PDF )
- Textbook Non-Malleable Commitments
- Vipul Goyal and Omkant Pandey and Silas Richelson
-
2015/1168 ( -- withdrawn -- )
- SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains
- Loi Luu and Viswesh Narayanan and Kunal Baweja and Chaodong Zheng and Seth Gilbert and Prateek Saxena
-
2015/1167 ( PDF )
- Constraining Pseudorandom Functions Privately
- Dan Boneh and Kevin Lewi and David J. Wu
-
2015/1166 ( PDF )
- Ceremonies for End-to-End Verifiable Elections
- Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
-
2015/1162 ( PDF )
- The Moral Character of Cryptographic Work
- Phillip Rogaway
-
2015/1157 ( PDF )
- From Identification to Signatures, Tightly: A Framework and Generic Transforms
- Mihir Bellare and Bertram Poettering and Douglas Stebila
-
2015/1156 ( -- withdrawn -- )
- An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
- Dipanjan Das and Priyanka Bose and S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
-
2015/1152 ( PDF )
- Privacy-preserving Friendship-based Recommender Systems
- Qiang Tang and Jun Wang
-
2015/1150 ( PDF )
- From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
- Colin Boyd and Britta Hale and Stig Frode Mjølsnes and Douglas Stebila
-
2015/1147 ( -- withdrawn -- )
- Collusion Resistant Aggregation from Convertible Tags
- Iraklis Leontiadis and Ming Li
-
2015/1141 ( PDF )
- Amplifying Side Channels Through Performance Degradation
- Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom
-
2015/1134 ( PDF )
- $\Lambda \circ \lambda$: Functional Lattice Cryptography
- Eric Crockett and Chris Peikert
-
2015/1130 ( PDF )
- A Note on Perfect Correctness by Derandomization
- Nir Bitansky and Vinod Vaikuntanathan
-
2015/1128 ( PDF )
- New directions in nearest neighbor searching with applications to lattice sieving
- Anja Becker and Léo Ducas and Nicolas Gama and Thijs Laarhoven
-
2015/1127 ( PDF )
- Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups
- Mikhail Anokhin
-
2015/1125 ( PDF )
- Practical Order-Revealing Encryption with Limited Leakage
- Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu
-
2015/1106 ( PDF )
- POPE: Partial Order Preserving Encoding
- Daniel S. Roche and Daniel Apon and Seung Geol Choi and Arkady Yerukhimovich
-
2015/1099 ( PDF )
- Device-Enhanced Password Protocols with Optimal Online-Offline Protection
- Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena
-
2015/1093 ( PDF )
- C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs
- Ahmed Kosba and Zhichao Zhao and Andrew Miller and Yi Qian and Hubert Chan and Charalampos Papamanthou and Rafael Pass and abhi shelat and Elaine Shi
-
2015/1092 ( PDF )
- Post-quantum key exchange - a new hope
- Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe
-
2015/1082 ( PDF )
- Delegating RAM Computations with Adaptive Soundness and Privacy
- Prabhanjan Ananth and Yu-Chi Chen and Kai-Min Chung and Huijia Lin and Wei-Kai Lin
-
2015/1073 ( PDF )
- Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs
- David Derler and Daniel Slamanig
-
2015/1049 ( PDF )
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Thomas Peyrin and Yannick Seurin
-
2015/1046 ( PDF )
- From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
- Benny Applebaum and Pavel Raykov
-
2015/1039 ( PDF )
- Maturity and Performance of Programmable Secure Computation
- David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen
-
2015/1035 ( PDF )
- CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
- Britta Hale and Christopher Carr and Danilo Gligoroski
-
2015/1023 ( PDF )
- Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization
- Prabhanjan Ananth and Abhishek Jain and Amit Sahai
-
2015/1021 ( PDF )
- New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption
- Katsuyuki Takashima
-
2015/1019 ( PDF )
- Speed-Security Tradeoffs in Blockchain Protocols
- Aggelos Kiayias and Giorgos Panagiotakos
-
2015/1018 ( PDF )
- A Riddle Wrapped in an Enigma
- Neal Koblitz and Alfred Menezes
-
2015/1011 ( PDF )
- Hierarchical Functional Encryption
- Zvika Brakerski and Gil Segev
-
2015/997 ( PDF )
- Incremental Program Obfuscation
- Sanjam Garg and Omkant Pandey
-
2015/990 ( PDF )
- Encryption Switching Protocols
- Geoffroy Couteau and Thomas Peters and David Pointcheval
-
2015/972 ( PDF )
- Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
- David Pointcheval and Olivier Sanders and Jacques Traoré
-
2015/958 ( -- withdrawn -- )
- Building Single-Key Beyond Birthday Bound Message Authentication Code
- Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
-
2015/957 ( PDF )
- Delegating RAM Computations
- Yael Tauman Kalai and Omer Paneth
-
2015/956 ( PDF )
- Analysis of the Kupyna-256 Hash Function
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/955 ( PDF )
