Cryptology ePrint Archive: Recent Updates

2015/1018 ( PDF )
A Riddle Wrapped in an Enigma
N. Koblitz and A. Menezes
2015/1017 ( PDF )
Functional Encryption: Decentralised and Delegatable
Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
2015/1016 ( PDF )
Lifting the Security of NI-MAC Beyond Birthday Bound
Avijit Dutta and Goutam Paul
2015/1015 ( PDF )
On Bitcoin as a public randomness source
Joseph Bonneau and Jeremy Clark and Steven Goldfeder
2015/1014 ( PDF )
Fast Fourier Orthogonalization
Léo Ducas and Thomas Prest
2015/1013 ( PDF )
Inception Makes Non-malleable Codes Stronger
Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
2015/1012 ( PDF )
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
2015/1011 ( PDF )
Hierarchical Functional Encryption
Zvika Brakerski and Gil Segev
2015/1010 ( PDF )
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
2015/1009 ( PDF )
Applications of Key Recovery Cube-attack-like
Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
2015/1008 ( PDF )
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
2015/1007 ( PDF )
How to Vote Privately Using Bitcoin
Zhichao Zhao and T-H. Hubert Chan
2015/1006 ( PDF )
Confidential Benchmarking based on Multiparty Computation
Ivan Damgĺrd and Kasper Damgĺrd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
2015/1005 ( PDF )
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
Wenbin Zhang and Chik How Tan
2015/1004 ( PDF )
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
2015/1003 ( PDF )
Results on polynomial interpolation with mixed modular operations and unknown moduli
Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
2015/1002 ( PDF )
got HW crypto? On the (in)security of a Self-Encrypting Drive series
Gunnar Alendal and Christian Kison and modg
2015/1001 ( PDF )
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
2015/1000 ( PDF )
Factoring as a Service
Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
2015/999 ( PDF )
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves
2015/998 ( PDF )
All or Nothing at All
Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
2015/997 ( PDF )
Incremental Program Obfuscation
Sanjam Garg and Omkant Pandey
2015/996 ( PDF )
Multi-user Schnorr security, revisited
Daniel J. Bernstein
2015/995 ( PDF )
Updates on Sorting of Fully Homomorphic Encrypted Data
Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed
2015/994 ( -- withdrawn -- )
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/993 ( PDF )
Bi-Deniable Inner Product Encryption from LWE
Daniel Apon and Xiong Fan and Feng-Hao Liu
2015/992 ( PDF )
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
Jinsu Kim and Sungwook Kim and Jae Hong Seo
2015/991 ( PDF )
Ed3363 (HighFive) -- An alternative Elliptic Curve
Mike Scott
2015/990 ( PDF )
Encryption Switching Protocols
Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/989 ( PDF )
Fast Oblivious AES\\A dedicated application of the MiniMac protocol
Ivan Damgĺrd and Rasmus Winther Zakarias
2015/988 ( PDF )
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram
2015/987 ( PDF )
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
Yehuda Lindell and Ben Riva
2015/986 ( PDF )
Bit Coincidence Mining Algorithm
Koh-ichi Nagao
2015/985 ( PDF )
Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
Koh-ichi Nagao
2015/984 ( PDF )
Complexity of ECDLP under the First Fall Degree Assumption
Koh-ichi Nagao
2015/983 ( PDF )
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
Ping Ngai Chung and Craig Costello and Benjamin Smith
2015/982 ( PDF )
A note on constructions of bent functions from involutions
Sihem Mesnager
2015/981 ( PDF )
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
Ayantika Chatterjee and Indranil Sengupta
2015/980 ( PDF )
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
2015/979 ( PDF )
Guidelines for Using the CryptDB System Securely
Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
2015/978 ( PDF )
The OPTLS Protocol and TLS 1.3
Hugo Krawczyk and Hoeteck Wee
2015/977 ( PDF )
Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(pł)
Michał Wroński
2015/976 ( PDF )
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
Alex Biryukov and Léo Perrin
2015/975 ( PDF )
Extended Functionality in Verifiable Searchable Encryption
James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick
2015/974 ( PDF )
The Conjoined Microprocessor
Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and Rémi Géraud David Naccache and Jean Vuillemin
2015/973 ( PDF )
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
Ashwin Jha and Mridul Nandi
2015/972 ( PDF )
Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
David Pointcheval and Olivier Sanders and Jacques Traoré
2015/971 ( PDF )
Attacks on Search RLWE
Hao Chen, Kristin Lauter, and Katherine E. Stange
2015/970 ( PDF )
Multilinear Maps over the Integers Using Modulus Switching
Gu Chunsheng
2015/969 ( PDF )
Zero-Knowledge Interactive Proof Systems for New Lattice Problems
Claude Crepéau and Raza Ali Kazmi
2015/968 ( PDF )
Differential and Linear Cryptanalysis of ARX with Partitioning -- Application to FEAL and Chaskey
Gaëtan Leurent
2015/967 ( PDF )
Freestart collision on full SHA-1
Marc Stevens and Pierre Karpman and Thomas Peyrin
2015/966 ( PDF )
Vulnerabilities of ``McEliece in the World of Escher"
Dustin Moody and Ray Perlner
2015/965 ( PDF )
Private Genome Analysis through Homomorphic Encryption
Miran Kim and Kristin Lauter
2015/964 ( PDF )
Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
Danping Shi and Lei Hu and Siwei Sun and Ling Song
2015/963 ( PDF )
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
Houda Ferradi and Rémi Géraud and David Naccache and Assia Tria
2015/962 ( PDF )
SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
2015/961 ( PDF )
Short Structure-Preserving Signatures
Essam Ghadafi
2015/960 ( PDF )
More Efficient Secure Outsourcing Methods for Bilinear Maps
Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol
2015/959 ( PDF )
Cryptanalysis of the Round-Reduced Kupyna Hash Function
Jian Zou, Le Dong
2015/958 ( PDF )
One-key Double-Sum MAC with Beyond-Birthday Security
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
2015/957 ( PDF )
Delegating RAM Computations
Yael Tauman Kalai and Omer Paneth
2015/956 ( PDF )
Analysis of the Kupyna-256 Hash Function
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/955 ( PDF )
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
Mridul Nandi and Tapas Pandit
2015/954 ( PDF )
Online-Offline Homomorphic Signatures for Polynomial Functions
Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/953 ( PDF )
Gaussian Sampling Precision and Information Leakage in Lattice Cryptography
Markku-Juhani O. Saarinen
2015/952 ( PDF )
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
2015/951 ( PDF )
Nearly Optimal Robust Secret Sharing
Mahdi Cheraghchi
2015/950 ( PDF )
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Shota Goto and Junji Shikata
2015/949 ( PDF )
Private Processing of Outsourced Network Functions: Feasibility and Constructions
Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali Kaafar
2015/948 ( PDF )
A Provably Secure Short Signature Scheme from Coding Theory
Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/947 ( PDF )
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
2015/946 ( PDF )
Asymmetric proof-of-work based on the Generalized Birthday problem
Alex Biryukov and Dmitry Khovratovich
2015/945 ( PDF )
Secure Set-based Policy Checking and Its Application to Password Registration
Changyu Dong and Franziskus Kiefer
2015/944 ( PDF )
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
Palash Sarkar and Shashank Singh
2015/943 ( PDF )
Sandy2x: New Curve25519 Speed Records
Tung Chou
2015/942 ( PDF )
Secrecy and independence for election schemes
Ben Smyth
2015/941 ( PDF )
Cryptanalysis of the New Multilinear Map over the Integers
Brice Minaud and Pierre-Alain Fouque
2015/940 ( PDF )
Secure Association for the Internet of Things
Almog Benin and Sivan Toledo and Eran Tromer
2015/939 ( PDF )
A Decade of Lattice Cryptography
Chris Peikert
2015/938 ( PDF )
Lattice Based Cryptography for Beginners
Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim
2015/937 ( PDF )
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung
2015/936 ( -- withdrawn -- )
A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
2015/935 ( PDF )
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
Céline Blondeau and Kaisa Nyberg
2015/934 ( PDF )
Cryptanalysis of the New CLT Multilinear Maps
Jung Hee Cheon and Changmin Lee and Hansol Ryu
2015/933 ( PDF )
Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme
Jayaprakash Kar
2015/932 ( PDF )
Using Tweaks To Design Fault Resistant Ciphers
Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay
2015/931 ( PDF )
Fast and Secure Three-party Computation: The Garbled Circuit Approach
Payman Mohassel and Mike Rosulek and Ye Zhang
2015/930 ( PDF )
Nearly Sparse Linear Algebra
Antoine Joux and Cécile Pierrot
2015/929 ( PDF )
Are you The One to Share? Secret Transfer with Access Structure
Yongjun Zhao and Sherman S.M. Chow
2015/928 ( PDF )
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
Hassan Noura and Damien Couroussé
2015/927 ( PDF )
Rich Queries on Encrypted Data: Beyond Exact Matches
Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner
2015/926 ( PDF )
CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
Vadim N.Tsypyschev and Julia S.Vinogradova
2015/925 ( PDF )
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/924 ( PDF )
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
2015/923 ( PDF )
DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING
Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay
2015/922 ( PDF )
Localised Multisecret Sharing
Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
2015/921 ( PDF )
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
Kwangsu Lee and Jong Hwan Park
2015/920 ( PDF )
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese and Antonio Faonio and Seny Kamara
2015/919 ( PDF )
PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
Hung Dang and Tien Tuan Anh Dinh and Ee-Chien Chang and Beng Chin Ooi and Prateek Saxena and Shruti Tople
2015/918 ( PDF )
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk
2015/917 ( PDF )
Private Proximity Testing on Steroids: An NTRU-based Protocol
Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche
2015/916 ( PDF )
Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/915 ( PDF )
A Generic Construction for Verifiable Attribute-based Keyword Search Schemes
Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
2015/914 ( PDF )
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2015/913 ( PDF )
Functional Signcryption: Notion, Construction, and Applications
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/912 ( PDF )
Extraction of intrinsic structure for Hardware Trojan detection
Maxime Lecomte and Jacques Fournier and Philippe Maurine
2015/911 ( PDF )
Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin
2015/910 ( PDF )
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
Alonso González and Alejandro Hevia and Carla Rŕfols
2015/909 ( PDF )
On the Impact of Known-Key Attacks on Hash Functions
Bart Mennink, Bart Preneel
2015/908 ( PDF )
Linear Distinguishers in the Key-less Setting: Application to PRESENT
Martin M. Lauridsen and Christian Rechberger
2015/907 ( PDF )
Cryptographic Assumptions: A Position Paper
Shafi Goldwasser and Yael Tauman Kalai
2015/906 ( PDF )
RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors
Adnan Baysal and Suhap Sahin
2015/905 ( PDF )
Mapping the Intel Last-Level Cache
Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser
2015/904 ( PDF )
Almost-tight Identity Based Encryption against Selective Opening Attack
Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen
2015/903 ( PDF )
A Note on the Indifferentiability of the 10-Round Feistel Construction
Yannick Seurin
2015/902 ( PDF )
Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques
Kexin Qiao and Lei Hu and Siwei Sun
2015/901 ( PDF )
A Unified Approach to MPC with Preprocessing using OT
Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl
2015/900 ( PDF )
New Results on Identity-based Encryption from Quadratic Residuosity
Ferucio Laurentiu Tiplea and Emil Simion
2015/899 ( PDF )
Privacy-preserving Attribute Based Searchable Encryption
Payal Chaudhari and Maniklal Das
2015/898 ( PDF )
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/897 ( PDF )
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography
Prosanta Gope
2015/896 ( PDF )
Improved Attacks on Reduced-Round Camellia-128/192/256
Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang
2015/895 ( PDF )
Rogue Decryption Failures: Reconciling AE Robustness Notions
Guy Barwell and Dan Page and Martijn Stam
2015/894 ( PDF )
Comparison of cube attacks over different vector spaces
Richard Winter and Ana Salagean and Raphael C.-W. Phan
2015/893 ( PDF )
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
2015/892 ( PDF )
Security Against Related Randomness Attacks via Reconstructive Extractors
Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee
2015/891 ( PDF )
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy
Sébastien Canard and Viet Cuong Trinh
2015/890 ( PDF )
MI-T-HFE, a New Multivariate Signature Scheme
Wenbin Zhang and Chik How Tan
2015/889 ( PDF )
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
Anamaria Costache and Nigel P. Smart
2015/888 ( PDF )
Tweak-Length Extension for Tweakable Blockciphers
Kazuhiko Minematsu and Tetsu Iwata
2015/887 ( PDF )
Round-Optimal Token-Based Secure Computation
Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2015/886 ( PDF )
Applying Cryptographic Acceleration Techniques to Error Correction
Rémi Géraud and Diana-Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion
2015/885 ( PDF )
A New Standard of Ukraine: The Kupyna Hash Function
Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov
2015/884 ( PDF )
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/883 ( -- withdrawn -- )
Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security
Avijit Dutta and Goutam Paul
2015/882 ( PDF )
Using Modular Extension to Provably Protect ECC Against Fault Attacks
Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm
2015/881 ( PDF )
Generic Security of NMAC and HMAC with Input Whitening
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/880 ( PDF )
Generic Efficient Dynamic Proofs of Retrievability
Mohammad Etemad and Alptekin Küpçü
2015/879 ( PDF )
Computing information on domain parameters from public keys selected uniformly at random
Martin Ekerĺ
2015/878 ( PDF )
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model
Edward Eaton and Fang Song
2015/877 ( PDF )
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
Christophe Clavier and Julien Francq and Antoine Wurcker
2015/876 ( PDF )
10-Round Feistel is Indifferentiable from an Ideal Cipher
Dana Dachman-Soled and Jonathan Katz and Aishwarya Thiruvengadam
2015/875 ( PDF )
Bent and Semi-bent Functions via Linear Translators
Neşe Koçak, Sihem Mesnager and Ferruh Özbudak
2015/874 ( PDF )
Feistel Networks: Indifferentiability at 10 Rounds
Yuanxi Dai and John Steinberger
2015/873 ( PDF )
On the Diffusion Property of Iterated Functions
Jian Liu, Sihem Mesnager, and Lusheng Chen
2015/872 ( PDF )
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
2015/871 ( PDF )
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family
Shahin Tajik and Enrico Dietz and Sven Frohmann and Helmar Dittrich and Dmitry Nedospasov and Clemens Helfmeier and Jean-Pierre Seifert and Christian Boit and Heinz-Wilhelm Hübers
2015/870 ( PDF )
Gambling, Computational Information and Encryption Security
Mohammad Hajiabadi and Bruce M. Kapron
2015/869 ( PDF )
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs
2015/868 ( PDF )
Optimally Secure Block Ciphers from Ideal Primitives
Stefano Tessaro
2015/867 ( PDF )
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Michel Abdalla and Fabrice Benhamouda and Alain Passelčgue
2015/866 ( PDF )
Graded Encoding, Variations on a Scheme
Shai Halevi
2015/865 ( PDF )
Card-based Cryptographic Protocols Using a Minimal Number of Cards
Alexander Koch and Stefan Walzer and Kevin Härtel
2015/864 ( PDF )
Encryption Performance Improvements of the Paillier Cryptosystem
Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets
2015/863 ( PDF )
Is There an Oblivious RAM Lower Bound?
Elette Boyle and Moni Naor
2015/862 ( PDF )
Idealizing Identity-Based Encryption
Dennis Hofheinz and Christian Matt and Ueli Maurer
2015/861 ( PDF )
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
Chun Guo and Dongdai Lin
2015/860 ( PDF )
Selective Opening Security for Receivers
Carmit Hazay and Arpita Patra and Bogdan Warinschi
2015/859 ( PDF )
Factor Base Discrete Logarithms in Kummer Extensions
Dianyan Xiao and Jincheng Zhuang and Qi Cheng
2015/858 ( PDF )
Group Signatures Without q-Assumptions
Olivier Blazy and Saqib A. Kakvi
2015/857 ( PDF )
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
Benjamin Fuller and Ariel Hamlin
2015/856 ( PDF )
MGR HASH FUNCTION
Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass
2015/855 ( -- withdrawn -- )
A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
GANESH YELLAPU
2015/854 ( PDF )
Secure Sketch Metamorphosis: Tight Unified Bounds
Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu
2015/853 ( PDF )
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Felix Heuer and Eike Kiltz and Krzysztof Pietrzak
2015/852 ( PDF )
Analysis of a key exchange protocol based on tropical matrix algebra
Matvei Kotov and Alexander Ushakov
2015/851 ( PDF )
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
Benoît Cogliati and Yannick Seurin
2015/850 ( PDF )
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable
Zhen Liu and Duncan S. Wong
2015/849 ( PDF )
Regulating the Pace of von Neumann Correctors
Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, and Amaury de Wargny
2015/848 ( PDF )
The Multiplicative Complexity of Boolean Functions on Four and Five Variables
Meltem Sonmez Turan and Rene Peralta
2015/847 ( PDF )
Exploring Energy Efficiency of Lightweight Block Ciphers
Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
2015/846 ( PDF )
Characterization of Secure Multiparty Computation Without Broadcast
Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem
2015/845 ( PDF )
Cryptanalysis of the Quadratic Zero-Testing of GGH
Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrčde Lepoint and Amit Sahai and Mehdi Tibouchi
2015/844 ( PDF )
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2015/843 ( PDF )
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
David Derler and Daniel Slamanig
2015/842 ( PDF )
On Linkability and Malleability in Self-blindable Credentials
Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers
2015/841 ( PDF )
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices
Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
2015/840 ( PDF )
Related-key Impossible Differential Analysis of Full Khudra
Qianqian Yang and Lei Hu and Siwei Sun and Ling Song
2015/839 ( PDF )
Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?
