Cryptology ePrint Archive: Recent Updates

2017/674 ( PDF )
Transparent Memory Encryption and Authentication
Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard
2017/673 ( PDF )
Differential Fault Analysis Automation
Sayandeep Saha, and Ujjawal Kumar, and Debdeep Mukhopadhyay, and Pallab Dasgupta
2017/672 ( PDF )
Coding for interactive communication beyond threshold adversaries
Anat Paskin-Cherniavsky and Slava Radune
2017/671 ( PDF )
Guru: Universal Reputation Module for Distributed Consensus Protocols
Alex Biryukov and Daniel Feher and Dmitry Khovratovich
2017/670 ( PDF )
Private Set Intersection for Unequal Set Sizes with Mobile Applications
Ágnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas
2017/669 ( PDF )
Speeding up Elliptic Curve Scalar Multiplication without Precomputation
Kwang Ho Kim and Junyop Choe and Song Yun Kim and Namsu Kim and Sekung Hong
2017/668 ( PDF )
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
Sikhar Patranabis and Debdeep Mukhopadhyay
2017/667 ( PDF )
High-speed key encapsulation from NTRU
Andreas Hülsing and Joost Rijneveld and John Schanck and Peter Schwabe
2017/666 ( PDF )
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
Katriel Cohn-Gordon and Cas Cremers and Luke Garratt and Jon Millican and Kevin Milner
2017/665 ( PDF )
Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
Michael Raskin
2017/664 ( PDF )
Message Franking via Committing Authenticated Encryption
Paul Grubbs and Jiahui Lu and Thomas Ristenpart
2017/663 ( PDF )
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Thomas Unterluggauer and Mario Werner and Stefan Mangard
2017/662 ( PDF )
A new signature scheme based on (U|U+V) codes
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2017/661 ( PDF )
MuSE: Multimodal Searchable Encryption for Cloud Applications
Bernardo Ferreira and João Leitão and Henrique Domingos
2017/660 ( PDF )
Profiling Good Leakage Models For Masked Implementations
Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou
2017/659 ( PDF )
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
Russell W. F. Lai and Sherman S. M. Chow
2017/658 ( PDF )
Privacy for Targeted Advertising
Avradip Mandal and John Mitchell and Hart Montgomery and Arnab Roy
2017/657 ( PDF )
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Sanjit Chatterjee and Sayantan Mukherjee and Tapas Pandit
2017/656 ( PDF )
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
Lei Fan and Hong-Sheng Zhou
2017/655 ( PDF )
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
Jiao Hu and Ruilin Li and Chaojing Tang
2017/654 ( PDF )
A Secure and Private Billing Protocol for Smart Metering
Tom Eccles and Basel Halak
2017/653 ( PDF )
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
Fanbao Liu and Fengmei Liu
2017/651 ( -- withdrawn -- )
Rescuing LoRaWAN 1.0
Gildas Avoine and Loïc Ferreira
2017/647 ( PDF )
A TMDTO Attack Against Lizard
Subhamoy Maitra and Nishant Sinha and Akhilesh Siddhanti and Ravi Anand and Sugata Gangopadhyay
2017/642 ( PDF )
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
Nasrollah Pakniat and Mahnaz Noroozi and Ziba Eslami
2017/641 ( PDF )
Integer Version of Ring-LWE and its Applications
Gu Chunsheng
2017/640 ( PDF )
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
Fabrice Benhamouda and Houda Ferradi and Rémi Géraud and David Naccache
2017/635 ( PDF )
PERUN: Virtual Payment Channels over Cryptographic Currencies
Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski
2017/614 ( PDF )
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
Mathias Wagner and Stefan Heyse
2017/577 ( PDF )
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
Steffen Schulz and André Schaller and Florian Kohnhäuser and Stefan Katzenbeisser
2017/564 ( PDF )
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
Manaar Alam and Sarani Bhattacharya and Debdeep Mukhopadhyay and Sourangshu Bhattacharya
2017/542 ( PDF )
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart
2017/507 ( PDF )
Inverted Leftover Hash Lemma
Maciej Obremski and Maciej Skórski
2017/496 ( PDF )
Modes of Operation Suitable for Computing on Encrypted Data
Dragos Rotaru and Nigel P. Smart and Martijn Stam
2017/424 ( PDF )
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
Markku-Juhani O. Saarinen
2017/367 ( PDF )
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity
Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, and Yu Long
2017/350 ( PDF )
The Montgomery ladder on binary elliptic curves
Thomaz Oliveira and Julio López and Francisco Rodríguez-Henríquez
2017/150 ( PDF )
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
Elette Boyle and Niv Gilboa and Yuval Ishai
2017/140 ( PDF )
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Nina Bindel and Johannes Buchmann and Florian Göpfert and Markus Schmidt
2017/137 ( PDF )
Modifying an Enciphering Scheme after Deployment
Paul Grubbs and Thomas Ristenpart and Yuval Yarom
2017/115 ( PDF )
An efficient self-blindable attribute-based credential scheme
Sietse Ringers and Eric Verheul and Jaap-Henk Hoepman
2017/081 ( PDF )
Estonian Voting Verification Mechanism Revisited Again
Ivo Kubjas and Tiit Pikma and Jan Willemson
2016/1152 ( PDF )
Leak Me If You Can: Does TVLA Reveal Success Rate?
Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Sikhar Patranabis and Debdeep Mukhopadhyay
2016/1126 ( PDF )
Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR
Jung Hee Cheon and Duhyeong Kim and Joohee Lee and Yongsoo Song
2016/1105 ( PDF )
Generic Transformations of Predicate Encodings: Constructions and Applications
Miguel Ambrona and Gilles Barthe and Benedikt Schmidt
2016/1061 ( PDF )
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
Joan Daemen
2016/564 ( PDF )
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
Mihir Bellare and Bjoern Tackmann
2016/545 ( PDF )
On Trees, Chains and Fast Transactions in the Blockchain
Aggelos Kiayias and Giorgos Panagiotakos
2016/421 ( PDF )
Homomorphic Encryption for Arithmetic of Approximate Numbers
Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song
2016/209 ( PDF )
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song and Zhangjie Huang and Qianqian Yang
2015/806 ( PDF )
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers
Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti
2013/845 ( PDF )
How to Keep a Secret: Leakage Deterring Public-key Cryptography
Aggelos Kiayias and Qiang Tang
2013/183 ( PDF )
Practical Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi


[ Cryptology ePrint archive ]