Cryptology ePrint Archive: Recent Updates

2017/674 ( PDF )
Transparent Memory Encryption and Authentication
Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard
2017/673 ( PDF )
Differential Fault Analysis Automation
Sayandeep Saha, and Ujjawal Kumar, and Debdeep Mukhopadhyay, and Pallab Dasgupta
2017/672 ( PDF )
Coding for interactive communication beyond threshold adversaries
Anat Paskin-Cherniavsky and Slava Radune
2017/671 ( PDF )
Guru: Universal Reputation Module for Distributed Consensus Protocols
Alex Biryukov and Daniel Feher and Dmitry Khovratovich
2017/670 ( PDF )
Private Set Intersection for Unequal Set Sizes with Mobile Applications
Ágnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas
2017/669 ( PDF )
Speeding up Elliptic Curve Scalar Multiplication without Precomputation
Kwang Ho Kim and Junyop Choe and Song Yun Kim and Namsu Kim and Sekung Hong
2017/668 ( PDF )
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
Sikhar Patranabis and Debdeep Mukhopadhyay
2017/667 ( PDF )
High-speed key encapsulation from NTRU
Andreas Hülsing and Joost Rijneveld and John Schanck and Peter Schwabe
2017/666 ( PDF )
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
Katriel Cohn-Gordon and Cas Cremers and Luke Garratt and Jon Millican and Kevin Milner
2017/665 ( PDF )
Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
Michael Raskin
2017/664 ( PDF )
Message Franking via Committing Authenticated Encryption
Paul Grubbs and Jiahui Lu and Thomas Ristenpart
2017/663 ( PDF )
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Thomas Unterluggauer and Mario Werner and Stefan Mangard
2017/662 ( PDF )
A new signature scheme based on (U|U+V) codes
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2017/661 ( PDF )
MuSE: Multimodal Searchable Encryption for Cloud Applications
Bernardo Ferreira and João Leitão and Henrique Domingos
2017/660 ( PDF )
Profiling Good Leakage Models For Masked Implementations
Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou
2017/659 ( PDF )
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
Russell W. F. Lai and Sherman S. M. Chow
2017/658 ( PDF )
Privacy for Targeted Advertising
Avradip Mandal and John Mitchell and Hart Montgomery and Arnab Roy
2017/657 ( PDF )
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Sanjit Chatterjee and Sayantan Mukherjee and Tapas Pandit
2017/656 ( PDF )
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
Lei Fan and Hong-Sheng Zhou
2017/655 ( PDF )
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
Jiao Hu and Ruilin Li and Chaojing Tang
2017/654 ( PDF )
A Secure and Private Billing Protocol for Smart Metering
Tom Eccles and Basel Halak
2017/653 ( PDF )
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
Fanbao Liu and Fengmei Liu
2017/652 ( PDF )
Pseudorandom Functions: Three Decades Later
Andrej Bogdanov and Alon Rosen
2017/651 ( -- withdrawn -- )
Rescuing LoRaWAN 1.0
Gildas Avoine and Loïc Ferreira
2017/650 ( PDF )
Efficient Public Trace and Revoke from Standard Assumptions
Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehle and Shota Yamada
2017/649 ( PDF )
Blockcipher-based Authenticated Encryption: How Small Can We Go?
Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi
2017/648 ( PDF )
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ismail Khoffi and Justin Cappos and Bryan Ford
2017/647 ( PDF )
A TMDTO Attack Against Lizard
Subhamoy Maitra and Nishant Sinha and Akhilesh Siddhanti and Ravi Anand and Sugata Gangopadhyay
2017/646 ( PDF )
Rational Trust Modeling
Mehrdad Nojoumian
2017/645 ( PDF )
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
Shay Gueron and Nicky Mouha
2017/644 ( PDF )
On Space-Scarce Economy In Blockchain Systems
Alexander Chepurnoy and Dmitry Meshkov
2017/643 ( PDF )
Private Data Aggregation on a Budget
Morten Dahl and Valerio Pastro and Mathieu Poumeyrol
2017/642 ( PDF )
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
Nasrollah Pakniat and Mahnaz Noroozi and Ziba Eslami
2017/641 ( PDF )
Integer Version of Ring-LWE and its Applications
Gu Chunsheng
2017/640 ( PDF )
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
Fabrice Benhamouda and Houda Ferradi and Rémi Géraud and David Naccache
2017/639 ( PDF )
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Jan Camenisch and Liqun Chen and Manu Drijvers and Anja Lehmann and David Novick and Rainer Urian
2017/638 ( PDF )
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
2017/637 ( PDF )
Very High Order Masking: Efficient Implementation and Security Evaluation
Anthony Journault and François-Xavier Standaert
2017/636 ( PDF )
Implementing 128-bit Secure MPKC Signatures
Ming-Shing Chen and Wen-Ding Li and Bo-Yuan Peng and Bo-Yin Yang and Chen-Mou Cheng
2017/635 ( PDF )
PERUN: Virtual Payment Channels over Cryptographic Currencies
Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski
2017/634 ( PDF )
CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
Joppe Bos and Léo Ducas and Eike Kiltz and Tancrède Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehlé
2017/633 ( PDF )
CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
Leo Ducas and Tancrede Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehle
2017/632 ( PDF )
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
Dahmun Goudarzi and Matthieu Rivain and Damien Vergnaud and Srinivas Vivek
2017/631 ( PDF )
Certifying Trapdoor Permutations, Revisited
Ran Canetti and Amit Lichtenberg
2017/630 ( PDF )
Gimli: a cross-platform permutation
Daniel J. Bernstein and Stefan Kölbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and François-Xavier Standaert and Yosuke Todo and Benoît Viguier
2017/629 ( PDF )
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
Romain Poussier and Yuanyuan Zhou and François-Xavier Standaert
2017/628 ( PDF )
Middle-Product Learning With Errors
Miruna Rosca and Amin Sakzad and Ron Steinfeld and Damien Stehle
2017/627 ( PDF )
Sliding right into disaster: Left-to-right sliding windows leak
Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom
2017/626 ( PDF )
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
Hai Zhou and Ruifeng Jiang and Shuyu Kong
2017/625 ( PDF )
How to Break Secure Boot on FPGA SoCs through Malicious Hardware
Nisha Jacob and Johann Heyszl and Andreas Zankl and Carsten Rolfes and Georg Sigl
2017/624 ( PDF )
Fast Leakage Assessment
Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede
2017/623 ( PDF )
Back to Massey: Impressively fast, scalable and tight security evaluation tools
Marios O. Choudary and P.G. Popescu
2017/622 ( PDF )
GIFT: A Small Present
Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Siang Meng Sim and Yosuke Todo and Yu Sasaki
2017/621 ( PDF )
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks
Xiaolin Xu and Bicky Shakya and Mark M. Tehranipoor and Domenic Forte
2017/620 ( PDF )
The Algebraic Group Model and its Applications
Eike Kiltz and Julian Loss
2017/619 ( PDF )
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
Qiong Huang and Jianye Huang
2017/618 ( PDF )
CacheZoom: How SGX Amplifies The Power of Cache Attacks
Ahmad Moghimi and Gorka Irazoqui and Thomas Eisenbarth
2017/617 ( PDF )
Secure Arithmetic Computation with Constant Computational Overhead
Benny Applebaum and Ivan Damgård and Yuval Ishai and Michael Nielsen and Lior Zichron
2017/616 ( PDF )
Digital Liquid Democracy: How to Vote Your Delegation Statement
Bingsheng Zhang and Hong-Sheng Zhou
2017/615 ( PDF )
A Framework to Select Parameters for Lattice-Based Cryptography
Nabil Alkeilani Alkadri and Johannes Buchmann and Rachid El Bansarkhani and Juliane Krämer
2017/614 ( PDF )
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
Mathias Wagner and Stefan Heyse
2017/613 ( PDF )
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
Hocheol Shin and Dohyun Kim and Yujin Kwon and Yongdae Kim
2017/612 ( PDF )
Large Modulus Ring-LWE >= Module-LWE
Martin R. Albrecht and Amit Deo
2017/611 ( PDF )
Multi-Rate Threshold FlipThem
David Leslie and Chris Sherfield and Nigel P. Smart
2017/610 ( PDF )
Differential Attacks: Using Alternative Operations
Céline Blondeau and Roberto Civino and Massimiliano Sala
2017/609 ( PDF )
On the discrete logarithm problem for prime-field elliptic curves
Alessandro Amadori and Federico Pintore and Massimiliano Sala
2017/608 ( PDF )
Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs
Vincent Immler and Robert Specht and Florian Unterstein
2017/607 ( PDF )
Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
Edward Eaton
2017/606 ( PDF )
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
Johannes Buchmann and Niklas Büscher and Florian Göpfert and Stefan Katzenbeisser and Juliane Krämer and Daniele Micciancio and Sander Siim and Christine van Vredendaal and Michael Walter
2017/605 ( PDF )
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
Xavier Bultel and Pascal Lafourcade
2017/604 ( PDF )
A Modular Analysis of the Fujisaki-Okamoto Transformation
Dennis Hofheinz and Kathrin Hövelmanns and Eike Kiltz
2017/603 ( PDF )
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2017/602 ( PDF )
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
Sean Bowe and Ariel Gabizon and Matthew D. Green
2017/601 ( PDF )
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
Wei Dai and Yarkın Doröz and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savaş and Berk Sunar
2017/600 ( PDF )
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
Jeremy Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich
2017/599 ( PDF )
A Subversion-Resistant SNARK
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac
2017/598 ( PDF )
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
Martin Roetteler and Michael Naehrig and Krysta M. Svore and Kristin Lauter
2017/597 ( PDF )
Round Optimal Concurrent MPC via Strong Simulation
Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai
2017/596 ( PDF )
A Side-Channel Assisted Cryptanalytic Attack Against QcBits
Melissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson
2017/595 ( PDF )
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
Wen Wang and Jakub Szefer and Ruben Niederhagen
2017/594 ( PDF )
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Robert Primas and Peter Pessl and Stefan Mangard
2017/593 ( PDF )
Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra
Alessio Caminata and Elisa Gorla
2017/592 ( PDF )
Speeding up lattice sieve with Xeon Phi coprocessor
Anja Becker and Dusan Kostic
2017/591 ( PDF )
On the Security of Carrier Phase-based Ranging
Hildur Olafsdottir and Aanjhan Ranganathan and Srdjan Capkun
2017/590 ( PDF )
Constant bandwidth ORAM with small block size using PIR operations
Linru Zhang and Gongxian Zeng and Yuechen Chen and Siu-Ming Yiu and Nairen Cao and Zheli Liu
2017/589 ( PDF )
An Attempt to Cryptanalyze A Partially Known Cipher Algorithm
Juay Guan Hee
2017/588 ( PDF )
Renyi Entropy Estimation Revisited
Maciej Obremski and Maciej Skorski
2017/587 ( PDF )
Subversion-zero-knowledge SNARKs
Georg Fuchsbauer
2017/586 ( PDF )
Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry
2017/585 ( PDF )
Internet Voting Using Zcash
Pavel Tarasov and Hitesh Tewari
2017/584 ( PDF )
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
Luka Malisa and Kari Kostiainen and Thomas Knell and David Sommer and Srdjan Capkun
2017/583 ( )
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
2017/582 ( PDF )
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
Angela Jäschke and Frederik Armknecht
2017/581 ( PDF )
Parallel Collision Search with Radix Trees
Gilles Dequen and Sorina Ionica and Monika Trimoska
2017/580 ( PDF )
Analysing Relations involving small number of Monomials in AES S- Box
Riddhi Ghosal
2017/579 ( PDF )
Birthday Attack on Dual EWCDM
Mridul Nandi
2017/578 ( PDF )
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
Hubert Ritzdorf and Karl Wüst and Arthur Gervais and Guillaume Felley and Srdjan Capkun
2017/577 ( PDF )
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
Steffen Schulz and André Schaller and Florian Kohnhäuser and Stefan Katzenbeisser
2017/576 ( PDF )
The Security of SIMON-like Ciphers Against Linear Cryptanalysis
Zhengbin Liu and Yongqiang Li and Mingsheng Wang
2017/575 ( PDF )
Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds
Ehsan Ebrahimi and Dominique Unruh
2017/574 ( PDF )
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Hamidreza Yazdanpanah, Mohammadreza Hasani Ahangar, Mahdi Azizi and Arash Ghafouri
2017/573 ( PDF )
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
2017/572 ( PDF )
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Marten van Dijk
2017/571 ( PDF )
Faster Algorithms for Isogeny Problems using Torsion Point Images
Christophe Petit
2017/570 ( PDF )
Assessing the No-Knowledge Property of SpiderOak ONE
Anders P. K. Dalskov and Claudio Orlandi
2017/569 ( PDF )
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
2017/568 ( PDF )
Towards Doubly Efficient Private Information Retrieval
Ran Canetti and Justin Holmgren and Silas Richelson
2017/567 ( PDF )
Can We Access a Database Both Locally and Privately?
Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters
2017/566 ( PDF )
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo
2017/565 ( PDF )
A Formal Foundation for Secure Remote Execution of Enclaves
Pramod Subramanyan and Rohit Sinha and Ilia Lebedev and Srinivas Devadas and Sanjit Seshia
2017/564 ( PDF )
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
Manaar Alam and Sarani Bhattacharya and Debdeep Mukhopadhyay and Sourangshu Bhattacharya
2017/563 ( PDF )
Weak is Better: Tightly Secure Short Signatures from Weak PRFs
Jacob Alperin-Sheriff and Daniel Apon
2017/562 ( PDF )
Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices
Björn Haase and Benoît Labrique
2017/561 ( PDF )
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
Yashvanth Kondi and Arpita Patra
2017/560 ( PDF )
Notes on the design and analysis of SIMON and SPECK
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2017/559 ( PDF )
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Alexandra Boldyreva and Shan Chen and Pierre-Alain Dupont and David Pointcheval
2017/558 ( PDF )
Detecting Large Integer Arithmetic for Defense Against Crypto Ransomware
Mehmet Sabir Kiraz and Ziya Alper Genç and Erdinç Öztürk
2017/557 ( PDF )
Watermarking Public-key Cryptographic Functionalities and Implementations
Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari
2017/556 ( PDF )
Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$).
Sankhanil Dey and Ranjan Ghosh
2017/555 ( PDF )
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion
Fabrice Benhamouda and Hugo Krawczyk and Tal Rabin
2017/554 ( PDF )
Trapping ECC with Invalid Curve Bug Attacks
Renaud Dubois
2017/553 ( PDF )
Further Analysis of a Proposed Hash-Based Signature Standard
Scott Fluhrer
2017/552 ( PDF )
Fast Secure Two-Party ECDSA Signing
Yehuda Lindell
2017/551 ( PDF )
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions
Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
2017/550 ( PDF )
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments
Tore Frederiksen and Benny Pinkas and Avishay Yanay
2017/549 ( PDF )
ZeroTrace : Oblivious Memory Primitives from Intel SGX
Sajin Sasy and Sergey Gorbunov and Christopher Fletcher
2017/548 ( PDF )
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem
Yarkın Doröz and Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman and Berk Sunar and William Whyte and Zhenfei Zhang
2017/547 ( PDF )
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
Seyed Farhad Aghili and Hamid Mala
2017/546 ( PDF )
X509CLOUD - FRAMEWORK FOR A UBIQUITOUS PKI
Hitesh Tewari and Arthur Hughes and Stefan Weber and Tomas Barry
2017/545 ( PDF )
Resource-efficient OT combiners with active security
Ignacio Cascudo and Ivan Damgård and Oriol Farràs and Samuel Ranellucci
2017/544 ( PDF )
Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability
Elette Boyle and Saleet Klein and Alon Rosen and Gil Segev
2017/543 ( PDF )
Identity-Based Encryption from the Diffie-Hellman Assumption
Nico Döttling and Sanjam Garg
2017/542 ( PDF )
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart
2017/541 ( PDF )
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed
2017/540 ( PDF )
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs
Jens Groth and Mary Maller
2017/539 ( PDF )
Public-Seed Pseudorandom Permutations
Pratik Soni and Stefano Tessaro
2017/538 ( PDF )
New security notions and feasibility results for authentication of quantum data
Sumegha Garg and Henry Yuen and Mark Zhandry
2017/537 ( PDF )
Information-theoretic Indistinguishability via the Chi-squared Method
Wei Dai and Viet Tung Hoang and Stefano Tessaro
2017/536 ( PDF )
HACL*: A Verified Modern Cryptographic Library
Jean-Karim Zinzindohoué and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche
2017/535 ( PDF )
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin
2017/534 ( PDF )
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
Zhenzhen Bao and Lei Wang and Jian Guo and Dawu Gu
2017/533 ( PDF )
Quantum non-malleability and authentication
Gorjan Alagic and Christian Majenz
2017/532 ( PDF )
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
Xavier Boyen and Qinyi Li
2017/531 ( PDF )
Template Attack vs Bayes Classifier
Stjepan Picek and Annelie Heuser and Sylvain Guilley
2017/530 ( PDF )
Non-Malleable Codes for Space-Bounded Tampering
Sebastian Faust and Kristina Hostakova and Pratyay Mukherjee and Daniele Venturi
2017/529 ( PDF )
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
Ling Song and Guohong Liao and Jian Guo
2017/528 ( PDF )
Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets
Claude Carlet
2017/527 ( PDF )
Key Rotation for Authenticated Encryption
Adam Everspaugh and Kenneth Paterson and Thomas Ristenpart and Sam Scott
2017/526 ( PDF )
Evaluating web PKIs
Jiangshan Yu and Mark Ryan
2017/525 ( PDF )
Kurosawa-Desmedt Meets Tight Security
Romain Gay and Dennis Hofheinz and Lisa Kohl
2017/524 ( PDF )
Compact Structure-preserving Signatures with Almost Tight Security
Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan
2017/523 ( PDF )
Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge Proofs
Vadim Lyubashevsky and Gregor Seiler
2017/522 ( PDF )
On the Hardness of the Mersenne Low Hamming Ratio Assumption
Marc Beunardeau and Aisling Connolly and Rémi Géraud and David Naccache
2017/521 ( PDF )
Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains
F. Betül Durak and Serge Vaudenay
2017/520 ( PDF )
The Price of Low Communication in Secure Multi-Party Computation
Juan Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas
2017/519 ( PDF )
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
Nishanth Chandran and Juan Garay and Payman Mohassel and Satyanarayana Vusirikala
2017/518 ( PDF )
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
Joost Renes and Benjamin Smith
2017/517 ( PDF )
PRF-ODH: Relations, Instantiations, and Impossibility Results
Jacqueline Brendel and Marc Fischlin and Felix Günther and Christian Janson
2017/516 ( PDF )
Characterizations of the differential uniformity of vectorial functions by the Walsh transform
Claude Carlet
2017/515 ( PDF )
Be Adaptive, Avoid Overcommitting
Zahra Jafargholi and Chethan Kamath and Karen Klein and Ilan Komargodski and Krzysztof Pietrzak and Daniel Wichs
2017/514 ( PDF )
Identity-based Encryption from Codes with Rank Metric
Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean-Pierre Tillich
2017/513 ( PDF )
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$
Patrick Holzer and Thomas Wunderer
2017/512 ( PDF )
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
Dr. M. AMUTHA PRABAKAR and Dr. B. INDRANI and M. KARTHIGAI VENI
2017/511 ( PDF )
State of the Art in Lightweight Symmetric Cryptography
Alex Biryukov and Leo Perrin
2017/510 ( PDF )
Hedging Public-Key Encryption in the Real World
Alexandra Boldyreva and Christopher Patton and Thomas Shrimpton
2017/509 ( PDF )
Quantum Security of NMAC and Related Constructions
Fang Song and Aaram Yun
2017/508 ( PDF )
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
Victor Cauchois and Clément Gomez and Reynald Lercier
2017/507 ( PDF )
Inverted Leftover Hash Lemma
Maciej Obremski and Maciej Skórski
2017/506 ( PDF )
Optimal Overcoming Weak Expectations
Maciej Skorski
2017/505 ( PDF )
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
2017/504 ( PDF )
A simple and compact algorithm for SIDH with arbitrary degree isogenies
Craig Costello and Huseyin Hisil
2017/503 ( PDF )
Encryption Switching Protocols Revisited: Switching modulo $p$
Guilhem Castagnos and Laurent Imbert and Fabien Laguillaumie
2017/502 ( PDF )
DeepSecure: Scalable Provably-Secure Deep Learning
Bita Darvish Rouhani and M. Sadegh Riazi and Farinaz Koushanfar
2017/501 ( PDF )
A Formal Treatment of Multi-key Channels
Felix Günther and Sogol Mazaheri
2017/500 ( PDF )
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
2017/499 ( PDF )