David Wong
2015/838 ( PDF )
Offline Witness Encryption
Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
2015/837 ( PDF )
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation
Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA
2015/836 ( PDF )
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
Benjamin Wesolowski and Pascal Junod
2015/835 ( PDF )
On near prime-order elliptic curves with small embedding degrees
Duc-Phong Le and Nadia El Mrabet and Chik How Tan
2015/834 ( PDF )
Authentication Using Side-Channel Information
Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata
2015/833 ( PDF )
Efficient Key Authentication Service for Secure End-to-end Communications
Mohammad Etemad and Alptekin Küpçü
2015/832 ( PDF )
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
David McCann, Kerstin Eder, Elisabeth Oswald
2015/831 ( PDF )
M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk
2015/830 ( PDF )
Unique Signature with Short Output from CDH Assumption
Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
2015/829 ( PDF )
Reducing Multilinear Map Levels in Constrained PRFs and ABE
Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
2015/828 ( PDF )
State-recovery analysis of Spritz
Ralph Ankele and Stefan Koelbl and Christian Rechberger
2015/827 ( PDF )
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee
2015/826 ( PDF )
Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
Dario Catalano and Dario Fiore and Luca Nizzardo
2015/825 ( PDF )
The Emperor's New Password Creation Policies
Ding Wang and Ping Wang
2015/824 ( PDF )
Efficient Fully Structure-Preserving Signatures for Large Messages
Jens Groth
2015/823 ( PDF )
Efficient (ideal) lattice sieving using cross-polytope LSH
Anja Becker and Thijs Laarhoven
2015/822 ( PDF )
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Akshayaram Srinivasan and C. Pandu Rangan
2015/821 ( PDF )
A general framework for building noise-free homomorphic cryptosystems
Gérald Gavin
2015/820 ( PDF )
Extended Nested Dual System Groups, Revisited
Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang
2015/819 ( PDF )
Improving the Big Mac Attack on Elliptic Curve Cryptography
Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
2015/818 ( PDF )
cuHE: A Homomorphic Encryption Accelerator Library
Wei Dai and Berk Sunar
2015/817 ( PDF )
Secure Multi-party Graph Computation
Varsha Bhat and Harsimran Singh and S.R.S. Iyengar
2015/816 ( PDF )
Analysis of Keyless Massive MIMO-based Cryptosystem Security
Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev
2015/815 ( PDF )
On the Power of Hierarchical Identity-Based Encryption
Mohammad Mahmoody and Ameer Mohammed
2015/814 ( PDF )
CLKS: Certificateless Keyword Search on Encrypted Data
Qingji Zheng and Xiangxue Li and Aytac Azgin
2015/813 ( PDF )
Revisiting Turning Online Cipher Off
Ritam Bhaumik and Mridul Nandi
2015/812 ( PDF )
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob
Alex Biryukov and Léo Perrin and Aleksei Udovenko
2015/811 ( PDF )
Key-recovery attacks against the MAC algorithm Chaskey
Chrysanthi Mavromati
2015/810 ( PDF )
Improved OR Composition of Sigma-Protocols
Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2015/809 ( PDF )
New Techniques for Electronic Voting
Alan Szepieniec and Bart Preneel
2015/808 ( PDF )
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
Mihir Bellare and Joseph Jaeger and Daniel Kane
2015/807 ( PDF )
Fair Distributed Computation of Reactive Functions
Juan Garay and Björn Tackmann and Vassilis Zikas
2015/806 ( PDF )
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
2015/805 ( PDF )
A classification of elliptic curves with respect to the GHS attack in odd characteristic
Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
2015/804 ( PDF )
SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
Sumit Chakraborty
2015/803 ( PDF )
Statistical and Algebraic Properties of DES
Stian Fauskanger and Igor Semaev
2015/802 ( PDF )
Ciphertext-only attack on d*d Hill in O(d13^d)
Shahram Khazaei and Siavash Ahmadi
2015/801 ( PDF )
Scalar Blinding on Elliptic Curves based on Primes with Special Structure
Scott Fluhrer
2015/800 ( PDF )
Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
Jihoon Cho, Kyu Young Choi, and Dukjae Moon
2015/799 ( PDF )
Secure Binary Field Multiplication
Hwajeong Seo and Chien-Ning Chen and Zhe Liu and Yasuyuki Nogami and Taehwan Park and Jongseok Choi and Howon Kim
2015/798 ( PDF )
A Stateless Cryptographically-Secure Physical Unclonable Function
Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
2015/797 ( PDF )
What Security can we Achieve in 4-Rounds?
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/796 ( PDF )
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi
2015/795 ( PDF )
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman
2015/794 ( PDF )
Safe-Errors on SPA Protected implementations with the Atomicity Technique
Pierre-Alain Fouque and Sylvain Guilley and Cédric Murdica and David Naccache
2015/793 ( PDF )
Algorithmic Information Theory for Obfuscation Security
Rabih Mohsen and Alexandre Miranda Pinto
2015/792 ( PDF )
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz and Vanishree Rao and Daniel Wichs
2015/791 ( PDF )
On the Equivalence of Obfuscation and Multilinear Maps
Omer Paneth and Amit Sahai
2015/790 ( PDF )
On weak and strong 2^k-bent Boolean functions
Pantelimon Stanica
2015/789 ( PDF )
Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator
Gangqiang Yang and Mark D. Aagaard and Guang Gong
2015/788 ( PDF )
Cracking-Resistant Password Vaults using Natural Language Encoders
Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart
2015/787 ( PDF )
Backtracking-Assisted Multiplication
Houda Ferradi and Rémi Géraud and Diana Maimut and David Naccache and Hang Zhou
2015/786 ( PDF )
Buying AES Design Resistance with Speed and Energy
Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto
2015/785 ( PDF )
Double-Speed Barrett Moduli
Rémi Géraud and Diana Maimut and David Naccache
2015/784 ( PDF )
Threshold FlipThem: When the winner does not need to take all
David Leslie and Chris Sherfield and Nigel P. Smart
2015/783 ( PDF )
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
Ivan Tjuawinata and Tao Huang and Hongjun Wu
2015/782 ( PDF )
Secure two-party computation in applied pi-calculus: models and verification
Sergiu Bursuc
2015/781 ( PDF )
Twisted Hessian curves
Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange
2015/780 ( PDF )
Multilinear Maps from Obfuscation
Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson
2015/779 ( PDF )
A Simple Scheme, for Strengthening Product-sum Type PKC
Masao KASAHARA
2015/778 ( PDF )
Modular Inversion Hidden Number Problem -- Correction and Improvements
Santanu Sarkar
2015/777 ( PDF )
Arithmetic Walsh Transform of Boolean Functions with Linear Structures
Qinglan Zhao and Dong Zheng and Xiangxue Li and Xiaoli Dong
2015/776 ( PDF )
Functional Encryption for Turing Machines
Prabhanjan Ananth and Amit Sahai
2015/775 ( PDF )
Efficient MDS Diffusion Layers Through Decomposition of Matrices
S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo
2015/774 ( PDF )
Revisiting Prime Power RSA
Santanu Sarkar
2015/773 ( PDF )
Distinguishing a truncated random permutation from a random function
Shoni Gilboa and Shay Gueron
2015/772 ( PDF )
Non-Malleable Encryption: Simpler, Shorter, Stronger
Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
2015/771 ( PDF )
A SAT-based Public Key Cryptography Scheme
Sebastian E. Schmittner
2015/770 ( PDF )
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
2015/769 ( PDF )
On the Hardness of Learning with Rounding over Small Modulus
Andrej Bogdanov and Siyao Guo and Daniel Masny and Silas Richelson and Alon Rosen
2015/768 ( PDF )
Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar
2015/767 ( PDF )
Dual EC: A Standardized Back Door
Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen
2015/766 ( PDF )
Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng
2015/765 ( PDF )
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Victoria Fehr and Marc Fischlin
2015/764 ( PDF )
On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2})
Jincheng Zhuang and Qi Cheng
2015/763 ( PDF )
Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and Takafumi Aoki
2015/762 ( PDF )
A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef
2015/761 ( PDF )
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
William Diehl
2015/760 ( PDF )
Investigating SRAM PUFs in large CPUs and GPUs
Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen
2015/759 ( PDF )
Cryptanalysis of Gu's ideal multilinear map
Alice Pellet-Mary and Damien Stehle
2015/758 ( PDF )
Ring-LWE Cryptography for the Number Theorist
Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
2015/757 ( PDF )
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks
Matthias Hamann and Matthias Krause
2015/756 ( PDF )
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/755 ( PDF )
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen
2015/754 ( PDF )
Related-Key Attack on Full-Round PICARO
Anne Canteaut and Virginie Lallemand and María Naya-Plasencia
2015/753 ( PDF )
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen
2015/752 ( PDF )
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov and Gil Segev
2015/751 ( PDF )
Fast Garbling of Circuits Under Standard Assumptions
Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
2015/750 ( PDF )
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki and Daniel Wichs and Mark Zhandry
2015/749 ( PDF )
Affine Equivalence and its Application to Tightening Threshold Implementations
Pascal Sasdrich and Amir Moradi and Tim Güneysu
2015/748 ( PDF )
A More Cautious Approach to Security Against Mass Surveillance
Jean Paul Degabriele and Pooya Farshim and Bertram Poettering
2015/747 ( PDF )
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du
2015/746 ( PDF )
A 2^{70} Attack on the Full MISTY1
Achiya Bar-On
2015/745 ( PDF )
Faster ECC over F_{2^571} (feat. PMULL)
Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
2015/744 ( PDF )
BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
Ege Gulcan and Aydin Aysu and Patrick Schaumont
2015/743 ( PDF )
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Benoit Libert and Thomas Peters and Moti Yung
2015/742 ( PDF )
A Matrix Decomposition Method for Optimal Normal Basis Multiplication
Can Kızılkale and Ömer Eǧecioǧlu and Çetin Kaya Koç
2015/741 ( PDF )
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
2015/740 ( PDF )
Predictable Arguments of Knowledge
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2015/739 ( PDF )
Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation
Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang
2015/738 ( PDF )
Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO)
Kazuhiko Minematsu
2015/737 ( PDF )
New multilinear maps from ideal lattices
Gu Chunsheng
2015/736 ( -- withdrawn -- )
Solving LWE via List Decoding
Mingqiang Wang and Xiaoyun Wang and Kunxian Xia and Jincheng Zhuang
2015/735 ( PDF )
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Ilan Komargodski and Mark Zhandry
2015/734 ( PDF )
On the Security of Extended Generalized Feistel Networks
Manoj Kumar and Saibal K. Pal and Anupama Panigrahi
2015/733 ( PDF )
Fully Homomorphic Encryption on Octonion Ring
Masahiro Yagisawa
2015/732 ( PDF )
Compact Implementations of LEA Block Cipher for Low-End Microprocessors
Hwajeong Seo and Zhe Liu and Jongseok Choi and Taehwan Park and and Howon Kim
2015/731 ( PDF )
Same Value Analysis on Edwards Curves
Rodrigo Abarzúa and Santi Martínez and Valeria Mendoza
2015/730 ( PDF )
Indistinguishability Obfuscation from Functional Encryption for Simple Functions, And a New Bootstrapping Theorem for iO
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/729 ( PDF )
Towards Provably-Secure Remote Memory Attestation
Alexandra Boldyreva and Taesoo Kim and Richard Lipton and Bogdan Warinschi
2015/728 ( PDF )
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas
2015/727 ( PDF )
DPA, Bitslicing and Masking at 1 GHz
Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede
2015/726 ( PDF )
Compositions of linear functions and applications to hashing
Vladimir Shpilrain and Bianca Sosnovski
2015/725 ( PDF )
The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable
Eric Verheul and Sietse Ringers and Jaap-Henk Hoepman
2015/724 ( PDF )
A masked ring-LWE implementation
Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
2015/723 ( PDF )
Cryptanalysis of Feistel Networks with Secret Round Functions
Alex Biryukov and Gaëtan Leurent and Léo Perrin
2015/722 ( PDF )
Oblivious Substring Search with Updates
Tarik Moataz and Erik-Oliver Blass
2015/721 ( PDF )
KDM-Security via Homomorphic Smooth Projective Hashing
Hoeteck Wee
2015/720 ( PDF )
Output-Compressing Randomized Encodings and Applications
Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang
2015/719 ( PDF )
Consolidating masking schemes
Oscar Reparaz and Begül Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede
2015/718 ( PDF )
Efficient Asynchronous Accumulators for Distributed PKI
Leonid Reyzin and Sophia Yakoubov
2015/717 ( PDF )
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/716 ( PDF )
Linear Cryptanalysis of Reduced-Round SIMECK Variants
Nasour Bagheri
2015/715 ( PDF )
New Circular Security Counterexamples from Decision Linear and Learning with Errors
Allison Bishop and Susan Hohenberger and Brent Waters
2015/714 ( PDF )
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
Masao KASAHARA
2015/713 ( PDF )
Light-hHB: A New Version of hHB with Improved Session Key Exchange
Ka Ahmad Khoureich
2015/712 ( PDF )
On Limitations of the Fiat­–Shamir Transformation
David Bernhard and Bogdan Warinschi
2015/711 ( PDF )
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)
Anne Canteaut and Sébastien Duval and Gaëtan Leurent
2015/710 ( PDF )
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Bernardo Ferreira and João Rodrigues and João Leitão and Henrique Domingos
2015/709 ( PDF )
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
Luka Malisa and Kari Kostiainen and Srdjan Capkun
2015/708 ( PDF )
Choosing Parameters for NTRUEncrypt
Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2015/707 ( PDF )
Reconciling User Privacy and Implicit Authentication for Mobile Devices
Siamak F. Shahandashti and Reihaneh Safavi-Naini and Nashad Ahmed Safa
2015/706 ( PDF )
A Brief Comparison of Simon and Simeck
Stefan Kölbl and Arnab Roy
2015/705 ( PDF )
Linear Overhead Robust MPC with Honest Majority Using Preprocessing
Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
2015/704 ( PDF )
Indistinguishability Obfuscation: from Approximate to Exact
Nir Bitansky and Vinod Vaikuntanathan
2015/703 ( PDF )
Point-Function Obfuscation: A Framework and Generic Constructions
Mihir Bellare and Igors Stepanovs
2015/702 ( PDF )
Demystifying incentives in the consensus computer
Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena
2015/701 ( PDF )
Differential Privacy in distribution and instance-based noise mechanisms
Sébastien Canard and Baptiste Olivier
2015/700 ( PDF )
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
Jimmy Jose and Dipanwita RoyChowdhury
2015/699 ( PDF )
FURISC: FHE Encrypted URISC Design
Ayantika Chatterjee and Indranil Sengupta
2015/698 ( PDF )
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa
Subhamoy Maitra
2015/697 ( PDF )
On the Security of a Self-healing Group Key Distribution Scheme
Yandong Zheng, Hua Guo
2015/696 ( PDF )
Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
Miguel Morales Sandoval and Arturo Diaz Perez
2015/695 ( PDF )
Cliptography: Clipping the Power of Kleptographic Attacks
Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou
2015/694 ( PDF )
On the Complexity of Additively Homomorphic UC Commitments
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
2015/693 ( PDF )
Foundations of Reactive Garbling Schemes
Jesper Buus Nielsen and Samuel Ranellucci
2015/692 ( PDF )
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
2015/691 ( PDF )
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth
2015/690 ( PDF )
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2015/689 ( PDF )
Counting Keys in Parallel After a Side Channel Attack
Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam
2015/688 ( PDF )
Binary Field Multiplication on ARMv8
Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
2015/687 ( PDF )
Classical Cryptographic Protocols in a Quantum World
Sean Hallgren and Adam Smith and Fang Song
2015/686 ( PDF )
Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
Azeem Irshad and Muhammad Sher and Shahzad Ashraf and Shahzad faisal and Mahmood Ul Hassan
2015/685 ( PDF )
On the discrete logarithm problem in finite fields of fixed characteristic
Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
2015/684 ( PDF )
A One-time Stegosystem and Applications to Efficient Covert Communication
Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha Shashidhar
2015/683 ( PDF )
Security of Linear Secret-Sharing Schemes against Mass Surveillance
Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci
2015/682 ( PDF )
Integral Cryptanalysis on Full MISTY1
Yosuke Todo
2015/681 ( PDF )
ANONIZE: A Large-Scale Anonymous Survey System
Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat
2015/680 ( PDF )
Indifferentiability of Confusion-Diffusion Networks
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/679 ( PDF )
Another Look at Normal Approximations in Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2015/678 ( PDF )
Optimizing MAKWA on GPU and CPU
Thomas Pornin
2015/677 ( PDF )
EdDSA for more curves
Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang
2015/676 ( PDF )
Quantum Cryptanalysis of NTRU
Scott Fluhrer
2015/675 ( PDF )
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
2015/674 ( PDF )
Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
Peeter Laud and Alisa Pankova
2015/673 ( PDF )
Decaf: Eliminating cofactors through point compression
Mike Hamburg
2015/672 ( PDF )
Function-Hiding Inner Product Encryption
Allison Bishop and Abhishek Jain and Lucas Kowalczyk
2015/671 ( PDF )
Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data
Peeter Laud and Alisa Pankova
2015/670 ( PDF )
Smart Security Management in Secure Devices
Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
2015/669 ( PDF )
GMU Hardware API for Authenticated Ciphers
Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj
2015/668 ( PDF )
The Fallacy of Composition of Oblivious RAM and Searchable Encryption
Muhammad Naveed
2015/667 ( PDF )
De Bruijn Sequences from Nonlinear Feedback Shift Registers
Ming Li and Dongdai Lin
2015/666 ( PDF )
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques
Huaifeng Chen and Xiaoyun Wang
2015/665 ( PDF )
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption.
