Cryptology ePrint Archive: Listing for 2012

2012/733 ( PDF )
Reusable Garbled Circuits and Succinct Functional Encryption
Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich
2012/732 ( PDF )
Non-Interactive Key Exchange
Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson
2012/731 ( PDF )
Time-memory Trade-offs for Near-collisions
Gaëtan Leurent
2012/730 ( PS PS.GZ PDF )
Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Dalin Chu and Johann Großschädl and Zhe Liu and Volker Müller and Yang Zhang
2012/729 ( PDF )
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
Nir Bitansky and Omer Paneth
2012/728 ( PDF )
Defensive Leakage Camouflage
E. Brier and Q. Fortier and R. Korkikian and K. W. Magld and D. Naccache and G. Ozari de Almeida and A. Pommellet and A. H. Ragab and J. Vuillemin
2012/727 ( PDF )
On the Impossibility of Sender-Deniable Public Key Encryption
Dana Dachman-Soled
2012/726 ( PDF )
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
Marc Obrador and Paz Morillo and Sandra Guasch
2012/725 ( PDF )
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
Qingfeng Cheng
2012/724 ( PDF )
A Coding-Theoretic Approach to Recovering Noisy RSA Keys
Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn
2012/723 ( PDF )
Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks
Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov and Avraham Entelis
2012/722 ( PDF )
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
2012/721 ( PDF )
On the (In)security of Fischlin's Paradigm
Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao
2012/720 ( PDF )
Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields
Antoine Joux
2012/719 ( PDF )
An ideal multi-secret sharing scheme based on minimal privileged coalitions
Yun Song , Zhihui Li
2012/718 ( PDF )
Succinct Non-Interactive Arguments via Linear Interactive Proofs
Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth
2012/717 ( PDF )
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Jan Camenisch and Anna Lysyanskaya and Gregory Neven
2012/716 ( PDF )
Attribute-Based Functional Encryption on Lattices
Xavier Boyen
2012/715 ( PDF )
New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$
Jingyuan Zhao and Meiqin Wang and Jiazhe Chen and Yuliang Zheng
2012/714 ( PDF )
Discrete Gaussian Leftover Hash Lemma over Infinite Domains
Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai
2012/713 ( PDF )
Systematic Treatment of Remote Attestation
Aurelien Francillon and Quan Nguyen and Kasper B. Rasmussen and Gene Tsudik
2012/712 ( PDF )
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis
Farzaneh Abed and Eik List and Stefan Lucks
2012/711 ( PDF )
Unprovable Security of 2-Message Zero Knowledge
Kai-Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass
2012/710 ( PDF )
Non Observability in the Random Oracle Model
Prabhanjan Ananth and Raghav Bhaskar
2012/709 ( PDF )
Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng and Wen-Feng Qi
2012/708 ( PDF )
Calling out Cheaters: Covert Security With Public Verifiability
Gilad Asharov and Claudio Orlandi
2012/707 ( PDF )
Cryptanalysis of WIDEA
Gaëtan Leurent
2012/706 ( PDF )
On the (In)security of the Fiat-Shamir Paradigm, Revisited
Dana Dachman-Soled and Abhishek Jain and Yael Tauman Kalai and Adriana Lopez-Alt
2012/705 ( PDF )
Why "Fiat-Shamir for Proofs" Lacks a Proof
Nir Bitansky and Sanjam Garg and Daniel Wichs
2012/704 ( PDF )
On the Non-malleability of the Fiat-Shamir Transform
Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi
2012/703 ( PDF )
Profiled Model Based Power Simulator for Side Channel Evaluation
Nicolas Debande and Maël Berthier and Yves Bocktaels and Thanh-Ha Le
2012/702 ( PDF )
Cryptanalysis of RAPP, an RFID Authentication Protocol
Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
2012/701 ( PDF )
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu
2012/700 ( PDF )
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong-Sheng Zhou
2012/699 ( PDF )
How Practical is Public-Key Encryption Based on LPN and Ring-LPN?
Ivan Damgård and Sunoo Park
2012/698 ( PDF )
5PM: Secure Pattern Matching
Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler
2012/697 ( PDF )
Verifiable Elections That Scale for Free
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2012/696 ( PDF )
Cryptanalysis of RAKAPOSHI Stream Cipher
Lin Ding and Jie Guan
2012/695 ( PDF )
Fully Automated Analysis of Padding-Based Encryption in the Computational Model
Gilles Barthe and Juan Manuel Crespo and Benjamin Grégoire and César Kunz and Yassine Lakhnech and Benedikt Schmidt and Santiago Zanella-Béguelin
2012/694 ( PDF )
Cryptanalysis of matrix conjugation schemes
A. D. Myasnikov and A. Ushakov
2012/693 ( PDF )
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters
2012/692 ( PDF )
Generic Constructions of Integrated PKE and PEKS
Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin
2012/691 ( PDF )
Root Optimization of Polynomials in the Number Field Sieve
Shi Bai and Richard P. Brent and Emmanuel Thomé
2012/690 ( PDF )
The Weakness of Integrity Protection for LTE
Teng Wu and Guang Gong
2012/689 ( PDF )
Cryptography Using CAPTCHA Puzzles
Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia
2012/688 ( PDF )
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
Jintai Ding, Xiang Xie, Xiaodong Lin
2012/687 ( PDF )
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
Karyn Benson and Hovav Shacham and Brent Waters
2012/686 ( PDF )
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl
Jian Zou and Wenling Wu and Shuang Wu and Le Dong
2012/685 ( PDF )
Square root computation over even extension fields
Gora Adj and Francisco Rodríguez-Henríquez
2012/684 ( PDF )
Generic Related-key Attacks for HMAC
Thomas Peyrin and Yu Sasaki and Lei Wang
2012/683 ( -- withdrawn -- )
Fingerprint Tables: A Generalization of Rainbow Tables
Gildas Avoine and Adrien Bourgeois and Xavier Carpent
2012/682 ( PDF )
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud
Jiawei Yuan and Shucheng Yu
2012/681 ( PDF )
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations
Guang Gong and Mark Aagaard and Xinxin Fan
2012/680 ( PDF )
Natural Generalizations of Threshold Secret Sharing
Oriol Farras,Carles Padro,Chaoping Xing, and An Yang
2012/679 ( PDF )
Hiding the Input-Size in Secure Two-Party Computation
Yehuda Lindell and Kobbi Nissim and Claudio Orlandi
2012/678 ( PDF )
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
Benedikt Gierlichs and Jorn-Marc Schmidt and Michael Tunstall
2012/677 ( PDF )
What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher
Jialin Huang and Xuejia Lai
2012/676 ( PDF )
Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan
Julia Borghoff
2012/675 ( PDF )
Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA
Yoshinori Aono
2012/674 ( PDF )
Lecture Notes in Secret Sharing
Carles Padro
2012/673 ( PDF )
Robust Encryption, Revisited
Pooya Farshim and Benoît Libert and Kenneth G. Paterson and Elizabeth A. Quaglia
2012/672 ( PDF )
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
Itai Dinur and Orr Dunkelman and Adi Shamir
2012/671 ( PDF )
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
Tatsuaki Okamoto and Katsuyuki Takashima
2012/670 ( PDF )
Fast Cryptography in Genus 2
Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
2012/669 ( PDF )
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay
Zhen Liu and Zhenfu Cao and Duncan S. Wong
2012/668 ( PDF )
Construction of Differential Characteristics in ARX Designs -- Application to Skein
Gaetan Leurent
2012/667 ( PDF )
False Negative probabilities in Tardos codes
Antonino Simone and Boris Skoric
2012/666 ( PS PS.GZ PDF )
Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem
Chenglian Liu and Ziwei Ye
2012/665 ( PDF )
Uniform Compression Functions Can Fail to Preserve “Full” Entropy
Daniel R. L. Brown
2012/664 ( PDF )
PRE- Stronger Security Notion and Efficient Construction with New Property
Jiang Zhang and Zhenfeng Zhang and Yu Chen
2012/663 ( PDF )
Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?
Alexander Rostovtsev
2012/662 ( PDF )
Asynchronous Physical Unclonable Functions – AsyncPUF
Julian Murphy
2012/661 ( PDF )
Breaking Another Quasigroup-Based Cryptographic Scheme
Markus Dichtl and Pascale Böffgen
2012/660 ( -- withdrawn -- )
Design of Secure Image Transmission In MANET using Number Theory Based Image Compression and uasigroup Encryption (NTICQE) Algorithm
Munivel E and Rajeswari Mukesh
2012/659 ( PDF )
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks
Hassan Jameel Asghar and Shujun Li and Ron Steinfeld and Josef Pierpzyk
2012/658 ( PDF )
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy
2012/657 ( PDF )
Fixed Argument Pairing Inversion on Elliptic Curves
Sungwook Kim and Jung Hee Cheon
2012/656 ( PDF )
Security Evaluation of Rakaposhi Stream Cipher
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
2012/655 ( PDF )
Privacy Preserving Revocable Predicate Encryption Revisited
Kwangsu Lee and Intae Kim and Seong Oun Hwang
2012/654 ( PDF )
Refine the Concept of Public Key Encryption with Delegated Search
Qiang Tang and Yuanjie Zhao and Xiaofeng Chen and Hua Ma
2012/653 ( PDF )
How powerful are the DDH hard groups?
Periklis A. Papakonstantinou and Charles W. Rackoff and Yevgeniy Vahlis
2012/652 ( PDF )
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Vipul Goyal and Huijia Lin and Omkant Pandey and Rafael Pass and Amit Sahai
2012/651 ( -- withdrawn -- )
TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems
Kan Yang and Zhen Liu and Zhenfu Cao and Xiaohua Jia and Duncan S. Wong and Kui Ren
2012/650 ( PDF )
Formal analysis of privacy in Direct Anonymous Attestation schemes
Ben Smyth and Mark D. Ryan and Liqun Chen
2012/649 ( PDF )
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
Yannick Seurin and Joana Treger
2012/648 ( PDF )
Search in Encrypted Data: Theoretical Models and Practical Applications
Qiang Tang
2012/647 ( PDF )
A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions
Daniel Smith-Tone and Cristina Tone
2012/646 ( PDF )
Galindo-Garcia Identity-Based Signature, Revisited
Sanjit Chatterjee and Chethan Kamath and Vikas Kumar
2012/645 ( PDF )
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
2012/644 ( PDF )
Impossibility Results for Indifferentiability with Resets
Atul Luykx and Elena Andreeva and Bart Mennink and Bart Preneel
2012/643 ( PDF )
Protocols for Multiparty Coin Toss With Dishonest Majority
Amos Beimel and Eran Omri and Ilan Orlov
2012/642 ( PDF )
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
Ivan Damgard and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart
2012/641 ( PDF )
A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure
Bin Wang
2012/640 ( PDF )
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function
Gaoli Wang and Yanzhao Shen
2012/639 ( PDF )
Coarse-grained integer - Smooth? Rough? Both!
