Cryptology ePrint Archive: Listing for 2018
-
2018/1251 ( PDF )
- Accountable Tracing Signatures from Lattices
- San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
-
2018/1250 ( PDF )
- Function Private Predicate Encryption for Low Min-Entropy Predicates
- Sikhar Patranabis and Debdeep Mukhopadhyay and Somindu C. Ramanna
-
2018/1249 ( PDF )
- Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations
- NingBo Li and TanPing Zhou and XiaoYuan Yang and YiLiang Han and Longfei Liu and WenChao Liu
-
2018/1248 ( PDF )
- Fiat-Shamir: From Practice to Theory, Part II (NIZK and Correlation Intractability from Circular-Secure FHE)
- Ran Canetti and Alex Lombardi and Daniel Wichs
-
2018/1247 ( PDF )
- qSCMS: Post-quantum certificate provisioning process for V2X
- Paulo S. L. M. Barreto and Jefferson E. Ricardini and Marcos A. Simplicio Jr. and Harsh Kupwade Patil
-
2018/1246 ( PDF )
- Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution
- Dat Le Tien and Frank Eliassen
-
2018/1245 ( PDF )
- Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics
- Jung Hee Cheon and Andrey Kim and Donggeon Yhee
-
2018/1244 ( PDF )
- Fully Deniable Interactive Encryption
- Ran Canetti and Sunoo Park and Oxana Poburinnaya
-
2018/1243 ( -- withdrawn -- )
- BoxDB: Realistic Adversary Model for Distance Bounding
- Ioana Boureanu and David Gerault and Pascal Lafourcade
-
2018/1242 ( PDF )
- Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions
- Nicolas T. Courtois
-
2018/1241 ( PDF )
- Universally Composable Accumulators
- Foteini Baldimtsi and Ran Canetti and Sophia Yakoubov
-
2018/1240 ( -- withdrawn -- )
- Jevil's Encryption Systems
- Nadim Kobeissi
-
2018/1239 ( PDF )
- Proof-of-Stake Sidechains
- Peter Gaži and Aggelos Kiayias and Dionysis Zindros
-
2018/1238 ( PDF )
- Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
- Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi
-
2018/1237 ( PDF )
- Sum-of-Squares Meets Program Obfuscation, Revisited
- Boaz Barak and Samuel B. Hopkins and Aayush Jain and Pravesh Kothari and Amit Sahai
-
2018/1236 ( PDF )
- Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks
- Mark Abspoel and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede
-
2018/1235 ( PDF )
- Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free
- Adi Akavia and Craig Gentry and Shai Halevi and Max Leibovich
-
2018/1234 ( PDF )
- FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers
- Raymond K. Zhao and Ron Steinfeld and Amin Sakzad
-
2018/1233 ( PDF )
- Key Assignment Scheme with Authenticated Encryption
- Suyash Kandele and Souradyuti Paul
-
2018/1232 ( PDF )
- Certificate Transparency Using Blockchain
- D S V Madala and Mahabir Prasad Jhanwar and Anupam Chattopadhyay
-
2018/1231 ( PDF )
- Post-quantum verifiable random functions from ring signatures
- Endre Abraham
-
2018/1230 ( PDF )
- Pooled Mining Makes Selfish Mining Tricky
- Suhyeon Lee and Seungjoo Kim
-
2018/1229 ( PDF )
- On Some Computational Problems in Local Fields
- Yingpu Deng, Lixia Luo and Guanju Xiao
-
2018/1228 ( -- withdrawn -- )
- Multi-Party Oblivious RAM based on Function Secret Sharing and Replicated Secret Sharing Arithmetic
- Marina Blanton and Chen Yuan
-
2018/1227 ( PDF )
- Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation
- Louis Cianciullo and Hossein Ghodosi
-
2018/1226 ( PDF )
- Boolean Exponent Splitting
- Michael Tunstall and Louiza Papachristodoulou and Kostas Papagiannopoulos
-
2018/1225 ( PDF )
- XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
- Wen Wang and Bernhard Jungk and Julian Wälde and Shuwen Deng and Naina Gupta and Jakub Szefer and Ruben Niederhagen
-
2018/1224 ( PDF )
- Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups
- Essam Ghadafi
-
2018/1223 ( PDF )
- Error Amplification in Code-based Cryptography
- Alexander Nilsson and Thomas Johansson and Paul Stankovski Wagner
-
2018/1222 ( PDF )
- Implementing Token-Based Obfuscation under (Ring) LWE
- Cheng Chen and Nicholas Genise and Daniele Micciancio and Yuriy Polyakov and Kurt Rohloff
-
2018/1221 ( PDF )
- Using the Cloud to Determine Key Strengths -- Triennial Update
- M. Delcourt and T. Kleinjung and A.K. Lenstra and S. Nath and D. Page and N. Smart
-
2018/1220 ( PDF )
- Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model
- Taiga Mizuide and Atsushi Takayasu and Tsuyoshi Takagi
-
2018/1219 ( PDF )
- Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property
- Tomer Ashur and Raluca Posteuca
-
2018/1218 ( PDF )
- Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications
- Dan Boneh and Yuval Ishai and Alain Passelègue and Amit Sahai and David J. Wu
-
2018/1217 ( PDF )
- Changing Points in APN Functions
- Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nikolay Kaleyski
-
2018/1216 ( PDF )
- This is Not an Attack on Wave
- Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
-
2018/1215 ( PDF )
- New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves
- Suhri Kim and Kisoon Yoon and Jihoon Kwon and Young-Ho Park and Seokhie Hong
-
2018/1214 ( PDF )
- Instant Privacy-Preserving Biometric Authentication for Hamming Distance
- Joohee Lee and Dongwoo Kim and Duhyeong Kim and Yongsoo Song and Junbum Shin and Jung Hee Cheon
-
2018/1213 ( PDF )
- Deep Learning vs Template Attacks in front of fundamental targets: experimental study
- Yevhenii ZOTKIN and Francis OLIVIER and Eric BOURBAO
-
2018/1212 ( PDF )
- Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols
- Itai Dinur and Niv Nadler
-
2018/1211 ( PDF )
- Countering Block Withholding Attack Effciently
- Suhyeon Lee and Seungjoo Kim
-
2018/1210 ( PDF )
- MProve: A Proof of Reserves Protocol for Monero Exchanges
- Arijit Dutta and Saravanan Vijayakumaran
-
2018/1209 ( PDF )
- Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security
- Min Liang
-
2018/1208 ( PDF )
- Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications
- Jun Xu and Santanu Sarkar and Lei Hu
-
2018/1207 ( PDF )
- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders
- Nicolas Sendrier and Valentin Vasseur
-
2018/1206 ( PDF )
- ARPA Whitepaper
- Derek Zhang and Alex Su and Felix Xu and Jiang Chen
-
2018/1205 ( PDF )
- Cryptanalysis of a code-based one-time signature
- Jean-Christophe Deneuville and Philippe Gaborit
-
2018/1204 ( PDF )
- The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
- Antonis Michalas
-
2018/1203 ( PDF )
- DAGS: Reloaded Revisiting Dyadic Key Encapsulation
- Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre-Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thiecoumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane N'diaye and Duc Tri Nguyen and Edoardo Persichetti and Jefferson E. Ricardini
-
2018/1202 ( PDF )
- AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
- Jihye Kim and Jiwon Lee and Hankyung Ko and Donghwan Oh and Semin Han and Kwonho Jeong and Hyunok Oh
-
2018/1201 ( PDF )
- Subversion in Practice: How to Efficiently Undermine Signatures
- Joonsang Baek and Willy Susilo and Jongkil Kim and Yang-Wai Chow
-
2018/1200 ( PDF )
- On a Rank-Metric Code-Based Cryptosystem with Small Key Size
- Julian Renner and Sven Puchinger and Antonia Wachter-Zeh
-
2018/1199 ( PDF )
- Quantum Equivalence of the DLP and CDHP for Group Actions
- Steven Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren
-
2018/1198 ( PDF )
- On Lions and Elligators: An efficient constant-time implementation of CSIDH
- Michael Meyer and Fabio Campos and Steffen Reith
-
2018/1197 ( PDF )
- Automated software protection for the masses against side-channel attacks
- NICOLAS BELLEVILLE and DAMIEN COUROUSSÉ and KARINE HEYDEMANN and HENRI-PIERRE CHARLES
-
2018/1196 ( PDF )
- Gradient Visualization for General Characterization in Profiling Attacks
- Loïc Masure and Cécile Dumas and Emmanuel Prouff
-
2018/1195 ( PDF )
- M&M: Masks and Macs against Physical Attacks
- Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
-
2018/1194 ( PDF )
- On Degree-d Zero-Sum Sets of Full Rank
- Christof Beierle and Alex Biryukov and Aleksei Udovenko
-
2018/1193 ( PDF )
- Quantum Chosen-Ciphertext Attacks against Feistel Ciphers
- Gembu Ito and Akinori Hosoyamada and Ryutaroh Matsumoto and Yu Sasaki and Tetsu Iwata
-
2018/1192 ( PDF )
- Durandal: a rank metric based signature scheme
- Nicolas Aragon and Olivier Blazy and Philippe Gaborit and Adrien Hauteville and Gilles Zémor
-
2018/1191 ( PDF )
- Cryptanalysis of 2-round KECCAK-384
- Rajendra Kumar and Nikhil Mittal and Shashank Singh
-
2018/1190 ( PDF )
- Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)
- Sanjit Chatterjee and Sayantan Mukherjee
-
2018/1189 ( PDF )
- The Role of the Adversary Model in Applied Security Research
- Quang Do and Ben Martini and Kim-Kwang Raymond Choo
-
2018/1188 ( PDF )
- Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
- Dan Boneh and Benedikt Bünz and Ben Fisch
-
2018/1187 ( PDF )
- Automatic Search for A Variant of Division Property Using Three Subsets (Full Version)
- Kai Hu and Meiqin Wang
-
2018/1186 ( PDF )
- MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets
- Senpeng Wang and Bin Hu and Jie Guan and Kai Zhang and Tairong Shi
-
2018/1185 ( PDF )
- On Quantum Chosen-Ciphertext Attacks and Learning with Errors
- Gorjan Alagic and Stacey Jeffery and Maris Ozols and Alexander Poremba
-
2018/1184 ( PDF )
- Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity
- Nasser Alsalami and Bingsheng Zhang
-
2018/1183 ( PDF )
- Lossy Trapdoor Permutations with Improved Lossiness
- Benedikt Auerbach and Eike Kiltz and Bertram Poettering and Stefan Schoenen
-
2018/1182 ( -- withdrawn -- )
- Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes
- Fangguo Zhang and Zhuoran Zhang
-
2018/1181 ( PDF )
- Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe
- Christian Wittke and Ievgen Kabin and Dan Klann and Zoya Dyka and Anton Datsuk and Peter Langendoerfer
-
2018/1180 ( PDF )
- Lattice-Based Signature from Key Consensus
- Leixiao Cheng and Boru Gong and Yunlei Zhao
-
2018/1179 ( PDF )
- Elliptic Curves in Generalized Huff's Model
- Ronal Pranil Chand and Maheswara Rao Valluri
-
2018/1178 ( PDF )
- Pseudo-Free Families of Computational Universal Algebras
- Mikhail Anokhin
-
2018/1177 ( PDF )
- Excalibur Key-Generation Protocols For DAG Hierarchic Decryption
- Louis Goubin and Geraldine Monsalve and Juan Reutter and Francisco Vial Prado
-
2018/1176 ( PDF )
- Downgradable Identity-based Encryption and Applications
- Olivier Blazy and Paul Germouty and Duong Hieu Phan
-
2018/1175 ( PDF )
- New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
- Ravishankar Borgaonkar and Lucca Hirschi and Shinjo Park and Altaf Shaik
-
2018/1174 ( PDF )
- A Comparison of NTRU Variants
- John M. Schanck
-
2018/1173 ( PDF )
- The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
- Eyal Ronen and Robert Gillham and Daniel Genkin and Adi Shamir and David Wong and Yuval Yarom
-
2018/1172 ( PDF )
- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
- Jan-Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede
-
2018/1171 ( PDF )
- PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion
- Chenglu Jin and Marten van Dijk and Michael K. Reiter and Haibin Zhang
-
2018/1170 ( PDF )
- Toward RSA-OAEP without Random Oracles
- Nairen Cao and Adam O'Neill and Mohammad Zaheri
-
2018/1169 ( PDF )
- Placing Conditional Disclosure of Secrets in the Communication Complexity Universe
- Benny Applebaum and Prashant Nalini Vasudevan
-
2018/1168 ( PDF )
- Result Pattern Hiding Searchable Encryption for Conjunctive Queries
- Shangqi Lai and Sikhar Patranabis and Amin Sakzad and Joseph K. Liu and Debdeep Mukhopadhyay and Ron Steinfeld and Shi-Feng Sun and Dongxi Liu and Cong Zuo
-
2018/1167 ( PDF )
- On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission
- Ravi Kishore and Ashutosh Kumar and Chiranjeevi Vanarasa and Kannan Srinathan
-
2018/1166 ( PDF )
- Keeping Time-Release Secrets through Smart Contracts
- Jianting Ning and Hung Dang and Ruomu Hou and Ee-Chien Chang
-
2018/1165 ( PDF )
- Identity-Concealed Authenticated Encryption and Key Exchange
- Yunlei Zhao
-
2018/1164 ( PDF )
- Can you sign a quantum state
- Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz
-
2018/1163 ( PDF )
- More on sliding right
- Joachim Breitner
-
2018/1162 ( PDF )
- On the Concrete Security of Goldreich’s Pseudorandom Generator
- Geoffroy Couteau and Aurélien Dupin and Pierrick Méaux and Mélissa Rossi and Yann Rotella
-
2018/1161 ( PDF )
- Adaptively Secure MPC with Sublinear Communication Complexity
- Ran Cohen and abhi shelat and Daniel Wichs
-
2018/1160 ( PDF )
- Algebraic normal form of a bent function: properties and restrictions
- Natalia Tokareva
-
2018/1159 ( PDF )
- Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions
- Sihem Mesnager and Kwang Ho Kim and Myong Song Jo
-
2018/1158 ( PDF )
- Adversarially Robust Property Preserving Hash Functions
- Elette Boyle and Rio LaVigne and Vinod Vaikuntanathan
-
2018/1157 ( PDF )
- Special Soundness Revisited
- Douglas Wikström
-
2018/1156 ( PDF )
- Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS
- Eunkyung Kim and Hyang-Sook Lee and Jeongeun Park
