Cryptology ePrint Archive: Recent Updates
-
2015/1018 ( PDF )
- A Riddle Wrapped in an Enigma
- N. Koblitz and A. Menezes
-
2015/1017 ( PDF )
- Functional Encryption: Decentralised and Delegatable
- Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
-
2015/1016 ( PDF )
- Lifting the Security of NI-MAC Beyond Birthday Bound
- Avijit Dutta and Goutam Paul
-
2015/1015 ( PDF )
- On Bitcoin as a public randomness source
- Joseph Bonneau and Jeremy Clark and Steven Goldfeder
-
2015/1014 ( PDF )
- Fast Fourier Orthogonalization
- Léo Ducas and Thomas Prest
-
2015/1013 ( PDF )
- Inception Makes Non-malleable Codes Stronger
- Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
-
2015/1012 ( PDF )
- An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
- Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
-
2015/1011 ( PDF )
- Hierarchical Functional Encryption
- Zvika Brakerski and Gil Segev
-
2015/1010 ( PDF )
- TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
- Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
-
2015/1009 ( PDF )
- Applications of Key Recovery Cube-attack-like
- Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
-
2015/1008 ( PDF )
- Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
- Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
-
2015/1007 ( PDF )
- How to Vote Privately Using Bitcoin
- Zhichao Zhao and T-H. Hubert Chan
-
2015/1006 ( PDF )
- Confidential Benchmarking based on Multiparty Computation
- Ivan Damgĺrd and Kasper Damgĺrd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
-
2015/1005 ( PDF )
- Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
- Wenbin Zhang and Chik How Tan
-
2015/1004 ( PDF )
- Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
- Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
-
2015/1003 ( PDF )
- Results on polynomial interpolation with mixed modular operations and unknown moduli
- Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
-
2015/1002 ( PDF )
- got HW crypto? On the (in)security of a Self-Encrypting Drive series
- Gunnar Alendal and Christian Kison and modg
-
2015/1001 ( PDF )
- Dismantling real-world ECC with Horizontal and Vertical Template Attacks
- Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
-
2015/1000 ( PDF )
- Factoring as a Service
- Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
-
2015/999 ( PDF )
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
- Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves
-
2015/998 ( PDF )
- All or Nothing at All
- Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
-
2015/997 ( PDF )
- Incremental Program Obfuscation
- Sanjam Garg and Omkant Pandey
-
2015/996 ( PDF )
- Multi-user Schnorr security, revisited
- Daniel J. Bernstein
-
2015/995 ( PDF )
- Updates on Sorting of Fully Homomorphic Encrypted Data
- Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed
-
2015/994 ( -- withdrawn -- )
- An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
- Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
-
2015/993 ( PDF )
- Bi-Deniable Inner Product Encryption from LWE
- Daniel Apon and Xiong Fan and Feng-Hao Liu
-
2015/992 ( PDF )
- Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
- Jinsu Kim and Sungwook Kim and Jae Hong Seo
-
2015/991 ( PDF )
- Ed3363 (HighFive) -- An alternative Elliptic Curve
- Mike Scott
-
2015/990 ( PDF )
- Encryption Switching Protocols
- Geoffroy Couteau, Thomas Peters, David Pointcheval
-
2015/989 ( PDF )
- Fast Oblivious AES\\A dedicated application of the MiniMac protocol
- Ivan Damgĺrd and Rasmus Winther Zakarias
-
2015/988 ( PDF )
- Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
- Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram
-
2015/987 ( PDF )
- Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
- Yehuda Lindell and Ben Riva
-
2015/986 ( PDF )
- Bit Coincidence Mining Algorithm
- Koh-ichi Nagao
-
2015/985 ( PDF )
- Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system
- Koh-ichi Nagao
-
2015/984 ( PDF )
- Complexity of ECDLP under the First Fall Degree Assumption
- Koh-ichi Nagao
-
2015/983 ( PDF )
- Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
- Ping Ngai Chung and Craig Costello and Benjamin Smith
-
2015/982 ( PDF )
- A note on constructions of bent functions from involutions
- Sihem Mesnager
-
2015/981 ( PDF )
- Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
- Ayantika Chatterjee and Indranil Sengupta
-
2015/980 ( PDF )
- Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
- Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
-
2015/979 ( PDF )
- Guidelines for Using the CryptDB System Securely
- Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
-
2015/978 ( PDF )
- The OPTLS Protocol and TLS 1.3
- Hugo Krawczyk and Hoeteck Wee
-
2015/977 ( PDF )
- Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(pł)
- Michał Wroński
-
2015/976 ( PDF )
- On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure
- Alex Biryukov and Léo Perrin
-
2015/975 ( PDF )
- Extended Functionality in Verifiable Searchable Encryption
- James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick
-
2015/974 ( PDF )
- The Conjoined Microprocessor
- Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and Rémi Géraud David Naccache and Jean Vuillemin
-
2015/973 ( PDF )
- Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
- Ashwin Jha and Mridul Nandi
-
2015/972 ( PDF )
- Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash
- David Pointcheval and Olivier Sanders and Jacques Traoré
-
2015/971 ( PDF )
- Attacks on Search RLWE
- Hao Chen, Kristin Lauter, and Katherine E. Stange
-
2015/970 ( PDF )
- Multilinear Maps over the Integers Using Modulus Switching
- Gu Chunsheng
-
2015/969 ( PDF )
- Zero-Knowledge Interactive Proof Systems for New Lattice Problems
- Claude Crepéau and Raza Ali Kazmi
-
2015/968 ( PDF )
- Differential and Linear Cryptanalysis of ARX with Partitioning -- Application to FEAL and Chaskey
- Gaëtan Leurent
-
2015/967 ( PDF )
- Freestart collision on full SHA-1
- Marc Stevens and Pierre Karpman and Thomas Peyrin
-
2015/966 ( PDF )
- Vulnerabilities of ``McEliece in the World of Escher"
- Dustin Moody and Ray Perlner
-
2015/965 ( PDF )
- Private Genome Analysis through Homomorphic Encryption
- Miran Kim and Kristin Lauter
-
2015/964 ( PDF )
- Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
- Danping Shi and Lei Hu and Siwei Sun and Ling Song
-
2015/963 ( PDF )
- When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device
- Houda Ferradi and Rémi Géraud and David Naccache and Assia Tria
-
2015/962 ( PDF )
- SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS
- Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
-
2015/961 ( PDF )
- Short Structure-Preserving Signatures
- Essam Ghadafi
-
2015/960 ( PDF )
- More Efficient Secure Outsourcing Methods for Bilinear Maps
- Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol
-
2015/959 ( PDF )
- Cryptanalysis of the Round-Reduced Kupyna Hash Function
- Jian Zou, Le Dong
-
2015/958 ( PDF )
- One-key Double-Sum MAC with Beyond-Birthday Security
- Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
-
2015/957 ( PDF )
- Delegating RAM Computations
- Yael Tauman Kalai and Omer Paneth
-
2015/956 ( PDF )
- Analysis of the Kupyna-256 Hash Function
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/955 ( PDF )
- On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
- Mridul Nandi and Tapas Pandit
-
2015/954 ( PDF )
- Online-Offline Homomorphic Signatures for Polynomial Functions
- Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
-
2015/953 ( PDF )
- Gaussian Sampling Precision and Information Leakage in Lattice Cryptography
- Markku-Juhani O. Saarinen
-
2015/952 ( PDF )
- Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
- Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento
-
2015/951 ( PDF )
- Nearly Optimal Robust Secret Sharing
- Mahdi Cheraghchi
-
2015/950 ( PDF )
- A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
- Shota Goto and Junji Shikata
-
2015/949 ( PDF )
- Private Processing of Outsourced Network Functions: Feasibility and Constructions
- Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali Kaafar
-
2015/948 ( PDF )
- A Provably Secure Short Signature Scheme from Coding Theory
- Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
-
2015/947 ( PDF )
- Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
- Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
-
2015/946 ( PDF )
- Asymmetric proof-of-work based on the Generalized Birthday problem
- Alex Biryukov and Dmitry Khovratovich
-
2015/945 ( PDF )
- Secure Set-based Policy Checking and Its Application to Password Registration
- Changyu Dong and Franziskus Kiefer
-
2015/944 ( PDF )
- New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields
- Palash Sarkar and Shashank Singh
-
2015/943 ( PDF )
- Sandy2x: New Curve25519 Speed Records
- Tung Chou
-
2015/942 ( PDF )
- Secrecy and independence for election schemes
- Ben Smyth
-
2015/941 ( PDF )
- Cryptanalysis of the New Multilinear Map over the Integers
- Brice Minaud and Pierre-Alain Fouque
-
2015/940 ( PDF )
- Secure Association for the Internet of Things
- Almog Benin and Sivan Toledo and Eran Tromer
-
2015/939 ( PDF )
- A Decade of Lattice Cryptography
- Chris Peikert
-
2015/938 ( PDF )
- Lattice Based Cryptography for Beginners
- Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim
-
2015/937 ( PDF )
- End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol
- Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung
-
2015/936 ( -- withdrawn -- )
- A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System
- Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin
-
2015/935 ( PDF )
- Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
- Céline Blondeau and Kaisa Nyberg
-
2015/934 ( PDF )
- Cryptanalysis of the New CLT Multilinear Maps
- Jung Hee Cheon and Changmin Lee and Hansol Ryu
-
2015/933 ( PDF )
- Cryptanalysis of Provably Secure Certicateless Short Signature Scheme
- Jayaprakash Kar
-
2015/932 ( PDF )
- Using Tweaks To Design Fault Resistant Ciphers
- Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay
-
2015/931 ( PDF )
- Fast and Secure Three-party Computation: The Garbled Circuit Approach
- Payman Mohassel and Mike Rosulek and Ye Zhang
-
2015/930 ( PDF )
- Nearly Sparse Linear Algebra
- Antoine Joux and Cécile Pierrot
-
2015/929 ( PDF )
- Are you The One to Share? Secret Transfer with Access Structure
- Yongjun Zhao and Sherman S.M. Chow
-
2015/928 ( PDF )
- HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
- Hassan Noura and Damien Couroussé
-
2015/927 ( PDF )
- Rich Queries on Encrypted Data: Beyond Exact Matches
- Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner
-
2015/926 ( PDF )
- CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC
- Vadim N.Tsypyschev and Julia S.Vinogradova
-
2015/925 ( PDF )
- Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
- Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
-
2015/924 ( PDF )
- Masking Large Keys in Hardware: A Masked Implementation of McEliece
- Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt
-
2015/923 ( PDF )
- DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING
- Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay
-
2015/922 ( PDF )
- Localised Multisecret Sharing
- Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
-
2015/921 ( PDF )
- Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
- Kwangsu Lee and Jong Hwan Park
-
2015/920 ( PDF )
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
- Giuseppe Ateniese and Antonio Faonio and Seny Kamara
-
2015/919 ( PDF )
- PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
- Hung Dang and Tien Tuan Anh Dinh and Ee-Chien Chang and Beng Chin Ooi and Prateek Saxena and Shruti Tople
-
2015/918 ( PDF )
- Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
- Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk
-
2015/917 ( PDF )
- Private Proximity Testing on Steroids: An NTRU-based Protocol
- Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche
-
2015/916 ( PDF )
- Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis
- Subhabrata Samajder and Palash Sarkar
-
2015/915 ( PDF )
- A Generic Construction for Verifiable Attribute-based Keyword Search Schemes
- Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
-
2015/914 ( PDF )
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
- Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
-
2015/913 ( PDF )
- Functional Signcryption: Notion, Construction, and Applications
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2015/912 ( PDF )
- Extraction of intrinsic structure for Hardware Trojan detection
- Maxime Lecomte and Jacques Fournier and Philippe Maurine
-
2015/911 ( PDF )
- Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis
- Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin
-
2015/910 ( PDF )
- QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
- Alonso González and Alejandro Hevia and Carla Rŕfols
-
2015/909 ( PDF )
- On the Impact of Known-Key Attacks on Hash Functions
- Bart Mennink, Bart Preneel
-
2015/908 ( PDF )
- Linear Distinguishers in the Key-less Setting: Application to PRESENT
- Martin M. Lauridsen and Christian Rechberger
-
2015/907 ( PDF )
- Cryptographic Assumptions: A Position Paper
- Shafi Goldwasser and Yael Tauman Kalai
-
2015/906 ( PDF )
- RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors
- Adnan Baysal and Suhap Sahin
-
2015/905 ( PDF )
- Mapping the Intel Last-Level Cache
- Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser
-
2015/904 ( PDF )
- Almost-tight Identity Based Encryption against Selective Opening Attack
- Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen
-
2015/903 ( PDF )
- A Note on the Indifferentiability of the 10-Round Feistel Construction
- Yannick Seurin
-
2015/902 ( PDF )
- Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques
- Kexin Qiao and Lei Hu and Siwei Sun
-
2015/901 ( PDF )
- A Unified Approach to MPC with Preprocessing using OT
- Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl
-
2015/900 ( PDF )
- New Results on Identity-based Encryption from Quadratic Residuosity
- Ferucio Laurentiu Tiplea and Emil Simion
-
2015/899 ( PDF )
- Privacy-preserving Attribute Based Searchable Encryption
- Payal Chaudhari and Maniklal Das
-
2015/898 ( PDF )
- Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
- Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2015/897 ( PDF )
- Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography
- Prosanta Gope
-
2015/896 ( PDF )
- Improved Attacks on Reduced-Round Camellia-128/192/256
- Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang
-
2015/895 ( PDF )
- Rogue Decryption Failures: Reconciling AE Robustness Notions
- Guy Barwell and Dan Page and Martijn Stam
-
2015/894 ( PDF )
- Comparison of cube attacks over different vector spaces
- Richard Winter and Ana Salagean and Raphael C.-W. Phan
-
2015/893 ( PDF )
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography
- Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
-
2015/892 ( PDF )
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee
-
2015/891 ( PDF )
- Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy
- Sébastien Canard and Viet Cuong Trinh
-
2015/890 ( PDF )
- MI-T-HFE, a New Multivariate Signature Scheme
- Wenbin Zhang and Chik How Tan
-
2015/889 ( PDF )
- Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
- Anamaria Costache and Nigel P. Smart
-
2015/888 ( PDF )
- Tweak-Length Extension for Tweakable Blockciphers
- Kazuhiko Minematsu and Tetsu Iwata
-
2015/887 ( PDF )
- Round-Optimal Token-Based Secure Computation
- Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
-
2015/886 ( PDF )
- Applying Cryptographic Acceleration Techniques to Error Correction
- Rémi Géraud and Diana-Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion
-
2015/885 ( PDF )
- A New Standard of Ukraine: The Kupyna Hash Function
- Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov
-
2015/884 ( PDF )
- General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2015/883 ( -- withdrawn -- )
- Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security
- Avijit Dutta and Goutam Paul
-
2015/882 ( PDF )
- Using Modular Extension to Provably Protect ECC Against Fault Attacks
- Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm
-
2015/881 ( PDF )
- Generic Security of NMAC and HMAC with Input Whitening
- Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
-
2015/880 ( PDF )
- Generic Efficient Dynamic Proofs of Retrievability
- Mohammad Etemad and Alptekin Küpçü
-
2015/879 ( PDF )
- Computing information on domain parameters from public keys selected uniformly at random
- Martin Ekerĺ
-
2015/878 ( PDF )
- Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model
- Edward Eaton and Fang Song
-
2015/877 ( PDF )
- Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
- Christophe Clavier and Julien Francq and Antoine Wurcker
-
2015/876 ( PDF )
- 10-Round Feistel is Indifferentiable from an Ideal Cipher
- Dana Dachman-Soled and Jonathan Katz and Aishwarya Thiruvengadam
-
2015/875 ( PDF )
- Bent and Semi-bent Functions via Linear Translators
- Neşe Koçak, Sihem Mesnager and Ferruh Özbudak
-
2015/874 ( PDF )
- Feistel Networks: Indifferentiability at 10 Rounds
- Yuanxi Dai and John Steinberger
-
2015/873 ( PDF )
- On the Diffusion Property of Iterated Functions
- Jian Liu, Sihem Mesnager, and Lusheng Chen
-
2015/872 ( PDF )
- Traceability Improvements of a New RFID Protocol Based On EPC C1G2
- Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
-
2015/871 ( PDF )
- A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family
- Shahin Tajik and Enrico Dietz and Sven Frohmann and Helmar Dittrich and Dmitry Nedospasov and Clemens Helfmeier and Jean-Pierre Seifert and Christian Boit and Heinz-Wilhelm Hübers
-
2015/870 ( PDF )
- Gambling, Computational Information and Encryption Security
- Mohammad Hajiabadi and Bruce M. Kapron
-
2015/869 ( PDF )
- New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
- Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs
-
2015/868 ( PDF )
- Optimally Secure Block Ciphers from Ideal Primitives
- Stefano Tessaro
-
2015/867 ( PDF )
- Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
- Michel Abdalla and Fabrice Benhamouda and Alain Passelčgue
-
2015/866 ( PDF )
- Graded Encoding, Variations on a Scheme
- Shai Halevi
-
2015/865 ( PDF )
- Card-based Cryptographic Protocols Using a Minimal Number of Cards
- Alexander Koch and Stefan Walzer and Kevin Härtel
-
2015/864 ( PDF )
- Encryption Performance Improvements of the Paillier Cryptosystem
- Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets
-
2015/863 ( PDF )
- Is There an Oblivious RAM Lower Bound?
- Elette Boyle and Moni Naor
-
2015/862 ( PDF )
- Idealizing Identity-Based Encryption
- Dennis Hofheinz and Christian Matt and Ueli Maurer
-
2015/861 ( PDF )
- A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
- Chun Guo and Dongdai Lin
-
2015/860 ( PDF )
- Selective Opening Security for Receivers
- Carmit Hazay and Arpita Patra and Bogdan Warinschi
-
2015/859 ( PDF )
- Factor Base Discrete Logarithms in Kummer Extensions
- Dianyan Xiao and Jincheng Zhuang and Qi Cheng
-
2015/858 ( PDF )
- Group Signatures Without q-Assumptions
- Olivier Blazy and Saqib A. Kakvi
-
2015/857 ( PDF )
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
- Benjamin Fuller and Ariel Hamlin
-
2015/856 ( PDF )
- MGR HASH FUNCTION
- Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass
-
2015/855 ( -- withdrawn -- )
- A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks
- GANESH YELLAPU
-
2015/854 ( PDF )
- Secure Sketch Metamorphosis: Tight Unified Bounds
- Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu
-
2015/853 ( PDF )
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Felix Heuer and Eike Kiltz and Krzysztof Pietrzak
-
2015/852 ( PDF )
- Analysis of a key exchange protocol based on tropical matrix algebra
- Matvei Kotov and Alexander Ushakov
-
2015/851 ( PDF )
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
- Benoît Cogliati and Yannick Seurin
-
2015/850 ( PDF )
- Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable
- Zhen Liu and Duncan S. Wong
-
2015/849 ( PDF )
- Regulating the Pace of von Neumann Correctors
- Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, and Amaury de Wargny
-
2015/848 ( PDF )
- The Multiplicative Complexity of Boolean Functions on Four and Five Variables
- Meltem Sonmez Turan and Rene Peralta
-
2015/847 ( PDF )
- Exploring Energy Efficiency of Lightweight Block Ciphers
- Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni
-
2015/846 ( PDF )
- Characterization of Secure Multiparty Computation Without Broadcast
- Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem
-
2015/845 ( PDF )
- Cryptanalysis of the Quadratic Zero-Testing of GGH
- Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrčde Lepoint and Amit Sahai and Mehdi Tibouchi
-
2015/844 ( PDF )
- DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
- Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
-
2015/843 ( PDF )
- Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
- David Derler and Daniel Slamanig
-
2015/842 ( PDF )
- On Linkability and Malleability in Self-blindable Credentials
- Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers
-
2015/841 ( PDF )
- An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices
- Vanga Odelu and Ashok Kumar Das and Adrijit Goswami
-
2015/840 ( PDF )
- Related-key Impossible Differential Analysis of Full Khudra
- Qianqian Yang and Lei Hu and Siwei Sun and Ling Song
-
2015/839 ( PDF )
- Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?