Daniel Loebenberger and Michael Nüsken
2012/638 ( PDF )
Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme
Cai-xue Zhou
2012/637 ( PDF )
Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification
Aviad Kipnis and Eliphaz Hibshoosh
2012/636 ( PDF )
On the Complexity of the BKW Algorithm on LWE
Martin R. Albrecht and Carlos Cid and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
2012/635 ( -- withdrawn -- )
Secure Outsourced Attribute-based Encryption
Jin Li and Jingwei Li and Xiaofeng Chen and Chunfu Jia and Duncan S. Wong
2012/634 ( PDF )
Cryptanalysis of Double-Block-Length Hash Mode MJH
Deukjo Hong and Daesung Kwon
2012/633 ( PDF )
New Preimage Attack on MDC-4
Deukjo Hong and Daesung Kwon
2012/632 ( PDF )
Pairings on Generalized Huff Curves
Abdoul Aziz Ciss and Djiby Sow
2012/631 ( PDF )
Message-Locked Encryption and Secure Deduplication
Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart
2012/630 ( PDF )
On the Security of TLS Renegotiation
Florian Giesen and Florian Kohlar and Douglas Stebila
2012/629 ( PDF )
SCAPI: The Secure Computation Application Programming Interface
Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell
2012/628 ( PDF )
Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems
Muhammad Yasir Malik
2012/627 ( PDF )
Efficient Group Signatures in the Standard Model
Laila El Aimani and Olivier Sanders
2012/626 ( PDF )
Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis
Xi Xiong and Haining Fan
2012/625 ( PDF )
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
Alexandra Boldyreva and Nathan Chenette and Adam O’Neill
2012/624 ( PDF )
Order-Preserving Symmetric Encryption
Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O’Neill
2012/623 ( PDF )
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes
David McGrew
2012/622 ( PDF )
Resolving the conflict between generality and plausibility in verified computation
Srinath Setty and Benjamin Braun and Victor Vu and Andrew J. Blumberg and Bryan Parno and Michael Walfish
2012/621 ( PDF )
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
Kitae Jeong and HyungChul Kang and Changhoon Lee and Jaechul Sung and Seokhie Hong
2012/620 ( PDF )
Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction
Claus P. Schnorr and Taras Shevchenko
2012/619 ( PDF )
Asynchronous Computational VSS with Reduced Communication Complexity
Michael Backes and Amit Datta and Aniket Kate
2012/618 ( -- withdrawn -- )
An ultra-lightweight ID-based pairwise key establishment scheme aiming at full collusion resistance
Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Domingo Gomez-Perez, Jaime Gutierrez, Santos Merino del Pozo
2012/617 ( PDF )
Security Analysis of an Open Car Immobilizer Protocol Stack
Stefan Tillich and Marcin Wójcik
2012/616 ( PDF )
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
Nishanth Chandran and Sanjam Garg
2012/615 ( PDF )
Polynomial time solutions of computational problems in noncommutative-algebraic cryptography
Boaz Tsaban
2012/614 ( PDF )
An arithmetic intersection formula for denominators of Igusa class polynomials
Kristin Lauter and Bianca Viray
2012/613 ( PDF )
Resource-Restricted Indifferentiability
Grégory Demay and Peter Gaźi and Martin Hirt and Ueli Maurer
2012/612 ( PDF )
Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff
Byoung-Il Kim and Jin Hong
2012/611 ( PDF )
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay
2012/610 ( PDF )
Candidate Multilinear Maps from Ideal Lattices
Sanjam Garg and Craig Gentry and Shai Halevi
2012/609 ( PDF )
Taechan Kim and Jung Hee Cheon
2012/608 ( PDF )
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting
Marina Blanton and Mehrdad Aliasgari
2012/607 ( PDF )
Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem
Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber
2012/606 ( PDF )
Quantum-Secure Message Authentication Codes
Dan Boneh and Mark Zhandry
2012/605 ( PDF )
Secure Outsourced Attribute-Based Signatures
Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
2012/604 ( PDF )
Leakage-Resilient Cryptography from Minimal Assumptions
Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs
2012/603 ( PDF )
Collecting Data while Preserving Individuals' Privacy: A Case Study
Alexis Bonnecaze and Robert Rolland
2012/602 ( PDF )
A note on invariant linear transformations in multivariate public key cryptography
Andreas Wiemers
2012/601 ( PS PS.GZ PDF )
How to Garble RAM Programs
Steve Lu and Rafail Ostrovsky
2012/600 ( PDF )
The LED Block Cipher
Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw
2012/599 ( PDF )
On the coefficients of the polynomial in the number field sieve
Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
2012/598 ( PDF )
Taking proof-based verified computation a few steps closer to practicality (extended version)
Srinath Setty and Victor Vu and Nikhil Panpalia and Benjamin Braun and Muqeet Ali and Andrew J. Blumberg and Michael Walfish
2012/597 ( PDF )
A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA
Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj
2012/596 ( PDF )
Evaluating User Privacy in Bitcoin
Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun
2012/595 ( PDF )
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes
Oriol Farràs and Carles Padró
2012/594 ( PDF )
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256
Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li
2012/593 ( PDF )
Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps
Tomoko Yonemura and Taichi Isogai and Hirofumi Muratani and Yoshikazu Hanatani
2012/592 ( PDF )
Attribute-Based Encryption for Circuits from Multilinear Maps
Amit Sahai and Brent Waters
2012/591 ( PDF )
Biclique Cryptanalysis Of PRESENT, LED, And KLEIN
Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2012/590 ( -- withdrawn -- )
2012/589 ( -- withdrawn -- )
2012/588 ( PDF )
Breaking Public Keys - How to Determine an Unknown RSA Public Modulus
Hans-Joachim Knobloch
2012/587 ( PDF )
Symbolic computation in block cipher with application to PRESENT
Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
2012/586 ( PDF )
SHADE: Secure HAmming DistancE computation from oblivious transfer
Julien Bringer and Herve Chabanne and Alain Patey
2012/585 ( PDF )
On Provably Secure Code-based Signature and Signcryption Scheme
Preetha Mathew K and Sachin Vasant and C. Pandu Rangan
2012/584 ( PDF )
Quantitative Analysis of the Full Bitcoin Transaction Graph
Dorit Ron and Adi Shamir
2012/583 ( PDF )
New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
Yannis Rouselakis and Brent Waters
2012/582 ( PS PS.GZ PDF )
Using Randomizers for Batch Verification of ECDSA Signatures
Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury
2012/581 ( PDF )
On the (in)security of some smart-card-based password authentication schemes for WSN
Ding Wang and Chun-guang Ma
2012/580 ( PDF )
Cryptanalysis of the OKH Authenticated Encryption Scheme
Peng Wang and Wenling Wu and Liting Zhang
2012/579 ( PDF )
Defending Against the Unknown Enemy: Applying FlipIt to System Security
Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos
2012/578 ( PDF )
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
2012/577 ( PDF )
A Framework for Unique Ring Signatures
Matthew Franklin and Haibin Zhang
2012/576 ( PDF )
Concurrent Signature without Random Oracles
Xiao Tan and Qiong Huang and Duncan S. Wong
2012/575 ( PDF )
Nanoelectronic Solutions for Hardware Security
Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki
2012/574 ( PDF )
Quantum algorithm for the discrete logarithm problem for matrices over finite group rings
A. D. Myasnikov and A. Ushakov
2012/573 ( PDF )
Limits on the Usefulness of Random Oracles
Iftach Haitner and Eran Omri and Hila Zarosim
2012/572 ( PDF )
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption
Divya Gupta and Amit Sahai
2012/571 ( PDF )
Improved side channel attack on the block cipher NOEKEON
Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
2012/570 ( PDF )
Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock
Hadi Soleimany and Kaisa Nyberg
2012/569 ( PDF )
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
San Ling and Khoa Nguyen and Damien Stehle and Huaxiong Wang
2012/568 ( PDF )
On Transaction Pseudonyms with Implicit Attributes
Stefan G. Weber
2012/567 ( PDF )
Leakage Squeezing of Order Two
Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi
2012/566 ( PDF )
Quantization in Continuous-Source Zero Secrecy Leakage Helper Data Schemes
Joep de Groot and Boris Škorić and Niels de Vreede and Jean-Paul Linnartz
2012/565 ( PDF )
Packed Ciphertexts in LWE-based Homomorphic Encryption
Zvika Brakerski and Craig Gentry and Shai Halevi
2012/564 ( PDF )
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
2012/563 ( PDF )
Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions
Kai-Min Chung and Huijia Lin and Rafael Pass
2012/562 ( PDF )
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Kwangsu Lee and Dong Hoon Lee and Moti Yung
2012/561 ( PDF )
An Attack on a Fully Homomorphic Encryption Scheme
Hu Yupu, Wang Fenghe
2012/560 ( PDF )
Computational Soundness of Coinductive Symbolic Security under Active Attacks
Mohammad Hajiabadi, Bruce M. Kapron
2012/559 ( PDF )
Plaintext Awareness in Identity-Based Key Encapsulation
Mark Manulis and Bertram Poettering and Douglas Stebila
2012/558 ( PDF )
Domain-Specific Pseudonymous Signatures for the German Identity Card
Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
2012/557 ( PDF )
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)
Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede and Christian Wachsmann
2012/556 ( PDF )
Resource-based Corruptions and the Combinatorics of Hidden Diversity
Juan Garay and David Johnson and Aggelos Kiayias and Moti Yung
2012/555 ( PDF )
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation
Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai
2012/554 ( PDF )
Security weakness in the Proof of Storage with Deduplication
Youngjoo Shin, Junbeom Hur, Kwangjo Kim
2012/553 ( PDF )
Bellcore attack in practice
Andrey Sidorenko and Joachim van den Berg and Remko Foekema and Michiel Grashuis and Jaap de Vos
2012/552 ( PDF )
Provably Secure Concurrent Error Detection Against Differential Fault Analysis
Xiaofei Guo, Debdeep Mukhopadhyay and Ramesh Karri
2012/551 ( PDF )
Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists
Liangze Li and Hongfeng Wu and Fan Zhang
2012/550 ( PDF )
Dynamic Proofs of Retrievability via Oblivious RAM
David Cash and Alptekin Kupcu and Daniel Wichs
2012/549 ( PDF )
Faster batch forgery identification
Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk
2012/548 ( PDF )
Efficient Modular NIZK Arguments from Shift and Product
Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
2012/547 ( PDF )
Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity
Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta
2012/546 ( PDF )
Rotational cryptanalysis of round-reduced Keccak
Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny
2012/545 ( PDF )
A Versatile Multi-Input Multiplier over Finite Fields
Haibo Yi, Shaohua Tang, Lingling Xu
2012/544 ( PDF )
Differential Analysis of the LED Block Cipher
Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici
2012/543 ( PDF )
Enhanced Chosen-Ciphertext Security and Applications
Dana Dachman-Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill
2012/542 ( PDF )
Salus: A System for Server-Aided Secure Function Evaluation
Seny Kamara and Payman Mohassel and Ben Riva
2012/541 ( -- withdrawn -- )
2048XKS - A Software Oriented High Security Block Cipher
Dieter Schmidt
2012/540 ( PDF )
A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms
Ga Won Lee and Jin Hong
2012/539 ( PDF )
Efficient Implementation of RSA Algorithm with MKE
Sami A. Nagar and Dr. Saad Alshamma
2012/538 ( PDF )
Private Top-k Aggregation Protocols
Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim
2012/537 ( PDF )
Intercepting Tokens: The Empire Strikes Back in the Clone Wars
Özgür Dagdelen and Marc Fischlin
2012/536 ( PDF )
Secret Sharing and Secure Computing from Monotone Formulae
Ivan Bjerre Damgård and Jonas Kölker and Peter Bro Miltersen
2012/535 ( PDF )
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl
Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
2012/534 ( PDF )
A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes
Maura B. Paterson and Douglas R. Stinson
2012/533 ( PDF )
Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems
Thijs Laarhoven and Joop van de Pol and Benne de Weger
2012/532 ( PDF )
Pairing computation on Edwards curves with high-degree twists
Liangze Li and Hongfeng Wu and Fan Zhang
2012/531 ( PDF )
Generic Construction of Trace and Revoke Schemes
Murat Ak and Aggelos Kiayias and Serdar Pehlivanoglu and Ali Aydin Selcuk
2012/530 ( PS PS.GZ PDF )
Dynamic Searchable Symmetric Encryption
Seny Kamara and Charalampos Papamanthou and Tom Roeder
2012/529 ( PDF )
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version)
Julia Borghoff and Anne Canteaut and Tim Güneysu and Elif Bilge Kavun and Miroslav Knežević and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and Søren S. Thomsen and Tolga Yalçın
2012/528 ( PDF )
An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption
Graham Enos and Yuliang Zheng
2012/527 ( PDF )
Cryptanalysis of a recent two factor authentication scheme
Michael Scott
2012/526 ( PDF )
Invertible Polynomial Representation for Private Set Operations
Jung Hee Cheon and Hyunsook Hong and Hyung Tae Lee
2012/525 ( PDF )
Computing endomorphism rings of abelian varieties of dimension two
Gaetan Bisson
2012/524 ( PDF )
Tahoe – The Least-Authority Filesystem
Zooko Wilcox-O'Hearn and Brian Warner
2012/523 ( PDF )
The Curious Case of Non-Interactive Commitments
Mohammad Mahmoody and Rafael Pass
2012/522 ( PDF )
False Positive probabilities in q-ary Tardos codes: comparison of attacks
A. Simone and B. Skoric
2012/521 ( PDF )
Functional Encryption with Bounded Collusions via Multi-Party Computation
Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2012/520 ( PDF )
Optimizing Segment Based Document Protection (Corrected Version)
Miroslaw Kutylowski and Maciej Gebala
2012/519 ( PDF )
Faster implementation of scalar multiplication on Koblitz curves
Diego F. Aranha and Armando Faz-Hernández and Julio López and Francisco Rodríguez-Henríquez
2012/518 ( PDF )
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Kwangsu Lee and Dong Hoon Lee and Moti Yung
2012/517 ( PDF )
Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity
Ashish Choudhury and Martin Hirt and Arpita Patra
2012/516 ( PDF )
Garbling XOR Gates ``For Free'' in the Standard Model
Benny Applebaum
2012/515 ( PDF )
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
Mihir Bellare and Adam O'Neill
2012/514 ( PDF )
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
Mihir Bellare and Kenneth G. Paterson and Susan Thomson
2012/513 ( PS PS.GZ PDF )
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes
2012/512 ( PDF )
Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
Ivan Damgard and Sarah Zakarias
2012/511 ( PDF )
Entangled Cloud Storage
Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi
2012/510 ( PDF )
Enabling 3-share Threshold Implementations for any 4-bit S-box
Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann
2012/509 ( PDF )
On 3-share Threshold Implementations for 4-bit S-boxes
Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang
2012/508 ( PDF )
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung
2012/507 ( PDF )
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
Josep Balasch and Bariş Ege and Thomas Eisenbarth and Benoit Gérard and Zheng Gong and Tim Güneysu and Stefan Heyse and Stéphanie Kerckhof and François Koeune and Thomas Plos and Thomas Pöppelmann and Francesco Regazzoni and François-Xavier Standaert and Gilles Van Assche and Ronny Van Keer and Loïc van Oldeneel tot Oldenzeel and Ingo von Maurich
2012/506 ( PDF )
Succinct Malleable NIZKs and an Application to Compact Shuffles
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2012/505 ( PDF )
On pseudorandomization of information-theoretically secure schemes without hardness assumptions
Koji Nuida
2012/504 ( PDF )
Scalable Deniable Group Key Establishment
Kashi Neupane and Rainer Steinwandt and Adriana Suarez Corona
2012/503 ( PDF )
Hierarchical Identity-Based (Lossy) Trapdoor Functions
Alex Escala and Javier Herranz and Benoit Libert and Carla Rafols
2012/502 ( PDF )
Are We Compromised? Modelling Security Assessment Games
Viet Pham and Carlos Cid
2012/501 ( PDF )
Privacy Amplification with Asymptotically Optimal Entropy Loss
Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin
2012/500 ( PDF )
Constant Ciphertext Length in CP-ABE
Nishant Doshi and Devesh Jinwala
2012/499 ( -- withdrawn -- )
Authenticity, Integrity and Proof of Existence for Long-Term Archiving: a Survey
Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann
2012/498 ( PDF )
Almost Perfect Algebraic Immune Functions with Good Nonlinearity
Meicheng Liu and Dongdai Lin
2012/497 ( PDF )
The low-call diet: Authenticated Encryption for call counting HSM users
Mike Bond and George French and Nigel P. Smart and Gaven J. Watson
2012/496 ( PDF )
Updating attribute in CP-ABE: A New Approach
Nishant Doshi and Devesh Jinwala
2012/495 ( PDF )
"Metaproofs" (and their Cryptographic Applications)
Alfredo De Santis and Moti Yung
2012/494 ( PDF )
Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton
2012/493 ( PDF )
Efficient Query Integrity for Outsourced Dynamic Databases
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2012/492 ( PDF )
A Method for Generating Full Cycles by a Composition of NLFSRs
Elena Dubrova
2012/491 ( PDF )
On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown
Lidong Han and Wei Wei and Mingjie Liu
2012/490 ( PS PS.GZ PDF )
Desynchronization Attack on RAPP Ultralightweight Authentication Protocol
Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref
2012/489 ( PDF )
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/488 ( PDF )
Designated Verifier Threshold Proxy Signature Scheme without Random Oracles
Mohammad Beheshti-Atashgah and Majid Bayat and Mahmoud Gardeshi and Mohammad Reza Aref
2012/487 ( PDF )
Short communication: An interpretation of the Linux entropy estimator
Benjamin Pousse
2012/486 ( PDF )
Computational Soundness without Protocol Restrictions
Michael Backes and Ankit Malik and Dominique Unruh
2012/485 ( PDF )
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Neil Hanley and HeeSeok Kim and Michael Tunstall
2012/484 ( PS PS.GZ )
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture
Ding Wang, Chun-guang Ma, De-li Gu and Zhen-shan Cui
2012/483 ( PS PS.GZ PDF )
An Efficient Signcryption Scheme from q-Diffie-Hellman Problems
Jayaprakash Kar
2012/482 ( PDF )
Approaches for the Parallelization of Software Implementation of Integer Multiplication
Vladislav Kovtun and Andrew Okhrimenko
2012/481 ( PDF )
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance
John Steinberger
2012/480 ( PDF )
Short Signatures From Diffie-Hellman: Realizing Short Public Key
Jae Hong Seo
2012/479 ( PDF )
Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles
Mohammad Reza Reyhanitabar and Willy Susilo
2012/478 ( PDF )
Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol
Wang Qinglong, Xu Li
2012/477 ( PDF )
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean
2012/476 ( PDF )
A j-lanes tree hashing mode and j-lanes SHA-256
Shay Gueron
2012/475 ( PDF )
Efficient Signatures of Knowledge and DAA in the Standard Model
David Bernhard and Georg Fuchsbauer and Essam Ghadafi
2012/474 ( PDF )
On the Semantic Security of Functional Encryption Schemes
Manuel Barbosa and Pooya Farshim
2012/473 ( PDF )
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
Zhengan Huang and Shengli Liu and Baodong Qin
2012/472 ( PDF )
On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme –
Amir Moradi and Oliver Mischke
2012/471 ( PDF )
A Quasigroup Based Random Number Generator for Resource Constrained Environments
Matthew Battey and Abhishek Parakh
2012/470 ( PDF )
Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime
Sorin Iftene
2012/469 ( PDF )
Perfect Keyword Privacy in PEKS Systems
Mototsugu Nishioka
2012/468 ( PDF )
Functional Encryption: New Perspectives and Lower Bounds
Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2012/467 ( PDF )
New results on nonexistence of generalized bent functions
Yupeng Jiang and Yingpu Deng
2012/466 ( PDF )
Computational Entropy and Information Leakage
Benjamin Fuller and Leonid Reyzin
2012/465 ( PDF )
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags
Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
2012/464 ( PDF )
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
Carles Padro and Leonor Vazquez and An Yang
2012/463 ( PDF )
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
Xiang Xie and Rui Xue and Rui Zhang
2012/462 ( PDF )
Perfect Ambiguous Optimistic Fair Exchange
Yang Wang and Man Ho Au and Willy Susilo
2012/461 ( PDF )
Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits
Nir Bitansky and Alessandro Chiesa
2012/460 ( PDF )
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
Yohei Watanabe and Takenobu Seito and Junji Shikata
2012/459 ( PDF )
Barriers in Cryptography with Weak, Correlated and Leaky Sources
Daniel Wichs
2012/458 ( PDF )
Computing small discrete logarithms faster
Daniel J. Bernstein and Tanja Lange
2012/457 ( PDF )
Hush Functions Extended to Any Size Input versus Any Size Output
Gideon Samid
2012/456 ( PDF )
Crowd-Blending Privacy
Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass
2012/455 ( PDF )
Must you know the code of f to securely compute f?