-
2018/1155 ( PDF )
- Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption
- Pedro Branco and Jintai Ding and Manuel Goulão and Paulo Mateus
-
2018/1154 ( PDF )
- Leakage Resilient Secret Sharing and Applications
- Akshayaram Srinivasan and Prashant Nalini Vasudevan
-
2018/1153 ( PDF )
- Dfinity Consensus, Explored
- Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren
-
2018/1152 ( PDF )
- Improvements of Blockchain’s Block Broadcasting:An Incentive Approach
- Qingzhao Zhang and Yijun Leng and Lei Fan
-
2018/1151 ( PDF )
- Analysis Of The Simulatability Of An Oblivious Transfer
- Bing Zeng
-
2018/1150 ( PDF )
- Quantum-secure message authentication via blind-unforgeability
- Gorjan Alagic and Christian Majenz and Alexander Russell and Fang Song
-
2018/1149 ( PDF )
- Compressive Sensing based Leakage Sampling and Reconstruction: A First Study
- Changhai Ou and Chengju Zhou and Siew-Kei Lam
-
2018/1148 ( PDF )
- Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token
- Mirosław Kutyłowski and Lucjan Hanzlik and Kamil Kluczniak
-
2018/1147 ( PDF )
- Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures
- Divesh Aggarwal and Ivan Damgard and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto and Joao Ribeiro and Mark Simkin
-
2018/1146 ( -- withdrawn -- )
- Functional Analysis Attacks on Logic Locking
- Deepak Sirone and Pramod Subramanyan
-
2018/1145 ( PDF )
- Privacy Computing: Concept, Computing Framework And Future Development Trends
- Fenghua Li and Hui Li and Ben Niu and Jinjun Chen
-
2018/1144 ( PDF )
- Revisiting Non-Malleable Secret Sharing
- Saikrishna Badrinarayanan and Akshayaram Srinivasan
-
2018/1143 ( PDF )
- A new SNOW stream cipher called SNOW-V
- Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang
-
2018/1142 ( PDF )
- Factoring Products of Braids via Garside Normal Form
- Simon-Philipp Merz and Christophe Petit
-
2018/1141 ( PDF )
- Fast Authentication from Aggregate Signatures with Improved Security
- Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz
-
2018/1140 ( PDF )
- Efficient Fully-Leakage Resilient One-More Signature Schemes
- Antonio Faonio
-
2018/1139 ( PDF )
- Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications
- Kexin Hu and Zhenfeng Zhang and Kaiven Guo
-
2018/1138 ( PDF )
- Leakage-Resilient Secret Sharing
- Ashutosh Kumar and Raghu Meka and Amit Sahai
-
2018/1137 ( PDF )
- Genus 2 curves with given split Jacobian
- Jasper Scholten
-
2018/1136 ( PDF )
- A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
- S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan
-
2018/1135 ( PDF )
- PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains
- Sébastien Andreina and Jens-Matthias Bohli and Ghassan O. Karame and Wenting Li and Giorgia Azzurra Marson
-
2018/1134 ( PDF )
- Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
- Nicholas Stifter and Philipp Schindler and Aljosha Judmayer and Alexei Zamyatin and Andreas Kern and Edgar Weippl
-
2018/1133 ( PDF )
- A Public Key Exchange Cryptosystem Based on Ideal Secrecy
- Vamshi Krishna Kammadanam and Virendra R. Sule and Yi Hong
-
2018/1132 ( PDF )
- Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake
- Thomas Kerber and Markulf Kohlweiss and Aggelos Kiayias and Vassilis Zikas
-
2018/1131 ( PDF )
- A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
- Arinjita Paul and Varshika Srinivasavaradhan and S. Sharmila Deva Selvi and C. Pandu Rangan
-
2018/1130 ( PDF )
- A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
- Ashwin Jha and Mridul Nandi
-
2018/1129 ( PDF )
- On Kilian's Randomization of Multilinear Map Encodings
- Jean-Sebastien Coron and Hilder V. L. Pereira
-
2018/1128 ( PDF )
- Direct Anonymous Attestation with Optimal TPM Signing Efficiency
- Kang Yang and Liqun Chen and Zhenfeng Zhang and Christopher J.P. Newton and Bo Yang and Li Xi
-
2018/1127 ( PDF )
- Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks
- P. Arun Babu and Jithin Jose Thomas
-
2018/1126 ( PDF )
- Lightweight AE and HASH in a Single Round Function
- Dingfeng Ye and Danping Shi and Peng Wang
-
2018/1125 ( PDF )
- Verifying liquidity of Bitcoin contracts
- Massimo Bartoletti and Roberto Zunino
-
2018/1124 ( PDF )
- Secure Opportunistic Multipath Key Exchange
- Sergiu Costea and Marios O. Choudary and Doru Gucea and Björn Tackmann and Costin Raiciu
-
2018/1123 ( PDF )
- When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
- Stjepan Picek and Annelie Heuser and Lichao Wu and Cesare Alippi and Francesco Regazzoni
-
2018/1122 ( PDF )
- Improved Quantum Multicollision-Finding Algorithm
- Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa
-
2018/1121 ( PDF )
- An Analysis of the ProtonMail Cryptographic Architecture
- Nadim Kobeissi
-
2018/1120 ( PDF )
- Organizational Cryptography for Access Control
- Masahito Gotaishi and Shigeo Tsujii
-
2018/1119 ( PDF )
- Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
- Matthias Fitzi and Peter Ga{ž}i and Aggelos Kiayias and Alexander Russell
-
2018/1118 ( PDF )
- Non-Interactive Non-Malleability from Quantum Supremacy
- Yael Tauman Kalai and Dakshita Khurana
-
2018/1117 ( PDF )
- A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness
- Felix Wegener and Amir Moradi
-
2018/1116 ( PDF )
- Fly, you fool! Faster Frodo for the ARM Cortex-M4
- Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam
-
2018/1115 ( PDF )
- Group Signature without Random Oracles from Randomizable Signatures
- Remi Clarisse and Olivier Sanders
-
2018/1114 ( PDF )
- Lightweight Circuits with Shift and Swap
- Subhadeep Banik and Francesco Regazzoni and Serge Vaudenay
-
2018/1113 ( PDF )
- Private Function Evaluation with Cards
- Alexander Koch and Stefan Walzer
-
2018/1112 ( PDF )
- DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm
- Tai-Yuan Chen and Wei-Ning Huang and Po-Chun Kuo and Hao Chung and Tzu-Wei Chao
-
2018/1111 ( -- withdrawn -- )
- Cryptanalysis of the Wave Signature Scheme
- Paulo S. L. M. Barreto and Edoardo Persichetti
-
2018/1110 ( PDF )
- Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies
- Dominic Deuber and Nico Döttling and Bernardo Magri and Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan
-
2018/1109 ( PDF )
- Faster SeaSign signatures through improved rejection sampling
- Thomas Decru and Lorenz Panny and Frederik Vercauteren
-
2018/1108 ( PDF )
- Covert Security with Public Verifiability: Faster, Leaner, and Simpler
- Cheng Hong and Jonathan Katz and Vladimir Kolesnikov and Wen-jie Lu and Xiao Wang
-
2018/1107 ( PDF )
- Further observations on SIMON and SPECK families of block ciphers
- S. M. Dehnavi
-
2018/1106 ( PDF )
- P4TC—Provably-Secure yet Practical Privacy-Preserving Toll Collection
- Valerie Fetzer and Max Hoffmann and Matthias Nagel and Andy Rupp and Rebecca Schwerdt
-
2018/1105 ( PDF )
- Proof-of-Stake Protocols for Privacy-Aware Blockchains
- Chaya Ganesh and Claudio Orlandi and Daniel Tschudi
-
2018/1104 ( PDF )
- Tropical cryptography II: extensions by homomorphisms
- Dima Grigoriev and Vladimir Shpilrain
-
2018/1103 ( PDF )
- Some Properties of Modular Addition
- Victoria Vysotskaya
-
2018/1102 ( PDF )
- A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing
- Mohammad Ali and Javad Mohajeri and Mohammad-Reza Sadeghi
-
2018/1101 ( PDF )
- Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments
- Lunzhi Deng
-
2018/1100 ( PDF )
- Correction to "Improving the DGK comparison protocol"
- Thijs Veugen
-
2018/1099 ( PDF )
- SoK: Modular and Efficient Private Decision Tree Evaluation
- Ágnes Kiss and Masoud Naderpour and Jian Liu and N. Asokan and Thomas Schneider
-
2018/1098 ( PDF )
- MARVELlous: a STARK-Friendly Family of Cryptographic Primitives
- Tomer Ashur and Siemen Dhooghe
-
2018/1097 ( PDF )
- End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
- Michael Schliep and Nicholas Hopper
-
2018/1096 ( PDF )
- On Finding Quantum Multi-collisions
- Qipeng Liu and Mark Zhandry
-
2018/1095 ( PDF )
- Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security
- Wen-Ran Zhang
-
2018/1094 ( PDF )
- Match Me if You Can: Matchmaking Encryption and its Applications
- Giuseppe Ateniese and Danilo Francati and David Nuñez and Daniele Venturi
-
2018/1093 ( PDF )
- Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
- Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima
-
2018/1092 ( PDF )
- Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
- Felix Wegener and Christian Baiker and Amir Moradi
-
2018/1091 ( PDF )
- Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
- Keisuke Hara and Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka
-
2018/1090 ( PDF )
- Plaintext Recovery Attack of OCB2
- Tetsu Iwata
-
2018/1089 ( PDF )
- On the impact of decryption failures on the security of LWE/LWR based schemes
- Jan-Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede
-
2018/1088 ( PDF )
- High-speed Side-channel-protected Encryption and Authentication in Hardware
- Nele Mentens and Vojtech Miskovsky and Martin Novotny and Jo Vliegen
-
2018/1087 ( PDF )
- Breaking the confidentiality of OCB2
- Bertram Poettering
-
2018/1086 ( PDF )
- Two Party Distribution Testing: Communication and Security
- Alexandr Andoni and Tal Malkin and Negev Shekel Nosatzki
-
2018/1085 ( PDF )
- Exact maximum expected differential and linear probability for 2-round Kuznyechik
- Vitaly Kiryukhin
-
2018/1084 ( PDF )
- A Deep Dive into Blockchain Selfish Mining
- Qianlan Bai and Xinyan Zhou and Xing Wang and Yuedong Xu and Xin Wang and Qingsheng Kong
-
2018/1083 ( PDF )
- Private Stateful Information Retrieval
- Sarvar Patel and Giuseppe Persiano and Kevin Yeo
-
2018/1082 ( PDF )
- An Algebraic Method to Recover Superpolies in Cube Attacks
- Chen-Dong Ye and Tian Tian
-
2018/1081 ( PDF )
- Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
- Jung Hee Cheon and Wonhee Cho and Minki Hhan and Jiseung Kim and Changmin Lee
-
2018/1080 ( PDF )
- How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation
- Yiwen Gao and Yongbin Zhou and Wei Cheng
-
2018/1079 ( PDF )
- Analysis of Deterministic Longest-Chain Protocols
- Elaine Shi
-
2018/1078 ( PDF )
- Two Round Information-Theoretic MPC with Malicious Security
- Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
-
2018/1077 ( PDF )
- More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers
- Hart Montgomery
-
2018/1076 ( PDF )
- Game Theoretic Notions of Fairness in Multi-Party Coin Toss
- Kai-Min Chung and Yue Guo and Wei-Kai Lin and Rafael Pass and Elaine Shi
-
2018/1075 ( -- withdrawn -- )
- Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES
- Jannis Bossert and Eik List and Stefan Lucks
-
2018/1074 ( PDF )
- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
- Felix Wegener and Amir Moradi
-
2018/1073 ( PDF )
- Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping
- Jung Hee Cheon and Kyoohyung Han and Minki Hhan
-
2018/1072 ( PDF )
- Construction of MDS Matrices from Generalized Feistel Structures
- Mahdi Sajadieh and Mohsen Mousavi
-
2018/1071 ( PDF )
- CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
- Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar
-
2018/1070 ( PDF )
- A New Batch FHE Scheme over the Integers
- Kwak Wi Song and Kim Chol Un
-
2018/1069 ( PDF )
- Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering
- Eshan Chattopadhyay and Xin Li
-
2018/1068 ( PDF )
- Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience
- Dana Dachman-Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi
-
2018/1067 ( PDF )
- On Quantum Slide Attacks
- Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher
-
2018/1066 ( PDF )
- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness
- Akinori Hosoyamada and Takashi Yamakawa
-
2018/1065 ( PDF )
- Homomorphic Secret Sharing for Low Degree Polynomials
- Russell W. F. Lai and Giulio Malavolta and Dominique Schröder
-
2018/1064 ( PDF )
- Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction
- Nithyashankari Gummidipoondi Jayasankaran and Adriana Sanabria Borbon and Edgar Sanchez-Sinencio and Jiang Hu and Jeyavijayan Rajendran
-
2018/1063 ( PDF )
- Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
- Mashael AlSabah and Gabriele Oligeri and Ryan Riley
-
2018/1062 ( PDF )
- DAGsim: Simulation of DAG-based distributed ledger protocols
- Manuel Zander and Tom Waite and Dominik Harz
-
2018/1061 ( PDF )
- On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
- Behnam Zahednejad and Majid Bayat and Ashok Kumar Das
-
2018/1060 ( PDF )
- Port Contention for Fun and Profit
- Alejandro Cabrera Aldaya and Billy Bob Brumley and Sohaib ul Hassan and Cesar Pereida García and Nicola Tuveri
-
2018/1059 ( PDF )
- Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
- Daniel J. Bernstein and Tanja Lange and Chloe Martindale and Lorenz Panny
-
2018/1058 ( PDF )
- Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
- Yuzhao Cui and Qiong Huang and Jianye Huang and Hongbo Li and Guomin Yang
-
2018/1057 ( PDF )
- Limiting the impact of unreliable randomness in deployed security protocols
- Liliya Akhmetzyanova and Cas Cremers and Luke Garratt and Stanislav V. Smyshlyaev and Nick Sullivan
-
