Cryptology ePrint Archive: Recent Updates
-
2015/1018 ( PDF )
- A Riddle Wrapped in an Enigma
- N. Koblitz and A. Menezes
-
2015/1017 ( PDF )
- Functional Encryption: Decentralised and Delegatable
- Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
-
2015/1016 ( PDF )
- Lifting the Security of NI-MAC Beyond Birthday Bound
- Avijit Dutta and Goutam Paul
-
2015/1015 ( PDF )
- On Bitcoin as a public randomness source
- Joseph Bonneau and Jeremy Clark and Steven Goldfeder
-
2015/1014 ( PDF )
- Fast Fourier Orthogonalization
- Léo Ducas and Thomas Prest
-
2015/1013 ( PDF )
- Inception Makes Non-malleable Codes Stronger
- Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
-
2015/1012 ( PDF )
- An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
- Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
-
2015/1011 ( PDF )
- Hierarchical Functional Encryption
- Zvika Brakerski and Gil Segev
-
2015/1010 ( PDF )
- TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
- Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
-
2015/1009 ( PDF )
- Applications of Key Recovery Cube-attack-like
- Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
-
2015/1008 ( PDF )
- Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
- Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
-
2015/1007 ( PDF )
- How to Vote Privately Using Bitcoin
- Zhichao Zhao and T-H. Hubert Chan
-
2015/1006 ( PDF )
- Confidential Benchmarking based on Multiparty Computation
- Ivan Damgård and Kasper Damgård and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
-
2015/1005 ( PDF )
- Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
- Wenbin Zhang and Chik How Tan
-
2015/1004 ( PDF )
- Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
- Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
-
2015/1003 ( PDF )
- Results on polynomial interpolation with mixed modular operations and unknown moduli
- Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
-
2015/1002 ( PDF )
- got HW crypto? On the (in)security of a Self-Encrypting Drive series
- Gunnar Alendal and Christian Kison and modg
-
2015/1001 ( PDF )
- Dismantling real-world ECC with Horizontal and Vertical Template Attacks
- Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
-
2015/1000 ( PDF )
- Factoring as a Service
- Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
-
2015/998 ( PDF )
- All or Nothing at All
- Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
-
2015/997 ( PDF )
- Incremental Program Obfuscation
- Sanjam Garg and Omkant Pandey
-
2015/994 ( -- withdrawn -- )
- An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
- Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
-
2015/983 ( PDF )
- Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
- Ping Ngai Chung and Craig Costello and Benjamin Smith
-
2015/979 ( PDF )
- Guidelines for Using the CryptDB System Securely
- Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
-
2015/964 ( PDF )
- Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
- Danping Shi and Lei Hu and Siwei Sun and Ling Song
-
2015/830 ( PDF )
- Unique Signature with Short Output from CDH Assumption
- Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
-
2015/810 ( PDF )
- Improved OR Composition of Sigma-Protocols
- Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
-
2015/797 ( PDF )
- What Security can we Achieve in 4-Rounds?
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2015/750 ( PDF )
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
- Ryo Nishimaki and Daniel Wichs and Mark Zhandry
-
2015/735 ( PDF )
- Cutting-Edge Cryptography Through the Lens of Secret Sharing
- Ilan Komargodski and Mark Zhandry
-
2015/730 ( PDF )
- Indistinguishability Obfuscation from Functional Encryption for Simple Functions, And a New Bootstrapping Theorem for iO
- Prabhanjan Ananth and Abhishek Jain and Amit Sahai
-
2015/680 ( PDF )
- Indifferentiability of Confusion-Diffusion Networks
- Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
-
2015/548 ( PDF )
- Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
- Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
-
2015/520 ( PDF )
- A Constant Time, Single Round, Attribute-Based Authenticated Key Exchange in Random Oracle Model
- Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
-
2015/363 ( PDF )
- Optimally Secure Tweakable Blockciphers
- Bart Mennink
-
2015/266 ( PDF )
- GRECS: Graph Encryption for Approximate Shortest Distance Queries
- Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
-
2015/121 ( PDF )
- Multi-Client Oblivious RAM secure against Malicious Servers
- Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
-
2015/053 ( PDF )
- Tight Bounds for Keyed Sponges and Truncated CBC
- Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
-
2015/040 ( PDF )
- Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
- Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
-
2014/704 ( PDF )
- A 128-bit Block Cipher Based on Three Group Arithmetics
- Shenghui Su and Shuwang Lü and Daqiang Dong
-
2014/426 ( PDF )
- Towards Optimally Efficient Secret-Key Authentication from PRG
- Ivan Damgård and Sunoo Park
-
2014/202 ( PDF )
- Efficiently Verifiable Computation on Encrypted Data
- Dario Fiore and Rosario Gennaro and Valerio Pastro
-
2014/147 ( PDF )
- The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
- Razvan Barbulescu and Cécile Pierrot
-
2014/114 ( PDF )
- Prover Anonymous and Deniable Distance-Bounding Authentication
- Sebastien Gambs and Cristina Onete and Jean-Marc Robert
-
2012/722 ( PDF )
- Hardness Preserving Reductions via Cuckoo Hashing
- Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
-
2012/164 ( PDF )
- On Secure Two-party Integer Division
- Morten Dahl, Chao Ning, Tomas Toft
[ Cryptology ePrint archive ]