Mike Rosulek
2012/454 ( PDF )
A Probabilistic Quantum Key Transfer Protocol
Abhishek Parakh
2012/453 ( PDF )
New Leakage Resilient CCA-Secure Public Key Encryption
Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
2012/452 ( PDF )
EPiC: Efficient Privacy-Preserving Counting for MapReduce
Erik-Oliver Blass and Guevara Noubir and Triet D. Vo-Huu
2012/451 ( PS PS.GZ PDF )
Stam's Conjecture and Threshold Phenomena in Collision Resistance
John Steinberger, Xiaoming Sun, Zhe Yang
2012/450 ( PDF )
Tweakable Blockciphers with Beyond Birthday-Bound Security
Will Landecker and Thomas Shrimpton and R. Seth Terashima
2012/449 ( PDF )
Long Term Confidentiality: a Survey
Johannes Braun and Johannes Buchmann and Ciaran Mullan and Alex Wiesmaier
2012/448 ( PDF )
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka and Takahiro Matsuda and Jacob C.N. Schuldt
2012/447 ( PDF )
Multi-receiver Homomorphic Authentication Codes for Network Coding
Zhaohui Tang and Hoon Wei Lim
2012/446 ( PS PS.GZ PDF )
Differential Fault Analysis of AES: Towards Reaching its Limits
Sk Subidh Ali , Debdeep Mukhopadhyay, and Michael Tunstall
2012/445 ( PDF )
A note on ‘An efficient certificateless aggregate signature with constant pairing computations’
Debiao He, Jianhua Chen, Miaomiao Tian
2012/444 ( PDF )
Factorization of a 1061-bit number by the Special Number Field Sieve
Greg Childers
2012/443 ( PDF )
Improved CRT Algorithm for Class Polynomials in Genus 2
Kristin Lauter and Damien Robert
2012/442 ( PDF )
Group Signatures with Almost-for-free Revocation
Benoit Libert and Thomas Peters and Moti Yung
2012/441 ( PDF )
Adaptively Secure Multi-Party Computation with Dishonest Majority
Sanjam Garg and Amit Sahai
2012/440 ( PDF )
New Preimage Attacks Against Reduced SHA-1
Simon Knellwolf and Dmitry Khovratovich
2012/439 ( PDF )
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
2012/438 ( PDF )
Breaking and Repairing GCM Security Proofs
Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu
2012/437 ( PDF )
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
Amit Sahai and Hakan Seyalioglu and Brent Waters
2012/436 ( PDF )
Secure Database Commitments and Universal Arguments of Quasi Knowledge
Melissa Chase and Ivan Visconti
2012/435 ( PS PS.GZ PDF )
Differential Privacy with Imperfect Randomness
Yevgeniy Dodis and Adriana Lopez-Alt and Ilya Mironov and Salil Vadhan
2012/434 ( PDF )
Algebraic (Trapdoor) One Way Functions and their Applications
Dario Catalano and Dario Fiore and Rosario Gennaro and Konstantinos Vamvourellis
2012/433 ( PDF )
Impossibility Results for Static Input Secure Computation
Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti
2012/432 ( PDF )
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2012/431 ( PDF )
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Yusuke Sakai and Jacob C.N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta
2012/430 ( PDF )
A formal study of two physical countermeasures against side channel attacks
Sébastien Briais and Sylvain Guilley and Jean-Luc Danger
2012/429 ( PDF )
Simple construction of epsilon-biased distribution
Long Hoang Nguyen and Andrew William Roscoe
2012/428 ( PDF )
Rational authentication protocols and their use in financial transactions
Long Hoang Nguyen
2012/427 ( PDF )
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian
Robert Drylo
2012/426 ( PDF )
A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes
Ed Kendall and Michelle Kendall and Wilfrid S. Kendall
2012/425 ( PDF )
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
Gautham Sekar
2012/424 ( PDF )
Scalable Group Signatures with Revocation
Benoit Libert and Thomas Peters and Moti Yung
2012/423 ( PDF )
Programmable encryption and key-dependent messages
Dominique Unruh
2012/422 ( PDF )
Biclique Cryptanalysis of TWINE
Mustafa Çoban and Ferhat Karakoç and Özkan Boztaş
2012/421 ( PDF )
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
Ekawat Homsirikamol and Pawel Morawiecki and Marcin Rogawski and Marian Srebrny
2012/420 ( PDF )
A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers
Denise Demirel and Jeroen van de Graaf
2012/419 ( -- withdrawn -- )
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
Kan Yang and Xiaohua Jia and Kui Ren
2012/418 ( PDF )
Weaknesses of an Improvement Authentication Scheme using
Rafael Martínez-Peláez and Francisco Rico-Novella
2012/417 ( PDF )
Efficient Padding Oracle Attacks on Cryptographic Hardware
Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay
2012/416 ( PDF )
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
Cas Cremers and Michèle Feltz
2012/415 ( PDF )
Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion
Jialin Huang and Xuejia Lai
2012/414 ( PDF )
Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials
Yin Li and Gong-liang Chen and Xiao-ning Xie
2012/413 ( PDF )
Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation
Mukund Kalyanaraman and Michael Orshansky
2012/412 ( PDF )
Probabilistic Infinite Secret Sharing
Laszlo Csirmaz
2012/411 ( PDF )
Infinite Secret Sharing -- Examples
Alexander Dibert and Laszlo Csirmaz
2012/410 ( PDF )
Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme
Qingfeng Cheng
2012/409 ( PDF )
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes
Rafael Misoczki and Jean-Pierre Tillich and Nicolas Sendrier and Paulo S. L. M. Barreto
2012/408 ( PDF )
Efficient Implementation of Bilinear Pairings on ARM Processors
Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, and David Jao
2012/407 ( PDF )
Cross-Unlinkable Hierarchical Group Signatures
Julien Bringer and Herve Chabanne and Alain Patey
2012/406 ( PDF )
Comments on four multi-server authentication protocols using smart card
*Jue-Sam Chou 1, Yalin Chen2, Chun-Hui Huang 3, Yu-Siang Huang4
2012/405 ( PDF )
Secure Computation on Floating Point Numbers
Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele
2012/404 ( PDF )
Secret Sharing Schemes for Very Dense Graphs
Amos Beimel and Oriol Farràs and Yuval Mintz
2012/403 ( PDF )
Fully Private Revocable Predicate Encryption
Juan Manuel Gonzälez Nieto and Mark Manulis and Dongdong Sun
2012/402 ( PDF )
Forward-Secure Hierarchical Predicate Encryption
Juan Manuel Gonzälez Nieto and Mark Manulis and Dongdong Sun
2012/401 ( PDF )
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
Martin Albrecht and Gregor Leander
2012/400 ( PDF )
An Algebraic Fault Attack on the LED Block Cipher
Philipp Jovanovic and Martin Kreuzer and Ilia Polian
2012/399 ( PDF )
Differential Fault Analysis on Block Cipher Piccolo
Kitae Jeong
2012/398 ( PDF )
PIRMAP: Efficient Private Information Retrieval for MapReduce
Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
2012/397 ( PDF )
Cross-Domain Password-Based Authenticated Key Exchange Revisited
Liqun Chen and Hoon Wei Lim and Guomin Yang
2012/396 ( PDF )
On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$
Brajesh Kumar Singh
2012/395 ( PDF )
A New Efficient Authenticated ID-Based Group Key Agreement Protocol
Morteza Arifi and Mahmoud Gardeshi and Mohammad Sabzinejad Farash
2012/394 ( PDF )
An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks
Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari
2012/393 ( PDF )
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings
Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat
2012/392 ( PDF )
ID Based Signcryption Scheme in Standard Model
S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan
2012/391 ( PDF )
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
Shaohui Wang,Sujuan Liu,Danwei Chen
2012/390 ( PDF )
Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three
Chol-Sun Sin
2012/389 ( PDF )
Wide Strong Private RFID Identification based on Zero-Knowledge
Roel Peeters and Jens Hermans
2012/388 ( PDF )
The Arithmetic Codex
Ignacio Cascudo and Ronald Cramer and Chaoping Xing
2012/387 ( PDF )
New cryptographic constructions using generalized learning with errors problem
Jintai ding
2012/386 ( PDF )
Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards
Rafael Martínez-Peláez and Francisco Rico-Novella
2012/385 ( PDF )
CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing
Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen
2012/384 ( PDF )
Functional Encryption for Regular Languages
Brent Waters
2012/383 ( PDF )
Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited
Junji Shikata
2012/382 ( PDF )
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
Afonso Arriaga and Manuel Barbosa and Pooya Farshim
2012/381 ( -- withdrawn -- )
A Strongly Secure Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles
Zheng Yang
2012/380 ( PDF )
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
Ioana Boureanu and Serge Vaudenay
2012/379 ( PDF )
All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments
Eiichiro Fujisaki
2012/378 ( PDF )
Multiparty Proximity Testing with Dishonest Majority from Equality Testing
Ran Gelles and Rafail Ostrovsky and Kina Winoto
2012/377 ( PDF )
Distributed Key Generation in the Wild
Aniket Kate and Yizhou Huang and Ian Goldberg
2012/376 ( PDF )
Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem
Colleen M. Swanson and Douglas R. Stinson
2012/375 ( PDF )
How to Store some Secrets
Reto E. Koenig and Rolf Haenni
2012/374 ( PDF )
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
Omar Choudary and Felix Grobert and Joachim Metz
2012/373 ( PDF )
Optimal Lower Bound for Differentially Private Multi-Party Aggregation
T-H. Hubert Chan and Elaine Shi and Dawn Song
2012/372 ( -- withdrawn -- )
New Preimage Attacks on Hash Modes of AES-256
Deukjo Hong and Dong-Chan Kim and Daesung Kwon
2012/371 ( PDF )
Simultaneous hashing of multiple messages
Shay Gueron and Vlad Krasnov
2012/370 ( PDF )
Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
Renaud Dubois and Aurore Guillevic and Marine Sengelin Le Breton
2012/369 ( PDF )
Factorisation of RSA-704 with CADO-NFS
Shi Bai and Emmanuel Thomé and Paul Zimmermann
2012/368 ( PDF )
Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs
Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski and Rabia Shahid and Malik Umar Sharif
2012/367 ( PDF )
On Continual Leakage of Discrete Log Representations
Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs
2012/366 ( PDF )