2018/1056 ( PDF )
- Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs
- Ahmad Al Badawi and Jin Chao and Jie Lin and Chan Fook Mun and Jun Jie Sim and Benjamin Hong Meng Tan and Xiao Nan and Khin Mi Mi Aung and Vijay Ramaseshan Chandrasekhar
-
2018/1055 ( PDF )
- Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation
- Pan Dongxue and Li Hongda and Ni Peifang
-
2018/1054 ( PDF )
- Efficient Multi-key FHE with short extended ciphertexts and less public parameters
- Tanping Zhou and Ningbo Li and Xiaoyuan Yang and Yiliang Han and Wenchao Liu
-
2018/1053 ( PDF )
- Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation
- Jothi Rangasamy and Lakshmi Kuppusamy
-
2018/1052 ( PDF )
- Verifiability Analysis of CHVote
- David Bernhard and Véronique Cortier and Pierrick Gaudry and Mathieu Turuani and Bogdan Warinschi
-
2018/1051 ( PDF )
- Lower Bounds for Differentially Private RAMs
- Giuseppe Persiano and Kevin Yeo
-
2018/1050 ( PDF )
- Towards Automatically Penalizing Multimedia Breaches
- Easwar Vivek Mangipudi and Krutarth Rao and Jeremy Clark and Aniket Kate
-
2018/1049 ( PDF )
- Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol
- Aggelos Kiayias and Alexander Russell
-
2018/1048 ( PDF )
- Proof-of-Work Sidechains
- Aggelos Kiayias and Dionysis Zindros
-
2018/1047 ( PDF )
- On the Linear Transformation in White-box Cryptography
- Seungkwang Lee and Nam-su Jho and Myungchul Kim
-
2018/1046 ( PDF )
- Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$
- Claude Carlet and Xi Chen* and Longjiang Qu
-
2018/1045 ( PDF )
- MPC Joins the Dark Side
- John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui
-
2018/1044 ( PDF )
- Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions
- Masahito Ishizaka and Kanta Matsuura
-
2018/1043 ( PDF )
- Improved Bootstrapping for Approximate Homomorphic Encryption
- Hao Chen and Ilaria Chillotti and Yongsoo Song
-
2018/1042 ( PDF )
- Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
- Brice Colombier and Alexandre Menu and Jean-Max Dutertre and Pierre-Alain Moëllic and Jean-Baptiste Rigaud and Jean-Luc Danger
-
2018/1041 ( PDF )
- Secure Outsourced Matrix Computation and Application to Neural Networks
- Xiaoqian Jiang and Miran Kim and Kristin Lauter and Yongsoo Song
-
2018/1040 ( PDF )
- Cryptanalysis of OCB2
- Akiko Inoue and Kazuhiko Minematsu
-
2018/1039 ( PDF )
- Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
- Georg Fuchsbauer and Michele Orrù and Yannick Seurin
-
2018/1038 ( PDF )
- On inversion modulo pseudo-Mersenne primes
- Michael Scott
-
2018/1037 ( PDF )
- The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
- Joël Alwen and Sandro Coretti and Yevgeniy Dodis
-
2018/1036 ( PDF )
- If a Generalised Butterfly is APN then it Operates on 6 Bits
- Anne Canteaut and Léo Perrin and Shizhu Tian
-
2018/1035 ( PDF )
- Relating different Polynomial-LWE problems
- Madalina Bolboceanu
-
2018/1034 ( PDF )
- Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
- Michael Kraitsberg and Yehuda Lindell and Valery Osheter and Nigel P. Smart and Younes Talibi Alaoui
-
2018/1033 ( PDF )
- One-Round Authenticated Group Key Exchange from Isogenies
- Atsushi Fujioka and Katsuyuki Takashima and Kazuki Yoneyama
-
2018/1032 ( PDF )
- Conditionals in Homomorphic Encryption and Machine Learning Applications
- Diego Chialva and Ann Dooms
-
2018/1031 ( PDF )
- Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
- Roderick Bloem and Rinat Iusupov and Martin Krenn and Stefan Mangard
-
2018/1030 ( PDF )
- Registration-Based Encryption from Standard Assumptions
- Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar
-
2018/1029 ( PDF )
- Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations
- Zhe Li and Chaoping Xing and Sze Ling Yeo
-
2018/1028 ( PDF )
- Synchronous Byzantine Agreement with Expected $O(1)$ Rounds, Expected $O(n^2)$ Communication, and Optimal Resilience
- Ittai Abraham and Srinivas Devadas and Danny Dolev and Kartik Nayak and Ling Ren
-
2018/1027 ( PDF )
- A Unified Security Perspective on Legally Fair Contract Signing Protocols
- Diana Maimut and George Teseleanu
-
2018/1026 ( PDF )
- Pairing-Friendly Twisted Hessian Curves
- Chitchanok Chuengsatiansup and Chloe Martindale
-
2018/1025 ( PDF )
- Integer Matrices Homomorphic Encryption and Its application
- Yanan Bai and Jingwei Chen and Yong Feng and Wenyuan Wu
-
2018/1024 ( PDF )
- ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution
- Karl Wüst and Sinisa Matetic and Moritz Schneider and Ian Miers and Kari Kostiainen and Srdjan Capkun
-
2018/1023 ( PDF )
- Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
- Jaehun Kim and Stjepan Picek and Annelie Heuser and Shivam Bhasin and Alan Hanjalic
-
2018/1022 ( PDF )
- Blind Certificate Authorities
- Liang Wang and Gilad Asharov and Rafael Pass and Thomas Ristenpart and abhi shelat
-
2018/1021 ( PDF )
- Multi-Client Functional Encryption with Repetition for Inner Product
- Jérémy Chotard and Edouard Dufour-Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
-
2018/1020 ( PDF )
- Non-Interactive Secure Computation from One-Way Functions
- Saikrishna Badrinarayanan and Abhishek Jain and Rafail Ostrovsky and Ivan Visconti
-
2018/1019 ( PDF )
- Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
- Chloé Hébant and Duong Hieu Phan and David Pointcheval
-
2018/1018 ( PDF )
- Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates
- Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe
-
2018/1017 ( PDF )
- TNFS Resistant Families of Pairing-Friendly Elliptic Curves
- Georgios Fotiadis and Elisavet Konstantinou
-
2018/1016 ( PDF )
- Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
- Gerben Geltink
-
2018/1015 ( PDF )
- Non-Malleable Codes Against Bounded Polynomial Time Tampering
- Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin
-
2018/1014 ( PDF )
- An FPGA-based programmable processor for bilinear pairings
- Eduardo Cuevas-Farfán and Miguel Morales-Sandoval and René Cumplido
-
2018/1013 ( PDF )
- E3: A Framework for Compiling C++ Programs with Encrypted Operands
- Eduardo Chielle and Oleg Mazonka and Homer Gamil and Nektarios Georgios Tsoutsos and Michail Maniatakos
-
2018/1012 ( PDF )
- The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE
- Guido Bertoni and Joan Daemen and Seth Hoffert and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
-
2018/1011 ( PDF )
- BISON - Instantiating the Whitened Swap-Or-Not Construction
- Anne Canteaut and Virginie Lallemand and Gregor Leander and Patrick Neumann and Friedrich Wiemer
-
2018/1010 ( PDF )
- Space Efficient Computational Multi-Secret Sharing and Its Applications
- Aggelos Kiayias and Murat Osmanoglu and Alexander Russell and Qiang Tang
-
2018/1009 ( PDF )
- LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
- Xianhui Lu and Yamin Liu and Zhenfei Zhang and Dingding Jia and Haiyang Xue and Jingnan He and Bao Li and Kunpeng Wang
-
2018/1007 ( PDF )
- Masking the AES with Only Two Random Bits
- Hannes Gross and Ko Stoffelen and Lauren De Meyer and Martin Krenn and Stefan Mangard
-
2018/1005 ( PDF )
- Code Offset in the Exponent
- Luke Demarest and Benjamin Fuller and Alexander Russell
-
2018/1004 ( PDF )
- Fiat-Shamir From Simpler Assumptions
- Ran Canetti and Yilei Chen and Justin Holmgren and Alex Lombardi and Guy N. Rothblum and Ron D. Rothblum
-
2018/1003 ( PDF )
- Secure Data Retrieval On The Cloud: Homomorphic Encryption Meets Coresets
- Adi Akavia and Dan Feldman and Hayim Shaul
-
2018/1002 ( PDF )
- "S-Box" Implementation of AES is NOT side-channel resistant
- C Ashokkumar and Bholanath Roy and M Bhargav Sri Venkatesh and Bernard L Menezes
-
2018/1001 ( PDF )
- Illuminating the Dark or how to recover what should not be seen in FE-based classifiers
- Sergiu Carpov and Caroline Fontaine and Damien Ligier and Renaud Sirdey
-
2018/1000 ( PDF )
- Adaptively Single-Key Secure Constrained PRFs for NC1
- Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
-
2018/999 ( PDF )
- A Refinement of ``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
- Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier and Yonglin Hao and Boxin Zhao
-
2018/998 ( -- withdrawn -- )
- A Key Recovery Attack on Streamlined NTRU Prime
- Chen Li
-
2018/997 ( PDF )
- Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
- Leonid Reyzin and Adam Smith and Sophia Yakoubov
-
2018/996 ( PDF )
- Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes
- Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
-
2018/995 ( PDF )
- Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE
- Shuai Zhou and Haiyang Xue and Daode Zhang and Kunpeng Wang and Xianhui Lu and Bao Li and Jingnan He
-
2018/994 ( PDF )
- People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes
- Long Chen and Qiang Tang
-
2018/993 ( PDF )
- The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
- Viet Tung Hoang and Stefano Tessaro and Aishwarya Thiruvengadam
-
2018/992 ( PDF )
- Deconstructing the Blockchain to Approach Physical Limits
- Vivek Bagaria and Sreeram Kannan and David Tse and Giulia Fanti and Pramod Viswanath
-
2018/991 ( PDF )
- Reconsidering Generic Composition: the Tag-then-Encrypt case
- Francesco Berti and Olivier Pereira and Thomas Peters
-
2018/990 ( PDF )
- Quisquis: A New Design for Anonymous Cryptocurrencies
- Prastudy Fauzi and Sarah Meiklejohn and Rebekah Mercer and Claudio Orlandi
-
2018/989 ( PDF )
- Kleptography trapdoor free cryptographic protocols
- Bohdan Kovalenko and Anton Kudin
-
2018/988 ( PDF )
- On the Hardness of Learning With Errors with Binary Secrets
- Daniele Micciancio
-
2018/987 ( PDF )
- Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
- Yehuda Lindell and Ariel Nof and Samuel Ranellucci
-
2018/986 ( PDF )
- Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs
- Sam Kim and David J. Wu
-
2018/985 ( PDF )
- Efficient Arithmetic In (Pseudo-)Mersenne Prime Order Fields
- Kaushik Nath and Palash Sarkar
-
2018/984 ( PDF )
- Pseudorandomness Against Mean and Variance Bounded Attackers
- Maciej Skorski
-
2018/983 ( PDF )
- Efficient UC Commitment Extension with Homomorphism for Free (and Applications)
- Ignacio Cascudo and Ivan Damgård and Bernardo David and Nico Döttling and Rafael Dowsley and Irene Giacomelli
-
2018/982 ( PDF )
- Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance
- Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada
-
2018/981 ( PDF )
- PaLa: A Simple Partially Synchronous Blockchain
- T-H. Hubert Chan and Rafael Pass and Elaine Shi
-
2018/980 ( PDF )
- PiLi: An Extremely Simple Synchronous Blockchain
- T-H. Hubert Chan and Rafael Pass and Elaine Shi
-
2018/979 ( PDF )
- FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers
- Carlos Andres Lara-Nino and Arturo Diaz-Perez and Miguel Morales-Sandoval
-
2018/978 ( PDF )
- Encrypted Multi-Maps with Computationally-Secure Leakage
- Seny Kamara and Tarik Moataz
-
2018/977 ( PDF )
- Threshold Single Password Authentication
- Devriş İşler and Alptekin Küpçü
-
2018/976 ( PDF )
- Distributed Single Password Protocol Framework
- Devriş İşler and Alptekin Küpçü
-
2018/975 ( PDF )
- User Study on Single Password Authentication
- Devriş İşler and Alptekin Küpçü and Aykut Coskun
-
2018/974 ( PDF )
- Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
- Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa
-
2018/973 ( PDF )
- How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO
- Aayush Jain and Amit Sahai
-
2018/972 ( PDF )
- Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
- Yonglin Hao and Lin Jiao and Chaoyun Li and Willi Meier and Yosuke Todo and Qingju Wang
-
2018/971 ( PDF )
- Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
- Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
-
2018/970 ( PDF )
- Protean Signature Schemes
- Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
-
2018/969 ( PDF )
- Optimal TNFS-secure pairings on elliptic curves with even embedding degree
- Georgios Fotiadis and Chloe Martindale
-
2018/968 ( PDF )
- Edrax: A Cryptocurrency with Stateless Transaction Validation
- Alexander Chepurnoy and Charalampos Papamanthou and Shravan Srinivasan and Yupeng Zhang
-
2018/967 ( PDF )
- Higher dimensional sieving for the number field sieve algorithms
- Laurent Grémy
-
2018/966 ( PDF )
- On the Security of the Multivariate Ring Learning with Errors Problem
- Carl Bootland and Wouter Castryck and Frederik Vercauteren
-
2018/965 ( PDF )
- Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
- Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenny Paterson
-
2018/964 ( PDF )
- Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas
- Saud Al Musa and Guangwu Xu
-
2018/963 ( PDF )
- On Enabling Attribute-Based Encryption to Be Traceable against Traitors
- Zhen Liu and Qiong Huang and Duncan S. Wong
-
2018/962 ( PDF )
- Zexe: Enabling Decentralized Private Computation
- Sean Bowe and Alessandro Chiesa and Matthew Green and Ian Miers and Pratyush Mishra and Howard Wu
-
2018/961 ( PDF )
- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs
- Shaofeng Zhu and Hua Chen and Limin Fan and Meihui Chen and Wei Xi and Dengguo Feng
-
2018/960 ( PDF )