- David Wong
-
2015/838 ( PDF )
- Offline Witness Encryption
- Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
-
2015/837 ( PDF )
- Multi-Variate High-Order Attacks of Shuffled Tables Recomputation
- Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA
-
2015/836 ( PDF )
- Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
- Benjamin Wesolowski and Pascal Junod
-
2015/835 ( PDF )
- On near prime-order elliptic curves with small embedding degrees
- Duc-Phong Le and Nadia El Mrabet and Chik How Tan
-
2015/834 ( PDF )
- Authentication Using Side-Channel Information
- Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata
-
2015/833 ( PDF )
- Efficient Key Authentication Service for Secure End-to-end Communications
- Mohammad Etemad and Alptekin Küpçü
-
2015/832 ( PDF )
- Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
- David McCann, Kerstin Eder, Elisabeth Oswald
-
2015/831 ( PDF )
- M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors
- Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk
-
2015/830 ( PDF )
- Unique Signature with Short Output from CDH Assumption
- Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
-
2015/829 ( PDF )
- Reducing Multilinear Map Levels in Constrained PRFs and ABE
- Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy
-
2015/828 ( PDF )
- State-recovery analysis of Spritz
- Ralph Ankele and Stefan Koelbl and Christian Rechberger
-
2015/827 ( PDF )
- Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
- Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee
-
2015/826 ( PDF )
- Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys
- Dario Catalano and Dario Fiore and Luca Nizzardo
-
2015/825 ( PDF )
- The Emperor's New Password Creation Policies
- Ding Wang and Ping Wang
-
2015/824 ( PDF )
- Efficient Fully Structure-Preserving Signatures for Large Messages
- Jens Groth
-
2015/823 ( PDF )
- Efficient (ideal) lattice sieving using cross-polytope LSH
- Anja Becker and Thijs Laarhoven
-
2015/822 ( PDF )
- Efficiently Obfuscating Re-Encryption Program under DDH Assumption
- Akshayaram Srinivasan and C. Pandu Rangan
-
2015/821 ( PDF )
- A general framework for building noise-free homomorphic cryptosystems
- Gérald Gavin
-
2015/820 ( PDF )
- Extended Nested Dual System Groups, Revisited
- Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang
-
2015/819 ( PDF )
- Improving the Big Mac Attack on Elliptic Curve Cryptography
- Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache
-
2015/818 ( PDF )
- cuHE: A Homomorphic Encryption Accelerator Library
- Wei Dai and Berk Sunar
-
2015/817 ( PDF )
- Secure Multi-party Graph Computation
- Varsha Bhat and Harsimran Singh and S.R.S. Iyengar
-
2015/816 ( PDF )
- Analysis of Keyless Massive MIMO-based Cryptosystem Security
- Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev
-
2015/815 ( PDF )
- On the Power of Hierarchical Identity-Based Encryption
- Mohammad Mahmoody and Ameer Mohammed
-
2015/814 ( PDF )
- CLKS: Certificateless Keyword Search on Encrypted Data
- Qingji Zheng and Xiangxue Li and Aytac Azgin
-
2015/813 ( PDF )
- Revisiting Turning Online Cipher Off
- Ritam Bhaumik and Mridul Nandi
-
2015/812 ( PDF )
- The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob
- Alex Biryukov and Léo Perrin and Aleksei Udovenko
-
2015/811 ( PDF )
- Key-recovery attacks against the MAC algorithm Chaskey
- Chrysanthi Mavromati
-
2015/810 ( PDF )
- Improved OR Composition of Sigma-Protocols
- Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
-
2015/809 ( PDF )
- New Techniques for Electronic Voting
- Alan Szepieniec and Bart Preneel
-
2015/808 ( PDF )
- Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
- Mihir Bellare and Joseph Jaeger and Daniel Kane
-
2015/807 ( PDF )
- Fair Distributed Computation of Reactive Functions
- Juan Garay and Björn Tackmann and Vassilis Zikas
-
2015/806 ( PDF )
- Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
- Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
-
2015/805 ( PDF )
- A classification of elliptic curves with respect to the GHS attack in odd characteristic
- Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
-
2015/804 ( PDF )
- SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
- Sumit Chakraborty
-
2015/803 ( PDF )
- Statistical and Algebraic Properties of DES
- Stian Fauskanger and Igor Semaev
-
2015/802 ( PDF )
- Ciphertext-only attack on d*d Hill in O(d13^d)
- Shahram Khazaei and Siavash Ahmadi
-
2015/801 ( PDF )
- Scalar Blinding on Elliptic Curves based on Primes with Special Structure
- Scott Fluhrer
-
2015/800 ( PDF )
- Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography
- Jihoon Cho, Kyu Young Choi, and Dukjae Moon
-
2015/799 ( PDF )
- Secure Binary Field Multiplication
- Hwajeong Seo and Chien-Ning Chen and Zhe Liu and Yasuyuki Nogami and Taehwan Park and Jongseok Choi and Howon Kim
-
2015/798 ( PDF )
- A Stateless Cryptographically-Secure Physical Unclonable Function
- Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
-
2015/797 ( PDF )
- What Security can we Achieve in 4-Rounds?
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2015/796 ( PDF )
- Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
- Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi
-
2015/795 ( PDF )
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
- Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman
-
2015/794 ( PDF )
- Safe-Errors on SPA Protected implementations with the Atomicity Technique
- Pierre-Alain Fouque and Sylvain Guilley and Cédric Murdica and David Naccache
-
2015/793 ( PDF )
- Algorithmic Information Theory for Obfuscation Security
- Rabih Mohsen and Alexandre Miranda Pinto
-
2015/792 ( PDF )
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Dennis Hofheinz and Vanishree Rao and Daniel Wichs
-
2015/791 ( PDF )
- On the Equivalence of Obfuscation and Multilinear Maps
- Omer Paneth and Amit Sahai
-
2015/790 ( PDF )
- On weak and strong 2^k-bent Boolean functions
- Pantelimon Stanica
-
2015/789 ( PDF )
- Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator
- Gangqiang Yang and Mark D. Aagaard and Guang Gong
-
2015/788 ( PDF )
- Cracking-Resistant Password Vaults using Natural Language Encoders
- Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart
-
2015/787 ( PDF )
- Backtracking-Assisted Multiplication
- Houda Ferradi and Rémi Géraud and Diana Maimut and David Naccache and Hang Zhou
-
2015/786 ( PDF )
- Buying AES Design Resistance with Speed and Energy
- Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto
-
2015/785 ( PDF )
- Double-Speed Barrett Moduli
- Rémi Géraud and Diana Maimut and David Naccache
-
2015/784 ( PDF )
- Threshold FlipThem: When the winner does not need to take all
- David Leslie and Chris Sherfield and Nigel P. Smart
-
2015/783 ( PDF )
- Cryptanalysis of the Authenticated Encryption Algorithm COFFE
- Ivan Tjuawinata and Tao Huang and Hongjun Wu
-
2015/782 ( PDF )
- Secure two-party computation in applied pi-calculus: models and verification
- Sergiu Bursuc
-
2015/781 ( PDF )
- Twisted Hessian curves
- Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange
-
2015/780 ( PDF )
- Multilinear Maps from Obfuscation
- Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson
-
2015/779 ( PDF )
- A Simple Scheme, for Strengthening Product-sum Type PKC
- Masao KASAHARA
-
2015/778 ( PDF )
- Modular Inversion Hidden Number Problem -- Correction and Improvements
- Santanu Sarkar
-
2015/777 ( PDF )
- Arithmetic Walsh Transform of Boolean Functions with Linear Structures
- Qinglan Zhao and Dong Zheng and Xiangxue Li and Xiaoli Dong
-
2015/776 ( PDF )
- Functional Encryption for Turing Machines
- Prabhanjan Ananth and Amit Sahai
-
2015/775 ( PDF )
- Efficient MDS Diffusion Layers Through Decomposition of Matrices
- S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo
-
2015/774 ( PDF )
- Revisiting Prime Power RSA
- Santanu Sarkar
-
2015/773 ( PDF )
- Distinguishing a truncated random permutation from a random function
- Shoni Gilboa and Shay Gueron
-
2015/772 ( PDF )
- Non-Malleable Encryption: Simpler, Shorter, Stronger
- Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
-
2015/771 ( PDF )
- A SAT-based Public Key Cryptography Scheme
- Sebastian E. Schmittner
-
2015/770 ( PDF )
- A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
- Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
-
2015/769 ( PDF )
- On the Hardness of Learning with Rounding over Small Modulus
- Andrej Bogdanov and Siyao Guo and Daniel Masny and Silas Richelson and Alon Rosen
-
2015/768 ( PDF )
- Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
- Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar
-
2015/767 ( PDF )
- Dual EC: A Standardized Back Door
- Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen
-
2015/766 ( PDF )
- Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
- Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng
-
2015/765 ( PDF )
- Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
- Victoria Fehr and Marc Fischlin
-
2015/764 ( PDF )
- On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2})
- Jincheng Zhuang and Qi Cheng
-
2015/763 ( PDF )
- Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design
- Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and Takafumi Aoki
-
2015/762 ( PDF )
- A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
- Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef
-
2015/761 ( PDF )
- Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
- William Diehl
-
2015/760 ( PDF )
- Investigating SRAM PUFs in large CPUs and GPUs
- Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen
-
2015/759 ( PDF )
- Cryptanalysis of Gu's ideal multilinear map
- Alice Pellet-Mary and Damien Stehle
-
2015/758 ( PDF )
- Ring-LWE Cryptography for the Number Theorist
- Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
-
2015/757 ( PDF )
- Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks
- Matthias Hamann and Matthias Krause
-
2015/756 ( PDF )
- Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
- Yandong Zheng, Hua Guo
-
2015/755 ( PDF )
- TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
- Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen
-
2015/754 ( PDF )
- Related-Key Attack on Full-Round PICARO
- Anne Canteaut and Virginie Lallemand and María Naya-Plasencia
-
2015/753 ( PDF )
- Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
- Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen
-
2015/752 ( PDF )
- On Constructing One-Way Permutations from Indistinguishability Obfuscation
- Gilad Asharov and Gil Segev
-
2015/751 ( PDF )
- Fast Garbling of Circuits Under Standard Assumptions
- Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas
-
2015/750 ( PDF )
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Ryo Nishimaki and Daniel Wichs and Mark Zhandry
-
2015/749 ( PDF )
- Affine Equivalence and its Application to Tightening Threshold Implementations
- Pascal Sasdrich and Amir Moradi and Tim Güneysu
-
2015/748 ( PDF )
- A More Cautious Approach to Security Against Mass Surveillance
- Jean Paul Degabriele and Pooya Farshim and Bertram Poettering
-
2015/747 ( PDF )
- Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation
- Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du
-
2015/746 ( PDF )
- A 2^{70} Attack on the Full MISTY1
- Achiya Bar-On
-
2015/745 ( PDF )
- Faster ECC over F_{2^571} (feat. PMULL)
- Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
-
2015/744 ( PDF )
- BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
- Ege Gulcan and Aydin Aysu and Patrick Schaumont
-
2015/743 ( PDF )
- Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
- Benoit Libert and Thomas Peters and Moti Yung
-
2015/742 ( PDF )
- A Matrix Decomposition Method for Optimal Normal Basis Multiplication
- Can Kızılkale and Ömer Eǧecioǧlu and Çetin Kaya Koç
-
2015/741 ( PDF )
- On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
- Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
-
2015/740 ( PDF )
- Predictable Arguments of Knowledge
- Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
-
2015/739 ( PDF )
- Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation
- Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang
-
2015/738 ( PDF )
- Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO)
- Kazuhiko Minematsu
-
2015/737 ( PDF )
- New multilinear maps from ideal lattices
- Gu Chunsheng
-
2015/736 ( -- withdrawn -- )
- Solving LWE via List Decoding
- Mingqiang Wang and Xiaoyun Wang and Kunxian Xia and Jincheng Zhuang
-
2015/735 ( PDF )
- Cutting-Edge Cryptography Through the Lens of Secret Sharing
- Ilan Komargodski and Mark Zhandry
-
2015/734 ( PDF )
- On the Security of Extended Generalized Feistel Networks
- Manoj Kumar and Saibal K. Pal and Anupama Panigrahi
-
2015/733 ( PDF )
- Fully Homomorphic Encryption on Octonion Ring
- Masahiro Yagisawa
-
2015/732 ( PDF )
- Compact Implementations of LEA Block Cipher for Low-End Microprocessors
- Hwajeong Seo and Zhe Liu and Jongseok Choi and Taehwan Park and and Howon Kim
-
2015/731 ( PDF )
- Same Value Analysis on Edwards Curves
- Rodrigo Abarzúa and Santi Martínez and Valeria Mendoza
-
2015/730 ( PDF )
- Indistinguishability Obfuscation from Functional Encryption for Simple Functions, And a New Bootstrapping Theorem for iO
- Prabhanjan Ananth and Abhishek Jain and Amit Sahai
-
2015/729 ( PDF )
- Towards Provably-Secure Remote Memory Attestation
- Alexandra Boldyreva and Taesoo Kim and Richard Lipton and Bogdan Warinschi
-
2015/728 ( PDF )
- Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
- Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas
-
2015/727 ( PDF )
- DPA, Bitslicing and Masking at 1 GHz
- Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede
-
2015/726 ( PDF )
- Compositions of linear functions and applications to hashing
- Vladimir Shpilrain and Bianca Sosnovski
-
2015/725 ( PDF )
- The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable
- Eric Verheul and Sietse Ringers and Jaap-Henk Hoepman
-
2015/724 ( PDF )
- A masked ring-LWE implementation
- Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede
-
2015/723 ( PDF )
- Cryptanalysis of Feistel Networks with Secret Round Functions
- Alex Biryukov and Gaëtan Leurent and Léo Perrin
-
2015/722 ( PDF )
- Oblivious Substring Search with Updates
- Tarik Moataz and Erik-Oliver Blass
-
2015/721 ( PDF )
- KDM-Security via Homomorphic Smooth Projective Hashing
- Hoeteck Wee
-
2015/720 ( PDF )
- Output-Compressing Randomized Encodings and Applications
- Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang
-
2015/719 ( PDF )
- Consolidating masking schemes
- Oscar Reparaz and Begül Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede
-
2015/718 ( PDF )
- Efficient Asynchronous Accumulators for Distributed PKI
- Leonid Reyzin and Sophia Yakoubov
-
2015/717 ( PDF )
- Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
- Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
-
2015/716 ( PDF )
- Linear Cryptanalysis of Reduced-Round SIMECK Variants
- Nasour Bagheri
-
2015/715 ( PDF )
- New Circular Security Counterexamples from Decision Linear and Learning with Errors
- Allison Bishop and Susan Hohenberger and Brent Waters
-
2015/714 ( PDF )
- New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
- Masao KASAHARA
-
2015/713 ( PDF )
- Light-hHB: A New Version of hHB with Improved Session Key Exchange
- Ka Ahmad Khoureich
-
2015/712 ( PDF )
- On Limitations of the Fiat–Shamir Transformation
- David Bernhard and Bogdan Warinschi
-
2015/711 ( PDF )
- Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)
- Anne Canteaut and Sébastien Duval and Gaëtan Leurent
-
2015/710 ( PDF )
- Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
- Bernardo Ferreira and João Rodrigues and João Leitão and Henrique Domingos
-
2015/709 ( PDF )
- Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
- Luka Malisa and Kari Kostiainen and Srdjan Capkun
-
2015/708 ( PDF )
- Choosing Parameters for NTRUEncrypt
- Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang
-
2015/707 ( PDF )
- Reconciling User Privacy and Implicit Authentication for Mobile Devices
- Siamak F. Shahandashti and Reihaneh Safavi-Naini and Nashad Ahmed Safa
-
2015/706 ( PDF )
- A Brief Comparison of Simon and Simeck
- Stefan Kölbl and Arnab Roy
-
2015/705 ( PDF )
- Linear Overhead Robust MPC with Honest Majority Using Preprocessing
- Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
-
2015/704 ( PDF )
- Indistinguishability Obfuscation: from Approximate to Exact
- Nir Bitansky and Vinod Vaikuntanathan
-
2015/703 ( PDF )
- Point-Function Obfuscation: A Framework and Generic Constructions
- Mihir Bellare and Igors Stepanovs
-
2015/702 ( PDF )
- Demystifying incentives in the consensus computer
- Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena
-
2015/701 ( PDF )
- Differential Privacy in distribution and instance-based noise mechanisms
- Sébastien Canard and Baptiste Olivier
-
2015/700 ( PDF )
- Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
- Jimmy Jose and Dipanwita RoyChowdhury
-
2015/699 ( PDF )
- FURISC: FHE Encrypted URISC Design
- Ayantika Chatterjee and Indranil Sengupta
-
2015/698 ( PDF )
- Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa
- Subhamoy Maitra
-
2015/697 ( PDF )
- On the Security of a Self-healing Group Key Distribution Scheme
- Yandong Zheng, Hua Guo
-
2015/696 ( PDF )
- Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)
- Miguel Morales Sandoval and Arturo Diaz Perez
-
2015/695 ( PDF )
- Cliptography: Clipping the Power of Kleptographic Attacks
- Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou
-
2015/694 ( PDF )
- On the Complexity of Additively Homomorphic UC Commitments
- Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
-
2015/693 ( PDF )
- Foundations of Reactive Garbling Schemes
- Jesper Buus Nielsen and Samuel Ranellucci
-
2015/692 ( PDF )
- Fast and Secure Linear Regression and Biometric Authentication with Security Update
- Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
-
2015/691 ( PDF )
- SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs
- Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth
-
2015/690 ( PDF )
- Systematic Reverse Engineering of Cache Slice Selection in Intel Processors
- Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2015/689 ( PDF )
- Counting Keys in Parallel After a Side Channel Attack
- Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam
-
2015/688 ( PDF )
- Binary Field Multiplication on ARMv8
- Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim
-
2015/687 ( PDF )
- Classical Cryptographic Protocols in a Quantum World
- Sean Hallgren and Adam Smith and Fang Song
-
2015/686 ( PDF )
- Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
- Azeem Irshad and Muhammad Sher and Shahzad Ashraf and Shahzad faisal and Mahmood Ul Hassan
-
2015/685 ( PDF )
- On the discrete logarithm problem in finite fields of fixed characteristic
- Robert Granger and Thorsten Kleinjung and Jens Zumbrägel
-
2015/684 ( PDF )
- A One-time Stegosystem and Applications to Efficient Covert Communication
- Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha Shashidhar
-
2015/683 ( PDF )
- Security of Linear Secret-Sharing Schemes against Mass Surveillance
- Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci
-
2015/682 ( PDF )
- Integral Cryptanalysis on Full MISTY1
- Yosuke Todo
-
2015/681 ( PDF )
- ANONIZE: A Large-Scale Anonymous Survey System
- Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat
-
2015/680 ( PDF )
- Indifferentiability of Confusion-Diffusion Networks
- Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
-
2015/679 ( PDF )
- Another Look at Normal Approximations in Cryptanalysis
- Subhabrata Samajder and Palash Sarkar
-
2015/678 ( PDF )
- Optimizing MAKWA on GPU and CPU
- Thomas Pornin
-
2015/677 ( PDF )
- EdDSA for more curves
- Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang
-
2015/676 ( PDF )
- Quantum Cryptanalysis of NTRU
- Scott Fluhrer
-
2015/675 ( PDF )
- Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
- Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou
-
2015/674 ( PDF )
- Preprocessing-Based Verification of Multiparty Protocols with Honest Majority
- Peeter Laud and Alisa Pankova
-
2015/673 ( PDF )
- Decaf: Eliminating cofactors through point compression
- Mike Hamburg
-
2015/672 ( PDF )
- Function-Hiding Inner Product Encryption
- Allison Bishop and Abhishek Jain and Lucas Kowalczyk
-
2015/671 ( PDF )
- Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data
- Peeter Laud and Alisa Pankova
-
2015/670 ( PDF )
- Smart Security Management in Secure Devices
- Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
-
2015/669 ( PDF )
- GMU Hardware API for Authenticated Ciphers
- Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj
-
2015/668 ( PDF )
- The Fallacy of Composition of Oblivious RAM and Searchable Encryption
- Muhammad Naveed
-
2015/667 ( PDF )
- De Bruijn Sequences from Nonlinear Feedback Shift Registers
- Ming Li and Dongdai Lin
-
2015/666 ( PDF )
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques
- Huaifeng Chen and Xiaoyun Wang
-
2015/665 ( PDF )
- Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption.