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample
Fuchun Guo and Rongmao Chen and Willy Susilo and Jianchang Lai and Guomin Yang and Yi Mu
2017/498 ( PDF )
Full-State Keyed Duplex With Built-In Multi-User Support
Joan Daemen and Bart Mennink and Gilles Van Assche
2017/497 ( PDF )
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
Itai Dinur and Niv Nadler
2017/496 ( PDF )
Modes of Operation Suitable for Computing on Encrypted Data
Dragos Rotaru and Nigel P. Smart and Martijn Stam
2017/495 ( PDF )
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy
Tibor Jager and Martijn Stam and Ryan Stanley-Oakes and Bogdan Warinschi
2017/494 ( PDF )
A Reaction Attack on the QC-LDPC McEliece Cryptosystem
Tomas Fabsic and Viliam Hromada and Paul Stankovski and Pavol Zajac and Qian Guo and Thomas Johansson
2017/493 ( PDF )
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
Georg T. Becker
2017/492 ( PDF )
Reducing Communication Channels in MPC
Marcel Keller and Dragos Rotaru and Nigel P. Smart and Tim Wood
2017/491 ( PDF )
Laconic Oblivious Transfer and its Applications
Chongwon Cho and Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou
2017/490 ( PDF )
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures
Peter Pessl and Leon Groot Bruinderink and Yuval Yarom
2017/489 ( PDF )
Multi Collision Resistant Hash Functions and their Applications
Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan
2017/488 ( PDF )
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions
Nir Bitansky and Yael Tauman Kalai and Omer Paneth
2017/487 ( PDF )
New Linear Attacks on Block Cipher GOST
Yi LU
2017/486 ( PDF )
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions
Ilan Komargodski and Moni Naor and Eylon Yogev
2017/485 ( PDF )
Authenticating compromisable storage systems
Jiangshan Yu and Mark Ryan and Liqun Chen
2017/484 ( PDF )
Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial
Jung Hee Cheon and Minki Hhan and Changmin Lee
2017/483 ( PDF )
A multi-start heuristic for multiplicative depth minimization of boolean circuits
Sergiu Carpov and Pascal Aubry and Renaud Sirdey
2017/482 ( PDF )
On the Statistical Leak of the GGH13 Multilinear Map and some Variants
Léo Ducas and Alice Pellet--Mary
2017/481 ( PDF )
A New Public-Key Cryptosystem via Mersenne Numbers
Divesh Aggarwal and Antoine Joux and Anupam Prakash and Miklos Santha
2017/480 ( PDF )
Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence
Thomas Prest
2017/479 ( PDF )
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Keita Emura
2017/478 ( PDF )
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
Anne Canteaut and Eran Lambooij and Samuel Neves and Shahram Rasoolzadeh and Yu Sasaki and Marc Stevens
2017/477 ( PDF )
Constrained Keys for Invertible Pseudorandom Functions
Dan Boneh and Sam Kim and David J. Wu
2017/476 ( PDF )
Forward-Security under Continual Leakage
Mihir Bellare and Adam O'Neill and Igors Stepanovs
2017/475 ( PDF )
Security of Even--Mansour Ciphers under Key-Dependent Messages
Pooya Farshim and Louiza Khati and Damien Vergnaud
2017/474 ( PDF )
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
Bart Mennink
2017/473 ( PDF )
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
Bart Mennink and Samuel Neves
2017/472 ( PDF )
A Unified Framework for Secure Search Over Encrypted Cloud Data
Cengiz Orencik and Erkay Savas and Mahmoud Alewiwi
2017/471 ( PDF )
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree
Jacob Alperin-Sheriff and Jintai Ding and Albrecht Petzoldt and Daniel Smith Tone
2017/470 ( PDF )
On the Relation Between SIM and IND-RoR Security Models for PAKEs
José Becerra and Vincenzo Iovino and Dimiter Ostrev and Marjan Skrobot
2017/469 ( PDF )
Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
Hiroaki Anada and Seiko Arita
2017/468 ( PDF )
Why Your Encrypted Database Is Not Secure
Paul Grubbs and Thomas Ristenpart and Vitaly Shmatikov
2017/467 ( PDF )
Access Control Encryption for General Policies from Standard Assumptions
Sam Kim and David J. Wu
2017/466 ( PDF )
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security
Yusuke Naito
2017/465 ( PDF )
Lelantos: A Blockchain-based Anonymous Physical Delivery System
Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong
2017/464 ( PDF )
On the Structure of Unconditional UC Hybrid Protocols
Mike Rosulek and Morgan Shirley
2017/463 ( PDF )
Proving Resistance against Invariant Attacks: How to Choose the Round Constants
Christof Beierle and Anne Canteaut and Gregor Leander and Yann Rotella
2017/462 ( PDF )
Leakage-Resilient Tweakable Encryption from One-Way Functions
Suvradip Chakraborty and Chester Rebeiro and Debdeep Mukhopadhyay and C. Pandu Rangan
2017/461 ( PDF )
Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions
Daniel Jost and Ueli Maurer
2017/460 ( PDF )
Transitioning to a Quantum-Resistant Public Key Infrastructure
Nina Bindel and Udyani Herath and Matthew McKague and Douglas Stebila
2017/459 ( PDF )
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test
Phuong Ha Nguyen and Durga Prasad Sahoo and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay
2017/458 ( -- withdrawn -- )
Fully Homomorphic Encryption Using Multivariate Polynomials
Matthew Tamayo-Rios and Jean-Charles Faugère and Ludovic Perret and Peng Hui How and Robin Zhang
2017/457 ( PDF )
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority
Masahito Hayashi and Takeshi Koshiba
2017/456 ( PDF )
Proxy Re-Encryption and Re-Signatures from Lattices
Xiong Fan and Feng-Hao Liu
2017/455 ( PDF )
Vector Encoding over Lattices and Its Applications
Daniel Apon and Xiong Fan and Feng-Hao Liu
2017/454 ( PDF )
Algorand: Scaling Byzantine Agreements for Cryptocurrencies
Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich
2017/453 ( PDF )
Subtleties in Security Definitions for Predicate Encryption with Public Index
Johannes Blömer and Gennadij Liske
2017/452 ( PDF )
Oblivious Neural Network Predictions via MiniONN transformations
Jian Liu and Mika Juuti and Yao Lu and N. Asokan
2017/451 ( PDF )
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan
2017/450 ( PDF )
Privacy-preserving biometric authentication: challenges and directions
Elena Pagnin and Aikaterini Mitrokotsa
2017/449 ( PDF )
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies
Shihui Fu and Xiutao Feng and Baofeng Wu
2017/448 ( PDF )
Obfuscation of Bloom Filter Queries from Ring-LWE
Alex Davidson
2017/447 ( PDF )
Block Chain based Searchable Symmetric Encryption
Huige Li and Haibo Tian and Fangguo Zhang
2017/446 ( PDF )
Secretly Embedding Trapdoors into Contract Signing Protocols
Diana Maimut and George Teseleanu
2017/445 ( PDF )
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Michael Till Beck and Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2017/444 ( PDF )
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing
Ming Li and Jian Weng and Anjia Yang and Wei Lu
2017/443 ( PDF )
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
Joel Alwen and Jeremiah Blocki and Ben Harsha
2017/442 ( PDF )
On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i
Jeremiah Blocki and Samson Zhou
2017/441 ( PDF )
New Approach to Practical Leakage-Resilient Public-Key Cryptography
Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan
2017/440 ( PDF )
Cryptographic Security Analysis of T-310
Nicolas T. Courtois and Klaus Schmeh and Jörg Drobick and Jacques Patarin and Maria-Bristena Oprisanu and Matteo Scarlata and Om Bhallamudi
2017/439 ( PDF )
Practically Efficient Secure Single-Commodity Multi-Market Auctions
Abdelrahaman Aly and Mathieu Van Vyve
2017/438 ( PDF )
GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography
James Howe and Máire O'Neill
2017/437 ( PDF )
Slothful reduction
Michael Scott
2017/436 ( PDF )
A Uniform Class of Weak Keys for Universal Hash Functions
Kaiyan Zheng and Peng Wang
2017/435 ( PDF )
Analyzing Multi-Key Security Degradation
Atul Luykx and Bart Mennink and Kenneth G. Paterson
2017/434 ( PDF )
FourQ on embedded devices with strong countermeasures against side-channel attacks
Zhe Liu and Patrick Longa and Geovandro Pereira and Oscar Reparaz and Hwajeong Seo
2017/433 ( PDF )
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia
2017/432 ( PDF )
Statistical and Linear Independence of Binary Random Variables
Kaisa Nyberg
2017/431 ( PDF )
Understanding RUP Integrity of COLM
Nilanjan Datta and Atul Luykx and Bart Mennink and Mridul Nandi
2017/430 ( PDF )
Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping
Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
2017/429 ( PDF )
Strengthening Access Control Encryption
Christian Badertscher and Christian Matt and Ueli Maurer
2017/428 ( PDF )
Optimal Ramp Schemes and Related Combinatorial Objects
Douglas R. Stinson
2017/427 ( PDF )
Grover Meets Simon - Quantumly Attacking the FX-construction
Gregor Leander and Alexander May
2017/426 ( PDF )
FHPKE based on multivariate discrete logarithm problem
Masahiro Yagisawa
2017/425 ( PDF )
Card-Based Protocols Using Unequal Division Shuffle
Akihiro Nishimura and Takuya Nishida and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone
2017/424 ( PDF )
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
Markku-Juhani O. Saarinen
2017/423 ( PDF )
Foundations for Actively Secure Card-based Cryptography
Alexander Koch and Stefan Walzer
2017/422 ( PDF )
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs
Urbi Chatterjee and Vidya Govindan and Rajat Sadhukhan and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Debashis Mahata and Mukesh Prabhu
2017/421 ( PDF )
Exploring Naccache-Stern Knapsack Encryption
Éric Brier and Rémi Géraud and David Naccache
2017/420 ( PDF )
Construction and Filtration of Lightweight Formalized MDS Matrices
Shiyi Zhang and Yongjuan Wang and Yang Gao and Tao Wang
2017/419 ( PDF )
Efficient hash maps to $\mathbb{G}_2$ on BLS curves
Alessandro Budroni and Federico Pintore
2017/418 ( PDF )
Strong Authenticated Key Exchange with Auxiliary Inputs
Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
2017/417 ( PDF )
A Proof-of-Stake protocol for consensus on Bitcoin subchains
Massimo Bartoletti and Stefano Lande and Alessandro Sebastian Podda
2017/416 ( PDF )
Breaking and Fixing the HB+DB protocol
Ioana Boureanu and David Gerault and Pascal Lafourcade and Cristina Onete
2017/415 ( PDF )
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
Osman Bicer and Muhammed Ali Bingol and Mehmet Sabir Kiraz and Albert Levi
2017/414 ( PDF )
Symmetrically and Asymmetrically Hard Cryptography
Alex Biryukov and Leo Perrin
2017/413 ( PDF )
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava
2017/412 ( PDF )
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently
Ximing Fu and Xiaoyun Wang and Jiazhe Chen
2017/411 ( PDF )
A New Algorithm for Inversion mod $p^k$
Çetin Kaya Koç
2017/410 ( PDF )
Fast Proxy Re-Encryption for Publish/Subscribe Systems
Yuriy Polyakov and Kurt Rohloff and Gyana Sahu and Vinod Vaikuntanthan
2017/409 ( PDF )
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges
2017/408 ( PDF )
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh
2017/407 ( PDF )
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments
Peter Rindal and Roberto Trifiletti
2017/406 ( PDF )
OmniLedger: A Secure, Scale-Out, Decentralized Ledger
Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Bryan Ford
2017/405 ( PDF )
Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''
Jingjing Wang and Xiaoyu Zhang and Jingjing guo and Jianfeng Wang
2017/404 ( PDF )
Short generators without quantum computers: the case of multiquadratics
Jens Bauch and Daniel J. Bernstein and Henry de Valence and Tanja Lange and Christine van Vredendaal
2017/403 ( PDF )
Condition on composite numbers easily factored with elliptic curve method
Masaaki Shirase
2017/402 ( PDF )
A New Approach to Round-Optimal Secure Multiparty Computation
Prabhanjan Ananth and Arka Rai Choudhuri and Abhishek Jain
2017/401 ( PDF )
Synthesis of Adaptive Side-Channel Attacks
Quoc-Sang Phan and Lucas Bang and Corina S. Păsăreanu and Pasquale Malacaria and Tevfik Bultan
2017/400 ( PDF )
A Leakage-Abuse Attack Against Multi-User Searchable Encryption
Cédric Van Rompay and Refik Molva and Melek Önen
2017/399 ( PDF )
Practical Evaluation of Masking Software Countermeasures on an IoT processor
David McCann and Elisabeth Oswald
2017/398 ( PDF )
Post-Quantum Security of Fiat-Shamir
Dominique Unruh
2017/397 ( PDF )
Efficient Digital Signatures From Coding Theory
Edoardo Persichetti
2017/396 ( PDF )
SecureML: A System for Scalable Privacy-Preserving Machine Learning
Payman Mohassel and Yupeng Zhang
2017/395 ( PDF )
Higher-Order Side-Channel Protected Implementations of Keccak
Hannes Gross and David Schaffenrath and Stefan Mangard
2017/394 ( PDF )
Double-spending Prevention for Bitcoin zero-confirmation transactions
Cristina Pérez-Solà and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomartı́
2017/393 ( PDF )
Privacy-Preserving Interdomain Routing at Internet Scale
Gilad Asharov and Daniel Demmler and Michael Schapira and Thomas Schneider and Gil Segev and Scott Shenker and Michael Zohner
2017/392 ( PDF )
Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE
Sébastien Canard and Sergiu Carpov and Donald Nokam Kuate and Renaud Sirdey
2017/391 ( PDF )
Another Look at Success Probability in Linear Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2017/390 ( PDF )
On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations
Yi Deng and Xuyang Song and Jingyue Yu and Yu Chen
2017/389 ( PDF )
Decentralized Blacklistable Anonymous Credentials with Reputation
Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu
2017/388 ( PDF )
Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple
Silvan Streit and Fabrizio De Santis
2017/387 ( PDF )
Homomorphically Encrypted Arithmetic Operations over the Integer Ring
Chen Xu and Jingwei Chen and Wenyuan Wu and Yong Feng
2017/386 ( PDF )
Four Round Secure Computation without Setup
Zvika Brakerski and Shai Halevi and Antigoni Polychroniadou
2017/385 ( PDF )
Garbled Circuits as Randomized Encodings of Functions: a Primer
Benny Applebaum
2017/384 ( PDF )
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang
2017/383 ( PDF )
Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
Travis Scholl
2017/382 ( PDF )
A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK
Steven Cavanaugh
2017/381 ( PDF )
Quantum one-way permutation over the finite field of two elements
Alexandre de Castro
2017/380 ( PDF )
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
Sam Kim and David J. Wu
2017/379 ( PDF )
Fault attack on Supersingular Isogeny Cryptosystems
Yan Bo Ti
2017/378 ( PDF )
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
Marcel Keller and Emmanuela Orsini and Dragos Rotaru and Peter Scholl and Eduardo Soria-Vazquez and Srinivas Vivek
2017/377 ( PDF )
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries
Stefan Wüller and Ulrike Meyer and Susanne Wetzel
2017/376 ( PDF )
Determining the Minimum Degree of an S-box
P. R. Mishra, Sumanta Sarkar and Indivar Gupta
2017/375 ( PDF )
Do you need a Blockchain?
Karl Wüst and Arthur Gervais
2017/374 ( PDF )
Loop-abort faults on supersingular isogeny cryptosystems
Alexandre Gélin and Benjamin Wesolowski
2017/373 ( PDF )
Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption
Ryo Hiromasa and Yutaka Kawai
2017/372 ( PDF )
A crossbred algorithm for solving Boolean polynomial systems
Antoine Joux and Vanessa Vitse
2017/371 ( PDF )
On the Construction of Lightweight Orthogonal MDS Matrices
Lijing Zhou, Licheng Wang and Yiru Sun
2017/370 ( PDF )
"The Simplest Protocol for Oblivious Transfer'' Revisited
Ziya Alper Genç and Vincenzo Iovino and Alfredo Rial
2017/369 ( -- withdrawn -- )
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
2017/368 ( PDF )
Analysis of Toeplitz MDS Matrices
Sumanta Sarkar and Habeeb Syed
2017/367 ( PDF )
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity
Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, and Yu Long
2017/366 ( PDF )
BitFlip: A Randomness-Rich Cipher
Gideon Samid and Serguei Popov
2017/365 ( PDF )
The Complexity of Public-Key Cryptography
Boaz Barak
2017/364 ( PDF )
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas
2017/363 ( PDF )
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF
Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu
2017/362 ( PDF )
Universally Composable Zero-Knowledge Proof of Membership
Jesper Buus Nielsen
2017/361 ( PDF )
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
2017/360 ( PDF )
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error
Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
2017/359 ( PDF )
Conditional Disclosure of Secrets via Non-Linear Reconstruction
Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee
2017/358 ( PDF )
Almost Optimal Oblivious Transfer from QA-NIZK
Olivier Blazy and Céline Chevalier and Paul Germouty
2017/357 ( PDF )
Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model
Nico Döttling and Jesper Buus Nielsen and Maciej Obremski
2017/356 ( PDF )
XOR of PRPs in a Quantum World
Bart Mennink and Alan Szepieniec
2017/355 ( PDF )
White-Box Cryptography: Don't Forget About Grey Box Attacks
Joppe W. Bos and Charles Hubain and Wil Michiels and Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe Teuwen
2017/354 ( PDF )
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart
2017/353 ( PDF )
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
2017/352 ( PDF )
A low-resource quantum factoring algorithm
Daniel J. Bernstein and Jean-François Biasse and Michele Mosca
2017/351 ( PDF )
Post-quantum RSA
Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta
2017/350 ( PDF )
The Montgomery ladder on binary elliptic curves
Thomaz Oliveira and Julio López and Francisco Rodríguez-Henríquez
2017/349 ( PDF )
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards
Panos Kampanakis, Scott Fluhrer
2017/348 ( PDF )
Removal Attacks on Logic Locking and Camouflaging Techniques
Muhammad Yasin and Bodhisatwa Mazumdar and Ozugr Sinanoglu and Jeyavijayan Rajendran
2017/347 ( PDF )
Predictive Aging of Reliability of two Delay PUFs
Naghmeh Karimi and Jean-Luc Danger and Florent Lozac'h and Sylvain Guilley
2017/346 ( PDF )
Some cryptanalytic results on Lizard
Subhadeep Banik and Takanori Isobe
2017/345 ( PDF )
Mind the Gap: Towards Secure 1st-order Masking in Software
Kostas Papagiannopoulos and Nikita Veshchikov
2017/344 ( PDF )
DUPLO: Unifying Cut-and-Choose for Garbled Circuits
Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti
2017/343 ( PDF )
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
Essam Ghadafi and Jens Groth
2017/342 ( PDF )
Multilinear Maps Using a Variant of Ring-LWE
Gu Chunsheng
2017/341 ( PDF )
Steganography techniques
Dragoş Dumitrescu and Ioan-Mihail Stan and Emil Simion
2017/340 ( -- withdrawn -- )
Enhancing Security by Combining Biometrics and Cryptography
Diana Popa and Emil Simion
2017/339 ( PDF )
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
2017/338 ( PDF )
A Traceability Analysis of Monero's Blockchain
Amrit Kumar and Clément Fischer and Shruti Tople and Prateek Saxena
2017/337 ( PDF )
Authentication of Outsourced Linear Function Query with Efficient Updates
Gang Sheng and Chunming Tang and Wei Gao and Yunlu Cai and Xing Hu
2017/336 ( PDF )
NIST RANDOMNESS TESTS (IN)DEPENDENCE
Carmina GEORGESCU and Alina PETRESCU-NITA and Emil SIMION and Antonela TOMA
2017/335 ( -- withdrawn -- )
Privacy-Preserving Linear Regression on Distributed Data
Irene Giacomelli and Somesh Jha and C. David Page
2017/334 ( PDF )
Updating key size estimations for pairings
Razvan Barbulescu and Sylvain Duquesne
2017/333 ( PDF )
Faster Homomorphic Function Evaluation using Non-Integral Base Encoding
Charlotte Bonte and Carl Bootland and Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2017/332 ( PDF )
Reforgeability of Authenticated Encryption Schemes
Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2017/331 ( PDF )
Optimal attacks on qubit-based Quantum Key Recycling
Daan Leermakers and Boris Skoric
2017/330 ( PDF )
Distinguisher-Dependent Simulation in Two Rounds and its Applications
Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum
2017/329 ( PDF )
Maliciously Secure Multi-Client ORAM
Matteo Maffei (TU Wien); Giulio Malavolta (FAU); Manuel Reinert (CISPA, Saarland University); Dominique Schröder (FAU)
2017/328 ( PDF )
Evaluating Bernstein-Rabin-Winograd Polynomials
Debrup Chakraborty and Sebati Ghosh and Palash Sarkar
2017/327 ( PDF )
MQ Signatures for PKI
Alan Szepieniec and Ward Beullens and Bart Preneel
2017/326 ( PDF )
Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data
Manuel Barbosa and Dario Catalano and Dario Fiore
2017/325 ( PDF )
CHVote System Specification
Rolf Haenni and Reto E. Koenig and Philipp Locher and Eric Dubuis
2017/324 ( PDF )
Family of PRGs based on Collections of Arithmetic Progressions
Srikanth ch, Veni Madhavan C.E. and Kumar Swamy H.V.