- Towards Quantum One-Time Memories from Stateless Hardware
- Anne Broadbent and Sevag Gharibian and Hong-Sheng Zhou
-
2018/959 ( PDF )
- Information Entropy Based Leakage Certification
- Changhai Ou and Xinping Zhou and Siew-Kei Lam
-
2018/958 ( PDF )
- On Tightly Secure Primitives in the Multi-Instance Setting
- Dennis Hofheinz and Ngoc Khanh Nguyen
-
2018/957 ( PDF )
- Same Point Composable and Nonmalleable Obfuscated Point Functions
- Peter Fenteany and Benjamin Fuller
-
2018/956 ( PDF )
- Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
- Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang
-
2018/955 ( PDF )
- Compact Sparse Merkle Trees
- Faraz Haider
-
2018/954 ( PDF )
- Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging
- Daniel Jost and Ueli Maurer and Marta Mularczyk
-
2018/953 ( PDF )
- A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols
- Dmytro Bogatov and George Kollios and Leonid Reyzin
-
2018/952 ( PDF )
- Approximate Homomorphic Encryption over the Conjugate-invariant Ring
- Duhyeong Kim and Yongsoo Song
-
2018/951 ( PDF )
- The Landscape of Optimal Card-based Protocols
- Alexander Koch
-
2018/950 ( PDF )
- Security bound for CTR-ACPKM internally re-keyed encryption mode
- Liliya R. Akhmetzyanova, and Evgeny K. Alekseev, and Stanislav V. Smyshlyaev
-
2018/949 ( PDF )
- Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations
- Si Gao and Arnab Roy and Elisabeth Oswald
-
2018/948 ( PDF )
- MILP-Based Automatic Differential Searches for LEA and HIGHT
- Elnaz Bagherzadeh and Zahra Ahmadian
-
2018/947 ( PDF )
- On the security of Circulant UOV/Rainbow
- Yasufumi Hashimoto
-
2018/946 ( PDF )
- Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More
- Nicholas Genise and Daniele Micciancio and Yuriy Polyakov
-
2018/945 ( PDF )
- On the Inner Product Predicate and a Generalization of Matching Vector Families
- Balthazar Bauer and Jevgēnijs Vihrovs and Hoeteck Wee
-
2018/944 ( PDF )
- Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions
- Jeremiah Blocki and Ben Harsha and Siteng Kang and Seunghoon Lee and Lu Xing and Samson Zhou
-
2018/943 ( PDF )
- Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound
- Shuoyao Zhao and Yu Yu and Jiang Zhang and Hanlin Liu
-
2018/942 ( PDF )
- Insured MPC: Efficient Secure Computation with Financial Penalties
- Carsten Baum and Bernardo David and Rafael Dowsley
-
2018/941 ( PDF )
- A tutorial introduction to CryptHOL
- Andreas Lochbihler and S. Reza Sefidgar
-
2018/940 ( PDF )
- Reusable Non-Interactive Secure Computation
- Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan
-
2018/939 ( PDF )
- The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms
- Marcella Hastings and Nadia Heninger and Eric Wustrow
-
2018/938 ( PDF )
- Private Message Franking with After Opening Privacy
- Iraklis Leontiadis and Serge Vaudenay
-
2018/937 ( PDF )
- Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
- Mathias Wagner and Stefan Heyse
-
2018/936 ( PDF )
- New Techniques for Obfuscating Conjunctions
- James Bartusek and Tancrède Lepoint and Fermi Ma and Mark Zhandry
-
2018/935 ( PDF )
- Distinguishing Error of Nonlinear Invariant Attacks
- Subhabrata Samajder and Palash Sarkar
-
2018/934 ( PDF )
- Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
- Yuichi Komano and Hideo Shimizu and Hideyuki Miyake
-
2018/933 ( PDF )
- Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures
- Ferucio Laurentiu Tiplea and Constantin Catalin Dragan
-
2018/932 ( PDF )
- 18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices
- Philipp Koppermann and Eduard Pop and Johann Heyszl and Georg Sigl
-
2018/931 ( PDF )
- A Full RNS Variant of Approximate Homomorphic Encryption
- Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song
-
2018/930 ( PDF )
- A study on the fast ElGamal encryption
- Kim Gyu-Chol and Li Su-Chol
-
2018/929 ( PDF )
- Expander Graphs are Non-Malleable Codes
- Peter M. R. Rasmussen and Amit Sahai
-
2018/928 ( PDF )
- Generic Authenticated Key Exchange in the Quantum Random Oracle Model
- Kathrin Hövelmanns and Eike Kiltz and Sven Schäge and Dominique Unruh
-
2018/927 ( PDF )
- Adaptively Secure Distributed PRFs from LWE
- Benoît Libert and Damien Stehlé and Radu Titiu
-
2018/926 ( PDF )
- Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion
- Salim Ali Altug and Yilei Chen
-
2018/925 ( PDF )
- PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
- Songze Li and Mingchao Yu and A. Salman Avestimehr and Sreeram Kannan and Pramod Viswanath
-
2018/924 ( PDF )
- Forward Secure Signatures on Smart Cards
- Andreas Hülsing and Christoph Busold and Johannes Buchmann
-
2018/923 ( PDF )
- Delegatable Anonymous Credentials from Mercurial Signatures
- Elizabeth C. Crites and Anna Lysyanskaya
-
2018/922 ( PDF )
- Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
- Dušan Božilov and Miroslav Knežević and Ventzislav Nikov
-
2018/921 ( PDF )
- Round Optimal Black-Box “Commit-and-Prove”
- Dakshita Khurana and Rafail Ostrovsky and Akshayaram Srinivasan
-
2018/920 ( PDF )
- A Message Franking Channel
- Loïs Huguenin-Dumittan and Iraklis Leontiadis
-
2018/919 ( PDF )
- Registration-Based Encryption: Removing Private-Key Generator from IBE
- Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi
-
2018/918 ( PDF )
- Scalable Lightning Factories for Bitcoin
- Alejandro Ranchal-Pedrosa and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
-
2018/917 ( PDF )
- Secure multiparty PageRank algorithm for collaborative fraud detection
- Alex Sangers and Maran van Heesch and Thomas Attema and Thijs Veugen and Mark Wiggerman and Jan Veldsink and Oscar Bloemen and Daniël Worm
-
2018/916 ( PDF )
- Forking a Blockcipher for Authenticated Encryption of Very Short Messages
- Elena Andreeva and Reza Reyhanitabar and Kerem Varici and Damian Vizár
-
2018/915 ( PDF )
- On the Security of a Certificateless Strong Designated Verifier Signature Scheme
- Nasrollah Pakniat
-
2018/914 ( PDF )
- Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance
- Shuichi Katsumata and Shota Yamada
-
2018/913 ( PDF )
- Best Possible Information-Theoretic MPC
- Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin
-
2018/912 ( PDF )
- Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations
- Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
-
2018/911 ( PDF )
- Achieving Fair Treatment in Algorithmic Classification
- Andrew Morgan and Rafael Pass
-
2018/910 ( PDF )
- Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
- Frédéric Dupuis and Serge Fehr and Philippe Lamontagne and Louis Salvail
-
2018/909 ( PDF )
- Two-Round MPC: Information-Theoretic and Black-Box
- Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan
-
2018/908 ( PDF )
- FE and iO for Turing Machines from Minimal Assumptions
- Shweta Agrawal, Monosij Maitra
-
2018/907 ( PDF )
- Proving the correct execution of concurrent services in zero-knowledge
- Srinath Setty and Sebastian Angel and Trinabh Gupta and Jonathan Lee
-
2018/906 ( PDF )
- Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries
- Willy Quach and Daniel Wichs and Giorgos Zirdelis
-
2018/905 ( PDF )
- On the Security Loss of Unique Signatures
- Andrew Morgan and Rafael Pass
-
2018/904 ( PDF )
- Quantum security proofs using semi-classical oracles
- Andris Ambainis and Mike Hamburg and Dominique Unruh
-
2018/903 ( PDF )
- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
- Nina Bindel and Jacqueline Brendel and Marc Fischlin and Brian Goncalves and Douglas Stebila
-
2018/902 ( PDF )
- ProximiTEE: Hardened SGX Attestation by Proximity Verification
- Aritra Dhar and Evan Puddu and Kari Kostiainen and Srdjan Capkun
-
2018/901 ( PDF )
- On the Complexity of Fair Coin Flipping
- Iftach Haitner and Nikolaos Makriyannis and Eran Omri
-
2018/900 ( PDF )
- Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations
- Mohammad Hajiabadi
-
2018/899 ( PDF )
- Differential Cryptanalysis of Round-Reduced SPECK
- Ashutosh Dhar Dwivedi and Pawel Morawiecki
-
2018/898 ( PDF )
- Differential Cryptanalysis in ARX Ciphers with specific applications to LEA
- Ashutosh Dhar Dwivedi and Gautam Srivastava
-
2018/897 ( PDF )
- Traitor-Tracing from LWE Made Simple and Attribute-Based
- Yilei Chen and Vinod Vaikuntanathan and Brent Waters and Hoeteck Wee and Daniel Wichs
-
2018/896 ( PDF )
- Proofs of Ignorance and Applications to 2-Message Witness Hiding
- Apoorvaa Deshpande and Yael Kalai
-
2018/895 ( PDF )
- Weak Zero-Knowledge Beyond the Black-Box Barrier
- Nir Bitansky and Dakshita Khurana and Omer Paneth
-
2018/894 ( PDF )
- Perfect Secure Computation in Two Rounds
- Benny Applebaum and Zvika Brakerski and Rotem Tsabary
-
2018/893 ( PDF )
- Blockchain as cryptanalytic tool
- Manfred Lochter
-
2018/892 ( PDF )
- OptORAMa: Optimal Oblivious RAM
- Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Kartik Nayak and Enoch Peserico and Elaine Shi
-
2018/891 ( PDF )
- Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment
- Seyed Farhad Aghili and Hamid Mala
-
2018/890 ( PDF )
- A Bit-fixing PRF with O(1) Collusion-Resistance from LWE
- Alex Davidson and Ryo Nishimaki
-
2018/889 ( PDF )
- Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
- F. Betül Durak and Serge Vaudenay
-
2018/888 ( PDF )
- Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg
- Thom Wiggers
-
2018/887 ( PDF )
- Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions
- Serge Fehr
-
2018/886 ( PDF )
- Towards Isogeny-Based Password-Authenticated Key Establishment
- Oleg Taraskin and Vladimir Soukharev and David Jao and Jason LeGrow
-
2018/885 ( PDF )
- PASTA: PASsword-based Threshold Authentication
- Shashank Agrawal and Peihan Miao and Payman Mohassel and Pratyay Mukherjee
-
2018/884 ( PDF )
- Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model
- Alan Szepieniec and Reza Reyhanitabar and Bart Preneel
-
2018/883 ( PDF )
- Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
- Suvradip Chakraborty and C. Pandu Rangan
-
2018/882 ( PDF )
- Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies
- Benjamin Smith
-
2018/881 ( PDF )
- Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
- Falk Schellenberg and Dennis R.E. Gnad and Amir Moradi and Mehdi B. Tahoori
-
2018/880 ( PDF )
- Spread: a new layer for profiled deep-learning side-channel attacks
- Christophe Pfeifer and Patrick Haddad
-
2018/879 ( PDF )
- Efficient Group Signature Scheme without Pairings
- Ke Gu and Bo Yin
-
2018/878 ( PDF )
- RSA Signatures Under Hardware Restrictions
- Marc Joye and Yan Michalevsky
-
2018/877 ( PDF )
- On QA-NIZK in the BPK Model
- Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając
-
2018/876 ( PDF )
- Identity Confidentiality in 5G Mobile Telephony Systems
- Haibat Khan and Benjamin Dowling and Keith M. Martin
-
2018/875 ( PDF )
- Oblivious Transfer in Incomplete Networks
- Varun Narayanan and Vinod M. Prabhakaran
-
2018/874 ( PDF )
- Enhanced Security of Attribute-Based Signatures
- Johannes Blömer and Fabian Eidens and Jakob Juhnke
-
2018/873 ( PDF )
- TACHYON: Fast Signatures from Compact Knapsack
- Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz and Mike Rosulek
-
2018/872 ( PDF )
- New Techniques for Efficient Trapdoor Functions and Applications
- Sanjam Garg and Romain Gay and Mohammad Hajiabadi
-
2018/871 ( PDF )
- Non-profiled Mask Recovery: the impact of Independent Component Analysis
- Si Gao and Elisabeth Oswald and Hua Chen and Wei Xi
-
2018/870 ( PDF )
- Unifying Kleptographic Attacks
- George Teseleanu
-
2018/869 ( PDF )
- Higher-Order DCA against Standard Side-Channel Countermeasures
- Andrey Bogdanov and Matthieu Rivain and Philip S. Vejre and Junwei Wang
-
2018/868 ( PDF )
- S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
- Dea Saka Kurnia Putra and Mohamad Ali Sadikin and Susila Windarta
-
2018/867 ( PDF )
- Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling
- Liron David and Avishai Wool
-
2018/866 ( PDF )
- Output Compression, MPC, and iO for Turing Machines
- Saikrishna Badrinarayanan and Rex Fernando and Venkata Koppula and Amit Sahai and Brent Waters
-
2018/865 ( PDF )
- Multiplicative Masking for AES in Hardware
- Lauren De Meyer and Oscar Reparaz and Begül Bilgin
-
2018/864 ( -- withdrawn -- )
- Optimistic Mixing, Revisited
- Antonio Faonio and Dario Fiore
-
2018/863 ( PDF )
- Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation
- Avi Asayag and Gad Cohen and Ido Grayevsky and Maya Leshkowitz and Ori Rottenstreich and Ronen Tamari and David Yakira
-
2018/862 ( PDF )
- Attacking RO-PUFs with Enhanced Challenge-Response Pairs
- Nils Wisiol and Marian Margraf
-
2018/861 ( PDF )
- Delegating Computations with (almost) Minimal Time and Space Overhead
- Justin Holmgren and Ron D. Rothblum
-
2018/860 ( PDF )
- Encrypted Databases for Differential Privacy
- Archita Agarwal and Maurice Herlihy and Seny Kamara and Tarik Moataz
-
2018/859 ( PDF )
- Cryptanalysis of Low-Data Instances of Full LowMCv2
- Christian Rechberger and Hadi Soleimany and Tyge Tiessen
-
2018/858 ( PDF )
- Stronger Security for Sanitizable Signatures
- Stephan Krenn and Kai Samelin and Dieter Sommer
-
2018/857 ( PDF )