Securing Circuits Against Constant-Rate Tampering
Dana Dachman-Soled and Yael Tauman Kalai
2012/365 ( PDF )
Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy
Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
2012/364 ( PDF )
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions
Ivan Damgard and Adriana Lopez-Alt
2012/363 ( PDF )
A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions
Anne Canteaut and Thomas Fuhr and María Naya-Plasencia and Pascal Paillier and Jean-René Reinhard and Marion Videau
2012/362 ( PDF )
Achieving Constant Round Leakage-Resilient Zero-Knowledge
Omkant Pandey
2012/361 ( PDF )
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
Michele Mosca and Douglas Stebila and Berkant Ustaoglu
2012/360 ( PDF )
Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics
Céline Blondeau and Benoît Gérard and Kaisa Nyberg
2012/359 ( PDF )
Another look at non-uniformity
Neal Koblitz and Alfred Menezes
2012/358 ( PDF )
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --
Gilles Piret and Thomas Roche and Claude Carlet
2012/357 ( PDF )
Publicly Verifiable Ciphertexts
Juan Manuel Gonzälez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila
2012/356 ( PDF )
Fully Anonymous Attribute Tokens from Lattices
Jan Camenisch and Gregory Neven and Markus Rückert
2012/355 ( PDF )
Never trust a bunny
Daniel J. Bernstein and Tanja Lange
2012/354 ( PDF )
Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
Arno Mittelbach
2012/353 ( PDF )
On Reconfigurable Fabrics and Generic Side-Channel Countermeasures
Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik
2012/352 ( PS PS.GZ PDF )
On Hashing Graphs
Ashish Kundu, Elisa Bertino
2012/351 ( PDF )
SipHash: a fast short-input PRF
Jean-Philippe Aumasson and Daniel J. Bernstein
2012/350 ( PDF )
A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption
Liangliang Xiao and I-Ling Yen
2012/349 ( PDF )
A Differential Fault Attack on Grain-128a using MACs
Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
2012/348 ( PDF )
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Gregory Neven
2012/347 ( PDF )
Algebraic Differential Fault Attacks on LED using a Single Fault Injection
Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji
2012/346 ( PS PS.GZ PDF )
Edwards model of elliptic curves defined over any fields
Oumar DIAO and Emmanuel FOUOTSA
2012/345 ( PDF )
Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$
Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi
2012/344 ( PDF )
Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code
2012/343 ( PDF )
High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions
Tamas Gyorfi and Octavian Cret and Guillaume Hanrot and Nicolas Brisebarre
2012/342 ( PDF )
Enhancing Location Privacy for Electric Vehicles (at the right time)
Joseph Liu and Man Ho Au and Willy Susilo and Jianying Zhou
2012/341 ( PDF )
From Selective to Full Security: Semi-Generic Transformations in the Standard Model
Michel Abdalla and Dario Fiore and Vadim Lyubashevsky
2012/340 ( PDF )
Deciding Epistemic and Strategic Properties of Cryptographic Protocols
Henning Schnoor
2012/339 ( PDF )
Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash
Adi Shamir and Eldad Zinger
2012/338 ( PDF )
Characterizations on Algebraic Immunity for Multi-Output Boolean Functions
Xiao Zhong and Mingsheng Wang
2012/337 ( PDF )
Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme
Sanjay Bhattacherjee and Palash Sarkar
2012/336 ( PDF )
RSA modulus generation in the two-party case
Gerald Gavin
2012/335 ( PDF )
Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition
Yu Lou and Huiting Han and Chunming Tang and Maozhi Xu
2012/334 ( PDF )
On the Traceability of Tags in SUAP RFID Authentication Protocols
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2012/333 ( PDF )
On the Feasibility of Extending Oblivious Transfer
Yehuda Lindell and Hila Zarosim
2012/332 ( PDF )
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/331 ( PDF )
Homomorphic Authentication Codes for Network Coding
Zhaohui Tang
2012/330 ( PDF )
A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences
Xu ZiJie and Xu Ke
2012/329 ( PDF )
An Analysis of ZVP-Attack on ECC Cryptosystems
Claude Crépeau and Raza Ali Kazmi
2012/328 ( PS PS.GZ PDF )
The Multivariate Probabilistic Encryption Scheme MQQ-ENC
Danilo Gligoroski and Simona Samardjiska
2012/327 ( PDF )
Security Analysis of RAPP An RFID Authentication Protocol based on Permutation
Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
2012/326 ( PDF )
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
Allison Lewko and Brent Waters
2012/325 ( PDF )
A note on generalized bent criteria for Boolean functions
Sugata Gangopadhyay, Enes Pasalic and Pantelimon Stanica
2012/324 ( PDF )
3D Hardware Canaries
Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf
2012/323 ( PDF )
ML Confidential: Machine Learning on Encrypted Data
Thore Graepel and Kristin Lauter and Michael Naehrig
2012/322 ( PDF )
Revisiting Dedicated and Block Cipher based Hash Functions
Anupam Pattanayak
2012/321 ( PDF )
DECT Security Analysis
Erik Tews
2012/320 ( PDF )
The Discrete Logarithm Problem in non-representable rings
Matan Banin and Boaz Tsaban
2012/319 ( PDF )
Bounds on the Threshold Gap in Secret Sharing and its Applications
Ignacio Cascudo and Ronald Cramer and Chaoping Xing
2012/318 ( PDF )
Non-uniform cracks in the concrete: the power of free precomputation
Daniel J. Bernstein and Tanja Lange
2012/317 ( PDF )
A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)
Markku-Juhani O. Saarinen and Daniel Engels
2012/316 ( PDF )
Computationally Complete Symbolic Attacker in Action
Gergei Bana and Pedro Adão and Hideki Sakurada
2012/315 ( PDF )
Using Variance to Analyze Visual Cryptography Schemes
Teng Guo and Feng Liu and ChuanKun Wu and YoungChang Hou
2012/314 ( PDF )
Generation of Nonlinear Feedback Shift Registers with special-purpose hardware
Tomasz Rachwalik and Janusz Szmidt and Robert Wicik, and Janusz Zablocki
2012/313 ( -- withdrawn -- )
An anonymous proxy signature scheme without random oracles
Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/312 ( PDF )
Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Debiao He
2012/311 ( PDF )
Tightly Secure Signatures and Public-Key Encryption
Dennis Hofheinz and Tibor Jager
2012/310 ( PDF )
A mathematical problem for security analysis of hash functions and pseudorandom generators
Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata
2012/309 ( PDF )
Fast and compact elliptic-curve cryptography
Mike Hamburg
2012/308 ( PDF )
Verified Security of Redundancy-Free Encryption from Rabin and RSA
Gilles Barthe and David Pointcheval and Santiago Zanella-Béguelin
2012/307 ( PDF )
Multi-Channel Broadcast Encryption
Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh
2012/306 ( PDF )
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
Marcel Keller and Gert Læssøe Mikkelsen and Andy Rupp
2012/305 ( PDF )
Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography
Duong Hieu Phan and Viet Cuong Trinh
2012/304 ( PDF )
Actively Secure Two-Party Evaluation of any Quantum Operation
Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail
2012/303 ( PDF )
On The Distribution of Linear Biases: Three Instructive Examples
Mohamed Ahmed Abdelraheem and Martin Aagren and Peter Beelen and Gregor Leander
2012/302 ( PDF )
On instance separation in the UC-framework
István Vajda
2012/301 ( PDF )
A Public Shuffle without Private Permutations
Myungsun Kim and Jinsu Kim and Jung Hee Cheon
2012/300 ( PDF )
Threshold Implementations of all 3x3 and 4x4 S-boxes
B. Bilgin and S.Nikova and V.Nikov and V.Rijmen and G.Stütz
2012/299 ( PDF )
Differential Power Analysis on ZUC Algorithm
TANG Ming, CHENG PingPan ,QIU ZhenLong
2012/298 ( PDF )
Anonymous Credentials Light
Foteini Baldimtsi and Anna Lysyanskaya
2012/297 ( PDF )
Tamper and Leakage Resilience in the Split-State Model
Feng-Hao Liu and Anna Lysyanskaya
2012/296 ( PDF )
In the blink of an eye: There goes your AES key
Sergei Skorobogatov and Christopher Woods
2012/295 ( PDF )
Broadcast-enhanced key predistribution schemes
Michelle Kendall and Keith M. Martin and Siaw-Lynn Ng and Maura B. Paterson and Douglas R. Stinson
2012/294 ( PDF )
Two grumpy giants and a baby
Daniel J. Bernstein and Tanja Lange
2012/293 ( PDF )
New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors
Wei Wei and Chengliang Tian and Xiaoyun Wang
2012/292 ( PDF )
An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle
Jon Passki and Tom Ritter
2012/291 ( PDF )
Efficient Dynamic Provable Possession of Remote Data via Update Trees
Yihua Zhang and Marina Blanton
2012/290 ( PDF )
Fully Homomorphic Message Authenticators
Rosario Gennaro and Daniel Wichs
2012/289 ( PS PS.GZ PDF )
Ring Group Signatures
Liqun Chen
2012/288 ( PDF )
Fair Exchange of Short Signatures without Trusted Third Party
Philippe Camacho
2012/287 ( PDF )
Computationally-Fair Group and Identity-Based Key-Exchange
Andrew C. Yao and Yunlei Zhao
2012/286 ( PS PS.GZ PDF )
Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis
Sk Subidh Ali and Debdeep Mukhopadhyay
2012/285 ( PDF )
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2012/284 ( PDF )
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Fabrice Ben Hamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2012/283 ( PDF )
Some properties of q-ary functions based on spectral analysis
Deep Singh and Maheshanand Bhaintwal
2012/282 ( PDF )
Md. Iftekhar Salam and Hoon-Jae Lee
2012/281 ( PDF )
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications
Dario Fiore and Rosario Gennaro
2012/280 ( PDF )
Improved ``Partial Sums"-based Square Attack on AES
Michael Tunstall
2012/279 ( PDF )
Concurrent Zero Knowledge in the Bounded Player Model
Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti
2012/278 ( PS PS.GZ PDF )
Improved Indifferentiability Security Bound for the JH Mode
Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
2012/277 ( PS PS.GZ PDF )
Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil
Rkia Aouinatou (1) Mostafa Belkasmi (2)
2012/276 ( PDF )
Official Arbitration with Secure Cloud Storage Application
Alptekin Küpçü
2012/275 ( PDF )
Implementing BLAKE with AVX, AVX2, and XOP