2017/323 ( PDF )
Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
Atsushi Takayasu and Yohei Watanabe
2017/322 ( PDF )
Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction
Jun Xu and Santanu Sarkar and Lei Hu
2017/321 ( PDF )
Towards Practical Obfuscation of General Circuits
Dingfeng Ye and Peng Liu and Jun Xu
2017/320 ( PDF )
Speeding up Huff Form of Elliptic Curves
Neriman Gamze Orhon and Huseyin Hisil
2017/319 ( PDF )
Encrypt-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting
Sikhar Patranabis and Debdeep Mukhopadhyay
2017/318 ( -- withdrawn -- )
Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
Sikhar Patranabis and Debdeep Mukhopadhyay
2017/317 ( PDF )
Solidus: Confidential Distributed Ledger Transactions via PVORM
Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed Kosba and Ari Juels and Elaine Shi
2017/316 ( PDF )
Exploring Potential 6LoWPAN Traffic Side Channels
Yan Yan and Elisabeth Oswald and Theo Tryfonas
2017/315 ( PDF )
Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)
Bernardo Ferreira, Joaão Leitão, Henrique Domingos
2017/314 ( PDF )
Post-quantum cryptography---dealing with the fallout of physics success
Daniel J. Bernstein and Tanja Lange
2017/313 ( -- withdrawn -- )
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Yanqing Yao, Hua Guo, Zhoujun Li
2017/312 ( PDF )
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
Boaz Barak and Zvika Brakerski and Ilan Komargodski and Pravesh K. Kothari
2017/311 ( PDF )
Constructing Multidimensional Differential Addition Chains and their Applications
Aaron Hutchinson and Koray Karabina
2017/310 ( PDF )
KDM-Secure Public-Key Encryption from Constant-Noise LPN
Shuai Han and Shengli Liu
2017/309 ( PDF )
Perfectly Secure Message Transmission Scheme against Rational Adversaries
Maiki Fujita and Takeshi Koshiba
2017/308 ( PDF )
Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus
Nicholas Genise and Daniele Micciancio
2017/307 ( PDF )
Practical Synchronous Byzantine Consensus
Ling Ren and Kartik Nayak and Ittai Abraham and Srinivas Devadas
2017/306 ( PDF )
Cube Attacks on Non-Blackbox Polynomials Based on Division Property
Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
2017/305 ( PDF )
A Zero Knowledge Sumcheck and its Applications
Alessandro Chiesa and Michael A. Forbes and Nicholas Spooner
2017/304 ( PDF )
Provably Secure NTRUEncrypt over More General Cyclotomic Rings
Yang Yu and Guangwu Xu and Xiaoyun Wang
2017/303 ( PDF )
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model
Dana Dachman-Soled and Mukul Kulkarni and Aria Shahverdi
2017/302 ( PDF )
Quantum preimage, 2nd-preimage, and collision resistance of SHA3
Jan Czajkowski and Leon Groot Bruinderink and Andreas Hülsing and Christian Schaffner
2017/301 ( PDF )
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation
Alex Lombardi and Vinod Vaikuntanathan
2017/300 ( PDF )
Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies
Iddo Bentov and Pavel Hubáček and Tal Moran and Asaf Nadler
2017/299 ( PDF )
Fast Private Set Intersection from Homomorphic Encryption
Hao Chen and Kim Laine and Peter Rindal
2017/298 ( PDF )
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling
Séamus Brannigan and Neil Smyth and Tobias Oder and Felipe Valencia and Elizabeth O’Sullivan and Tim Güneysu and Francesco Regazzoni
2017/297 ( PDF )
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
Gildas Avoine and Xavier Bultel and Sébastien Gambs and David Gérault and Pascal Lafourcade and Cristina Onete and Jean-Marc Robert
2017/296 ( PDF )
Topology-Hiding Computation on all Graphs
Adi Akavia and Rio LaVigne and Tal Moran
2017/295 ( PDF )
Improved key-reconciliation method
Ludo Tolhuizen and Ronald Rietman and Oscar Garcia-Morchon
2017/294 ( PDF )
Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme
Jung Hee Cheon and Miran Kim and Yongsoo Song
2017/293 ( PDF )
Montgomery curves and the Montgomery ladder
Daniel J. Bernstein and Tanja Lange
2017/292 ( PDF )
Involutory Differentially 4-Uniform Permutations from Known Constructions
Shihui Fu and Xiutao Feng
2017/291 ( PDF )
How to Achieve Non-Malleability in One or Two Rounds
Dakshita Khurana and Amit Sahai
2017/290 ( PDF )
Double DIP: Re-Evaluating Security of Logic Encryption Algorithms
Yuanqi Shen and Hai Zhou
2017/289 ( PDF )
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
Matthias Krause
2017/288 ( PDF )
Security of Symmetric Primitives under Incorrect Usage of Keys
Pooya Farshim and Claudio Orlandi and Răzvan Roşie
2017/287 ( PDF )
Towards Sound and Optimal Leakage Detection Procedure
Liwei Zhang and A. Adam Ding and Francois Durvaux and Francois-Xavier Standaert and Yunsi Fei
2017/286 ( PDF )
Impossible Differential Attack on Midori128 Using Rebound-like Technique
Wenquan Bi and Zheng Li and Xiaoyang Dong and Xiaoyun Wang
2017/285 ( PDF )
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
Kamil Doruk Gür and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savaş
2017/284 ( PDF )
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
Maik Ender and Alexander Wild and Amir Moradi
2017/283 ( PDF )
On the Easiness of Turning Higher-Order Leakages into First-Order
Thorben Moos and Amir Moradi
2017/282 ( PDF )
Collapsing sponges: Post-quantum security of the sponge construction
Dominique Unruh
2017/281 ( PDF )
Practical Secure Aggregation for Privacy Preserving Machine Learning
Keith Bonawitz and Vladimir Ivanov and Ben Kreuter and Antonio Marcedone and H. Brendan McMahan and Sarvar Patel and Daniel Ramage and Aaron Segal and Karn Seth
2017/280 ( PDF )
Amortization with Fewer Equations for Proving Knowledge of Small Secrets
Rafael del Pino and Vadim Lyubashevsky
2017/279 ( PDF )
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Melissa Chase and David Derler and Steven Goldfeder and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig and Greg Zaverucha
2017/278 ( PDF )
New Observations on Invariant Subspace Attack
Yunwen Liu and Vincent Rijmen
2017/277 ( PDF )
Minimizing the Complexity of Goldreich's Pseudorandom Generator
Alex Lombardi and Vinod Vaikuntanathan
2017/276 ( PDF )
Obfuscating Compute-and-Compare Programs under LWE
Daniel Wichs and Giorgos Zirdelis
2017/275 ( PDF )
Simple Generic Constructions of Succinct Functional Encryption
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
2017/274 ( PDF )
Lockable Obfuscation
Rishab Goyal and Venkata Koppula and Brent Waters
2017/273 ( PDF )
Two-Round and Non-interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles
Huijia Lin and Rafael Pass and Pratik Soni
2017/272 ( PDF )
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA
Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht
2017/271 ( PDF )
High Order Masking of Look-up Tables with Common Shares
Jean-Sebastien Coron and Franck Rondepierre and Rina Zeitoun
2017/270 ( PDF )
Rational Proofs against Rational Verifiers
Keita Inasawa and Kenji Yasunaga
2017/269 ( PDF )
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
Okan Seker and Thomas Eisenbarth and Rainer Steinwandt
2017/268 ( PDF )
Efficient Sanitizable Signatures without Random Oracles
Russell W. F. Lai and Tao Zhang and Sherman S. M. Chow and Dominique Schröder
2017/267 ( PDF )
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
Seungkwang Lee
2017/266 ( PDF )
From Higher-Order Differentials to Polytopic Cryptanalysis
Tyge Tiessen
2017/265 ( PDF )
Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation
Kamalesh Acharya and Ratna Dutta
2017/264 ( PDF )
How to (pre-)compute a ladder
Thomaz Oliveira and Julio López and Hüseyin Hışıl and Francisco Rodríguez-Henríquez
2017/263 ( PDF )
Bivariate attacks and confusion coefficients
Sylvain Guilley and Liran Lerman
2017/262 ( PDF )
When It’s All Just Too Much: Outsourcing MPC-Preprocessing
Peter Scholl and Nigel P. Smart and Tim Wood
2017/261 ( PDF )
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
2017/260 ( PDF )
Message-Recovery MACs and Verification-Unskippable AE
Shoichi Hirose and Yu Sasaki and Kan Yasuda
2017/259 ( PDF )
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
Daniele Micciancio and Michael Walter
2017/258 ( PDF )
Pseudorandomness of Ring-LWE for Any Ring and Modulus
Chris Peikert and Oded Regev and Noah Stephens-Davidowitz
2017/257 ( PDF )
Threshold Fully Homomorphic Encryption
Aayush Jain, Peter M. R. Rasmussen, Amit Sahai
2017/256 ( PDF )
A Framework for Universally Composable Diffie-Hellman Key Exchange
Ralf Kuesters and Daniel Rausch
2017/255 ( PDF )
New and Old Limits for AES Known-Key Distinguishers
Lorenzo Grassi and Christian Rechberger
2017/254 ( PDF )
Towards Easy Key Enumeration
Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou and Juan Ai
2017/253 ( PDF )
A Modular Security Analysis of EAP and IEEE 802.11
Chris Brzuska and Håkon Jacobsen
2017/252 ( PDF )
High-Order Conversion From Boolean to Arithmetic Masking
Jean-Sebastien Coron
2017/251 ( PDF )
A Lattice-Based Universal Thresholdizer for Cryptographic Systems
Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim
2017/250 ( PDF )
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
Huijia Lin and Stefano Tessaro
2017/249 ( PDF )
Proof of Luck: an Efficient Blockchain Consensus Protocol
Mitar Milutinovic and Warren He and Howard Wu and Maxinder Kanwal
2017/248 ( PDF )
IPcore implementation susceptibility: A case study of Low latency ciphers
Dillibabu Shanmugam and Ravikumar Selvam and Suganya Annadurai
2017/247 ( PDF )
Efficient Multivariate Ring Signature Schemes
Mohamed Saied Emam Mohamed and Albrecht Petzoldt
2017/246 ( PDF )
An Analysis of FV Parameters Impact Towards its Hardware Acceleration
Joël Cathébras and Alexandre Carbon and Renaud Sirdey and Nicolas Ventroux
2017/245 ( PDF )
Cache-Base Application Detection in the Cloud Using Machine Learning
Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar
2017/244 ( PDF )
Model-counting Approaches For Nonlinear Numerical Constraints
Mateus Borges and Quoc-Sang Phan and Antonio Filieri and Corina S. Păsăreanu
2017/243 ( PDF )
Key Recovery: Inert and Public
Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines
2017/242 ( PDF )
Full accounting for verifiable outsourcing
Riad S. Wahby and Ye Ji and Andrew J. Blumberg and abhi shelat and Justin Thaler and Michael Walfish and Thomas Wies
2017/241 ( PDF )
Forkable Strings are Rare
Alexander Russell and Cristopher Moore and Aggelos Kiayias and Saad Quader
2017/240 ( PDF )
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu
2017/239 ( PDF )
Boosting Authenticated Encryption Robustness With Minimal Modifications
Tomer Ashur and Orr Dunkelman and Atul Luykx
2017/238 ( PDF )
Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin
Tim Ruffing and Pedro Moreno-Sanchez
2017/237 ( PDF )
Switch Commitments: A Safety Switch for Confidential Transactions
Tim Ruffing and Giulio Malavolta
2017/236 ( PDF )
A new rank metric codes based encryption scheme
Pierre Loidreau
2017/235 ( PDF )
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption
Isheeta Nargis
2017/234 ( PDF )
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Kevin Milner and Cas Cremers and Jiangshan Yu and Mark Ryan
2017/233 ( PDF )
Simplifying Design and Analysis of Complex Predicate Encryption Schemes
Shashank Agrawal and Melissa Chase
2017/232 ( PDF )
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou
2017/231 ( PDF )
EHE: nonce misuse-resistant message authentication
Sergey Agievich
2017/230 ( PDF )
Smart Contracts Make Bitcoin Mining Pools Vulnerable
Yaron Velner and Jason Teutsch and Loi Luu
2017/229 ( PDF )
Multi-Prover Interactive Proofs: Unsound Foundations
Claude Crépeau and Nan Yang
2017/228 ( PDF )
Efficient and Secure Outsourcing of Genomic Data Storage
João Sá Sousa and Cédric Lefebvre and Zhicong Huang and Jean Louis Raisaro and Carlos Aguilar and Marc-Olivier Killijian and Jean-Pierre Hubaux
2017/227 ( PDF )
Towards Shared Ownership in the Cloud
Hubert Ritzdorf and Claudio Soriente and Ghassan O. Karame and Srdjan Marinovic and Damian Gruber and Srdjan Capkun
2017/226 ( PDF )
Faster LEGO-based Secure Computation without Homomorphic Commitments
Ruiyu Zhu and Yan Huang
2017/225 ( PDF )
Bandwidth Hard Functions for ASIC Resistance
Ling Ren and Srinivas Devadas
2017/224 ( PDF )
Simple Encrypted Arithmetic Library - SEAL v2.1
Hao Chen and Kim Laine and Rachel Player
2017/223 ( PDF )
0-RTT Key Exchange with Full Forward Secrecy
Felix Günther and Britta Hale and Tibor Jager and Sebastian Lauer
2017/222 ( PDF )
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
Nizamud Dina, Arif Iqbal Umar, Abdul Waheed, Noor ul Amin
2017/221 ( PDF )
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE
Florian Göpfert and Christine van Vredendaal and Thomas Wunderer
2017/220 ( PDF )
Cryptanalysis of PMACx, PMAC2x, and SIVx
Kazuhiko Minematsu and Tetsu Iwata
2017/219 ( PDF )
Attribute-Based Encryption from Identity-Based Encryption
Chun-I Fan and Yi-Fan Tseng and Chih-Wen Lin
2017/218 ( PDF )
Repeated Games for Generating Randomness in Encryption
Kenji Yasunaga and Kosuke Yuzawa
2017/217 ( PDF )
Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
Kuo-Hui Yeh
2017/216 ( PDF )
SCRAPE: Scalable Randomness Attested by Public Entities
Ignacio Cascudo and Bernardo David
2017/215 ( PDF )
SEVDSI: Secure, Efficient and Verifiable Data Set Intersection
Ozgur Oksuz, Iraklis Leontiadis, Sixia Chen, Alexander Russell, Qiang Tang, and Bing Wang
2017/214 ( PDF )
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer
Carmit Hazay and Peter Scholl and Eduardo Soria-Vazquez
2017/213 ( PDF )
Quantum Information Set Decoding Algorithms
Ghazal Kachigar and Jean-Pierre Tillich
2017/212 ( PDF )
Montgomery curves and their arithmetic: The case of large characteristic fields
Craig Costello and Benjamin Smith
2017/211 ( PDF )
Multi-level Access in Searchable Symmetric Encryption
James Alderman and Keith M. Martin and Sarah Louise Renwick
2017/210 ( PDF )
Public Key Cryptosystems with Noisy Secret Keys
Charles Herder and Benjamin Fuller and Marten van Dijk and Srinivas Devadas
2017/209 ( PDF )
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
Qipeng Liu and Mark Zhandry
2017/208 ( PDF )
SoK: Security Models for Pseudo-Random Number Generators
Sylvain Ruhault
2017/207 ( PDF )
Private Queries on Encrypted Genomic Data
Gizem S Cetin and Hao Chen and Kim Laine and Kristin Lauter and Peter Rindal and Yuhou Xia
2017/206 ( PDF )
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
Yongge Wang
2017/205 ( PDF )
ZETA: Towards Tagless Authenticated Encryption
Anindya Shankar Bhandari and Dipanwita Roy Chowdhury
2017/204 ( PDF )
Linear Cryptanalysis Using Low-bias Linear Approximations
Tomer Ashur, Daniël Bodden, and Orr Dunkelman
2017/203 ( PDF )
Proofs of Useful Work
Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
2017/202 ( PDF )
Average-Case Fine-Grained Hardness
Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
2017/201 ( PDF )
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control
Gabriel Kaptchuk and Ian Miers and Matthew Green
2017/200 ( PDF )
Anonymous Attestation with Subverted TPMs
Jan Camenisch and Manu Drijvers and Anja Lehmann
2017/199 ( PDF )
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme
Dustin Moody and Ray Perlner and Daniel Smith-Tone
2017/198 ( PDF )
FHE with Recursive Ciphertext
Masahiro Yagisawa
2017/197 ( PDF )
A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group
Wenying Zhang, Zhaohui Xing and Keqin Feng
2017/196 ( PDF )
Attribute-based concurrent signatures
BaoHong Li, Guoqing Xu and Yinliang Zhao
2017/195 ( PDF )
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
Chaoyun Li and Qingju Wang
2017/194 ( PDF )
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2)
Andrea Visconti and Chiara Valentina Schiavo and René Peralta
2017/193 ( PDF )
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
Shuwen Deng and Doğuhan Gümüşoğlu and Wenjie Xiong and Y. Serhan Gener and Onur Demir and Jakub Szefer
2017/192 ( -- withdrawn -- )
Improved Hybrid Consensus Scheme with Privacy-preserving Property
Shuyang Tang and Zhiqiang Liu and Zhen Liu and Yu Long and Shengli Liu
2017/191 ( PDF )
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks
David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun
2017/190 ( PDF )
The first collision for full SHA-1
Marc Stevens and Elie Bursztein and Pierre Karpman and Ange Albertini and Yarik Markov
2017/189 ( PDF )
Global-Scale Secure Multiparty Computation
Xiao Wang and Samuel Ranellucci and Jonathan Katz
2017/188 ( PDF )
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer
Wenying Zhang and Vincent Rijmen
2017/187 ( PDF )
The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives
H. Gopalakrishna Gadiyar and R. Padma
2017/186 ( PDF )
A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies
Youngho Yoo and Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev
2017/185 ( PDF )
A Virtual Wiretap Channel for Secure MessageTransmission
Setareh Sharifian, and Reihaneh Safavi-Naini, and Fuchun Lin
2017/184 ( PDF )
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Guillaume Endignoux, Damian Vizár
2017/183 ( PDF )
Analysis of Software Countermeasures for Whitebox Encryption
Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Martin Bjerregaard Jepsen
2017/182 ( PDF )
The Approximate $k$-List Problem
Leif Both and Alexander May
2017/181 ( PDF )
New techniques for trail bounds and application to differential trails in Keccak
Silvia Mella and Joan Daemen and Gilles Van Assche
2017/180 ( PDF )
Robust Synchronous P2P Primitives Using SGX Enclaves
Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang
2017/179 ( PDF )
REM: Resource-Efficient Mining for Blockchains
Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse
2017/178 ( PDF )
Optimal Differential Trails in SIMON-like Ciphers
Zhengbin Liu and Yongqiang Li and Mingsheng Wang
2017/177 ( PDF )
Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets
Navid Nasr Esfahani, Ian Goldberg and D. R. Stinson
2017/176 ( PDF )
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge
Yuval Ishai and Mor Weiss
2017/175 ( PDF )
Analysis of Burn-in period for RC4 State Transition
Goutam Paul and Souvik Ray
2017/174 ( PDF )
Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes
Ruiyu Zhu and Yan Huang
2017/173 ( PDF )
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
Marc Stevens and Dan Shumow
2017/172 ( PDF )
On The Exact Security of Message Authentication Using Pseudorandom Functions
Ashwin Jha and Avradip Mandal and Mridul Nandi
2017/171 ( PDF )
Quantum Key Search with Side Channel Advice
Daniel P. Martin and Ashley Montanaro and Elisabeth Oswald and Dan Shepherd
2017/170 ( PDF )
Error-free protection of EC point multiplication by modular extension
Martin Seysen
2017/169 ( PDF )
UFace: Your Universal Password That No One Can See
Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
2017/168 ( PDF )
AES-GCM-SIV: Specification and Analysis
Shay Gueron and Adam Langley and Yehuda Lindell
2017/167 ( PDF )
Cloud Storage File Recoverability
Christian A. Gorke and Christian Janson and Frederik Armknecht and Carlos Cid
2017/166 ( PDF )
A roadmap to fully homomorphic elections: Stronger security, better verifiability
Kristian Gjøsteen and Martin Strand
2017/165 ( PDF )
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
Dhiman Saha and Sukhendu Kuila and Dipanwita Roy Chowdhury
2017/164 ( PDF )
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
Benny Applebaum and Barak Arkis and Pavel Raykov and Prashant Nalini Vasudevan
2017/163 ( PDF )
Homomorphic Encryption without Gaussian Noise
Anamaria Costache and Nigel P. Smart
2017/162 ( PDF )
Analysis of AES, SKINNY, and Others with Constraint Programming
Siwei Sun and David Gerault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu
2017/161 ( PDF )
Security Notions for Bidirectional Channels
Giorgia Azzurra Marson and Bertram Poettering
2017/160 ( PDF )
Conditional Cube Attack on Round-Reduced ASCON
Zheng Li and Xiaoyang Dong and Xiaoyun Wang
2017/159 ( PDF )
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
Xiaoyang Dong and Zheng Li and Xiaoyun Wang and Ling Qin
2017/158 ( PDF )
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy
Martin Potthast and Christian Forler and Eik List and Stefan Lucks
2017/157 ( PDF )
Detecting General Algebraic Manipulation Attacks
Kim Ramchen
2017/156 ( PDF )
Trust Is Risk: A Decentralized Financial Trust Platform
Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros
2017/155 ( PDF )
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning
Yoshinori Aono and Phong Q. Nguyen
2017/154 ( PDF )
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
Thorsten Kranz and Friedrich Wiemer and Gregor Leander
2017/153 ( PDF )
Storage Efficient Substring Searchable Symmetric Encryption
Iraklis Leontiadis and Ming Li
2017/152 ( PDF )
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
Fermi Ma and Mark Zhandry
2017/151 ( PDF )
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay
2017/150 ( PDF )
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
Elette Boyle and Niv Gilboa and Yuval Ishai
2017/149 ( PDF )
Bitcoin as a Transaction Ledger: A Composable Treatment
Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas
2017/148 ( PDF )
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data
Olivier Sanders and Cristina Onete and Pierre-Alain Fouque
2017/147 ( PDF )
Ad Hoc PSM Protocols: Secure Computation Without Coordination
Amos Beimel and Yuval Ishai and Eyal Kushilevitz
2017/146 ( PDF )
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Mohammad Hajiabadi and Bruce M. Kapron
2017/145 ( PDF )
The Multi-User Security of Double Encryption
Viet Tung Hoang and Stefano Tessaro
2017/144 ( PDF )
Privacy-Preserving Search of Similar Patients in Genomic Data
Gilad Asharov and Shai Halevi and Yehuda Lindell and Tal Rabin
2017/143 ( PDF )
Constraint-hiding Constrained PRFs for NC1 from LWE
Ran Canetti and Yilei Chen
2017/142 ( PDF )
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme
Jean-François Biasse and Thomas Espitau and Pierre-Alain Fouque and Alexandre Gélin and Paul Kirchner
2017/141 ( PDF )
Partitioned Group Password-Based Authenticated Key Exchange
Dario Fiore and Maria Isabel Gonzalez Vasco and Claudio Soriente
2017/140 ( PDF )
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Nina Bindel and Johannes Buchmann and Florian Göpfert and Markus Schmidt
2017/139 ( PDF )
Revisiting AES Related-Key Differential Attacks with Constraint Programming
David Gérault and Pascal Lafourcade and Marine Minier and Christine Solnon
2017/138 ( PDF )
How (not) to Use Welch's T-test in Side-Channel Security Evaluations
François-Xavier Standaert
2017/137 ( PDF )
Modifying an Enciphering Scheme after Deployment
Paul Grubbs and Thomas Ristenpart and Yuval Yarom
2017/136 ( PDF )
Dispersed Cryptography and the Quotient Ring Transform
Anna Johnston
2017/135 ( PDF )
Hashing Garbled Circuits for Free
Xiong Fan and Chaya Ganesh and Vladimir Kolesnikov
2017/134 ( PDF )
A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes
Ryan Stanley-Oakes
2017/133 ( PDF )
Composable and Robust Outsourced Storage
Christian Badertscher and Ueli Maurer
2017/132 ( PDF )
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
Roel Peeters, Jens Hermans and Aysajan Abidin
2017/131 ( PDF )
A Practical Multivariate Blind Signature Scheme
Albrecht Petzoldt and Alan Szepieniec and Mohamed Saied Emam Mohamed
2017/130 ( PDF )
Topology-Hiding Computation Beyond Logarithmic Diameter
Adi Akavia and Tal Moran
2017/129 ( PDF )
Sublinear Zero-Knowledge Arguments for RAM Programs
Payman Mohassel and Mike Rosulek and Alessandra Scafuro
2017/128 ( PDF )
New Collision Attacks on Round-Reduced Keccak
Kexin Qiao and Ling Song and Meicheng Liu and Jian Guo
2017/127 ( PDF )
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
Prabhanjan Ananth and Aayush Jain and Amit Sahai
2017/126 ( PDF )
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
Seny Kamara and Tarik Moataz
2017/125 ( PDF )
Non-Interactive Secure 2PC in the Offline/Online and Batch Settings
Payman Mohassel and Mike Rosulek
2017/124 ( PDF )
On the Exact Round Complexity of Self-Composable Two-Party Computation
Sanjam Garg and Susumu Kiyoshima and Omkant Pandey
2017/123 ( PDF )
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Rishab Goyal and Venkata Koppula and Brent Waters
2017/122 ( PDF )
One-Shot Verifiable Encryption from Lattices
Vadim Lyubashevsky and Gregory Neven
2017/121 ( PDF )
Twisted $\mu_4$-normal form for elliptic curves
David Kohel
2017/120 ( PDF )
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
Rishab Goyal and Venkata Koppula and Brent Waters
2017/119 ( PDF )
Quantum Authentication with Key Recycling
Christopher Portmann
2017/118 ( PDF )
A New Structural-Differential Property of 5-Round AES
Lorenzo Grassi and Christian Rechberger and and Sondre Rønjom
2017/117 ( PDF )
The SM9 Cryptographic Schemes
Zhaohui Cheng
2017/116 ( PDF )
Masking Proofs are Tight (and How to Exploit it in Security Evaluations)
Vincent Grosso and François-Xavier Standaert
2017/115 ( PDF )
An efficient self-blindable attribute-based credential scheme
Sietse Ringers and Eric Verheul and Jaap-Henk Hoepman
2017/114 ( PDF )
Zero-Knowledge Proofs of Proximity
Itay Berman and Ron D. Rothblum and Vinod Vaikuntanathan
2017/113 ( PDF )
Algebraic Fault Analysis of SHA-3
Pei Luo and Konstantinos Athanasiou and Yunsi Fei and Thomas Wahl
2017/112 ( PDF )
Zero-Knowledge Proxy Re-Identification Revisited
Xavier Bultel and Pascal Lafourcade
2017/111 ( PDF )
EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves
Jonathan Burns and Daniel Moore and Katrina Ray and Ryan Speers and Brian Vohaska
2017/110 ( PDF )
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Patrick McCorry and Siamak F. Shahandashti and Feng Hao
2017/109 ( PDF )
Unilaterally-Authenticated Key Exchange
Yevgeniy Dodis and Dario Fiore
2017/108 ( PDF )
Photonic Side Channel Attacks Against RSA
Elad Carmon and Jean-Pierre Seifert and Avishai Wool
2017/107 ( PDF )
Secure Logging with Crash Tolerance
Erik-Oliver Blass and Guevara Noubir
2017/106 ( PDF )
$\mu$chain: How to Forget without Hard Forks
Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
2017/105 ( PDF )
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem
Ling Yang and Fuyang Fang and Xianhui Lu and Wen-Tao Zhu and Qiongxiao Wang and Shen Yan and Shiran Pan
2017/104 ( PDF )
Implementing BP-Obfuscation Using Graph-Induced Encoding
Shai Halevi and Tzipora Halevi and Victor Shoup and Noah Stephens-Davidowitz
2017/103 ( PDF )
Reconciling d+1 Masking in Hardware and Software
Hannes Gross and Stefan Mangard
2017/102 ( PDF )
Quantum Authentication and Encryption with Key Recycling
Serge Fehr and Louis Salvail
2017/101 ( PDF )
Optimizing Implementations of Lightweight Building Blocks
Jérémy Jean and Thomas Peyrin and Siang Meng Sim
2017/100 ( PDF )
Private Puncturable PRFs From Standard Lattice Assumptions
Dan Boneh and Sam Kim and Hart Montgomery
2017/099 ( PDF )
Making NSEC5 Practical for DNSSEC
Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan Včelák and Leonid Reyzin and Sharon Goldberg
2017/098 ( PDF )
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions
Vanesa Daza and Nikolaos Makriyannis
2017/097 ( PDF )
Boolean functions with restricted input and their robustness; application to the FLIP cipher
Claude Carlet and Pierrick Méaux and Yann Rotella
2017/096 ( PDF )
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
Shota Yamada
2017/095 ( PDF )
Attacks on Secure Logging Schemes
Gunnar Hartung
2017/094 ( PDF )
Quantum Tokens for Digital Signatures
Shalev Ben-David and Or Sattath
2017/093 ( PDF )
On new multivariate cryptosystems based on hidden Eulerian equations over finite fields
Vasyl Ustimenko
2017/092 ( PDF )
Small CRT-Exponent RSA Revisited
Atsushi Takayasu and Yao Lu and Liqiang Peng
2017/091 ( PDF )
Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme
Vincent Herbert and Caroline Fontaine
2017/090 ( PDF )
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Saiyu Qi and Yichen Li and Yuanqing Zheng and Yong Qi
2017/089 ( PDF )
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
Yuri Borissov, and Peter Boyvalenkov, and Robert Tsenkov
2017/088 ( PDF )
A Differential Fault Attack on Plantlet
Subhamoy Maitra, Akhilesh Siddhanti
2017/087 ( PDF )
Cryptanalysis of full round Fruit
Sabyasachi Dey and Santanu Sarkar
2017/086 ( PDF )
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
David Derler and Sebastian Ramacher and Daniel Slamanig
2017/085 ( PDF )
Information Security Applications of Bit-Mixers
Laszlo Hars
2017/084 ( PDF )
Hardware Bit-Mixers
Laszlo Hars
2017/083 ( PDF )
Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders
Anna Johnston
2017/082 ( PDF )
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin and Felix Günther
2017/081 ( PDF )
Estonian Voting Verification Mechanism Revisited Again
Ivo Kubjas and Tiit Pikma and Jan Willemson
2017/080 ( PDF )
From Minicrypt to Obfustopia via Private-Key Functional Encryption
Ilan Komargodski and Gil Segev
2017/079 ( PDF )
Faster Bootstrapping of FHE over the Integers
Jung Hee Cheon and Kyoohyung Han and Duhyeong Kim
2017/078 ( PDF )
LPN Decoded
Andre Esser and Robert Kübler and Alexander May
2017/077 ( PDF )
Quantum algorithms for computing short discrete logarithms and factoring RSA integers
Martin Ekerå and Johan Håstad
2017/076 ( PDF )
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version)
Benjamin Lac and Anne Canteaut and Jacques Fournier and Renaud Sirdey
2017/075 ( PDF )
A First DFA on PRIDE: from Theory to Practice (extended version)
Benjamin Lac and Marc Beunardeau and Anne Canteaut and Jacques Fournier and Renaud Sirdey
2017/074 ( PDF )
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
Joo-Im Kim and Ji Won Yoon
2017/073 ( PDF )
Visual Honey Encryption: Application to Steganography
Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee and Kwangsu Lee
2017/072 ( PDF )
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes
Carmen Kempka and Ryo Kikuchi and Koutarou Suzuki
2017/071 ( PDF )
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2017/070 ( PDF )
Symbolic Models for Isolated Execution Environments
Charlie Jacomme and Steve Kremer and Guillaume Scerri
2017/069 ( PDF )
The Exact Security of PMAC
Peter Gaži and Krzysztof Pietrzak and Michal Rybár
2017/068 ( PDF )
Authenticated Encryption in the Face of Protocol and Side Channel Leakage
Guy Barwell and Daniel P. Martin and Elisabeth Oswald and Martijn Stam
2017/067 ( PDF )
Computation of a 768-bit prime field discrete logarithm
Thorsten Kleinjung and Claus Diem and Arjen K. Lenstra and Christine Priplata and Colin Stahlke
2017/066 ( PDF )
Subring Homomorphic Encryption
Seiko Arita and Sari Handa
2017/065 ( PDF )
FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
Daniel Benarroch and Zvika Brakerski and Tancrède Lepoint
2017/064 ( PDF )
Fast Montgomery-like Square Root Computation for All Trinomials
Yin Li and Yu Zhang
2017/063 ( PDF )
Optimal Extension Protocols for Byzantine Broadcast and Agreement
Chaya Ganesh and Arpita Patra
2017/062 ( PDF )
Efficient Maliciously Secure Two Party Computation for Mixed Programs
Arash Afshar and Payman Mohassel and Mike Rosulek
2017/061 ( PDF )
Continuous Collision Resistance and its Applications
Tibor Jager and Rafael Kurek
2017/060 ( PDF )
Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel and Marc Fischlin
2017/059 ( PDF )
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext
Kamalesh Acharya and Ratna Dutta
2017/058 ( PDF )
WalnutDSA(TM): A Quantum Resistant Group Theoretic Digital Signature Algorithm
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2017/057 ( PDF )
Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card
Mathias Wagner and Stefan Heyse
2017/056 ( PDF )
Verifiable Classroom Voting in Practice
Feng Hao and Dylan Clarke and Brian Randell and Siamak F. Shahandashti
2017/055 ( PDF )
A Probabilistic Baby-Step Giant-Step Algorithm
Prabhat Kushwaha and Ayan Mahalanobis
2017/054 ( PDF )
Attribute-Based Encryption Implies Identity-Based Encryption
Javier Herranz
2017/053 ( PDF )
Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem
Dimitar Jetchev and Benjamin Wesolowski
2017/052 ( PDF )
A short note on the security of Round-Robin Differential Phase-Shift QKD
Boris Skoric
2017/051 ( PDF )
A note on VRFs from Verifiable Functional Encryption
Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai
2017/050 ( PDF )
An Obfuscating Compiler
Peter T. Breuer
2017/049 ( PDF )
LARA - A Design Concept for Lattice-based Encryption
El Bansarkhani Rachid
2017/048 ( PDF )
ROTE: Rollback Protection for Trusted Execution
Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun
2017/047 ( PDF )
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
Martin R. Albrecht
2017/046 ( PDF )
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
Matthieu Giraud and Alexandre Anzala-Yamajako and Olivier Bernard and Pascal Lafourcade
2017/045 ( PDF )
Efficient Round-Optimal Blind Signatures in the Standard Model
Essam Ghadafi
2017/044 ( PDF )
Anonymous contribution of data
Matthew McKague and David Eyers
2017/043 ( PDF )
Accumulators with Applications to Anonymity-Preserving Revocation
Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov
2017/042 ( PDF )
Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient
Yuanxi Dai and Yannick Seurin and John Steinberger and Aishwarya Thiruvengadam
2017/041 ( PDF )
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy
Yongge Wang and Qutaibah m. Malluhi
2017/040 ( PDF )
Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions
Aggelos Kiayias and Feng-Hao Liu and Yiannis Tselekounis
2017/039 ( PDF )
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version)
Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
2017/038 ( PDF )
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
Fabrice Benhamouda and Florian Bourse and Helger Lipmaa
2017/037 ( PDF )
Double-base scalar multiplication revisited
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
2017/036 ( PDF )
Low-Complexity Cryptographic Hash Functions
Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan
2017/035 ( PDF )
Privacy-Preserving Classification on Deep Neural Network
Hervé Chabanne and Amaury de Wargny and Jonathan Milgram and Constance Morel and Emmanuel Prouff
2017/034 ( PDF )
Analysis of the NORX Core Permutation
Alex Biryukov and Aleksei Udovenko and Vesselin Velichkov
2017/033 ( PDF )
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Peter Pessl
2017/032 ( PDF )
Cryptanalysis of GlobalPlatform Secure Channel Protocols
Mohamed Sabt and Jacques Traoré
2017/031 ( PDF )
Honey Encryption for Language
Marc Beunardeau and Houda Ferradi and Rémi Géraud and David Naccache
2017/030 ( PDF )
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
Xiao Wang and Samuel Ranellucci and Jonathan Katz
2017/029 ( PDF )
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
Gene Itkis and Emily Shen and Mayank Varia and David Wilson and Arkady Yerukhimovich
2017/028 ( PDF )
A Decentralized PKI In A Mobile Ecosystem
Varun Chandrasekaran and Lakshminarayanan Subramanian
2017/027 ( PDF )
Scalable Multi-Party Private Set-Intersection
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2017/026 ( PDF )
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2017/025 ( PDF )
Improved Structure Preserving Signatures under Standard Bilinear Assumptions
Charanjit S. Jutla and Arnab Roy
2017/024 ( PDF )
Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases
Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann
2017/023 ( PDF )
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
Nuttapong Attrapadung
2017/022 ( PDF )
Privacy for Distributed Databases via (Un)linkable Pseudonyms
Jan Camenisch and Anja Lehmann
2017/021 ( PDF )
A Generic Approach to Constructing and Proving Verifiable Random Functions
Rishab Goyal and Susan Hohenberger and Venkata Koppula and Brent Waters
2017/020 ( PDF )
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
Olivier Levillain and Maxence Tury and Nicolas Vivet
2017/019 ( PDF )
SmartPool: Practical Decentralized Pooled Mining
Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena
2017/018 ( PDF )
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs
Nir Bitansky
2017/017 ( PDF )
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm
Gottfried Herold and Elena Kirshanova
2017/016 ( PDF )
Provable Security of Substitution-Permutation Networks
Yevgeniy Dodis and Jonathan Katz and John Steinberger and Aishwarya Thiruvengadam and Zhe Zhang
2017/015 ( PDF )
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/014 ( PDF )
ORAMs in a Quantum World
Tommaso Gagliardoni and Nikolaos P. Karvelas and Stefan Katzenbeisser
2017/013 ( PDF )
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
Meilof Veeningen
2017/012 ( PDF )
Universal Samplers with Fast Verification
Venkata Koppula and Andrew Poelstra and Brent Waters
2017/011 ( PDF )
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2017/010 ( PDF )
Circuit-Private Multi-Key FHE
Wutichai Chongchitmate and Rafail Ostrovsky
2017/009 ( PDF )
Access Control Encryption for Equality, Comparison, and More
Georg Fuchsbauer and Romain Gay and Lucas Kowalczyk and Claudio Orlandi
2017/008 ( PDF )
Externally Verifiable Oblivious RAM
Joshua Gancher and Adam Groce and Alex Ledger
2017/007 ( PDF )
Algebraic Attack Efficiency versus S-box Representation
Hossein Arabnezhad-Khanoki and Babak Sadeghiyan and Josef Pieprzyk
2017/006 ( PDF )
Reduced Mumford divisors of a genus 2 curve through its jacobian function field
Eduardo Ruiz Duarte
2017/005 ( PDF )
High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves
Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi
2017/004 ( PDF )
A New Approach for Practical Function-Private Inner Product Encryption
Sungwook Kim and Jinsu Kim and Jae Hong Seo
2017/003 ( PDF )
The STROBE protocol framework
Mike Hamburg
2017/002 ( -- withdrawn -- )
Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption
Ping Zhang, Honggang Hu, and Peng Wang
2017/001 ( PDF )
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
Jorge Luis Villar
2016/1196 ( PDF )
MASCAT: Stopping Microarchitectural Attacks Before Execution
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2016/1195 ( PDF )
Constant-Time Callees with Variable-Time Callers
Cesar Pereida García and Billy Bob Brumley
2016/1194 ( PDF )
Efficient Encryption from Random Quasi-Cyclic Codes
Carlos Aguilar and Olivier Blazy and Jean-Christophe Deneuville and Philippe Gaborit and Gilles Zémor
2016/1193 ( PDF )
Superscalar Encrypted RISC: Measure of a Secret Computer
Peter T. Breuer and Jonathan P. Bowen
2016/1192 ( PDF )
Non-Malleable Codes with Split-State Refresh
Antonio Faonio and Jesper Buus Nielsen
2016/1191 ( PDF )
On the Security of Practical and Complete Homomorphic Encrypted Computation
P.T. Breuer and J.P. Bowen
2016/1190 ( PDF )
Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam
2016/1189 ( PDF )
On the Bit Security of Elliptic Curve Diffie--Hellman
Barak Shani
2016/1188 ( PDF )
Farfalle: parallel permutation-based cryptography
Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
2016/1187 ( PDF )
Optimal Ate Pairing on Elliptic Curves with Embedding Degree 9,15 and 27
Emmanuel Fouotsa and Nadia El Mrabet and Aminatou Pecha
2016/1186 ( PDF )
On the Complexity of Breaking Pseudoentropy
Maciej Skorski
2016/1185 ( -- withdrawn -- )
A Digital Signature Scheme Based On Supersingular Isogeny Problem
Kisoon Yoon, Jihoon Kwon, and Suhri Kim
2016/1184 ( PDF )
Bitcoin Private Key Locked Transactions
Sergi Delgado-Segura and Cristina Pérez-Solà and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas
2016/1183 ( PDF )
Some Results on the Known Classes of Quadratic APN Functions
Lilya Budaghyan and Tor Helleseth and Nian Li and Bo Sun
2016/1182 ( PDF )
Public Key Encryption with Equality Test in the Standard Model
Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang and Taek-Young Youn
2016/1181 ( PDF )
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Yu Sasaki and Yosuke Todo
2016/1180 ( PDF )
How to Meet Big Data When Private Set Intersection Realizes Constatnt Communication Complexity
Sumit Kumar Debnath and Ratna Dutta
2016/1179 ( PDF )
Updatable Functional Encryption
Afonso Arriaga and Vincenzo Iovino and Qiang Tang
2016/1178 ( PDF )
Implementing and Proving the TLS 1.3 Record Layer
Karthikeyan Bhargavan and Antoine Delignat-Lavaud and Cédric Fournet and Markulf Kohlweiss and Jianyang Pan and Jonathan Protzenko and Aseem Rastogi and Nikhil Swamy and Santiago Zanella-Béguelin and Jean Karim Zinzindohoué
2016/1177 ( PDF )
Efficient Slide Attacks
Achiya Bar-On and Eli Biham and Orr Dunkelman and Nathan Keller
2016/1176 ( PDF )
Leakage of Signal function with reused keys in RLWE key exchange
Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott Fluhrer and Xiaodong Lin
2016/1175 ( PDF )
On the Security Notions for Homomorphic Signatures
Dario Catalano and Dario Fiore and Luca Nizzardo
2016/1174 ( PDF )
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
Eik List and Mridul Nandi
2016/1173 ( PDF )
Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring
Lijing Zhou, Licheng Wang and Yiru Sun
2016/1172 ( PDF )
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
Ping Zhang and Honggang Hu
2016/1171 ( PDF )
A Salad of Block Ciphers
Roberto Avanzi
2016/1170 ( PDF )
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
Christoph Dobraunig and Eik List
2016/1169 ( PDF )
LWE from Non-commutative Group Rings
Qi Cheng and Jun Zhang and Jincheng Zhuang
2016/1168 ( -- withdrawn -- )
Generic Zero-Knowledge and Multivariate Quadratic Systems
Alan Szepieniec and Bart Preneel
2016/1167 ( PDF )
Mobile Commerce: Secure Multi-party Computation & Financial Cryptography
Sumit Chakraborty
2016/1166 ( PDF )
Group key exchange protocols withstanding ephemeral-key reveals
Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Adriana Suarez Corona
2016/1165 ( PDF )
Efficient Transparent Redactable Signatures with a Single Signature Invocation
Stuart Haber and William Horne and Miaomiao Zhang
2016/1164 ( PDF )
Attacking FHE-based applications by software fault injections
Ilaria Chillotti and Nicolas Gama and Louis Goubin
2016/1163 ( PDF )
Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data
Wen-jie Lu and Shohei Kawasaki and Jun Sakuma
2016/1162 ( PDF )
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
Jian Guo and Jérémy Jean and Ivica Nikolic and Yu Sasaki
2016/1161 ( PDF )
Impossible Differential Attack on Simpira v2
Rui Zong and Xiaoyang Dong and Xiaoyun Wang
2016/1160 ( PDF )
Meet-in-the-Middle Attack on QARMA Block Cipher
Rui Zong and Xiaoyang Dong
2016/1159 ( PDF )
SPECTRE: A Fast and Scalable Cryptocurrency Protocol
Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar
2016/1158 ( PDF )
Activate Later Certificates for V2X -- Combining ITS efficiency with privacy
Eric R. Verheul
2016/1157 ( PDF )
NewHope without reconciliation
Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe
2016/1156 ( PDF )
Scripting smart contracts for distributed ledger technology
Pablo Lamela Seijas and Simon Thompson and Darryl McAdams
2016/1155 ( PDF )
Comparative Study of Various Approximations to the Covariance Matrix in Template Attacks
Mathias Wagner and Yongbo Hu and Chen Zhang and Yeyang Zheng
2016/1154 ( PDF )
Signature Schemes Based On Supersingular Isogeny Problems
Steven D. Galbraith and Christophe Petit and Javier Silva
2016/1153 ( PDF )
Attacks against search Poly-LWE
Momonari Kudo
2016/1152 ( PDF )
Leak Me If You Can: Does TVLA Reveal Success Rate?
Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Sikhar Patranabis and Debdeep Mukhopadhyay
2016/1151 ( PDF )
A Novel Multi-factor ID-based Designated Verifier Signature scheme
Mike Scott
2016/1150 ( PDF )
Simple Homomorphisms of Cocks IBE and Applications
Rio LaVigne
2016/1149 ( PDF )
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
Krishna Bagadia and Urbi Chatterjee and Debapriya Basu Roy and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty
2016/1148 ( PDF )
Splinter: Practical Private Queries on Public Data
Frank Wang and Catherine Yun and Shafi Goldwasser and Vinod Vaikuntanathan and Matei Zaharia
2016/1147 ( PDF )
Cryptanalysis of a certificateless aggregate signature scheme
Nasrollah Pakniat, Mahnaz Noroozi
2016/1146 ( PDF )
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme
Zengpeng Li and Steven D. Galbraith and Chunguang Ma
2016/1145 ( PDF )
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
Merrielle Spain and Mayank Varia
2016/1144 ( PDF )
Private Projections & Variants
Xavier Carpent and Sky Faber and Tomas Sander and Gene Tsudik
2016/1143 ( PDF )
Ciphertext and Plaintext Leakage Reveals the Entire TDES Key
Yongbo Hu and Chen Zhang and Yeyang Zheng and Mathias Wagner
2016/1142 ( PDF )
New construction of single-cycle T-function families
Shiyi ZHANG and Yongjuan WANG and Guangpu GAO
2016/1141 ( PDF )
An Oblivious Parallel RAM with $O(\log^2 N)$ Parallel Runtime Blowup
Kartik Nayak and Jonathan Katz
2016/1140 ( PDF )
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
Xiaoyi Li and Kaitai Liang and Zhen Liu and Duncan S. Wong
2016/1139 ( -- withdrawn -- )
Comments on “Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof”
Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
2016/1138 ( PDF )
Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups
Takeshi Koshiba and Katsuyuki Takashima
2016/1137 ( PDF )
New Impossible Differential Characteristic of SPECK64 using MILP
HoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2016/1136 ( PDF )
Cryptography During the French and American Wars in Vietnam
Phan Duong Hieu and Neal Koblitz
2016/1135 ( PDF )
Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
Thorben Moos and Amir Moradi and Bastian Richter
2016/1134 ( PDF )
Privacy-preserving Hybrid Recommender System
Qiang Tang and Husen Wang
2016/1133 ( PDF )
Implementing Complete Formulas on Weierstrass Curves in Hardware
Pedro Maat C. Massolino and Joost Renes and Lejla Batina
2016/1132 ( PDF )
Some results on ACORN
Dibyendu Roy and Sourav Mukhopadhyay
2016/1131 ( PDF )
New construction of single cycle T-function families
Shiyi ZHANG and Yongjuan WANG and Guangpu GAO
2016/1130 ( PDF )
Are RNGs Achilles’ heel of RFID Security and Privacy Protocols ?
Atakan Arslan and Suleyman Kardas and Sultan Aldirmaz and Sarp Erturk
2016/1129 ( PDF )
Certificateless Public Key Encryption with Equality Test
Xi-Jun Lin, Zhen Yan, Qi Zhang and Haipeng Qu
2016/1128 ( PDF )
Modifying Shor’s algorithm to compute short discrete logarithms
Martin Ekerå
2016/1127 ( PDF )
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang
2016/1126 ( PDF )
Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
Jung Hee Cheon and Duhyeong Kim and Joohee Lee and Yongsoo Song
2016/1125 ( PDF )
Estonian Voting Verification Mechanism Revisited
Koksal Mus and Mehmet Sabir Kiraz and Murat Cenk and Isa Sertkaya
2016/1124 ( PDF )
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
Kazuya Imamura and Kazuhiko Minematsu and Tetsu Iwata
2016/1123 ( PDF )
Dude, is my code constant time?
Oscar Reparaz and Josep Balasch and Ingrid Verbauwhede
2016/1122 ( PDF )
Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought)
B. Skoric and M. de Vries
2016/1121 ( PDF )
Insecurity of RCB: Leakage-Resilient Authenticated Encryption
Farzaneh abed and Francesco Berti and Stefan Lucks
2016/1120 ( PDF )
Cryptanalysis of Reduced round SKINNY Block Cipher
Sadegh Sadeghi and Tahere Mohammadi and Nasour Bagheri
2016/1119 ( PDF )
A Code-Based Group Signature Scheme
Quentin Alamélou and Olivier Blazy and Stéphane Cauchie and Philippe Gaborit
2016/1118 ( PDF )
Designing Optimal Implementations of Linear Layers (Full Version)
Ruoxin Zhao and Baofeng Wu and Rui Zhang and Qian Zhang
2016/1117 ( PDF )
Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling
Joppe W. Bos and Wouter Castryck and and Ilia Iliashenko and Frederik Vercauteren
2016/1116 ( PDF )
Evaluating Entropy for TRNGs: Efficient, Robust and Provably Secure
Maciej Skorski
2016/1115 ( PDF )
Impossible Differential Cryptanalysis of Reduced-Round SKINNY
Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef
2016/1114 ( PDF )
Full Disk Encryption: Bridging Theory and Practice
Louiza Khati and Nicky Mouha and Damien Vergnaud
2016/1113 ( PDF )
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures
Sabyasachi Dutta and Tamal Bhore and Avishek Adhikari
2016/1112 ( PDF )
Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes
Victor Cauchois and Pierre Loidreau and Nabil Merkiche
2016/1111 ( PDF )
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
Pascal Sasdrich and Amir Moradi and Tim Güneysu
2016/1110 ( PDF )
Efficient Post-Quantum Zero-Knowledge and Signatures
Steven Goldfeder and Melissa Chase and Greg Zaverucha
2016/1109 ( PDF )
Practical CCA2-Secure and Masked Ring-LWE Implementation
Tobias Oder and Tobias Schneider and Thomas Pöppelmann and Tim Güneysu
2016/1108 ( PDF )
Security Analysis of SKINNY under Related-Tweakey Settings
Guozhen Liu and Mohona Ghosh and Ling Song
2016/1107 ( PDF )
Magic Adversaries Versus Individual Reduction: Science Wins Either Way
Yi Deng
2016/1106 ( PDF )
Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption
Romain Gay
2016/1105 ( PDF )
Generic Transformations of Predicate Encodings: Constructions and Applications
Miguel Ambrona and Gilles Barthe and Benedikt Schmidt
2016/1104 ( PDF )
Practical Functional Encryption for Bilinear Forms
Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore
2016/1103 ( PDF )
A Fast Single-Key Two-Level Universal Hash Function
Debrup Chakraborty and Sebati Ghosh and Palash Sarkar
2016/1102 ( PDF )
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography
Alfred Menezes and Palash Sarkar and Shashank Singh
2016/1101 ( PDF )
MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher
Ling Sun, Wei Wang, Ru Liu, Meiqin Wang
2016/1100 ( PDF )
Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors
Quentin Alamélou and Paul-Edmond Berthier and Stéphane Cauchie and Benjamin Fuller and Philippe Gaborit
2016/1099 ( PDF )
Improved Parameters for the Ring-TESLA Digital Signature Scheme
Arjun Chopra
2016/1098 ( PDF )
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP
Zhiyuan Guo and Wenling Wu and Renzhang Liu and Liting Zhang
2016/1097 ( PDF )
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps
Prabhanjan Ananth and Amit Sahai
2016/1096 ( PDF )
Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
Huijia Lin
2016/1095 ( PDF )
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
Noboru Kunihiro and Yuki Takahashi
2016/1094 ( PDF )
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
Yohei Watanabe and Keita Emura and Jae Hong Seo
2016/1093 ( PDF )
Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing
Siva Nishok Dhanuskodi and Daniel Holcomb
2016/1092 ( PDF )
Parametrizations for Families of ECM-friendly curves
Alexandre Gélin and Thorsten Kleinjung and Arjen K. Lenstra
2016/1091 ( PDF )
On the Entropy of Oscillator-Based True Random Number Generators
Yuan Ma and Jingqiang Lin and Jiwu Jing
2016/1090 ( PDF )
OleF: An Inverse-Free Online Cipher
Ritam Bhaumik and Mridul Nandi
2016/1089 ( PDF )
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
Jérémy Chotard and Duong Hieu Phan and David Pointcheval
2016/1088 ( PDF )
How to infinitely share a secret more efficiently
Anat Paskin-Cherniavsky
2016/1087 ( PDF )
CENC is Optimally Secure
Tetsu Iwata and Bart Mennink and Damian Vizár
2016/1086 ( PDF )
An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model
Reyhaneh Rabaninejad and Mohammad Hassan Ameri and Mahshid Delavar and Javad Mohajeri
2016/1085 ( PDF )
Digital Signatures from Symmetric-Key Primitives
David Derler and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig
2016/1084 ( PDF )
Circuit OPRAM: A Unifying Framework for Statistically and Computationally Secure ORAMs and OPRAMs
T-H. Hubert Chan and Elaine Shi
2016/1083 ( PDF )
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks
Dingding Jia and Xianhui Lu and Bao Li
2016/1082 ( PDF )
My traces learn what you did in the dark: recovering secret signals without key guesses
Si Gao and Hua Chen and Wenling Wu and Limin Fan and Weiqiong Cao and Xiangliang Ma
2016/1081 ( PDF )
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption
David Nuñez, and Isaac Agudo, and Javier Lopez
2016/1080 ( PDF )
Does Coupling Affect the Security of Masked Implementations?