- Romain Gay and Iordanis Kerenidis and Hoeteck Wee
-
2015/664 ( PDF )
- Secure Multi-Party Shuffling
- Mahnush Movahedi and Jared Saia and Mahdi Zamani
-
2015/663 ( PDF )
- Analyzing the Efficiency of Biased-Fault Based Attacks
- Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
-
2015/662 ( PDF )
- Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves
- Ryutaroh Matsumoto
-
2015/661 ( PDF )
- Cryptanalysis of a modern rotor machine in a multicast setting
- Shane Kepley and David Russo and Rainer Steinwandt
-
2015/660 ( PDF )
- A Hybrid Gaussian Sampler for Lattices over Rings
- Léo Ducas and Thomas Prest
-
2015/659 ( PDF )
- Diversity and Transparency for ECC
- Jean-Pierre Flori and Jérôme Plűt and Jean-René Reinhard and Martin Ekerĺ
-
2015/658 ( PDF )
- Single-Cycle Implementations of Block Ciphers
- Pieter Maene and Ingrid Verbauwhede
-
2015/657 ( PDF )
- Randomizing the Montgomery Powering Ladder
- Duc-Phong Le, Chik How Tan and Michael Tunstall
-
2015/656 ( PDF )
- Cryptanalysis of a Markov Chain Based User Authentication Scheme
- Ruhul Amin and G.P. Biswas
-
2015/655 ( PDF )
- An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves
- Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
-
2015/654 ( PDF )
- DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
- Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng
-
2015/653 ( PDF )
- Homomorphic Signature Schemes - A survey
- Giulia Traverso and Denise Demirel and Johannes Buchmann
-
2015/652 ( PDF )
- Modelling ciphersuite and version negotiation in the TLS protocol
- Benjamin Dowling and Douglas Stebila
-
2015/651 ( PDF )
- Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption
- Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller
-
2015/650 ( PDF )
- A New Encryption Standard of Ukraine: The Kalyna Block Cipher
- Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov and Ruslan Mordvinov and Dmytro Kaidalov
-
2015/649 ( PDF )
- On the Hardness of Proving CCA-security of Signed ElGamal
- David Bernhard and Marc Fischlin and Bogdan Warinschi
-
2015/648 ( PDF )
- Adaptive Proofs of Knowledge in the Random Oracle Model
- David Bernhard and Marc Fischlin and Bogdan Warinschi
-
2015/647 ( PDF )
- Efficient ephemeral elliptic curve cryptographic keys
- Andrea Miele and Arjen K. Lenstra
-
2015/646 ( PDF )
- Decomposition attack on SASASASAS
- Alex Biryukov and Dmitry Khovratovich
-
2015/645 ( PDF )
- Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy
- Clémentine Gritti, Willy Susilo, Thomas Plantard and Rongmao Chen
-
2015/644 ( PDF )
- The Pythia PRF Service
- Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart
-
2015/643 ( PDF )
- Short Accountable Ring Signatures Based on DDH
- Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit
-
2015/642 ( PDF )
- A New Partial Key Exposure Attack on Multi-power RSA
- Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol
-
2015/641 ( PDF )
- Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings
- Jing Li, Licheng Wang
-
2015/640 ( PDF )
- Very-efficient simulatable flipping of many coins into a well
- Luís T. A. N. Brandăo
-
2015/639 ( PDF )
- Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings
- Hao Chen
-
2015/638 ( PDF )
- An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
- Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta
-
2015/637 ( PDF )
- A Novel Cyberspace-Oriented Access Control Model
- Fenghua Li and Yanchao Wang and Rongna Xie and Jinbo Xiong and Fangfang Shan
-
2015/636 ( PDF )
- Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes
- Matthias Krause
-
2015/635 ( PDF )
- Microcash: Efficient Off-Line Small Payments
- Chris Pavlovski and Colin Boyd
-
2015/634 ( PDF )
- Phasing: Private Set Intersection using Permutation-based Hashing
- Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner
-
2015/633 ( PDF )
- An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme
- Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
-
2015/632 ( PDF )
- More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models
- Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji
-
2015/631 ( PDF )
- Accelerating Homomorphic Evaluation on Reconfigurable Hardware
- Thomas Pöppelmann and Michael Naehrig and Andrew Putnam and Adrian Macias
-
2015/630 ( PDF )
- Unconditionally Secure Computation with Reduced Interaction
- Ivan Damgĺrd and Jesper Buus Nielsen
-
2015/629 ( PDF )
- BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme
- Véronique Cortier and Georg Fuchsbauer and David Galindo
-
2015/628 ( PDF )
- An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme
- Daniel Cabarcas and Denise Demirel and Florian Göpfert and Jean Lancrenon and Thomas Wunderer
-
2015/627 ( PDF )
- On Necessary Padding with IO
- Justin Holmgren
-
2015/626 ( PDF )
- Practical Round-Optimal Blind Signatures in the Standard Model
- Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
-
2015/625 ( PDF )
- Ed448-Goldilocks, a new elliptic curve
- Mike Hamburg
-
2015/624 ( PDF )
- Automated Analysis and Synthesis of Authenticated Encryption Schemes
- Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff
-
2015/623 ( PDF )
- Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
- Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand
-
2015/622 ( PDF )
- Random Digit Representation of Integers
- Nicolas Méloni and M. Anwar Hasan
-
2015/621 ( PDF )
- Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
- Sarani Bhattacharya, Debdeep Mukhopadhyay
-
2015/620 ( PDF )
- Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions
- Susumu Kiyoshima
-
2015/619 ( PDF )
- Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
- Seher Tutdere and Osmanbey Uzunkol
-
2015/618 ( PDF )
- An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
- Juan Carlos Ku-Cauich Guillermo Morales-Luna Horacio Tapia-Recillas
-
2015/617 ( PDF )
- Generalised tally-based decoders for traitor tracing and group testing
- Boris Skoric and Wouter de Groot
-
2015/616 ( PDF )
- The leaking battery: A privacy analysis of the HTML5 Battery Status API
- Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia Diaz
-
2015/615 ( PDF )
- Security Analysis of Niu et al. Authentication and Ownership Management Protocol
- Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati
-
2015/614 ( PDF )
- Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem
- Fangguo Zhang
-
2015/613 ( PDF )
- Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
- Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei
-
2015/612 ( PDF )
- The Simeck Family of Lightweight Block Ciphers
- Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong
-
2015/611 ( PDF )
- A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
- Shijun Zhao and Qianying Zhang
-
2015/610 ( PDF )
- McBits: fast constant-time code-based cryptography
- Daniel J. Bernstein and Tung Chou and Peter Schwabe
-
2015/609 ( PDF )
- Experimental Study of DIGIPASS GO3 and the Security of Authentication
- Igor Semaev
-
2015/608 ( -- withdrawn -- )
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- Benoit Libert and Damien Stehle
-
2015/607 ( PDF )
- Netcoin - A Traceable P2P Electronic Cash System
- Hitesh Tewari and Eamon O Nuallain
-
2015/606 ( PDF )
- Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
- Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon
-
2015/605 ( PDF )
- Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm
- Steven D. Galbraith and Ping Wang and Fangguo Zhang
-
2015/604 ( PDF )
- Structure-Preserving Signatures from Standard Assumptions, Revisited
- Eike Kiltz and Jiaxin Pan and Hoeteck Wee
-
2015/603 ( PDF )
- Complementary Dual Codes for Counter-measures to Side-Channel Attacks
- Claude Carlet and Sylvain Guilley
-
2015/602 ( PDF )
- Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
- Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhay
-
2015/601 ( PDF )
- A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation
- Mei Wang, Zheng Yuan,Xiao Feng
-
2015/600 ( PDF )
- Predictive Models for Min-Entropy Estimation
- John Kelsey and Kerry A. McKay and Meltem Sonmez Turan
-
2015/599 ( PDF )
- The Chain Rule for HILL Pseudoentropy, Revisited
- Krzysztof Pietrzak and Maciej Skorski
-
2015/598 ( PDF )
- Combining Differential Privacy and Secure Multiparty Computation
- Martin Pettai and Peeter Laud
-
2015/597 ( PDF )
- Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
- Amir Moradi and Alexander Wild
-
2015/596 ( PDF )
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations
- Jean-Sebastien Coron and Craig Gentry and Shai Halevi and Tancrede Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi
-
2015/595 ( -- withdrawn -- )
- Differential Fault Intensity Analysis
- Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa Taha and Patrick Schaumont
-
2015/594 ( PDF )
- Disk Encryption: Do We Need to Preserve Length?
- Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar
-
2015/593 ( PDF )
- A Physical Approach for Stochastic Modeling of TERO-based TRNG
- Patrick HADDAD and Viktor FISCHER and Florent BERNARD and Jean NICOLAI
-
2015/592 ( PDF )
- Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
- Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel
-
2015/591 ( PDF )
- How much randomness can be extracted from memoryless Shannon entropy sources?
- Maciej Skorski
-
2015/590 ( PDF )
- TriviA: A Fast and Secure Authenticated Encryption Scheme
- Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
-
2015/589 ( PDF )
- Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
- A.-M. Leventi-Peetz and J.-V. Peetz
-
2015/588 ( PDF )
- An analysis of the $C$ class of bent functions
- Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic
-
2015/587 ( PDF )
- AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
- Trupil Limbasiya and Nishant Doshi
-
2015/586 ( PDF )
- SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System
- Yuan Zhang and Chunxiang Xu and Shui Yu and Hongwei Li and Xiaojun Zhang
-
2015/585 ( PDF )
- SIMON and SPECK: Block Ciphers for the Internet of Things
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2015/584 ( PDF )
- How to Securely Prolong the Computational Bindingness of Pedersen Commitments
- Denise Demirel and Jean Lancrenon
-
2015/583 ( PDF )
- Secure Key Generation from Biased PUFs
- Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems
-
2015/582 ( PDF )
- How Secure and Quick is QUIC? Provable Security and Performance Analyses
- Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita-Rotaru
-
2015/581 ( PDF )
- Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation
- Christina Brzuska and Arno Mittelbach
-
2015/580 ( PDF )
- Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
- Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss
-
2015/579 ( PDF )
- A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
- Mridul Nandi
-
2015/578 ( PDF )
- Tampering with the Delivery of Blocks and Transactions in Bitcoin
- Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun
-
2015/577 ( PDF )
- Twist Insecurity
- Manfred Lochter, Andreas Wiemers
-
2015/576 ( PDF )
- The Carnac protocol -- or how to read the contents of a sealed envelope
- Michael Scott and Brian Spector
-
2015/575 ( PDF )
- Known-key Distinguisher on Full PRESENT
- Céline Blondeau and Thomas Peyrin and Lei Wang
-
2015/574 ( PDF )
- Fair and Robust Multi-Party Computation using a Global Transaction Ledger
- Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas
-
2015/573 ( PDF )
- Last fall degree, HFE, and Weil descent attacks on ECDLP
- Ming-Deh A. Huang and Michiel Kosters and Sze Ling Yeo
-
2015/572 ( PDF )
- On Public Key Encryption from Noisy Codewords
- Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi
-
2015/571 ( PDF )
- Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
- Tobias Schneider and Amir Moradi and Tim Güneysu
-
2015/570 ( PDF )
- Constant Communication ORAM with Small Blocksize
- Tarik Moataz and Travis Mayberry and Erik-Oliver Blass
-
2015/569 ( PDF )
- Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grřstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
- Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
-
2015/568 ( PDF )
- Cryptanalysis of Reduced-Round Whirlwind (Full Version)
- Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li
-
2015/567 ( PDF )
- Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
- Henri Gilbert and Jérôme Plűt and Joana Treger
-
2015/566 ( PDF )
- A Framework for Identity-Based Encryption with Almost Tight Security
- Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
-
2015/565 ( PDF )
- FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
- Craig Costello and Patrick Longa
-
2015/564 ( PDF )
- Sanctum: Minimal Hardware Extensions for Strong Software Isolation
- Victor Costan and Ilia Lebedev and Srinivas Devadas
-
2015/563 ( PDF )
- Privacy in the Genomic Era
- Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang
-
2015/562 ( PDF )
- PUDA – Privacy and Unforgeability for Data Aggregation
- Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek Önen and Refik Molva
-
2015/561 ( PDF )
- SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
- J. Longo and E. De Mulder and D. Page and M. Tunstall
-
2015/560 ( PDF )
- Generic Construction of UC-Secure Oblivious Transfer
- Olivier Blazy and Céline Chevalier
-
2015/559 ( PDF )
- Concurrent Secure Computation with Optimal Query Complexity
- Ran Canetti and Vipul Goyal and Abhishek Jain
-
2015/558 ( PDF )
- Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
- Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
-
2015/557 ( PDF )
- Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
- Takanori Isobe and Kyoji Shibutani
-
2015/556 ( PDF )
- Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates
- Sujoy Sinha Roy and Kimmo Järvinen and Ingrid Verbauwhede
-
2015/555 ( PDF )
- Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
- Tapas Pandit and Sumit Kumar Pandey and Rana Barua
-
2015/554 ( PDF )
- An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security
- Michel Abdalla and Fabrice Benhamouda and Alain Passelčgue
-
2015/553 ( PDF )
- Round-Optimal Black-Box Two-Party Computation
- Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro
-
2015/552 ( PDF )
- An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
- Paul Kirchner and Pierre-Alain Fouque
-
2015/551 ( PDF )
- Quantum homomorphic encryption for circuits of low $T$-gate complexity
- Anne Broadbent and Stacey Jeffery
-
2015/550 ( PDF )
- Upending Stock Market Structure Using Secure Multi-Party Computation
- Charanjit S. Jutla
-
2015/549 ( PDF )
- ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices
- Amir Hassani Karbasi, Reza Ebrahimi Atani
-
2015/548 ( PDF )
- Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
- Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
-
2015/547 ( PDF )
- Secure Computation of MIPS Machine Code
- Xiao Shaun Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz
-
2015/546 ( PDF )
- Actively Secure OT Extension with Optimal Overhead
- Marcel Keller and Emmanuela Orsini and Peter Scholl
-
2015/545 ( PDF )
- FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
- Qinglong Zhang and Zongbin Liu and and Cunqing Ma and Changting Li and Jiwu Jing
-
2015/544 ( PDF )
- Alternative cubics' rules with an algebraic appeal
- Daniel R. L. Brown
-
2015/543 ( PDF )
- Bloom Filters in Adversarial Environments
- Moni Naor and Eylon Yogev
-
2015/542 ( PDF )
- Improved Side-Channel Analysis of Finite-Field Multiplication
- Sonia Belaďd and Jean-Sébastien Coron and Pierre-Alain Fouque and Benoît Gérard and Jean-Gabriel Kammerer and Emmanuel Prouff
-
2015/541 ( PDF )
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
- Bart Mennink and Reza Reyhanitabar and Damian Vizár
-
2015/540 ( PDF )
- PICO: An Ultra lightweight and Low power encryption design for pervasive computing
- Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil
-
2015/539 ( PDF )
- Tweaking Even-Mansour Ciphers
- Benoît Cogliati and Rodolphe Lampe and Yannick Seurin
-
2015/538 ( PDF )
- Pairing Based Mutual Healing in Wireless Sensor Networks
- Sarita Agrawal and Jay Patel and Manik Lal Das
-
2015/537 ( PDF )
- Towards Easy Leakage Certification
- François Durvaux and François-Xavier Standaert
-
2015/536 ( PDF )
- From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
- François Durvaux and François-Xavier Standaert
-
2015/535 ( PDF )
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
- Vincent Grosso and François-Xavier Standaert
-
2015/534 ( PDF )
- Problems, solutions and experience of the first international student's Olympiad in cryptography
- Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia Tokareva and Valeria Vitkup
-
2015/533 ( PDF )
- Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
- Xiaoshuang Ma and Kexin Qiao
-
2015/531 ( PDF )
- Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
- Mohammad Hajiabadi, Bruce M. Kapron
-
2015/530 ( PDF )
- Practical Free-Start Collision Attacks on 76-step SHA-1
- Pierre Karpman and Thomas Peyrin and Marc Stevens
-
2015/529 ( PDF )
- Power Analysis Attacks against IEEE 802.15.4 Nodes
- Colin O'Flynn and Zhizhang Chen
-
2015/528 ( PDF )
- Spacecoin: A Cryptocurrency Based on Proofs of Space
- Sunoo Park and Krzysztof Pietrzak and Joël Alwen and Georg Fuchsbauer and Peter Gazi
-
2015/527 ( PDF )
- Robust Profiling for DPA-Style Attacks
- Carolyn Whitnall and Elisabeth Oswald
-
2015/526 ( PDF )
- Generic Key Recovery Attack on Feistel Scheme
- Takanori Isobe and Kyoji Shibutani
-
2015/525 ( PDF )
- Short Randomizable Signatures
- David Pointcheval and Olivier Sanders
-
2015/524 ( PDF )
- Secure Key Exchange Protocol based on Virtual Proof of Reality
- Yansong Gao
-
2015/523 ( PDF )
- Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
- Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai
-
2015/522 ( PDF )
- Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search
- Anja Becker, Nicolas Gama, Antoine Joux
-
2015/521 ( PDF )
- Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency
- Sergey Gorbunov and Silvio Micali
-
2015/520 ( PDF )
- A Constant Time, Single Round, Attribute-Based Authenticated Key Exchange in Random Oracle Model
- Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
-
2015/519 ( PDF )
- Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping
- Yongge Wang
-
2015/518 ( PDF )
- Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin
- Ren Zhang
-
2015/517 ( PDF )
- Subversion-Resilient Signature Schemes
- Giuseppe Ateniese and Bernardo Magri and Daniele Venturi
-
2015/516 ( PDF )
- Key-Recovery Attacks on ASASA
- Brice Minaud and Patrick Derbez and Pierre-Alain Fouque and Pierre Karpman
-
2015/515 ( PDF )
- Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
- Thomas Espitau and Pierre-Alain Fouque and Pierre Karpman
-
2015/514 ( PDF )
- Time-Lock Puzzles from Randomized Encodings
- Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters
-
2015/513 ( PDF )
- Computing Individual Discrete Logarithms Faster in $GF(p^n)$
- Aurore Guillevic
-
2015/512 ( PDF )
- Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply
- Sami Saab, Andrew Leiserson, and Michael Tunstall
-
2015/511 ( PDF )
- Near Collision Side Channel Attacks
- Baris Ege and Thomas Eisenbarth and Lejla Batina
-
2015/510 ( PDF )
- Equivoe-T: Transposition Equivocation Cryptography
- Gideon Samid
-
2015/509 ( PDF )
- A flaw in a theorem about Schnorr signatures
- Daniel R. L. Brown
-
2015/508 ( PDF )
- Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
- Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra
-
2015/507 ( PDF )
- Decomposing the ASASA Block Cipher Construction
- Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander
-
2015/506 ( PDF )
- Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
- Gilles Barthe and Sonia Belaďd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire
-
2015/505 ( PDF )
- The Tower Number Field Sieve
- Razvan Barbulescu and Pierrick Gaudry and Thorsten Kleinjung
-
2015/504 ( PDF )
- The Iterated Random Permutation Problem with Applications to Cascade Encryption
- Brice Minaud and Yannick Seurin
-
2015/503 ( PDF )
- The Norwegian Internet Voting Protocol: A new Instantiation
- Kristian Gjřsteen and Anders Smedstuen Lund
-
2015/502 ( PDF )
- Centrally Banked Cryptocurrencies
- George Danezis and Sarah Meiklejohn
-
2015/501 ( PDF )
- Multi-Prover Commitments Against Non-Signaling Attacks
- Serge Fehr and Max Fillinger
-
2015/500 ( PDF )
- Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure
- Alberto Battistello and Christophe Giraud
-
2015/499 ( PDF )
- Algebraic partitioning: Fully compact and (almost) tightly secure cryptography
- Dennis Hofheinz
-
2015/498 ( PDF )
- Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
- Jiajun Zhang and Haining Fan
-
2015/497 ( PDF )
- Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost
- Zhangxiang Hu and Payman Mohassel and Mike Rosulek
-
2015/496 ( PDF )
- Quantifying Location Privacy Leakage from Transaction Prices
- Arthur Gervais and Hubert Ritzdorf and Mario Lucic and Srdjan Capkun
-
2015/495 ( PDF )
- Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
- Sondre Rønjom
-
2015/494 ( -- withdrawn -- )
- Cryptanalysis of the LSH and SHA-V Hash Functions
- Yonglin Hao and Hongbo Yu
-
2015/493 ( PDF )
- Fault Tolerant Infective Countermeasure for AES
- Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay
-
2015/492 ( PDF )
- Masking vs. Multiparty Computation: How Large is the Gap for AES?
- Vincent Grosso and François-Xavier Standaert and Sebastian Faust
-
2015/491 ( PDF )
- Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
- Nishanth Chandran and Melissa Chase and Feng-Hao Liu and Ryo Nishimaki and Keita Xagawa
-
2015/490 ( PDF )
- Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement
- Sonam Devgan Kaul and Amit K. Awasthi
-
2015/489 ( PDF )
- Scalable and private media consumption with Popcorn
- Trinabh Gupta and Natacha Crooks and Srinath Setty and Lorenzo Alvisi and Michael Walfish
-
2015/488 ( PDF )
- On Black-Box Complexity of Universally Composable Security in the CRS model
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2015/487 ( PDF )
- Contention in Cryptoland: Obfuscation, Leakage and UCE
- Mihir Bellare, Igors Stepanovs and Stefano Tessaro
-
2015/486 ( PDF )
- How to detect unauthorised usage of a key
- Jiangshan Yu and Mark Ryan and Cas Cremers
-
2015/485 ( PDF )
- Turning Online Ciphers Off
- Elena Andreeva and Guy Barwell and Dan Page and Martijn Stam
-
2015/484 ( PDF )
- More Rounds, Less Security?
- Ritam Bhaumik and Avijit Dutta and Jian Guo and Jérémy Jean and Nicky Mouha and Ivica Nikolić
-
2015/483 ( PDF )
- Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
- Shi Bai and Adeline Langlois and Tancrède Lepoint and Damien Stehlé and Ron Steinfeld
-
2015/482 ( PDF )
- Time-release Protocol from Bitcoin and Witness Encryption for SAT
- Jia Liu and Flavio Garcia and Mark Ryan
-
2015/481 ( PDF )
- Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers
- Theodosis Mourouzis and Guangyan Song and Nicolas Courtois and Michalis Christofii
-
2015/480 ( PDF )
- Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
- Berry Schoenmakers, Meilof Veeningen, and Niels de Vreede
-
2015/479 ( PDF )
- A Provably Secure Group Signature Scheme from Code-Based Assumptions
- Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang
-
2015/478 ( PDF )
- How to Build Time-Lock Encryption
- Tibor Jager
-
2015/477 ( PDF )
- Authentication Key Recovery in Galois/Counter Mode (GCM)
- John Mattsson
-
2015/476 ( PDF )
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
- Bart Mennink
-
2015/475 ( PDF )
- Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences
- Eleonora Guerrini and Laurent Imbert and Théo Winterhalter
-
2015/474 ( PDF )
- Fully Homomorphic Encryption without bootstrapping
- Masahiro Yagisawa
-
2015/473 ( PDF )
- VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS
- Mehak Khurana and Meena Kumari
-
2015/472 ( PDF )
- High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer
- Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart
-
2015/471 ( PDF )
- A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs
- Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott
-
2015/470 ( PDF )
- On the power of Public-key Functional Encryption with Function Privacy
- Vincenzo Iovino and Karol Zebrowski
-
2015/469 ( PDF )
- Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
- Andrew Miller and Rob Jansen
-
2015/468 ( PDF )
- Practical Fully Homomorphic Encryption without Noise Reduction
- Dongxi Liu
-
2015/467 ( PDF )
- The Oblivious Machine - or: How to Put the C into MPC
- Marcel Keller
-
2015/466 ( PDF )
- Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
- Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang
-
2015/465 ( PDF )
- Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation
- Hwajeong Seo and Zhe Liu and Johann Groschadl and Howon Kim
-
2015/464 ( PDF )
- Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
- Florian Tschorsch and Björn Scheuermann
-
2015/463 ( PDF )
- Multilinear Maps Using Random Matrix
- Gu Chunsheng
-
2015/462 ( PDF )
- Accelerating SWHE based PIRs using GPUs
- Wei Dai, Yarkın Doröz and Berk Sunar
-
2015/461 ( PDF )
- Cryptanalysis of the multilinear map on the ideal lattices
- Jung Hee Cheon and Changmin Lee
-
2015/460 ( PDF )
- Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
- Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi
-
2015/459 ( PDF )
- New Observation on Division Property
- Bing Sun and Xin Hai and Wenyu Zhang and Lei Cheng and Zhichao Yang
-
2015/458 ( PDF )
- A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS
- Sheena Sathyan and Shaji R S Professor
-
2015/457 ( PDF )
- Generic Conversions from CPA to CCA secure Functional Encryption
- Mridul Nandi and Tapas Pandit
-
2015/456 ( PDF )
- Collateral damage of Facebook Apps: an enhanced privacy scoring model
- Iraklis Symeonids, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel
-
2015/455 ( PDF )
- Secure Deduplication of Encrypted Data without Additional Independent Servers
- Jian Liu and N.Asokan and Benny Pinkas
-
2015/454 ( PDF )
- A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO
- Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
-
2015/453 ( PDF )
- An Optimization of Gu Map-1
- Yupu Hu and Huiwen Jia
-
2015/452 ( PDF )
- Masks will Fall Off -- Higher-Order Optimal Distinguishers
- Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul
-
2015/451 ( PDF )
- On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees
- Sihong Su and Xiaohu Tang
-
2015/450 ( PDF )
- Adaptively Secure Computation with Partial Erasures
- Carmit Hazay and Yehuda Lindell and Arpita Patra
-
2015/449 ( PDF )
- On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions
- Ruoxin Zhao and Rui Zhang and Yongqiang Li and Baofeng Wu
-
2015/448 ( PDF )
- A Comment on Gu Map-1
- Yupu Hu and Huiwen Jia
-
2015/447 ( PDF )
- A New Model for Error-Tolerant Side-Channel Cube Attacks
- Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede
-
2015/446 ( PDF )
- On the Amortized Complexity of Zero-knowledge Protocols
- Ronald Cramer and Ivan Damgĺrd and Marcel Keller
-
2015/445 ( PDF )
- XLS is not a Strong Pseudorandom Permutation
- Mridul Nandi
-
2015/444 ( PDF )
- Revisiting Security Claims of XLS and COPA
- Mridul Nandi
-
2015/443 ( PDF )
- Security Evaluation and Enhancement of Bistable Ring PUFs
- Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, and Wayne Burleson
-
2015/442 ( PDF )
- Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks
- Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
-
2015/441 ( PDF )
- FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
- Devu Manikantan Shila and Vivek Venugopalan and Cameron D Patterson
-
2015/440 ( PDF )
- Message-Locked Encryption for Lock-Dependent Messages
- Martín Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev
-
2015/439 ( PDF )
- On Concurrently Secure Computation in the Multiple Ideal Query Model
- Vipul Goyal and Abhishek Jain
-
2015/438 ( PDF )
- A Hybrid Approach for Proving Noninterference of Java Programs
- Ralf Kuesters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr
-
2015/437 ( PDF )
- A Note on the Unsoundness of vnTinyRAM's SNARK
- Bryan Parno
-
2015/436 ( PDF )
- On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks
- Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
-
2015/435 ( PDF )
- On the (Fast) Algebraic Immunity of Boolean Power Functions
- Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang
-
2015/434 ( PDF )
- Dickson Polynomials that are Involutions
- Pascale Charpin and Sihem Mesnager and Sumanta Sarkar
-
2015/433 ( PDF )
- A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
- Wentao Zhang and. Zhenzhen Bao and. Vincent Rijmen and. Meicheng Liu
-
2015/432 ( -- withdrawn -- )
- Non-Repudiable Proofs of Storage in Cloud
- Hongyuan Wang and Liehuang Zhu and Yijia Lilong and Chang Xu
-
2015/431 ( PDF )
- Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
- Nuttapong Attrapadung and Goichiro Hanaoka and Shota Yamada
-
2015/430 ( PDF )
- Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
- Alex Biryukov and Daniel Dinu and Dmitry Khovratovich
-
2015/429 ( PDF )
- Cryptanalysis of Round-Reduced LED
- Ivica Nikolić and Lei Wang and Shuang Wu
-
2015/428 ( PDF )
- Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
- Philipp Jovanovic and Samuel Neves
-
2015/427 ( PDF )
- A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement
- Mudit Bhargava and Ken Mai
-
2015/426 ( PDF )
- Complementing Feistel Ciphers
- Alex Biryukov and Ivica Nikolic
-
2015/425 ( PDF )
- Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
- Stefan Heyse and Ingo von Maurich and Tim Güneysu
-
2015/424 ( PDF )
- FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
- Begül Bilgin and Andrey Bogdanov and Miroslav Knežević and Florian Mendel and Qingju Wang
-
2015/423 ( PDF )
- On the Implementation of Unified Arithmetic on Binary Huff Curves
- Santosh Ghosh, Amit Kumar, Amitabh Das and Ingrid Verbauwhede
-
2015/422 ( PDF )
- Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
- Marina Blanton and Fattaneh Bayatbabolghani
-
2015/421 ( PDF )
- VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism
- Zhe Liu and Husen Wang and Johann Großschädl and Zhi Hu and Ingrid Verbauwhede
-
2015/420 ( PDF )
- What Information is Leaked under Concurrent Composition?