Romain Gay and Iordanis Kerenidis and Hoeteck Wee
2015/664 ( PDF )
Secure Multi-Party Shuffling
Mahnush Movahedi and Jared Saia and Mahdi Zamani
2015/663 ( PDF )
Analyzing the Efficiency of Biased-Fault Based Attacks
Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
2015/662 ( PDF )
Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves
Ryutaroh Matsumoto
2015/661 ( PDF )
Cryptanalysis of a modern rotor machine in a multicast setting
Shane Kepley and David Russo and Rainer Steinwandt
2015/660 ( PDF )
A Hybrid Gaussian Sampler for Lattices over Rings
Léo Ducas and Thomas Prest
2015/659 ( PDF )
Diversity and Transparency for ECC
Jean-Pierre Flori and Jérôme Plűt and Jean-René Reinhard and Martin Ekerĺ
2015/658 ( PDF )
Single-Cycle Implementations of Block Ciphers
Pieter Maene and Ingrid Verbauwhede
2015/657 ( PDF )
Randomizing the Montgomery Powering Ladder
Duc-Phong Le, Chik How Tan and Michael Tunstall
2015/656 ( PDF )
Cryptanalysis of a Markov Chain Based User Authentication Scheme
Ruhul Amin and G.P. Biswas
2015/655 ( PDF )
An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
2015/654 ( PDF )
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng
2015/653 ( PDF )
Homomorphic Signature Schemes - A survey
Giulia Traverso and Denise Demirel and Johannes Buchmann
2015/652 ( PDF )
Modelling ciphersuite and version negotiation in the TLS protocol
Benjamin Dowling and Douglas Stebila
2015/651 ( PDF )
Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller
2015/650 ( PDF )
A New Encryption Standard of Ukraine: The Kalyna Block Cipher
Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov and Ruslan Mordvinov and Dmytro Kaidalov
2015/649 ( PDF )
On the Hardness of Proving CCA-security of Signed ElGamal
David Bernhard and Marc Fischlin and Bogdan Warinschi
2015/648 ( PDF )
Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard and Marc Fischlin and Bogdan Warinschi
2015/647 ( PDF )
Efficient ephemeral elliptic curve cryptographic keys
Andrea Miele and Arjen K. Lenstra
2015/646 ( PDF )
Decomposition attack on SASASASAS
Alex Biryukov and Dmitry Khovratovich
2015/645 ( PDF )
Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy
Clémentine Gritti, Willy Susilo, Thomas Plantard and Rongmao Chen
2015/644 ( PDF )
The Pythia PRF Service
Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart
2015/643 ( PDF )
Short Accountable Ring Signatures Based on DDH
Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit
2015/642 ( PDF )
A New Partial Key Exposure Attack on Multi-power RSA
Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol
2015/641 ( PDF )
Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
Jing Li, Licheng Wang
2015/640 ( PDF )
Very-efficient simulatable flipping of many coins into a well
Luís T. A. N. Brandăo
2015/639 ( PDF )
Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings
Hao Chen
2015/638 ( PDF )
An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta
2015/637 ( PDF )
A Novel Cyberspace-Oriented Access Control Model
Fenghua Li and Yanchao Wang and Rongna Xie and Jinbo Xiong and Fangfang Shan
2015/636 ( PDF )
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes
Matthias Krause
2015/635 ( PDF )
Microcash: Efficient Off-Line Small Payments
Chris Pavlovski and Colin Boyd
2015/634 ( PDF )
Phasing: Private Set Intersection using Permutation-based Hashing
Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner
2015/633 ( PDF )
An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/632 ( PDF )
More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji
2015/631 ( PDF )
Accelerating Homomorphic Evaluation on Reconfigurable Hardware
Thomas Pöppelmann and Michael Naehrig and Andrew Putnam and Adrian Macias
2015/630 ( PDF )
Unconditionally Secure Computation with Reduced Interaction
Ivan Damgĺrd and Jesper Buus Nielsen
2015/629 ( PDF )
BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme
Véronique Cortier and Georg Fuchsbauer and David Galindo
2015/628 ( PDF )
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
Daniel Cabarcas and Denise Demirel and Florian Göpfert and Jean Lancrenon and Thomas Wunderer
2015/627 ( PDF )
On Necessary Padding with IO
Justin Holmgren
2015/626 ( PDF )
Practical Round-Optimal Blind Signatures in the Standard Model
Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
2015/625 ( PDF )
Ed448-Goldilocks, a new elliptic curve
Mike Hamburg
2015/624 ( PDF )
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff
2015/623 ( PDF )
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand
2015/622 ( PDF )
Random Digit Representation of Integers
Nicolas Méloni and M. Anwar Hasan
2015/621 ( PDF )
Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
Sarani Bhattacharya, Debdeep Mukhopadhyay
2015/620 ( PDF )
Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions
Susumu Kiyoshima
2015/619 ( PDF )
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
Seher Tutdere and Osmanbey Uzunkol
2015/618 ( PDF )
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
Juan Carlos Ku-Cauich  Guillermo Morales-Luna  Horacio Tapia-Recillas
2015/617 ( PDF )
Generalised tally-based decoders for traitor tracing and group testing
Boris Skoric and Wouter de Groot
2015/616 ( PDF )
The leaking battery: A privacy analysis of the HTML5 Battery Status API
Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia Diaz
2015/615 ( PDF )
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati
2015/614 ( PDF )
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
Fangguo Zhang
2015/613 ( PDF )
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei
2015/612 ( PDF )
The Simeck Family of Lightweight Block Ciphers
Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong
2015/611 ( PDF )
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Shijun Zhao and Qianying Zhang
2015/610 ( PDF )
McBits: fast constant-time code-based cryptography
Daniel J. Bernstein and Tung Chou and Peter Schwabe
2015/609 ( PDF )
Experimental Study of DIGIPASS GO3 and the Security of Authentication
Igor Semaev
2015/608 ( -- withdrawn -- )
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
Benoit Libert and Damien Stehle
2015/607 ( PDF )
Netcoin - A Traceable P2P Electronic Cash System
Hitesh Tewari and Eamon O Nuallain
2015/606 ( PDF )
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon
2015/605 ( PDF )
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm
Steven D. Galbraith and Ping Wang and Fangguo Zhang
2015/604 ( PDF )
Structure-Preserving Signatures from Standard Assumptions, Revisited
Eike Kiltz and Jiaxin Pan and Hoeteck Wee
2015/603 ( PDF )
Complementary Dual Codes for Counter-measures to Side-Channel Attacks
Claude Carlet and Sylvain Guilley
2015/602 ( PDF )
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhay
2015/601 ( PDF )
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
Mei Wang, Zheng Yuan,Xiao Feng
2015/600 ( PDF )
Predictive Models for Min-Entropy Estimation
John Kelsey and Kerry A. McKay and Meltem Sonmez Turan
2015/599 ( PDF )
The Chain Rule for HILL Pseudoentropy, Revisited
Krzysztof Pietrzak and Maciej Skorski
2015/598 ( PDF )
Combining Differential Privacy and Secure Multiparty Computation
Martin Pettai and Peeter Laud
2015/597 ( PDF )
Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
Amir Moradi and Alexander Wild
2015/596 ( PDF )
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations
Jean-Sebastien Coron and Craig Gentry and Shai Halevi and Tancrede Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi
2015/595 ( -- withdrawn -- )
Differential Fault Intensity Analysis
Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa Taha and Patrick Schaumont
2015/594 ( PDF )
Disk Encryption: Do We Need to Preserve Length?
Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
2015/593 ( PDF )
A Physical Approach for Stochastic Modeling of TERO-based TRNG
Patrick HADDAD and Viktor FISCHER and Florent BERNARD and Jean NICOLAI
2015/592 ( PDF )
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel
2015/591 ( PDF )
How much randomness can be extracted from memoryless Shannon entropy sources?
Maciej Skorski
2015/590 ( PDF )
TriviA: A Fast and Secure Authenticated Encryption Scheme
Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
2015/589 ( PDF )
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
A.-M. Leventi-Peetz and J.-V. Peetz
2015/588 ( PDF )
An analysis of the $C$ class of bent functions
Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic
2015/587 ( PDF )
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Trupil Limbasiya and Nishant Doshi
2015/586 ( PDF )
SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System
Yuan Zhang and Chunxiang Xu and Shui Yu and Hongwei Li and Xiaojun Zhang
2015/585 ( PDF )
SIMON and SPECK: Block Ciphers for the Internet of Things
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2015/584 ( PDF )
How to Securely Prolong the Computational Bindingness of Pedersen Commitments
Denise Demirel and Jean Lancrenon
2015/583 ( PDF )
Secure Key Generation from Biased PUFs
Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems
2015/582 ( PDF )
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita-Rotaru
2015/581 ( PDF )
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation
Christina Brzuska and Arno Mittelbach
2015/580 ( PDF )
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss
2015/579 ( PDF )
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
Mridul Nandi
2015/578 ( PDF )
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun
2015/577 ( PDF )
Twist Insecurity
Manfred Lochter, Andreas Wiemers
2015/576 ( PDF )
The Carnac protocol -- or how to read the contents of a sealed envelope
Michael Scott and Brian Spector
2015/575 ( PDF )
Known-key Distinguisher on Full PRESENT
Céline Blondeau and Thomas Peyrin and Lei Wang
2015/574 ( PDF )
Fair and Robust Multi-Party Computation using a Global Transaction Ledger
Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
2015/573 ( PDF )
Last fall degree, HFE, and Weil descent attacks on ECDLP
Ming-Deh A. Huang and Michiel Kosters and Sze Ling Yeo
2015/572 ( PDF )
On Public Key Encryption from Noisy Codewords
Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi
2015/571 ( PDF )
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
Tobias Schneider and Amir Moradi and Tim Güneysu
2015/570 ( PDF )
Constant Communication ORAM with Small Blocksize
Tarik Moataz and Travis Mayberry and Erik-Oliver Blass
2015/569 ( PDF )
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grřstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2015/568 ( PDF )
Cryptanalysis of Reduced-Round Whirlwind (Full Version)
Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
2015/567 ( PDF )
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
Henri Gilbert and Jérôme Plűt and Joana Treger
2015/566 ( PDF )
A Framework for Identity-Based Encryption with Almost Tight Security
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/565 ( PDF )
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
Craig Costello and Patrick Longa
2015/564 ( PDF )
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Victor Costan and Ilia Lebedev and Srinivas Devadas
2015/563 ( PDF )
Privacy in the Genomic Era
Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang
2015/562 ( PDF )
PUDA – Privacy and Unforgeability for Data Aggregation
Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
2015/561 ( PDF )
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
J. Longo and E. De Mulder and D. Page and M. Tunstall
2015/560 ( PDF )
Generic Construction of UC-Secure Oblivious Transfer
Olivier Blazy and Céline Chevalier
2015/559 ( PDF )
Concurrent Secure Computation with Optimal Query Complexity
Ran Canetti and Vipul Goyal and Abhishek Jain
2015/558 ( PDF )
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
2015/557 ( PDF )
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
Takanori Isobe and Kyoji Shibutani
2015/556 ( PDF )
Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates
Sujoy Sinha Roy and Kimmo Järvinen and Ingrid Verbauwhede
2015/555 ( PDF )
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
Tapas Pandit and Sumit Kumar Pandey and Rana Barua
2015/554 ( PDF )
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
Michel Abdalla and Fabrice Benhamouda and Alain Passelčgue
2015/553 ( PDF )
Round-Optimal Black-Box Two-Party Computation
Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro
2015/552 ( PDF )
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
Paul Kirchner and Pierre-Alain Fouque
2015/551 ( PDF )
Quantum homomorphic encryption for circuits of low $T$-gate complexity
Anne Broadbent and Stacey Jeffery
2015/550 ( PDF )
Upending Stock Market Structure Using Secure Multi-Party Computation
Charanjit S. Jutla
2015/549 ( PDF )
ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices
Amir Hassani Karbasi, Reza Ebrahimi Atani
2015/548 ( PDF )
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
2015/547 ( PDF )
Secure Computation of MIPS Machine Code
Xiao Shaun Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz
2015/546 ( PDF )
Actively Secure OT Extension with Optimal Overhead
Marcel Keller and Emmanuela Orsini and Peter Scholl
2015/545 ( PDF )
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
Qinglong Zhang and Zongbin Liu and and Cunqing Ma and Changting Li and Jiwu Jing
2015/544 ( PDF )
Alternative cubics' rules with an algebraic appeal
Daniel R. L. Brown
2015/543 ( PDF )
Bloom Filters in Adversarial Environments
Moni Naor and Eylon Yogev
2015/542 ( PDF )
Improved Side-Channel Analysis of Finite-Field Multiplication
Sonia Belaďd and Jean-Sébastien Coron and Pierre-Alain Fouque and Benoît Gérard and Jean-Gabriel Kammerer and Emmanuel Prouff
2015/541 ( PDF )
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Bart Mennink and Reza Reyhanitabar and Damian Vizár
2015/540 ( PDF )
PICO: An Ultra lightweight and Low power encryption design for pervasive computing
Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil
2015/539 ( PDF )
Tweaking Even-Mansour Ciphers
Benoît Cogliati and Rodolphe Lampe and Yannick Seurin
2015/538 ( PDF )
Pairing Based Mutual Healing in Wireless Sensor Networks
Sarita Agrawal and Jay Patel and Manik Lal Das
2015/537 ( PDF )
Towards Easy Leakage Certification
François Durvaux and François-Xavier Standaert
2015/536 ( PDF )
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
François Durvaux and François-Xavier Standaert
2015/535 ( PDF )
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Vincent Grosso and François-Xavier Standaert
2015/534 ( PDF )
Problems, solutions and experience of the first international student's Olympiad in cryptography
Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia Tokareva and Valeria Vitkup
2015/533 ( PDF )
Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
Xiaoshuang Ma and Kexin Qiao
2015/531 ( PDF )
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
Mohammad Hajiabadi, Bruce M. Kapron
2015/530 ( PDF )
Practical Free-Start Collision Attacks on 76-step SHA-1
Pierre Karpman and Thomas Peyrin and Marc Stevens
2015/529 ( PDF )
Power Analysis Attacks against IEEE 802.15.4 Nodes
Colin O'Flynn and Zhizhang Chen
2015/528 ( PDF )
Spacecoin: A Cryptocurrency Based on Proofs of Space
Sunoo Park and Krzysztof Pietrzak and Joël Alwen and Georg Fuchsbauer and Peter Gazi
2015/527 ( PDF )
Robust Profiling for DPA-Style Attacks
Carolyn Whitnall and Elisabeth Oswald
2015/526 ( PDF )
Generic Key Recovery Attack on Feistel Scheme
Takanori Isobe and Kyoji Shibutani
2015/525 ( PDF )
Short Randomizable Signatures
David Pointcheval and Olivier Sanders
2015/524 ( PDF )
Secure Key Exchange Protocol based on Virtual Proof of Reality
Yansong Gao
2015/523 ( PDF )
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai
2015/522 ( PDF )
Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search
Anja Becker, Nicolas Gama, Antoine Joux
2015/521 ( PDF )
Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency
Sergey Gorbunov and Silvio Micali
2015/520 ( PDF )
A Constant Time, Single Round, Attribute-Based Authenticated Key Exchange in Random Oracle Model
Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
2015/519 ( PDF )
Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
Yongge Wang
2015/518 ( PDF )
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
Ren Zhang
2015/517 ( PDF )
Subversion-Resilient Signature Schemes
Giuseppe Ateniese and Bernardo Magri and Daniele Venturi
2015/516 ( PDF )
Key-Recovery Attacks on ASASA
Brice Minaud and Patrick Derbez and Pierre-Alain Fouque and Pierre Karpman
2015/515 ( PDF )
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
Thomas Espitau and Pierre-Alain Fouque and Pierre Karpman
2015/514 ( PDF )
Time-Lock Puzzles from Randomized Encodings
Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters
2015/513 ( PDF )
Computing Individual Discrete Logarithms Faster in $GF(p^n)$
Aurore Guillevic
2015/512 ( PDF )
Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply
Sami Saab, Andrew Leiserson, and Michael Tunstall
2015/511 ( PDF )
Near Collision Side Channel Attacks
Baris Ege and Thomas Eisenbarth and Lejla Batina
2015/510 ( PDF )
Equivoe-T: Transposition Equivocation Cryptography
Gideon Samid
2015/509 ( PDF )
A flaw in a theorem about Schnorr signatures
Daniel R. L. Brown
2015/508 ( PDF )
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra
2015/507 ( PDF )
Decomposing the ASASA Block Cipher Construction
Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander
2015/506 ( PDF )
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
Gilles Barthe and Sonia Belaďd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire
2015/505 ( PDF )
The Tower Number Field Sieve
Razvan Barbulescu and Pierrick Gaudry and Thorsten Kleinjung
2015/504 ( PDF )
The Iterated Random Permutation Problem with Applications to Cascade Encryption
Brice Minaud and Yannick Seurin
2015/503 ( PDF )
The Norwegian Internet Voting Protocol: A new Instantiation
Kristian Gjřsteen and Anders Smedstuen Lund
2015/502 ( PDF )
Centrally Banked Cryptocurrencies
George Danezis and Sarah Meiklejohn
2015/501 ( PDF )
Multi-Prover Commitments Against Non-Signaling Attacks
Serge Fehr and Max Fillinger
2015/500 ( PDF )
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure
Alberto Battistello and Christophe Giraud
2015/499 ( PDF )
Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
Dennis Hofheinz
2015/498 ( PDF )
Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Jiajun Zhang and Haining Fan
2015/497 ( PDF )
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost
Zhangxiang Hu and Payman Mohassel and Mike Rosulek
2015/496 ( PDF )
Quantifying Location Privacy Leakage from Transaction Prices
Arthur Gervais and Hubert Ritzdorf and Mario Lucic and Srdjan Capkun
2015/495 ( PDF )
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
Sondre Rønjom
2015/494 ( -- withdrawn -- )
Cryptanalysis of the LSH and SHA-V Hash Functions
Yonglin Hao and Hongbo Yu
2015/493 ( PDF )
Fault Tolerant Infective Countermeasure for AES
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay
2015/492 ( PDF )
Masking vs. Multiparty Computation: How Large is the Gap for AES?
Vincent Grosso and François-Xavier Standaert and Sebastian Faust
2015/491 ( PDF )
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
Nishanth Chandran and Melissa Chase and Feng-Hao Liu and Ryo Nishimaki and Keita Xagawa
2015/490 ( PDF )
Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
Sonam Devgan Kaul and Amit K. Awasthi
2015/489 ( PDF )
Scalable and private media consumption with Popcorn
Trinabh Gupta and Natacha Crooks and Srinath Setty and Lorenzo Alvisi and Michael Walfish
2015/488 ( PDF )
On Black-Box Complexity of Universally Composable Security in the CRS model
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/487 ( PDF )
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs and Stefano Tessaro
2015/486 ( PDF )
How to detect unauthorised usage of a key
Jiangshan Yu and Mark Ryan and Cas Cremers
2015/485 ( PDF )
Turning Online Ciphers Off
Elena Andreeva and Guy Barwell and Dan Page and Martijn Stam
2015/484 ( PDF )
More Rounds, Less Security?
Ritam Bhaumik and Avijit Dutta and Jian Guo and Jérémy Jean and Nicky Mouha and Ivica Nikolić
2015/483 ( PDF )
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Shi Bai and Adeline Langlois and Tancrède Lepoint and Damien Stehlé and Ron Steinfeld
2015/482 ( PDF )
Time-release Protocol from Bitcoin and Witness Encryption for SAT
Jia Liu and Flavio Garcia and Mark Ryan
2015/481 ( PDF )
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers
Theodosis Mourouzis and Guangyan Song and Nicolas Courtois and Michalis Christofii
2015/480 ( PDF )
Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
Berry Schoenmakers, Meilof Veeningen, and Niels de Vreede
2015/479 ( PDF )
A Provably Secure Group Signature Scheme from Code-Based Assumptions
Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang
2015/478 ( PDF )
How to Build Time-Lock Encryption
Tibor Jager
2015/477 ( PDF )
Authentication Key Recovery in Galois/Counter Mode (GCM)
John Mattsson
2015/476 ( PDF )
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
Bart Mennink
2015/475 ( PDF )
Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences
Eleonora Guerrini and Laurent Imbert and Théo Winterhalter
2015/474 ( PDF )
Fully Homomorphic Encryption without bootstrapping
Masahiro Yagisawa
2015/473 ( PDF )
VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS
Mehak Khurana and Meena Kumari
2015/472 ( PDF )
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer
Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart
2015/471 ( PDF )
A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott
2015/470 ( PDF )
On the power of Public-key Functional Encryption with Function Privacy
Vincenzo Iovino and Karol Zebrowski
2015/469 ( PDF )
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
Andrew Miller and Rob Jansen
2015/468 ( PDF )
Practical Fully Homomorphic Encryption without Noise Reduction
Dongxi Liu
2015/467 ( PDF )
The Oblivious Machine - or: How to Put the C into MPC
Marcel Keller
2015/466 ( PDF )
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang
2015/465 ( PDF )
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
Hwajeong Seo and Zhe Liu and Johann Groschadl and Howon Kim
2015/464 ( PDF )
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
Florian Tschorsch and Björn Scheuermann
2015/463 ( PDF )
Multilinear Maps Using Random Matrix
Gu Chunsheng
2015/462 ( PDF )
Accelerating SWHE based PIRs using GPUs
Wei Dai, Yarkın Doröz and Berk Sunar
2015/461 ( PDF )
Cryptanalysis of the multilinear map on the ideal lattices
Jung Hee Cheon and Changmin Lee
2015/460 ( PDF )
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi
2015/459 ( PDF )
New Observation on Division Property
Bing Sun and Xin Hai and Wenyu Zhang and Lei Cheng and Zhichao Yang
2015/458 ( PDF )
A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS
Sheena Sathyan and Shaji R S Professor
2015/457 ( PDF )
Generic Conversions from CPA to CCA secure Functional Encryption
Mridul Nandi and Tapas Pandit
2015/456 ( PDF )
Collateral damage of Facebook Apps: an enhanced privacy scoring model
Iraklis Symeonids, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel
2015/455 ( PDF )
Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu and N.Asokan and Benny Pinkas
2015/454 ( PDF )
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO
Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
2015/453 ( PDF )
An Optimization of Gu Map-1
Yupu Hu and Huiwen Jia
2015/452 ( PDF )
Masks will Fall Off -- Higher-Order Optimal Distinguishers
Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul
2015/451 ( PDF )
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
Sihong Su and Xiaohu Tang
2015/450 ( PDF )
Adaptively Secure Computation with Partial Erasures
Carmit Hazay and Yehuda Lindell and Arpita Patra
2015/449 ( PDF )
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions
Ruoxin Zhao and Rui Zhang and Yongqiang Li and Baofeng Wu
2015/448 ( PDF )
A Comment on Gu Map-1
Yupu Hu and Huiwen Jia
2015/447 ( PDF )
A New Model for Error-Tolerant Side-Channel Cube Attacks
Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede
2015/446 ( PDF )
On the Amortized Complexity of Zero-knowledge Protocols
Ronald Cramer and Ivan Damgĺrd and Marcel Keller
2015/445 ( PDF )
XLS is not a Strong Pseudorandom Permutation
Mridul Nandi
2015/444 ( PDF )
Revisiting Security Claims of XLS and COPA
Mridul Nandi
2015/443 ( PDF )
Security Evaluation and Enhancement of Bistable Ring PUFs
Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, and Wayne Burleson
2015/442 ( PDF )
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
2015/441 ( PDF )
FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
Devu Manikantan Shila and Vivek Venugopalan and Cameron D Patterson
2015/440 ( PDF )
Message-Locked Encryption for Lock-Dependent Messages
Martín Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev
2015/439 ( PDF )
On Concurrently Secure Computation in the Multiple Ideal Query Model
Vipul Goyal and Abhishek Jain
2015/438 ( PDF )
A Hybrid Approach for Proving Noninterference of Java Programs
Ralf Kuesters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr
2015/437 ( PDF )
A Note on the Unsoundness of vnTinyRAM's SNARK
Bryan Parno
2015/436 ( PDF )
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks
Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
2015/435 ( PDF )
On the (Fast) Algebraic Immunity of Boolean Power Functions
Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
2015/434 ( PDF )
Dickson Polynomials that are Involutions
Pascale Charpin and Sihem Mesnager and Sumanta Sarkar
2015/433 ( PDF )
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
Wentao Zhang and. Zhenzhen Bao and. Vincent Rijmen and. Meicheng Liu
2015/432 ( -- withdrawn -- )
Non-Repudiable Proofs of Storage in Cloud
Hongyuan Wang and Liehuang Zhu and Yijia Lilong and Chang Xu
2015/431 ( PDF )
Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung and Goichiro Hanaoka and Shota Yamada
2015/430 ( PDF )
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
Alex Biryukov and Daniel Dinu and Dmitry Khovratovich
2015/429 ( PDF )
Cryptanalysis of Round-Reduced LED
Ivica Nikolić and Lei Wang and Shuang Wu
2015/428 ( PDF )
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
Philipp Jovanovic and Samuel Neves
2015/427 ( PDF )
A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
Mudit Bhargava and Ken Mai
2015/426 ( PDF )
Complementing Feistel Ciphers
Alex Biryukov and Ivica Nikolic
2015/425 ( PDF )
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
Stefan Heyse and Ingo von Maurich and Tim Güneysu
2015/424 ( PDF )
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Begül Bilgin and Andrey Bogdanov and Miroslav Knežević and Florian Mendel and Qingju Wang
2015/423 ( PDF )
On the Implementation of Unified Arithmetic on Binary Huff Curves
Santosh Ghosh, Amit Kumar, Amitabh Das and Ingrid Verbauwhede
2015/422 ( PDF )
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
Marina Blanton and Fattaneh Bayatbabolghani
2015/421 ( PDF )
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism
Zhe Liu and Husen Wang and Johann Großschädl and Zhi Hu and Ingrid Verbauwhede
2015/420 ( PDF )
What Information is Leaked under Concurrent Composition?