- On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
- Mridul Nandi and Tapas Pandit
-
2015/954 ( PDF )
- Online-Offline Homomorphic Signatures for Polynomial Functions
- Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
-
2015/952 ( PDF )
- Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
- Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
-
2015/946 ( PDF )
- Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem
- Alex Biryukov and Dmitry Khovratovich
-
2015/942 ( PDF )
- Secrecy and independence for election schemes
- Ben Smyth
-
2015/935 ( PDF )
- Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity
- Céline Blondeau and Kaisa Nyberg
-
2015/919 ( -- withdrawn -- )
- Privacy-preserving computation with trusted computing via Scramble-then-Compute
- Hung Dang and Anh Dinh and Ee-Chien Chang and Beng Chin Ooi
-
2015/914 ( PDF )
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
- Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
-
2015/887 ( PDF )
- Composable Security in the Tamper Proof Hardware Model under Minimal Complexity
- Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
-
2015/882 ( PDF )
- Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks
- Margaux Dugardin and Sylvain Guilley and Martin Moreau and Zakaria Najm and Pablo Rauzy
-
2015/859 ( PDF )
- Factor Base Discrete Logarithms in Kummer Extensions
- Dianyan Xiao and Jincheng Zhuang and Qi Cheng
-
2015/858 ( PDF )
- Skipping the $q$ in Group Signatures
- Olivier Blazy and Saqib A. Kakvi
-
2015/843 ( PDF )
- Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
- David Derler and Daniel Slamanig
-
2015/822 ( PDF )
- Efficiently Obfuscating Re-Encryption Program under DDH Assumption
- Akshayaram Srinivasan and C. Pandu Rangan
-
2015/808 ( PDF )
- Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
- Mihir Bellare and Joseph Jaeger and Daniel Kane
-
2015/806 ( PDF )
- Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers
- Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
-
2015/797 ( PDF )
- What Security Can We Achieve within 4 Rounds?
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2015/775 ( PDF )
- Efficient MDS Diffusion Layers Through Decomposition of Matrices
- S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo
-
2015/765 ( PDF )
- Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
- Victoria Fehr and Marc Fischlin
-
2015/755 ( PDF )
- Revisiting TESLA in the quantum random oracle model
- Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen and Edward Eaton and Gus Gutoski and Juliane Krämer and Filip Pawlega
-
2015/751 ( PDF )
- Fast Garbling of Circuits Under Standard Assumptions
- Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
-
2015/745 ( PDF )
- Faster ECC over F2571 (feat. PMULL)
- Hwajeong Seo
-
2015/740 ( PDF )
- Predictable Arguments of Knowledge
- Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
-
2015/739 ( -- withdrawn -- )
- Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
- Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang
-
2015/738 ( PDF )
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
- Kazuhiko Minematsu
-
2015/713 ( -- withdrawn -- )
- Light-hHB: A New Version of hHB with Improved Session Key Exchange
- Ka Ahmad Khoureich
-
2015/712 ( PDF )
- Adaptive Proofs have Straightline Extractors (in the Random Oracle Model)
- David Bernhard and Bogdan Warinschi and Ngoc Khanh Nguyen
-
2015/709 ( PDF )
- Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
- Luka Malisa and Kari Kostiainen and Srdjan Capkun
-
2015/706 ( PDF )
- A Brief Comparison of Simon and Simeck
- Stefan Kölbl and Arnab Roy
-
2015/701 ( PDF )
- Differentially private instance-based noise mechanisms in practice
- Sébastien Canard and Baptiste Olivier and Tony Quertier
-
2015/694 ( PDF )
- On the Complexity of Additively Homomorphic UC Commitments
- Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
-
2015/693 ( PDF )
- Foundations of Reactive Garbling Schemes
- Jesper Buus Nielsen and Samuel Ranellucci
-
2015/674 ( PDF )
- Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
- Roman Jagomägis and Peeter Laud and Alisa Pankova
-
2015/660 ( -- withdrawn -- )
- A Hybrid Gaussian Sampler for Lattices over Rings
- Léo Ducas and Thomas Prest
-
2015/639 ( -- withdrawn -- )
- Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings
- Hao Chen
-
2015/636 ( PDF )
- On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks
- Matthias Hamann and Matthias Krause
-
2015/634 ( PDF )
- Phasing: Private Set Intersection using Permutation-based Hashing
- Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner
-
2015/629 ( PDF )
- BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme
- Pyrros Chaidos and Véronique Cortier and Georg Fuchsbauer and David Galindo
-
2015/624 ( PDF )
