Cryptology ePrint Archive: Recent Updates

2015/1018 ( PDF )
A Riddle Wrapped in an Enigma
N. Koblitz and A. Menezes
2015/1017 ( PDF )
Functional Encryption: Decentralised and Delegatable
Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai
2015/1016 ( PDF )
Lifting the Security of NI-MAC Beyond Birthday Bound
Avijit Dutta and Goutam Paul
2015/1015 ( PDF )
On Bitcoin as a public randomness source
Joseph Bonneau and Jeremy Clark and Steven Goldfeder
2015/1014 ( PDF )
Fast Fourier Orthogonalization
Léo Ducas and Thomas Prest
2015/1013 ( PDF )
Inception Makes Non-malleable Codes Stronger
Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
2015/1012 ( PDF )
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks
Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan
2015/1011 ( PDF )
Hierarchical Functional Encryption
Zvika Brakerski and Gil Segev
2015/1010 ( PDF )
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption
Sanjam Garg and Payman Mohassel and Charalampos Papamanthou
2015/1009 ( PDF )
Applications of Key Recovery Cube-attack-like
Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
2015/1008 ( PDF )
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges
Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh
2015/1007 ( PDF )
How to Vote Privately Using Bitcoin
Zhichao Zhao and T-H. Hubert Chan
2015/1006 ( PDF )
Confidential Benchmarking based on Multiparty Computation
Ivan Damgård and Kasper Damgård and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft
2015/1005 ( PDF )
Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces
Wenbin Zhang and Chik How Tan
2015/1004 ( PDF )
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices
Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi
2015/1003 ( PDF )
Results on polynomial interpolation with mixed modular operations and unknown moduli
Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen
2015/1002 ( PDF )
got HW crypto? On the (in)security of a Self-Encrypting Drive series
Gunnar Alendal and Christian Kison and modg
2015/1001 ( PDF )
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond
2015/1000 ( PDF )
Factoring as a Service
Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger
2015/998 ( PDF )
All or Nothing at All
Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson
2015/997 ( PDF )
Incremental Program Obfuscation
Sanjam Garg and Omkant Pandey
2015/994 ( -- withdrawn -- )
An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2015/983 ( PDF )
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes
Ping Ngai Chung and Craig Costello and Benjamin Smith
2015/979 ( PDF )
Guidelines for Using the CryptDB System Securely
Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan
2015/964 ( PDF )
Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN
Danping Shi and Lei Hu and Siwei Sun and Ling Song
2015/830 ( PDF )
Unique Signature with Short Output from CDH Assumption
Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng
2015/810 ( PDF )
Improved OR Composition of Sigma-Protocols
Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2015/797 ( PDF )
What Security can we Achieve in 4-Rounds?
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2015/750 ( PDF )
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki and Daniel Wichs and Mark Zhandry
2015/735 ( PDF )
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Ilan Komargodski and Mark Zhandry
2015/730 ( PDF )
Indistinguishability Obfuscation from Functional Encryption for Simple Functions, And a New Bootstrapping Theorem for iO
Prabhanjan Ananth and Abhishek Jain and Amit Sahai
2015/680 ( PDF )
Indifferentiability of Confusion-Diffusion Networks
Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/548 ( PDF )
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz
2015/520 ( PDF )
A Constant Time, Single Round, Attribute-Based Authenticated Key Exchange in Random Oracle Model
Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
2015/363 ( PDF )
Optimally Secure Tweakable Blockciphers
Bart Mennink
2015/266 ( PDF )
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios
2015/121 ( PDF )
Multi-Client Oblivious RAM secure against Malicious Servers
Travis Mayberry and Erik-Oliver Blass and Guevara Noubir
2015/053 ( PDF )
Tight Bounds for Keyed Sponges and Truncated CBC
Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro
2015/040 ( PDF )
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref
2014/704 ( PDF )
A 128-bit Block Cipher Based on Three Group Arithmetics
Shenghui Su and Shuwang Lü and Daqiang Dong
2014/426 ( PDF )
Towards Optimally Efficient Secret-Key Authentication from PRG
Ivan Damgård and Sunoo Park
2014/202 ( PDF )
Efficiently Verifiable Computation on Encrypted Data
Dario Fiore and Rosario Gennaro and Valerio Pastro
2014/147 ( PDF )
The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields
Razvan Barbulescu and Cécile Pierrot
2014/114 ( PDF )
Prover Anonymous and Deniable Distance-Bounding Authentication
Sebastien Gambs and Cristina Onete and Jean-Marc Robert
2012/722 ( PDF )
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
2012/164 ( PDF )
On Secure Two-party Integer Division
Morten Dahl, Chao Ning, Tomas Toft


[ Cryptology ePrint archive ]