- Raptor: A Practical Lattice-Based (Linkable) Ring Signature
- Xingye Lu and Man Ho Au and Zhenfei Zhang
-
2018/856 ( PDF )
- Measuring, simulating and exploiting the head concavity phenomenon in BKZ
- Shi Bai and Damien Stehlé and Weiqiang Wen
-
2018/855 ( PDF )
- On the Security of the PKCS#1 v1.5 Signature Scheme
- Tibor Jager and Saqib A. Kakvi and Alexander May
-
2018/854 ( PDF )
- Universal Multi-Party Poisoning Attacks
- Saeed Mahloujifar and Mahammad Mahmoody and Ameer Mohammed
-
2018/853 ( PDF )
- Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
- Christos Patsonakis and Katerina Samari and Mema Roussopoulos and Aggelos Kiayias
-
2018/852 ( PDF )
- Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
- Christoph Dobraunig and Stefan Mangard and Florian Mendel and Robert Primas
-
2018/851 ( PDF )
- More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
- T-H. Hubert Chan and Jonathan Katz and Kartik Nayak and Antigoni Polychroniadou and Elaine Shi
-
2018/850 ( PDF )
- Computing supersingular isogenies on Kummer surfaces
- Craig Costello
-
2018/849 ( PDF )
- Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications
- Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy
-
2018/848 ( PDF )
- A Universally Composable Framework for the Privacy of Email Ecosystems
- Pyrros Chaidos and Olga Fourtounelli and Aggelos Kiayias and Thomas Zacharias
-
2018/847 ( PDF )
- Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
- Venkata Koppula and Brent Waters
-
2018/846 ( PDF )
- Strong Leakage Resilient Encryption: Enhancing Data Confidentiality by Hiding Partial Ciphertext
- Jia Xu and Jianying Zhou
-
2018/845 ( PDF )
- A Framework for Achieving KDM-CCA Secure Public-Key Encryption
- Fuyuki Kitagawa and Keisuke Tanaka
-
2018/844 ( PDF )
- Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
- Jean Paul Degabriele and Marc Fischlin
-
2018/843 ( PDF )
- Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)
- Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
-
2018/842 ( PDF )
- Attribute-Based Signatures for Unbounded Languages from Standard Assumptions
- Yusuke Sakai and Shuichi Katsumata and Nuttapong Attrapadung and Goichiro Hanaoka
-
2018/841 ( PDF )
- Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions
- Akinori Hosoyamada and Kan Yasuda
-
2018/840 ( PDF )
- Universal Proxy Re-Encryption
- Nico Döttling and Ryo Nishimaki
-
2018/839 ( PDF )
- On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography
- Huseyin Hisil and Joost Renes
-
2018/838 ( PDF )
- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
- Keita Xagawa and Takashi Yamakawa
-
2018/837 ( PDF )
- Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem
- Yu Ning and Fuyou Miao and Wenchao Huang and Keju Meng and Yan Xiong and Xingfu Wang
-
2018/836 ( PDF )
- Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques
- Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar Weippl
-
2018/835 ( PDF )
- Fully-Featured Anonymous Credentials with Reputation System
- Kai Bemmann and Johannes Blömer and Jan Bobolz and Henrik Bröcher and Denis Diemert and Fabian Eidens and Lukas Eilers and Jan Haltermann and Jakob Juhnke and Burhan Otour and Laurens Porzenheim and Simon Pukrop and Erik Schilling and Michael Schlichtig and Marcel Stienemeier
-
2018/834 ( PDF )
- Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks
- Dennis Hofheinz and Dingding Jia and Jiaxin Pan
-
2018/833 ( PDF )
- Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
- Jie Chen and Junqing Gong and Hoeteck Wee
-
2018/832 ( PDF )
- Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules
- Ashrujit Ghoshal and Rajat Sadhukhan and Sikhar Patranabis and Nilanjan Datta and Stjepan Picek and Debdeep Mukhopadhyay
-
2018/831 ( PDF )
- Practical Attack on RaCoSS-R
- Keita Xagawa
-
2018/830 ( PDF )
- A remark on a success rate model fpr DPA and CPA
- Andreas Wiemers
-
2018/829 ( PDF )
- Information-Theoretic Broadcast with Dishonest Majority for Long Messages
- Wutichai Chongchitmate and Rafail Ostrovsky
-
2018/828 ( PDF )
- Aurora: Transparent Succinct Arguments for R1CS
- Eli Ben-Sasson and Alessandro Chiesa and Michael Riabzev and Nicholas Spooner and Madars Virza and Nicholas P. Ward
-
2018/827 ( PDF )
- Practical Strategy-Resistant Privacy-Preserving Elections
- Sébastien Canard and David Pointcheval and Quentin Santos and Jacques Traoré
-
2018/826 ( PDF )
- Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
- Tibor Jager and Rafael Kurek and Jiaxin Pan
-
2018/825 ( PDF )
- Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
- Kostas Papagiannopoulos
-
2018/824 ( PDF )
- SeaSign: Compact isogeny signatures from class group actions
- Luca De Feo and Steven D. Galbraith
-
2018/823 ( PDF )
- The Security of Lazy Users in Out-of-Band Authentication
- Moni Naor and Lior Rotem and Gil Segev
-
2018/822 ( PDF )
- LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS
- Jonathan Bootle and Claire Delaplace and Thomas Espitau and Pierre-Alain Fouque and Mehdi Tibouchi
-
2018/821 ( PDF )
- Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate
- Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay and Shivam Bhasin
-
2018/820 ( PDF )
- Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
- David Sommer and Sebastian Meiser and Esfandiar Mohammadi
-
2018/819 ( PDF )
- ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls
- Ritam Bhaumik and Eik List and Mridul Nandi
-
2018/818 ( PDF )
- Robustly Reusable Fuzzy Extractor from Standard Assumptions
- Yunhua Wen and Shengli Liu
-
2018/817 ( PDF )
- Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism
- Haiyang Xue and Xianhui Lu and Bao Li and Bei Liang and Jingnan He
-
2018/816 ( PDF )
- Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security
- Chun Guo and Lei Wang
-
2018/815 ( PDF )
- Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation
- Yoshitatsu Matsuda and Tadanori Teruya and Kenji Kasiwabara
-
2018/814 ( PDF )
- White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
- Yudi Zhang and Debiao He and Xinyi Huang and Ding Wang and Kim-Kwang Raymond Choo
-
2018/813 ( PDF )
- Programming the Demirci-Sel{ç}uk Meet-in-the-Middle Attack with Constraints
- Danping Shi and Siwei Sun and Patrick Derbez and Yosuke Todo and Bing Sun and Lei Hu
-
2018/812 ( PDF )
- Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?
- Lior Rotem and Gil Segev
-
2018/811 ( PDF )
- Reconstructing an S-box from its Difference Distribution Table
- Orr Dunkelman and Senyang Huang
-
2018/810 ( PDF )
- Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
- Ling Song and Jian Guo
-
2018/809 ( PDF )
- Algebraic Cryptanalysis of Frit
- Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Markus Schofnegger
-
2018/808 ( PDF )
- Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing
- Jiyong Yu and Lucas Hsiung and Mohamad El Hajj and Christopher W. Fletcher
-
2018/807 ( PDF )
- On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
- Nicolas T. Courtois
-
2018/806 ( PDF )
- Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
- Victor Arribas and Svetla Nikova and Vincent Rijmen
-
2018/805 ( PDF )
- Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers
- Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda
-
2018/804 ( PDF )
- Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
- Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul
-
2018/803 ( PDF )
- BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
- Sinisa Matetic and Karl Wüst and Moritz Schneider and Kari Kostiainen and Ghassan Karame and Srdjan Capkun
-
2018/802 ( PDF )
- Secure Modulo Zero-Sum Randomness as Cryptographic Resource
- Masahito Hayashi and Takeshi Koshiba
-
2018/801 ( PDF )
- Faster PCA and Linear Regression through Hypercubes in HElib
- Deevashwer Rathee and Pradeep Kumar Mishra and Masaya Yasuda
-
2018/800 ( PDF )
- Security of the Blockchain against Long Delay Attack
- Puwen Wei and Quan Yuan and Yuliang Zheng
-
2018/799 ( PDF )
- Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
- Fukang Liu and Zhenfu Cao and Gaoli Wang
-
2018/798 ( PDF )
- Recovering Secrets From Prefix-Dependent Leakage
- Houda Ferradi and Rémi Géraud and Sylvain Guilley and David Naccache and Mehdi Tibouchi
-
2018/797 ( PDF )
- Quantum algorithms for computing general discrete logarithms and orders with tradeoffs
- Martin Ekerå
-
2018/796 ( PDF )
- On relations between CCZ- and EA-equivalences
- Lilya Budaghyan and Marco Calderini and Irene Villa
-
2018/795 ( PDF )
- Solving ECDLP via List Decoding
- Fangguo Zhang and Shengli Liu
-
2018/794 ( PDF )
- Blending FHE-NTRU keys – The Excalibur Property
- Louis Goubin and Francisco Vial-Prado
-
2018/793 ( PDF )
- Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
- Tetsu Iwata and Virginie Lallemand and Gregor Leander and Yu Sasaki
-
2018/792 ( PDF )
- Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices
- Joppe W. Bos and Simon J. Friedberger
-
2018/791 ( PDF )
- Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$
- Guilhem Castagnos and Fabien Laguillaumie and Ida Tucker
-
2018/790 ( PDF )
- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation
- David Derler and Sebastian Ramacher and Daniel Slamanig
-
2018/789 ( PDF )
- Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free
- Vladimir Kolesnikov
-
2018/788 ( PDF )
- Privacy-preserving certificate linkage/revocation in VANETs without Linkage Authorities
- Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius M. Silva
-
2018/787 ( PDF )
- Labeled PSI from Fully Homomorphic Encryption with Malicious Security
- Hao Chen and Zhicong Huang and Kim Laine and Peter Rindal
-
2018/786 ( PDF )
- Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices
- Zhongxiang Zheng and Guangwu Xu and Chunhuan Zhao
-
2018/785 ( PDF )
- Efficiently Processing Complex-Valued Data in Homomorphic Encryption
- Carl Bootland and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
-
2018/784 ( PDF )
- Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model
- ByeongHak Lee and Jooyoung Lee
-
2018/783 ( PDF )
- Short Variable Length Domain Extenders With Beyond Birthday Bound Security
- Yu Long Chen and Bart Mennink and Mridul Nandi
-
2018/782 ( PDF )
- A faster way to the CSIDH
- Michael Meyer and Steffen Reith
-
2018/781 ( PDF )
- Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
- Yu Chen and Yuyu Wang and Hong-sheng Zhou
-
2018/780 ( PDF )
- A Game Theoretic Analysis of Resource Mining in Blockchain
- Rajani Singh and Ashutosh Dhar Dwivedi and Gautam Srivastava and Agnieszka Wiszniewska-Matyszkiel and Xiaochun Cheng
-
2018/779 ( PDF )
- Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability
- Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler
-
2018/778 ( PDF )
- PPP-Completeness with Connections to Cryptography
- Katerina Sotiraki and Manolis Zampetakis and Giorgos Zirdelis
-
2018/777 ( PDF )
- Delegation of Decryption Rights with Revocability from Learning with Errors
- Wei Yin and Qiaoyan Wen and Kaitai Liang and Zhenfei Zhang and Liqun Chen and Hanbing Yan and Hua Zhang
-
2018/776 ( PDF )
- On Publicly Verifiable Delegation From Standard Assumptions
- Yael Kalai and Omer Paneth and Lisa Yang
-
2018/775 ( PDF )
- The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants
- Matilda Backendal and Mihir Bellare and Jessica Sorrell and Jiahao Sun
-
2018/774 ( PDF )
- Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies
- Brandon Goodell and Sarang Noether
-
2018/773 ( PDF )
- Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures
- Muhammed F. Esgin and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Dongxi Liu
-
2018/772 ( PDF )
- Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
- Itai Dinur and Daniel Kales and Angela Promitzer and Sebastian Ramacher and Christian Rechberger
-
2018/771 ( PDF )
- A Simple Construction of iO for Turing Machines
- Sanjam Garg and Akshayaram Srinivasan
-
2018/770 ( PDF )
- Combiners for Backdoored Random Oracles
- Balthazar Bauer and Pooya Farshim and Sogol Mazaheri
-
2018/769 ( PDF )
- Constructing APN functions through isotopic shifts
- Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa
-
2018/768 ( PDF )
- DRANKULA: a McEliece-like rank metric based cryptosystem implementation
- Ameera Salem Al Abdouli and Mohamed Al Ali and Emanuele Bellini and Florian Caullery and Alexandros Hasikos and Marc Manzano and Victor Mateu
-
2018/767 ( PDF )
- Xoodoo cookbook
- Joan Daemen and Seth Hoffert and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
-
2018/766 ( PDF )
- Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
- Nadim Kobeissi and Georgio Nicolas and Karthikeyan Bhargavan
-
2018/765 ( PDF )
- Symbolic Proofs for Lattice-Based Cryptography
- Gilles Barthe and Xiong Fan and Joshua Gancher and Benjamin Grégoire and Charlie Jacomme and Elaine Shi
-
2018/764 ( PDF )
- Generating Graphs Packed with Paths
- Mathias Hall-Andersen and Philip S. Vejre
-
2018/763 ( PDF )
- Block Cipher Invariants as Eigenvectors of Correlation Matrices (Full Version)
- Tim Beyne
-
2018/762 ( PDF )
- Generalizing the SPDZ Compiler For Other Protocols
- Toshinori Araki and Assi Barak and Jun Furukawa and Marcel Keller and Yehuda Lindell and Kazuma Ohara and Hikaru Tsuchida