Thomas De Cnudde and Begül Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen
2016/1079 ( PDF )
Revisiting the Cubic UOV Signature Scheme
Dung Hoang Duong and Takanori Yasuda and Albrecht Petzoldt and Yacheng Wang and Tsuyoshi Takagi
2016/1078 ( PDF )
Construction of $n$-variable ($n\equiv 2 \bmod 4$) balanced Boolean functions with maximum absolute value in autocorrelation spectra $< 2^{\frac n2}$
Deng Tang and Subhamoy Maitra
2016/1077 ( PDF )
Blurry-ORAM: A Multi-Client Oblivious Storage Architecture
N. P. Karvelas and Andreas Peter and Stefan Katzenbeisser
2016/1076 ( PDF )
A Note on Quantum-Secure PRPs
Mark Zhandry
2016/1075 ( PDF )
Cryptanalysis of Simple Matrix Scheme for Encryption
Chunsheng Gu
2016/1074 ( PDF )
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
Thomas Unterluggauer and Mario Werner and Stefan Mangard
2016/1073 ( PDF )
Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks
Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer
2016/1072 ( PDF )
Game-Theoretic Security for Two-Party Protocols
Haruna Higo and Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga
2016/1071 ( PDF )
Iron: Functional Encryption using Intel SGX
Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
2016/1070 ( PDF )
Preventing CLT Attacks on Obfuscation with Linear Overhead
Rex Fernando and Peter M. R. Rasmussen and Amit Sahai
2016/1069 ( PDF )
Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO
Jesper Buus Nielsen and Thomas Schneider and Roberto Trifiletti
2016/1068 ( PDF )
On Finding Short Cycles in Cryptographic Algorithms
Elena Dubrova and Maxim Teslenko
2016/1067 ( PDF )
Scalable Bias-Resistant Distributed Randomness
Ewa Syta and Philipp Jovanovic and Eleftherios Kokoris Kogias and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Michael J. Fischer and Bryan Ford
2016/1066 ( PDF )
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
Aner Ben-Efraim and Yehuda Lindell and Eran Omri
2016/1065 ( PDF )
Revisiting the Efficient Key Generation of ZHFE
Yasuhiko Ikematsu and Dung H. Duong and Albrecht Petzoldt and Tsuyoshi Takagi
2016/1064 ( PDF )
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
David Derler and Stephan Krenn and Daniel Slamanig
2016/1063 ( PDF )
Log-Structure Authenticated Data Storage with Minimal Trust
Yuzhe Tang and Ju Chen
2016/1062 ( PDF )
Catena: Efficient Non-equivocation via Bitcoin
Alin Tomescu and Srinivas Devadas
2016/1061 ( PDF )
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
Joan Daemen
2016/1060 ( PDF )
On Analyzing Program Behavior Under Fault Injection Attacks
Jakub Breier
2016/1059 ( PDF )
The INT-RUP Security of OCB with Intermediate (Parity) Checksum
Ping Zhang, Peng Wang, and Honggang Hu
2016/1058 ( PDF )
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Markku-Juhani O. Saarinen
2016/1057 ( PDF )
Secure Multiparty Computation from SGX
Raad Bahmani and Manuel Barbosa and Ferdinand Brasser and Bernardo Portela and Ahmad-Reza Sadeghi and Guillaume Scerri and Bogdan Warinschi
2016/1056 ( PDF )
A Tool Kit for Partial Key Exposure Attacks on RSA
Atsushi Takayasu and Noboru Kunihiro
2016/1055 ( PDF )
A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE
Jung Hee Cheon, Kyoo Hyung Han, Jinsu Kim, Changmin Lee, and Yongha Son
2016/1054 ( PDF )
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
Giulio Malavolta and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei
2016/1053 ( PDF )
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
Ashutosh Dhar Dwivedi and Miloš Klouček and Pawel Morawiecki and Ivica Nikolić and Josef Pieprzyk and Sebastian Wójtowicz
2016/1052 ( PDF )
Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2016/1051 ( PDF )
Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System
Shuai Han and Shengli Liu and Lin Lyu
2016/1050 ( PDF )
Cryptographic decoding of the Leech lattice
Alex van Poppelen
2016/1049 ( PDF )
Randomized stopping times and provably secure pseudorandom permutation generators
Michal Kulis and Pawel Lorek and Filip Zagorski
2016/1048 ( PDF )
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
Juan A. Garay and Aggelos Kiayias and Nikos Leonardos
2016/1047 ( PDF )
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Eyal Ronen and Colin O’Flynn and Adi Shamir and Achi-Or Weingarten
2016/1046 ( PDF )
Efficient Finite field multiplication for isogeny based post quantum cryptography
Angshuman karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2016/1045 ( PDF )
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography
Brian Koziel, Reza Azarderakhsh, David Jao, and Mehran Mozaffari-Kermani
2016/1044 ( PDF )
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani
2016/1043 ( PDF )
Concurrently Composable Security With Shielded Super-polynomial Simulators
Brandon Broadnax and Nico Döttling and Gunnar Hartung and Jörn Müller-Quade and Matthias Nagel
2016/1042 ( PDF )
"Oops, I did it again" -- Security of One-Time Signatures under Two-Message Attacks
Leon Groot Bruinderink and Andreas Hülsing
2016/1041 ( PDF )
XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data
Chia-Mu Yu
2016/1040 ( PDF )
Semi-Honest Secure Multiparty Computation Can Be Insecure with Use of Even Almost Uniformly Random Number Generators
Koji Nuida
2016/1039 ( PDF )
A Fiat-Shamir Implementation Note
Simon Cogliani and Rémi Géraud and David Naccache
2016/1038 ( PDF )
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries
Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
2016/1037 ( PDF )
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
Dawid Gawel and Maciej Kosarzecki and Poorvi L. Vora and Hua Wu and Filip Zagorski
2016/1036 ( PDF )
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers
Zhiyuan Guo and Renzhang Liu and Wenling Wu and Dongdai Lin
2016/1035 ( PDF )
Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection
Maciej Skorski
2016/1034 ( PDF )
Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha
Arka Rai Choudhuri and Subhamoy Maitra
2016/1033 ( PDF )
Decentralized Anonymous Micropayments
Alessandro Chiesa and Matthew Green and Jingcheng Liu and Peihan Miao and Ian Miers and Pratyush Mishra
2016/1032 ( PDF )
Efficient Covert Two-Party Computation
Stanislaw Jarecki
2016/1031 ( PDF )
A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security
Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen
2016/1030 ( PDF )
Novel Inner Product Encryption Resistant to Partial Collusion Attacks
Yuqiao Deng, Ge Song
2016/1029 ( PDF )
Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family
Yuqiao Deng, Ge Song
2016/1028 ( PDF )
Ratcheted Encryption and Key Exchange: The Security of Messaging
Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs
2016/1027 ( PDF )
Formal Abstractions for Attested Execution Secure Processors
Rafael Pass and Elaine Shi and Florian Tramer
2016/1026 ( PDF )
Sharper Ring-LWE Signatures
Paulo S. L. M. Barreto and Patrick Longa and Michael Naehrig and Jefferson E. Ricardini and Gustavo Zanon
2016/1025 ( PDF )
An Algorithm for Counting the Number of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity
Wenlun Pan and Zhenzhen Bao and Dongdai Lin and Feng Liu
2016/1024 ( PDF )
LDA-Based Clustering as a Side-Channel Distinguisher
Rauf Mahmudlu and Valentina Banciu and Lejla Batina and Ileana Buhan
2016/1023 ( PDF )
Constant-Time Higher-Order Boolean-to-Arithmetic Masking
Michael Hutter and Michael Tunstall
2016/1022 ( PDF )
Randomized Mixed-Radix Scalar Multiplication
Eleonora Guerrini and Laurent Imbert and Théo Winterhalter
2016/1021 ( PDF )
Cryptographic Randomness on a CC2538: a Case Study
Yan Yan and Elisabeth Oswald and Theo Tryfonas
2016/1020 ( PDF )
KDM Security for Identity-Based Encryption: Constructions and Separations
Yu Chen and Jiang Zhang and Yi Deng and Jinyong Chang
2016/1019 ( PDF )
Faster Homomorphic Evaluation of Discrete Fourier Transforms
Anamaria Costache and Nigel P. Smart and Srinivas Vivek
2016/1018 ( PDF )
IKP: Turning a PKI Around with Blockchains
Stephanos Matsumoto and Raphael M. Reischuk
2016/1017 ( PDF )
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project
Douglas Stebila and Michele Mosca
2016/1016 ( PDF )
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
Mihir Bellare and Bertram Poettering and Douglas Stebila
2016/1015 ( PDF )
MaxLength Considered Harmful to the RPKI
Yossi Gilad and Omar Sagga and Sharon Goldberg
2016/1014 ( PDF )
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme
Liqun Chen and Thalia M. Laing and Keith M. Martin
2016/1013 ( PDF )
A Formal Security Analysis of the Signal Messaging Protocol
Katriel Cohn-Gordon and Cas Cremers and Benjamin Dowling and Luke Garratt and Douglas Stebila
2016/1012 ( PDF )
Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016)
Damien Vergnaud
2016/1011 ( PDF )
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
Jean-Sébastien Coron and Moon Sung Lee and Tancrède Lepoint and Mehdi Tibouchi
2016/1010 ( PDF )
Are We There Yet? On RPKI's Deployment and Security
Yossi Gilad and Avichai Cohen and Amir Herzberg and Michael Schapira and Haya Shulman
2016/1009 ( PDF )
Efficient Resettably Secure Two-Party Computation
Tobias Nilges
2016/1008 ( PDF )
KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols
Jorge Munilla
2016/1007 ( PDF )
A survey of attacks on Ethereum smart contracts
Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli
2016/1006 ( PDF )
The Security of NTP’s Datagram Protocol
Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and Haydn Kennedy and Jonathan Gardner and Sharon Goldberg
2016/1005 ( PDF )
Atomic-AES v2.0
Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
2016/1004 ( PDF )
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
Stefan Dziembowski and Sebastian Faust and Francois-Xavier Standaert
2016/1003 ( PDF )
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
Daniel Apon and Nico Döttling and Sanjam Garg and Pratyay Mukherjee
2016/1002 ( PDF )
Decryption phase in Norwegian electronic voting
Anders Smedstuen Lund and Martin Strand
2016/1001 ( PDF )
Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs
Amit Jana and Goutam Paul
2016/1000 ( -- withdrawn -- )
Solving Trapdoor Basis of Ideal Lattice from Public Basis
Yupu Hu and Zhizhu Lian and Jiangshan Chen
2016/999 ( PDF )
Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS
Kristen Dorey and Nicholas Chang-Fong and Aleksander Essex
2016/998 ( PDF )
Cryptanalyses of Candidate Branching Program Obfuscators
Yilei Chen and Craig Gentry and Shai Halevi
2016/997 ( PDF )
Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems
Carsten Baum and Ivan Damgård and Sabine Oechsner and Chris Peikert
2016/996 ( PDF )
Leakage-Resilient and Misuse-Resistant Authenticated Encryption
Francesco Berti and François Koeune and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2016/995 ( PDF )
Measuring small subgroup attacks against Diffie-Hellman
Luke Valenta and David Adrian and Antonio Sanso and Shaanan Cohney and Joshua Fried and Marcella Hastings and J. Alex Halderman and Nadia Heninger
2016/994 ( PDF )
Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
Leonid Reyzin and Dmitry Meshkov and Alexander Chepurnoy and Sasha Ivanov
2016/993 ( PDF )
Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks
Liran Lerman and Olivier Markowitch and Nikita Veshchikov
2016/992 ( PDF )
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
Matthew Amy and Olivia Di Matteo and Vlad Gheorghiu and Michele Mosca and Alex Parent and John Schanck
2016/991 ( PDF )
Bootstrapping the Blockchain --- Directly
Juan A. Garay and Aggelos Kiayias and Nikos Leonardos and Giorgos Panagiotakos
2016/990 ( PDF )
Revisiting the Wrong-Key-Randomization Hypothesis
Tomer Ashur and Tim Beyne and Vincent Rijmen
2016/989 ( PDF )
Scrypt is Maximally Memory-Hard
Joël Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro
2016/988 ( PDF )
On Probabilistic Checking in Perfect Zero Knowledge
Eli Ben-Sasson and Alessandro Chiesa and Michael A. Forbes and Ariel Gabizon and Michael Riabzev and Nicholas Spooner
2016/987 ( PDF )
A Key to Success -- Success Exponents for Side-Channel Distinguishers
Sylvain Guilley and Annelie Heuser and Olivier Rioul
2016/986 ( PDF )
Fast Arithmetic Modulo $2^xp^y\pm 1$
Joppe W. Bos and Simon Friedberger
2016/985 ( PDF )
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
Dario Fiore and Cédric Fournet and Esha Ghosh and Markulf Kohlweiss and Olga Ohrimenko and Bryan Parno
2016/984 ( PDF )
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)
Daniel Dinu and Léo Perrin and Aleksei Udovenko and Vesselin Velichkov and Johann Großschädl and Alex Biryukov
2016/983 ( PDF )
Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions
Avijit Dutta and Ashwin Jha and Mridul Nandi
2016/982 ( PDF )
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
Christopher Huth and Daniela Becker and Jorge Guajardo and Paul Duplys and Tim Güneysu
2016/981 ( PDF )
Efficient No-dictionary Verifiable SSE
Wakaha Ogata and Kaoru Kurosawa
2016/980 ( PDF )
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices
Ning Zhang and Kun Sun and Deborah Shands and Wenjing Lou and Y. Thomas Hou
2016/979 ( PDF )
The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented
Zhengjun Cao, Lihua Liu
2016/978 ( PDF )
Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging
Muhammad Yasin and Ozgur Sinanoglu and Jeyavijayan Rajendran
2016/977 ( PDF )
Side channels in deduplication: trade-offs between leakage and efficiency
Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Mohsen Toorani
2016/976 ( PDF )
On Adaptively Secure Multiparty Computation with a Short CRS
Ran Cohen and Chris Peikert
2016/975 ( PDF )
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties
Gina Gallegos-Garcia and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan
2016/974 ( PDF )
Server-Aided Revocable Identity-Based Encryption from Lattices
Khoa Nguyen and Huaxiong Wang and Juanyang Zhang
2016/973 ( PDF )
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
Jian Guo and Jérémy Jean and Ivica Nikolić and Kexin Qiao and Yu Sasaki and Siang Meng Sim
2016/972 ( PDF )
Revealing Encryption for Partial Ordering
Helene Haagh and Yue Ji and Chenxing Li and Claudio Orlandi and and Yifan Song
2016/971 ( PDF )
Authenticated communication from Quantum Readout of PUFs
B. Skoric and P.W.H. Pinkse and A.P. Mosk
2016/970 ( PDF )
Statistical Analysis for Access-Driven Cache Attacks Against AES
Liwei Zhang; A. Adam Ding; Yunsi Fei; Zhen Hang Jiang
2016/969 ( PDF )
Garbling Gadgets for Boolean and Arithmetic Circuits
Marshall Ball and Tal Malkin and Mike Rosulek
2016/968 ( PDF )
System Clock and Power Supply Cross-Checking for Glitch Detection
Pei Luo and Chao Luo and Yunsi Fei
2016/967 ( PDF )
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo and Yunsi Fei
2016/966 ( PDF )
High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2m)
Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2016/965 ( PDF )
A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds
Maciej Skorski
2016/964 ( PDF )
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
Lorenzo Grassi and Christian Rechberger
2016/963 ( PDF )
Efficient compression of SIDH public keys
Craig Costello and David Jao and Patrick Longa and Michael Naehrig and Joost Renes and David Urbanik
2016/962 ( PDF )
On Removing Graded Encodings from Functional Encryption
Nir Bitansky and Huijia Lin and Omer Paneth
2016/961 ( PDF )
A kilobit hidden SNFS discrete logarithm computation
Joshua Fried and Pierrick Gaudry and Nadia Heninger and Emmanuel Thomé
2016/960 ( PDF )
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
Gorjan Alagic and Alexander Russell
2016/959 ( PDF )
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
Shashank Agrawal and Venkata Koppula and Brent Waters
2016/958 ( PDF )
SafeDeflate: compression without leaking secrets
Michał Zieliński
2016/957 ( PDF )
Computing generator in cyclotomic integer rings
Thomas Espitau and Pierre-Alain Fouque and Alexandre Gélin and Paul Kirchner
2016/956 ( PDF )
Two Simple Composition Theorems with H-coefficients
Jacques Patarin
2016/955 ( PDF )
Constant-deposit multiparty lotteries on Bitcoin
Massimo Bartoletti and Roberto Zunino
2016/954 ( PDF )
Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria
WeiGuo Zhang and Enes Pasalic
2016/953 ( PDF )
Collusion-Resistant Broadcast Encryption with Tight Reductions and Beyond
Linfeng Zhou
2016/952 ( PDF )
ISAP -- Towards Side-Channel Secure Authenticated Encryption
Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer
2016/951 ( PDF )
Revisiting Covert Multiparty Computation
Geoffroy Couteau
2016/950 ( PDF )
Orthogonalized Lattice Enumeration for Solving SVP
Zhongxiang Zheng and Xiaoyun Wang and Guangwu Xu and Yang Yu
2016/949 ( PDF )
Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings
Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au
2016/948 ( PDF )
Secure Computation in Online Social Networks
Foteini Baldimtsi and Dimitrios Papadopoulos and Stavros Papadopoulos and Alessandra Scafuro and Nikos Triandopoulos
2016/947 ( PDF )
Isogeny graphs of ordinary abelian varieties
Ernest Hunter Brooks and Dimitar Jetchev and Benjamin Wesolowski
2016/946 ( PDF )
Bitsliced Masking and ARM: Friends or Foes?
Wouter de Groot and Kostas Papagiannopoulos and Antonio de La Piedra and Erik Schneider and Lejla Batina
2016/945 ( PDF )
High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers
Kostas Papapagiannopoulos
2016/944 ( PDF )
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
Jun Furukawa and Yehuda Lindell and Ariel Nof and Or Weinstein
2016/943 ( PDF )
Stadium: A Distributed Metadata-Private Messaging System
Nirvan Tyagi and Yossi Gilad and Matei Zaharia and Nickolai Zeldovich
2016/942 ( PDF )
Optimizing Secure Computation Programs with Private Conditionals
Peeter Laud and Alisa Pankova
2016/941 ( PDF )
A New Class of Differentially 4-uniform Permutations from the Inverse Function
Jian Bai and Dingkang Wang
2016/940 ( PDF )
Fast Actively Secure OT Extension for Short Secrets
Arpita Patra and Pratik Sarkar and Ajith Suresh
2016/939 ( PDF )
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses
Brice Colombier and Lilian Bossuet, and David Hély and Viktor Fischer
2016/938 ( PDF )
Kummer for Genus One over Prime Order Fields
Sabyasachi Karati and Palash Sarkar
2016/937 ( PDF )
A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences
Nur Azman Abu and Shekh Faisal Abdul-Latip and Muhammad Rezal Kamel Ariffin
2016/936 ( PDF )
Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring
Vadim N. Tsypyschev
2016/935 ( PDF )
Concealing Secrets in Embedded Processors Designs
Hannes Gross and Manuel Jelinek and Stefan Mangard and Thomas Unterluggauer and Mario Werner
2016/934 ( PDF )
Cryptography with Updates
Prabhanjan Ananth and Aloni Cohen and Abhishek Jain
2016/933 ( PDF )
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection
Michele Orrù and Emmanuela Orsini and Peter Scholl
2016/932 ( PDF )
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks
Jakub Breier and Dirmanto Jap and Shivam Bhasin
2016/931 ( PDF )
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (Extended Version)
Jakub Breier and Xiaolu Hou
2016/930 ( PDF )
Scalable Private Set Intersection Based on OT Extension
Benny Pinkas and Thomas Schneider and Michael Zohner
2016/929 ( PDF )
A Generalized Ideal Secret Sharing Scheme
Tanujay Sha
2016/928 ( PDF )
The complexity of the connected graph access structure on seven participants
Massoud Hadian Dehkordi and Ali Safi
2016/927 ( PDF )
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
2016/926 ( PDF )
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
Matthias Hamann and Matthias Krause and Willi Meier
2016/925 ( PDF )
Secure Channel Injection and Anonymous Proofs of Account Ownership
Liang Wang and Rafael Pass and abhi shelat and Thomas Ristenpart
2016/924 ( PDF )
Bit Coincidence Mining Algorithm II
Koh-ichi Nagao
2016/923 ( PDF )
Attacking embedded ECC implementations through cmov side channels
Erick Nascimento and Lukasz Chmielewski and David Oswald and Peter Schwabe
2016/922 ( PDF )
Leakage Characterizing and Detecting Based on Communication Theory
Wei Yang and Yuchen Cao and Ke Ma and Hailong Zhang and Yongbin Zhou and Baofeng Li
2016/921 ( PDF )
Breaking Cryptographic Implementations Using Deep Learning Techniques
Houssem Maghrebi and Thibault Portigliatti and Emmanuel Prouff
2016/920 ( PDF )
Breaking Web Applications Built On Top of Encrypted Data
Paul Grubbs and Richard McPherson and Muhammad Naveed and Thomas Ristenpart and Vitaly Shmatikov
2016/919 ( PDF )
Snow White: Provably Secure Proofs of Stake
Phil Daian and Rafael Pass and Elaine Shi
2016/918 ( PDF )
The Sleepy Model of Consensus
Rafael Pass and Elaine Shi
2016/917 ( PDF )
Hybrid Consensus: Efficient Consensus in the Permissionless Model
Rafael Pass and Elaine Shi
2016/916 ( PDF )
FruitChains: A Fair Blockchain
Rafael Pass and Elaine Shi
2016/915 ( PDF )
Transparency Overlays and Applications
Melissa Chase and Sarah Meiklejohn
2016/914 ( PDF )
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
Gora Adj and Isaac Canales-Martínez and Nareli Cruz-Cortés and Alfred Menezes and Thomaz Oliveira and Luis Rivera-Zamarripa and Francisco Rodríguez-Henríquez
2016/913 ( PDF )
Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15
Boru Gong and Yunlei Zhao
2016/912 ( PDF )
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
Gilles Barthe and François Dupressoir and Sebastian Faust and Benjamin Grégoire and François-Xavier Standaert and Pierre-Yves Strub
2016/911 ( PDF )
The Shortest Signatures Ever
Mohamed Saied Emam Mohamed and Albrecht Petzoldt
2016/910 ( PDF )
The closest vector problem in tensored root lattices of type A and in their duals
Léo Ducas and Wessel P.J. van Woerden
2016/909 ( PDF )
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation
Bo-Yuan Peng and Yuan-Che Hsu and Yu-Jia Chen and Di-Chia Chueh and Chen-Mou Cheng and Bo-Yin Yang
2016/908 ( PDF )
Secure Error-Tolerant Graph Matching Protocols
Kalikinkar Mandal and Basel Alomair and Radha Poovendran
2016/907 ( PDF )
Cut-and-Choose for Garbled RAM
Peihan Miao
2016/906 ( PDF )
On Basing Search SIVP on NP-Hardness
Tianren Liu
2016/905 ( PDF )
Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI$^+$ protocols
Masoumeh Safkhani and Nasour Bagheri
2016/904 ( PDF )
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2016/903 ( PDF )
From Indifferentiability to Constructive Cryptography (and Back)
Ueli Maurer and Renato Renner
2016/902 ( PDF )
Universally Composable Cryptographic Role-Based Access Control
Bin Liu and Bogdan Warinschi
2016/901 ( PDF )
Distance Bounding based on PUF
Mathilde Igier and Serge Vaudenay
2016/900 ( PDF )
Quantifying Web Adblocker Privacy
Arthur Gervais and Alexandros Filios and Vincent Lenders and Srdjan Capkun
2016/899 ( PDF )
Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains
Kittiphop Phalakarn and Kittiphon Phalakarn and Vorapong Suppakitpaisarn
2016/898 ( PDF )
Physical Unclonable Functions based on Temperature Compensated Ring Oscillators
Sha Tao and Elena Dubrova
2016/897 ( PDF )
An efficient somewhat homomorphic encryption scheme based on factorization
Gérald Gavin
2016/896 ( PDF )
Security Analysis of Anti-SAT
Muhammad Yasin and Bodhisatwa Mazumdar and Ozgur Sinanoglu and Jeyavijayan Rajendran
2016/895 ( PDF )
Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs and Kevin Sekniqi and Vincent Bindschaedler and Muhammad Naveed and Thomas Ristenpart
2016/894 ( PDF )
Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation
Chun Guo and Dongdai Lin
2016/893 ( PDF )
Building web applications on top of encrypted data using Mylar
Raluca Ada Popa and Emily Stark and Jonas Helfer and Steven Valdez and Nickolai Zeldovich and M. Frans Kaashoek and Hari Balakrishnan
2016/892 ( PDF )
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data
Adrià Gascón and Phillipp Schoppmann and Borja Balle and Mariana Raykova and Jack Doerner and Samee Zahur and David Evans
2016/891 ( PDF )
Tightly Secure IBE under Constant-size Master Public Key
Jie Chen and Junqing Gong and Jian Weng
2016/890 ( PDF )
A Parallel Variant of LDSieve for the SVP on Lattices
Artur Mariano and Thijs Laarhoven and Christian Bischof
2016/889 ( PDF )
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov
2016/888 ( PDF )
Finding closest lattice vectors using approximate Voronoi cells
Thijs Laarhoven
2016/887 ( PDF )
A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size $2^{4k+2}$
Anne Canteaut and Sébastien Duval and Léo Perrin
2016/886 ( PDF )
A Robust and Sponge-Like PRNG with Improved Efficiency
Daniel Hutchinson
2016/885 ( PDF )
Short Stickelberger Class Relations and application to Ideal-SVP
Ronald Cramer and Léo Ducas and Benjamin Wesolowski
2016/884 ( PDF )
Robust, low-cost, auditable random number generation for embedded system security
Ben Lampert and Riad S. Wahby and Shane Leonard and Philip Levis
2016/883 ( PDF )
DEMO: Integrating MPC in Big Data Workflows
Nikolaj Volgushev and Malte Schwarzkopf and Andrei Lapets and Mayank Varia and Azer Bestavros
2016/882 ( PDF )
MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption
Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao
2016/881 ( PDF )
Near Collisions in the RC4 Stream Cipher
Anindya Shankar Bhandari
2016/880 ( PDF )
Naor-Yung Paradigm with Shared Randomness and Applications
Silvio Biagioni and Daniel Masny and Daniele Venturi
2016/879 ( PDF )
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption
Benoît Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang
2016/878 ( PDF )
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
Jian Guo and Meicheng Liu and Ling Song
2016/877 ( PDF )
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones
Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, and Keisuke Tanaka
2016/876 ( PDF )
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
Lei Wang and Jian Guo and Guoyan Zhang and Jingyuan Zhao and Dawu Gu
2016/875 ( PDF )
Depth-Robust Graphs and Their Cumulative Memory Complexity
Joël Alwen and Jeremiah Blocki and Krzysztof Pietrzak
2016/873 ( PDF )
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang
2016/872 ( PDF )
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction
Fuchun Guo and Willy Susilo and Yi Mu and Rongmao Chen and Jianchang Lai and Guomin Yang
2016/871 ( PDF )
Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions
Xavier Boyen and Christopher Carr and Thomas Haines
2016/870 ( PDF )
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds
Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
2016/869 ( PDF )
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials
Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr
2016/868 ( PDF )
Selective-Opening Security in the Presence of Randomness Failures
Viet Tung Hoang and Jonathan Katz and Adam O’Neill and Mohammad Zaheri
2016/867 ( PDF )
A survey on physiological-signal-based security for medical devices
Eduard Marin and Enrique Argones Rúa and Dave Singelée and Bart Preneel
2016/866 ( PDF )
A Shuffle Argument Secure in the Generic Model
Prastudy Fauzi and Helger Lipmaa and Michał Zając
2016/865 ( PDF )
Reverse Cycle Walking and Its Applications
Sarah Miracle and Scott Yilek
2016/864 ( PDF )
Salvaging Weak Security Bounds for Blockcipher-Based Constructions
Thomas Shrimpton and R. Seth Terashima
2016/863 ( PDF )
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22
Shuangyi Zhu and Yuan Ma and Jingqiang Lin and Jia Zhuang and Jiwu Jing
2016/862 ( -- withdrawn -- )
Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof
Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan
2016/861 ( PDF )
Secure Stable Matching at Scale
Jack Doerner and David Evans and abhi shelat
2016/860 ( PDF )
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
Junqing Gong and Xiaolei Dong and Jie Chen and Zhenfu Cao
2016/859 ( PDF )
On the Security of Supersingular Isogeny Cryptosystems
Steven D. Galbraith and Christophe Petit and Barak Shani and Yan Bo Ti
2016/858 ( PDF )
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
Qian Guo and Thomas Johansson and Paul Stankovski
2016/857 ( PDF )
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
Zejun Xiang and Wentao Zhang and Zhenzhen Bao and Dongdai Lin
2016/856 ( PDF )
Spritz---a spongy RC4-like stream cipher and hash function.