- Vipul Goyal and Divya Gupta and Abhishek Jain
-
2015/419 ( PDF )
- Non-invasive Spoofing Attacks for Anti-lock Braking Systems
- Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava
-
2015/418 ( PDF )
- Optimized Interpolation Attacks on LowMC
- Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang
-
2015/417 ( PDF )
- Order-Revealing Encryption and the Hardness of Private Learning
- Mark Bun and Mark Zhandry
-
2015/416 ( PDF )
- HETest: A Homomorphic Encryption Testing Framework
- Mayank Varia and Sophia Yakoubov and Yang Yang
-
2015/415 ( PDF )
- STRIBOB / WHIRLBOB Security Analysis Addendum
- Markku-Juhani O. Saarinen
-
2015/414 ( PDF )
- On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
- Mridul Nandi
-
2015/413 ( PDF )
- A study of Pair Encodings: Predicate Encryption in prime order groups
- Shashank Agrawal and Melissa Chase
-
2015/412 ( PDF )
- Survey on Cryptographic Obfuscation
- Máté Horváth
-
2015/411 ( PDF )
- Side-Channel Analysis of MAC-Keccak Hardware Implementations
- Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser
-
2015/410 ( PDF )
- Efficient Ring-LWE Encryption on 8-bit AVR Processors
- Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Großschädl and Howon Kim and Ingrid Verbauwhede
-
2015/409 ( PDF )
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Jie Chen and Romain Gay and Hoeteck Wee
-
2015/408 ( PDF )
- Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
- Franck Rondepierre
-
2015/407 ( PDF )
- Higher-order cryptanalysis of LowMC
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/406 ( PDF )
- Computation-Trace Indistinguishability Obfuscation and its Applications
- Yu-Chi Chen and Sherman S. M. Chow and Kai-Min Chung and Russell W. F. Lai and Wei-Kai Lin and Hong-Sheng Zhou
-
2015/405 ( PDF )
- Feasibility and Infeasibility of Secure Computation with Malicious PUFs
- Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schröder
-
2015/404 ( PDF )
- Zero-Knowledge Accumulators and Set Operations
- Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos
-
2015/403 ( PDF )
- Sequential Secret Sharing as a New Hierarchical Access Structure
- Mehrdad Nojoumian and Douglas R. Stinson
-
2015/402 ( PDF )
- Success through confidence: Evaluating the effectiveness of a side-channel attack
- Adrian Thillard and Emmanuel Prouff and Thomas Roche
-
2015/401 ( PDF )
- Simple Chosen-Ciphertext Security from Low-Noise LPN
- Eike Kiltz and Daniel Masny and Krzysztof Pietrzak
-
2015/400 ( PDF )
- Expiration and Revocation of Keys for Attribute-based Signatures (Full Version)
- Stephen R. Tate and Roopa Vishwanathan
-
2015/399 ( PDF )
- New attacks on RSA with Moduli $N=p^rq$
- Abderrahmane Nitaj and Tajjeeddine Rachidi
-
2015/398 ( PDF )
- Factoring RSA moduli with weak prime factors
- Abderrahmane Nitaj and Tajjeeddine Rachidi
-
2015/397 ( PDF )
- Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
- Peter Gazi and Jooyoung Lee and Yannick Seurin and John Steinberger and Stefano Tessaro
-
2015/396 ( PDF )
- Generalizing Homomorphic MACs for Arithmetic Circuits
- Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo
-
2015/395 ( PDF )
- Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys
- Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schröder and Mark Simkin
-
2015/394 ( PDF )
- Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
- Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann
-
2015/393 ( PDF )
- Biclique cryptanalysis of MIBS-80 and PRESENT-80
- Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba
-
2015/392 ( PDF )
- Forgery Attacks on round-reduced ICEPOLE-128
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/391 ( PDF )
- On the Communication Complexity of Secure Computation
- Deepesh Data and Manoj M. Prabhakaran and Vinod M. Prabhakaran
-
2015/390 ( PDF )
- Dual System Encryption Framework in Prime-Order Groups
- Nuttapong Attrapadung
-
2015/389 ( PDF )
- Keccak
- Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
-
2015/388 ( PDF )
- Succinct Garbled RAM
- Ran Canetti and Justin Holmgren
-
2015/387 ( PDF )
- Method to Protect Passwords in Databases for Web Applications
- Scott Contini
-
2015/386 ( PDF )
- Privately Evaluating Decision Trees and Random Forests
- David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter
-
2015/385 ( PDF )
- Feasibility and Completeness of Cryptographic Tasks in the Quantum World
- Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas
-
2015/384 ( PDF )
- Condensed Unpredictability
- Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak
-
2015/383 ( PDF )
- Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
- Rafael Pass and abhi shelat
-
2015/382 ( PDF )
- High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers
- Thomas Pöppelmann and Tobias Oder and Tim Güneysu
-
2015/381 ( PDF )
- Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
- Sumit Chakraborty
-
2015/380 ( PDF )
- Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
- Céline Blondeau and Aslí Bay and Serge Vaudenay
-
2015/379 ( PDF )
- MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
- Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
-
2015/378 ( PDF )
- PAC Learning of Arbiter PUFs
- Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
-
2015/377 ( PDF )
- Cluster Computing in Zero Knowledge
- Alessandro Chiesa and Eran Tromer and Madars Virza
-
2015/376 ( PDF )
- Cryptography from Post-Quantum Assumptions
- Raza Ali Kazmi
-
2015/375 ( PDF )
- Bounds on surmising remixed keys
- Daniel R. L. Brown
-
2015/374 ( PDF )
- On the Impossibility of Tight Cryptographic Reductions
- Christoph Bader and Tibor Jager and Yong Li and Sven Schäge
-
2015/373 ( PDF )
- Publicly Verifiable Software Watermarking
- Aloni Cohen and Justin Holmgren and Vinod Vaikuntanathan
-
2015/372 ( PDF )
- Security Analysis of PRINCE
- Jeremy Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu
-
2015/371 ( PDF )
- Constant-Round MPC with Fairness and Guarantee of Output Delivery
- S. Dov Gordon and Feng-Hao Liu and Elaine Shi
-
2015/370 ( PDF )
- Financial Cryptography: Discriminatory Pricing Mechanism
- Sumit Chakraborty
-
2015/369 ( PDF )
- On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
- Nir Bitansky and Omer Paneth
-
2015/368 ( PDF )
- Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library
- Evgeny Sidorov
-
2015/367 ( PDF )
- Improved Higher-Order Differential Attacks on MISTY1
- Achiya Bar-On
-
2015/366 ( PDF )
- A random zoo: sloth, unicorn, and trx
- Arjen K. Lenstra and Benjamin Wesolowski
-
2015/365 ( PDF )
- On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol
- Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
-
2015/364 ( PDF )
- Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions
- Qiang Tang and Jun Wang
-
2015/363 ( PDF )
- Optimally Secure Tweakable Blockciphers
- Bart Mennink
-
2015/362 ( PDF )
- Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem
- Claude Crepeau and Raza Ali Kazmi
-
2015/361 ( PDF )
- Computationally binding quantum commitments
- Dominique Unruh
-
2015/360 ( PDF )
- Achieving Differential Privacy with Bias-Control Limited Source
- Yanqing Yao, Zhoujun Li
-
2015/359 ( PDF )
- Higher-Order Side Channel Security and Mask Refreshing
- Jean-Sebastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
-
2015/358 ( PDF )
- On Generalized First Fall Degree Assumptions
- Yun-Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi
-
2015/357 ( PDF )
- A Group-theory Method to The Cycle Structures of Feedback Shift Registers
- Ming Li, Yupeng Jiang and Dongdai Lin
-
2015/356 ( PDF )
- Succinct Randomized Encodings and their Applications
- Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang
-
2015/355 ( PDF )
- Semantic Security and Indistinguishability in the Quantum World
- Tommaso Gagliardoni and Andreas Hülsing and Christian Schaffner
-
2015/354 ( PDF )
- SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node
- Jacek Samotyja and Kerstin Lemke-Rust and Markus Ullmann
-
2015/353 ( PDF )
- Matrix Computational Assumptions in Multilinear Groups
- Paz Morillo and Carla Ràfols and Jorge L. Villar
-
2015/352 ( PDF )
- Broadcast from Minicast Secure Against General Adversaries
- Pavel Raykov
-
2015/351 ( PDF )
- Database Outsourcing with Hierarchical Authenticated Data Structures
- Mohammad Etemad and Alptekin Küpçü
-
2015/350 ( PDF )
- Improving Local Collisions: New Attacks on Reduced SHA-256
- Florian Mendel and Tomislav Nad and Martin Schläffer
-
2015/349 ( PDF )
- Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
- Chang Liu and Liehuang Zhu and Jinjun Chen
-
2015/348 ( PDF )
- A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation
- Andreas Gornik and Amir Moradi and Jürgen Oehm and Christof Paar
-
2015/347 ( PDF )
- Fault Analysis of Kuznyechik
- Riham AlTawy and Onur Duman and Amr M. Youssef
-
2015/346 ( PDF )
- End-to-End Verifiable Elections in the Standard Model∗
- Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang
-
2015/345 ( PDF )
- Two Round Mutliparty Computation via Multi-Key FHE
- Pratyay Mukherjee and Daniel Wichs
-
2015/344 ( PDF )
- Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
- Ryo Nishimaki and Daniel Wichs
-
2015/343 ( PDF )
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Michael Düll and Björn Haase and Gesine Hinterwälder and Michael Hutter and Christof Paar and Ana Helena Sánchez and Peter Schwabe
-
2015/342 ( PDF )
- Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext
- Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo
-
2015/341 ( PDF )
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
- Gilad Asharov and Gil Segev
-
2015/340 ( PDF )
- A New Distinguisher on Grain v1 for 106 rounds
- Santanu Sarkar
-
2015/339 ( PDF )
- Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation
- Berry Schoenmakers and Meilof Veeningen
-
2015/338 ( PDF )
- Cryptanalysis of a fair anonymity for the tor network
- Amadou Moctar Kane
-
2015/337 ( PDF )
- Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
- Sujoy Sinha Roy and Kimmo Järvinen and Frederik Vercauteren and Vassil Dimitrov and Ingrid Verbauwhede
-
2015/336 ( PDF )
- Arithmetic Cryptography
- Benny Applebaum and Jonathan Avron and Christina Brzuska
-
2015/335 ( PDF )
- Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
- Janaka Alawatugoda and Douglas Stebila and Colin Boyd
-
2015/334 ( PDF )
- On the Correlation Intractability of Obfuscated Pseudorandom Functions
- Ran Canetti and Yilei Chen and Leonid Reyzin
-
2015/333 ( PDF )
- Nearly Optimal Verifiable Data Streaming (Full Version)
- Johannes Krupp and Dominique Schröder and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan Nuernberger
-
2015/332 ( PDF )
- Security Intelligence for Broadcast : Threat Analytics
- Sumit Chakraborty
-
2015/331 ( PDF )
- A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
- Megha Agrawal and Donghoon Chang and Somitra Sanadhya
-
2015/330 ( PDF )
- Sponge based CCA2 secure asymmetric encryption for arbitrary length message
- Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
-
2015/329 ( PDF )
- PAGES - A Family of Block Ciiphers
- Dieter Schmidt
-
2015/328 ( PDF )
- Strongly Secure Authenticated Key Exchange from Ideal Lattices
- Xiaopeng Yang and Wenping Ma
-
2015/327 ( PDF )
- Some results on Sprout
- Subhadeep Banik
-
2015/326 ( PDF )
- Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata
- Saeideh Kabirirad and Hamideh Hajiabadi
-
2015/325 ( PDF )
- Secure Multi-Party Computation with Identifiable Abort
- Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas
-
2015/324 ( PDF )
- A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys
- Divesh Aggarwal and Alexander Golovnev
-
2015/323 ( -- withdrawn -- )
- Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange
- Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan
-
2015/322 ( PDF )
- Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers
- Peeter Laud and Alisa Pankova
-
2015/321 ( -- withdrawn -- )
- Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles
- Paolo D'Arco and Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Clauido Soriente
-
2015/320 ( PDF )
- Hybrid Publicly Verifiable Computation
- James Alderman and Christian Janson and Carlos Cid and Jason Crampton
-
2015/319 ( PDF )
- Point Decomposition Problem in Binary Elliptic Curves
- Koray Karabina
-
2015/318 ( PDF )
- Practical Divisible E-Cash
- Patrick Märtens
-
2015/317 ( PDF )
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
- Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti
-
2015/316 ( PDF )
- Non-malleability under Selective Opening Attacks: Implication and Separation
- Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen
-
2015/315 ( PDF )
- Query-Complexity Amplification for Random Oracles
- Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
-
2015/314 ( PDF )
- Certificate-Based Encryption Resilient to Key Leakage
- Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and Xinyi Huang and Yang Xiang
-
2015/313 ( PDF )
- Recovering Short Generators of Principal Ideals in Cyclotomic Rings
- Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev
-
2015/312 ( PDF )
- Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks
- Pierre-Alain Fouque and Thomas Vannet
-
2015/311 ( PDF )
- Tagged One-Time Signatures: Tight Security and Optimal Tag Size
- Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo
-
2015/310 ( PDF )
- New algorithm for the discrete logarithm problem on elliptic curves
- Igor Semaev
-
2015/309 ( PDF )
- TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation
- Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti
-
2015/308 ( PDF )
- Authenticated Key Exchange over Bitcoin
- Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao
-
2015/307 ( PDF )
- Black-Box Garbled RAM
- Sanjam Garg and Steve Lu and Rafail Ostrovsky
-
2015/306 ( PDF )
- Analysis of VAES3 (FF2)
- Morris Dworkin and Ray Perlner
-
2015/305 ( PDF )
- Foundations of Reconfigurable PUFs (Full Version)
- Jonas Schneider and Dominique Schröder
-
2015/304 ( PDF )
- Communication-Optimal Proactive Secret Sharing for Dynamic Groups
- Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky
-
2015/303 ( PDF )
- The Design Space of Lightweight Cryptography
- Nicky Mouha
-
2015/302 ( PDF )
- Boosting OMD for Almost Free Authentication of Associated Data
- Reza Reyhanitabar and Serge Vaudenay and Damian Vizár
-
2015/301 ( PDF )
- Cryptanalysis of GGH Map
- Yupu Hu and Huiwen Jia
-
2015/300 ( PDF )
- Scalable Divisible E-cash
- Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
-
2015/299 ( PDF )
- A Note on the Lindell-Waisbard Private Web Search Scheme
- Zhengjun Cao and Lihua Liu
-
2015/298 ( PDF )
- Random Linear Code Based Public Key Encryption Scheme RLCE
- Yongge Wang
-
2015/297 ( PDF )
- Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
- Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao
-
2015/296 ( PDF )
- The Uniform Distribution of Sequences Generated by Iteration of Polynomials
- Emil Lerner
-
2015/295 ( PDF )
- Security Analysis of Re-Encryption RPC Mix Nets
- Ralf Kuesters and Tomasz Truderung
-
2015/294 ( PDF )
- Accelerating Somewhat Homomorphic Evaluation using FPGAs
- Erdinç Öztürk and Yarkın Doröz and Berk Sunar and Erkay Savaş
-
2015/293 ( PDF )
- Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2015/292 ( PDF )
- Secret Shared Random Access Machine
- Shlomi Dolev and Yin Li
-
2015/291 ( PDF )
- Two Operands of Multipliers in Side-Channel Attack
- Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki
-
2015/290 ( PDF )
- Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
- Joseph A. Akinyele and Christina Garman and Susan Hohenberger
-
2015/289 ( PDF )
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
- Muhammed F. Esgin and Orhun Kara
-
2015/288 ( PDF )
- Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms
- Aydin Aysu and Patrick Schaumont
-
2015/287 ( PDF )
- A quantum-safe circuit-extension handshake for Tor
- John Schanck and William Whyte and Zhenfei Zhang
-
2015/286 ( PDF )
- Impossible Differential Cryptanalysis of Reduced Round SIMON
- Zhan Chen and Ning Wang and Xiaoyun Wang
-
2015/285 ( PDF )
- Improved Linear Trails for the Block Cipher Simon
- Tomer Ashur
-
2015/284 ( PDF )
- A Note on Scalar Multiplication Using Division Polynomials
- Binglong~Chen, Chuangqiang~Hu and~Chang-An~Zhao
-
2015/283 ( PDF )
- Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data
- Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia
-
2015/282 ( PDF )
- Non-Interactive Secure Computation Based on Cut-and-Choose
- Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva
-
2015/281 ( PDF )
- Secret Sharing and Statistical Zero Knowledge
- Vinod Vaikuntanathan and Prashant Nalini Vasudevan
-
2015/280 ( PDF )
- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
- Jonathan Katz and Aishwarya Thiruvengadam and Hong-Sheng Zhou
-
2015/279 ( PDF )
- Improved Cryptanalysis of AES-like Permutations
- Jérémy Jean and Maria Naya-Plasencia and Thomas Peyrin
-
2015/278 ( PDF )
- Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
- Sébastien Canard and David Pointcheval and Olivier Sanders
-
2015/277 ( PDF )
- One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games
- Marco Tomamichel and Serge Fehr and Jędrzej Kaniewski and Stephanie Wehner
-
2015/276 ( PDF )
- An Improvment of the Elliptic Net Algorithm
- Binglong Chen and Chang-An Zhao
-
2015/275 ( PDF )
- MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems
- Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai
-
2015/274 ( PDF )
- Low Depth Circuits for Efficient Homomorphic Sorting
- Gizem S. Çetin and Yarkın Doröz and Berk Sunar and Erkay Savaş
-
2015/273 ( PDF )
- Dual System Encryption via Predicate Encodings
- Hoeteck Wee
-
2015/272 ( PDF )
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
- Baodong Qin and Shengli Liu
-
2015/271 ( PDF )
- Toward Secure Implementation of McEliece Decryption
- Mariya Georgieva and Frédéric de Portzamparc
-
2015/270 ( PDF )
- Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk
- Markus Dichtl
-
2015/269 ( PDF )
- Ideal Multilinear Maps Based on Ideal Lattices
- Gu Chunsheng
-
2015/268 ( PDF )
- Improved Top-Down Techniques in Differential Cryptanalysis
- Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir
-
2015/267 ( PDF )
- The Simplest Protocol for Oblivious Transfer
- Tung Chou and Claudio Orlandi
-
2015/266 ( PDF )
- GRECS: Graph Encryption for Approximate Shortest Distance Queries
- Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
-
2015/265 ( PDF )
- Password Hashing Competition - Survey and Benchmark
- George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas
-
2015/264 ( PDF )
- BlindBox: Deep Packet Inspection over Encrypted Traffic
- Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy
-
2015/263 ( PDF )
- Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
- Ethan Heilman. Alison Kendler, Aviv Zohar, Sharon Goldberg
-
2015/262 ( PDF )
- A look at the PGP ecosystem through the key server data
- Hanno Böck
-
2015/261 ( PDF )
- Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
-
2015/260 ( PDF )
- Computational Aspects of Correlation Power Analysis
- Paul Bottinelli and Joppe W. Bos
-
2015/259 ( PDF )
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES
- Patrick Derbez and Pierre-Alain Fouque
-
2015/258 ( PDF )
- Lightweight MDS Involution Matrices
- Siang Meng Sim and Khoongming Khoo and Frédérique Oggier and Thomas Peyrin
-
2015/257 ( PDF )
- Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
- Vadim Lyubashevsky and Thomas Prest
-
2015/256 ( PDF )
- Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
- Yang Lu, Quanling Zhang, Jiguo Li
-
2015/255 ( PDF )
- A comprehensive analysis of game-based ballot privacy definitions
- David Bernhard and Veronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi
-
2015/254 ( PDF )
- Tornado Attack on RC4 with Applications to WEP \& WPA
- Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux
-
2015/253 ( PDF )
- Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers
- Haiyan Wang , Dongdai Lin
-
2015/252 ( PDF )
- Linearization of Multi-valued Nonlinear Feedback Shift Registers
- Haiyan Wang, Jianghua Zhong, Dongdai Lin
-
2015/251 ( PDF )
- How to Construct UC-Secure Searchable Symmetric Encryption Scheme
- Kaoru Kurosawa and Yasuhiro Ohtaki
-
2015/250 ( PDF )
- Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys
- Junji Shikata
-
2015/249 ( PDF )
- Improved (Hierarchical) Inner-Product Encryption from Lattices
- Keita Xagawa
-
2015/248 ( PDF )
- Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
- Ryo Nishimaki and Keita Xagawa
-
2015/247 ( PDF )
- Subgroup security in pairing-based cryptography
- Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and Geovandro C. C. F. Pereira and Gustavo Zanon
-
2015/246 ( PDF )
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
- Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee
-
2015/245 ( PDF )
- Practical Attacks on the Round-reduced PRINCE
- Pawel Morawiecki
-
2015/244 ( PDF )
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
- Jeremy Jean and Ivica Nikolic
-
2015/243 ( PDF )
- Reliable Message Transmission under Partial Knowledge
- Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas
-
2015/242 ( PDF )
- Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
- Benoit Libert and Thomas Peters and Marc Joye and Moti Yung
-
2015/241 ( PDF )
- Espresso: A Stream Cipher for 5G Wireless Communication Systems
- Elena Dubrova and Martin Hell
-
2015/240 ( PDF )
- Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
- Alex Biryukov, Patrick Derbez and Léo Perrin
-
2015/239 ( PDF )
- Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
- Patrick Derbez and Léo Perrin
-
2015/238 ( PDF )
- One Time Programs with Limited Memory
- Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michał Zając
-
2015/237 ( PDF )
- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers
- Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers
-
2015/236 ( PDF )
- Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
- Subhamoy Maitra and Santanu Sarkar and Anubhab Baksi and Pramit Dey
-
2015/235 ( PDF )
- Performance and Security Improvements for Tor: A Survey
- Mashael AlSabah and Ian Goldberg
-
2015/234 ( PDF )
- Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
- Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
-
2015/233 ( PDF )
- Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
- Ben Smyth and Steven Frink and Michael R. Clarkson
-
2015/232 ( PDF )
- Cryptanalysis of Full Sprout
- Virginie Lallemand and María Naya-Plasencia
-
2015/231 ( PDF )
- A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
- Yonglin Hao
-
2015/230 ( PDF )
- W-SPS: Designing a Wide-Area Secure Positioning System
- Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun
-
2015/229 ( PDF )
- Improving GGH Public Key Scheme Using Low Density Lattice Codes
- Reza Hooshmand
-
2015/228 ( PDF )
- Leakage-Resilient Cryptography with Key Derived from Sensitive Data
- Konrad Durnoga and Tomasz Kazana and Michał Zając and Maciej Zdanowicz
-
2015/227 ( PDF )
- Tradeoff Cryptanalysis of Memory-Hard Functions
- Alex Biryukov and Dmitry Khovratovich
-
2015/226 ( PDF )
- Secure Physical Computation using Disposable Circuits
- Ben Fisch and Daniel Freund and Moni Naor
-
2015/225 ( PDF )
- Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2015/224 ( PDF )
- GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records
- Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder
-
2015/223 ( PDF )
- New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers
- Anubhab Baksi and Subhamoy Maitra and Santanu Sarkar
-
2015/222 ( PDF )
- Towards Understanding the Known-Key Security of Block Ciphers
- Elena Andreeva, Andrey Bogdanov, and Bart Mennink
-
2015/221 ( PDF )
- Tighter, faster, simpler side-channel security evaluations beyond computing power
- Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal
-
2015/220 ( PDF )
- Key Homomorphic PRFs and Their Applications
- Dan Boneh and Kevin Lewi and Hart Montgomery and Ananth Raghunathan
-
2015/219 ( PDF )
- Efficient Format Preserving Encrypted Databases
- Prakruti C, Sashank Dara and V.N. Muralidhara
-
2015/218 ( PDF )
- Efficient k-out-of-n oblivious transfer protocol
- wang qinglong
-
2015/217 ( PDF )
- Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles
- Subhamoy Maitra and Goutam Paul and Willi Meier
-
2015/216 ( PDF )
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
- Eike Kiltz and Hoeteck Wee
-
2015/215 ( PDF )
- A revocable anonymity in Tor
- Amadou Moctar Kane
-
2015/214 ( PDF )
- GCM Security Bounds Reconsidered
- Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata
-
2015/213 ( PDF )
- Attribute-Based Versions of Schnorr and ElGamal
- Javier Herranz
-
2015/212 ( PDF )
- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
- Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger
-
2015/211 ( PDF )
- Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
- Thijs Laarhoven and Benne de Weger
-
2015/210 ( PDF )
- Secure and Efficient Initialization and Authentication Protocols for SHIELD
- Chenglu Jin and Marten van Dijk
-
2015/209 ( PDF )
- Triathlon of Lightweight Block Ciphers for the Internet of Things
- Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Léo Perrin and Johann Großschädl and Alex Biryukov
-
2015/208 ( PDF )
- Towards Secure Distance Bounding
- Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay
-
2015/207 ( PDF )
- Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
- Tobias Schneider and Amir Moradi
-
2015/206 ( PDF )
- Efficient and Secure Delegation of Group Exponentiation to a Single Server
- Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain
-
2015/205 ( PDF )
- Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
- Jooyoung Lee
-
2015/204 ( PDF )
- Leakage-Resilient Symmetric Encryption via Re-keying
- Michel Abdalla and Sonia Belaďd and Pierre-Alain Fouque
-
2015/203 ( PDF )
- Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
- Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim Güneysu
-
2015/202 ( PDF )
- Adaptively Secure Coin-Flipping, Revisited
- Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park
-
2015/201 ( PDF )
- Statistical Properties of Multiplication mod $2^n$
- A. Mahmoodi Rishakani and S. M. Dehnavi and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
-
2015/200 ( PDF )
- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
- Alexander Wild and Amir Moradi and Tim Güneysu
-
2015/199 ( PDF )
- Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
- Amir Moradi and Gesine Hinterwälder
-
2015/198 ( PDF )
- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
- Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim Güneysu
-
2015/197 ( PDF )
- SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
- N. Nalla Anandakumar
-
2015/196 ( PDF )
- Tighter Reductions for Forward-Secure Signature Schemes
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2015/195 ( PDF )
- Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists
- Stephanie Bayer and Jens Groth
-
2015/194 ( PDF )
- Practical Homomorphic MACs for Arithmetic Circuits
- Dario Catalano and Dario Fiore
-
2015/193 ( PDF )
- Improving Modular Inversion in RNS using the Plus-Minus Method
- Karim Bigou and Arnaud Tisserand
-
2015/192 ( PDF )
- Memory-saving computation of the pairing final exponentiation on BN curves
- Sylvain DUQUESNE and Loubna GHAMMAM
-
2015/191 ( PDF )
- iDASH Secure Genome Analysis Competition Using ObliVM
- Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang and Elaine Shi
-
2015/190 ( PDF )
- Multi-Client Non-Interactive Verifiable Computation
- Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid
-
2015/189 ( PDF )
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
- Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Vizár
-
2015/188 ( PDF )
- New Techniques for SPHFs and Efficient One-Round PAKE Protocols
- Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
-
2015/187 ( PDF )
- How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
- Juan Garay and Jonathan Katz and Bjoern Tackmann and Vassilis Zikas
-
2015/186 ( PDF )
- Higher Order Differential Analysis of NORX
- Sourav Das and Subhamoy Maitra and and Willi Meier
-
2015/185 ( PDF )
- Remotely Managed Logic Built-In Self-Test for Secure M2M Communications
- Elena Dubrova and Mats Näslund and Gunnar Carlsson and John Fornehed and Ben Smeets
-
2015/184 ( PDF )
- Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
- Céline Blondeau and Kaisa Nyberg
-
2015/183 ( PDF )
- New Links Between Differential and Linear Cryptanalysis
- Céline Blondeau and Kaisa Nyberg
-
2015/182 ( PDF )
- Tweakable Blockciphers with Asymptotically Optimal Security
- Rodolphe Lampe and Yannick Seurin
-
2015/181 ( PDF )
- Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
- Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda Alkhzaimi and Chao Li
-
2015/180 ( PDF )
- Key-Homomorphic Constrained Pseudorandom Functions
- Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens
-
2015/179 ( PDF )
- A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves
- Palash Sarkar and Shashank Singh
-
2015/178 ( PDF )
- On Time and Order in Multiparty Computation
- Pablo Daniel Azar and Shafi Goldwasser and Sunoo Park
-
2015/177 ( PDF )
- On the Security of an Efficient Group Key Agreement Scheme for MANETs
- Purushothama B R and Nishat Koti
-
2015/176 ( PDF )
- Key Recovery for LWE in Polynomial Time
- Kim Laine and Kristin Lauter
-
2015/175 ( PDF )
- Trivial Nonce-Misusing Attack on Pure OMD
- Tomer Ashur and Bart Mennink
-
2015/174 ( PDF )
- A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia
- Chenyang Tu and Neng Gao and Zeyi Liu and Lei Wang and Zongbin Liu and Bingke Ma
-
2015/173 ( PDF )
- Indistinguishability Obfuscation from Compact Functional Encryption
- Prabhanjan Ananth and Abhishek Jain
-
2015/172 ( PDF )
- Silent Simon: A Threshold Implementation under 100 Slices
- Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth
-
2015/171 ( PDF )
- Authenticated Network Time Synchronization
- Benjamin Dowling and Douglas Stebila and Greg Zaverucha
-
2015/170 ( PDF )
- Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
- Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer
-
2015/169 ( PDF )
- Short Schnorr signatures require a hash function with more than just random-prefix resistance
- Daniel R. L. Brown
-
2015/168 ( PDF )
- More PS and H-like bent functions
- C. Carlet
-
2015/167 ( PDF )
- Post-Zeroizing Obfuscation: The case of Evasive Circuits
- Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry
-
2015/166 ( PDF )
- Naturally Rehearsing Passwords
- Jeremiah Blocki and Manuel Blum and Anupam Datta
-
2015/165 ( PDF )
- The Cryptographic Hardness of Random Local Functions -- Survey
- Benny Applebaum
-
2015/164 ( PDF )
- Constant Size Ring Signature Without Random Oracle
- Priyanka Bose and Dipanjan Das and C. Pandu Rangan
-
2015/163 ( PDF )
- Indistinguishability Obfuscation from Functional Encryption
- Nir Bitansky and Vinod Vaikuntanathan
-
2015/162 ( PDF )
- New Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2015/161 ( PDF )
- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks
- Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
-
2015/160 ( PDF )
- Differential-Linear Cryptanalysis of ICEPOLE
- Tao Huang; Ivan Tjuawinata; Hongjun Wu
-
2015/159 ( PDF )
- Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
- Shengbao Wu; Hongjun Wu; Tao Huang; Mingsheng Wang; Wenling Wu
-
2015/158 ( PDF )
- Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
- Zvika Brakerski and Ilan Komargodski and Gil Segev
-
2015/157 ( PDF )
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Nuttapong Attrapadung and Shota Yamada
-
2015/156 ( PDF )
- Building Lossy Trapdoor Functions from Lossy Encryption
- Brett Hemenway and Rafail Ostrovsky
-
2015/155 ( PDF )
- On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
- Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor
-
2015/154 ( PDF )
- Circuits Resilient to Additive Attacks with Applications to Secure Computation
- Daniel Genkin and Yuval Ishai and Manoj M. Prabhakaran and Amit Sahai and Eran Tromer
-
2015/153 ( PDF )
- Functional Encryption from (Small) Hardware Tokens
- Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou
-
2015/152 ( PDF )
- Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults
- Ronan Lashermes and Jacques Fournier and Louis Goubin
-
2015/151 ( PDF )
- Bad directions in cryptographic hash functions
- Daniel J. Bernstein and Andreas Hülsing and Tanja Lange and Ruben Niederhagen
-
2015/150 ( PDF )
- Insynd: Privacy-Preserving Transparency Logging Using Balloons
- Tobias Pulls and Roel Peeters
-
2015/149 ( PDF )
- Cryptanalysis of HMAC/NMAC-Whirlpool
- Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu
-
2015/148 ( PDF )
- On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs
- Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann
-
2015/147 ( PDF )
- High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
- Lionel Rivičre and Zakaria Najm and Pablo Rauzy and Jean-Luc Danger and Julien Bringer and Laurent Sauvage
-
2015/146 ( PDF )
- New Attacks on Feistel Structures with Improved Memory Complexities
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2015/145 ( PDF )
- Observations on the SIMON block cipher family
- Stefan Kölbl and Gregor Leander and Tyge Tiessen
-
2015/144 ( PDF )
- Security of the AES with a Secret S-box
- Tyge Tiessen and Lars R. Knudsen and Stefan Kölbl and Martin M. Lauridsen
-
2015/143 ( PDF )
- Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs
- Erich Wenger and Paul Wolfger
-
2015/142 ( PDF )
- Multi-Client Verifiable Computation with Stronger Security Guarantees
- S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou
-
2015/141 ( PDF )
- Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method
- Céline Blondeau and Marine Minier
-
2015/140 ( PDF )
- The Random Oracle Model: A Twenty-Year Retrospective
- Neal Koblitz and Alfred Menezes
-
2015/139 ( PDF )
- Performance Analysis of Some Password Hashing Schemes
- Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
-
2015/138 ( PDF )
- A Practical Key Exchange for the Internet using Lattice Cryptography
- Vikram Singh
-
2015/137 ( PDF )
- Multi-keyword Similarity Search Over Encrypted Cloud Data
- Mikhail Strizhov and Indrajit Ray
-
2015/136 ( PDF )
- Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs
- Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. L. M. Barreto
-
2015/135 ( PDF )
- Generalizing Efficient Multiparty Computation
- Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp
-
2015/134 ( PDF )
- From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions
- Pierre Karpman
-
2015/133 ( PDF )
- Private Computation on Encrypted Genomic Data
- Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig
-
2015/132 ( PDF )
- Homomorphic Computation of Edit Distance
- Jung Hee Cheon and Miran Kim and Kristin Lauter2
-
2015/131 ( PDF )
- On Lightweight Stream Ciphers with Shorter Internal States
- Frederik Armknecht, Vasily Mikhalev
-
2015/130 ( PDF )
- How to Bootstrap Anonymous Communication
- Sune K. Jakobsen and Claudio Orlandi
-
2015/129 ( PDF )
- Block-wise Non-Malleable Codes
- Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay
-
2015/128 ( PDF )
- Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
- Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro
-
2015/127 ( PDF )
- Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
- Ricardo Dahab and Steven Galbraith and Eduardo Morais
-
2015/126 ( PDF )
- Perfect Structure on the Edge of Chaos
- Nir Bitansky and Omer Paneth and Daniel Wichs
-
2015/125 ( PDF )
- Multilinear Pseudorandom Functions
- Aloni Cohen and Justin Holmgren
-
2015/124 ( PDF )
- GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs
- Alexander Wild and Amir Moradi and Tim Güneysu
-
2015/123 ( PDF )
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Dennis Hofheinz and Jessica Koch and Christoph Striecks
-
2015/122 ( PDF )
- Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
- Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
-
2015/121 ( PDF )
- Multi-Client Oblivious RAM secure against Malicious Servers
- Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
-
2015/120 ( PDF )
- Reconfigurable LUT: Boon or Bane for Secure Applications
- Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean-Luc Danger and Debdeep Mukhopadhyay
-
2015/119 ( PDF )
- Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device
- Alexandre Duc and Sebastian Faust and François-Xavier Standaert
-
2015/118 ( PDF )
- Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
- Takahiro Matsuda and Goichiro Hanaoka
-
2015/117 ( PDF )
- Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy
- Maciej Skorski
-
2015/116 ( PDF )
- Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs
- Riadh Brinci and Walid Khmiri and Mefteh Mbarek and Abdellatif Ben Rabâa and Ammar Bouallčgue
-
2015/115 ( PDF )
- Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors
- Muhammad Yasir Malik
-
2015/114 ( PDF )
- Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue
- Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
-
2015/113 ( PDF )
- How to Compress Homomorphic Ciphertexts
- Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancrčde Lepoint and María Naya-Plasencia and Pascal Paillier and Renaud Sirdey
-
2015/112 ( PDF )
- Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
- Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura
-
2015/111 ( PDF )
- The Multivariate Hidden Number Problem
- Steven D. Galbraith and Barak Shani
-
2015/110 ( PDF )
- sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices
- Shijun Zhao and Qianying Zhang
-
2015/108 ( PDF )
- TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM
- Lucjan Hanzlik and Przemysław Kubiak and Mirosław Kutyłowski
-
2015/107 ( PDF )
- Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
- Attila A. Yavuz and Jorge Guajardo
-
2015/106 ( PDF )
- Provably weak instances of Ring-LWE
- Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange
-
2015/105 ( PDF )
- Inner Product Masking Revisited
- Josep Balasch and Sebastian Faust and Benedikt Gierlichs
-
2015/104 ( PDF )
- Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
- Rafael Dowsley and Jörn Müller-Quade and Tobias Nilges
-
2015/103 ( PDF )
- Mergeable Functional Encryption
- Vincenzo Iovino and Karol Zebrowski
-
2015/102 ( PDF )
- GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
- Shay Gueron and Yehuda Lindell
-
2015/101 ( PDF )
- Multi-Key Security: The Even-Mansour Construction Revisited
- Nicky Mouha and Atul Luykx
-
2015/100 ( PDF )
- Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA
- Christian Wittke and Zoya Dyka and Peter Langendoerfer
-
2015/099 ( PDF )
- Universally Composable Firewall Architectures using Trusted Hardware
- Dirk Achenbach and Jörn Müller-Quade and Jochen Rill
-
2015/098 ( PDF )
- Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
- Shantian Cheng and Juanyang Zhang
-
2015/097 ( PDF )
- Surreptitiously Weakening Cryptographic Systems
- Bruce Schneier and Matthew Fredrikson and Tadayoshi Kohno and Thomas Ristenpart
-
2015/096 ( PDF )
- A Meet in the Middle Attack on Reduced Round Kuznyechik
- Riham AlTawy and Amr M. Youssef
-
2015/095 ( PDF )
- Rotational Cryptanalysis of ARX Revisited
- Dmitry Khovratovich and Ivica Nikolic and Josef Pieprzyk and Przemyslaw Sokolowski and Ron Steinfeld
-
2015/094 ( PDF )
- Some New Results on Binary Polynomial Multiplication
- Murat Cenk and M. Anwar Hasan
-
2015/093 ( PDF )
- Generalization of Statistical Criteria for Sboxes
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
-
2015/092 ( PDF )
- TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY
- Grasha Jacob, Dr. A. Murugan, Irine Viola
-
2015/091 ( PDF )
- Related-Key Forgeries for Prřst-OTR
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel
-
2015/090 ( PDF )
- Structural Evaluation by Generalized Integral Property
- Yosuke Todo
-
2015/089 ( PDF )
- On the security margin of MAC striping
- Thomas Eisenbarth and Aaron Meyerowitz and Rainer Steinwandt
-
2015/088 ( PDF )
- Structural Weaknesses in the Open Smart Grid Protocol
- Klaus Kursawe and Christiane Peters
-
2015/087 ( PDF )
- Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
- David Derler and Christian Hanser and Daniel Slamanig
-
2015/086 ( PDF )
- Practical Compact E-Cash with Arbitrary Wallet Size
- Patrick Märtens
-
2015/085 ( PDF )
- On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
- Anne Canteaut and Joëlle Roué
-
2015/084 ( PDF )
- On the Disadvantages of Pairing-based Cryptography
- Zhengjun Cao and Lihua Liu
-
2015/083 ( PDF )
- Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
- Massimo Chenal and Qiang Tang
-
2015/082 ( PDF )
- On the Difficulty of Securing Web Applications using CryptDB
- İhsan Haluk AKIN and Berk Sunar
-
2015/081 ( PDF )
- Amortizing Garbled Circuits
- Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff
-
2015/080 ( PDF )
- The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
- Feng Hao and Xun Yi and Liqun Chen and Siamak F. Shahandashti
-
2015/079 ( PDF )
- On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
- Jiqiang Lu
-
2015/078 ( PDF )
- Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters
- GU Chun-xiang and. Xin Dan and. ZHENG Yong-hui and. KANG Yuan-ji
-
2015/077 ( PDF )
- On the Primary Constructions of Vectorial Boolean Bent Functions
- Yuwei Xu and Chuankun Wu
-
2015/076 ( PDF )
- Fully Structure-Preserving Signatures and Shrinking Commitments
- Masayuki Abe and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi
-
2015/075 ( PDF )
- Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
- Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen
-
2015/074 ( PDF )
- Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
- Gilles Barthe and Juan Manuel Crespo and Yassine Lakhnech and Benedikt Schmidt
-
2015/073 ( PDF )
- Oblivious Network RAM
- Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin
-
2015/072 ( PDF )
- Non-Interactive Zero-Knowledge Proofs of Non-Membership
- Olivier Blazy and Céline Chevalier and Damien Vergnaud
-
2015/071 ( PDF )
- Factoring N=p^r q^s for Large r and s
- Jean-Sebastien Coron and Jean-Charles Faugere and Guenael Renault and Rina Zeitoun
-
2015/070 ( PDF )
- The Sum Can Be Weaker Than Each Part
- Gaëtan Leurent and Lei Wang
-
2015/069 ( PDF )
- On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
- Benoît Cogliati and Yannick Seurin
-
2015/068 ( PDF )
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- Gregor Leander and Brice Minaud and Sondre Rřnjom
-
2015/067 ( PDF )
- An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
- Susumu Kiyoshima
-
2015/066 ( PDF )
- Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
- Tobias Schneider and Amir Moradi and Tim Güneysu
-
2015/065 ( PDF )
- A lightweight-friendly modifcation of GOST block cipher
- Andrey Dmukh and Denis Dygin and Grigory Marshalko
-
2015/064 ( PDF )
- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
- Handan Kılınç and Alptekin Küpçü
-
2015/063 ( PDF )
- CamlCrush: A PKCS\#11 Filtering Proxy
- R. Benadjila and T. Calderon and M. Daubignard
-
2015/062 ( PDF )
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
- Yuval Yarom and Gefei Li and Damith C. Ranasinghe
-
2015/061 ( PDF )
- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
- Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner
-
2015/060 ( PDF )
- Verified Proofs of Higher-Order Masking
- Gilles Barthe and Sonia Belaďd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub
-
2015/059 ( PDF )
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
- Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam
-
2015/058 ( PDF )
- Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
- Berry Schoenmakers and Meilof Veeningen
-
2015/057 ( PDF )