-
2018/761 ( PDF )
- New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem
- Parinaz Mahdion and Hadi Soleimany and Pouya Habibi and Farokhlagha Moazami
-
2018/760 ( PDF )
- Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
- Xiu Xu and Haiyang Xue and Kunpeng Wang and Man Ho Au and Bei Liang and Song Tian
-
2018/759 ( PDF )
- Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm
- Prabhanjan Ananth and Alex Lombardi
-
2018/758 ( PDF )
- CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
- Christina Boura and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
-
2018/757 ( PDF )
- Cryptography for Human Senses
- Kimmo Halunen and Outi-Marja Latvala
-
2018/756 ( PDF )
- Obfuscation Using Tensor Products
- Craig Gentry and Charanjit S. Jutla and Daniel Kane
-
2018/755 ( PDF )
- Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
- Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li
-
2018/754 ( PDF )
- SoK: A Consensus Taxonomy in the Blockchain Era
- Juan Garay and Aggelos Kiayias
-
2018/753 ( PDF )
- Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
- Yan Michalevsky and Marc Joye
-
2018/752 ( PDF )
- Isogeny Secrets can be Traded
- David Urbanik
-
2018/751 ( PDF )
- An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
- Assi Barak and Martin Hirt and Lior Koskas and Yehuda Lindell
-
2018/750 ( PDF )
- Non-Malleable Secret Sharing for General Access Structures
- Vipul Goyal and Ashutosh Kumar
-
2018/749 ( PDF )
- Prime and Prejudice: Primality Testing Under Adversarial Conditions
- Martin R. Albrecht and Jake Massimo and Kenneth G. Paterson and Juraj Somorovsky
-
2018/748 ( PDF )
- Definitions for Plaintext-Existence Hiding in Cloud Storage
- Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Håvard Raddum and Mohsen Toorani
-
2018/747 ( PDF )
- Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
- Eyal Ronen and Kenneth G. Paterson and Adi Shamir
-
2018/746 ( PDF )
- Secret Sharing with Binary Shares
- Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi-Naini and Huaxiong Wang
-
2018/745 ( PDF )
- Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure
- Jingdian Ming and Wei Cheng and Huizhong Li and Guang Yang and Yongbin Zhou and Qian Zhang
-
2018/744 ( PDF )
- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing
- Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin
-
2018/743 ( PDF )
- On the Leakage of Corrupted Garbled Circuits
- Aurélien Dupin and David Pointcheval and Christophe Bidan
-
2018/742 ( PDF )
- Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities
- Hiroaki Anada and Seiko Arita
-
2018/741 ( PDF )
- LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
- Alexander May and Gottfried Herold
-
2018/740 ( PDF )
- FairSwap: How to fairly exchange digital goods
- Stefan Dziembowski and Lisa Eckey and Sebastian Faust
-
2018/739 ( PDF )
- Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism
- Mahdi Sajadieh and Mohammad Vaziri
-
2018/738 ( PDF )
- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature
- Sanjit Chatterjee and R. Kabaleeshwaran
-
2018/737 ( PDF )
- Steady: A Simple End-to-End Secure Logging System
- Tobias Pulls and Rasmus Dahlberg
-
2018/736 ( PDF )
- Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs
- Marina Blanton and Myoungin Jeong
-
2018/735 ( -- withdrawn -- )
- AntNest: Fully Non-interactive Secure Multi-party Computation
- Lijing Zhou and Licheng Wang and Yiru Sun and Tianyi Ai
-
2018/734 ( PDF )
- Random Number Generators Can Be Fooled to Behave Badly
- George Teseleanu
-
2018/733 ( PDF )
- Threshold Partially-Oblivious PRFs with Applications to Key Management
- Stanislaw Jarecki and Hugo Krawczyk and Jason Resch
-
2018/732 ( PDF )
- Data Oblivious Genome Variants Search on Intel SGX
- Avradip Mandal and John C. Mitchell and Hart Montgomery and Arnab Roy
-
2018/731 ( PDF )
- An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing
- Itai Dinur and Nathan Keller and Ohad Klein
-
2018/730 ( PDF )
- Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange
- Atsushi Fujioka and Katsuyuki Takashima and Shintaro Terada and Kazuki Yoneyama
-
2018/729 ( -- withdrawn -- )
- Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection
- Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel
-
2018/728 ( PDF )
- A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers
- Takeshi Okamoto and Raylin Tso and Michitomo Yamaguchi and Eiji Okamoto
-
2018/727 ( PDF )
- DiSE: Distributed Symmetric-key Encryption
- Shashank Agrawal and Payman Mohassel and Pratyay Mukherjee and Peter Rindal
-
2018/726 ( PDF )
- Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES
- Kai Hu and Tingting Cui and Chao Gao and Meiqin Wang
-
2018/725 ( PDF )
- Round5: KEM and PKE based on GLWR
- Sauvik Bhattacharya and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang
-
2018/724 ( PDF )
- Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
- Nele Mentens and Edoardo Charbon and Francesco Regazzoni
-
2018/723 ( PDF )
- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
- Markku-Juhani O. Saarinen and Sauvik Bhattacharya and Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Zhenfei Zhang
-
2018/722 ( PDF )
- uMine: a Blockchain based on Human Miners
- Henning Kopp and Frank Kargl and Christoph Bösch and Andreas Peter
-
2018/721 ( PDF )
- Transparency Logs via Append-only Authenticated Dictionaries
- Alin Tomescu and Vivek Bhupatiraju and Dimitrios Papadopoulos and Charalampos Papamanthou and Nikos Triandopoulos and Srinivas Devadas
-
2018/720 ( PDF )
- {Adiantum}: length-preserving encryption for entry-level processors
- Paul Crowley and Eric Biggers
-
2018/719 ( PDF )
- Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage
- Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
-
2018/718 ( PDF )
- Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic
- Koji Nuida
-
2018/717 ( PDF )
- Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
- Heiko Lohrke and Shahin Tajik and Thilo Krachenfels and Christian Boit and Jean-Pierre Seifert
-
2018/716 ( PDF )
- Lattice-Based Zero-Knowledge Arguments for Integer Relations
- Benoît Libert and San Ling and Khoa Nguyen and Huaxiong Wang
-
2018/715 ( PDF )
- Practical Attacks on Relational Databases Protected via Searchable Encryption
- Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann and Cornelius Glackin
-
2018/714 ( PDF )
- PKP-Based Signature Scheme
- Ward Beullens and Jean-Charles Faugère and Eliane Koussa and Gilles Macario-Rat and Jacques Patarin and Ludovic Perret
-
2018/713 ( PDF )
- On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting
- Anne Canteaut and Léo Perrin
-
2018/712 ( PDF )
- A Survey of Two Verifiable Delay Functions
- Dan Boneh and Benedikt Bünz and Ben Fisch
-
2018/711 ( PDF )
- Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures
- Kallepu Raju and Appala Naidu Tentuand and V. Ch. Venkaiah
-
2018/710 ( PDF )
- Fast Secure Computation for Small Population over the Internet
- Megha Byali and Arun Joseph and Arpita Patra and Divya Ravi
-
2018/709 ( PDF )
- Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies
- Vanessa Vitse
-
2018/708 ( PDF )
- Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software
- Alexandre Adomnicai and Jacques J.A. Fournier and Laurent Masson
-
2018/707 ( PDF )
- Function Secret Sharing: Improvements and Extensions
- Elette Boyle and Niv Gilboa and Yuval Ishai
-
2018/706 ( PDF )
- Efficient 3-Party Distributed ORAM
- Paul Bunn and Jonathan Katz and Eyal Kushilevitz and Rafail Ostrovsky
-
2018/705 ( PDF )
- Subvector Commitments with Application to Succinct Arguments
- Russell W.F. Lai and Giulio Malavolta
-
2018/704 ( PDF )
- Verifiable Sealed-Bid Auction on the Ethereum Blockchain
- Hisham S. Galal and Amr M. Youssef
-
2018/703 ( PDF )
- New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
- Niek J. Bouman and Niels de Vreede
-
2018/702 ( PDF )
- Tight Proofs of Space and Replication
- Ben Fisch
-
2018/701 ( -- withdrawn -- )
- Secure Sketch for All Noisy Sources
- Yen-Lung Lai
-
2018/700 ( PDF )
- SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
- Hwajeong Seo and Zhe Liu and Patrick Longa and Zhi Hu
-
2018/699 ( PDF )
- Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64
- Raghvendra Rohit and Guang Gong
-
2018/698 ( PDF )
- Parameter-Hiding Order Revealing Encryption
- David Cash and Feng-Hao Liu and Adam O'Neill and Mark Zhandry and Cong Zhang
-
2018/697 ( PDF )
- AUDIT: Practical Accountability of Secret Processes
- Jonathan Frankle and Sunoo Park and Daniel Shaar and Shafi Goldwasser and Daniel J. Weitzner
-
2018/696 ( PDF )
- Unbounded Inner Product Functional Encryption from Bilinear Maps
- Junichi Tomida and Katsuyuki Takashima
-
2018/695 ( PDF )
- SPHINX: A Password Store that Perfectly Hides Passwords from Itself
- Maliheh Shirvanian and Stanislaw Jarecki and Hugo Krawczyk and Nitesh Saxena
-
2018/694 ( PDF )
- Faster Privacy-Preserving Location Proximity Schemes
- Kimmo Järvinen and Ágnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang
-
2018/693 ( PDF )
- Efficient Side-Channel Protections of ARX Ciphers
- Bernhard Jungk and Richard Petri and Marc Stöttinger
-
2018/692 ( PDF )
- New Configurations of Grain Ciphers: Security Against Slide Attacks
- Diana Maimut and George Teseleanu
-
2018/691 ( PDF )
- DIZK: A Distributed Zero Knowledge Proof System
- Howard Wu and Wenting Zheng and Alessandro Chiesa and Raluca Ada Popa and Ion Stoica
-
2018/690 ( PDF )
- Efficient KEA-Style Lattice-Based Authenticated Key Exchange
- Zilong Wang and Honggang Hu
-
2018/689 ( PDF )
- Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
- Ralph Ankele and Stefan Kölbl
-
2018/688 ( PDF )
- Finding Integral Distinguishers with Ease
- Zahra Eskandari and Andreas Brasen Kidmose and Stefan Kölbl and Tyge Tiessen
-
2018/687 ( PDF )
- Assessing the Feasibility of Single Trace Power Analysis of Frodo
- Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam
-
2018/686 ( PDF )
- Standard Lattice-Based Key Encapsulation on Embedded Devices
- James Howe and Tobias Oder and Markus Krausz and Tim Güneysu
-
2018/685 ( PDF )
- On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards
- Sven Heiberg and Ivo Kubjas and Janno Siim and Jan Willemson
-
2018/684 ( PDF )
- PIEs: Public Incompressible Encodings for Decentralized Storage
- Ethan Cecchetti and Ben Fisch and Ian Miers and Ari Juels
-
2018/683 ( PDF )
- Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability
- Oksana Kulyk and Melanie Volkamer
-
2018/682 ( PDF )
- Saber on ARM CCA-secure module lattice-based key encapsulation on ARM
- Angshuman Karmakar and Jose Maria Bermudo Mera and Sujoy Sinha Roy and Ingrid Verbauwhede
-
2018/681 ( PDF )
- A Reusable Fuzzy Extractor with Practical Storage Size
- Jung Hee Cheon and Jinhyuck Jeong and Dongwoo Kim and Jongchan Lee
-
2018/680 ( PDF )
- Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256
- Rui Zong and Xiaoyang Dong and Xiaoyun Wang
-
2018/679 ( PDF )
- DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive
- Jiasi Weng and Jian Weng and Jilian Zhang and Ming Li and Yue Zhang and Weiqi Luo
-
2018/678 ( PDF )
- PoReps: Proofs of Space on Useful Data
- Ben Fisch
-
2018/677 ( PDF )
- Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems
- François Gérard
-
2018/676 ( PDF )
- Static Power Side-Channel Analysis - An Investigation of Measurement Factors
- Thorben Moos and Amir Moradi and Bastian Richter
-
2018/675 ( PDF )
- A signature scheme from the finite field isomorphism problem
- Jeffrey Hoffstein and Joseph H. Silverman and William Whyte and Zhenfei Zhang
-
2018/674 ( PDF )
- Practical Fault Injection Attacks on SPHINCS
- Aymeric Genêt and Matthias J. Kannwischer and Hervé Pelletier and Andrew McLauchlan
-
2018/673 ( PDF )
- Differential Power Analysis of XMSS and SPHINCS
- Matthias J. Kannwischer and Aymeric Genêt and Denis Butin and Juliane Krämer and Johannes Buchmann
-
2018/672 ( PDF )
- Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
- Martin R. Albrecht and Amit Deo and Kenneth G. Paterson
-
2018/671 ( PDF )
- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
- Joey Green and Elisabeth Oswald and Arnab Roy
-
2018/670 ( PDF )
- Public Key Compression for Constrained Linear Signature Schemes
- Ward Beullens and Bart Preneel and Alan Szepieniec
-
2018/669 ( PDF )
- Faster cofactorization with ECM using mixed representations
- Cyril Bouvier and Laurent Imbert
-
2018/668 ( PDF )
- Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
- Takanori Isobe and Kazuhiko Minematsu
-
2018/667 ( PDF )
- On Hardware Implementation of Tang-Maitra Boolean Functions
- Mustafa Khairallah and Anupam Chattopadhyay and Bimal Mandal and Subhamoy Maitra
-
2018/666 ( PDF )
- Reproducible Families of Codes and Cryptographic Applications
- Paolo Santini and Edoardo Persichetti and Marco Baldi
-
2018/665 ( PDF )
- Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
- Dan Boneh and Darren Glass and Daniel Krashen and Kristin Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry
-
2018/664 ( PDF )
- Public Accountability vs. Secret Laws: Can They Coexist?