- Automated Analysis and Synthesis of Authenticated Encryption Schemes
- Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff
-
2015/623 ( -- withdrawn -- )
- Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
- Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand
-
2015/608 ( PDF )
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- Shweta Agrawal and Benoit Libert and Damien Stehle
-
2015/565 ( PDF )
- FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
- Craig Costello and Patrick Longa
-
2015/564 ( PDF )
- Sanctum: Minimal Hardware Extensions for Strong Software Isolation
- Victor Costan and Ilia Lebedev and Srinivas Devadas
-
2015/531 ( PDF )
- Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
- Mohammad Hajiabadi, Bruce M. Kapron
-
2015/525 ( PDF )
- Short Randomizable Signatures
- David Pointcheval and Olivier Sanders
-
2015/506 ( PDF )
- Strong Non-Interference and Type-Directed Higher-Order Masking
- Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub and Rébecca Zucchini
-
2015/486 ( PDF )
- DECIM: Detecting Endpoint Compromise In Messaging
- Jiangshan Yu, Mark Ryan, and Cas Cremers
-
2015/485 ( PDF )
- Turning Online Ciphers Off
- Elena Andreeva and Guy Barwell and Ritam Bhaumik and Mridul Nandi and Dan Page and Martijn Stam
-
2015/483 ( PDF )
- Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
- Shi Bai and Adeline Langlois and Tancrède Lepoint and Amin Sakzad and Damien Stehle and Ron Steinfeld
-
2015/459 ( PDF )
- New Observation on Division Property
- Bing Sun and Xin Hai and Wenyu Zhang and Lei Cheng and Zhichao Yang
-
2015/455 ( PDF )
- Secure Deduplication of Encrypted Data without Additional Independent Servers
- Jian Liu and N.Asokan and Benny Pinkas
-
2015/413 ( PDF )
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- Shashank Agrawal and Melissa Chase
-
2015/407 ( PDF )
- Higher-Order Cryptanalysis of LowMC
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/375 ( PDF )
- Bounds on surmising remixed keys
- Daniel R. L. Brown
-
2015/353 ( PDF )
- Matrix Computational Assumptions in Multilinear Groups
- Paz Morillo and Carla Ràfols and Jorge L. Villar
-
2015/316 ( PDF )
- Non-malleability under Selective Opening Attacks: Implication and Separation
- Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen
-
2015/300 ( PDF )
- Scalable Divisible E-cash
- Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
-
2015/246 ( PDF )
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
- Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee
-
2015/243 ( PDF )
- Reliable communication via semilattice properties of partial knowledge
- Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
-
2015/233 ( PDF )
- Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
- Ben Smyth and Steven Frink and Michael R. Clarkson
-
2015/174 ( PDF )
- A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers
- Chenyang Tu and Lingchen Zhang and Neng Gao and Zeyi Liu and Yuan Ma and Zongbin Liu
-
2015/163 ( PDF )
- Indistinguishability Obfuscation from Functional Encryption
- Nir Bitansky and Vinod Vaikuntanathan
-
2015/150 ( PDF )
- Insynd: Improved Privacy-Preserving Transparency Logging
- Roel Peeters and Tobias Pulls
-
2015/136 ( PDF )
- Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs
- Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. L. M. Barreto
-
2015/129 ( PDF )
- Block-wise Non-Malleable Codes
- Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay
-
2015/126 ( PDF )
- Perfect Structure on the Edge of Chaos
- Nir Bitansky and Omer Paneth and Daniel Wichs
-
2015/121 ( PDF )
- Multi-Client Oblivious RAM secure against Malicious Servers
- Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
-
2015/073 ( PDF )
- Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
- Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin
-
2015/044 ( PDF )
- Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
- Binanda Sengupta and Abhijit Das
-
2015/040 ( PDF )
- Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
- Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2015/002 ( PDF )
- Characterization of MDS mappings
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2014/1026 ( PDF )
- Lattices with Symmetry
- H. W. Lenstra, Jr. and A. Silverberg
-
2014/1020 ( PDF )
- Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
-
2014/1004 ( PDF )
- CONIKS: Bringing Key Transparency to End Users
- Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
-
2014/989 ( PDF )
- Controlled Homomorphic Encryption: Definition and Construction
- Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti
-
2014/962 ( PDF )
- Solving Polynomial Systems with Noise over F_2: Revisited
- Zhenyu Huang and Dongdai Lin
-
2014/961 ( PDF )
- When are Fuzzy Extractors Possible?