Vipul Goyal and Divya Gupta and Abhishek Jain
2015/419 ( PDF )
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava
2015/418 ( PDF )
Optimized Interpolation Attacks on LowMC
Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang
2015/417 ( PDF )
Order-Revealing Encryption and the Hardness of Private Learning
Mark Bun and Mark Zhandry
2015/416 ( PDF )
HETest: A Homomorphic Encryption Testing Framework
Mayank Varia and Sophia Yakoubov and Yang Yang
2015/415 ( PDF )
STRIBOB / WHIRLBOB Security Analysis Addendum
Markku-Juhani O. Saarinen
2015/414 ( PDF )
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
Mridul Nandi
2015/413 ( PDF )
A study of Pair Encodings: Predicate Encryption in prime order groups
Shashank Agrawal and Melissa Chase
2015/412 ( PDF )
Survey on Cryptographic Obfuscation
Máté Horváth
2015/411 ( PDF )
Side-Channel Analysis of MAC-Keccak Hardware Implementations
Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser
2015/410 ( PDF )
Efficient Ring-LWE Encryption on 8-bit AVR Processors
Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Großschädl and Howon Kim and Ingrid Verbauwhede
2015/409 ( PDF )
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
Jie Chen and Romain Gay and Hoeteck Wee
2015/408 ( PDF )
Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
Franck Rondepierre
2015/407 ( PDF )
Higher-order cryptanalysis of LowMC
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/406 ( PDF )
Computation-Trace Indistinguishability Obfuscation and its Applications
Yu-Chi Chen and Sherman S. M. Chow and Kai-Min Chung and Russell W. F. Lai and Wei-Kai Lin and Hong-Sheng Zhou
2015/405 ( PDF )
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schröder
2015/404 ( PDF )
Zero-Knowledge Accumulators and Set Operations
Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos
2015/403 ( PDF )
Sequential Secret Sharing as a New Hierarchical Access Structure
Mehrdad Nojoumian and Douglas R. Stinson
2015/402 ( PDF )
Success through confidence: Evaluating the effectiveness of a side-channel attack
Adrian Thillard and Emmanuel Prouff and Thomas Roche
2015/401 ( PDF )
Simple Chosen-Ciphertext Security from Low-Noise LPN
Eike Kiltz and Daniel Masny and Krzysztof Pietrzak
2015/400 ( PDF )
Expiration and Revocation of Keys for Attribute-based Signatures (Full Version)
Stephen R. Tate and Roopa Vishwanathan
2015/399 ( PDF )
New attacks on RSA with Moduli $N=p^rq$
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/398 ( PDF )
Factoring RSA moduli with weak prime factors
Abderrahmane Nitaj and Tajjeeddine Rachidi
2015/397 ( PDF )
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
Peter Gazi and Jooyoung Lee and Yannick Seurin and John Steinberger and Stefano Tessaro
2015/396 ( PDF )
Generalizing Homomorphic MACs for Arithmetic Circuits
Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo
2015/395 ( PDF )
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys
Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schröder and Mark Simkin
2015/394 ( PDF )
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
2015/393 ( PDF )
Biclique cryptanalysis of MIBS-80 and PRESENT-80
Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba
2015/392 ( PDF )
Forgery Attacks on round-reduced ICEPOLE-128
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/391 ( PDF )
On the Communication Complexity of Secure Computation
Deepesh Data and Manoj M. Prabhakaran and Vinod M. Prabhakaran
2015/390 ( PDF )
Dual System Encryption Framework in Prime-Order Groups
Nuttapong Attrapadung
2015/389 ( PDF )
Keccak
Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
2015/388 ( PDF )
Succinct Garbled RAM
Ran Canetti and Justin Holmgren
2015/387 ( PDF )
Method to Protect Passwords in Databases for Web Applications
Scott Contini
2015/386 ( PDF )
Privately Evaluating Decision Trees and Random Forests
David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter
2015/385 ( PDF )
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas
2015/384 ( PDF )
Condensed Unpredictability
Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak
2015/383 ( PDF )
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
Rafael Pass and abhi shelat
2015/382 ( PDF )
High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers
Thomas Pöppelmann and Tobias Oder and Tim Güneysu
2015/381 ( PDF )
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
Sumit Chakraborty
2015/380 ( PDF )
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
Céline Blondeau and Aslí Bay and Serge Vaudenay
2015/379 ( PDF )
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
2015/378 ( PDF )
PAC Learning of Arbiter PUFs
Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
2015/377 ( PDF )
Cluster Computing in Zero Knowledge
Alessandro Chiesa and Eran Tromer and Madars Virza
2015/376 ( PDF )
Cryptography from Post-Quantum Assumptions
Raza Ali Kazmi
2015/375 ( PDF )
Bounds on surmising remixed keys
Daniel R. L. Brown
2015/374 ( PDF )
On the Impossibility of Tight Cryptographic Reductions
Christoph Bader and Tibor Jager and Yong Li and Sven Schäge
2015/373 ( PDF )
Publicly Verifiable Software Watermarking
Aloni Cohen and Justin Holmgren and Vinod Vaikuntanathan
2015/372 ( PDF )
Security Analysis of PRINCE
Jeremy Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu
2015/371 ( PDF )
Constant-Round MPC with Fairness and Guarantee of Output Delivery
S. Dov Gordon and Feng-Hao Liu and Elaine Shi
2015/370 ( PDF )
Financial Cryptography: Discriminatory Pricing Mechanism
Sumit Chakraborty
2015/369 ( PDF )
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
Nir Bitansky and Omer Paneth
2015/368 ( PDF )
Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
Evgeny Sidorov
2015/367 ( PDF )
Improved Higher-Order Differential Attacks on MISTY1
Achiya Bar-On
2015/366 ( PDF )
A random zoo: sloth, unicorn, and trx
Arjen K. Lenstra and Benjamin Wesolowski
2015/365 ( PDF )
On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
2015/364 ( PDF )
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
Qiang Tang and Jun Wang
2015/363 ( PDF )
Optimally Secure Tweakable Blockciphers
Bart Mennink
2015/362 ( PDF )
Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem
Claude Crepeau and Raza Ali Kazmi
2015/361 ( PDF )
Computationally binding quantum commitments
Dominique Unruh
2015/360 ( PDF )
Achieving Differential Privacy with Bias-Control Limited Source
Yanqing Yao, Zhoujun Li
2015/359 ( PDF )
Higher-Order Side Channel Security and Mask Refreshing
Jean-Sebastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
2015/358 ( PDF )
On Generalized First Fall Degree Assumptions
Yun-Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi
2015/357 ( PDF )
A Group-theory Method to The Cycle Structures of Feedback Shift Registers
Ming Li, Yupeng Jiang and Dongdai Lin
2015/356 ( PDF )
Succinct Randomized Encodings and their Applications
Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang
2015/355 ( PDF )
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni and Andreas Hülsing and Christian Schaffner
2015/354 ( PDF )
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node
Jacek Samotyja and Kerstin Lemke-Rust and Markus Ullmann
2015/353 ( PDF )
Matrix Computational Assumptions in Multilinear Groups
Paz Morillo and Carla Ràfols and Jorge L. Villar
2015/352 ( PDF )
Broadcast from Minicast Secure Against General Adversaries
Pavel Raykov
2015/351 ( PDF )
Database Outsourcing with Hierarchical Authenticated Data Structures
Mohammad Etemad and Alptekin Küpçü
2015/350 ( PDF )
Improving Local Collisions: New Attacks on Reduced SHA-256
Florian Mendel and Tomislav Nad and Martin Schläffer
2015/349 ( PDF )
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
Chang Liu and Liehuang Zhu and Jinjun Chen
2015/348 ( PDF )
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation
An­dre­as Gor­nik and Amir Mo­ra­di and Jür­gen Oehm and Chris­tof Paar
2015/347 ( PDF )
Fault Analysis of Kuznyechik
Riham AlTawy and Onur Duman and Amr M. Youssef
2015/346 ( PDF )
End-to-End Verifiable Elections in the Standard Model∗
Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
2015/345 ( PDF )
Two Round Mutliparty Computation via Multi-Key FHE
Pratyay Mukherjee and Daniel Wichs
2015/344 ( PDF )
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
Ryo Nishimaki and Daniel Wichs
2015/343 ( PDF )
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
Michael Düll and Björn Haase and Gesine Hinterwälder and Michael Hutter and Christof Paar and Ana Helena Sánchez and Peter Schwabe
2015/342 ( PDF )
Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext
Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo
2015/341 ( PDF )
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
Gilad Asharov and Gil Segev
2015/340 ( PDF )
A New Distinguisher on Grain v1 for 106 rounds
Santanu Sarkar
2015/339 ( PDF )
Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation
Berry Schoenmakers and Meilof Veeningen
2015/338 ( PDF )
Cryptanalysis of a fair anonymity for the tor network
Amadou Moctar Kane
2015/337 ( PDF )
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
Sujoy Sinha Roy and Kimmo Järvinen and Frederik Vercauteren and Vassil Dimitrov and Ingrid Verbauwhede
2015/336 ( PDF )
Arithmetic Cryptography
Benny Applebaum and Jonathan Avron and Christina Brzuska
2015/335 ( PDF )
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2015/334 ( PDF )
On the Correlation Intractability of Obfuscated Pseudorandom Functions
Ran Canetti and Yilei Chen and Leonid Reyzin
2015/333 ( PDF )
Nearly Optimal Verifiable Data Streaming (Full Version)
Johannes Krupp and Dominique Schröder and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan Nuernberger
2015/332 ( PDF )
Security Intelligence for Broadcast : Threat Analytics
Sumit Chakraborty
2015/331 ( PDF )
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
Megha Agrawal and Donghoon Chang and Somitra Sanadhya
2015/330 ( PDF )
Sponge based CCA2 secure asymmetric encryption for arbitrary length message
Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
2015/329 ( PDF )
PAGES - A Family of Block Ciiphers
Dieter Schmidt
2015/328 ( PDF )
Strongly Secure Authenticated Key Exchange from Ideal Lattices
Xiaopeng Yang and Wenping Ma
2015/327 ( PDF )
Some results on Sprout
Subhadeep Banik
2015/326 ( PDF )
Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata
Saeideh Kabirirad and Hamideh Hajiabadi
2015/325 ( PDF )
Secure Multi-Party Computation with Identifiable Abort
Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas
2015/324 ( PDF )
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys
Divesh Aggarwal and Alexander Golovnev
2015/323 ( -- withdrawn -- )
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange
Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan
2015/322 ( PDF )
Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers
Peeter Laud and Alisa Pankova
2015/321 ( -- withdrawn -- )
Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles
Paolo D'Arco and Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Clauido Soriente
2015/320 ( PDF )
Hybrid Publicly Verifiable Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2015/319 ( PDF )
Point Decomposition Problem in Binary Elliptic Curves
Koray Karabina
2015/318 ( PDF )
Practical Divisible E-Cash
Patrick Märtens
2015/317 ( PDF )
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti
2015/316 ( PDF )
Non-malleability under Selective Opening Attacks: Implication and Separation
Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen
2015/315 ( PDF )
Query-Complexity Amplification for Random Oracles
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2015/314 ( PDF )
Certificate-Based Encryption Resilient to Key Leakage
Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and Xinyi Huang and Yang Xiang
2015/313 ( PDF )
Recovering Short Generators of Principal Ideals in Cyclotomic Rings
Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev
2015/312 ( PDF )
Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
Pierre-Alain Fouque and Thomas Vannet
2015/311 ( PDF )
Tagged One-Time Signatures: Tight Security and Optimal Tag Size
Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo
2015/310 ( PDF )
New algorithm for the discrete logarithm problem on elliptic curves
Igor Semaev
2015/309 ( PDF )
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation
Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
2015/308 ( PDF )
Authenticated Key Exchange over Bitcoin
Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao
2015/307 ( PDF )
Black-Box Garbled RAM
Sanjam Garg and Steve Lu and Rafail Ostrovsky
2015/306 ( PDF )
Analysis of VAES3 (FF2)
Morris Dworkin and Ray Perlner
2015/305 ( PDF )
Foundations of Reconfigurable PUFs (Full Version)
Jonas Schneider and Dominique Schröder
2015/304 ( PDF )
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky
2015/303 ( PDF )
The Design Space of Lightweight Cryptography
Nicky Mouha
2015/302 ( PDF )
Boosting OMD for Almost Free Authentication of Associated Data
Reza Reyhanitabar and Serge Vaudenay and Damian Vizár
2015/301 ( PDF )
Cryptanalysis of GGH Map
Yupu Hu and Huiwen Jia
2015/300 ( PDF )
Scalable Divisible E-cash
Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
2015/299 ( PDF )
A Note on the Lindell-Waisbard Private Web Search Scheme
Zhengjun Cao and Lihua Liu
2015/298 ( PDF )
Random Linear Code Based Public Key Encryption Scheme RLCE
Yongge Wang
2015/297 ( PDF )
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao
2015/296 ( PDF )
The Uniform Distribution of Sequences Generated by Iteration of Polynomials
Emil Lerner
2015/295 ( PDF )
Security Analysis of Re-Encryption RPC Mix Nets
Ralf Kuesters and Tomasz Truderung
2015/294 ( PDF )
Accelerating Somewhat Homomorphic Evaluation using FPGAs
Erdinç Öztürk and Yarkın Doröz and Berk Sunar and Erkay Savaş
2015/293 ( PDF )
Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2015/292 ( PDF )
Secret Shared Random Access Machine
Shlomi Dolev and Yin Li
2015/291 ( PDF )
Two Operands of Multipliers in Side-Channel Attack
Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki
2015/290 ( PDF )
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Joseph A. Akinyele and Christina Garman and Susan Hohenberger
2015/289 ( PDF )
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
Muhammed F. Esgin and Orhun Kara
2015/288 ( PDF )
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
Aydin Aysu and Patrick Schaumont
2015/287 ( PDF )
A quantum-safe circuit-extension handshake for Tor
John Schanck and William Whyte and Zhenfei Zhang
2015/286 ( PDF )
Impossible Differential Cryptanalysis of Reduced Round SIMON
Zhan Chen and Ning Wang and Xiaoyun Wang
2015/285 ( PDF )
Improved Linear Trails for the Block Cipher Simon
Tomer Ashur
2015/284 ( PDF )
A Note on Scalar Multiplication Using Division Polynomials
Binglong~Chen, Chuangqiang~Hu and~Chang-An~Zhao
2015/283 ( PDF )
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data
Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia
2015/282 ( PDF )
Non-Interactive Secure Computation Based on Cut-and-Choose
Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva
2015/281 ( PDF )
Secret Sharing and Statistical Zero Knowledge
Vinod Vaikuntanathan and Prashant Nalini Vasudevan
2015/280 ( PDF )
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
Jonathan Katz and Aishwarya Thiruvengadam and Hong-Sheng Zhou
2015/279 ( PDF )
Improved Cryptanalysis of AES-like Permutations
Jérémy Jean and Maria Naya-Plasencia and Thomas Peyrin
2015/278 ( PDF )
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
Sébastien Canard and David Pointcheval and Olivier Sanders
2015/277 ( PDF )
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games
Marco Tomamichel and Serge Fehr and Jędrzej Kaniewski and Stephanie Wehner
2015/276 ( PDF )
An Improvment of the Elliptic Net Algorithm
Binglong Chen and Chang-An Zhao
2015/275 ( PDF )
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems
Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai
2015/274 ( PDF )
Low Depth Circuits for Efficient Homomorphic Sorting
Gizem S. Çetin and Yarkın Doröz and Berk Sunar and Erkay Savaş
2015/273 ( PDF )
Dual System Encryption via Predicate Encodings
Hoeteck Wee
2015/272 ( PDF )
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
Baodong Qin and Shengli Liu
2015/271 ( PDF )
Toward Secure Implementation of McEliece Decryption
Mariya Georgieva and Frédéric de Portzamparc
2015/270 ( PDF )
Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk
Markus Dichtl
2015/269 ( PDF )
Ideal Multilinear Maps Based on Ideal Lattices
Gu Chunsheng
2015/268 ( PDF )
Improved Top-Down Techniques in Differential Cryptanalysis
Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir
2015/267 ( PDF )
The Simplest Protocol for Oblivious Transfer
Tung Chou and Claudio Orlandi
2015/266 ( PDF )
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
2015/265 ( PDF )
Password Hashing Competition - Survey and Benchmark
George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas
2015/264 ( PDF )
BlindBox: Deep Packet Inspection over Encrypted Traffic
Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy
2015/263 ( PDF )
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
Ethan Heilman. Alison Kendler, Aviv Zohar, Sharon Goldberg
2015/262 ( PDF )
A look at the PGP ecosystem through the key server data
Hanno Böck
2015/261 ( PDF )
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
2015/260 ( PDF )
Computational Aspects of Correlation Power Analysis
Paul Bottinelli and Joppe W. Bos
2015/259 ( PDF )
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES
Patrick Derbez and Pierre-Alain Fouque
2015/258 ( PDF )
Lightweight MDS Involution Matrices
Siang Meng Sim and Khoongming Khoo and Frédérique Oggier and Thomas Peyrin
2015/257 ( PDF )
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
Vadim Lyubashevsky and Thomas Prest
2015/256 ( PDF )
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
Yang Lu, Quanling Zhang, Jiguo Li
2015/255 ( PDF )
A comprehensive analysis of game-based ballot privacy definitions
David Bernhard and Veronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi
2015/254 ( PDF )
Tornado Attack on RC4 with Applications to WEP \& WPA
Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux
2015/253 ( PDF )
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang , Dongdai Lin
2015/252 ( PDF )
Linearization of Multi-valued Nonlinear Feedback Shift Registers
Haiyan Wang, Jianghua Zhong, Dongdai Lin
2015/251 ( PDF )
How to Construct UC-Secure Searchable Symmetric Encryption Scheme
Kaoru Kurosawa and Yasuhiro Ohtaki
2015/250 ( PDF )
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys
Junji Shikata
2015/249 ( PDF )
Improved (Hierarchical) Inner-Product Encryption from Lattices
Keita Xagawa
2015/248 ( PDF )
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
Ryo Nishimaki and Keita Xagawa
2015/247 ( PDF )
Subgroup security in pairing-based cryptography
Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and Geovandro C. C. F. Pereira and Gustavo Zanon
2015/246 ( PDF )
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee
2015/245 ( PDF )
Practical Attacks on the Round-reduced PRINCE
Pawel Morawiecki
2015/244 ( PDF )
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
Jeremy Jean and Ivica Nikolic
2015/243 ( PDF )
Reliable Message Transmission under Partial Knowledge
Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
2015/242 ( PDF )
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
2015/241 ( PDF )
Espresso: A Stream Cipher for 5G Wireless Communication Systems
Elena Dubrova and Martin Hell
2015/240 ( PDF )
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
Alex Biryukov, Patrick Derbez and Léo Perrin
2015/239 ( PDF )
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
Patrick Derbez and Léo Perrin
2015/238 ( PDF )
One Time Programs with Limited Memory
Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michał Zając