Ronald L. Rivest and Jacob C. N. Schuldt
2016/855 ( PDF )
Combinatorial Repairability for Threshold Schemes
Douglas R. Stinson and Ruizhong Wei
2016/854 ( PDF )
Algebraic Security Analysis of Key Generation with Physical Unclonable Functions
Matthias Hiller and Michael Pehl and Gerhard Kramer and Georg Sigl
2016/853 ( PDF )
Stronger Security Variants of GCM-SIV
Tetsu Iwata and Kazuhiko Minematsu
2016/852 ( PDF )
Faster LLL-type Reduction of Lattice Bases
Arnold Neumaier and Damien Stehle
2016/851 ( PDF )
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem
Ivica Nikolic and Yu Sasaki
2016/850 ( PDF )
Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy
Conor Patrick and Bilgiday Yuce and Nahid Farhady Ghalaty and Patrick Schaumont
2016/849 ( PDF )
Asymptotically Tight Bounds for Composing ORAM with PIR
Ittai Abraham and Christopher W. Fletcher and Kartik Nayak and Benny Pinkas and Ling Ren
2016/848 ( PDF )
From Weakly Selective to Selective Security in Compact Functional Encryption, Revisited
Linfeng Zhou
2016/847 ( PDF )
On the smallest ratio problem of lattice bases
Jianwei Li
2016/846 ( PDF )
Survey of Approaches for Security Verification of Hardware/Software Systems
Onur Demir and Wenjie Xiong and Faisal Zaghloul and Jakub Szefer
2016/845 ( PDF )
Selective Opening Security from Simulatable Data Encapsulation
Felix Heuer and Bertram Poettering
2016/844 ( PDF )
Secure and Efficient Construction of Broadcast Encryption with Dealership
Kamalesh Acharya and Ratna Dutta
2016/843 ( PDF )
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
Shuichi Katsumata and Shota Yamada
2016/842 ( PDF )
Improved, Black-Box, Non-Malleable Encryption from Semantic Security
Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee
2016/841 ( PDF )
A Methodology for the Characterisation of Leakages in Combinatorial Logic
Guido Bertoni and Marco Martinoli
2016/840 ( PDF )
Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
Melissa Chase and Mary Maller and Sarah Meiklejohn
2016/839 ( PDF )
On the Division Property of SIMON48 and SIMON64
Zejun Xiang and Wentao Zhang and Dongdai Lin
2016/838 ( PDF )
Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things
Masoumeh Safkhani and Nasour Bagheri
2016/837 ( PDF )
Fully Homomorphic Encryption over the Integers Revisited
Jung Hee Cheon and Damien Stehle
2016/836 ( PDF )
The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem
H. Gopalakrishna Gadiyar and R. Padma
2016/835 ( PDF )
Lightweight Diffusion Layer: Importance of Toeplitz Matrices
Sumanta Sarkar and Habeeb Syed
2016/834 ( PDF )
A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism
Russell W. F. Lai and Raymond K. H. Tai and Harry W. H. Wong and Sherman S. M. Chow
2016/833 ( PDF )
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide Yamamoto
2016/832 ( PDF )
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
Colin Chaigneau and Henri Gilbert
2016/831 ( PDF )
Reducing the Number of Non-linear Multiplications in Masking Schemes
Jürgen Pulkus and Srinivas Vivek
2016/830 ( PDF )
IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality
Ian Miers and Payman Mohassel
2016/829 ( PDF )
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
Shuai Han and Shengli Liu and Lin Lyu
2016/828 ( PDF )
Faster Key Recovery Attack on Round-Reduced PRINCE
Shahram Rasoolzadeh and Håvard Raddum
2016/827 ( PDF )
Security Analysis of BLAKE2's Modes of Operation
Atul Luykx and Bart Mennink and Samuel Neves
2016/826 ( PDF )
Rotational Cryptanalysis in the Presence of Constants
Tomer Ashur and Yunwen Liu
2016/825 ( PDF )
Revisiting Cascade Ciphers in Indifferentiability Setting
Chun Guo and Dongdai Lin and Meicheng Liu
2016/824 ( PDF )
P2P Mixing and Unlinkable Bitcoin Transactions
Tim Ruffing and Pedro Moreno-Sanchez and Aniket Kate
2016/823 ( PDF )
Post-Quantum Attribute-Based Signatures from Lattice Assumptions
Rachid El Bansarkhani and Ali El Kaafarani
2016/822 ( PDF )
A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo and Akbar Majidi
2016/821 ( PDF )
Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials
Duggirala Meher Krishna and Duggirala Ravi
2016/820 ( PDF )
Separating Computational and Statistical Differential Privacy in the Client-Server Model
Mark Bun and Yi-Hsiu Chen and Salil Vadhan
2016/819 ( PDF )
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
Shashank Agrawal and Manoj Prabhakaran and Ching-Hua Yu
2016/818 ( PDF )
Composable Adaptive Secure Protocols without Setup under Polytime Assumptions
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2016/817 ( PDF )
Secure Obfuscation in a Weak Multilinear Map Model
Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry
2016/816 ( PDF )
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
Mark Bun and Thomas Steinke
2016/815 ( PDF )
Secure Multiparty RAM Computation in Constant Rounds
Sanjam Garg and Divya Gupta and Peihan Miao and Omkant Pandey
2016/814 ( PDF )
Adaptive Security of Yao's Garbled Circuits
Zahra Jafargholi and Daniel Wichs
2016/813 ( PDF )
Fast Pseudorandom Functions Based on Expander Graphs
Benny Applebaum and Pavel Raykov
2016/812 ( PDF )
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
Dana Dachman-Soled
2016/811 ( PDF )
MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers
Ling Sun and Wei Wang and Meiqin Wang
2016/810 ( PDF )
Fault Injection using Crowbars on Embedded Systems
Colin O'Flynn
2016/809 ( PDF )
Binary AMD Circuits from Secure Multiparty Computation
Daniel Genkin; Yuval Ishai; Mor Weiss
2016/808 ( PDF )
Simulating Auxiliary Inputs, Revisited
Maciej Skorski
2016/807 ( PDF )
Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016
Hyunjin Ahn, Dong-Guk Han
2016/806 ( PDF )
Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack
Mohammad Hadi Valizadeh
2016/805 ( PDF )
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
Carmit Hazay and Avishay Yanai
2016/804 ( PDF )
Multi-Key Homomorphic Authenticators
Dario Fiore and Aikaterini Mitrokotsa and Luca Nizzardo and Elena Pagnin
2016/803 ( PDF )
Biometric Based Network Security Using MIPS Cryptography Processor
Kirat Pal Singh
2016/802 ( -- withdrawn -- )
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated
Hung Dang and Erick Purwanto and Ee-Chien Chang
2016/801 ( PDF )
Blind Web Search: How far are we from a privacy preserving search engine?
Gizem S. Çetin and Wei Dai and Yarkın Doröz and William J. Martin and Berk Sunar
2016/800 ( PDF )
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
Bar Alon and Eran Omri
2016/799 ( PDF )
Efficient Batched Oblivious PRF with Applications to Private Set Intersection
Vladimir Kolesnikov and Ranjit Kumaresan and Mike Rosulek and Ni Trieu
2016/798 ( PDF )
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
Karthikeyan Bhargavan and Gaëtan Leurent
2016/797 ( PDF )
An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market
Aysajan Abidin and Abdelrahaman Aly and Sara Cleemput and Mustafa A. Mustafa
2016/796 ( PDF )
Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings
Vadim Lyubashevsky
2016/795 ( PDF )
Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings
Huijia Lin and Vinod Vaikuntanathan
2016/794 ( PDF )
Message-recovery attacks on Feistel-based Format Preserving Encryption
Mihir Bellare and Viet Tung Hoang and Stefano Tessaro
2016/793 ( PDF )
Side-Channel Analysis of Keymill
Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Florian Mendel
2016/792 ( PDF )
Key-Homomorphic Signatures and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge
David Derler and Daniel Slamanig
2016/791 ( PDF )
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
Ilan Komargodski
2016/790 ( PDF )
Conditional Cube Attack on Reduced-Round Keccak Sponge Function
Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao
2016/789 ( PDF )
An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm
Kirat Pal Singh, Shiwani Dod
2016/788 ( PDF )
On the security of Cubic UOV and its variants
Yasufumi Hashimoto
2016/787 ( PDF )
On the security of new vinegar-like variant of multivariate signature scheme
Yasufumi Hashimoto
2016/786 ( PDF )
What Else is Revealed by Order-Revealing Encryption?
F. Betül Durak and Thomas M. DuBuisson and David Cash
2016/785 ( PDF )
Optimization of Bootstrapping in Circuits
Fabrice Benhamouda and Tancrède Lepoint and Claire Mathieu and Hang Zhou
2016/784 ( PDF )
Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2016/783 ( PDF )
On the Memory-Hardness of Data-Independent Password-Hashing Functions
Joël Alwen and Peter Gaži and Chethan Kamath and Karen Klein and Georg Osang and Krzysztof Pietrzak and Leonid Reyzin and Michal Rolínek and Michal Rybár
2016/782 ( PDF )
Challenges for Ring-LWE
Eric Crockett and Chris Peikert
2016/781 ( PDF )
Privately Matching $k$-mers
Justin Bedő and Thomas Conway and Kim Ramchen and Vanessa Teague
2016/780 ( PDF )
Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
Mohammmad Hassan Ameri and Javad Mohajeri and Mahmoud Salmasizadeh
2016/779 ( PDF )
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Mohammad Reza Aref
2016/778 ( PDF )
Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning
Sumit Chakraborty
2016/777 ( PDF )
Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers
Ping Ngai Chung and Craig Costello and Benjamin Smith
2016/776 ( PDF )
Homomorphic Tallying for the Estonian Internet Voting System
Arnis Parsovs
2016/775 ( PDF )
Cryptanalysis of a Homomorphic Encryption Scheme
Sonia Bogos and John Gaspoz and Serge Vaudenay
2016/774 ( PDF )
TV-PUF : A Fast Lightweight Aging-Resistant Threshold Voltage PUF
Tanujay Saha and Vikash Sehwag
2016/773 ( PDF )
Alternative Implementations of Secure Real Numbers
Vassil Dimitrov and Liisi Kerik and Toomas Krips and Jaak Randmets and Jan Willemson
2016/772 ( PDF )
Time-Frequency Analysis for Second-Order Attacks
Pierre BELGARRIC and Shivam BHASIN and Nicolas BRUNEAU and Jean-Luc DANGER and Nicolas DEBANDE and Sylvain GUILLEY and Annelie HEUSER and Zakaria NAJM and Olivier RIOUL
2016/771 ( PDF )
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
David Bernhard and Olivier Pereira and Bogdan Warinschi
2016/770 ( PDF )
KangarooTwelve: fast hashing based on Keccak-p
Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
2016/769 ( PDF )
Low-temperature data remanence attacks against intrinsic SRAM PUFs
Nikolaos Athanasios Anagnostopoulos and Stefan Katzenbeisser and Markus Rosenstihl and André Schaller and Sebastian Gabmeyer and Tolga Arul
2016/768 ( PDF )
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
Toshinori Araki and Jun Furukawa and Yehuda Lindell and Ariel Nof and Kazuma Ohara
2016/767 ( PDF )
A conjecture about Gauss sums and bentness of binomial Boolean functions
Jean-Pierre Flori
2016/766 ( PDF )
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions
Benoît Libert and Somindu C. Ramanna and Moti Yung
2016/765 ( PDF )
Cryptographic Voting — A Gentle Introduction
David Bernhard and Bogdan Warinschi
2016/764 ( PDF )
ANOTEL: Cellular Networks with Location Privacy (Extended Version)
Tim Dittler and Florian Tschorsch and Stefan Dietzel and Björn Scheuermann
2016/763 ( PDF )
Human Public-Key Encryption
Houda Ferradi and Rémi Géraud and David Naccache
2016/762 ( PDF )
Faster Secure Two-Party Computation in the Single-Execution Setting
Xiao Wang and Alex J. Malozemoff and Jonathan Katz
2016/761 ( PDF )
Two-party authenticated key exchange protocol using lattice-based cryptography
Xiaopeng Yang and Wenping Ma
2016/760 ( PDF )
Simultaneous Secrecy and Reliability Amplification for a General Channel Model
Russell Impagliazzo; Ragesh Jaiswal; Valentine Kabanets; Bruce M. Kapron; Valerie King; Stefano Tessaro
2016/759 ( PDF )
Towards Practical Attacks on Argon2i and Balloon Hashing
Joël Alwen and Jeremiah Blocki
2016/758 ( PDF )
A new hope on ARM Cortex-M
Erdem Alkim and Philipp Jakubeit and Peter Schwabe
2016/757 ( PDF )
Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends
Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton Andrade
2016/756 ( PDF )
Adapting Helios for provable ballot privacy
David Bernhard and Véronique Cortier and Olivier Pereira and Ben Smyth and Bogdan Warinschi
2016/755 ( PDF )
Auditable Data Structures
Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia
2016/754 ( PDF )
Practical Key Recovery Attack on MANTIS-5
Christoph Dobraunig and Maria Eichlseder and Daniel Kales and Florian Mendel
2016/753 ( PDF )
Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices
Shi Bai and Damien Stehle and Weiqiang Wen
2016/752 ( PDF )
ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security
Adnan Baysal and Ünal Kocabaş
2016/751 ( PDF )
Feistel Like Construction of Involutory Binary Matrices With High Branch Number
Adnan Baysal and Mustafa Çoban and Mehmet Özen
2016/750 ( PDF )
Public-Key Based Lightweight Swarm Authentication
Simon Cogliani and Bao Feng and Houda Ferradi and Rémi Géraud and Diana Maimut and David Naccache and Rodrigo Portella do Canto and Guilin Wang
2016/749 ( PDF )
Revocable Hierarchical Identity-Based Encryption with Adaptive Security
Kwangsu Lee
2016/748 ( PDF )
A Generic Dynamic Provable Data Possession Framework
Mohammad Etemad and Alptekin Küpçü
2016/747 ( PDF )
Beyond Bitcoin -- Part II: Blockchain-based systems without mining
Pasquale Forte and Diego Romano and Giovanni Schmid
2016/746 ( PDF )
Improved Private Set Intersection against Malicious Adversaries
Peter Rindal and Mike Rosulek
2016/745 ( PDF )
Novel differentially private mechanisms for graphs
Solenn Brunet and Sébastien Canard and Sébastien Gambs and Baptiste Olivier
2016/744 ( PDF )
A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity
Xi Chen, Longjiang Qu, Chao Li and Jiao Du
2016/743 ( PDF )
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam and Harry Bartlett and Ed Dawson and Josef Pieprzyk and Leonie Simpson and Kenneth Koon-Ho Wong
2016/742 ( PDF )
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
Johannes Braun and Johannes Buchmann and Denise Demirel and Mikio Fujiwara and Matthias Geihs and Shiho Moriai and Masahide Sasaki and Atsushi Waseda
2016/741 ( PDF )
MARKOV MODELING OF MOVING TARGET DEFENSE GAMES
Hoda Maleki and Saeed Valizadeh and William Koch and Azer Bestavros and Marten van Dijk
2016/740 ( PDF )
Software Benchmarking of the 2$^{\text{nd}}$ round CAESAR Candidates
Ankele, Ralph and Ankele, Robin
2016/739 ( PDF )
Unconditionally Secure Signatures
Ryan Amiri and Aysajan Abidin and Petros Wallden and Erika Andersson
2016/738 ( PDF )
FHPKE with Zero Norm Noises based on DLA&CDH
Masahiro Yagisawa
2016/737 ( PDF )
Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques
Edgar González and Guillermo Morales-Luna and Feliú D. Sagols
2016/736 ( PDF )
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation
Martine De Cock and Rafael Dowsley and Caleb Horst and Raj Katti and Anderson C. A. Nascimento and Stacey C. Newman and Wing-Sea Poon
2016/735 ( PDF )
Efficient Robust Secret Sharing from Expander Graphs
Brett Hemenway and Rafail Ostrovsky
2016/734 ( PDF )
Efficient Oblivious Transfer Protocols based on White-Box Cryptography
Aram Jivanyan and Gurgen Khachatryan and Andriy Oliynyk and Mykola Raievskyi
2016/733 ( PDF )
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates
Thomas Wunderer
2016/732 ( PDF )
Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64
Yosuke Todo and Gregor Leander and Yu Sasaki
2016/731 ( PDF )
SRMAP and ISLAP Authentication Protocols: Attacks and Improvements
Mohammad Mardani Shahrbabak and Shahab Abdolmaleky
2016/730 ( PDF )
Leakage-Resilient Public-Key Encryption from Obfuscation
Dana Dachman-Soled and S. Dov Gordon and Feng-Hao Liu and Adam O’Neill and Hong-Sheng Zhou
2016/729 ( PDF )
Attacks on cMix - Some Small Overlooked Details
Herman Galteland and Stig F. Mjølsnes and Ruxandra F. Olimid
2016/728 ( PDF )
Sophos - Forward Secure Searchable Encryption
Raphael Bost
2016/727 ( PDF )
Improvements on the Individual Logarithm Step in Extended Tower Number Field Sieve
Yuqing Zhu and Jincheng Zhuang and Chang Lv and Dongdai Lin
2016/726 ( PDF )
Local Bounds for the Optimal Information Ratio of Secret Sharing Schemes
Oriol Farràs and Jordi Ribes-González and Sara Ricci
2016/725 ( PDF )
Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA
Mustafa Khairallah and Maged Ghoneima
2016/724 ( PDF )
SPORT: Sharing Proofs of Retrievability across Tenants
Frederik Armknecht and Jens-Matthias Bohli and David Froelicher and Ghassan O. Karame
2016/723 ( PDF )
Robust Multi-Property Combiners for Hash Functions
Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak
2016/722 ( PDF )
Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512
Li Lin and Wenling Wu
2016/721 ( PDF )
Strong Hardness of Privacy from Weak Traitor Tracing
Lucas Kowalczyk and Tal Malkin and Jonathan Ullman and Mark Zhandry
2016/720 ( PDF )
A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption
Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee
2016/719 ( PDF )
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
Tobias Schneider and Amir Moradi and François-Xavier Standaert and Tim Güneysu
2016/718 ( PDF )
Leakage-Abuse Attacks Against Searchable Encryption
David Cash and Paul Grubbs and Jason Perry and Thomas Ristenpart
2016/717 ( PDF )
Comparison between Subfield and Straightforward Attacks on NTRU
Paul Kirchner and Pierre-Alain Fouque
2016/716 ( PDF )
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
Tuyet Duong and Lei Fan and Hong-Sheng Zhou
2016/715 ( PDF )
Uniform First-Order Threshold Implementations
Tim Beyne and Begül Bilgin
2016/714 ( PDF )
All the AES You Need on Cortex-M3 and M4
Peter Schwabe and Ko Stoffelen
2016/713 ( PDF )
Tuple lattice sieving
Shi Bai and Thijs Laarhoven and Damien Stehle
2016/712 ( PDF )
A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems
Basel Halak and Said Subhan Waizi and Asad Islam
2016/711 ( PDF )
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
Hugo Krawczyk
2016/710 ( PDF )
Keymill: Side-Channel Resilient Key Generator
Mostafa Taha, Arash Reyhani-Masoleh and Patrick Schaumont
2016/709 ( PDF )
Differential Fault Analysis of SHA3-224 and SHA3-256
Pei Luo and Yunsi Fei and Liwei Zhang and A. Adam Ding
2016/708 ( PDF )
From 5-pass MQ-based identification to MQ-based signatures
Ming-Shing Chen and Andreas Hülsing and Joost Rijneveld and Simona Samardjiska and Peter Schwabe
2016/707 ( PDF )
Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher
Dana Dachman-Soled and Angela Park and Ben San Nicolas
2016/706 ( PDF )
Memory Erasability Amplification
Jan Camenisch, Robert R. Enderlein, and Ueli Maurer
2016/705 ( -- withdrawn -- )
New construction of single cycle T-function families
Shiyi ZHANG and Yongjuan WANG and Guangpu GAO
2016/704 ( PDF )
High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem
Nicolas T. Courtois
2016/703 ( PDF )
(In-)Secure messaging with the Silent Circle instant messaging protocol
Sebastian R. Verschoor and Tanja Lange
2016/702 ( PDF )
Mirror Theory and Cryptography
Jacques Patarin
2016/701 ( PDF )
Bolt: Anonymous Payment Channels for Decentralized Currencies
Matthew Green and Ian Miers
2016/700 ( PDF )
Side-Channel Protections for Cryptographic Instruction Set Extensions
Sami Saab, Pankaj Rohatgi, and Craig Hampel
2016/699 ( PDF )
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Zhengjun Cao and Lihua Liu
2016/698 ( PDF )
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
Zhengjun Cao and Lihua Liu
2016/697 ( PDF )
Ciphertext Forgery on HANUMAN
Damian Vizár
2016/696 ( PDF )
Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Süleyman Kardaş and Mehmet Sabır Kiraz
2016/695 ( PDF )
Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation
Ivan Damgård and Jesper Buus Nielsen and Michael Nielsen and Samuel Ranellucci
2016/694 ( PDF )
Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials
Yin Li and Xingpo Ma and Yu Zhang and Chuanda Qi
2016/693 ( PDF )
Identity-Based Key Aggregate Cryptosystem from Multilinear Maps
Sikhar Patranabis and Debdeep Mukhopadhyay
2016/692 ( PDF )
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Jiguo Li, Hong Yuan and Yichen Zhang
2016/691 ( PDF )
Targeted Homomorphic Attribute Based Encryption
Zvika Brakerski and David Cash and Rotem Tsabary and Hoeteck Wee
2016/690 ( PDF )
When Are Three Voters Enough for Privacy Properties?