- Shafi Goldwasser and Sunoo Park
-
2018/663 ( PDF )
- Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption
- Pradeep Kumar Mishra and Deevashwer Rathee and Dung Hoang Duong and Masaya Yasuda
-
2018/662 ( PDF )
- Efficient Logistic Regression on Large Encrypted Data
- Kyoohyung Han and Seungwan Hong and Jung Hee Cheon and Daejun Park
-
2018/661 ( PDF )
- Exploring Deployment Strategies for the Tor Network
- Christoph Döpmann and Sebastian Rust and Florian Tschorsch
-
2018/660 ( PDF )
- A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
- Xun Yi and Kwok-Yan Lam and Dieter Gollmann
-
2018/659 ( PDF )
- On the Menezes-Teske-Weng’s conjecture
- Sihem Mesnager and Kwang Ho Kim and Junyop Choe and Chunming Tang
-
2018/658 ( PDF )
- Blockchained Post-Quantum Signatures
- Konstantinos Chalkias and James Brown and Mike Hearn and Tommy Lillehagen and Igor Nitto and Thomas Schroeter
-
2018/657 ( PDF )
- Platform-independent Secure Blockchain-Based Voting System
- Bin Yu and Joseph Liu and Amin Sakzad and Surya Nepal and Paul Rimba and Ron Steinfeld and Man Ho Au
-
2018/656 ( PDF )
- FPGA Cluster based high performance Cryptanalysis framework
- Abhishek Bajpai and S V Kulgod
-
2018/655 ( PDF )
- Loamit: A Blockchain-based Residual Loanable-limit Query System
- Lijing Zhou and Licheng Wang and Yiru Sun and Pin Lv
-
2018/654 ( PDF )
- Proofs of Replicated Storage Without Timing Assumptions
- Ivan Damgård and Chaya Ganesh and Claudio Orlandi
-
2018/653 ( PDF )
- Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
- Pierre-Alain Fouque and Benjamin Hadjibeyli and Paul Kirchner
-
2018/652 ( PDF )
- Efficient Collision Attack Frameworks for RIPEMD-160
- Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao
-
2018/651 ( PDF )
- Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
- Nicola Tuveri and Sohaib ul Hassan and Cesar Pereida García and Billy Brumley
-
2018/650 ( PDF )
- Designing Efficient Dyadic Operations for Cryptographic Applications
- Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini
-
2018/649 ( PDF )
- No-signaling Linear PCPs
- Susumu Kiyoshima
-
2018/648 ( PDF )
- Semi-Commutative Masking: A Framework for Isogeny-based Protocols, with an Application to Fully Secure Two-Round Isogeny-based OT
- Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Christophe Petit and Nigel P. Smart
-
2018/647 ( PDF )
- A new perspective on the powers of two descent for discrete logarithms in finite fields
- Thorsten Kleinjung and Benjamin Wesolowski
-
2018/646 ( PDF )
- Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation
- Huijia Lin and Christian Matt
-
2018/645 ( PDF )
- Mitigating the One-Use Restriction in Attribute-Based Encryption
- Lucas Kowalczyk and Jiahui Liu and Kailash Meiyappan and Tal Malkin
-
2018/644 ( PDF )
- Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
- Osmanbey Uzunkol and Jothi Rangasamy and Lakshmi Kuppusamy
-
2018/643 ( PDF )
- XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets
- Alexei Zamyatin and Dominik Harz and Joshua Lind and Panayiotis Panayiotou and Arthur Gervais and William J. Knottenbelt
-
2018/642 ( PDF )
- Commit-Chains: Secure, Scalable Off-Chain Payments
- Rami Khalil and Alexei Zamyatin and Guillaume Felley and Pedro Moreno-Sanchez and Arthur Gervais
-
2018/641 ( PDF )
- Membership Privacy for Fully Dynamic Group Signatures
- Michael Backes and Lucjan Hanzlik and Jonas Schneider
-
2018/640 ( PDF )
- Lower Bounds on Structure-Preserving Signatures for Bilateral Messages
- Masayuki Abe and Miguel Ambrona and Miyako Ohkubo and Mehdi Tibouchi
-
2018/639 ( PDF )
- Function-Dependent Commitments for Verifiable Multi-Party Computation
- Lucas Schabhüser and Denis Butin and Denise Demirel and Johanens Buchmann
-
2018/638 ( PDF )
- BurnBox: Self-Revocable Encryption in a World of Compelled Access
- Nirvan Tyagi and Muhammad Haris Mughees and Thomas Ristenpart and Ian Miers
-
2018/637 ( PDF )
- Efficient Fully Homomorphic Encryption Scheme
- Shuhong Gao
-
2018/636 ( PDF )
- Lattice-Based Dual Receiver Encryption and More
- Daode Zhang and Kai Zhang and Bao Li and Xianhui Lu and Haiyang Xue and Jie Li
-
2018/635 ( PDF )
- On linear hulls in one round of DES
- Tomer Ashur and Raluca Posteuca
-
2018/634 ( PDF )
- Partially Specified Channels: The TLS 1.3 Record Layer without Elision
- Christopher Patton and Thomas Shrimpton
-
2018/633 ( PDF )
- New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation
- Shweta Agrawal
-
2018/632 ( PDF )
- CHARIOT: Cloud-Assisted Access Control for the Internet of Things
- Clementine Gritti and Melek Onen and Refik Molva
-
2018/631 ( PDF )
- Efficient Construction of the Boomerang Connection Table
- Orr Dunkelman
-
2018/630 ( PDF )
- Characterizing overstretched NTRU attacks
- Gabrielle De Micheli and Nadia Heninger and Barak Shani
-
2018/629 ( PDF )
- Context Hiding Multi-Key Linearly Homomorphic Authenticators
- Lucas Schabhüser and Denis Butin and Johannes Buchmann
-
2018/628 ( -- withdrawn -- )
- Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
- Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk
-
2018/627 ( PDF )
- Simple Verifiable Delay Functions
- Krzysztof Pietrzak
-
2018/626 ( PDF )
- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes
- Sergiu Carpov and Oana Stan
-
2018/625 ( PDF )
- Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions
- Mihir Bellare and Joseph Jaeger and Julia Len
-
2018/624 ( PDF )
- Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
- Gergei Bana and Rohit Chadha and Ajay Kumar Eeralla
-
2018/623 ( PDF )
- Efficient verifiable delay functions
- Benjamin Wesolowski
-
2018/622 ( PDF )
- New techniques for Multi-value input Homomorphic Evaluation and Applications
- Sergiu Carpov and Malika Izabachène and Victor Mollimard
-
2018/621 ( PDF )
- Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
- Ben Lapid and Avishai Wool
-
2018/620 ( PDF )
- STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis
- Debayan Das and Mayukh Nath and Baibhab Chatterjee and Santosh Ghosh and Shreyas Sen
-
2018/619 ( PDF )
- Is there an Oblivious RAM Lower Bound for Online Reads?
- Mor Weiss and Daniel Wichs
-
2018/618 ( PDF )
- On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks
- Reynier Antonio de la Cruz Jiménez
-
2018/617 ( PDF )
- Two Notions of Differential Equivalence on Sboxes
- Christina Boura and Anne Canteaut and Jérémy Jean and Valentin Suder
-
2018/616 ( PDF )
- Matrioska: A Compiler for Multi-Key Homomorphic Signatures
- Dario Fiore and Elena Pagnin
-
2018/615 ( PDF )
- Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness
- Prabhanjan Ananth and Aayush Jain and Amit Sahai
-
2018/614 ( PDF )
- A Note on Key Rank
- Daniel P. Martin and Marco Martinoli
-
2018/613 ( PDF )
- One-Message Zero Knowledge and Non-Malleable Commitments
- Nir Bitansky and Huijia Lin
-
2018/612 ( PDF )
- Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol
- Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder
-
2018/611 ( PDF )
- Is Java Card ready for hash-based signatures?
- Ebo van der Laan and Erik Poll and Joost Rijneveld and Joeri de Ruiter and Peter Schwabe and Jan Verschuren
-
2018/610 ( PDF )
- Hierarchical Attribute-based Signatures
- Constantin-Catalin Dragan and Daniel Gardham and Mark Manulis
-
2018/609 ( PDF )
- Improved Results on Factoring General RSA Moduli with Known Bits
- Mengce Zheng
-
2018/608 ( PDF )
- Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols
- Hamid Nejatollahi and Nikil Dutt and Indranil Banerjee and Rosario Cammarota
-
2018/607 ( PDF )
- SEEMless: Secure End-to-End Encrypted Messaging with less trust
- Melissa Chase and Apoorvaa Deshpande and Esha Ghosh and Harjasleen Malvai
-
2018/606 ( PDF )
- Continuously Non-Malleable Codes with Split-State Refresh
- Antonio Faonio and Jesper Buus Nielsen and Mark Simkin and Daniele Venturi
-
2018/605 ( PDF )
- N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials
- Yin Li and Yu Zhang and Xiaoli Guo and Chuanda Qi
-
2018/604 ( PDF )
- Attack on Kayawood Protocol: Uncloaking Private Keys
- Matvei Kotov and Anton Menshov and Alexander Ushakov
-
2018/603 ( PDF )
- Actively Secure OT-Extension from q-ary Linear Codes
- Ignacio Cascudo and René Bødker Christensen and Jaron Skovsted Gundersen
-
2018/602 ( PDF )
- On the Universally Composable Security of OpenStack
- Kyle Hogan and Hoda Maleki and Reza Rahaeimehr and Ran Canetti and Marten van Dijk and Jason Hennessey and Mayank Varia and Haibin Zhang
-
2018/601 ( PDF )
- Verifiable Delay Functions
- Dan Boneh and Joseph Bonneau and Benedikt Bünz and Ben Fisch
-
2018/600 ( PDF )
- GRANULE: An Ultra lightweight cipher design for embedded security
- Gaurav Bansod and Abhijit Patil and Narayan Pisharoty
-
2018/599 ( PDF )
- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
- Lucas Schabhüser and Denis Butin and Johannes Buchmann
-
2018/598 ( PDF )
- Trends in design of ransomware viruses
- Vlad Constantin Craciun and Andrei Mogage and Emil Simion
-
2018/597 ( PDF )
- Consolidating Security Notions in Hardware Masking
- Lauren De Meyer and Begül Bilgin and Oscar Reparaz
-
2018/596 ( PDF )
- Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments
- Ivan Damgård and Tomasz Kazana and Maciej Obremski and Varun Raj and Luisa Siniscalchi
-
2018/595 ( -- withdrawn -- )
- Randomness analysis for multiple-recursive matrix generator
- Subhrajyoti Deb and Bubu Bhuyan, and Sartaj Ul Hasan
-
2018/594 ( PDF )
- Cryptanalysis of SFN Block Cipher
- Sadegh Sadeghi and Nasour Bagheri
-
2018/593 ( PDF )
- Ramanujan graphs in cryptography
- Anamaria Costache and Brooke Feigon and Kristin Lauter and Maike Massierer and Anna Puskas
-
2018/592 ( PDF )
- XS-circuits in Block Ciphers
- Sergey Agievich
-
2018/591 ( PDF )
- 4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis.
- Sankhanil Dey and Ranjan Ghosh
-
2018/590 ( PDF )
- The Twin Conjugacy Search Problem and Applications
- Xiaoming Chen and Weiqing You
-
2018/589 ( PDF )
- Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme
- Ahmad Al Badawi and Yuriy Polyakov and Khin Mi Mi Aung and Bharadwaj Veeravalli and Kurt Rohloff
-
2018/588 ( PDF )
- BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage
- Guilherme Borges and Henrique Domingos and Bernardo Ferreira and João Leitão and Tiago Oliveira and Bernardo Portela
-
2018/587 ( PDF )
- Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model
- Tapas Pal and Ratna Dutta
-
2018/586 ( PDF )
- Lower Bounds on Lattice Enumeration with Extreme Pruning
- Yoshinori Aono and Phong Q. Nguyen and Takenobu Seito and Junji Shikata
-
2018/585 ( PDF )
- Polynomial Functional Encryption Scheme with Linear Ciphertext Size
- Jung Hee Cheon and Seungwan Hong and Changmin Lee and Yongha Son
-
2018/584 ( PDF )
- Bounded Fully Homomorphic Encryption from Monoid Algebras
- Mugurel Barcau and Vicentiu Pasol
-
2018/583 ( PDF )
- Ring Homomorphic Encryption Schemes
- Mugurel Barcau and Vicentiu Pasol
-
2018/582 ( PDF )
- Pisa: Arbitration Outsourcing for State Channels
- Patrick McCorry and Surya Bakshi and Iddo Bentov and Andrew Miller and Sarah Meiklejohn
-
2018/581 ( PDF )
- Smart contracts for bribing miners
- Patrick McCorry and Alexander Hicks and Sarah Meiklejohn
-
2018/580 ( PDF )
- Secure MPC: Laziness Leads to GOD
- Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai
-
2018/579 ( PDF )
- PIR-PSI: Scaling Private Contact Discovery
- Daniel Demmler and Peter Rindal and Mike Rosulek and Ni Trieu
-
2018/578 ( PDF )
- Optimizing Authenticated Garbling for Faster Secure Two-Party Computation
- Jonathan Katz and Samuel Ranellucci and Mike Rosulek and Xiao Wang
-
2018/577 ( PDF )
- Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
- Tore Kasper Frederiksen and Yehuda Lindell and Valery Osheter and Benny Pinkas
-
2018/576 ( PDF )
- Simpler Constructions of Asymmetric Primitives from Obfuscation
- Pooya Farshim and Georg Fuchsbauer and Alain Passelègue
-
2018/575 ( PDF )
- An Algorithmic Framework for the Generalized Birthday Problem
- Itai Dinur
-
2018/574 ( PDF )
- Correctness and Fairness of Tendermint-core Blockchains
- Yackolley Amoussou-Guenou and Antonella Del Pozzo and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
-
2018/573 ( PDF )
- Improved Lightweight Implementations of CAESAR Authenticated Ciphers
- Farnoud Farahmand and William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
-
2018/572 ( PDF )
- Round-Optimal Secure Multiparty Computation with Honest Majority
- Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
-
2018/571 ( PDF )
- Limits of Practical Sublinear Secure Computation
- Elette Boyle and Yuval Ishai and Antigoni Polychroniadou
-
2018/570 ( PDF )
- Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
- Koji Chida and Daniel Genkin and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Yehuda Lindell and Ariel Nof
-
2018/569 ( PDF )
- Dissection-BKW
- Andre Esser and Felix Heuer and Robert Kübler and Alexander May and Christian Sohler
-
2018/568 ( PDF )
- Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem
- Shixiong Wang and Longjiang Qu and Chao Li and Shaojing Fu and Hao Chen
-
2018/567 ( PDF )
- On the Security Properties of e-Voting Bulletin Boards
- Aggelos Kiayias and Annabell Kuldmaa and Helger Lipmaa and Janno Siim and Thomas Zacharias
-
2018/566 ( PDF )
- Private Circuits: A Modular Approach
- Prabhanjan Ananth and Yuval Ishai and Amit Sahai
-
2018/565 ( -- withdrawn -- )
- Homomorphic Encryption for Approximate Matrix Arithmetic
- Jung Hee Cheon and Andrey Kim
-
2018/564 ( PDF )
- Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
- Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka
-
2018/563 ( PDF )
- Multi-client Predicate-only Encryption for Conjunctive Equality Tests
- Tim van de Kamp and Andreas Peter and Maarten H. Everts and Willem Jonker
-
2018/562 ( PDF )
- maskVerif: automated analysis of software and hardware higher-order masked implementations
- Gilles Barthe and Sonia Belaïd and Gaëtan Cassiers and Pierre-Alain Fouque and Benjamin Grégoire and François-Xavier Standaert
-
2018/561 ( PDF )
- Blockchain Abstract Data Type
- Emmanuelle Anceaume and Antonella Del Pozzo and Romaric Ludinard and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
-
2018/560 ( PDF )
- Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits
- Carsten Baum and Jonathan Bootle and Andrea Cerulli and Rafael del Pino and Jens Groth and Vadim Lyubashevsky
-
2018/559 ( PDF )
- Proofs of Work from Worst-Case Assumptions
- Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
-
2018/558 ( PDF )
- Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE
- Phillip Rogaway and Yusi Zhang
-
2018/557 ( PDF )
- Non-Interactive Zero-Knowledge Proofs for Composite Statements
- Shashank Agrawal and Chaya Ganesh and Payman Mohassel
-
2018/556 ( PDF )
- The Curse of Small Domains: New Attacks on Format-Preserving Encryption
- Viet Tung Hoang and Stefano Tessaro and Ni Trieu
-
2018/555 ( PDF )
- Limits on the Power of Garbling Techniques for Public-Key Encryption
- Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed
-
2018/554 ( PDF )
- A new class of irreducible pentanomials for polynomial based multipliers in binary fields
- Gustavo Banegas and Ricardo Custodio and Daniel Panario
-
2018/553 ( PDF )
- Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging
- Joseph Jaeger and Igors Stepanovs
-
2018/552 ( PDF )
- On the Complexity of Compressing Obfuscation
- Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass
-
2018/551 ( PDF )
- Structured Encryption and Leakage Suppression
- Seny Kamara and Tarik Moataz and Olga Ohrimenko
-
2018/550 ( PDF )
- PRank: Fast Analytical Rank Estimation via Pareto Distributions
- Liron David and Avishai Wool
-
2018/549 ( PDF )
- Adaptive Garbled RAM from Laconic Oblivious Transfer
- Sanjam Garg and Rafail Ostrovsky and Akshayaram Srinivasan
-
2018/548 ( PDF )
- From Laconic Zero-Knowledge to Public-Key Cryptography
- Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan
-
2018/547 ( PDF )
- Indifferentiable Authenticated Encryption
- Manuel Barbosa and Pooya Farshim
-
2018/546 ( PDF )
- Quantum Lattice Enumeration and Tweaking Discrete Pruning
- Yoshinori Aono and Phong Q. Nguyen and Yixin Shen
-
2018/545 ( PDF )
- Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
- Xiaolu Hou and Jakub Breier and Fuyuan Zhang and Yang Liu
-
2018/544 ( PDF )
- Pseudorandom Quantum States
- Zhengfeng Ji and Yi-Kai Liu and Fang Song
-
2018/543 ( PDF )
- Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
- Kristian Gjøsteen and Tibor Jager
-
2018/542 ( PDF )
- Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions
- Rafail Ostrovsky and Giuseppe Persiano and Daniele Venturi and Ivan Visconti
-
2018/541 ( PDF )
- Generic Attacks against Beyond-Birthday-Bound MACs
- Gaëtan Leurent and Mridul Nandi and Ferdinand Sibleyras
-
2018/540 ( PDF )
- Must the Communication Graph of MPC Protocols be an Expander?