2015/237 ( PDF )
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers
2015/236 ( PDF )
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
Subhamoy Maitra and Santanu Sarkar and Anubhab Baksi and Pramit Dey
2015/235 ( PDF )
Performance and Security Improvements for Tor: A Survey
Mashael AlSabah and Ian Goldberg
2015/234 ( PDF )
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
2015/233 ( PDF )
Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
Ben Smyth and Steven Frink and Michael R. Clarkson
2015/232 ( PDF )
Cryptanalysis of Full Sprout
Virginie Lallemand and María Naya-Plasencia
2015/231 ( PDF )
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
Yonglin Hao
2015/230 ( PDF )
W-SPS: Designing a Wide-Area Secure Positioning System
Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun
2015/229 ( PDF )
Improving GGH Public Key Scheme Using Low Density Lattice Codes
Reza Hooshmand
2015/228 ( PDF )
Leakage-Resilient Cryptography with Key Derived from Sensitive Data
Konrad Durnoga and Tomasz Kazana and Michał Zając and Maciej Zdanowicz
2015/227 ( PDF )
Tradeoff Cryptanalysis of Memory-Hard Functions
Alex Biryukov and Dmitry Khovratovich
2015/226 ( PDF )
Secure Physical Computation using Disposable Circuits
Ben Fisch and Daniel Freund and Moni Naor
2015/225 ( PDF )
Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/224 ( PDF )
GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records
Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder
2015/223 ( PDF )
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers
Anubhab Baksi and Subhamoy Maitra and Santanu Sarkar
2015/222 ( PDF )
Towards Understanding the Known-Key Security of Block Ciphers
Elena Andreeva, Andrey Bogdanov, and Bart Mennink
2015/221 ( PDF )
Tighter, faster, simpler side-channel security evaluations beyond computing power
Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal
2015/220 ( PDF )
Key Homomorphic PRFs and Their Applications
Dan Boneh and Kevin Lewi and Hart Montgomery and Ananth Raghunathan
2015/219 ( PDF )
Efficient Format Preserving Encrypted Databases
Prakruti C, Sashank Dara and V.N. Muralidhara
2015/218 ( PDF )
Efficient k-out-of-n oblivious transfer protocol
wang qinglong
2015/217 ( PDF )
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles
Subhamoy Maitra and Goutam Paul and Willi Meier
2015/216 ( PDF )
Quasi-Adaptive NIZK for Linear Subspaces Revisited
Eike Kiltz and Hoeteck Wee
2015/215 ( PDF )
A revocable anonymity in Tor
Amadou Moctar Kane
2015/214 ( PDF )
GCM Security Bounds Reconsidered
Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata
2015/213 ( PDF )
Attribute-Based Versions of Schnorr and ElGamal
Javier Herranz
2015/212 ( PDF )
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger
2015/211 ( PDF )
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
Thijs Laarhoven and Benne de Weger
2015/210 ( PDF )
Secure and Efficient Initialization and Authentication Protocols for SHIELD
Chenglu Jin and Marten van Dijk
2015/209 ( PDF )
Triathlon of Lightweight Block Ciphers for the Internet of Things
Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Léo Perrin and Johann Großschädl and Alex Biryukov
2015/208 ( PDF )
Towards Secure Distance Bounding
Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay
2015/207 ( PDF )
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
Tobias Schneider and Amir Moradi
2015/206 ( PDF )
Efficient and Secure Delegation of Group Exponentiation to a Single Server
Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain
2015/205 ( PDF )
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
Jooyoung Lee
2015/204 ( PDF )
Leakage-Resilient Symmetric Encryption via Re-keying
Michel Abdalla and Sonia Belaďd and Pierre-Alain Fouque
2015/203 ( PDF )
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim Güneysu
2015/202 ( PDF )
Adaptively Secure Coin-Flipping, Revisited
Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park
2015/201 ( PDF )
Statistical Properties of Multiplication mod $2^n$
A. Mahmoodi Rishakani and S. M. Dehnavi and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
2015/200 ( PDF )
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Alexander Wild and Amir Moradi and Tim Güneysu
2015/199 ( PDF )
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Amir Moradi and Gesine Hinterwälder
2015/198 ( PDF )
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim Güneysu
2015/197 ( PDF )
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
N. Nalla Anandakumar
2015/196 ( PDF )
Tighter Reductions for Forward-Secure Signature Schemes
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2015/195 ( PDF )
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists
Stephanie Bayer and Jens Groth
2015/194 ( PDF )
Practical Homomorphic MACs for Arithmetic Circuits
Dario Catalano and Dario Fiore
2015/193 ( PDF )
Improving Modular Inversion in RNS using the Plus-Minus Method
Karim Bigou and Arnaud Tisserand
2015/192 ( PDF )
Memory-saving computation of the pairing fi nal exponentiation on BN curves
Sylvain DUQUESNE and Loubna GHAMMAM
2015/191 ( PDF )
iDASH Secure Genome Analysis Competition Using ObliVM
Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang and Elaine Shi
2015/190 ( PDF )
Multi-Client Non-Interactive Verifiable Computation
Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid
2015/189 ( PDF )
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Vizár
2015/188 ( PDF )
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2015/187 ( PDF )
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
Juan Garay and Jonathan Katz and Bjoern Tackmann and Vassilis Zikas
2015/186 ( PDF )
Higher Order Differential Analysis of NORX
Sourav Das and Subhamoy Maitra and and Willi Meier
2015/185 ( PDF )
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications
Elena Dubrova and Mats Näslund and Gunnar Carlsson and John Fornehed and Ben Smeets
2015/184 ( PDF )
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
Céline Blondeau and Kaisa Nyberg
2015/183 ( PDF )
New Links Between Differential and Linear Cryptanalysis
Céline Blondeau and Kaisa Nyberg
2015/182 ( PDF )
Tweakable Blockciphers with Asymptotically Optimal Security
Rodolphe Lampe and Yannick Seurin
2015/181 ( PDF )
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda Alkhzaimi and Chao Li
2015/180 ( PDF )
Key-Homomorphic Constrained Pseudorandom Functions
Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens
2015/179 ( PDF )
A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
Palash Sarkar and Shashank Singh
2015/178 ( PDF )
On Time and Order in Multiparty Computation
Pablo Daniel Azar and Shafi Goldwasser and Sunoo Park
2015/177 ( PDF )
On the Security of an Efficient Group Key Agreement Scheme for MANETs
Purushothama B R and Nishat Koti
2015/176 ( PDF )
Key Recovery for LWE in Polynomial Time
Kim Laine and Kristin Lauter
2015/175 ( PDF )
Trivial Nonce-Misusing Attack on Pure OMD
Tomer Ashur and Bart Mennink
2015/174 ( PDF )
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia
Chenyang Tu and Neng Gao and Zeyi Liu and Lei Wang and Zongbin Liu and Bingke Ma
2015/173 ( PDF )
Indistinguishability Obfuscation from Compact Functional Encryption
Prabhanjan Ananth and Abhishek Jain
2015/172 ( PDF )
Silent Simon: A Threshold Implementation under 100 Slices
Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth
2015/171 ( PDF )
Authenticated Network Time Synchronization
Benjamin Dowling and Douglas Stebila and Greg Zaverucha
2015/170 ( PDF )
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer
2015/169 ( PDF )
Short Schnorr signatures require a hash function with more than just random-prefix resistance
Daniel R. L. Brown
2015/168 ( PDF )
More PS and H-like bent functions
C. Carlet
2015/167 ( PDF )
Post-Zeroizing Obfuscation: The case of Evasive Circuits
Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry
2015/166 ( PDF )
Naturally Rehearsing Passwords
Jeremiah Blocki and Manuel Blum and Anupam Datta
2015/165 ( PDF )
The Cryptographic Hardness of Random Local Functions -- Survey
Benny Applebaum
2015/164 ( PDF )
Constant Size Ring Signature Without Random Oracle
Priyanka Bose and Dipanjan Das and C. Pandu Rangan
2015/163 ( PDF )
Indistinguishability Obfuscation from Functional Encryption
Nir Bitansky and Vinod Vaikuntanathan
2015/162 ( PDF )
New Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2015/161 ( PDF )
Exploring the Resilience of Some Lightweight Ciphers Against Pro filed Single Trace Attacks
Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
2015/160 ( PDF )
Differential-Linear Cryptanalysis of ICEPOLE
Tao Huang; Ivan Tjuawinata; Hongjun Wu
2015/159 ( PDF )
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
Shengbao Wu; Hongjun Wu; Tao Huang; Mingsheng Wang; Wenling Wu
2015/158 ( PDF )
Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Zvika Brakerski and Ilan Komargodski and Gil Segev
2015/157 ( PDF )
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Nuttapong Attrapadung and Shota Yamada
2015/156 ( PDF )
Building Lossy Trapdoor Functions from Lossy Encryption
Brett Hemenway and Rafail Ostrovsky
2015/155 ( PDF )
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor
2015/154 ( PDF )
Circuits Resilient to Additive Attacks with Applications to Secure Computation
Daniel Genkin and Yuval Ishai and Manoj M. Prabhakaran and Amit Sahai and Eran Tromer
2015/153 ( PDF )
Functional Encryption from (Small) Hardware Tokens
Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou
2015/152 ( PDF )
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults
Ronan Lashermes and Jacques Fournier and Louis Goubin
2015/151 ( PDF )
Bad directions in cryptographic hash functions
Daniel J. Bernstein and Andreas Hülsing and Tanja Lange and Ruben Niederhagen
2015/150 ( PDF )
Insynd: Privacy-Preserving Transparency Logging Using Balloons
Tobias Pulls and Roel Peeters
2015/149 ( PDF )
Cryptanalysis of HMAC/NMAC-Whirlpool
Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu
2015/148 ( PDF )
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann
2015/147 ( PDF )
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
Lionel Rivičre and Zakaria Najm and Pablo Rauzy and Jean-Luc Danger and Julien Bringer and Laurent Sauvage
2015/146 ( PDF )
New Attacks on Feistel Structures with Improved Memory Complexities
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2015/145 ( PDF )
Observations on the SIMON block cipher family
Stefan Kölbl and Gregor Leander and Tyge Tiessen
2015/144 ( PDF )
Security of the AES with a Secret S-box
Tyge Tiessen and Lars R. Knudsen and Stefan Kölbl and Martin M. Lauridsen
2015/143 ( PDF )
Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs
Erich Wenger and Paul Wolfger
2015/142 ( PDF )
Multi-Client Verifiable Computation with Stronger Security Guarantees
S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
2015/141 ( PDF )
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method
Céline Blondeau and Marine Minier
2015/140 ( PDF )
The Random Oracle Model: A Twenty-Year Retrospective
Neal Koblitz and Alfred Menezes
2015/139 ( PDF )
Performance Analysis of Some Password Hashing Schemes
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2015/138 ( PDF )
A Practical Key Exchange for the Internet using Lattice Cryptography
Vikram Singh
2015/137 ( PDF )
Multi-keyword Similarity Search Over Encrypted Cloud Data
Mikhail Strizhov and Indrajit Ray
2015/136 ( PDF )
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs
Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. L. M. Barreto
2015/135 ( PDF )
Generalizing Efficient Multiparty Computation
Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp
2015/134 ( PDF )
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions
Pierre Karpman
2015/133 ( PDF )
Private Computation on Encrypted Genomic Data
Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig
2015/132 ( PDF )
Homomorphic Computation of Edit Distance
Jung Hee Cheon and Miran Kim and Kristin Lauter2
2015/131 ( PDF )
On Lightweight Stream Ciphers with Shorter Internal States
Frederik Armknecht, Vasily Mikhalev
2015/130 ( PDF )
How to Bootstrap Anonymous Communication
Sune K. Jakobsen and Claudio Orlandi
2015/129 ( PDF )
Block-wise Non-Malleable Codes
Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay
2015/128 ( PDF )
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro
2015/127 ( PDF )
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
Ricardo Dahab and Steven Galbraith and Eduardo Morais
2015/126 ( PDF )
Perfect Structure on the Edge of Chaos
Nir Bitansky and Omer Paneth and Daniel Wichs
2015/125 ( PDF )
Multilinear Pseudorandom Functions
Aloni Cohen and Justin Holmgren
2015/124 ( PDF )
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs
Alexander Wild and Amir Moradi and Tim Güneysu
2015/123 ( PDF )
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
Dennis Hofheinz and Jessica Koch and Christoph Striecks
2015/122 ( PDF )
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2015/121 ( PDF )
Multi-Client Oblivious RAM secure against Malicious Servers
Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
2015/120 ( PDF )
Reconfigurable LUT: Boon or Bane for Secure Applications
Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean-Luc Danger and Debdeep Mukhopadhyay
2015/119 ( PDF )
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device
Alexandre Duc and Sebastian Faust and François-Xavier Standaert
2015/118 ( PDF )
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
Takahiro Matsuda and Goichiro Hanaoka
2015/117 ( PDF )
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy
Maciej Skorski
2015/116 ( PDF )
Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs
Riadh Brinci and Walid Khmiri and Mefteh Mbarek and Abdellatif Ben Rabâa and Ammar Bouallčgue
2015/115 ( PDF )
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors
Muhammad Yasir Malik
2015/114 ( PDF )
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
2015/113 ( PDF )
How to Compress Homomorphic Ciphertexts
Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancrčde Lepoint and María Naya-Plasencia and Pascal Paillier and Renaud Sirdey
2015/112 ( PDF )
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura
2015/111 ( PDF )
The Multivariate Hidden Number Problem
Steven D. Galbraith and Barak Shani
2015/110 ( PDF )
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices
Shijun Zhao and Qianying Zhang
2015/108 ( PDF )
TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM
Lucjan Hanzlik and Przemysław Kubiak and Mirosław Kutyłowski
2015/107 ( PDF )
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
Attila A. Yavuz and Jorge Guajardo
2015/106 ( PDF )
Provably weak instances of Ring-LWE
Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
2015/105 ( PDF )
Inner Product Masking Revisited
Josep Balasch and Sebastian Faust and Benedikt Gierlichs
2015/104 ( PDF )
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Rafael Dowsley and Jörn Müller-Quade and Tobias Nilges
2015/103 ( PDF )
Mergeable Functional Encryption
Vincenzo Iovino and Karol Zebrowski
2015/102 ( PDF )
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
Shay Gueron and Yehuda Lindell
2015/101 ( PDF )
Multi-Key Security: The Even-Mansour Construction Revisited
Nicky Mouha and Atul Luykx
2015/100 ( PDF )
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA
Christian Wittke and Zoya Dyka and Peter Langendoerfer
2015/099 ( PDF )
Universally Composable Firewall Architectures using Trusted Hardware
Dirk Achenbach and Jörn Müller-Quade and Jochen Rill
2015/098 ( PDF )
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
Shantian Cheng and Juanyang Zhang
2015/097 ( PDF )
Surreptitiously Weakening Cryptographic Systems
Bruce Schneier and Matthew Fredrikson and Tadayoshi Kohno and Thomas Ristenpart
2015/096 ( PDF )
A Meet in the Middle Attack on Reduced Round Kuznyechik
Riham AlTawy and Amr M. Youssef
2015/095 ( PDF )
Rotational Cryptanalysis of ARX Revisited
Dmitry Khovratovich and Ivica Nikolic and Josef Pieprzyk and Przemyslaw Sokolowski and Ron Steinfeld
2015/094 ( PDF )
Some New Results on Binary Polynomial Multiplication
Murat Cenk and M. Anwar Hasan
2015/093 ( PDF )
Generalization of Statistical Criteria for Sboxes
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
2015/092 ( PDF )
TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY
Grasha Jacob, Dr. A. Murugan, Irine Viola
2015/091 ( PDF )
Related-Key Forgeries for Prřst-OTR
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2015/090 ( PDF )
Structural Evaluation by Generalized Integral Property
Yosuke Todo
2015/089 ( PDF )
On the security margin of MAC striping
Thomas Eisenbarth and Aaron Meyerowitz and Rainer Steinwandt
2015/088 ( PDF )
Structural Weaknesses in the Open Smart Grid Protocol
Klaus Kursawe and Christiane Peters
2015/087 ( PDF )
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
David Derler and Christian Hanser and Daniel Slamanig
2015/086 ( PDF )
Practical Compact E-Cash with Arbitrary Wallet Size
Patrick Märtens
2015/085 ( PDF )
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
Anne Canteaut and Joëlle Roué
2015/084 ( PDF )
On the Disadvantages of Pairing-based Cryptography
Zhengjun Cao and Lihua Liu
2015/083 ( PDF )
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
Massimo Chenal and Qiang Tang
2015/082 ( PDF )
On the Difficulty of Securing Web Applications using CryptDB
İhsan Haluk AKIN and Berk Sunar
2015/081 ( PDF )
Amortizing Garbled Circuits
Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff
2015/080 ( PDF )
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
Feng Hao and Xun Yi and Liqun Chen and Siamak F. Shahandashti
2015/079 ( PDF )
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
Jiqiang Lu
2015/078 ( PDF )
Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters
GU Chun-xiang and. Xin Dan and. ZHENG Yong-hui and. KANG Yuan-ji
2015/077 ( PDF )
On the Primary Constructions of Vectorial Boolean Bent Functions
Yuwei Xu and Chuankun Wu
2015/076 ( PDF )
Fully Structure-Preserving Signatures and Shrinking Commitments
Masayuki Abe and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi
2015/075 ( PDF )
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen
2015/074 ( PDF )
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
Gilles Barthe and Juan Manuel Crespo and Yassine Lakhnech and Benedikt Schmidt
2015/073 ( PDF )
Oblivious Network RAM
Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin
2015/072 ( PDF )
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Olivier Blazy and Céline Chevalier and Damien Vergnaud
2015/071 ( PDF )
Factoring N=p^r q^s for Large r and s
Jean-Sebastien Coron and Jean-Charles Faugere and Guenael Renault and Rina Zeitoun
2015/070 ( PDF )
The Sum Can Be Weaker Than Each Part
Gaëtan Leurent and Lei Wang
2015/069 ( PDF )
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
Benoît Cogliati and Yannick Seurin
2015/068 ( PDF )
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
Gregor Leander and Brice Minaud and Sondre Rřnjom
2015/067 ( PDF )
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
Susumu Kiyoshima
2015/066 ( PDF )
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
Tobias Schneider and Amir Moradi and Tim Güneysu
2015/065 ( PDF )
A lightweight-friendly modifcation of GOST block cipher
Andrey Dmukh and Denis Dygin and Grigory Marshalko
2015/064 ( PDF )
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
Handan Kılınç and Alptekin Küpçü
2015/063 ( PDF )
CamlCrush: A PKCS\#11 Filtering Proxy
R. Benadjila and T. Calderon and M. Daubignard
2015/062 ( PDF )
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
Yuval Yarom and Gefei Li and Damith C. Ranasinghe
2015/061 ( PDF )
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
2015/060 ( PDF )
Verified Proofs of Higher-Order Masking
Gilles Barthe and Sonia Belaďd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub
2015/059 ( PDF )
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
2015/058 ( PDF )
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
Berry Schoenmakers and Meilof Veeningen
2015/057 ( PDF )
Cold Boot Attacks in the Discrete Logarithm Setting
Bertram Poettering and Dale L. Sibborn
2015/056 ( PDF )
Better Algorithms for LWE and LWR
Alexandre Duc and Florian Tramčr and Serge Vaudenay
2015/055 ( PDF )
Richer Efficiency/Security Trade-offs in 2PC
Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek
2015/054 ( PDF )
Non-committing encryption from $\Phi$-hiding
Brett Hemenway and Rafail Ostrovsky and Alon Rosen
2015/053 ( PDF )
Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/052 ( PDF )
Interactive Message-Locked Encryption and Secure Deduplication
Mihir Bellare and Sriram Keelveedhi
2015/051 ( PDF )
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
Li Lin, Wenling Wu
2015/050 ( PDF )
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
Carla Rŕfols
2015/049 ( PDF )
On Solving Lpn using BKW and Variants
Sonia Bogos and Florian Tramer and Serge Vaudenay
2015/048 ( PDF )
On Obfuscation with Random Oracles
Ran Canetti and Yael Tauman Kalai and Omer Paneth
2015/047 ( PDF )
Linearly Homomorphic Encryption from DDH
Guilhem Castagnos and Fabien Laguillaumie
2015/046 ( PDF )
On the concrete hardness of Learning with Errors
Martin R. Albrecht and Rachel Player and Sam Scott
2015/045 ( PDF )
Reliable Information Extraction for Single Trace Attacks
Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
2015/044 ( PDF )
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
Binanda Sengupta and Abhijit Das
2015/043 ( PDF )
Group Signature with Deniability: How to Disavow a Signature
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka
2015/042 ( PDF )
High Performance Lattice-based CCA-secure Encryption
Rachid El~Bansarkhani and Johannes Buchmann
2015/041 ( PDF )
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP
Artur Mariano and Thijs Laarhoven and Christian Bischof
2015/040 ( PDF )
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/039 ( PDF )
Type-Based Verification of Electronic Voting Protocols
Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling
2015/038 ( PDF )
Aggregate Pseudorandom Functions and Connections to Learning
Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan
2015/037 ( PDF )
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza Aref
2015/036 ( PDF )
Faster software for fast endomorphisms
Billy Bob Brumley
2015/035 ( PDF )
Cryptographically Secure CRC for Lightweight Message Authentication
Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist
2015/034 ( PDF )
Suit up! Made-to-Measure Hardware Implementations of Ascon
Hannes Groß and Erich Wenger and Christoph Dobraunig and Christoph Ehrenhöfer
2015/033 ( PDF )
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel
2015/032 ( PDF )
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF
Zvika Brakerski and Vinod Vaikuntanathan
2015/031 ( PDF )
Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence
Kai-Min Chung and Rafael Pass
2015/030 ( PDF )
Cryptanalysis of Ascon
Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schläffer
2015/029 ( PDF )
Predicate Encryption for Circuits from LWE
Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2015/028 ( PDF )
Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$)
Jeremy Maitin-Shepard
2015/027 ( PDF )
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption
Adam Smith and Ye Zhang
2015/026 ( PDF )
A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/025 ( PDF )
Obfuscating Circuits via Composite-Order Graded Encoding
Benny Applebaum and Zvika Brakerski
2015/024 ( PDF )
Non-Abelian Analogs of Lattice Rounding
Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan
2015/023 ( PDF )
Multilinear Maps Using Ideal Lattices without Encodings of Zero
Gu Chunsheng
2015/022 ( PDF )
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
Bo Yang and Dengguo Feng and Yu Qin and Yingjun Zhang and Weijin Wang
2015/021 ( PDF )
Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification
Xin Li
2015/020 ( PDF )
Simpler Efficient Group Signatures from Lattices
Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang
2015/019 ( PDF )
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Mehdi Tibouchi
2015/018 ( PDF )
A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS
JINTAI DING, ALEXEI MIASNIKOV, AND ALEXANDER USHAKOV
2015/017 ( PDF )
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
2015/016 ( PDF )
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Yannis Rouselakis and Brent Waters
2015/015 ( PDF )
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
Florian Bergsma, Tibor Jager, Jörg Schwenk
2015/014 ( PDF )
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based
San Ling and Khoa Nguyen and Huaxiong Wang
2015/013 ( PDF )
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
Nico Döttling
2015/012 ( PDF )
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
Tancrčde Lepoint and Mehdi Tibouchi
2015/011 ( PDF )
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications
Benjamin Buhrow and Paul Riemer and Mike Shea and Barry Gilbert and Erik Daniel
2015/010 ( PDF )
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
Shengli Liu and Kenneth G. Paterson
2015/009 ( PDF )
Rig: A simple, secure and flexible design for Password Hashing
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2015/008 ( PDF )
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Satrajit Ghosh and Aniket Kate
2015/007 ( PDF )
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Tobias Pulls and Roel Peeters
2015/006 ( PDF )
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Jan Camenisch and Robert R. Enderlein and Gregory Neven
2015/005 ( PDF )
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs
2015/004 ( PDF )
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Carmit Hazay
2015/003 ( PDF )
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen
2015/002 ( PDF )
Characterization of MDS mappings
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2015/001 ( PDF )
A note on the security of Higher-Order Threshold Implementations
Oscar Reparaz
2014/1029 ( PDF )
On the Cryptographic Hardness of Finding a Nash Equilibrium
Nir Bitansky and Omer Paneth and Alon Rosen
2014/1028 ( PDF )
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
Payal Chaudhari and Manik Lal Das and Anish Mathuria
2014/1027 ( PDF )
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Vadim Lyubashevsky and Daniel Wichs
2014/1026 ( PDF )
Lattices with Symmetry
H. W. Lenstra, Jr. and A. Silverberg
2014/1025 ( PDF )
XPIR: Private Information Retrieval for Everyone
Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian
2014/1024 ( PDF )
Cryptanalysis of the Co-ACD Assumption
Pierre-Alain Fouque and Moon Sung Lee and Tancrčde Lepoint and Mehdi Tibouchi
2014/1023 ( PDF )
How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search
Nathan E. Price and Alan T. Sherman
2014/1022 ( PDF )
Topology-Hiding Computation
Tal Moran and Ilan Orlov and Silas Richelson
2014/1021 ( PDF )
Tightly-Secure Signatures from Chameleon Hash Functions
Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan
2014/1020 ( PDF )
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
2014/1019 ( -- withdrawn -- )
Related-Key Differential Cryptanalysis of Reduced-Round ITUBee
Xiaoming Tang and Weidong Qiu and Zheng Gong and Zheng Huang and Jie Guo
2014/1018 ( PDF )
Algebraic Algorithms for LWE
Martin R. Albrecht and Carlos Cid and Jean-Charles Faugčre and Ludovic Perret
2014/1017 ( PDF )
Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
Foteini Baldimtsi and Olga Ohrimenko
2014/1016 ( -- withdrawn -- )
Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security
GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL
2014/1015 ( PDF )
Compact Accumulator using Lattices
Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini
2014/1014 ( PDF )
Double-and-Add with Relative Jacobian Coordinates
Björn Fay
2014/1013 ( PDF )
Computational Independence
Björn Fay
2014/1012 ( PDF )
The Boomerang Attacks on BLAKE and BLAKE2
Yonglin Hao
2014/1011 ( PDF )
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Alex Biryukov and Ivan Pustogarov
2014/1010 ( PDF )
On Continuous After-the-Fact Leakage-Resilient Key Exchange
Mohsen Toorani
2014/1009 ( PDF )
A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
Christopher D. Nguyen and Dhananjay S. Phatak and Steven D. Houston and Alan T. Sherman
2014/1008 ( PDF )
DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS
Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
2014/1007 ( PDF )
Fair Multiple-bank E-cash in the Standard Model
Jiangxiao Zhang and Yanwu Gao and Chunhui Feng and Hua Guo and Zhoujun Li
2014/1006 ( PDF )
Simple composition theorems of one-way functions -- proofs and presentations
Jaime Gaspar and Eerke Boiten
2014/1005 ( PDF )
A pure block chain based decentralized exchange.
Harsh Patel
2014/1004 ( PDF )
CONIKS: Bringing Key Transparency to End Users
Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
2014/1003 ( PDF )
COFFE: Ciphertext Output Feedback Faithful Encryption
Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel
2014/1002 ( PDF )
Experiments in Encrypted and Searchable Network Audit Logs
Bhanu Prakash Gopularam and Sashank Dara and Nalini N
2014/1001 ( -- withdrawn -- )
Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE
Xiaopeng Yang, Wenping Ma, and Chengli Zhang
2014/1000 ( PDF )
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri
2014/999 ( PDF )
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
Yongdae Kim and Hyunsoo Yoon
2014/998 ( PDF )
Hierarchical deterministic Bitcoin wallets that tolerate key leakage
Gus Gutoski and Douglas Stebila
2014/997 ( PDF )
Constants Count: Practical Improvements to Oblivious RAM
Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas
2014/996 ( PDF )
Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
Maike Massierer
2014/995 ( PDF )
Partial Garbling Schemes and Their Applications
Yuval Ishai and Hoeteck Wee
2014/994 ( PDF )
Two novel applications of bilinear groups to ABE encryption
Riccardo Longo and Chiara Marcolla and Massimiliano Sala
2014/993 ( PDF )
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer
2014/992 ( PDF )
Incentivized Outsourced Computation Resistant to Malicious Contractors
Alptekin Kupcu
2014/991 ( PDF )
Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
Kai-Min Chung and Huijia Lin and Rafael Pass
2014/990 ( PDF )
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
Pille Pullonen and Sander Siim
2014/989 ( PDF )
Controlled Homomorphic Encryption: Definition and Construction
Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti
2014/988 ( PDF )
Armadillo: a compilation chain for privacy preserving applications
Sergiu Carpov and Paul Dubrulle and Renaud Sirdey
2014/987 ( PDF )
Cryptanalysis of Full PRIDE Block Cipher
Yibin Dai and Shaozhen Chen
2014/986 ( PDF )
Related-Key Differential Attack on Round Reduced RECTANGLE-80
Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma
2014/985 ( PDF )
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
Bartosz Zoltak
2014/984 ( PDF )
Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel
Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert
2014/983 ( PDF )
Public Verification of Private Effort
Giulia Alberini and Tal Moran and Alon Rosen
2014/982 ( PDF )
Outlier Privacy
Edward Lui and Rafael Pass
2014/981 ( PDF )
Publicly Verifiable Non-Interactive Arguments for Delegating Computation
Omer Paneth and Guy N. Rothblum
2014/980 ( PDF )
A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors
Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
2014/979 ( PDF )
The Chaining Lemma and its application
Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
2014/978 ( PDF )
Improved Differential Analysis of Block Cipher PRIDE
Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma
2014/977 ( PDF )
A Survey on Lightweight Entity Authentication with Strong PUFs
Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede
2014/976 ( PDF )
Geppetto: Versatile Verifiable Computation
Craig Costello and Cédric Fournet and Jon Howell and Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and Bryan Parno and Samee Zahur
2014/975 ( PDF )
Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2014/974 ( -- withdrawn -- )
Non-Linearity and Affine Equivalence of Permutations
P R Mishra, Indivar Gupta and N Rajesh Pillai
2014/973 ( PDF )
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma
2014/972 ( PDF )
A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
Haining Fan
2014/971 ( PDF )
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
Y. Wei and E. Pasalic and F. Zhang and W. Wu
2014/970 ( PDF )
Jackpot Stealing Information From Large Caches via Huge Pages
Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
2014/969 ( PDF )
Privacy-Preserving Face Recognition with Outsourced Computation
Can Xiang and Chunming Tang
2014/968 ( PDF )
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
Jorge Munilla and Mike Burmester and Albert Peinado
2014/967 ( PDF )
A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
Maciej Skorski
2014/966 ( PDF )
Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
Kan Yang and Xiaohua Jia and Kuan Zhang and Xuemin (Sherman) Shen
2014/965 ( PDF )
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
Romain Gay and Pierrick Méaux and Hoeteck Wee
2014/964 ( PDF )
On two windows multivariate cryptosystem depending on random parameters
Urszula Romańczuk-Polubiec, Vasyl Ustimenko
2014/963 ( PDF )
Malicious-Client Security in Blind Seer: A Scalable Private DBMS
Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
2014/962 ( PDF )
Solving Polynomial Systems with Noise over F_2: Revisited
Zhenyu Huang and Dongdai Lin
2014/961 ( PDF )
When are Fuzzy Extractors Possible?
Benjamin Fuller and Adam Smith and Leonid Reyzin
2014/960 ( PDF )
Non-Interactive Secure Multiparty Computation
Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin-Cherniavsky
2014/959 ( PDF )
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul
2014/958 ( PDF )
Authenticated Encryption: How Reordering can Impact Performance
Basel Alomair
2014/957 ( PDF )
Black Box Separations for Differentially Private Protocols
Dakshita Khurana and Hemanta K. Maji and Amit Sahai
2014/956 ( PDF )
Tamper Detection and Continuous Non-Malleable Codes
Zahra Jafargholi and Daniel Wichs
2014/955 ( PDF )
On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme
Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
2014/954 ( PDF )
Algebraic Fault Analysis of Katan
Frank Quedenfeld
2014/953 ( PDF )
The Related-Key Security of Iterated Even-Mansour Ciphers
Pooya Farshim and Gordon Procter
2014/952 ( PDF )
Balanced Encoding to Mitigate Power Analysis: A Case Study
Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye
2014/951 ( PDF )
Modified Alternating Step Generators with Non-Linear Scrambler
Robert Wicik and Tomasz Rachwalik and Rafał Gliwa
2014/950 ( PDF )
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda
2014/949 ( PDF )
Simplification/complication of the basis of prime Boolean ideal
Alexander Rostovtsev and Anna Shustrova
2014/948 ( PDF )
Lattice Point Enumeration on Block Reduced Bases
Michael Walter
2014/947 ( PDF )
The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2014/946 ( PDF )
On a new fast public key cryptosystem
Samir Bouftass
2014/945 ( PDF )
Boomerang Attack on Step-Reduced SHA-512
Hongbo Yu, Dongxia Bai
2014/944 ( PDF )
EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes
Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
2014/943 ( PDF )
HaTCh: A Formal Framework of Hardware Trojan Design and Detection
Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk
2014/942 ( PDF )
Public-Coin Differing-Inputs Obfuscation and Its Applications
Yuval Ishai, Omkant Pandey, Amit Sahai
2014/941 ( PDF )
Garbled RAM From One-Way Functions
Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro
2014/940 ( PDF )
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2014/939 ( PDF )
Security Analysis of an Authentication Scheme Using Smart Cards
Gaurav Tiwari and Amit K. Awasthi and Neha Shukla
2014/938 ( PDF )
Trapdoor Computational Fuzzy Extractors
Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
2014/937 ( PDF )
Analysis of Lewko-Sahai-Waters Revocation System
Zhengjun Cao and Lihua Liu
2014/936 ( PDF )
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
2014/935 ( PDF )
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia
2014/934 ( PDF )
Efficient Generic Zero-Knowledge Proofs from Commitments
Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias
2014/933 ( PDF )
Certificateless Proxy Re-Encryption Without Pairing: Revisited
Akshayaram Srinivasan and C. Pandu Rangan
2014/932 ( PDF )
Bicliques with Minimal Data and Time Complexity for AES (Extended Version)
Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
2014/931 ( PDF )
Cryptanalysis of JAMBU
Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang
2014/930 ( PDF )
Immunizing Multilinear Maps Against Zeroizing Attacks
Dan Boneh and David J. Wu and Joe Zimmerman
2014/929 ( PDF )
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero
Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai
2014/928 ( PDF )
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois
2014/927 ( PDF )
Physical functions : the common factor of side-channel and fault attacks ?
Bruno Robisson and Hélčne Le Bouder
2014/926 ( PDF )
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
Keita Emura and Takuya Hayashi
2014/925 ( PDF )
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
Venkata Koppula and Allison Bishop Lewko and Brent Waters
2014/924 ( PDF )
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
Antoine Joux and Cécile Pierrot
2014/923 ( -- withdrawn -- )
New Cryptosystem Using The CRT And The Jordan Normal Form
Hemlata Nagesh and Birendra Kumar Sharma
2014/922 ( PDF )
Differential Analysis of Block Ciphers SIMON and SPECK
Alex Biryukov and Arnab Roy and Vesselin Velichkov
2014/921 ( PDF )
Batch NFS
Daniel J. Bernstein and Tanja Lange
2014/920 ( PDF )
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert
2014/919 ( PDF )
Experimenting with Shuffle Block Cipher and SMT Solvers
Martin Stanek
2014/918 ( PDF )
Web Tap Payment Authentication and Encryption With Zero Customer Effort
Henry Ng
2014/917 ( PDF )
From Selective to Adaptive Security in Functional Encryption
Prabhanjan Ananth and Zvika Brakerski and Gil Segev and Vinod Vaikuntanathan
2014/916 ( PDF )
Adaptively Secure Fully Homomorphic Signatures Based on Lattices
Xavier Boyen and Xiong Fan and Elaine Shi
2014/915 ( PDF )
The Security of the Hanser-Slamanig Signature Scheme Revisited
Yanbin Pan
2014/914 ( PDF )
Cryptography with One-Way Communication
Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2014/913 ( PDF )
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
2014/912 ( PDF )
Low-Cost Concurrent Error Detection for GCM and CCM
Xiaofei Guo and Ramesh Karri
2014/911 ( PDF )
A Denial of Service Attack against Fair Computations using Bitcoin Deposits
Jethro Beekman
2014/910 ( PDF )
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model
Vanishree Rao
2014/909 ( PDF )
Robust Secret Sharing Schemes Against Local Adversaries
Allison Bishop Lewko and Valerio Pastro
2014/908 ( PDF )
Practical UC security with a Global Random Oracle
Ran Canetti and Abhishek Jain and Alessandra Scafuro
2014/907 ( PDF )
Finding shortest lattice vectors faster using quantum search
Thijs Laarhoven and Michele Mosca and Joop van de Pol
2014/906 ( PDF )
Cryptanalysis of the Multilinear Map over the Integers
Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehle
2014/905 ( PDF )
Primary-Secondary-Resolver Membership Proof Systems
Moni Naor and Asaf Ziv
2014/904 ( PDF )
How Secure is TextSecure?
Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz
2014/903 ( PDF )
Falcon Codes: Fast, Authenticated LT Codes
Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos
2014/902 ( PDF )
The Power of Negations in Cryptography
Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen
2014/901 ( PDF )
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
Kenneth G. Paterson and Mario Strefler
2014/900 ( PDF )
Some Security Results of the RC4+ Stream Cipher
Subhadeep Banik and Sonu Jha
2014/899 ( PDF )
Side Channel Power Analysis of an AES-256 Bootloader
Colin O'Flynn and Zhizhang Chen
2014/898 ( PDF )
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
Eduardo Morais and Ricardo Dahab
2014/897 ( PDF )
Leveled Fully Homomorphic Signatures from Standard Lattices
Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs
2014/896 ( PDF )
Efficiently Making Secure Two-Party Computation Fair
Handan Kılınç and Alptekin Küpçü
2014/895 ( PDF )
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
Kerry A. McKay and Poorvi L. Vora
2014/894 ( PDF )
THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS
Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan
2014/893 ( PDF )
Advanced Algebraic Attack on Trivium
Frank Quedenfeld and Christopher Wolf
2014/892 ( PDF )
Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014
Georg Fuchsbauer
2014/891 ( PDF )
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi
2014/890 ( PDF )
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures
Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek
2014/889 ( PDF )
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak
2014/888 ( PDF )
Distance Lower Bounding
Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi
2014/887 ( PDF )
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
2014/886 ( PDF )
Accountable Storage
Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia
2014/885 ( PDF )
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
Marios O. Choudary and Markus G. Kuhn
2014/884 ( -- withdrawn -- )
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo and Yunsi Fei
2014/883 ( PDF )
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo and Yunsi Fei
2014/882 ( PDF )
Obfuscation of Probabilistic Circuits and Applications
Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan
2014/881 ( PDF )
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2014/880 ( PDF )
Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
Joppe W. Bos and Michael Naehrig and Joop van de Pol
2014/879 ( PDF )
Watch your Constants: Malicious Streebog
Riham AlTawy and Amr M. Youssef
2014/878 ( PDF )
Protecting obfuscation against arithmetic attacks
Eric Miles and Amit Sahai and Mor Weiss
2014/877 ( PDF )
CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
Daniel R. L. Brown
2014/876 ( PDF )
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
Mihir Bellare and Viet Tung Hoang
2014/875 ( PDF )
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding
2014/874 ( PDF )
Accelerating Bliss: the geometry of ternary polynomials
Léo Ducas
2014/873 ( PDF )
Bootstrapping for HElib
Shai Halevi and Victor Shoup
2014/872 ( PDF )
Recent Results in Scalable Multi-Party Computation
Jared Saia and Mahdi Zamani
2014/871 ( PDF )
An algorithm for MD5 single-block collision attack using high-performance computing cluster
Anton A. Kuznetsov
2014/870 ( PDF )
Dynamic Behavior of RS latches using FIB processing and probe connection
Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto
2014/869 ( PDF )
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Werner Schindler
2014/868 ( PDF )
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
Ilan Komargodski and Gil Segev and Eylon Yogev
2014/867 ( PDF )
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Christina Brzuska and Pooya Farshim and Arno Mittelbach
2014/866 ( -- withdrawn -- )
Self-Destruct Non-Malleability
Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
2014/865 ( PDF )
Impossibility of Black-Box Simulation Against Leakage Attacks
Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
2014/864 ( PDF )
How to Choose Interesting Points for Template Attacks More Effectively
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/863 ( PDF )
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou
2014/860 ( PDF )
Differential Factors: Improved Attacks on SERPENT
Cihangir Tezcan and Ferruh Özbudak
2014/859 ( -- withdrawn -- )
Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system
SK Hafizul Islam; G. P. Biswas
2014/858 ( PDF )
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds
Dana Dachman-Soled and Jonathan Katz and Vanishree Rao
2014/857 ( PDF )
Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
Jonathan Katz and Andrew Miller and Elaine Shi
2014/854 ( PDF )
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
2014/852 ( PDF )
Faster ECC over $\mathbb{F}_{2^{521}-1}$
Robert Granger and Michael Scott
2014/850 ( PDF )
BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates
Markku-Juhani O. Saarinen
2014/847 ( PDF )
Reflections on Slide with a Twist Attacks
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2014/846 ( PDF )
Verifiable computation using multiple provers
Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish
2014/844 ( PDF )
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
Sanjam Garg and Antigoni Polychroniadou
2014/842 ( PDF )
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
2014/840 ( PDF )
Constrained PRFs for Unbounded Inputs
Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
2014/838 ( PDF )
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan
2014/836 ( PDF )
A Tight Transformation between HILL and Metric Conditional Pseudoentropy
Maciej Skorski
2014/834 ( PDF )
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman
2014/833 ( PDF )
Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability
Essam Ghadafi
2014/831 ( PDF )
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean and Ivica Nikolić and Thomas Peyrin
2014/830 ( PDF )
Adaptively Secure UC Constant Round Multi-Party Computation
Ivan Damgĺrd and Antigoni Polychroniadou and Vanishree Rao
2014/829 ( PDF )
Additively Homomorphic UC commitments with Optimal Amortized Overhead
Ignacio Cascudo and Ivan Damgĺrd and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti
2014/825 ( -- withdrawn -- )
Towards Optimal Bounds for Implicit Factorization Problem
Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin
2014/822 ( PDF )
Ballot secrecy with malicious bulletin boards
David Bernhard and Ben Smyth
2014/821 ( PDF )
Non-malleable Reductions and Applications
Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski
2014/819 ( PDF )
Riding on Asymmetry: Efficient ABE for Branching Programs
Sergey Gorbunov and Dhinakaran Vinayagamurthy
2014/818 ( -- withdrawn -- )
Circulant Matrices and Differential Privacy
Jalaj Upadhyay
2014/816 ( PDF )
FHEW: Bootstrapping Homomorphic Encryption in less than a second
Léo Ducas and Daniele Micciancio
2014/815 ( PDF )
A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves
Palash Sarkar and Shashank Singh
2014/810 ( PDF )
Simulation-Based Secure Functional Encryption in the Random Oracle Model
Vincenzo Iovino and Karol Zebrowski
2014/809 ( PDF )
Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
Ignacio Cascudo and Ivan Damgĺrd and Oriol Farràs and Samuel Ranellucci
2014/807 ( PDF )
Leakage-resilient non-malleable codes
Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
2014/805 ( PDF )
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
Charanjit S. Jutla and Arnab Roy
2014/804 ( PDF )
Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
Jacob Alperin-Sheriff
2014/803 ( PDF )
A Decentralized Public Key Infrastructure with Identity Retention
Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
2014/800 ( PDF )
Efficient Pairings and ECC for Embedded Systems
Thomas Unterluggauer and Erich Wenger
2014/799 ( PDF )
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
2014/798 ( PDF )
Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
Michael Clear and Ciarán McGoldrick
2014/797 ( PDF )
Tightly-Secure Authenticated Key Exchange
Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li
2014/796 ( PDF )
Distributed Cryptography Based on the Proofs of Work
Marcin Andrychowicz and Stefan Dziembowski
2014/795 ( PDF )
SPHINCS: practical stateless hash-based signatures
Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Michael Schneider and Peter Schwabe and Zooko Wilcox-O'Hearn
2014/792 ( PDF )
General Overview of the First-Round CAESAR Candidates for Authenticated Encryption
{Farzaneh Abed, Christian Forler, Stefan Lucks
2014/789 ( PDF )
Statistical Properties of the Square Map Modulo a Power of Two
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
2014/786 ( PDF )
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Chun Guo and Dongdai Lin
2014/785 ( PDF )
Divisible E-Cash Made Practical
Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
2014/781 ( PDF )
Tally-based simple decoders for traitor tracing and group testing
Boris Skoric
2014/780 ( PDF )
Deterministic Public-Key Encryption under Continual Leakage
Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters
2014/779 ( PDF )
Implementing Cryptographic Program Obfuscation
Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
2014/771 ( PDF )
Succinct Randomized Encodings and their Applications
Nir Bitansky and Sanjam Garg and Sidharth Telang
2014/767 ( PDF )
Algebraic Attacks on Human Identification Protocols
Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk
2014/765 ( PDF )
The Bitcoin Backbone Protocol: Analysis and Applications
Juan Garay and Aggelos Kiayias and Nikos Leonardos
2014/762 ( PDF )
Access Control in Publicly Verifiable Outsourced Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2014/760 ( PDF )
Montgomery Modular Multiplication on ARM-NEON Revisited
Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, and Howon Kim
2014/759 ( PDF )
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
2014/757 ( PDF )
Adaptively Secure Broadcast Encryption with Small System Parameters
Mark Zhandry
2014/756 ( PDF )
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
Samee Zahur and Mike Rosulek and David Evans
2014/754 ( PDF )
Bilinear Entropy Expansion from the Decisional Linear Assumption
Lucas Kowalczyk and Allison Bishop Lewko
2014/748 ( PDF )
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
Mehmet Sabır Kiraz and Osmanbey Uzunkol
2014/747 ( PDF )
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2014/744 ( PDF )
Sieving for shortest vectors in lattices using angular locality-sensitive hashing
Thijs Laarhoven
2014/740 ( -- withdrawn -- )
Non-existence of [n; 5] type Generalized Bent function.
Shashi Kant Pandey and P.R Mishra and B.K Dass
2014/733 ( PDF )
Augmented Learning with Errors: The Untapped Potential of the Error Term
Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann
2014/732 ( PDF )
Resizable Tree-Based Oblivious RAM
Tarik Moataz and Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
2014/730 ( PDF )
Differentially Private Linear Algebra in the Streaming Model
Jalaj Upadhyay
2014/728 ( PDF )
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson
2014/725 ( PDF )
Efficient Software Implementation of Ring-LWE Encryption
Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2014/724 ( PDF )
Protecting Encrypted Cookies from Compression Side-Channel Attacks
Janaka Alawatugoda and Douglas Stebila and Colin Boyd
2014/720 ( PDF )
Adaptively Secure Constrained Pseudorandom Functions
Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters
2014/719 ( PDF )
Bivariate Polynomials Modulo Composites and their Applications
Dan Boneh and Henry Corrigan-Gibbs
2014/717 ( PDF )
How to Split a Secret into Unknown Shares
Ruxandra F. Olimid
2014/710 ( PDF )
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
Yehuda Lindell
2014/706 ( PDF )
The Feasibility of Outsourced Database Search in the Plain Model
Carmit Hazay and Hila Zarosim
2014/705 ( PDF )
Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
Christian Hanser and Daniel Slamanig
2014/704 ( PDF )
A 128-bit Block Cipher Based on Three Group Arithmetics
Shenghui Su and Shuwang Lü and Daqiang Dong
2014/698 ( PDF )
HIMMO - A lightweight collusion-resistant key predistribution scheme
Oscar Garcia-Morchon and Domingo Gomez-Perez and Jaime Gutierrez and Ronald Rietman and Berry Schoenmakers and Ludo Tolhuizen
2014/695 ( PDF )
Proof of Proximity of Knowledge
Serge Vaudenay
2014/693 ( PDF )
Optimal Proximity Proofs
Ioana Boureanu and Serge Vaudenay
2014/686 ( PDF )
A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications
Ming Li and Dongdai Lin
2014/685 ( PDF )
Bit Security of the CDH Problems over Finite Field
Mingqiang Wang and Tao Zhan and Haibin Zhang
2014/681 ( PDF )
Improved Linear Cryptanalysis of Reduced-round SIMON
Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, and Martin M. Lauridsen
2014/674 ( PDF )
Efficient RAM and control flow in verifiable outsourced computation
Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
2014/672 ( PDF )
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Xiao Wang and Hubert Chan and Elaine Shi
2014/666 ( PDF )
Fully Secure Functional Encryption without Obfuscation
Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
2014/662 ( PDF )
Outsourced Pattern Matching
Sebastian Faust and Carmit Hazay and Daniele Venturi
2014/656 ( PDF )
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
Itai Dinur
2014/653 ( PDF )
Mersenne factorization factory
Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra
2014/652 ( PDF )
A Dynamic Cube Attack on $105$ round Grain v1
Subhadeep Banik
2014/649 ( PDF )
FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar
2014/645 ( PDF )
Graph-Induced Multilinear Maps from Lattices
Craig Gentry and Sergey Gorbunov and Shai Halevi
2014/641 ( PDF )
The Multiple Number Field Sieve with Conjugation Method
Cécile Pierrot
2014/640 ( PDF )
Revocation in Publicly Verifiable Outsourced Computation
James Alderman and Christian Janson and Carlos Cid and Jason Crampton
2014/638 ( PDF )
Substring-Searchable Symmetric Encryption
Melissa Chase and Emily Shen
2014/637 ( PDF )
Generic Hardness of the Multiple Discrete Logarithm Problem
Aaram Yun
2014/635 ( PDF )
Type 2 Structure-Preserving Signature Schemes Revisited
Sanjit Chatterjee and Alfred Menezes
2014/632 ( PDF )
Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge
Esha Ghosh and Olga Ohrimenko and Roberto Tamassia
2014/631 ( PDF )
Zipf’s Law in Passwords
Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
2014/630 ( PDF )
Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation
Peeter Laud
2014/629 ( PDF )
Two-factor authentication for the Bitcoin protocol
Christopher Mann and Daniel Loebenberger
2014/627 ( PDF )
On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
Debrup Chakraborty and Palash Sarkar
2014/624 ( PDF )
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao
2014/623 ( PDF )
Privacy with Imperfect Randomness
Yevgeniy Dodis and Yanqing Yao
2014/620 ( PDF )
The M3dcrypt Password Hashing Function
Isaiah Makwakwa
2014/617 ( PDF )
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
Michael Backes and Manuel Barbosa and Dario Fiore and Raphael M. Reischuk
2014/616 ( PDF )
Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Zhen Liu and Duncan S. Wong
2014/612 ( PDF )
Attribute-Based Encryption Optimized for Cloud Computing
Máté Horváth
2014/609 ( PDF )
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/605 ( PDF )
On the Possibilities and Limitations of Computational Fuzzy Extractors
Kenji Yasunaga and Kosuke Yuzawa
2014/604 ( PDF )
Private Web Search with Constant Round Efficiency
Bolam Kang and Sung Cheol Goh and Myungsun Kim
2014/603 ( PDF )
Recursive Trees for Practical ORAM
Tarik Moataz and Erik-Oliver Blass and Guevara Noubir
2014/600 ( -- withdrawn -- )
DTKI: a new formalized PKI with no trusted parties
Jiangshan Yu and Vincent Cheval and Mark Ryan
2014/599 ( PDF )
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila
2014/598 ( PDF )
Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi
2014/595 ( PDF )
Scalable Zero Knowledge via Cycles of Elliptic Curves
Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
2014/594 ( PDF )
Oblivious Parallel RAM and Applications
Elette Boyle and Kai-Min Chung and Rafael Pass
2014/593 ( PDF )
Improved Exponential-time Algorithms for Inhomogeneous-SIS
Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield
2014/588 ( PDF )
A Punctured Programming Approach to Adaptively Secure Functional Encryption
Brent Waters
2014/583 ( PDF )
Template Attacks Based On Priori Knowledge
Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/582 ( PDF )
NSEC5: Provably Preventing DNSSEC Zone Enumeration
Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv
2014/581 ( PDF )
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
Olivier Blazy and Eike Kiltz and Jiaxin Pan
2014/576 ( PDF )
Vernam Two
Dan P. Milleville
2014/575 ( PDF )
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
Markku-Juhani O. Saarinen
2014/571 ( PDF )
How to manipulate curve standards: a white paper for the black hat
Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
2014/565 ( PDF )
Kangaroos in Side-Channel Attacks
Tanja Lange and Christine van Vredendaal and Marnix Wakker
2014/564 ( -- withdrawn -- )
A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
Massoud Hadian Dehkordi and Reza Ghasemi
2014/562 ( PDF )
hHB: a Harder HB+ Protocol
Ka Ahmad Khoureich
2014/560 ( PDF )
Towards Forward Security Properties for PEKS and IBE
Qiang Tang
2014/559 ( PDF )
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
Pablo Rauzy and Sylvain Guilley
2014/555 ( PDF )
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges
2014/553 ( PDF )
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
Ran Canetti and Asaf Cohen and Yehuda Lindell
2014/550 ( PDF )
Function-Private Functional Encryption in the Private-Key Setting
Zvika Brakerski and Gil Segev
2014/547 ( PDF )
Authentication Codes Based on Resilient Boolean Maps
Juan Carlos Ku-Cauich and Guillermo Morales-Luna
2014/546 ( PDF )
Anonymous and Publicly Linkable Reputation Systems
Johannes Blömer and Jakob Juhnke and Christina Kolb
2014/543 ( PDF )
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
2014/538 ( -- withdrawn -- )
A Secure Cloud-based NFC Mobile Payment Protocol
pardis pourghomi and muhammad qasim saeed and george ghinea
2014/532 ( -- withdrawn -- )
On the Pitfalls of using Arbiter-PUFs as Building Blocks
Georg T. Becker
2014/531 ( PDF )
Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
Paolo Palmieri and Luca Calderoni and Dario Maio
2014/530 ( PDF )
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap
2014/527 ( PDF )
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
Annelie Heuser and Olivier Rioul and Sylvain Guilley
2014/521 ( PDF )
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
Susan Hohenberger and Venkata Koppula and Brent Waters
2014/520 ( PDF )
Squares of Random Linear Codes
Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Zémor
2014/517 ( PDF )
On the Connection between Leakage Tolerance and Adaptive Security
Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
2014/515 ( -- withdrawn -- )
Ideal Social Secret Sharing Using Birkhoff Interpolation Method
Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian
2014/514 ( PDF )
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili
2014/512 ( PDF )
Rmind: a tool for cryptographically secure statistical analysis
Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk
2014/507 ( PDF )
How to Generate and use Universal Samplers
Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry
2014/504 ( PDF )
A Provable Security Analysis of Intel's Secure Key RNG
Thomas Shrimpton and R. Seth Terashima
2014/501 ( PDF )
WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time
Markku--Juhani O. Saarinen and Billy Bob Brumley
2014/500 ( -- withdrawn -- )
Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
Can Xiang and Chunming Tang
2014/499 ( PDF )
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş
2014/497 ( PDF )
NREPO:Normal Basis Recomputing with Permuted Operands
Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin and Ramesh Karri
2014/494 ( PDF )
Hardness of k-LWE and Applications in Traitor Tracing
San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld
2014/493 ( PDF )
Arithmetic on Abelian and Kummer Varieties
David Lubicz and Damien Robert
2014/491 ( PDF )
Bootstrappable Identity-Based Fully Homomorphic Encryption
Michael Clear and Ciarán McGoldrick
2014/488 ( PDF )
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Michel Abdalla and Fabrice Benhamouda and Alain Passelčgue and Kenneth G. Paterson
2014/485 ( PDF )
An Improved Truncated Di fferential Cryptanalysis of KLEIN
Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref
2014/483 ( PDF )
Disjunctions for Hash Proof Systems: New Constructions and Applications
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2014/480 ( PDF )
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
2014/479 ( PDF )
Even more practical secure logging: Tree-based Seekable Sequential Key Generators
Giorgia Azzurra Marson and Bertram Poettering
2014/478 ( PDF )
Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
Benny Applebaum and Eyal Widder
2014/473 ( -- withdrawn -- )
An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
2014/472 ( PDF )
How to Watermark Cryptographic Functions
Ryo Nishimaki
2014/471 ( -- withdrawn -- )
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
2014/464 ( PDF )
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng
2014/451 ( PDF )
Leveled Fully Homomorphic Signatures from Standard Lattices
Daniel Wichs
2014/448 ( PDF )
Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
Ning Wang and Xiaoyun Wang and Keting Jia and Jingyuan Zhao
2014/445 ( PDF )
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Rŕfols and Andy Rupp
2014/443 ( PDF )
Minimizing the Two-Round Even-Mansour Cipher
Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger
2014/438 ( PDF )
Security of Symmetric Encryption against Mass Surveillance
Mihir Bellare and Kenneth Paterson and Phillip Rogaway
2014/435 ( PDF )
Wait a minute! A fast, Cross-VM attack on AES
Gorka Irazoqui and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
2014/434 ( PDF )
Just a Little Bit More
Joop van de Pol and Nigel P. Smart and Yuval Yarom
2014/431 ( PDF )
Tiny ORAM: A Low-Latency, Low-Area Hardware ORAM Controller
Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten Van Dijk and Emil Stefanov and Srinivas Devadas
2014/428 ( PDF )
Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
Nuttapong Attrapadung
2014/426 ( PDF )
Towards Optimally Efficient Secret-Key Authentication from PRG
Ivan Damgård and Sunoo Park
2014/416 ( PDF )
Adaptive Security of Constrained PRFs
Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao
2014/412 ( PDF )
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Jean-Baptiste Mairy and Yves Deville
2014/405 ( PDF )
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Christina Brzuska and Arno Mittelbach
2014/397 ( PDF )
Cofactorization on Graphics Processing Units
Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra
2014/395 ( PDF )
Lightweight and Privacy-Preserving Delegatable Proofs of Storage
Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong
2014/394 ( PDF )
Relational Hash
Avradip Mandal and Arnab Roy
2014/393 ( PDF )
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
2014/392 ( PDF )
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
2014/386 ( PDF )
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede
2014/381 ( PDF )
Using Indistinguishability Obfuscation via UCEs
Christina Brzuska and Arno Mittelbach
2014/376 ( PDF )
How Secure is Deterministic Encryption?
Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi
2014/370 ( PDF )
Compact VSS and Efficient Homomorphic UC Commitments
Ivan Damgĺrd and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen
2014/367 ( PDF )
Redefining the Transparency Order
Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff
2014/364 ( PDF )
Deleting Secret Data with Public Verifiability
Feng Hao and Dylan Clarke and Avelino Francisco Zorzo
2014/343 ( PDF )
Solving Linear Equations Modulo Unknown Divisors: Revisited
Yao Lu and Rui Zhang and Liqiang Peng and Dongdai Lin
2014/342 ( PDF )
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
2014/339 ( -- withdrawn -- )
Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds
Yi Deng
2014/338 ( PDF )
A Tamper and Leakage Resilient von Neumann Architecture
Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
2014/334 ( PDF )
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures
Rachid El~Bansarkhani and Johannes Buchmann
2014/333 ( PDF )
An optimal representation for the trace zero subgroup
Elisa Gorla and Maike Massierer
2014/332 ( PDF )
How to Choose Interesting Points for Template Attacks?
Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng
2014/331 ( PDF )
Machine Learning Classification over Encrypted Data
Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser
2014/324 ( PDF )
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
Sandro Coretti and Ueli Maurer and Björn Tackmann and Daniele Venturi
2014/318 ( PDF )
Index calculus in the trace zero variety
Elisa Gorla and Maike Massierer
2014/310 ( PDF )
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
Yu Chen and Qiong Huang and Zongyang Zhang
2014/309 ( PDF )
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters
2014/306 ( PDF )
Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen and Zongyang Zhang
2014/301 ( PDF )
How to Avoid Obfuscation Using Witness PRFs
Mark Zhandry
2014/295 ( PDF )
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
Nir Bitansky and Omer Paneth
2014/283 ( PDF )
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie
2014/278 ( PDF )
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Essam Ghadafi
2014/271 ( PDF )
STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
Markku-Juhani O. Saarinen
2014/270 ( PDF )
Faster Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen
2014/268 ( PDF )
New bit-parallel Montgomery multiplier for trinomials using squaring operation
Yin Li and Yiyang Chen
2014/264 ( PDF )
Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
Janaka Alawatugoda and Colin Boyd and Douglas Stebila
2014/257 ( PDF )
Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
Bruce Kallick
2014/256 ( PDF )
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
2014/254 ( PDF )
Enhanced Lattice-Based Signatures on Reconfigurable Hardware
Thomas Pöppelmann and Léo Ducas and Tim Güneysu
2014/250 ( PDF )
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Boaz Tsaban and Noam Lifshitz
2014/243 ( PDF )
Key Derivation From Noisy Sources With More Errors Than Entropy
Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam Smith
2014/242 ( PDF )
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
Franziskus Kiefer and Mark Manulis
2014/238 ( PDF )
High Parallel Complexity Graphs and Memory-Hard Functions
Joël Alwen and Vladimir Serbinenko
2014/231 ( PDF )
Self-Updatable Encryption with Short Public Parameters and Its Extensions
Kwangsu Lee
2014/230 ( PDF )
Isogeny graphs with maximal real multiplication
Sorina Ionica and Emmanuel Thomé
2014/228 ( PDF )
Cryptanalysis of SP Networks with Partial Non-Linear Layers
Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban
2014/224 ( PDF )
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
Henry Carter and Charles Lever and Patrick Traynor
2014/221 ( PDF )
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
Toomas Krips and Jan Willemson
2014/220 ( PDF )
Total Break of Zorro using Linear and Differential Attacks
Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
2014/216 ( PDF )
Implementation and Improvement of the Partial Sum Attack on 6-round AES
Francesco Aldŕ and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala
2014/213 ( PDF )
Secret-Sharing for NP
Ilan Komargodski and Moni Naor and Eylon Yogev
2014/203 ( PDF )
Privacy-Preserving Implicit Authentication
Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti
2014/202 ( PDF )
Efficiently Verifiable Computation on Encrypted Data
Dario Fiore and Rosario Gennaro and Valerio Pastro
2014/193 ( PDF )
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri
2014/185 ( PDF )
Oblivious Data Structures
Xiao Shaun Wang and Kartik Nayak and Chang Liu and T-H. Hubert Chan and Elaine Shi and Emil Stefanov and Yan Huang
2014/156 ( PDF )
Non-Malleable Extractors with Shorter Seeds and Their Applications
Yanqing Yao and Zhoujun Li
2014/147 ( PDF )
The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
Razvan Barbulescu and Cécile Pierrot
2014/141 ( -- withdrawn -- )
Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps
Hao Wang
2014/134 ( PDF )
Kummer strikes back: new DH speed records
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe
2014/130 ( PDF )
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig
2014/124 ( PDF )
On the Information Ratio of Non-Perfect Secret Sharing Schemes
Oriol Farrŕs and Torben Hansen and Tarik Kaced and Carles Padró
2014/114 ( PDF )
Prover Anonymous and Deniable Distance-Bounding Authentication
Sebastien Gambs and Cristina Onete and Jean-Marc Robert
2014/102 ( PDF )
Actively Secure Private Function Evaluation
Payman Mohassel and Saeed Sadeghian and Nigel P. Smart
2014/097 ( PDF )
A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups
Koji Nuida
2014/091 ( PDF )
On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
2014/087 ( PDF )
AnoA: A Framework For Analyzing Anonymous Communication Protocols
Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi
2014/084 ( PDF )
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
2014/071 ( PDF )
Implementing Pairing-Based Cryptosystems in USB Tokens
Zhaohui Cheng
2014/067 ( PDF )
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey
2014/065 ( PDF )
Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case
Palash Sarkar and Shashank Singh
2014/059 ( PDF )
Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
John Tromp
2014/057 ( PDF )
Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma
Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
2014/056 ( PDF )
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang
2014/051 ( PDF )
An Equivalence-Preserving Transformation of Shift Registers
Elena Dubrova
2014/041 ( PDF )
Cryptanalysis via algebraic spans
Adi Ben-Zvi and Arkadius Kalka and Boaz Tsaban
2014/037 ( PDF )
On the Security of the Pre-Shared Key Ciphersuites of TLS
Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk
2014/028 ( PDF )
Channel Equalization for Side Channel Attacks
Colin O'Flynn and Zhizhang (David) Chen
2014/020 ( PDF )
(De-)Constructing TLS
Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi
2014/014 ( PDF )
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther and Bertram Poettering
2014/011 ( PDF )
Construction of New Families of ‎MDS‎ Diffusion Layers
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
2013/880 ( PDF )
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
Seunghwan Park and Kwangsu Lee and Dong Hoon Lee
2013/879 ( PDF )
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
2013/876 ( PDF )
Public-Key Encryption with Lazy Parties
Kenji Yasunaga
2013/874 ( PDF )
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga
2013/872 ( -- withdrawn -- )
2013/871 ( PDF )
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities
Weiqiang Wen and Libin Wang and Jiaxin Pan
2013/862 ( PDF )
How to Delegate Computations: The Power of No-Signaling Proofs
Yael Tauman Kalai and Ran Raz and Ron D. Rothblum
2013/852 ( PDF )
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang
2013/830 ( PDF )
Property Preserving Symmetric Encryption Revisited
Sanjit Chatterjee and M. Prem Laxman Das
2013/820 ( -- withdrawn -- )
On the Security of Recently Proposed RFID Protocols
Mete Akgün, M. Ufuk Çaǧlayan
2013/808 ( PDF )
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing
2013/796 ( PDF )
Proofs of Space
Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak
2013/744 ( PDF )
Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results
Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai
2013/729 ( PDF )
Functional Encryption for Randomized Functionalities
Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai
2013/715 ( PDF )
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
Erik-Oliver Blass and Travis Mayberry and Guevara Noubir
2013/704 ( PDF )
Adaptive Witness Encryption and Asymmetric Password-based Cryptography
Mihir Bellare and Viet Tung Hoang
2013/703 ( PDF )
Limits of Extractability Assumptions with Distributional Auxiliary Input
Elette Boyle and Rafael Pass
2013/677 ( PDF )
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
2013/645 ( PDF )
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin Küpçü and Öznur Özkasap
2013/625 ( PDF )
PillarBox: Combating next-generation malware with fast forward-secure logging
Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos
2013/593 ( PDF )
Efficient One-Sided Adaptively Secure Computation
Carmit Hazay and Arpita Patra
2013/559 ( PDF )
A Definitional Framework for Functional Encryption
Christian Matt and Ueli Maurer
2013/554 ( PDF )
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
Pablo Rauzy and Sylvain Guilley and Zakaria Najm
2013/536 ( PDF )
A Three-Level Sieve Algorithm for the Shortest Vector Problem
Feng Zhang and Yanbin Pan and Gengran Hu
2013/525 ( PDF )
Catena : A Memory-Consuming Password-Scrambling Framework
Christian Forler and Stefan Lucks and Jakob Wenzel
2013/503 ( PDF )
On secret sharing with nonlinear product reconstruction
Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing
2013/487 ( PDF )
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition
Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
2013/424 ( PDF )
Instantiating Random Oracles via UCEs
Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
2013/398 ( PDF )
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Colin Boyd and Cas Cremers and Michčle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila
2013/394 ( PDF )
A Public Key Cryptoscheme Using Bit-pair Shadows
Shenghui Su and Shuwang Lv and Maozhi Xu
2013/366 ( PDF )
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin
2013/333 ( PDF )
Double-authentication-preventing signatures
Bertram Poettering and Douglas Stebila
2013/327 ( PDF )
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
Shenghui Su and Tao Xie and Shuwang Lv
2013/303 ( PDF )
Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
Shivam Bhasin and Claude Carlet and Sylvain Guilley
2013/300 ( PDF )
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
Allison Lewko and Sarah Meiklejohn
2013/297 ( PDF )
Improvement and Efficient Implementation of a Lattice-based Signature Scheme
Rachid El~Bansarkhani and Johannes Buchmann
2013/292 ( PDF )
A Leakage Resilient MAC
Daniel P. Martin and Elisabeth Oswald and Martijn Stam and Marcin Wojcik
2013/282 ( PDF )
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Goutam Paul and Anupam Chattopadhyay
2013/269 ( PDF )
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Jonathan Trostle
2013/260 ( PDF )
From Weak to Strong Zero-Knowledge and Applications
Kai-Min Chung and Edward Lui and Rafael Pass
2013/246 ( PDF )
A Lever Function to a New Codomain with Adequate Indeterminacy
Shenghui Su and Maozhi Xu and Shuwang Lv
2013/242 ( PDF )
AE5 Security Notions: Definitions Implicit in the CAESAR Call
Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton
2013/228 ( PDF )
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park
2013/183 ( PDF )
Practical Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2013/133 ( PDF )
New Lattice Based Signature Using The Jordan Normal Form
Hemlata Nagesh and Birendra Kumar Sharma
2013/127 ( PDF )
Oblivious PAKE: Efficient Handling of Password Trials
Franziskus Kiefer and Mark Manulis
2013/119 ( PDF )
Speeding up Ate Pairing Computation in Affine Coordinates
Duc-Phong Le and Chik How Tan
2013/108 ( PDF )
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
Ivan Damgard and Alessandra Scafuro
2013/094 ( PDF )
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
2013/082 ( PDF )
Secret Sharing, Rank Inequalities and Information Inequalities
Sebastia Martin and Carles Padro and An Yang
2013/079 ( PDF )
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
2013/007 ( PDF )
A Matrix Approach for Constructing Quadratic APN Functions
Yuyin Yu and Mingsheng Wang and Yongqiang Li
2012/729 ( PDF )
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
Nir Bitansky and Omer Paneth
2012/722 ( PDF )
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
2012/693 ( PDF )
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters
2012/692 ( PDF )
Generic Constructions of Integrated PKE and PEKS
Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin
2012/650 ( PDF )
Formal analysis of privacy in Direct Anonymous Attestation schemes
Ben Smyth and Mark D. Ryan and Liqun Chen
2012/618 ( -- withdrawn -- )
An ultra-lightweight ID-based pairwise key establishment scheme aiming at full collusion resistance
Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez-Perez, Jaime Gutierrez, Santos Merino del Pozo
2012/616 ( PDF )
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
Nishanth Chandran and Sanjam Garg
2012/604 ( PDF )
Leakage-Resilient Cryptography from Minimal Assumptions
Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs
2012/516 ( PDF )
Garbling XOR Gates ``For Free'' in the Standard Model
Benny Applebaum
2012/511 ( PDF )
Entangled Encodings and Data Entanglement
Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi
2012/499 ( -- withdrawn -- )
Authenticity, Integrity and Proof of Existence for Long-Term Archiving: a Survey
Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann
2012/460 ( PDF )
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
Yohei Watanabe and Takenobu Seito and Junji Shikata
2012/439 ( PDF )
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
2012/425 ( PDF )
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
Gautham Sekar
2012/379 ( PDF )
All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments
Eiichiro Fujisaki
2012/304 ( PDF )
Actively Secure Two-Party Evaluation of any Quantum Operation
Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail
2012/278 ( PS PS.GZ PDF )
Improved Indifferentiability Security Bound for the JH Mode
Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
2012/164 ( PDF )
On Secure Two-party Integer Division
Morten Dahl, Chao Ning, Tomas Toft
2012/134 ( PDF )
A Digital Signature Scheme for Long-Term Security
Dimitrios Poulakis and Robert Rolland
2012/116 ( PDF )
Clash Attacks on the Verifiability of E-Voting Systems
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2012/099 ( PDF )
Homomorphic Evaluation of the AES Circuit
Craig Gentry and Shai Halevi and Nigel P. Smart
2012/045 ( PDF )
Signature Schemes Secure against Hard-to-Invert Leakage
Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel
2011/626 ( PDF )
Algebraic Complexity Reduction and Cryptanalysis of GOST
Nicolas T. Courtois
2011/517 ( PDF )
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2011/446 ( -- withdrawn -- )
Privacy-Preserving Friend Search over Online Social Networks
Huang Lin and Yuguang Fang and Zhenfu Cao
2011/445 ( -- withdrawn -- )
Privacy-Preserving Friend Search over Online Social Networks
Huang Lin and Sherman S. M. Chow and Dongsheng Xing and Yuguang Fang and Zhenfu Cao
2011/396 ( PDF )
Fair Computation with Rational Players
Amos Beimel and Adam Groce and Jonathan Katz and Ilan Orlov
2011/379 ( -- withdrawn -- )
Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Miaomiao Tian and Wei Yang and Liusheng Huang
2010/487 ( PDF )
Constant Round Non-Malleable Protocols using One Way Functions
Vipul Goyal
2010/397 ( PDF )
Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
Mihir Bellare and David Cash
2010/374 ( PDF )
Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees
Zhen Liu and Zhenfu Cao and Duncan S. Wong
2010/284 ( PDF )
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
2010/266 ( PDF )
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
Chao Ning and Qiuliang Xu
2010/236 ( PDF )
Accountability: Definition and Relationship to Verifiability
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2010/212 ( PDF )
Quantum Proofs of Knowledge
Dominique Unruh
2010/199 ( PDF )
A Framework for Fully-Simulatable $t$-out-of-$n$ Oblivious Transfer
Bing Zeng and Christophe Tartary and Chingfang Hsu and Xueming Tang
2010/120 ( PDF )
Universal One-Way Hash Functions and Average Case Complexity via Inaccessible Entropy
Iftach Haitner and Thomas Holenstein and Omer Reingold and Salil Vadhan and Hoeteck Wee
2010/111 ( PDF )
On zero practical significance of “"Key recovery attack on full GOST block cipher with zero time and memory”"
Vladimir Rudskoy
2009/411 ( PDF )
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
2009/358 ( PDF )
MAC Precomputation with Applications to Secure Memory
Juan A. Garay and Vladimir Kolesnikov and Rae McLellan
2009/214 ( PDF )
An Optimally Fair Coin Toss
Tal Moran and Moni Naor and Gil Segev
2007/109 ( PDF )
How to Enrich the Message Space of a Cipher
Thomas Ristenpart and Phillip Rogaway
2006/420 ( PDF )
The REESSE1+ Public Key Cryptosystem v 2.21
Shenghui Su and Shuwang Lv
2006/384 ( PDF )
Design and Analysis of a Hash Ring-iterative Structure
Shenghui Su, Yixian Yang, Bo Yang, and Shaolan Zhang


[ Cryptology ePrint archive ]