Samuel Neves and Jean-Philippe Aumasson
2012/274 ( PDF )
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
Aleksandar Kircanski and Amr M. Youssef
2012/273 ( PDF )
Public-Key Cryptography from New Multivariate Quadratic Assumptions
Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang
2012/272 ( PS PS.GZ PDF )
Passive Corruption in Statistical Multi-Party Computation
Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub
2012/271 ( -- withdrawn -- )
Homomorphic Signature for Identity Authentication in Cloud Computing
Zhiwei Wang, Guozi Sun and Danwei Chen
2012/270 ( PDF )
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings
Enrico Thomae
2012/269 ( PDF )
Quantifying Side-Channel Information Leakage from Web Applications
Luke Mather and Elisabeth Oswald
2012/268 ( PDF )
On the CCA2 Security of McEliece in the Standard Model
Edoardo Persichetti
2012/267 ( PDF )
Self-pairings on Hyperelliptic Curves
Steven D. Galbraith and Chang-An Zhao
2012/266 ( PDF )
Compilation Techniques for Efficient Encrypted Computation
Christopher Fletcher and Marten van Dijk and Srinivas Devadas
2012/265 ( PDF )
Foundations of Garbled Circuits
Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
2012/264 ( PDF )
On the (In)Security of IDEA in Various Hashing Modes
Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang
2012/263 ( PDF )
One-way Functions from Chebyshev Polynomials
Kai-Yuen Cheong
2012/262 ( PDF )
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
I. Damgard and M. Keller and E. Larraia and C. Miles and N.P. Smart
2012/261 ( PDF )
Dual Form Signatures: An Approach for Proving Security from Static Assumptions
Michael Gerbush and Allison Lewko and Adam O'Neill and Brent Waters
2012/260 ( PDF )
Transposition of AES Key Schedule
Jialin Huang, Xuejia Lai
2012/259 ( PDF )
A Novel Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/258 ( PDF )
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols
José Bacelar Almeida and Manuel Barbosa and Endre Bangerter and Gilles Barthe and Stephan Krenn and Santiago Zanella Béguelin
2012/257 ( -- withdrawn -- )
The Transformation from the Galois NLFSR to the Fibonacci Configuration
Lin Zhiqiang
2012/256 ( PDF )
The myth of generic DPA...and the magic of learning
Carolyn Whitnall and Elisabeth Oswald and François-Xavier Standaert
2012/255 ( PDF )
How to Garble Arithmetic Circuits
Benny Applebaum and Yuval Ishai and Eyal Kushilevitz
2012/254 ( PDF )
FastPRP: Fast Pseudo-Random Permutations for Small Domains
Emil Stefanov and Elaine Shi
2012/253 ( PDF )
Cryptanalysis of pairing-free certificateless authenticated key agreement protocol
Zhian Zhu
2012/252 ( PDF )
Fair Private Set Intersection with a Semi-trusted Arbiter
Changyu Dong and Liqun Chen and Jan Camenisch and Giovanni Russello
2012/251 ( PDF )
The Linux Pseudorandom Number Generator Revisited
Patrick Lacharme and Andrea Röck and Vincent Strubel and Marion Videau
2012/250 ( PDF )
New Identity Based Encryption And Its Proxy Re-encryption
Xu An Wang and Xiaoyuan Yang
2012/249 ( PDF )
Binary and q-ary Tardos codes, revisited
Boris Skoric and Jan-Jaap Oosterwijk
2012/248 ( PDF )
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
Ghassan O. Karame and Elli Androulaki and Srdjan Capkun
2012/247 ( PDF )
On Efficient Pairings on Elliptic Curves over Extension Fields
Xusheng Zhang and Kunpeng Wang and Dongdai Lin
2012/246 ( PDF )
A Secret Sharing Scheme Based on Group Presentations and the Word Problem
Maggie Habeeb and Delaram Kahrobaei and Vladimir Shpilrain
2012/245 ( PDF )
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes
Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen
2012/244 ( PDF )
Cryptography from tensor problems
Leonard J. Schulman
2012/243 ( PDF )
2012/242 ( PDF )
Less is More: Relaxed yet Composable Security Notions for Key Exchange
C. Brzuska and M. Fischlin and N.P. Smart and B. Warinschi and S. Williams
2012/241 ( PDF )
Key distribution system and attribute-based encryption
Masahiro Yagisawa
2012/240 ( PDF )
Field Switching in BGV-Style Homomorphic Encryption
Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart
2012/239 ( PDF )
Zero-Knowledge for Multivariate Polynomials
Valerie Nachef and Jacques Patarin and Emmanuel Volte
2012/238 ( PDF )
The Boomerang Attacks on the Round-Reduced Skein-512
Hongbo Yu and Jiazhe Chen and XIaoyun Wang
2012/237 ( PS PS.GZ PDF )
In the point of view security, An efficient scheme in IBE with random oracle
Rkia Aouinatou1, Mostafa Belkasmi2
2012/236 ( PDF )
On Necessary and Sufficient Conditions for Private Ballot Submission
D. Bernhard and O. Pereira and B. Warinschi
2012/235 ( PDF )
Ring-LWE in Polynomial Rings
Leo Ducas and Alain Durmus
2012/234 ( PDF )
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
2012/233 ( PDF )
A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis
Qi Chai and Guang Gong
2012/232 ( PDF )
Implementing Pairings at the 192-bit Security Level
Diego F. Aranha and Laura Fuentes-Castañeda and Edward Knapp and Alfred Menezes and Francisco Rodríguez-Henríquez
2012/231 ( PDF )
A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT
Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin and Pengwei Wang
2012/230 ( PDF )
On Ideal Lattices and Learning with Errors Over Rings
Vadim Lyubashevsky and Chris Peikert and Oded Regev
2012/229 ( PDF )
Languages with Efficient Zero-Knowledge PCP's are in SZK
Mohammad Mahmoody and David Xiao
2012/228 ( PDF )
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
Marten van Dijk and Ulrich Rührmair
2012/227 ( -- withdrawn -- )
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
Ding Wang and Chun-guang Ma and Peng Wu
2012/226 ( PDF )
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
Sarah Meiklejohn and C. Chris Erway and Alptekin Küpçü and Theodora Hinkle and Anna Lysyanskaya
2012/225 ( PDF )
When Homomorphism Becomes a Liability
Zvika Brakerski
2012/224 ( PDF )
Shorter IBE and Signatures via Asymmetric Pairings
Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee
2012/223 ( PDF )
A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes
Enrico Thomae
2012/222 ( PDF )
A secret sharing scheme of prime numbers based on hardness of factorization
Kai-Yuen Cheong
2012/221 ( PDF )
Almost-Everywhere Secure Computation with Edge Corruptions
Nishanth Chandran and Juan Garay and Rafail Ostrovsky
2012/220 ( PDF )
Hedged Public-key Encryption: How to Protect against Bad Randomness
Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek
2012/219 ( PDF )
Private Fingerprint Matching
Siamak F. Shahandashti and Reihaneh Safavi-Naini and Philip Ogunbona
2012/218 ( PDF )
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
T-H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu
2012/217 ( PDF )
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2012/216 ( PDF )
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
Duong-Hieu Phan and David Pointcheval and Siamak F. Shahandashti and Mario Strefler
2012/215 ( PDF )
Quadratic Span Programs and Succinct NIZKs without PCPs
Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova
2012/214 ( PDF )
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version)
Shengbao Wu and Mingsheng Wang
2012/213 ( PDF )
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
2012/212 ( PDF )
Perfect Algebraic Immune Functions
Meicheng Liu and Yin Zhang and Dongdai Lin
2012/211 ( PDF )
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama
2012/210 ( PDF )
On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks
Yusong Du, and Fangguo Zhang
2012/209 ( PS PS.GZ PDF )
Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications
Donghoon Chang and Moti Yung
2012/208 ( PDF )
Jay Shah and Ayan Mahalanobis
2012/207 ( -- withdrawn -- )
Cryptanalysis of Hummingbird-2
Kai Zhang, Lin Ding and Jie Guan
2012/206 ( PDF )
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version)
Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou
2012/205 ( PDF )
Information-flow control for programming on encrypted data
J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman
2012/204 ( PDF )
Unique Group Signatures
Matthew Franklin and Haibin Zhang
2012/203 ( PDF )
Robust biometric-based user authentication scheme for wireless sensor networks
Debiao He
2012/202 ( PDF )
Secure Similarity Coefficients Computation with Malicious Adversaries
Bo Zhang and Fangguo Zhang
2012/201 ( PDF )
Comment an Anonymous Multi-receiver Identity-based Encryption Scheme
J.H.Zhang, Y.B.Cui
2012/200 ( PDF )
Aggregate Signcryption
Alexander W. Dent
2012/199 ( PDF )
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm
Jean-Charles Faugère and Pierrick Gaudry and Louise Huot and Guénaël Renault
2012/198 ( PDF )
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
Jae Hong Seo and Jung Hee Cheon
2012/197 ( PDF )
On The Security of One-Witness Blind Signature Schemes
Foteini Baldimtsi and Anna Lysyanskaya
2012/196 ( PDF )
Multi-Instance Security and its Application to Password-Based Cryptography
Mihir Bellare and Thomas Ristenpart and Stefano Tessaro
2012/195 ( PDF )
The BlueJay Ultra-Lightweight Hybrid Cryptosystem
Markku-Juhani O. Saarinen
2012/194 ( PDF )
A Multivariate based Threshold Ring Signature Scheme
Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
2012/193 ( PDF )
An Efficient Homomorphic Encryption Protocol for Multi-User Systems
Liangliang Xiao and Osbert Bastani and I-Ling Yen
2012/192 ( PDF )
Extending Order Preserving Encryption for Multi-User Systems
Liangliang Xiao and I-Ling Yen and Dung T. Huynh
2012/191 ( PDF )
Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes
Liangliang Xiao and I-Ling Yen
2012/190 ( PDF )
On the Security of an Improved Password Authentication Scheme Based on ECC
Ding Wang and Chun-guang Ma
2012/189 ( PDF )
Universally Composable Key-Management
Steve Kremer and Robert Künnemann and Graham Steel
2012/188 ( PS PS.GZ PDF )
Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification
Xin Li
2012/187 ( PDF )
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)
Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann
2012/186 ( PDF )
Third-order nonlinearities of some biquadratic monomial Boolean functions
Brajesh Kumar Singh
2012/185 ( PDF )
Replay attacks that violate ballot secrecy in Helios