- Cold Boot Attacks in the Discrete Logarithm Setting
- Bertram Poettering and Dale L. Sibborn
-
2015/056 ( PDF )
- Better Algorithms for LWE and LWR
- Alexandre Duc and Florian Tramčr and Serge Vaudenay
-
2015/055 ( PDF )
- Richer Efficiency/Security Trade-offs in 2PC
- Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek
-
2015/054 ( PDF )
- Non-committing encryption from $\Phi$-hiding
- Brett Hemenway and Rafail Ostrovsky and Alon Rosen
-
2015/053 ( PDF )
- Tight Bounds for Keyed Sponges and Truncated CBC
- Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
-
2015/052 ( PDF )
- Interactive Message-Locked Encryption and Secure Deduplication
- Mihir Bellare and Sriram Keelveedhi
-
2015/051 ( PDF )
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- Li Lin, Wenling Wu
-
2015/050 ( PDF )
- Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
- Carla Rŕfols
-
2015/049 ( PDF )
- On Solving Lpn using BKW and Variants
- Sonia Bogos and Florian Tramer and Serge Vaudenay
-
2015/048 ( PDF )
- On Obfuscation with Random Oracles
- Ran Canetti and Yael Tauman Kalai and Omer Paneth
-
2015/047 ( PDF )
- Linearly Homomorphic Encryption from DDH
- Guilhem Castagnos and Fabien Laguillaumie
-
2015/046 ( PDF )
- On the concrete hardness of Learning with Errors
- Martin R. Albrecht and Rachel Player and Sam Scott
-
2015/045 ( PDF )
- Reliable Information Extraction for Single Trace Attacks
- Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall
-
2015/044 ( PDF )
- Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
- Binanda Sengupta and Abhijit Das
-
2015/043 ( PDF )
- Group Signature with Deniability: How to Disavow a Signature
- Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka
-
2015/042 ( PDF )
- High Performance Lattice-based CCA-secure Encryption
- Rachid El~Bansarkhani and Johannes Buchmann
-
2015/041 ( PDF )
- Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP
- Artur Mariano and Thijs Laarhoven and Christian Bischof
-
2015/040 ( PDF )
- Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
- Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2015/039 ( PDF )
- Type-Based Verification of Electronic Voting Protocols
- Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling
-
2015/038 ( PDF )
- Aggregate Pseudorandom Functions and Connections to Learning
- Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan
-
2015/037 ( PDF )
- Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
- Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2015/036 ( PDF )
- Faster software for fast endomorphisms
- Billy Bob Brumley
-
2015/035 ( PDF )
- Cryptographically Secure CRC for Lightweight Message Authentication
- Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist
-
2015/034 ( PDF )
- Suit up! Made-to-Measure Hardware Implementations of Ascon
- Hannes Groß and Erich Wenger and Christoph Dobraunig and Christoph Ehrenhöfer
-
2015/033 ( PDF )
- On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks
- Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel
-
2015/032 ( PDF )
- Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF
- Zvika Brakerski and Vinod Vaikuntanathan
-
2015/031 ( PDF )
- Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence
- Kai-Min Chung and Rafael Pass
-
2015/030 ( PDF )
- Cryptanalysis of Ascon
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schläffer
-
2015/029 ( PDF )
- Predicate Encryption for Circuits from LWE
- Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
-
2015/028 ( PDF )
- Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$)
- Jeremy Maitin-Shepard
-
2015/027 ( PDF )
- On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption
- Adam Smith and Ye Zhang
-
2015/026 ( PDF )
- A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2015/025 ( PDF )
- Obfuscating Circuits via Composite-Order Graded Encoding
- Benny Applebaum and Zvika Brakerski
-
2015/024 ( PDF )
- Non-Abelian Analogs of Lattice Rounding
- Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan
-
2015/023 ( PDF )
- Multilinear Maps Using Ideal Lattices without Encodings of Zero
- Gu Chunsheng
-
2015/022 ( PDF )
- TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
- Bo Yang and Dengguo Feng and Yu Qin and Yingjun Zhang and Weijin Wang
-
2015/021 ( PDF )
- Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification
- Xin Li
-
2015/020 ( PDF )
- Simpler Efficient Group Signatures from Lattices
- Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang
-
2015/019 ( PDF )
- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
- Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Mehdi Tibouchi
-
2015/018 ( PDF )
- A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS
- JINTAI DING, ALEXEI MIASNIKOV, AND ALEXANDER USHAKOV
-
2015/017 ( PDF )
- Simple Functional Encryption Schemes for Inner Products
- Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
-
2015/016 ( PDF )
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
- Yannis Rouselakis and Brent Waters
-
2015/015 ( PDF )
- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
- Florian Bergsma, Tibor Jager, Jörg Schwenk
-
2015/014 ( PDF )
- Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based
- San Ling and Khoa Nguyen and Huaxiong Wang
-
2015/013 ( PDF )
- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
- Nico Döttling
-
2015/012 ( PDF )
- Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
- Tancrčde Lepoint and Mehdi Tibouchi
-
2015/011 ( PDF )
- Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications
- Benjamin Buhrow and Paul Riemer and Mike Shea and Barry Gilbert and Erik Daniel
-
2015/010 ( PDF )
- Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- Shengli Liu and Kenneth G. Paterson
-
2015/009 ( PDF )
- Rig: A simple, secure and flexible design for Password Hashing
- Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
-
2015/008 ( PDF )
- Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
- Satrajit Ghosh and Aniket Kate
-
2015/007 ( PDF )
- Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
- Tobias Pulls and Roel Peeters
-
2015/006 ( PDF )
- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
- Jan Camenisch and Robert R. Enderlein and Gregory Neven
-
2015/005 ( PDF )
- Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
- Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs
-
2015/004 ( PDF )
- Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
- Carmit Hazay
-
2015/003 ( PDF )
- Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
- Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen
-
2015/002 ( PDF )
- Characterization of MDS mappings
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2015/001 ( PDF )
- A note on the security of Higher-Order Threshold Implementations
- Oscar Reparaz
-
2014/1029 ( PDF )
- On the Cryptographic Hardness of Finding a Nash Equilibrium
- Nir Bitansky and Omer Paneth and Alon Rosen
-
2014/1028 ( PDF )
- Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
- Payal Chaudhari and Manik Lal Das and Anish Mathuria
-
2014/1027 ( PDF )
- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
- Vadim Lyubashevsky and Daniel Wichs
-
2014/1026 ( PDF )
- Lattices with Symmetry
- H. W. Lenstra, Jr. and A. Silverberg
-
2014/1025 ( PDF )
- XPIR: Private Information Retrieval for Everyone
- Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian
-
2014/1024 ( PDF )
- Cryptanalysis of the Co-ACD Assumption
- Pierre-Alain Fouque and Moon Sung Lee and Tancrčde Lepoint and Mehdi Tibouchi
-
2014/1023 ( PDF )
- How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search
- Nathan E. Price and Alan T. Sherman
-
2014/1022 ( PDF )
- Topology-Hiding Computation
- Tal Moran and Ilan Orlov and Silas Richelson
-
2014/1021 ( PDF )
- Tightly-Secure Signatures from Chameleon Hash Functions
- Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan
-
2014/1020 ( PDF )
- Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance
- Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm
-
2014/1019 ( -- withdrawn -- )
- Related-Key Differential Cryptanalysis of Reduced-Round ITUBee
- Xiaoming Tang and Weidong Qiu and Zheng Gong and Zheng Huang and Jie Guo
-
2014/1018 ( PDF )
- Algebraic Algorithms for LWE
- Martin R. Albrecht and Carlos Cid and Jean-Charles Faugčre and Ludovic Perret
-
2014/1017 ( PDF )
- Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
- Foteini Baldimtsi and Olga Ohrimenko
-
2014/1016 ( -- withdrawn -- )
- Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security
- GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL
-
2014/1015 ( PDF )
- Compact Accumulator using Lattices
- Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini
-
2014/1014 ( PDF )
- Double-and-Add with Relative Jacobian Coordinates
- Björn Fay
-
2014/1013 ( PDF )
- Computational Independence
- Björn Fay
-
2014/1012 ( PDF )
- The Boomerang Attacks on BLAKE and BLAKE2
- Yonglin Hao
-
2014/1011 ( PDF )
- Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
- Alex Biryukov and Ivan Pustogarov
-
2014/1010 ( PDF )
- On Continuous After-the-Fact Leakage-Resilient Key Exchange
- Mohsen Toorani
-
2014/1009 ( PDF )
- A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System
- Christopher D. Nguyen and Dhananjay S. Phatak and Steven D. Houston and Alan T. Sherman
-
2014/1008 ( PDF )
- DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS
- Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce
-
2014/1007 ( PDF )
- Fair Multiple-bank E-cash in the Standard Model
- Jiangxiao Zhang and Yanwu Gao and Chunhui Feng and Hua Guo and Zhoujun Li
-
2014/1006 ( PDF )
- Simple composition theorems of one-way functions -- proofs and presentations
- Jaime Gaspar and Eerke Boiten
-
2014/1005 ( PDF )
- A pure block chain based decentralized exchange.
- Harsh Patel
-
2014/1004 ( PDF )
- CONIKS: Bringing Key Transparency to End Users
- Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman
-
2014/1003 ( PDF )
- COFFE: Ciphertext Output Feedback Faithful Encryption
- Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel
-
2014/1002 ( PDF )
- Experiments in Encrypted and Searchable Network Audit Logs
- Bhanu Prakash Gopularam and Sashank Dara and Nalini N
-
2014/1001 ( -- withdrawn -- )
- Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE
- Xiaopeng Yang, Wenping Ma, and Chengli Zhang
-
2014/1000 ( PDF )
- Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
- Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri
-
2014/999 ( PDF )
- First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
- Yongdae Kim and Hyunsoo Yoon
-
2014/998 ( PDF )
- Hierarchical deterministic Bitcoin wallets that tolerate key leakage
- Gus Gutoski and Douglas Stebila
-
2014/997 ( PDF )
- Constants Count: Practical Improvements to Oblivious RAM
- Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas
-
2014/996 ( PDF )
- Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves
- Maike Massierer
-
2014/995 ( PDF )
- Partial Garbling Schemes and Their Applications
- Yuval Ishai and Hoeteck Wee
-
2014/994 ( PDF )
- Two novel applications of bilinear groups to ABE encryption
- Riccardo Longo and Chiara Marcolla and Massimiliano Sala
-
2014/993 ( PDF )
- How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA
- Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer
-
2014/992 ( PDF )
- Incentivized Outsourced Computation Resistant to Malicious Contractors
- Alptekin Kupcu
-
2014/991 ( PDF )
- Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
- Kai-Min Chung and Huijia Lin and Rafael Pass
-
2014/990 ( PDF )
- Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
- Pille Pullonen and Sander Siim
-
2014/989 ( PDF )
- Controlled Homomorphic Encryption: Definition and Construction
- Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti
-
2014/988 ( PDF )
- Armadillo: a compilation chain for privacy preserving applications
- Sergiu Carpov and Paul Dubrulle and Renaud Sirdey
-
2014/987 ( PDF )
- Cryptanalysis of Full PRIDE Block Cipher
- Yibin Dai and Shaozhen Chen
-
2014/986 ( PDF )
- Related-Key Differential Attack on Round Reduced RECTANGLE-80
- Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma
-
2014/985 ( PDF )
- Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
- Bartosz Zoltak
-
2014/984 ( PDF )
- Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel
- Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert
-
2014/983 ( PDF )
- Public Verification of Private Effort
- Giulia Alberini and Tal Moran and Alon Rosen
-
2014/982 ( PDF )
- Outlier Privacy
- Edward Lui and Rafael Pass
-
2014/981 ( PDF )
- Publicly Verifiable Non-Interactive Arguments for Delegating Computation
- Omer Paneth and Guy N. Rothblum
-
2014/980 ( PDF )
- A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors
- Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
-
2014/979 ( PDF )
- The Chaining Lemma and its application
- Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
-
2014/978 ( PDF )
- Improved Differential Analysis of Block Cipher PRIDE
- Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma
-
2014/977 ( PDF )
- A Survey on Lightweight Entity Authentication with Strong PUFs
- Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede
-
2014/976 ( PDF )
- Geppetto: Versatile Verifiable Computation
- Craig Costello and Cédric Fournet and Jon Howell and Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and Bryan Parno and Samee Zahur
-
2014/975 ( PDF )
- Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2014/974 ( -- withdrawn -- )
- Non-Linearity and Affine Equivalence of Permutations
- P R Mishra, Indivar Gupta and N Rajesh Pillai
-
2014/973 ( PDF )
- Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
- Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma
-
2014/972 ( PDF )
- A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
- Haining Fan
-
2014/971 ( PDF )
- Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
- Y. Wei and E. Pasalic and F. Zhang and W. Wu
-
2014/970 ( PDF )
- Jackpot Stealing Information From Large Caches via Huge Pages
- Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar
-
2014/969 ( PDF )
- Privacy-Preserving Face Recognition with Outsourced Computation
- Can Xiang and Chunming Tang
-
2014/968 ( PDF )
- Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
- Jorge Munilla and Mike Burmester and Albert Peinado
-
2014/967 ( PDF )
- A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy
- Maciej Skorski
-
2014/966 ( PDF )
- Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms
- Kan Yang and Xiaohua Jia and Kuan Zhang and Xuemin (Sherman) Shen
-
2014/965 ( PDF )
- Predicate Encryption for Multi-Dimensional Range Queries from Lattices
- Romain Gay and Pierrick Méaux and Hoeteck Wee
-
2014/964 ( PDF )
- On two windows multivariate cryptosystem depending on random parameters
- Urszula Romańczuk-Polubiec, Vasyl Ustimenko
-
2014/963 ( PDF )
- Malicious-Client Security in Blind Seer: A Scalable Private DBMS
- Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
-
2014/962 ( PDF )
- Solving Polynomial Systems with Noise over F_2: Revisited
- Zhenyu Huang and Dongdai Lin
-
2014/961 ( PDF )
- When are Fuzzy Extractors Possible?
- Benjamin Fuller and Adam Smith and Leonid Reyzin
-
2014/960 ( PDF )
- Non-Interactive Secure Multiparty Computation
- Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin-Cherniavsky
-
2014/959 ( PDF )
- Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
- Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul
-
2014/958 ( PDF )
- Authenticated Encryption: How Reordering can Impact Performance
- Basel Alomair
-
2014/957 ( PDF )
- Black Box Separations for Differentially Private Protocols
- Dakshita Khurana and Hemanta K. Maji and Amit Sahai
-
2014/956 ( PDF )
- Tamper Detection and Continuous Non-Malleable Codes
- Zahra Jafargholi and Daniel Wichs
-
2014/955 ( PDF )
- On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme
- Constantin Catalin Dragan and Ferucio Laurentiu Tiplea
-
2014/954 ( PDF )
- Algebraic Fault Analysis of Katan
- Frank Quedenfeld
-
2014/953 ( PDF )
- The Related-Key Security of Iterated Even-Mansour Ciphers
- Pooya Farshim and Gordon Procter
-
2014/952 ( PDF )
- Balanced Encoding to Mitigate Power Analysis: A Case Study
- Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye
-
2014/951 ( PDF )
- Modified Alternating Step Generators with Non-Linear Scrambler
- Robert Wicik and Tomasz Rachwalik and Rafał Gliwa
-
2014/950 ( PDF )
- Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
- Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda
-
2014/949 ( PDF )
- Simplification/complication of the basis of prime Boolean ideal
- Alexander Rostovtsev and Anna Shustrova
-
2014/948 ( PDF )
- Lattice Point Enumeration on Block Reduced Bases
- Michael Walter
-
2014/947 ( PDF )
- The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers
- Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
-
2014/946 ( PDF )
- On a new fast public key cryptosystem
- Samir Bouftass
-
2014/945 ( PDF )
- Boomerang Attack on Step-Reduced SHA-512
- Hongbo Yu, Dongxia Bai
-
2014/944 ( PDF )
- EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes
- Georg Fuchsbauer and Christian Hanser and Daniel Slamanig
-
2014/943 ( PDF )
- HaTCh: A Formal Framework of Hardware Trojan Design and Detection
- Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk
-
2014/942 ( PDF )
- Public-Coin Differing-Inputs Obfuscation and Its Applications
- Yuval Ishai, Omkant Pandey, Amit Sahai
-
2014/941 ( PDF )
- Garbled RAM From One-Way Functions
- Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro
-
2014/940 ( PDF )
- Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
- Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
-
2014/939 ( PDF )
- Security Analysis of an Authentication Scheme Using Smart Cards
- Gaurav Tiwari and Amit K. Awasthi and Neha Shukla
-
2014/938 ( PDF )
- Trapdoor Computational Fuzzy Extractors
- Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas
-
2014/937 ( PDF )
- Analysis of Lewko-Sahai-Waters Revocation System
- Zhengjun Cao and Lihua Liu
-
2014/936 ( PDF )
- Outsourcing Secure Two-Party Computation as a Black Box
- Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
-
2014/935 ( PDF )
- Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
- Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia
-
2014/934 ( PDF )
- Efficient Generic Zero-Knowledge Proofs from Commitments
- Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias
-
2014/933 ( PDF )
- Certificateless Proxy Re-Encryption Without Pairing: Revisited
- Akshayaram Srinivasan and C. Pandu Rangan
-
2014/932 ( PDF )
- Bicliques with Minimal Data and Time Complexity for AES (Extended Version)
- Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya
-
2014/931 ( PDF )
- Cryptanalysis of JAMBU
- Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang
-
2014/930 ( PDF )
- Immunizing Multilinear Maps Against Zeroizing Attacks
- Dan Boneh and David J. Wu and Joe Zimmerman
-
2014/929 ( PDF )
- Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero
- Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai
-
2014/928 ( PDF )
- Implementing Candidate Graded Encoding Schemes from Ideal Lattices
- Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois
-
2014/927 ( PDF )
- Physical functions : the common factor of side-channel and fault attacks ?
- Bruno Robisson and Hélčne Le Bouder
-
2014/926 ( PDF )
- Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results
- Keita Emura and Takuya Hayashi
-
2014/925 ( PDF )
- Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
- Venkata Koppula and Allison Bishop Lewko and Brent Waters
-
2014/924 ( PDF )
- Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
- Antoine Joux and Cécile Pierrot
-
2014/923 ( -- withdrawn -- )
- New Cryptosystem Using The CRT And The Jordan Normal Form
- Hemlata Nagesh and Birendra Kumar Sharma
-
2014/922 ( PDF )
- Differential Analysis of Block Ciphers SIMON and SPECK
- Alex Biryukov and Arnab Roy and Vesselin Velichkov
-
2014/921 ( PDF )
- Batch NFS
- Daniel J. Bernstein and Tanja Lange
-
2014/920 ( PDF )
- Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
- Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert
-
2014/919 ( PDF )
- Experimenting with Shuffle Block Cipher and SMT Solvers
- Martin Stanek
-
2014/918 ( PDF )
- Web Tap Payment Authentication and Encryption With Zero Customer Effort
- Henry Ng
-
2014/917 ( PDF )
- From Selective to Adaptive Security in Functional Encryption
- Prabhanjan Ananth and Zvika Brakerski and Gil Segev and Vinod Vaikuntanathan
-
2014/916 ( PDF )
- Adaptively Secure Fully Homomorphic Signatures Based on Lattices
- Xavier Boyen and Xiong Fan and Elaine Shi
-
2014/915 ( PDF )
- The Security of the Hanser-Slamanig Signature Scheme Revisited
- Yanbin Pan
-
2014/914 ( PDF )
- Cryptography with One-Way Communication
- Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
-
2014/913 ( PDF )
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation
- Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi
-
2014/912 ( PDF )
- Low-Cost Concurrent Error Detection for GCM and CCM
- Xiaofei Guo and Ramesh Karri
-
2014/911 ( PDF )
- A Denial of Service Attack against Fair Computations using Bitcoin Deposits
- Jethro Beekman
-
2014/910 ( PDF )
- Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model
- Vanishree Rao
-
2014/909 ( PDF )
- Robust Secret Sharing Schemes Against Local Adversaries
- Allison Bishop Lewko and Valerio Pastro
-
2014/908 ( PDF )
- Practical UC security with a Global Random Oracle
- Ran Canetti and Abhishek Jain and Alessandra Scafuro
-
2014/907 ( PDF )
- Finding shortest lattice vectors faster using quantum search
- Thijs Laarhoven and Michele Mosca and Joop van de Pol
-
2014/906 ( PDF )
- Cryptanalysis of the Multilinear Map over the Integers
- Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehle
-
2014/905 ( PDF )
- Primary-Secondary-Resolver Membership Proof Systems
- Moni Naor and Asaf Ziv
-
2014/904 ( PDF )
- How Secure is TextSecure?
- Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz
-
2014/903 ( PDF )
- Falcon Codes: Fast, Authenticated LT Codes
- Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos
-
2014/902 ( PDF )
- The Power of Negations in Cryptography
- Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen
-
2014/901 ( PDF )
- A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
- Kenneth G. Paterson and Mario Strefler
-
2014/900 ( PDF )
- Some Security Results of the RC4+ Stream Cipher
- Subhadeep Banik and Sonu Jha
-
2014/899 ( PDF )
- Side Channel Power Analysis of an AES-256 Bootloader
- Colin O'Flynn and Zhizhang Chen
-
2014/898 ( PDF )
- A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
- Eduardo Morais and Ricardo Dahab
-
2014/897 ( PDF )
- Leveled Fully Homomorphic Signatures from Standard Lattices
- Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs
-
2014/896 ( PDF )
- Efficiently Making Secure Two-Party Computation Fair
- Handan Kılınç and Alptekin Küpçü
-
2014/895 ( PDF )
- Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
- Kerry A. McKay and Poorvi L. Vora
-
2014/894 ( PDF )
- THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS
- Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan
-
2014/893 ( PDF )
- Advanced Algebraic Attack on Trivium
- Frank Quedenfeld and Christopher Wolf
-
2014/892 ( PDF )
- Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014
- Georg Fuchsbauer
-
2014/891 ( PDF )
- Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
- Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi
-
2014/890 ( PDF )
- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures
- Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek
-
2014/889 ( PDF )
- Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings
- Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak
-
2014/888 ( PDF )
- Distance Lower Bounding
- Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi
-
2014/887 ( PDF )
- Hardware Implementation of Secure Shamir's Secret Sharing Scheme
- Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky
-
2014/886 ( PDF )
- Accountable Storage
- Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia
-
2014/885 ( PDF )
- Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
- Marios O. Choudary and Markus G. Kuhn
-
2014/884 ( -- withdrawn -- )
- Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
- Pei Luo and Yunsi Fei
-
2014/883 ( PDF )
- Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
- Pei Luo and Yunsi Fei
-
2014/882 ( PDF )
- Obfuscation of Probabilistic Circuits and Applications
- Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan
-
2014/881 ( PDF )
- Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
- Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
-
2014/880 ( PDF )
- Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective
- Joppe W. Bos and Michael Naehrig and Joop van de Pol
-
2014/879 ( PDF )
- Watch your Constants: Malicious Streebog
- Riham AlTawy and Amr M. Youssef
-
2014/878 ( PDF )
- Protecting obfuscation against arithmetic attacks
- Eric Miles and Amit Sahai and Mor Weiss
-
2014/877 ( PDF )
- CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
- Daniel R. L. Brown
-
2014/876 ( PDF )
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
- Mihir Bellare and Viet Tung Hoang
-
2014/875 ( PDF )
- Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
- Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding
-
2014/874 ( PDF )
- Accelerating Bliss: the geometry of ternary polynomials
- Léo Ducas
-
2014/873 ( PDF )
- Bootstrapping for HElib
- Shai Halevi and Victor Shoup
-
2014/872 ( PDF )
- Recent Results in Scalable Multi-Party Computation
- Jared Saia and Mahdi Zamani
-
2014/871 ( PDF )
- An algorithm for MD5 single-block collision attack using high-performance computing cluster
- Anton A. Kuznetsov
-
2014/870 ( PDF )
- Dynamic Behavior of RS latches using FIB processing and probe connection
- Naoya Torii ans Dai Yamamoro and Masahiko Takenaka and Tsutomu Matsumoto
-
2014/869 ( PDF )
- Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
- Werner Schindler
-
2014/868 ( PDF )
- Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
- Ilan Komargodski and Gil Segev and Eylon Yogev
-
2014/867 ( PDF )
- Random-Oracle Uninstantiability from Indistinguishability Obfuscation
- Christina Brzuska and Pooya Farshim and Arno Mittelbach
-
2014/866 ( -- withdrawn -- )
- Self-Destruct Non-Malleability
- Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi
-
2014/865 ( PDF )
- Impossibility of Black-Box Simulation Against Leakage Attacks
- Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
-
2014/864 ( PDF )
- How to Choose Interesting Points for Template Attacks More Effectively
- Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
-
2014/863 ( PDF )
- A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
- Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou
-
2014/860 ( PDF )
- Differential Factors: Improved Attacks on SERPENT
- Cihangir Tezcan and Ferruh Özbudak
-
2014/859 ( -- withdrawn -- )
- Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system
- SK Hafizul Islam; G. P. Biswas
-
2014/858 ( PDF )
- Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds
- Dana Dachman-Soled and Jonathan Katz and Vanishree Rao
-
2014/857 ( PDF )
- Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles
- Jonathan Katz and Andrew Miller and Elaine Shi
-
2014/854 ( PDF )
- Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
- Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
-
2014/852 ( PDF )
- Faster ECC over $\mathbb{F}_{2^{521}-1}$
- Robert Granger and Michael Scott
-
2014/850 ( PDF )
- BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates
- Markku-Juhani O. Saarinen
-
2014/847 ( PDF )
- Reflections on Slide with a Twist Attacks
- Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
-
2014/846 ( PDF )
- Verifiable computation using multiple provers
- Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish
-
2014/844 ( PDF )
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Sanjam Garg and Antigoni Polychroniadou
-
2014/842 ( PDF )
- A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
- Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran
-
2014/840 ( PDF )
- Constrained PRFs for Unbounded Inputs
- Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak
-
2014/838 ( PDF )
- SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers
- Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan
-
2014/836 ( PDF )
- A Tight Transformation between HILL and Metric Conditional Pseudoentropy
- Maciej Skorski
-
2014/834 ( PDF )
- Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
- Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman
-
2014/833 ( PDF )
- Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability
- Essam Ghadafi
-
2014/831 ( PDF )
- Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
- Jérémy Jean and Ivica Nikolić and Thomas Peyrin
-
2014/830 ( PDF )
- Adaptively Secure UC Constant Round Multi-Party Computation
- Ivan Damgĺrd and Antigoni Polychroniadou and Vanishree Rao
-
2014/829 ( PDF )
- Additively Homomorphic UC commitments with Optimal Amortized Overhead
- Ignacio Cascudo and Ivan Damgĺrd and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti
-
2014/825 ( -- withdrawn -- )
- Towards Optimal Bounds for Implicit Factorization Problem
- Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin
-
2014/822 ( PDF )
- Ballot secrecy with malicious bulletin boards
- David Bernhard and Ben Smyth
-
2014/821 ( PDF )
- Non-malleable Reductions and Applications
- Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski
-
2014/819 ( PDF )
- Riding on Asymmetry: Efficient ABE for Branching Programs
- Sergey Gorbunov and Dhinakaran Vinayagamurthy
-
2014/818 ( -- withdrawn -- )
- Circulant Matrices and Differential Privacy
- Jalaj Upadhyay
-
2014/816 ( PDF )
- FHEW: Bootstrapping Homomorphic Encryption in less than a second
- Léo Ducas and Daniele Micciancio
-
2014/815 ( PDF )
- A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves
- Palash Sarkar and Shashank Singh
-
2014/810 ( PDF )
- Simulation-Based Secure Functional Encryption in the Random Oracle Model
- Vincenzo Iovino and Karol Zebrowski
-
2014/809 ( PDF )
- Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
- Ignacio Cascudo and Ivan Damgĺrd and Oriol Farràs and Samuel Ranellucci
-
2014/807 ( PDF )
- Leakage-resilient non-malleable codes
- Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski
-
2014/805 ( PDF )
- Dual-System Simulation-Soundness with Applications to UC-PAKE and More
- Charanjit S. Jutla and Arnab Roy
-
2014/804 ( PDF )
- Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions
- Jacob Alperin-Sheriff
-
2014/803 ( PDF )
- A Decentralized Public Key Infrastructure with Identity Retention
- Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
-
2014/800 ( PDF )
- Efficient Pairings and ECC for Embedded Systems
- Thomas Unterluggauer and Erich Wenger
-
2014/799 ( PDF )
- Verifiable Random Functions from Weaker Assumptions
- Tibor Jager
-
2014/798 ( PDF )
- Multi-Identity and Multi-Key Leveled FHE from Learning with Errors
- Michael Clear and Ciarán McGoldrick
-
2014/797 ( PDF )
- Tightly-Secure Authenticated Key Exchange
- Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li
-
2014/796 ( PDF )
- Distributed Cryptography Based on the Proofs of Work
- Marcin Andrychowicz and Stefan Dziembowski
-
2014/795 ( PDF )
- SPHINCS: practical stateless hash-based signatures
- Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Michael Schneider and Peter Schwabe and Zooko Wilcox-O'Hearn
-
2014/792 ( PDF )
- General Overview of the First-Round CAESAR Candidates for Authenticated Encryption
- {Farzaneh Abed, Christian Forler, Stefan Lucks
-
2014/789 ( PDF )
- Statistical Properties of the Square Map Modulo a Power of Two
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha
-
2014/786 ( PDF )
- On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
- Chun Guo and Dongdai Lin
-
2014/785 ( PDF )
- Divisible E-Cash Made Practical
- Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré
-
2014/781 ( PDF )
- Tally-based simple decoders for traitor tracing and group testing
- Boris Skoric
-
2014/780 ( PDF )
- Deterministic Public-Key Encryption under Continual Leakage
- Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters
-
2014/779 ( PDF )
- Implementing Cryptographic Program Obfuscation
- Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
-
2014/771 ( PDF )
- Succinct Randomized Encodings and their Applications
- Nir Bitansky and Sanjam Garg and Sidharth Telang
-
2014/767 ( PDF )
- Algebraic Attacks on Human Identification Protocols
- Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk
-
2014/765 ( PDF )
- The Bitcoin Backbone Protocol: Analysis and Applications
- Juan Garay and Aggelos Kiayias and Nikos Leonardos
-
2014/762 ( PDF )
- Access Control in Publicly Verifiable Outsourced Computation
- James Alderman and Christian Janson and Carlos Cid and Jason Crampton
-
2014/760 ( PDF )
- Montgomery Modular Multiplication on ARM-NEON Revisited
- Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, and Howon Kim
-
2014/759 ( PDF )
- How to Efficiently Evaluate RAM Programs with Malicious Security
- Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek
-
2014/757 ( PDF )
- Adaptively Secure Broadcast Encryption with Small System Parameters
- Mark Zhandry
-
2014/756 ( PDF )
- Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
- Samee Zahur and Mike Rosulek and David Evans
-
2014/754 ( PDF )
- Bilinear Entropy Expansion from the Decisional Linear Assumption
- Lucas Kowalczyk and Allison Bishop Lewko
-
2014/748 ( PDF )
- Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
- Mehmet Sabır Kiraz and Osmanbey Uzunkol
-
2014/747 ( PDF )
- Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
- Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
-
2014/744 ( PDF )
- Sieving for shortest vectors in lattices using angular locality-sensitive hashing
- Thijs Laarhoven
-
2014/740 ( -- withdrawn -- )
- Non-existence of [n; 5] type Generalized Bent function.
- Shashi Kant Pandey and P.R Mishra and B.K Dass
-
2014/733 ( PDF )
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann
-
2014/732 ( PDF )
- Resizable Tree-Based Oblivious RAM
- Tarik Moataz and Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
-
2014/730 ( PDF )
- Differentially Private Linear Algebra in the Streaming Model
- Jalaj Upadhyay
-
2014/728 ( PDF )
- Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
- Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson
-
2014/725 ( PDF )
- Efficient Software Implementation of Ring-LWE Encryption
- Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
-
2014/724 ( PDF )
- Protecting Encrypted Cookies from Compression Side-Channel Attacks
- Janaka Alawatugoda and Douglas Stebila and Colin Boyd
-
2014/720 ( PDF )
- Adaptively Secure Constrained Pseudorandom Functions
- Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters
-
2014/719 ( PDF )
- Bivariate Polynomials Modulo Composites and their Applications
- Dan Boneh and Henry Corrigan-Gibbs
-
2014/717 ( PDF )
- How to Split a Secret into Unknown Shares
- Ruxandra F. Olimid
-
2014/710 ( PDF )
- An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
- Yehuda Lindell
-
2014/706 ( PDF )
- The Feasibility of Outsourced Database Search in the Plain Model
- Carmit Hazay and Hila Zarosim
-
2014/705 ( PDF )
- Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
- Christian Hanser and Daniel Slamanig
-
2014/704 ( PDF )
- A 128-bit Block Cipher Based on Three Group Arithmetics
- Shenghui Su and Shuwang Lü and Daqiang Dong
-
2014/698 ( PDF )
- HIMMO - A lightweight collusion-resistant key predistribution scheme
- Oscar Garcia-Morchon and Domingo Gomez-Perez and Jaime Gutierrez and Ronald Rietman and Berry Schoenmakers and Ludo Tolhuizen
-
2014/695 ( PDF )
- Proof of Proximity of Knowledge
- Serge Vaudenay
-
2014/693 ( PDF )
- Optimal Proximity Proofs
- Ioana Boureanu and Serge Vaudenay
-
2014/686 ( PDF )
- A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications
- Ming Li and Dongdai Lin
-
2014/685 ( PDF )
- Bit Security of the CDH Problems over Finite Field
- Mingqiang Wang and Tao Zhan and Haibin Zhang
-
2014/681 ( PDF )
- Improved Linear Cryptanalysis of Reduced-round SIMON
- Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, and Martin M. Lauridsen
-
2014/674 ( PDF )
- Efficient RAM and control flow in verifiable outsourced computation
- Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish
-
2014/672 ( PDF )
- Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
- Xiao Wang and Hubert Chan and Elaine Shi
-
2014/666 ( PDF )
- Fully Secure Functional Encryption without Obfuscation
- Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry
-
2014/662 ( PDF )
- Outsourced Pattern Matching
- Sebastian Faust and Carmit Hazay and Daniele Venturi
-
2014/656 ( PDF )
- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
- Itai Dinur
-
2014/653 ( PDF )
- Mersenne factorization factory
- Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra
-
2014/652 ( PDF )
- A Dynamic Cube Attack on $105$ round Grain v1
- Subhadeep Banik
-
2014/649 ( PDF )
- FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
- Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar
-
2014/645 ( PDF )
- Graph-Induced Multilinear Maps from Lattices
- Craig Gentry and Sergey Gorbunov and Shai Halevi
-
2014/641 ( PDF )
- The Multiple Number Field Sieve with Conjugation Method
- Cécile Pierrot
-
2014/640 ( PDF )
- Revocation in Publicly Verifiable Outsourced Computation
- James Alderman and Christian Janson and Carlos Cid and Jason Crampton
-
2014/638 ( PDF )
- Substring-Searchable Symmetric Encryption
- Melissa Chase and Emily Shen
-
2014/637 ( PDF )
- Generic Hardness of the Multiple Discrete Logarithm Problem
- Aaram Yun
-
2014/635 ( PDF )
- Type 2 Structure-Preserving Signature Schemes Revisited
- Sanjit Chatterjee and Alfred Menezes
-
2014/632 ( PDF )
- Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge
- Esha Ghosh and Olga Ohrimenko and Roberto Tamassia
-
2014/631 ( PDF )
- Zipf’s Law in Passwords
- Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
-
2014/630 ( PDF )
- Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation
- Peeter Laud
-
2014/629 ( PDF )
- Two-factor authentication for the Bitcoin protocol
- Christopher Mann and Daniel Loebenberger
-
2014/627 ( PDF )
- On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
- Debrup Chakraborty and Palash Sarkar
-
2014/624 ( PDF )
- KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
- Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao
-
2014/623 ( PDF )
- Privacy with Imperfect Randomness
- Yevgeniy Dodis and Yanqing Yao
-
2014/620 ( PDF )
- The M3dcrypt Password Hashing Function
- Isaiah Makwakwa
-
2014/617 ( PDF )
- ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
- Michael Backes and Manuel Barbosa and Dario Fiore and Raphael M. Reischuk
-
2014/616 ( PDF )
- Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
- Zhen Liu and Duncan S. Wong
-
2014/612 ( PDF )
- Attribute-Based Encryption Optimized for Cloud Computing
- Máté Horváth
-
2014/609 ( PDF )
- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/605 ( PDF )
- On the Possibilities and Limitations of Computational Fuzzy Extractors
- Kenji Yasunaga and Kosuke Yuzawa
-
2014/604 ( PDF )
- Private Web Search with Constant Round Efficiency
- Bolam Kang and Sung Cheol Goh and Myungsun Kim
-
2014/603 ( PDF )
- Recursive Trees for Practical ORAM
- Tarik Moataz and Erik-Oliver Blass and Guevara Noubir
-
2014/600 ( -- withdrawn -- )
- DTKI: a new formalized PKI with no trusted parties
- Jiangshan Yu and Vincent Cheval and Mark Ryan
-
2014/599 ( PDF )
- Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
- Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila
-
2014/598 ( PDF )
- Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge
- Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi
-
2014/595 ( PDF )
- Scalable Zero Knowledge via Cycles of Elliptic Curves
- Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
-
2014/594 ( PDF )
- Oblivious Parallel RAM and Applications
- Elette Boyle and Kai-Min Chung and Rafael Pass
-
2014/593 ( PDF )
- Improved Exponential-time Algorithms for Inhomogeneous-SIS
- Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield
-
2014/588 ( PDF )
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Brent Waters
-
2014/583 ( PDF )
- Template Attacks Based On Priori Knowledge
- Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
-
2014/582 ( PDF )
- NSEC5: Provably Preventing DNSSEC Zone Enumeration
- Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv
-
2014/581 ( PDF )
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Olivier Blazy and Eike Kiltz and Jiaxin Pan
-
2014/576 ( PDF )
- Vernam Two
- Dan P. Milleville
-
2014/575 ( PDF )
- Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
- Markku-Juhani O. Saarinen
-
2014/571 ( PDF )
- How to manipulate curve standards: a white paper for the black hat
- Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal
-
2014/565 ( PDF )
- Kangaroos in Side-Channel Attacks
- Tanja Lange and Christine van Vredendaal and Marnix Wakker
-
2014/564 ( -- withdrawn -- )
- A Security Definition for Multi Secret Sharing and a Scheme Based on LWE
- Massoud Hadian Dehkordi and Reza Ghasemi
-
2014/562 ( PDF )
- hHB: a Harder HB+ Protocol
- Ka Ahmad Khoureich
-
2014/560 ( PDF )
- Towards Forward Security Properties for PEKS and IBE
- Qiang Tang
-
2014/559 ( PDF )
- Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA
- Pablo Rauzy and Sylvain Guilley
-
2014/555 ( PDF )
- General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
- Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges
-
2014/553 ( PDF )
- A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
- Ran Canetti and Asaf Cohen and Yehuda Lindell
-
2014/550 ( PDF )
- Function-Private Functional Encryption in the Private-Key Setting
- Zvika Brakerski and Gil Segev
-
2014/547 ( PDF )
- Authentication Codes Based on Resilient Boolean Maps
- Juan Carlos Ku-Cauich and Guillermo Morales-Luna
-
2014/546 ( PDF )
- Anonymous and Publicly Linkable Reputation Systems
- Johannes Blömer and Jakob Juhnke and Christina Kolb
-
2014/543 ( PDF )
- A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
- Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert
-
2014/538 ( -- withdrawn -- )
- A Secure Cloud-based NFC Mobile Payment Protocol
- pardis pourghomi and muhammad qasim saeed and george ghinea
-
2014/532 ( -- withdrawn -- )
- On the Pitfalls of using Arbiter-PUFs as Building Blocks
- Georg T. Becker
-
2014/531 ( PDF )
- Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
- Paolo Palmieri and Luca Calderoni and Dario Maio
-
2014/530 ( PDF )
- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison
- Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap
-
2014/527 ( PDF )
- Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory
- Annelie Heuser and Olivier Rioul and Sylvain Guilley
-
2014/521 ( PDF )
- Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
- Susan Hohenberger and Venkata Koppula and Brent Waters
-
2014/520 ( PDF )
- Squares of Random Linear Codes
- Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Zémor
-
2014/517 ( PDF )
- On the Connection between Leakage Tolerance and Adaptive Security
- Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel
-
2014/515 ( -- withdrawn -- )
- Ideal Social Secret Sharing Using Birkhoff Interpolation Method
- Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian
-
2014/514 ( PDF )
- On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
- Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili
-
2014/512 ( PDF )
- Rmind: a tool for cryptographically secure statistical analysis
- Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk
-
2014/507 ( PDF )
- How to Generate and use Universal Samplers
- Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry
-
2014/504 ( PDF )
- A Provable Security Analysis of Intel's Secure Key RNG
- Thomas Shrimpton and R. Seth Terashima
-
2014/501 ( PDF )
- WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time
- Markku--Juhani O. Saarinen and Billy Bob Brumley
-
2014/500 ( -- withdrawn -- )
- Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application
- Can Xiang and Chunming Tang
-
2014/499 ( PDF )
- Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
- Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş
-
2014/497 ( PDF )
- NREPO:Normal Basis Recomputing with Permuted Operands
- Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin and Ramesh Karri
-
2014/494 ( PDF )
- Hardness of k-LWE and Applications in Traitor Tracing
- San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld
-
2014/493 ( PDF )
- Arithmetic on Abelian and Kummer Varieties
- David Lubicz and Damien Robert
-
2014/491 ( PDF )
- Bootstrappable Identity-Based Fully Homomorphic Encryption
- Michael Clear and Ciarán McGoldrick
-
2014/488 ( PDF )
- Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
- Michel Abdalla and Fabrice Benhamouda and Alain Passelčgue and Kenneth G. Paterson
-
2014/485 ( PDF )
- An Improved Truncated Differential Cryptanalysis of KLEIN
- Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref
-
2014/483 ( PDF )
- Disjunctions for Hash Proof Systems: New Constructions and Applications
- Michel Abdalla and Fabrice Benhamouda and David Pointcheval
-
2014/480 ( PDF )
- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
- Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
-
2014/479 ( PDF )
- Even more practical secure logging: Tree-based Seekable Sequential Key Generators
- Giorgia Azzurra Marson and Bertram Poettering
-
2014/478 ( PDF )
- Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
- Benny Applebaum and Eyal Widder
-
2014/473 ( -- withdrawn -- )
- An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
- Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
-
2014/472 ( PDF )
- How to Watermark Cryptographic Functions
- Ryo Nishimaki
-
2014/471 ( -- withdrawn -- )
- Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
- Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin
-
2014/464 ( PDF )
- Providing Root of Trust for ARM TrustZone using On-Chip SRAM
- Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng
-
2014/451 ( PDF )
- Leveled Fully Homomorphic Signatures from Standard Lattices
- Daniel Wichs
-
2014/448 ( PDF )
- Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
- Ning Wang and Xiaoyun Wang and Keting Jia and Jingyuan Zhao
-
2014/445 ( PDF )
- Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
- Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Rŕfols and Andy Rupp
-
2014/443 ( PDF )
- Minimizing the Two-Round Even-Mansour Cipher
- Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger
-
2014/438 ( PDF )
- Security of Symmetric Encryption against Mass Surveillance
- Mihir Bellare and Kenneth Paterson and Phillip Rogaway
-
2014/435 ( PDF )
- Wait a minute! A fast, Cross-VM attack on AES
- Gorka Irazoqui and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar
-
2014/434 ( PDF )
- Just a Little Bit More
- Joop van de Pol and Nigel P. Smart and Yuval Yarom
-
2014/431 ( PDF )
- Tiny ORAM: A Low-Latency, Low-Area Hardware ORAM Controller
- Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten Van Dijk and Emil Stefanov and Srinivas Devadas
-
2014/428 ( PDF )
- Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
- Nuttapong Attrapadung
-
2014/426 ( PDF )
- Towards Optimally Efficient Secret-Key Authentication from PRG
- Ivan Damgård and Sunoo Park
-
2014/416 ( PDF )
- Adaptive Security of Constrained PRFs
- Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao
-
2014/412 ( PDF )
- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
- François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Jean-Baptiste Mairy and Yves Deville
-
2014/405 ( PDF )
- Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
- Christina Brzuska and Arno Mittelbach
-
2014/397 ( PDF )
- Cofactorization on Graphics Processing Units
- Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra
-
2014/395 ( PDF )
- Lightweight and Privacy-Preserving Delegatable Proofs of Storage
- Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong
-
2014/394 ( PDF )
- Relational Hash
- Avradip Mandal and Arnab Roy
-
2014/393 ( PDF )
- (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
- Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
-
2014/392 ( PDF )
- The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions
- Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
-
2014/386 ( PDF )
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
- Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede
-
2014/381 ( PDF )
- Using Indistinguishability Obfuscation via UCEs
- Christina Brzuska and Arno Mittelbach
-
2014/376 ( PDF )
- How Secure is Deterministic Encryption?
- Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi
-
2014/370 ( PDF )
- Compact VSS and Efficient Homomorphic UC Commitments
- Ivan Damgĺrd and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen
-
2014/367 ( PDF )
- Redefining the Transparency Order
- Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff
-
2014/364 ( PDF )
- Deleting Secret Data with Public Verifiability
- Feng Hao and Dylan Clarke and Avelino Francisco Zorzo
-
2014/343 ( PDF )
- Solving Linear Equations Modulo Unknown Divisors: Revisited
- Yao Lu and Rui Zhang and Liqiang Peng and Dongdai Lin
-
2014/342 ( PDF )
- Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
- Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer
-
2014/339 ( -- withdrawn -- )
- Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds
- Yi Deng
-
2014/338 ( PDF )
- A Tamper and Leakage Resilient von Neumann Architecture
- Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi
-
2014/334 ( PDF )
- LCPR: High Performance Compression Algorithm for Lattice-Based Signatures
- Rachid El~Bansarkhani and Johannes Buchmann
-
2014/333 ( PDF )
- An optimal representation for the trace zero subgroup
- Elisa Gorla and Maike Massierer
-
2014/332 ( PDF )
- How to Choose Interesting Points for Template Attacks?
- Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng
-
2014/331 ( PDF )
- Machine Learning Classification over Encrypted Data
- Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser
-
2014/324 ( PDF )
- From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
- Sandro Coretti and Ueli Maurer and Björn Tackmann and Daniele Venturi
-
2014/318 ( PDF )
- Index calculus in the trace zero variety
- Elisa Gorla and Maike Massierer
-
2014/310 ( PDF )
- Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
- Yu Chen and Qiong Huang and Zongyang Zhang
-
2014/309 ( PDF )
- Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
- Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters
-
2014/306 ( PDF )
- Publicly Evaluable Pseudorandom Functions and Their Applications
- Yu Chen and Zongyang Zhang
-
2014/301 ( PDF )
- How to Avoid Obfuscation Using Witness PRFs
- Mark Zhandry
-
2014/295 ( PDF )
- ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
- Nir Bitansky and Omer Paneth
-
2014/283 ( PDF )
- Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
- Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie
-
2014/278 ( PDF )
- Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
- Essam Ghadafi
-
2014/271 ( PDF )
- STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
- Markku-Juhani O. Saarinen
-
2014/270 ( PDF )
- Faster Maliciously Secure Two-Party Computation Using the GPU
- Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen
-
2014/268 ( PDF )
- New bit-parallel Montgomery multiplier for trinomials using squaring operation
- Yin Li and Yiyang Chen
-
2014/264 ( PDF )
- Continuous After-the-fact Leakage-Resilient Key Exchange (full version)
- Janaka Alawatugoda and Colin Boyd and Douglas Stebila
-
2014/257 ( PDF )
- Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem
- Bruce Kallick
-
2014/256 ( PDF )
- Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
- Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
-
2014/254 ( PDF )
- Enhanced Lattice-Based Signatures on Reconfigurable Hardware
- Thomas Pöppelmann and Léo Ducas and Tim Güneysu
-
2014/250 ( PDF )
- Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
- Boaz Tsaban and Noam Lifshitz
-
2014/243 ( PDF )
- Key Derivation From Noisy Sources With More Errors Than Entropy
- Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam Smith
-
2014/242 ( PDF )
- Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
- Franziskus Kiefer and Mark Manulis
-
2014/238 ( PDF )
- High Parallel Complexity Graphs and Memory-Hard Functions
- Joël Alwen and Vladimir Serbinenko
-
2014/231 ( PDF )
- Self-Updatable Encryption with Short Public Parameters and Its Extensions
- Kwangsu Lee
-
2014/230 ( PDF )
- Isogeny graphs with maximal real multiplication
- Sorina Ionica and Emmanuel Thomé
-
2014/228 ( PDF )
- Cryptanalysis of SP Networks with Partial Non-Linear Layers
- Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban
-
2014/224 ( PDF )
- Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices
- Henry Carter and Charles Lever and Patrick Traynor
-
2014/221 ( PDF )
- Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
- Toomas Krips and Jan Willemson
-
2014/220 ( PDF )
- Total Break of Zorro using Linear and Differential Attacks
- Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2014/216 ( PDF )
- Implementation and Improvement of the Partial Sum Attack on 6-round AES
- Francesco Aldŕ and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala
-
2014/213 ( PDF )
- Secret-Sharing for NP
- Ilan Komargodski and Moni Naor and Eylon Yogev
-
2014/203 ( PDF )
- Privacy-Preserving Implicit Authentication
- Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti
-
2014/202 ( PDF )
- Efficiently Verifiable Computation on Encrypted Data
- Dario Fiore and Rosario Gennaro and Valerio Pastro
-
2014/193 ( PDF )
- JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
- Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri
-
2014/185 ( PDF )
- Oblivious Data Structures
- Xiao Shaun Wang and Kartik Nayak and Chang Liu and T-H. Hubert Chan and Elaine Shi and Emil Stefanov and Yan Huang
-
2014/156 ( PDF )
- Non-Malleable Extractors with Shorter Seeds and Their Applications
- Yanqing Yao and Zhoujun Li
-
2014/147 ( PDF )
- The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
- Razvan Barbulescu and Cécile Pierrot
-
2014/141 ( -- withdrawn -- )
- Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps
- Hao Wang
-
2014/134 ( PDF )
- Kummer strikes back: new DH speed records
- Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe
-
2014/130 ( PDF )
- Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis
- Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig
-
2014/124 ( PDF )
- On the Information Ratio of Non-Perfect Secret Sharing Schemes
- Oriol Farrŕs and Torben Hansen and Tarik Kaced and Carles Padró
-
2014/114 ( PDF )
- Prover Anonymous and Deniable Distance-Bounding Authentication
- Sebastien Gambs and Cristina Onete and Jean-Marc Robert
-
2014/102 ( PDF )
- Actively Secure Private Function Evaluation
- Payman Mohassel and Saeed Sadeghian and Nigel P. Smart
-
2014/097 ( PDF )
- A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups
- Koji Nuida
-
2014/091 ( PDF )
- On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad
-
2014/087 ( PDF )
- AnoA: A Framework For Analyzing Anonymous Communication Protocols
- Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi
-
2014/084 ( PDF )
- RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
- Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede
-
2014/071 ( PDF )
- Implementing Pairing-Based Cryptosystems in USB Tokens
- Zhaohui Cheng
-
2014/067 ( PDF )
- Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
- Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey
-
2014/065 ( PDF )
- Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case
- Palash Sarkar and Shashank Singh
-
2014/059 ( PDF )
- Cuckoo Cycle: a memory bound graph-theoretic proof-of-work
- John Tromp
-
2014/057 ( PDF )
- Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma
- Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez
-
2014/056 ( PDF )
- Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
- Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang
-
2014/051 ( PDF )
- An Equivalence-Preserving Transformation of Shift Registers
- Elena Dubrova
-
2014/041 ( PDF )
- Cryptanalysis via algebraic spans
- Adi Ben-Zvi and Arkadius Kalka and Boaz Tsaban
-
2014/037 ( PDF )
- On the Security of the Pre-Shared Key Ciphersuites of TLS
- Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk
-
2014/028 ( PDF )
- Channel Equalization for Side Channel Attacks
- Colin O'Flynn and Zhizhang (David) Chen
-
2014/020 ( PDF )
- (De-)Constructing TLS
- Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi
-
2014/014 ( PDF )
- Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
- Felix Günther and Bertram Poettering
-
2014/011 ( PDF )
- Construction of New Families of MDS Diffusion Layers
- S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
-
2013/880 ( PDF )
- New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
- Seunghwan Park and Kwangsu Lee and Dong Hoon Lee
-
2013/879 ( PDF )
- Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture
- Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza
-
2013/876 ( PDF )
- Public-Key Encryption with Lazy Parties
- Kenji Yasunaga
-
2013/874 ( PDF )
- General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
- Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga
-
2013/872 ( -- withdrawn -- )
-
-
-
2013/871 ( PDF )
- A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities
- Weiqiang Wen and Libin Wang and Jiaxin Pan
-
2013/862 ( PDF )
- How to Delegate Computations: The Power of No-Signaling Proofs
- Yael Tauman Kalai and Ran Raz and Ron D. Rothblum
-
2013/852 ( PDF )
- Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
- Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang
-
2013/830 ( PDF )
- Property Preserving Symmetric Encryption Revisited
- Sanjit Chatterjee and M. Prem Laxman Das
-
2013/820 ( -- withdrawn -- )
- On the Security of Recently Proposed RFID Protocols
- Mete Akgün, M. Ufuk Çaǧlayan
-
2013/808 ( PDF )
- Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
- Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing
-
2013/796 ( PDF )
- Proofs of Space
- Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak
-
2013/744 ( PDF )
- Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results
- Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai
-
2013/729 ( PDF )
- Functional Encryption for Randomized Functionalities
- Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai
-
2013/715 ( PDF )
- Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists
- Erik-Oliver Blass and Travis Mayberry and Guevara Noubir
-
2013/704 ( PDF )
- Adaptive Witness Encryption and Asymmetric Password-based Cryptography
- Mihir Bellare and Viet Tung Hoang
-
2013/703 ( PDF )
- Limits of Extractability Assumptions with Distributional Auxiliary Input
- Elette Boyle and Rafael Pass
-
2013/677 ( PDF )
- Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
- Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
-
2013/645 ( PDF )
- FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
- Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin Küpçü and Öznur Özkasap
-
2013/625 ( PDF )
- PillarBox: Combating next-generation malware with fast forward-secure logging
- Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos
-
2013/593 ( PDF )
- Efficient One-Sided Adaptively Secure Computation
- Carmit Hazay and Arpita Patra
-
2013/559 ( PDF )
- A Definitional Framework for Functional Encryption
- Christian Matt and Ueli Maurer
-
2013/554 ( PDF )
- Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
- Pablo Rauzy and Sylvain Guilley and Zakaria Najm
-
2013/536 ( PDF )
- A Three-Level Sieve Algorithm for the Shortest Vector Problem
- Feng Zhang and Yanbin Pan and Gengran Hu
-
2013/525 ( PDF )
- Catena : A Memory-Consuming Password-Scrambling Framework
- Christian Forler and Stefan Lucks and Jakob Wenzel
-
2013/503 ( PDF )
- On secret sharing with nonlinear product reconstruction
- Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing
-
2013/487 ( PDF )
- Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition
- Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
-
2013/424 ( PDF )
- Instantiating Random Oracles via UCEs
- Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi
-
2013/398 ( PDF )
- ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
- Colin Boyd and Cas Cremers and Michčle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila
-
2013/394 ( PDF )
- A Public Key Cryptoscheme Using Bit-pair Shadows
- Shenghui Su and Shuwang Lv and Maozhi Xu
-
2013/366 ( PDF )
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
- Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin
-
2013/333 ( PDF )
- Double-authentication-preventing signatures
- Bertram Poettering and Douglas Stebila
-
2013/327 ( PDF )
- A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack
- Shenghui Su and Tao Xie and Shuwang Lv
-
2013/303 ( PDF )
- Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
- Shivam Bhasin and Claude Carlet and Sylvain Guilley
-
2013/300 ( PDF )
- A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
- Allison Lewko and Sarah Meiklejohn
-
2013/297 ( PDF )
- Improvement and Efficient Implementation of a Lattice-based Signature Scheme
- Rachid El~Bansarkhani and Johannes Buchmann
-
2013/292 ( PDF )
- A Leakage Resilient MAC
- Daniel P. Martin and Elisabeth Oswald and Martijn Stam and Marcin Wojcik
-
2013/282 ( PDF )
- Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
- Goutam Paul and Anupam Chattopadhyay
-
2013/269 ( PDF )
- CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
- Jonathan Trostle
-
2013/260 ( PDF )
- From Weak to Strong Zero-Knowledge and Applications
- Kai-Min Chung and Edward Lui and Rafael Pass
-
2013/246 ( PDF )
- A Lever Function to a New Codomain with Adequate Indeterminacy
- Shenghui Su and Maozhi Xu and Shuwang Lv
-
2013/242 ( PDF )
- AE5 Security Notions: Definitions Implicit in the CAESAR Call
- Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton
-
2013/228 ( PDF )
- Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
- Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park
-
2013/183 ( PDF )
- Practical Multilinear Maps over the Integers
- Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
-
2013/133 ( PDF )
- New Lattice Based Signature Using The Jordan Normal Form
- Hemlata Nagesh and Birendra Kumar Sharma
-
2013/127 ( PDF )
- Oblivious PAKE: Efficient Handling of Password Trials
- Franziskus Kiefer and Mark Manulis
-
2013/119 ( PDF )
- Speeding up Ate Pairing Computation in Affine Coordinates
- Duc-Phong Le and Chik How Tan
-
2013/108 ( PDF )
- Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
- Ivan Damgard and Alessandra Scafuro
-
2013/094 ( PDF )
- On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
- Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
-
2013/082 ( PDF )
- Secret Sharing, Rank Inequalities and Information Inequalities
- Sebastia Martin and Carles Padro and An Yang
-
2013/079 ( PDF )
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Yehuda Lindell
-
2013/007 ( PDF )
- A Matrix Approach for Constructing Quadratic APN Functions
- Yuyin Yu and Mingsheng Wang and Yongqiang Li
-
2012/729 ( PDF )
- On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
- Nir Bitansky and Omer Paneth
-
2012/722 ( PDF )
- Hardness Preserving Reductions via Cuckoo Hashing
- Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
-
2012/693 ( PDF )
- Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
- Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters
-
2012/692 ( PDF )
- Generic Constructions of Integrated PKE and PEKS
- Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin
-
2012/650 ( PDF )
- Formal analysis of privacy in Direct Anonymous Attestation schemes
- Ben Smyth and Mark D. Ryan and Liqun Chen
-
2012/618 ( -- withdrawn -- )
- An ultra-lightweight ID-based pairwise key establishment scheme aiming at full collusion resistance
- Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez-Perez, Jaime Gutierrez, Santos Merino del Pozo
-
2012/616 ( PDF )
- Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
- Nishanth Chandran and Sanjam Garg
-
2012/604 ( PDF )
- Leakage-Resilient Cryptography from Minimal Assumptions
- Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs
-
2012/516 ( PDF )
- Garbling XOR Gates ``For Free'' in the Standard Model
- Benny Applebaum
-
2012/511 ( PDF )
- Entangled Encodings and Data Entanglement
- Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi
-
2012/499 ( -- withdrawn -- )
- Authenticity, Integrity and Proof of Existence for Long-Term Archiving: a Survey
- Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann
-
2012/460 ( PDF )
- Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
- Yohei Watanabe and Takenobu Seito and Junji Shikata
-
2012/439 ( PDF )
- Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
- Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
-
2012/425 ( PDF )
- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
- Gautham Sekar
-
2012/379 ( PDF )
- All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments
- Eiichiro Fujisaki
-
2012/304 ( PDF )
- Actively Secure Two-Party Evaluation of any Quantum Operation
- Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail
-
2012/278 ( PS PS.GZ PDF )
- Improved Indifferentiability Security Bound for the JH Mode
- Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
-
2012/164 ( PDF )
- On Secure Two-party Integer Division
- Morten Dahl, Chao Ning, Tomas Toft
-
2012/134 ( PDF )
- A Digital Signature Scheme for Long-Term Security
- Dimitrios Poulakis and Robert Rolland
-
2012/116 ( PDF )
- Clash Attacks on the Verifiability of E-Voting Systems
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2012/099 ( PDF )
- Homomorphic Evaluation of the AES Circuit
- Craig Gentry and Shai Halevi and Nigel P. Smart
-
2012/045 ( PDF )
- Signature Schemes Secure against Hard-to-Invert Leakage
- Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel
-
2011/626 ( PDF )
- Algebraic Complexity Reduction and Cryptanalysis of GOST
- Nicolas T. Courtois
-
2011/517 ( PDF )
- Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2011/446 ( -- withdrawn -- )
- Privacy-Preserving Friend Search over Online Social Networks
- Huang Lin and Yuguang Fang and Zhenfu Cao
-
2011/445 ( -- withdrawn -- )
- Privacy-Preserving Friend Search over Online Social Networks
- Huang Lin and Sherman S. M. Chow and Dongsheng Xing and Yuguang Fang and Zhenfu Cao
-
2011/396 ( PDF )
- Fair Computation with Rational Players
- Amos Beimel and Adam Groce and Jonathan Katz and Ilan Orlov
-
2011/379 ( -- withdrawn -- )
- Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
- Miaomiao Tian and Wei Yang and Liusheng Huang
-
2010/487 ( PDF )
- Constant Round Non-Malleable Protocols using One Way Functions
- Vipul Goyal
-
2010/397 ( PDF )
- Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
- Mihir Bellare and David Cash
-
2010/374 ( PDF )
- Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees
- Zhen Liu and Zhenfu Cao and Duncan S. Wong
-
2010/284 ( PDF )
- Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
- Yehuda Lindell and Benny Pinkas
-
2010/266 ( PDF )
- Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
- Chao Ning and Qiuliang Xu
-
2010/236 ( PDF )
- Accountability: Definition and Relationship to Verifiability
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2010/212 ( PDF )
- Quantum Proofs of Knowledge
- Dominique Unruh
-
2010/199 ( PDF )
- A Framework for Fully-Simulatable $t$-out-of-$n$ Oblivious Transfer
- Bing Zeng and Christophe Tartary and Chingfang Hsu and Xueming Tang
-
2010/120 ( PDF )
- Universal One-Way Hash Functions and Average Case Complexity via Inaccessible Entropy
- Iftach Haitner and Thomas Holenstein and Omer Reingold and Salil Vadhan and Hoeteck Wee
-
2010/111 ( PDF )
- On zero practical significance of "Key recovery attack on full GOST block cipher with zero time and memory"
- Vladimir Rudskoy
-
2009/411 ( PDF )
- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
- Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
-
2009/358 ( PDF )
- MAC Precomputation with Applications to Secure Memory
- Juan A. Garay and Vladimir Kolesnikov and Rae McLellan
-
2009/214 ( PDF )
- An Optimally Fair Coin Toss
- Tal Moran and Moni Naor and Gil Segev
-
2007/109 ( PDF )
- How to Enrich the Message Space of a Cipher
- Thomas Ristenpart and Phillip Rogaway
-
2006/420 ( PDF )
- The REESSE1+ Public Key Cryptosystem v 2.21
- Shenghui Su and Shuwang Lv
-
2006/384 ( PDF )
- Design and Analysis of a Hash Ring-iterative Structure
- Shenghui Su, Yixian Yang, Bo Yang, and Shaolan Zhang
[ Cryptology ePrint archive ]