- Benjamin Fuller and Leonid Reyzin and Adam Smith
-
2014/939 ( -- withdrawn -- )
- Security Analysis of an Authentication Scheme Using Smart Cards
- Gaurav Tiwari and Amit K. Awasthi and Neha Shukla
-
2014/913 ( PDF )
- Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model
- Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
-
2014/903 ( PDF )
- Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)
- Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos
-
2014/870 ( PDF )
- Dynamic Behavior of RS latches using FIB processing and probe connection
- Naoya Torii and Dai Yamamoto and Masahiko Takenaka and Tsutomu Matsumoto
-
2014/835 ( PDF )
- Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
- David Galindo and Johann Großschädl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek
-
2014/831 ( PDF )
- Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
- Jérémy Jean and Ivica Nikolić and Thomas Peyrin
-
2014/805 ( PDF )
- Dual-System Simulation-Soundness with Applications to UC-PAKE and More
- Charanjit S. Jutla and Arnab Roy
-
2014/793 ( PDF )
- Robust Authenticated-Encryption: AEZ and the Problem that it Solves
- Viet Tung Hoang and Ted Krovetz and Phillip Rogaway
-
2014/792 ( PDF )
- General Classification of the Authenticated Encryption Schemes for the CAESAR Competition
- Farzaneh abed and Christian Forler and Stefan Lucks
-
2014/767 ( PDF )
- Algebraic Attacks on Human Identification Protocols
- Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk
-
2014/765 ( PDF )
- The Bitcoin Backbone Protocol: Analysis and Applications
- Juan Garay and Aggelos Kiayias and Nikos Leonardos
-
2014/741 ( PDF )
- Eliminating Leakage in Reverse Fuzzy Extractors
- André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser
-
2014/733 ( PDF )
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann
-
2014/731 ( PDF )
- Secure modular password authentication for the web using channel bindings
- Mark Manulis and Douglas Stebila and Franziskus Kiefer and Nick Denham
-
2014/720 ( PDF )
- Adaptively Secure Constrained Pseudorandom Functions
- Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters
-
2014/704 ( PDF )
- A 128-bit Block Cipher Based on Three Group Arithmetics
- Shenghui Su and Shuwang Lü and Daqiang Dong
-
2014/672 ( PDF )
- Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
- Xiao Wang and Hubert Chan and Elaine Shi
-
2014/668 ( PDF )
- Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation
- Ran Cohen and Yehuda Lindell
-
2014/665 ( PDF )
- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
- Julien Bringer and Claude Carlet and Hervé Chabanne and Sylvain Guilley and Houssem Maghrebi
-
2014/631 ( PDF )
- Zipf’s Law in Passwords
- Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
-
2014/609 ( PDF )
- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/607 ( PDF )
- Adding Controllable Linkability to Pairing-Based Group Signatures For Free
- Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer
-
2014/605 ( PDF )
- On the Possibilities and Limitations of Computational Fuzzy Extractors
- Kenji Yasunaga and Kosuke Yuzawa
-
2014/599 ( PDF )
- Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
- Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila
-
2014/586 ( PDF )
- An Algebraic Approach to Non-Malleability
- Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald
-
2014/485 ( PDF )
- An Improved Truncated Differential Cryptanalysis of KLEIN
- Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref
-
2014/472 ( PDF )
- How to Watermark Cryptographic Functions
- Ryo Nishimaki
-
2014/409 ( PDF )
- Moments-Correlating DPA
- Amir Moradi and François-Xavier Standaert
-
2014/347 ( PDF )
- One-Way Functions and (Im)perfect Obfuscation
- Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev
-
2014/329 ( PDF )
- Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
- Berry Schoenmakers
-
2014/241 ( -- withdrawn -- )
- A New Way to Prevent UKS Attacks Using Trusted Computing
- Qianying Zhang and Shijun Zhao and Dengguo Feng
-
2014/230 ( PDF )
- Isogeny graphs with maximal real multiplication
- Sorina Ionica and Emmanuel Thomé
-
2014/220 ( PDF )
- Total Break of Zorro using Linear and Differential Attacks
- Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2014/132 ( PDF )
- Efficient Revocable Identity-Based Encryption via Subset Difference Methods
- Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park
-
2014/124 ( PDF )
- On the Information Ratio of Non-Perfect Secret Sharing Schemes
- Oriol Farràs and Torben Brandt Hansen and Tarik Kaced and Carles Padró
-
2014/075 ( PDF )
- Publicly Auditable Secure Multi-Party Computation
- Carsten Baum and Ivan Damgård and Claudio Orlandi
-
2014/033 ( PDF )
- Lattice-based Group Signature Scheme with Verier-local Revocation
- Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang
-
2013/845 ( PDF )
- How to Keep a Secret: Leakage Deterring Public-key Cryptography
- Aggelos Kiayias and Qiang Tang
-
2013/839 ( PDF )
- Lattice Decoding Attacks on Binary LWE
- Shi Bai and Steven D. Galbraith
-
2013/789 ( PDF )
- Proofs of Data Possession and Retrievability Based on MRD Codes
- Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu
-
2013/762 ( PDF )
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
- Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung
-
2013/752 ( PDF )
- On the Power of Rewinding Simulators in Functional Encryption
- Angelo De Caro and Vincenzo Iovino
-
2013/717 ( PDF )
- NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
-
2013/659 ( -- withdrawn -- )
- A provable secure anonymous proxy signature scheme without random oracles
- Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
-
2013/628 ( PDF )
- Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
- Kazuhiko Minematsu
-
2013/525 ( PDF )
- Catena: A Memory-Consuming Password-Scrambling Framework
- Christian Forler and Stefan Lucks and Jakob Wenzel
-
2013/515 ( PDF )
- When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
- Changyu Dong and Liqun Chen and Zikai Wen
-
2013/503 ( PDF )
- On secret sharing with nonlinear product reconstruction
- Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing
-
2013/394 ( PDF )
- A Public Key Cryptoscheme Using Bit-pair Shadows
- Shenghui Su and Shuwang Lü and Maozhi Xu and Tao Xie
-
2013/364 ( PDF )
- On the Achievability of Simulation-Based Security for Functional Encryption
- Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano
-
2013/351 ( PDF )
- Time-Optimal Interactive Proofs for Circuit Evaluation
- Justin Thaler
-
2013/327 ( PDF )
- A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
- Shenghui Su and Tao Xie and Shuwang Lü
-
2013/321 ( PDF )
- Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
- Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote
-
2013/275 ( PDF )
- The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
- Johannes Braun and Gregor Rynkowski
-
2013/274 ( -- withdrawn -- )
- A time series approach for profiling attack
- Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch
-
2013/269 ( PDF )
- CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
- Jonathan Trostle
-
2013/183 ( PDF )
- Practical Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2012/629 ( PDF )
- SCAPI: The Secure Computation Application Programming Interface
- Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell
-
2012/577 ( PDF )
- A Framework for Unique Ring Signatures
- Matthew Franklin and Haibin Zhang
-
2012/508 ( PDF )
- On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
- Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung
-
2012/154 ( -- withdrawn -- )
- The Joint Signature and Encryption Revisited
- Laila El Aimani
-
2012/068 ( -- withdrawn -- )
- Extended Security Arguments for (Ring) Signature Schemes
- Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, and Pierre-Louis Cayrel
-
2011/238 ( PDF )
- Attacks On a Double Length Blockcipher-based Hash Proposal
- Yiyuan Luo, Xuejia Lai
-
2011/230 ( PDF )
- All-But-Many Lossy Trapdoor Functions
- Dennis Hofheinz
-
2010/287 ( PDF )
- Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
- Jacques Patarin
-
2008/440 ( PDF )
- Robust Encryption
- Michel Abdalla and Mihir Bellare and Gregory Neven
-
2007/128 ( PDF )
- Computationally Sound Mechanized Proofs of Correspondence Assertions
- Bruno Blanchet
-
2000/039 ( PDF )
- Encryption Modes with Almost Free Message Integrity
- Charanjit S. Jutla
[ Cryptology ePrint archive ]