Ben Smyth
2012/184 ( PDF )
Asymptotic fingerprinting capacity in the Combined Digit Model
Dion Boesten and Boris Skoric
2012/183 ( PDF )
Differentially Private Smart Metering with Battery Recharging
Michael Backes and Sebastian Meiser
2012/182 ( PDF )
How to Construct Quantum Random Functions
Mark Zhandry
2012/181 ( PDF )
A Modular Framework for Multi-Factor Authentication and Key Exchange
Nils Fleischhacker and Mark Manulis and Amir Azodi
2012/180 ( PDF )
Yet Another SHA-3 Round 3 FPGA Results Paper
Brian Baldwin and William P. Marnane
2012/179 ( PDF )
Billion-Gate Secure Computation with Malicious Adversaries
Benjamin Kreuter and abhi shelat and Chih-hao Shen
2012/178 ( PDF )
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification
Aleksander Essex and Jeremy Clark and Urs Hengartner and Carlisle Adams
2012/177 ( PDF )
Everlasting Multi-Party Computation
Unruh, Dominique
2012/176 ( PS PS.GZ PDF )
Improvements of Algebraic Attacks Based on Structured Gaussian Elimination
Satrajit Ghosh and Abhijit Das
2012/175 ( PDF )
Optimal First-Order Masking with Linear and Non-Linear Bijections
Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY and Jean-Luc DANGER
2012/174 ( PDF )
Zero Knowledge with Rubik's Cubes and Non-Abelian Groups
Emmanuel VOLTE and Jacques PATARIN and Valérie NACHEF
2012/173 ( PS PS.GZ PDF )
Automatically Verified Mechanized Proof of One-Encryption Key Exchange
Bruno Blanchet
2012/172 ( PDF )
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz
2012/171 ( PS PS.GZ PDF )
Quantum Money from Hidden Subspaces
Scott Aaronson and Paul Christiano
2012/170 ( PDF )
Approaches for the performance increasing of software implementation of integer multiplication in prime fields
Vladislav Kovtun and Andrew Okhrimenko
2012/169 ( PDF )
Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers
Xiaopei Guo, Kejian Xu, Tongsen Sun and Xiubin Fan
2012/168 ( PDF )
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes
Valérie Gauthier and Ayoub Otmani and Jean-Pierre Tillich
2012/167 ( PDF )
Pairing-based methods for genus 2 jacobians with maximal endomorphism ring
Sorina Ionica
2012/166 ( PDF )
A List of Maximum Period NLFSRs
Elena Dubrova
2012/165 ( PDF )
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy
Cristina Onete
2012/164 ( PDF )
On Secure Two-party Integer Division
Morten Dahl, Chao Ning, Tomas Toft
2012/163 ( PDF )
Differential propagation analysis of Keccak
Joan Daemen and Gilles Van Assche
2012/162 ( PS PS.GZ PDF )
Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network
Jayaprakash Kar
2012/161 ( PDF )
New Constructions of Low Correlation Sequences with High Linear Complexity
Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
2012/160 ( -- withdrawn -- )
New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set
Hai Xiong, Longjiang Qu, Chao Li
2012/159 ( PDF )
Hybrid Encryption in the Multi-User Setting
G.M. Zaverucha
2012/158 ( PDF )
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
Peter Gazi and Stefano Tessaro
2012/157 ( PDF )
Attack on Fully Homomorphic Encryption over the Integers
Gu Chunsheng
2012/156 ( PDF )
Fast Embedded Software Hashing
Dag Arne Osvik
2012/155 ( PS PS.GZ PDF )
Toward Practical Group Encryption
Laila El Aimani and Marc Joye
2012/154 ( -- withdrawn -- )
The Joint Signature and Encryption Revisited
Laila El Aimani
2012/153 ( PDF )
A Framework for the Cryptographic Verification of Java-like Programs
Ralf Kuesters and Tomasz Truderung and Juergen Graf
2012/152 ( PDF )
On security of a Certificateless Aggregate Signature Scheme
Limin Shen, Yinxia Sun
2012/151 ( PDF )
On Boolean Ideals and Varieties with Application to Algebraic Attacks
Alexander Rostovtsev and Alexey Mizyukin
2012/150 ( PDF )
Circular chosen-ciphertext security with compact ciphertexts
Dennis Hofheinz
2012/149 ( PDF )
Attacking Scrambled Burrows-Wheeler Transform
Martin Stanek
2012/148 ( PDF )
Replacing Username/Password with Software-Only Two-Factor Authentication
Michael Scott
2012/147 ( PDF )
On Security Arguments of the Second Round SHA-3 Candidates
Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger
2012/146 ( PDF )
On Polynomial Systems Arising from a Weil Descent
Christophe Petit and Jean-Jacques Quisquater
2012/145 ( PDF )
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryou Fujita
2012/144 ( PDF )
Somewhat Practical Fully Homomorphic Encryption
Junfeng Fan and Frederik Vercauteren
2012/143 ( PDF )
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
2012/142 ( PDF )
Identity-Based Encryption with Master Key-Dependent Message Security and Applications
David Galindo and Javier Herranz and Jorge Villar
2012/141 ( PDF )
Bicliques for permutations: collision and preimage attacks in stronger settings
Dmitry Khovratovich
2012/140 ( PDF )
Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors
Selcuk Baktir and Erkay Savas
2012/139 ( PDF )
Formal verication of secure ad-hoc network routing protocols using deductive model-checking
Ta Vinh Thong
2012/138 ( PDF )
An Improved Differential Attack on Full GOST (extended version)
Nicolas T. Courtois
2012/137 ( PDF )
Usable assembly language for GPUs: a success story
Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
2012/136 ( PDF )
Adaptive Key Protection in Complex Cryptosystems with Attributes
Zilong Wang and Danfeng (Daphne) Yao and Rongquan Feng
2012/135 ( PDF )
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token
Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade
2012/134 ( PDF )
A Digital Signature Scheme for Long-Term Security
Dimitrios Poulakis and Robert Rolland
2012/133 ( PDF )
Toward Practical Private Access to Data Centers via Parallel ORAM
Jacob R. Lorch and Bryan Parno and James Mickens and Mariana Raykova and Joshua Schiffman
2012/132 ( PDF )
CFS Software Implementation
Gregory Landais and Nicolas Sendrier
2012/131 ( PDF )
Composition Theorems for CCA Cryptographic Security
Rodolphe Lampe and Jacques Patarin
2012/130 ( PDF )
Broadcast (and Round) Efficient Verifiable Secret Sharing
Juan Garay and Clint Givens and Rafail Ostrovsky and Pavel Raykov
2012/129 ( PDF )
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Nelly Fazio and Irippuge Milinda Perera
2012/128 ( PDF )
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols
Marc Fischlin and Cristina Onete
2012/127 ( PDF )
Additive autocorrelation of some classes of cubic semi-bent Boolean functions
Deep Singh and Maheshanand Bhaintwal
2012/126 ( PDF )
Compact Implementation of Threefish and Skein on FPGA
Nuray At and Jean-Luc Beuchat and Ismail San
2012/125 ( -- withdrawn -- )
Short and Efficient Expressive Attribute-Based Signature in the Standard Model
Aijun Ge and Cheng Chen and Chuangui Ma and Zhenfeng Zhang
2012/124 ( PS PS.GZ PDF )
On Securing Communication From Profilers
Sandra Diaz-Santiago and Debrup Chakraborty
2012/123 ( PDF )
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-
A. Dehbaoui and J.M. Dutertre and B. Robisson and P. Orsatelli and P. Maurine and A. Tria
2012/122 ( PDF )
Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three
Reza R. Farashahi and Hongfeng Wu and Chang-An Zhao
2012/121 ( PDF )
An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps
Mitra Fatemi and Taraneh Eghlidos and Mohammadreza Aref
2012/120 ( PDF )
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks
Yongge Wang
2012/119 ( PDF )
Accelerating the Final Exponentiation in the Computation of the Tate Pairings
Taechan Kim, Sungwook Kim, Jung Hee Cheon
2012/118 ( PDF )
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks
S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
2012/117 ( PDF )
Universally Composable Security With Local Adversaries
Ran Canetti and Margarita Vald
2012/116 ( PDF )
Clash Attacks on the Verifiability of E-Voting Systems
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2012/115 ( PDF )
Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing
XU Chun-xiang and HE Xiao-hu and Daniel Abraha
2012/114 ( PDF )
On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives
Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
2012/113 ( PDF )
On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model
Bart Mennink
2012/112 ( PDF )
On The Nonlinearity of Maximum-length NFSR Feedbacks
Meltem Sonmez Turan
2012/111 ( PDF )
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks
Yin Zhang and Meicheng Liu and Dongdai Lin
2012/110 ( PDF )
Finding Optimal Formulae for Bilinear Maps
Razvan Barbulescu and Jérémie Detrey and Nicolas Estibals and Paul Zimmermann
2012/109 ( -- withdrawn -- )
Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model
Yang Cui and Kirill Morozov
2012/108 ( PDF )
On the Optimality of Lattices for the Coppersmith Technique
Yoshinori Aono and Manindra Agrawal and Takakazu Satoh and Osamu Watanabe
2012/107 ( PDF )
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
Guilin Wang and Jiangshan Yu and Qi Xie
2012/106 ( PDF )
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents
Santanu Sarkar and Subhamoy Maitra
2012/105 ( PDF )
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited
Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
2012/104 ( PDF )
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
2012/103 ( PDF )
FlipIt: The Game of "Stealthy Takeover"
Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest
2012/102 ( PDF )
On the Circular Security of Bit-Encryption
Ron Rothblum
2012/101 ( -- withdrawn -- )
Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)>=3"
Zhihui Ou
2012/100 ( PDF )
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
Shahram Khazaei and Björn Terelius and Douglas Wikström
2012/099 ( PDF )
Homomorphic Evaluation of the AES Circuit
Craig Gentry and Shai Halevi and Nigel P. Smart
2012/098 ( PS PS.GZ PDF )
Combined Attacks on the AES Key Schedule
François Dassance and Alexandre Venelli
2012/097 ( PDF )
An algorithm for factoring integers
Yingpu Deng and Yanbin Pan
2012/096 ( PDF )
The Collision Security of MDC-4
Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel
2012/095 ( PDF )
Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data
Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer
2012/094 ( PDF )
Algebraic attack on lattice based cryptosystems via solving equations over real numbers.