Myrto Arapinis and Véronique Cortier and Steve Kremer
2016/689 ( PDF )
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations
Tingting Cui and Keting Jia and Kai Fu and Shiyao Chen and Meiqin Wang
2016/688 ( PDF )
Bounded KDM Security from iO and OWF
Antonio Marcedone and Rafael Pass and abhi shelat
2016/686 ( PDF )
The Lightest 4x4 MDS Matrices over GL(4, $\mathbb{F}_2$)
Ting Li and Jian Bai and Yao sun and Dingkang Wang and Dongdai Lin
2016/685 ( PDF )
Overlaying Circuit Clauses for Secure Computation
W. Sean Kennedy and Vladimir Kolesnikov and Gordon Wilfong
2016/683 ( PDF )
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs
Rasmus Dahlberg and Tobias Pulls and Roel Peeters
2016/682 ( PDF )
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations
Steven D. Galbraith, Joel Laity and Barak Shani
2016/681 ( PDF )
Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack
Ronald Cramer, Ivan Damgard, Chaoping Xing, Chen Yuan
2016/676 ( PDF )
Cryptanalysis of Reduced-Round Midori64 Block Cipher
Xiaoyang Dong and Yanzhao Shen
2016/675 ( PDF )
Accelerating Homomorphic Computations on Rational Numbers
Angela Jäschke and Frederik Armknecht
2016/672 ( -- withdrawn -- )
Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves
Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
2016/670 ( PDF )
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities
Siamak F. Shahandashti and Feng Hao
2016/669 ( PDF )
NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on ARM
Brian Koziel, Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani and David Jao
2016/666 ( PDF )
Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity
WeiGuo Zhang and LuYang Li and Enes Pasalic
2016/663 ( PDF )
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
Jan Camenisch and Manu Drijvers and Anja Lehmann
2016/660 ( PDF )
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
Christof Beierle and Jérémy Jean and Stefan Kölbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim
2016/659 ( PDF )
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE
Joppe Bos and Craig Costello and Léo Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila
2016/658 ( PDF )
Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3
Kevin Atighehchi and Alexis Bonnecaze
2016/655 ( PDF )
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au
2016/654 ( PDF )
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks
Shweta Agrawal
2016/651 ( PDF )
Pen and Paper Arguments for SIMON and SIMON-like Designs
Christof Beierle
2016/649 ( PDF )
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
Behzad Abdolmaleki and Karim Baghery and Shahram Khazaei and Mohammad Reza Aref
2016/646 ( PDF )
Computational integrity with a public random string from quasi-linear PCPs
Eli Ben-Sasson and Iddo Ben-Tov and Alessandro Chiesa and Ariel Gabizon and Daniel Genkin and Matan Hamilis and Evgenya Pergament and Michael Riabzev and Mark Silberstein and Eran Tromer and Madars Virza
2016/645 ( PDF )
FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors
Patrick Longa
2016/644 ( PDF )
How to Backdoor Diffie-Hellman
David Wong
2016/643 ( PDF )
On the Computational Overhead of MPC with Dishonest Majority
Jesper Buus Nielsen and Samuel Ranellucci
2016/641 ( PDF )
Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs
Pawel Swierczynski and Georg T. Becker and Amir Moradi and Christof Paar
2016/636 ( PDF )
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
Saikrishna Badrinarayanan and Dakshita Khurana and Rafail Ostrovsky and Ivan Visconti
2016/635 ( PDF )
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
Florian Tramer and Fan Zhang and Huang Lin and Jean-Pierre Hubaux and Ari Juels and Elaine Shi
2016/633 ( PDF )
Making Smart Contracts Smarter
Loi Luu and Duc-Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor
2016/628 ( PDF )
On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing
Liliya R. Ahmetzyanova and Evgeny K. Alekseev and Igor B. Oshkin and Stanislav V. Smyshlyaev and Lolita A. Sonina
2016/622 ( PDF )
Function-Revealing Encryption
Marc Joye and Alain Passelègue
2016/621 ( PDF )
4-Round Concurrent Non-Malleable Commitments from One-Way Functions
Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti
2016/620 ( PDF )
Secure Data Exchange: A Marketplace in the Cloud
Ran Gilad-Bachrach and Kim Laine and Kristin Lauter and Peter Rindal and Mike Rosulek
2016/619 ( PDF )
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
Kevin Lewi and Alex J. Malozemoff and Daniel Apon and Brent Carmer and Adam Foltzer and Daniel Wagner and David W. Archer and Dan Boneh and Jonathan Katz and Mariana Raykova
2016/616 ( PDF )
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Victor Lomné and Florian Mendel
2016/614 ( PDF )
Better Two-Round Adaptive Multi-Party Computation
Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam
2016/613 ( PDF )
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
Qian Ge and Yuval Yarom and David Cock and Gernot Heiser
2016/612 ( PDF )
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
Kevin Lewi and David J. Wu
2016/610 ( PDF )
The GGM Function Family is Weakly One-Way
Aloni Cohen and Saleet Klein
2016/599 ( PDF )
Obfuscation from Low Noise Multilinear Maps
Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee
2016/597 ( PDF )
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version
Margaux Dugardin; Sylvain Guilley; Jean-Luc Danger; Zakaria Najm; Olivier Rioul
2016/594 ( PDF )
"Make Sure DSA Signing Exponentiations Really are Constant-Time''
Cesar Pereida García and Billy Bob Brumley and Yuval Yarom
2016/592 ( PDF )
Subspace Trail Cryptanalysis and its Applications to AES
Lorenzo Grassi and Christian Rechberger and Sondre Rønjom
2016/585 ( PDF )
Breaking the Circuit Size Barrier for Secure Computation Under DDH
Elette Boyle; Niv Gilboa; Yuval Ishai
2016/578 ( PDF )
Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security
Viet Tung Hoang and Stefano Tessaro
2016/576 ( -- withdrawn -- )
Indistinguishability Obfuscation Does Not Reduce to Structured Languages
Gilad Asharov and Alon Rosen and Gil Segev
2016/575 ( PDF )
TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub
Ethan Heilman and Leen Alshenibr and Foteini Baldimtsi and Alessandra Scafuro and Sharon Goldberg
2016/574 ( PDF )
Structure vs Hardness through the Obfuscation Lens
Nir Bitansky and Akshay Degwekar and Vinod Vaikuntanathan
2016/567 ( PDF )
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
Takashi Yamakawa; Shota Yamada; Goichiro Hanaoka; Noboru Kunihiro
2016/564 ( PDF )
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
Mihir Bellare and Bjoern Tackmann
2016/561 ( PDF )
Compactness vs Collusion Resistance in Functional Encryption
Baiyu Li and Daniele Micciancio
2016/558 ( PDF )
From Cryptomania to Obfustopia through Secret-Key Functional Encryption
Nir Bitansky and Ryo Nishimaki and Alain Passelègue and Daniel Wichs
2016/557 ( PDF )
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
Dahmun Goudarzi and Matthieu Rivain
2016/553 ( -- withdrawn -- )
Storage Efficient Substring Searchable Symmetric Encryption
Iraklis Leontiadis and Ming Li
2016/549 ( PDF )
Short and Adjustable Signatures
Xiong Fan and Juan Garay and Payman Mohassel
2016/545 ( PDF )
On Trees, Chains and Fast Transactions in the Blockchain
Aggelos Kiayias and Giorgos Panagiotakos
2016/544 ( PDF )
Efficient Secure Comparison Protocols
Geoffroy Couteau
2016/543 ( PDF )
ObliviSync: Practical Oblivious File Backup and Synchronization
Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche
2016/542 ( PDF )
MPC-Friendly Symmetric Key Primitives
Lorenzo Grassi and Christian Rechberger and Dragos Rotaru and Peter Scholl and Nigel P. Smart
2016/541 ( PDF )
Big-Key Symmetric Encryption: Resisting Key Exfiltration
Mihir Bellare and Daniel Kane and Phillip Rogaway
2016/540 ( PDF )
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
Alberto Battistello and Jean-Sebastien Coron and Emmanuel Prouff and Rina Zeitoun
2016/532 ( PDF )
Cryptanalysis of GOST2
Tomer Ashur and Achiya Bar-On and Orr Dunkelman
2016/530 ( PDF )
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou
2016/529 ( PDF )
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
Antonio Faonio and Daniele Venturi
2016/527 ( PDF )
Secure Outsourcing of Circuit Manufacturing
Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi
2016/526 ( PDF )
Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree
Taechan Kim and Jinhyuck Jeong
2016/524 ( PDF )
Single-Key to Multi-Key Functional Encryption with Polynomial Loss
Sanjam Garg and Akshayaram Srinivasan
2016/523 ( PDF )
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Jiang Zhang and Yu Chen and Zhenfeng Zhang
2016/518 ( PDF )
Attribute-based Key Exchange with General Policies
Vladimir Kolesnikov and Hugo Krawczyk and Yehuda Lindell and Alex J. Malozemoff and Tal Rabin
2016/517 ( PDF )
ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab
David McCann and Carolyn Whitnall and Elisabeth Oswald
2016/510 ( PDF )
A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes
Jean-Claude Bajard and Julien Eynard and Anwar Hasan and Vincent Zucca
2016/509 ( PDF )
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Xiaoyang Dong and Xiaoyun Wang
2016/508 ( PDF )
Collapse-binding quantum commitments without random oracles
Dominique Unruh
2016/505 ( PDF )
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
Marcel Keller and Emmanuela Orsini and Peter Scholl
2016/504 ( PDF )
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography
Patrick Longa and Michael Naehrig
2016/498 ( PDF )
Towards Tightly Secure Short Signature and IBE
Xavier Boyen and Qinyi Li
2016/495 ( PDF )
Cross&Clean: Amortized Garbled Circuits with Constant Overhead
Jesper Buus Nielsen and Claudio Orlandi
2016/493 ( PDF )
Partition-Based Trapdoor Ciphers
Arnaud Bannier and Nicolas Bodin and Eric Filiol
2016/492 ( PDF )
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Martin Albrecht and Lorenzo Grassi and Christian Rechberger and Arnab Roy and Tyge Tiessen
2016/488 ( PDF )
Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE
Husen Wang and Qiang Tang
2016/486 ( PDF )
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order
Hannes Gross and Stefan Mangard and Thomas Korak
2016/483 ( PDF )
Proofs of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures
Hiroaki Anada and Seiko Arita and Kouichi Sakurai
2016/482 ( PDF )
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
Shashank Agrawal and David J. Wu
2016/481 ( PDF )
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Amir Moradi and Tobias Schneider
2016/480 ( PDF )
Achieving Better Privacy for the 3GPP AKA Protocol
Pierre-Alain Fouque and Cristina Onete and Benjamin Richard
2016/471 ( PDF )
NTRU Modular Lattice Signature Scheme on CUDA GPUs
Wei Dai and John Schanck and Berk Sunar and William Whyte and Zhenfei Zhang
2016/466 ( PDF )
AnNotify: A Private Notification Service
Ania Piotrowska and Jamie Hayes and Nethanel Gelernter and George Danezis and Amir Herzberg
2016/464 ( PDF )
Beaver: A Decentralized Anonymous Marketplace with Secure Reputation
Kyle Soska and Albert Kwon and Nicolas Christin and Srinivas Devadas
2016/463 ( PDF )
Authenticated Encryption with Variable Stretch
Reza Reyhanitabar and Serge Vaudenay and Damian Vizár
2016/459 ( PDF )
Non-Interactive RAM and Batch NP Delegation from any PIR
Zvika Brakerski and Justin Holmgren and Yael Kalai
2016/458 ( PDF )
CompGC: Efficient Offline/Online Semi-honest Two-party Computation
Adam Groce and Alex Ledger and Alex J. Malozemoff and Arkady Yerukhimovich
2016/457 ( PDF )
Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption
Wei Yuan
2016/454 ( PDF )
Analysis of the Blockchain Protocol in Asynchronous Networks
Rafael Pass and Lior Seeman and abhi shelat
2016/452 ( PDF )
Secure Logging Schemes and Certificate Transparency
Benjamin Dowling and Felix Günther and Udyani Herath and Douglas Stebila
2016/451 ( PDF )
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
Wacław Banasik and Stefan Dziembowski and Daniel Malinowski
2016/446 ( -- withdrawn -- )
Quantum key distribution with combined conjugate coding and information overloading
Boris Skoric
2016/444 ( PDF )
The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
Roberto Avanzi
2016/443 ( PDF )
Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography
Simon Cogliani and Houda Ferradi and Rémi Géraud and David Naccache
2016/432 ( PDF )
Two-Input Functional Encryption for Inner Products from Bilinear Maps
Kwangsu Lee and Dong Hoon Lee
2016/431 ( PDF )
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme
David Bernhard, Oksana Kulyk, Melanie Volkamer
2016/427 ( PDF )
Privacy Preserving Network Analysis of Distributed Social Networks
Varsha Bhat Kukkala and Jaspal Singh Saini and S.R.S. Iyengar
2016/425 ( PDF )
Multi-Input Inner-Product Functional Encryption from Pairings
Michel Abdalla and Romain Gay and Mariana Raykova and Hoeteck Wee
2016/421 ( PDF )
Homomorphic Encryption for Arithmetic of Approximate Numbers
Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song
2016/415 ( PDF )
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
Nina Bindel and Johannes Buchmann and Juliane Krämer
2016/411 ( PDF )
Polymorphic Encryption and Pseudonymisation for Personalised Healthcare
Eric Verheul and Bart Jacobs and Carlo Meijer and Mireille Hildebrandt and Joeri de Ruiter
2016/410 ( PDF )
Efficient Quantum-Resistant Trust Infrastructure based on HIMMO
Oscar Garcia-Morchon and Sauvik Bhattacharya and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Maarten Bodlaender
2016/405 ( PDF )
Multiple Differential Cryptanalysis: A Rigorous Analysis
Subhabrata Samajder and Palash Sarkar
2016/404 ( PDF )
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
Subhabrata Samajder and Palash Sarkar
2016/403 ( PDF )
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
Sanjit Chatterjee and Alfred Menezes and Francisco Rodriguez-Henriquez
2016/400 ( PDF )
Towards Secure Quadratic Voting
Sunoo Park and Ronald L. Rivest
2016/393 ( PDF )
De Bruijn Sequences, Adjacency Graphs and Cyclotomy
Ming Li and Dongdai Lin
2016/390 ( PDF )
Obfuscation without the Vulnerabilities of Multilinear Maps
Sanjam Garg and Pratyay Mukherjee and Akshayaram Srinivasan
2016/382 ( PDF )
Faster elliptic-curve discrete logarithms on FPGAs
Daniel J. Bernstein and Susanne Engels and Tanja Lange and Ruben Niederhagen and Christof Paar and Peter Schwabe and Ralf Zimmermann
2016/375 ( PDF )
Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
Alon Rosen and Gil Segev and Ido Shahaf
2016/373 ( PDF )
Adaptive partitioning
Dennis Hofheinz
2016/372 ( PDF )
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
Mihir Bellare and Georg Fuchsbauer and Alessandra Scafuro
2016/369 ( PDF )
Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex
Ronald Cramer and Chaoping Xing and Chen Yuan
2016/366 ( PDF )
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers
Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina
2016/361 ( PDF )
Functional Encryption for Bounded Collusions, Revisited
Shweta Agrawal and Alon Rosen
2016/360 ( PDF )
Another Look at Tightness II: Practical Issues in Cryptography
Sanjit Chatterjee and Neal Koblitz and Alfred Menezes and Palash Sarkar
2016/357 ( PDF )
State Management for Hash-Based Signatures
David McGrew and Panos Kampanakis and Scott Fluhrer and Stefan-Lukas Gazdag and Denis Butin and Johannes Buchmann
2016/356 ( PDF )
More Efficient Constructions for Inner-Product Encryption
Somindu C. Ramanna
2016/355 ( PDF )
Fruit: Ultra-Lightweight Stream Cipher with Shorter Internal State
Vahid Amin Ghafari, Honggang Hu, and Ying Chen
2016/351 ( PDF )
How (Not) to Instantiate Ring-LWE
Chris Peikert
2016/350 ( PDF )
Probabilistic Termination and Composability of Cryptographic Protocols
Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas
2016/348 ( PDF )
A Note on Non-Perfect Secret Sharing
Oriol Farràs and Sebastià Martín and Carles Padró
2016/341 ( PDF )
Semantically Secure Anonymity: Foundations of Re-encryption
Adam L. Young and Moti Yung
2016/339 ( PDF )
Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
Zvika Brakerski and Renen Perlman
2016/333 ( PDF )
Proof of Space from Stacked Expanders
Ling Ren and Srinivas Devadas
2016/321 ( PDF )
Algebraic Decomposition for Probing Security
Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
2016/317 ( PDF )
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
Rishab Goyal and Venkata Koppula and Brent Waters
2016/315 ( PDF )
Flattening NTRU for Evaluation Key Free Homomorphic Encryption
Yarkın Doröz and Berk Sunar
2016/303 ( PDF )
From Obfuscation to the Security of Fiat-Shamir for Proofs
Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum
2016/301 ( PDF )
Constrained Pseudorandom Functions for Unconstrained Inputs
Apoorvaa Deshpande and Venkata Koppula and Brent Waters
2016/300 ( PDF )
Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme
Leon Groot Bruinderink and Andreas Hülsing and Tanja Lange and Yuval Yarom
2016/281 ( PDF )
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev
2016/278 ( PDF )
Various Proxy Re-Encryption Schemes from Lattices
Xiong Fan and Feng-Hao Liu
2016/276 ( PDF )
Arithmetic coding and blinding countermeasures for lattice signatures
Markku-Juhani O. Saarinen
2016/253 ( PDF )
Run-time Accessible DRAM PUFs in Commodity Devices
Wenjie Xiong and André Schaller and Nikolaos A. Anagnostopoulos and Muhammad Umair Saleem and Sebastian Gabmeyer and Stefan Katzenbeisser and Jakub Szefer
2016/250 ( PDF )
Fixed Point Arithmetic in SHE Scheme
A. Costache and N.P. Smart and S. Vivek and A. Waller
2016/249 ( PDF )
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Amir Moradi and Tobias Schneider
2016/247 ( -- withdrawn -- )
Public Veri able Function Secret Sharing
Wang Qiang and Zhou Fucai and Chen Chunyu and Li Fuxiang and Xu Zifeng
2016/244 ( PDF )
Cryptanalysis of Simpira v1
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2016/234 ( PDF )
Trick or Tweak: On the (In)security of OTR’s Tweaks
Raphael Bost and Olivier Sanders
2016/233 ( PDF )
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE and Threshold-IBE
Charanjit S. Jutla and Arnab Roy
2016/230 ( PDF )
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer and Yuval Yarom
2016/228 ( PDF )
On a decentralized trustless pseudo-random number generation algorithm
Serguei Popov
2016/223 ( PDF )
Still Wrong Use of Pairings in Cryptography
Mehmet Sabır Kiraz and Osmanbey Uzunkol
2016/221 ( PDF )
On Post-Compromise Security
Katriel Cohn-Gordon and Cas Cremers and Luke Garratt
2016/213 ( PDF )
3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky and Zvika Brakerski and Yael Kalai and Omer Paneth and Vinod Vaikuntanathan
2016/209 ( PDF )
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song and Zhangjie Huang and Qianqian Yang
2016/208 ( PDF )
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions
Sandro Coretti and Juan Garay and Martin Hirt and Vassilis Zikas
2016/207 ( PDF )
Fault analysis and weak key-IV attack on Sprout
Dibyendu Roy and Sourav Mukhopadhyay
2016/199 ( PDF )
The Honey Badger of BFT Protocols
Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song
2016/198 ( PDF )
Optimizing S-box Implementations for Several Criteria using SAT Solvers
Ko Stoffelen
2016/196 ( PDF )
Multi-Key FHE from LWE, Revisited
Chris Peikert and Sina Shiehian
2016/194 ( PDF )
How to Share a Secret, Infinitely
Ilan Komargodski and Moni Naor and Eylon Yogev
2016/189 ( PDF )
Yao's millionaires' problem and public-key encryption without computational assumptions
Dima Grigoriev and Laszlo B. Kish and Vladimir Shpilrain
2016/186 ( PDF )
Lightweight MDS Generalized Circulant Matrices (Full Version)
Meicheng Liu and Siang Meng Sim
2016/185 ( PDF )
On the Influence of Message Length in PMAC's Security Bounds
Atul Luykx and Bart Preneel and Alan Szepieniec and Kan Yasuda
2016/180 ( PDF )
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Dennis Hofheinz and Tibor Jager and Andy Rupp
2016/175 ( PDF )
Online/Offline OR Composition of Sigma Protocols
Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2016/168 ( PDF )
Town Crier: An Authenticated Data Feed for Smart Contracts
Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi
2016/166 ( PDF )
Per-Session Security: Password-Based Cryptography Revisited
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2016/165 ( -- withdrawn -- )
PrAd: Enabling Privacy-Aware Location based Advertising
Hung Dang and Ee-Chien Chang
2016/163 ( PDF )
ZKBoo: Faster Zero-Knowledge for Boolean Circuits
Irene Giacomelli and Jesper Madsen and Claudio Orlandi
2016/161 ( PDF )
Revisiting Structure Graphs: Applications to CBC-MAC and EMAC
Ashwin Jha and Mridul Nandi
2016/157 ( PDF )
Key Derivation for Squared-Friendly Applications: Lower Bounds
Maciej Skorski
2016/156 ( PDF )
More Efficient Constant-Round Multi-Party Computation from BMR and SHE
Yehuda Lindell and Nigel P. Smart and Eduardo Soria-Vazquez
2016/154 ( PDF )
Fully-Anonymous Short Dynamic Group Signatures Without Encryption
David Derler and Daniel Slamanig
2016/145 ( PDF )
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki and Hong-Sheng Zhou
2016/137 ( PDF )
Rate-1, Linear Time and Additively Homomorphic UC Commitments
Ignacio Cascudo and Ivan Damgård and Bernardo David and Nico Döttling and Jesper Buus Nielsen
2016/134 ( PDF )
More Practical and Secure History-Independent Hash Tables
Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia
2016/132 ( PDF )
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
Shahram Rasoolzadeh and Håvard Raddum
2016/128 ( PDF )
Removing the Strong RSA Assumption from Arguments over the Integers
Geoffroy Couteau and Thomas Peters and David Pointcheval
2016/125 ( PDF )
Compact Identity Based Encryption from LWE
Daniel Apon and Xiong Fan and Feng-Hao Liu
2016/123 ( PDF )
Robust Password-Protected Secret Sharing
Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval
2016/122 ( PDF )
Simpira v2: A Family of Efficient Permutations Using the AES Round Function
Shay Gueron and Nicky Mouha
2016/121 ( -- withdrawn -- )
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
Tibor Jager
2016/120 ( PDF )
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
Ignacio Cascudo and Ivan Damgård and Felipe Lacerda and Samuel Ranellucci
2016/119 ( PDF )
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices
Christof Beierle and Thorsten Kranz and Gregor Leander
2016/112 ( PDF )
On the (In)security of SNARKs in the Presence of Oracles
Dario Fiore and Anca Nitulescu
2016/111 ( PDF )
Scalable and Secure Logistic Regression via Homomorphic Encryption
Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
2016/108 ( PDF )
An Efficient Toolkit for Computing Private Set Operations
Alex Davidson and Carlos Cid
2016/106 ( PDF )
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård and Helene Haagh and Claudio Orlandi
2016/102 ( PDF )
Breaking the Sub-Exponential Barrier in Obfustopia
Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan and Mark Zhandry
2016/101 ( PDF )
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Benoit Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang
2016/098 ( PDF )
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications
Stefan Kölbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger
2016/088 ( PDF )
On Linear Hulls and Trails
Tomer Ashur and Vincent Rijmen
2016/086 ( PDF )
Intel SGX Explained
Victor Costan and Srinivas Devadas
2016/081 ( PDF )
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2016/080 ( PDF )
Cryptanalysis of PRINCE with Minimal Data
Shahram Rasoolzadeh and Håvard Raddum
2016/077 ( PDF )
Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN
Shahram Rasoolzadeh and Håvard Raddum
2016/054 ( PDF )
Fully Homomorphic Public-Key Encryption with Two Ciphertexts based on Discrete Logarithm Problem
Masahiro Yagisawa
2016/048 ( PDF )
Better Preprocessing for Secure Multiparty Computation
Carsten Baum and Ivan Damgård and Tomas Toft and Rasmus Zakarias
2016/046 ( PDF )
How To Simulate It - A Tutorial on the Simulation Proof Technique
Yehuda Lindell
2016/035 ( PDF )
Rational Proofs of Space-Time
Tal Moran and Ilan Orlov
2016/034 ( PDF )
Universal Composition with Responsive Environments
Jan Camenisch and Robert R. Enderlein and Stephan Krenn and Ralf Kuesters and Daniel Rausch
2016/030 ( PDF )
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek and Nina Bindel and Johannes Buchmann and Juliane Krämer and Giorgia Azzurra Marson
2016/027 ( PDF )
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
Dan Boneh and Henry Corrigan-Gibbs and Stuart Schechter
2016/025 ( PDF )
Human-readable Proof of the Related-Key Security of AES-128
Khoongming Khoo and Eugene Lee and Thomas Peyrin and Siang Meng Sim
2015/1254 ( PDF )
Identity-based Hierarchical Key-insulated Encryption without Random Oracles
Yohei Watanabe and Junji Shikata
2015/1253 ( PDF )
Non-Malleable Functions and Their Applications
Yu Chen and Baodong Qin and Jiang Zhang and Yi Deng and Sherman S. M. Chow
2015/1248 ( PDF )
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model
Janaka Alawatugoda
2015/1247 ( PDF )
Missing a trick: Karatsuba variations
Mike Scott
2015/1240 ( -- withdrawn -- )
Exploiting PUF Unreliability to Secure Wireless Sensing
Yansong Gao, Hua Ma, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1230 ( PDF )
Indistinguishable Proofs of Work or Knowledge
Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2015/1224 ( PDF )
Twisted Polynomials and Forgery Attacks on GCM
Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, and Elmar Tischhauser
2015/1221 ( -- withdrawn -- )
Unclonable encryption revisited ($4 \times 2 = 8$)
Boris Skoric
2015/1218 ( -- withdrawn -- )
$Area-Time$ Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Anissa Sghaier and Medien Zeghid and Belgacem Bouallegue and Adel Baganne and Mohsen Machhout
2015/1214 ( PDF )
Simple Security Definitions for and Constructions of 0-RTT Key Exchange
Britta Hale and Tibor Jager and Sebastian Lauer and Jörg Schwenk
2015/1192 ( PDF )
A Guide to Fully Homomorphic Encryption
Frederik Armknecht and Colin Boyd and Christopher Carr and Kristian Gjøsteen and Angela Jäschke and Christian A. Reuter and Martin Strand
2015/1187 ( PDF )
On an almost-universal hash function family with applications to authentication and secrecy codes
Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and László Tóth
2015/1186 ( PDF )
Restricted linear congruences
Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and Roberto Tauraso and László Tóth
2015/1178 ( PDF )
Textbook Non-Malleable Commitments
Vipul Goyal and Omkant Pandey and Silas Richelson
2015/1168 ( -- withdrawn -- )
SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains
Loi Luu and Viswesh Narayanan and Kunal Baweja and Chaodong Zheng and Seth Gilbert and Prateek Saxena
2015/1167 ( PDF )
Constraining Pseudorandom Functions Privately
Dan Boneh and Kevin Lewi and David J. Wu
2015/1166 ( PDF )
Ceremonies for End-to-End Verifiable Elections
Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2015/1162 ( PDF )
The Moral Character of Cryptographic Work
Phillip Rogaway
2015/1157 ( PDF )
From Identification to Signatures, Tightly: A Framework and Generic Transforms
Mihir Bellare and Bertram Poettering and Douglas Stebila
2015/1156 ( -- withdrawn -- )
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks
Dipanjan Das and Priyanka Bose and S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
2015/1152 ( PDF )
Privacy-preserving Friendship-based Recommender Systems
Qiang Tang and Jun Wang
2015/1150 ( PDF )
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
Colin Boyd and Britta Hale and Stig Frode Mjølsnes and Douglas Stebila
2015/1147 ( -- withdrawn -- )
Collusion Resistant Aggregation from Convertible Tags
Iraklis Leontiadis and Ming Li
2015/1141 ( PDF )
Amplifying Side Channels Through Performance Degradation
Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom
2015/1134 ( PDF )
$\Lambda \circ \lambda$: Functional Lattice Cryptography
Eric Crockett and Chris Peikert
2015/1130 ( PDF )
A Note on Perfect Correctness by Derandomization
Nir Bitansky and Vinod Vaikuntanathan
2015/1128 ( PDF )
New directions in nearest neighbor searching with applications to lattice sieving
Anja Becker and Léo Ducas and Nicolas Gama and Thijs Laarhoven
2015/1127 ( PDF )
Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups
Mikhail Anokhin
2015/1125 ( PDF )
Practical Order-Revealing Encryption with Limited Leakage
Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu
2015/1106 ( PDF )
POPE: Partial Order Preserving Encoding
Daniel S. Roche and Daniel Apon and Seung Geol Choi and Arkady Yerukhimovich
2015/1099 ( PDF )
Device-Enhanced Password Protocols with Optimal Online-Offline Protection
Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena
2015/1093 ( PDF )
C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs
Ahmed Kosba and Zhichao Zhao and Andrew Miller and Yi Qian and Hubert Chan and Charalampos Papamanthou and Rafael Pass and abhi shelat and Elaine Shi
2015/1092 ( PDF )
Post-quantum key exchange - a new hope
Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe
2015/1082 ( PDF )
Delegating RAM Computations with Adaptive Soundness and Privacy
Prabhanjan Ananth and Yu-Chi Chen and Kai-Min Chung and Huijia Lin and Wei-Kai Lin
2015/1073 ( PDF )
Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs
David Derler and Daniel Slamanig
2015/1049 ( PDF )
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Thomas Peyrin and Yannick Seurin
2015/1046 ( PDF )
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
Benny Applebaum and Pavel Raykov
2015/1039 ( PDF )
Maturity and Performance of Programmable Secure Computation
David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen
2015/1035 ( PDF )
CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
Britta Hale and Christopher Carr and Danilo Gligoroski
2015/1023 ( PDF )
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/1021 ( PDF )
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption
Katsuyuki Takashima
2015/1019 ( PDF )
Speed-Security Tradeoffs in Blockchain Protocols
Aggelos Kiayias and Giorgos Panagiotakos
2015/1018 ( PDF )
A Riddle Wrapped in an Enigma
Neal Koblitz and Alfred Menezes
2015/1011 ( PDF )
Hierarchical Functional Encryption
Zvika Brakerski and Gil Segev
2015/997 ( PDF )
Incremental Program Obfuscation
Sanjam Garg and Omkant Pandey
2015/990 ( PDF )
Encryption Switching Protocols
Geoffroy Couteau and Thomas Peters and David Pointcheval
2015/972 ( PDF )
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
David Pointcheval and Olivier Sanders and Jacques Traoré
2015/958 ( -- withdrawn -- )
Building Single-Key Beyond Birthday Bound Message Authentication Code
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
2015/957 ( PDF )
Delegating RAM Computations
Yael Tauman Kalai and Omer Paneth
2015/956 ( PDF )
Analysis of the Kupyna-256 Hash Function
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/955 ( PDF )
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
Mridul Nandi and Tapas Pandit
2015/954 ( PDF )
Online-Offline Homomorphic Signatures for Polynomial Functions
Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/952 ( PDF )
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
2015/946 ( PDF )
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem
Alex Biryukov and Dmitry Khovratovich
2015/942 ( PDF )
Secrecy and independence for election schemes
Ben Smyth
2015/935 ( PDF )
Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity
Céline Blondeau and Kaisa Nyberg
2015/919 ( -- withdrawn -- )
Privacy-preserving computation with trusted computing via Scramble-then-Compute
Hung Dang and Anh Dinh and Ee-Chien Chang and Beng Chin Ooi
2015/914 ( PDF )
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2015/887 ( PDF )
Composable Security in the Tamper Proof Hardware Model under Minimal Complexity
Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2015/882 ( PDF )
Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks
Margaux Dugardin and Sylvain Guilley and Martin Moreau and Zakaria Najm and Pablo Rauzy
2015/859 ( PDF )
Factor Base Discrete Logarithms in Kummer Extensions
Dianyan Xiao and Jincheng Zhuang and Qi Cheng
2015/858 ( PDF )
Skipping the $q$ in Group Signatures
Olivier Blazy and Saqib A. Kakvi
2015/843 ( PDF )
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
David Derler and Daniel Slamanig
2015/822 ( PDF )
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Akshayaram Srinivasan and C. Pandu Rangan
2015/808 ( PDF )
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
Mihir Bellare and Joseph Jaeger and Daniel Kane
2015/806 ( PDF )
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
2015/797 ( PDF )
What Security Can We Achieve within 4 Rounds?
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/775 ( PDF )
Efficient MDS Diffusion Layers Through Decomposition of Matrices
S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo
2015/765 ( PDF )
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Victoria Fehr and Marc Fischlin
2015/755 ( PDF )
Revisiting TESLA in the quantum random oracle model
Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen and Edward Eaton and Gus Gutoski and Juliane Krämer and Filip Pawlega
2015/751 ( PDF )
Fast Garbling of Circuits Under Standard Assumptions
Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
2015/745 ( PDF )
Faster ECC over F2571 (feat. PMULL)
Hwajeong Seo
2015/740 ( PDF )
Predictable Arguments of Knowledge
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2015/739 ( -- withdrawn -- )
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang
2015/738 ( PDF )
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
Kazuhiko Minematsu
2015/713 ( -- withdrawn -- )
Light-hHB: A New Version of hHB with Improved Session Key Exchange
Ka Ahmad Khoureich
2015/712 ( PDF )
Adaptive Proofs have Straightline Extractors (in the Random Oracle Model)
David Bernhard and Bogdan Warinschi and Ngoc Khanh Nguyen
2015/709 ( PDF )
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
Luka Malisa and Kari Kostiainen and Srdjan Capkun
2015/706 ( PDF )
A Brief Comparison of Simon and Simeck
Stefan Kölbl and Arnab Roy
2015/701 ( PDF )
Differentially private instance-based noise mechanisms in practice
Sébastien Canard and Baptiste Olivier and Tony Quertier
2015/694 ( PDF )
On the Complexity of Additively Homomorphic UC Commitments
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
2015/693 ( PDF )
Foundations of Reactive Garbling Schemes
Jesper Buus Nielsen and Samuel Ranellucci
2015/674 ( PDF )
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
Roman Jagomägis and Peeter Laud and Alisa Pankova
2015/660 ( -- withdrawn -- )
A Hybrid Gaussian Sampler for Lattices over Rings
Léo Ducas and Thomas Prest
2015/639 ( -- withdrawn -- )
Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings
Hao Chen
2015/636 ( PDF )
On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks
Matthias Hamann and Matthias Krause
2015/634 ( PDF )
Phasing: Private Set Intersection using Permutation-based Hashing
Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner
2015/629 ( PDF )
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme
Pyrros Chaidos and Véronique Cortier and Georg Fuchsbauer and David Galindo
2015/624 ( PDF )
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff
2015/623 ( -- withdrawn -- )
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand
2015/608 ( PDF )
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Shweta Agrawal and Benoit Libert and Damien Stehle
2015/565 ( PDF )
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
Craig Costello and Patrick Longa
2015/564 ( PDF )
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Victor Costan and Ilia Lebedev and Srinivas Devadas
2015/531 ( PDF )
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
Mohammad Hajiabadi, Bruce M. Kapron
2015/525 ( PDF )
Short Randomizable Signatures
David Pointcheval and Olivier Sanders
2015/506 ( PDF )
Strong Non-Interference and Type-Directed Higher-Order Masking
Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub and Rébecca Zucchini
2015/486 ( PDF )
DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, and Cas Cremers
2015/485 ( PDF )
Turning Online Ciphers Off
Elena Andreeva and Guy Barwell and Ritam Bhaumik and Mridul Nandi and Dan Page and Martijn Stam
2015/483 ( PDF )
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Shi Bai and Adeline Langlois and Tancrède Lepoint and Amin Sakzad and Damien Stehle and Ron Steinfeld
2015/459 ( PDF )
New Observation on Division Property
Bing Sun and Xin Hai and Wenyu Zhang and Lei Cheng and Zhichao Yang
2015/455 ( PDF )
Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu and N.Asokan and Benny Pinkas
2015/413 ( PDF )
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
Shashank Agrawal and Melissa Chase
2015/407 ( PDF )
Higher-Order Cryptanalysis of LowMC
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/375 ( PDF )
Bounds on surmising remixed keys
Daniel R. L. Brown
2015/353 ( PDF )
Matrix Computational Assumptions in Multilinear Groups
Paz Morillo and Carla Ràfols and Jorge L. Villar
2015/316 ( PDF )
Non-malleability under Selective Opening Attacks: Implication and Separation
Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen
2015/300 ( PDF )
Scalable Divisible E-cash
Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
2015/246 ( PDF )
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee
2015/243 ( PDF )
Reliable communication via semilattice properties of partial knowledge
Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
2015/233 ( PDF )
Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ
Ben Smyth and Steven Frink and Michael R. Clarkson
2015/174 ( PDF )
A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers
Chenyang Tu and Lingchen Zhang and Neng Gao and Zeyi Liu and Yuan Ma and Zongbin Liu
2015/163 ( PDF )
Indistinguishability Obfuscation from Functional Encryption
Nir Bitansky and Vinod Vaikuntanathan
2015/150 ( PDF )
Insynd: Improved Privacy-Preserving Transparency Logging
Roel Peeters and Tobias Pulls
2015/136 ( PDF )
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs
Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. L. M. Barreto
2015/129 ( PDF )
Block-wise Non-Malleable Codes
Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay
2015/126 ( PDF )
Perfect Structure on the Edge of Chaos
Nir Bitansky and Omer Paneth and Daniel Wichs
2015/121 ( PDF )
Multi-Client Oblivious RAM secure against Malicious Servers
Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
2015/073 ( PDF )
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin
2015/044 ( PDF )
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
Binanda Sengupta and Abhijit Das
2015/040 ( PDF )
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/002 ( PDF )
Characterization of MDS mappings
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2014/1026 ( PDF )
Lattices with Symmetry
H. W. Lenstra, Jr. and A. Silverberg
2014/1020 ( PDF )
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
2014/1004 ( PDF )
CONIKS: Bringing Key Transparency to End Users
Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
2014/989 ( PDF )
Controlled Homomorphic Encryption: Definition and Construction
Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti
2014/962 ( PDF )
Solving Polynomial Systems with Noise over F_2: Revisited
Zhenyu Huang and Dongdai Lin
2014/961 ( PDF )
When are Fuzzy Extractors Possible?
Benjamin Fuller and Leonid Reyzin and Adam Smith
2014/939 ( -- withdrawn -- )
Security Analysis of an Authentication Scheme Using Smart Cards
Gaurav Tiwari and Amit K. Awasthi and Neha Shukla
2014/913 ( PDF )
Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2014/903 ( PDF )
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)
Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos
2014/870 ( PDF )
Dynamic Behavior of RS latches using FIB processing and probe connection
Naoya Torii and Dai Yamamoto and Masahiko Takenaka and Tsutomu Matsumoto
2014/835 ( PDF )
Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
David Galindo and Johann Großschädl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek
2014/831 ( PDF )
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean and Ivica Nikolić and Thomas Peyrin
2014/805 ( PDF )
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
Charanjit S. Jutla and Arnab Roy
2014/793 ( PDF )
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
Viet Tung Hoang and Ted Krovetz and Phillip Rogaway
2014/792 ( PDF )
General Classification of the Authenticated Encryption Schemes for the CAESAR Competition
Farzaneh abed and Christian Forler and Stefan Lucks
2014/767 ( PDF )
Algebraic Attacks on Human Identification Protocols
Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk
2014/765 ( PDF )
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2014/741 ( PDF )
Eliminating Leakage in Reverse Fuzzy Extractors
André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser
2014/733 ( PDF )
Augmented Learning with Errors: The Untapped Potential of the Error Term
Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann
2014/731 ( PDF )
Secure modular password authentication for the web using channel bindings
Mark Manulis and Douglas Stebila and Franziskus Kiefer and Nick Denham
2014/720 ( PDF )
Adaptively Secure Constrained Pseudorandom Functions
Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters
2014/704 ( PDF )
A 128-bit Block Cipher Based on Three Group Arithmetics
Shenghui Su and Shuwang Lü and Daqiang Dong
2014/672 ( PDF )
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Xiao Wang and Hubert Chan and Elaine Shi
2014/668 ( PDF )
Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation
Ran Cohen and Yehuda Lindell
2014/665 ( PDF )
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks
Julien Bringer and Claude Carlet and Hervé Chabanne and Sylvain Guilley and Houssem Maghrebi
2014/631 ( PDF )
Zipf’s Law in Passwords
Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
2014/609 ( PDF )
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/607 ( PDF )
Adding Controllable Linkability to Pairing-Based Group Signatures For Free
Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer
2014/605 ( PDF )
On the Possibilities and Limitations of Computational Fuzzy Extractors
Kenji Yasunaga and Kosuke Yuzawa
2014/599 ( PDF )
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila
2014/586 ( PDF )
An Algebraic Approach to Non-Malleability
Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald
2014/485 ( PDF )
An Improved Truncated Di fferential Cryptanalysis of KLEIN
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref
2014/472 ( PDF )
How to Watermark Cryptographic Functions
Ryo Nishimaki
2014/409 ( PDF )
Moments-Correlating DPA
Amir Moradi and François-Xavier Standaert
2014/347 ( PDF )
One-Way Functions and (Im)perfect Obfuscation
Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev
2014/329 ( PDF )
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
Berry Schoenmakers
2014/241 ( -- withdrawn -- )
A New Way to Prevent UKS Attacks Using Trusted Computing
Qianying Zhang and Shijun Zhao and Dengguo Feng
2014/230 ( PDF )
Isogeny graphs with maximal real multiplication
Sorina Ionica and Emmanuel Thomé
2014/220 ( PDF )
Total Break of Zorro using Linear and Differential Attacks
Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
2014/132 ( PDF )
Efficient Revocable Identity-Based Encryption via Subset Difference Methods
Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park
2014/124 ( PDF )
On the Information Ratio of Non-Perfect Secret Sharing Schemes
Oriol Farràs and Torben Brandt Hansen and Tarik Kaced and Carles Padró
2014/075 ( PDF )
Publicly Auditable Secure Multi-Party Computation
Carsten Baum and Ivan Damgård and Claudio Orlandi
2014/033 ( PDF )
Lattice-based Group Signature Scheme with Veri er-local Revocation
Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang
2013/845 ( PDF )
How to Keep a Secret: Leakage Deterring Public-key Cryptography
Aggelos Kiayias and Qiang Tang
2013/839 ( PDF )
Lattice Decoding Attacks on Binary LWE
Shi Bai and Steven D. Galbraith
2013/789 ( PDF )
Proofs of Data Possession and Retrievability Based on MRD Codes
Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu
2013/762 ( PDF )
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung
2013/752 ( PDF )
On the Power of Rewinding Simulators in Functional Encryption
Angelo De Caro and Vincenzo Iovino
2013/717 ( PDF )
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
2013/659 ( -- withdrawn -- )
A provable secure anonymous proxy signature scheme without random oracles
Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2013/628 ( PDF )
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
Kazuhiko Minematsu
2013/525 ( PDF )
Catena: A Memory-Consuming Password-Scrambling Framework
Christian Forler and Stefan Lucks and Jakob Wenzel
2013/515 ( PDF )
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
Changyu Dong and Liqun Chen and Zikai Wen
2013/503 ( PDF )
On secret sharing with nonlinear product reconstruction
Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing
2013/394 ( PDF )
A Public Key Cryptoscheme Using Bit-pair Shadows
Shenghui Su and Shuwang Lü and Maozhi Xu and Tao Xie
2013/364 ( PDF )
On the Achievability of Simulation-Based Security for Functional Encryption
Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano
2013/351 ( PDF )
Time-Optimal Interactive Proofs for Circuit Evaluation
Justin Thaler
2013/327 ( PDF )
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
Shenghui Su and Tao Xie and Shuwang Lü
2013/321 ( PDF )
Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security
Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote
2013/275 ( PDF )
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version)
Johannes Braun and Gregor Rynkowski
2013/274 ( -- withdrawn -- )
A time series approach for profiling attack
Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch
2013/269 ( PDF )
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Jonathan Trostle
2013/183 ( PDF )
Practical Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2012/629 ( PDF )
SCAPI: The Secure Computation Application Programming Interface
Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell
2012/577 ( PDF )
A Framework for Unique Ring Signatures
Matthew Franklin and Haibin Zhang
2012/508 ( PDF )
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung
2012/154 ( -- withdrawn -- )
The Joint Signature and Encryption Revisited
Laila El Aimani
2012/068 ( -- withdrawn -- )
Extended Security Arguments for (Ring) Signature Schemes
Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, and Pierre-Louis Cayrel
2011/238 ( PDF )
Attacks On a Double Length Blockcipher-based Hash Proposal
Yiyuan Luo, Xuejia Lai
2011/230 ( PDF )
All-But-Many Lossy Trapdoor Functions
Dennis Hofheinz
2010/287 ( PDF )
Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
Jacques Patarin
2008/440 ( PDF )
Robust Encryption
Michel Abdalla and Mihir Bellare and Gregory Neven
2007/128 ( PDF )
Computationally Sound Mechanized Proofs of Correspondence Assertions
Bruno Blanchet
2000/039 ( PDF )
Encryption Modes with Almost Free Message Integrity
Charanjit S. Jutla


[ Cryptology ePrint archive ]