Jintai Ding and Dieter Schmidt
2012/093 ( PDF )
Recent Results on Balanced Symmetric Boolean Functions
Yingming Guo and Guangpu Gao and Yaqun Zhao
2012/092 ( PDF )
Tolerant Algebraic Side-Channel Analysis of {AES}
Yossef Oren and Avishai Wool
2012/091 ( -- withdrawn -- )
Hardness of decision (R)LWE for any modulus
Adeline Langlois and Damien Stehle
2012/090 ( PDF )
Worst-Case to Average-Case Reductions for Module Lattices
Adeline Langlois and Damien Stehle
2012/089 ( PDF )
ECM at Work
Joppe W. Bos and Thorsten Kleinjung
2012/088 ( -- withdrawn -- )
A Lattice-Based Traitor Tracing Scheme
San Ling and Damien Stehle
2012/087 ( PDF )
Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms
Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev
2012/086 ( -- withdrawn -- )
Remarks on- An ideal multi-secret sharing scheme based on MSP
Zhi-hui Li Jing Li
2012/085 ( PDF )
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery
Stanislav Bulygin and Michael Walter
2012/084 ( PDF )
Improved Algebraic Side-Channel Attack on AES
Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter
2012/083 ( PDF )
Optimally Robust Private Information Retrieval
Casey Devet and Ian Goldberg and Nadia Heninger
2012/082 ( PDF )
Semi-Supervised Template Attack
Liran Lerman and Stephane Fernandes Medeiros and Nikita Veshchikov and Cedric Meuter and Gianluca Bontempi and Olivier Markowitch
2012/081 ( PDF )
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification
Michael Backes and Fabian Bendun and Dominique Unruh
2012/080 ( PDF )
Strongly Unforgeable Proxy Re-Signatures in the Standard Model
S. Sree Vivek and S. Sharmila Deva Selvi and Guhan Balasubramanian and C. Pandu Rangan
2012/079 ( PDF )
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
2012/078 ( PDF )
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
Zvika Brakerski
2012/077 ( PDF )
Sebastien Tiran and Amine Dehbaoui and Philippe Maurine
2012/076 ( PDF )
Secure Identity-Based Encryption in the Quantum Random Oracle Model
Mark Zhandry
2012/075 ( PDF )
Efficient identity-based threshold decryption scheme from bilinear pairings
Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang and Guoyan Zhang
2012/074 ( PDF )
Another look at HMAC
Neal Koblitz and Alfred Menezes
2012/073 ( PDF )
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model
Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
2012/072 ( PDF )
Particularly Friendly Members of Family Trees
Craig Costello
2012/071 ( PDF )
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems
Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer
2012/070 ( PDF )
Finding ECM-Friendly Curves through a Study of Galois Properties
Razvan Barbulescu and Joppe W. Bos and Cyril Bouvier and Thorsten Kleinjung and Peter L. Montgomery
2012/069 ( PDF )
Automatic Search of Attacks on round-reduced AES and Applications
Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque
2012/068 ( -- withdrawn -- )
Extended Security Arguments for (Ring) Signature Schemes
Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, and Pierre-Louis Cayrel
2012/067 ( PDF )
Parallelizing message schedules to accelerate the computations of hash functions
Shay Gueron, Vlad Krasnov
2012/066 ( PDF )
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
Jiqiang Lu and Wen-She Yap and Yongzhuang Wei
2012/065 ( PDF )
Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha”
Tsukasa Ishiguro
2012/064 ( PDF )
Ron was wrong, Whit is right
Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter
2012/063 ( PDF )
Randomized Partial Checking Revisited
Shahram Khazaei and Douglas Wikström
2012/062 ( -- withdrawn -- )
On the Security of Attribute Based Signature Schemes
S Sharmila Deva Selvi and Subhashini Venugopalan and C. Pandu Rangan
2012/061 ( PDF )
A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/060 ( PDF )
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
David Mandell Freeman
2012/059 ( PDF )
Message Authentication, Revisited
Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs
2012/058 ( PS PS.GZ PDF )
Key recycling in authentication
Christopher Portmann
2012/057 ( PDF )
Anonymous Constant-Size Ciphertext HIBE From Asymmetric Pairings
Somindu C. Ramanna and Palash Sarkar
2012/056 ( PDF )
A New Pseudorandom Generator from Collision-Resistant Hash Functions
Alexandra Boldyreva and Virendra Kumar
2012/055 ( -- withdrawn -- )
Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks
Hongbin Tang and Xinsong Liu
2012/054 ( PDF )
On the performance of certain Private Set Intersection protocols
Emiliano De Cristofaro and Gene Tsudik
2012/053 ( PS PS.GZ PDF )
Beating Shannon requires BOTH efficient adversaries AND non-zero advantage
Yevgeniy Dodis
2012/052 ( PDF )
Identity-based Encryption with Efficient Revocation
Alexandra Boldyreva and Vipul Goyal and Virendra Kumar
2012/051 ( PDF )
Eavesdropping on Satellite Telecommunication Systems
Benedikt Driessen
2012/050 ( PDF )
Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture
Jeremy Constantin and Andreas Burg and Frank K. Gurkaynak
2012/049 ( PDF )
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160
Yu Sasaki and Lei Wang
2012/048 ( PDF )
Designing Integrated Accelerator for Stream Ciphers with Structural Similarities
Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid
2012/047 ( PDF )
Incremental Deterministic Public-Key Encryption
Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev
2012/046 ( PDF )
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity
Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis
2012/045 ( PDF )
Signature Schemes Secure against Hard-to-Invert Leakage
Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel
2012/044 ( PDF )
PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems
Jun Zhou, Zhenfu Cao
2012/043 ( PDF )
A novel Group Key Transfer Protocol
Chingfang Hsu and Bing Zeng and Qi Cheng and Guohua Cui
2012/042 ( PDF )
Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing
Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi
2012/041 ( -- withdrawn -- )
Norziana Jamil and Ramlan Mahmood and Muhammad Reza Z'aba and Nur Izura Udzir and Zuriati Ahmad Zukarnaen
2012/040 ( PDF )
Single-block collision attack on MD5
Marc Stevens
2012/039 ( PDF )
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol
Feng Hao and Dylan Clarke
2012/038 ( PDF )
Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure
François Durvaux and Mathieu Renauld and François-Xavier Standaert and Loic van Oldeneel tot Oldenzeel and Nicolas Veyrat-Charvillon
2012/037 ( PDF )
Some results on $q$-ary bent functions
Deep Singh, Maheshanand Bhaintwal and Brajesh Kumar Singh
2012/036 ( PS PS.GZ PDF )
Efficient Leakage-free Authentication of Trees, Graphs and Forests
Ashish Kundu, Mikhail Atallah, Elisa Bertino
2012/035 ( PDF )
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
2012/034 ( PDF )
Automatic Quantification of Cache Side-Channels
Boris Köpf and Laurent Mauborgne and Martin Ochoa
2012/033 ( PDF )
A note on hyper-bent functions via Dillon-like exponents
Sihem Mesnager and Jean-Pierre Flori
2012/032 ( PS PS.GZ PDF )
Counterexamples to Hardness Amplification Beyond Negligible
Yevgeniy Dodis and Abhishek Jain and Tal Moran and Daniel Wichs
2012/031 ( PDF )
An error in "On a new formal proof model for RFID location privacy"
Da-Zhi Sun
2012/030 ( PDF )
Fault Analysis of the KATAN Family of Block Ciphers
Shekh Faisal Abdul-Latip and Mohammad Reza Reyhanitabar and Willy Susilo and Jennifer Seberry
2012/029 ( PDF )
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
Yannick Seurin
2012/028 ( PDF )
A First-Order Leak-Free Masking Countermeasure
Houssem MAGHREBI and Emmanuel PROUFF and Sylvain GUILLEY and Jean-Luc DANGER
2012/027 ( -- withdrawn -- )
Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack
Ali Mackvandi and Maryam Saeed and Mansour Naddafiun
2012/026 ( PS PS.GZ PDF )
Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding
Anja Becker and Antoine Joux and Alexander May and Alexander Meurer
2012/025 ( PDF )
A new remote data integrity checking scheme for cloud storage
Xiangtao Yan and Yifa Li
2012/024 ( PS PS.GZ PDF )
Variants of Waters' Dual-System Primitives Using Asymmetric Pairings
Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar
2012/023 ( PS PS.GZ PDF )
On the security of Lo et al.’s ownership transfer protocol
Masoumeh Safkhani and Nasour Bagheri and Majid Naderi and Ali Mahani
2012/022 ( PS PS.GZ PDF )
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity
Mihir Bellare and Stefano Tessaro
2012/021 ( -- withdrawn -- )
Security Analysis of J-PAKE
Mohsen Toorani
2012/020 ( PDF )
Dickson polynomials, hyperelliptic curves and hyper-bent functions
Jean-Pierre Flori and Sihem Mesnager
2012/019 ( PDF )
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
Gergei Bana and Hubert Comon-Lundh
2012/018 ( PDF )
Attacks and Security Proofs of EAX-Prime
Kazuhiko Minematsu and Stefan Lucks and Hiraku Morita and Tetsu Iwata
2012/017 ( PDF )
Secondary constructions on generalized bent functions
Brajesh Kumar Singh
2012/016 ( -- withdrawn -- )
Efficient Mix-Net Verication by Proofs of Random Blocks
Denise Demirel and Melanie Volkamer and Hugo Jonker
2012/015 ( PS PS.GZ PDF )
A Cryptographic Treatment of the Wiretap Channel
Mihir Bellare and Stefano Tessaro and Alexander Vardy
2012/014 ( PDF )
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
2012/013 ( -- withdrawn -- )
Higher Order Algebraic Attacks on Stream Ciphers
Qichun Wang and Thomas Johansson
2012/012 ( PDF )
Malleable Proof Systems and Applications
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2012/011 ( PDF )
Biclique Attack of the Full ARIA-256
Shao-zhen Chen Tian-min Xu
2012/010 ( PDF )
PayTree: "Amortized Signature" for Flexible Micro-Payments
Charanjit Jutla and Moti Yung
2012/009 ( PDF )
On the Indifferentiability of the Integrated-Key Hash Functions
Saif Al-Kuwari
2012/008 ( PDF )
Security proof with dishonest keys
Hubert Comon-Lundh and Véronique Cortier and Guillaume Scerri
2012/007 ( PDF )
Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures
Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
2012/006 ( PDF )
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
Susan Hohenberger and Allison Lewko and Brent Waters
2012/005 ( PDF )
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Benjamin Fuller and Adam O'Neill and Leonid Reyzin
2012/004 ( PDF )
The new SHA-3 software shootout
Daniel J. Bernstein and Tanja Lange
2012/003 ( PDF )
On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng, Wen-Feng Qi and Tian Tian
2012/002 ( PDF )
Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
2012/001 ( PDF )
Digital Signatures from Challenge-Divided Sigma-Protocols
Andrew C. Yao and Yunlei Zhao

[ Cryptology ePrint archive ]