- Elette Boyle and Ran Cohen and Deepesh Data and Pavel Hubacek
-
2018/539 ( PDF )
- Extracting Linearization Equations from Noisy Sources
- Daniel Smith-Tone
-
2018/538 ( PDF )
- Non-Malleable Codes for Partial Functions with Manipulation Detection
- Aggelos Kiayias and Feng-Hao Liu and Yiannis Tselekounis
-
2018/537 ( PDF )
- Quantum Security Analysis of CSIDH
- Xavier Bonnetain and André Schrottenloher
-
2018/536 ( PDF )
- On the Hardness of the Computational Ring-LWR Problem and its Applications
- Long Chen and Zhenfeng Zhang and Zhenfei Zhang
-
2018/535 ( PDF )
- Monero - Privacy in the Blockchain
- Kurt M. Alonso and Jordi Herrera Joancomartí
-
2018/534 ( PDF )
- Cryptographic Constructions Supporting Implicit Data Integrity
- Michael Kounavis and David Durham and Sergej Deutsch
-
2018/533 ( PDF )
- Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model
- Alice Pellet-Mary
-
2018/532 ( PDF )
- Ring packing and amortized FHEW bootstrapping
- Daniele Micciancio and Jessica Sorrell
-
2018/531 ( PDF )
- Polynomial direct sum masking to protect against both SCA and FIA
- Claude Carlet and Abderrahman Daif and Sylvain Guilley and Cédric Tavernier
-
2018/530 ( PDF )
- Two-Message Statistically Sender-Private OT from LWE
- Zvika Brakerski and Nico Döttling
-
2018/529 ( PDF )
- Trapdoor Functions from the Computational Diffie-Hellman Assumption
- Sanjam Garg and Mohammad Hajiabadi
-
2018/528 ( PDF )
- Recovering short secret keys of RLCE in polynomial time
- Alain Couvreur and Matthieu Lequesne and Jean-Pierre Tillich
-
2018/527 ( PDF )
- Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities
- Achiya Bar-On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
-
2018/526 ( PDF )
- Towards KEM Unification
- Daniel J. Bernstein and Edoardo Persichetti
-
2018/525 ( PDF )
- Location-Proof System based on Secure Multi-Party Computations
- Aurélien Dupin and Jean-Marc Robert and Christophe Bidan
-
2018/524 ( PDF )
- New Smooth Projective Hashing For Oblivious Transfer
- Bing Zeng
-
2018/523 ( PDF )
- Reducing Complexity of Pairing Comparisons using Polynomial Evaluation
- Adam Bobowski and Marcin Słowik
-
2018/522 ( PDF )
- Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1
- Yosuke Todo and Takanori Isobe and Willi Meier and Kazumaro Aoki and Bin Zhang
-
2018/521 ( PDF )
- Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
- Gil Segev and Ido Shahaf
-
2018/520 ( PDF )
- Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries
- Mridul Nandi
-
2018/519 ( PDF )
- Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules
- Brandon Broadnax and Alexander Koch and Jeremias Mechler and Tobias Müller and Jörn Müller-Quade and Matthias Nagel
-
2018/518 ( PDF )
- Secure and Reliable Key Agreement with Physical Unclonable Functions
- Onur Gunlu and Tasnad Kernetzky and Onurcan Iscan and Vladimir Sidorenko and Gerhard Kramer and Rafael F. Schaefer
-
2018/517 ( PDF )
- Upper and Lower Bounds for Continuous Non-Malleable Codes
- Dana Dachman-Soled and Mukul Kulkarni
-
2018/516 ( PDF )
- Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
- Atsushi Takayasu and Noboru Kunihiro
-
2018/515 ( PDF )
- Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
- Osman Bicer and Muhammed Ali Bingol and Mehmet Sabir Kiraz and Albert Levi
-
2018/514 ( PDF )
- Weak Compression and (In)security of Rational Proofs of Storage
- Ben Fisch and Shashwat Silas
-
2018/513 ( PDF )
- Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies
- Cristina Pérez-Solà and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart
-
2018/512 ( PDF )
- Provably Secure Integration Cryptosystem on Non-Commutative Group
- Weiqing You and Xiaoming Chen
-
2018/511 ( PDF )
- Return of GGH15: Provable Security Against Zeroizing Attacks
- James Bartusek and Jiaxin Guan and Fermi Ma and Mark Zhandry
-
2018/510 ( PDF )
- Key-Secrecy of PACE with OTS/CafeOBJ
- Dominik Klein
-
2018/509 ( -- withdrawn -- )
- Improved Collision Attack on Reduced RIPEMD-160
- Fukang Liu and Gaoli Wang and Zhenfu Cao
-
2018/508 ( PDF )
- Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
- Mriganka Mandal and Ratna Dutta
-
2018/507 ( PDF )
- Tight Tradeoffs in Searchable Symmetric Encryption
- Gilad Asharov and Gil Segev and Ido Shahaf
-
2018/506 ( PDF )
- Secure Two-Party Computation over Unreliable Channels
- Ran Gelles and Anat Paskin-Cherniavsky and Vassilis Zikas
-
2018/505 ( PDF )
- Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations
- Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and François-Xavier Standaert and Pierre-Yves Strub
-
2018/504 ( PDF )
- Quantum Attacks on Some Feistel Block Ciphers
- Xiaoyang Dong and Bingyou Dong and Xiaoyun Wang
-
2018/503 ( PDF )
- Finger Printing Data
- Gideon Samid
-
2018/502 ( PDF )
- Computer-aided proofs for multiparty computation with active security
- Helene Haagh and Aleksandr Karbyshev and Sabine Oechsner and Bas Spitters and Pierre-Yves Strub
-
2018/501 ( -- withdrawn -- )
- Secure Grouping and Aggregation with MapReduce
- Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade and Lihua Ye
-
2018/500 ( PDF )
- Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC
- Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda
-
2018/499 ( PDF )
- Secure Two-party Threshold ECDSA from ECDSA Assumptions
- Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat
-
2018/498 ( PDF )
- Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
- Qian Guo and Vincent Grosso and François-Xavier Standaert and Olivier Bronchain
-
2018/497 ( PDF )
- Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
- Xiangfu Song and Changyu Dong and Dandan Yuan and Qiuliang Xu and Minghao Zhao
-
2018/496 ( PDF )
- Efficient Delegated Private Set Intersection on Outsourced Private Datasets
- Aydin Abadi and Sotirios Terzis and Roberto Metere and Changyu Dong
-
2018/495 ( PDF )
- Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity
- Changyu Dong and Grigorios Loukides
-
2018/494 ( PDF )
- Order-LWE and the Hardness of Ring-LWE with Entropic Secrets
- Madalina Bolboceanu and Zvika Brakerski and Renen Perlman and Devika Sharma
-
2018/493 ( PDF )
- Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal
- Lior Rotem and Gil Segev
-
2018/492 ( PDF )
- New Instantiations of the CRYPTO 2017 Masking Schemes
- Pierre Karpman and Daniel S. Roche
-
2018/491 ( PDF )
- Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol
- Matvei Kotov and Anton Menshov and Alexey Myasnikov and Dmitry Panteleev and Alexander Ushakov
-
2018/490 ( PDF )
- Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed
- Thorben Moos and Amir Moradi and Tobias Schneider and François-Xavier Standaert
-
2018/489 ( PDF )
- Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
- Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad van Moorsel
-
2018/488 ( PDF )
- Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
- Benoît Cogliati and Jooyoung Lee
-
2018/487 ( PDF )
- Unbounded Inner-Product Functional Encryption, with Succinct Keys
- Edouard Dufour-Sans and David Pointcheval
-
2018/486 ( PDF )
- Pushing the Communication Barrier in Secure Computation using Lookup Tables
- Ghada Dessouky and Farinaz Koushanfar and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni and Michael Zohner
-
2018/485 ( PDF )
- Towards practical key exchange from ordinary isogeny graphs
- Luca De Feo and Jean Kieffer and Benjamin Smith
-
2018/484 ( PDF )
- Authenticated Encryption with Nonce Misuse and Physical Leakages: Definitions, Separation Results, and Leveled Constructions
- Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
-
2018/483 ( PDF )
- Compact Multi-Signatures for Smaller Blockchains
- Dan Boneh and Manu Drijvers and Gregory Neven
-
2018/482 ( PDF )
- SPDZ2k: Efficient MPC mod 2^k for Dishonest Majority
- Ronald Cramer and Ivan Damgård and Daniel Escudero and Peter Scholl and Chaoping Xing
-
2018/481 ( PDF )
- On the Exact Round Complexity of Secure Three-Party Computation
- Arpita Patra and Divya Ravi
-
2018/480 ( PDF )
- On Distributional Collision Resistant Hashing
- Ilan Komargodski and Eylon Yogev
-
2018/479 ( PDF )
- On the security of Jhanwar-Barua Identity-Based Encryption Scheme
- Adrian G. Schipor
-
2018/478 ( PDF )
- On Non-Monotonicity of the Success Probability in Linear Cryptanalysis
- Ali Aydin Selcuk
-
2018/477 ( PDF )
- CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
- Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek
-
2018/476 ( PDF )
- The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
- Stjepan Picek and Annelie Heuser and Alan Jovic and Shivam Bhasin and Francesco Regazzoni
-
2018/475 ( PDF )
- Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
- Jonathan Katz and Vladimir Kolesnikov and Xiao Wang
-
2018/474 ( PDF )
- Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification
- Peter Sebastian Nordholt and Meilof Veeningen
-
2018/473 ( PDF )
- A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement
- Daniele Friolo and Daniel Masny and Daniele Venturi
-
2018/472 ( PDF )
- Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
- Giulio Malavolta and Pedro Moreno-Sanchez and Clara Schneidewind and Aniket Kate and Matteo Maffei
-
2018/471 ( PDF )
- Efficient Range ORAM with $\mathbb{O}(\log^{2}{N})$ Locality
- Anrin Chakraborti and Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche and Radu Sion
-
2018/470 ( PDF )
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
- Thomas Agrikola and Geoffroy Couteau and Dennis Hofheinz
-
2018/469 ( PDF )
- An Abstract Model of UTxO-based Cryptocurrencies with Scripts
- Joachim Zahnentferner
-
2018/468 ( PDF )
- On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs
- Yaobin Shen and Lei Wang
-
2018/467 ( PDF )
- Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation
- Nigel P. Smart and Tim Wood
-
2018/466 ( PDF )
- A secure end-to-end verifiable e-voting system using zero knowledge based blockchain
- Somnath Panja and Bimal Kumar Roy
-
2018/465 ( PDF )
- A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model
- Geoffroy Couteau
-
2018/464 ( PDF )
- Cryptanalysis of MORUS
- Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Gaëtan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Benoît Viguier
-
2018/463 ( PDF )
- Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map
- Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro
-
2018/462 ( PDF )
- Logistic regression over encrypted data from fully homomorphic encryption
- Hao Chen and Ran Gilad-Bachrach and Kyoohyung Han and Zhicong Huang and Amir Jalali and Kim Laine and Kristin Lauter
-
2018/461 ( PDF )
- Continuous-Source Fuzzy Extractors: Source uncertainty and security
- Benjamin Fuller and Lowen Peng
-
2018/460 ( PDF )
- RapidChain: Scaling Blockchain via Full Sharding
- Mahdi Zamani and Mahnush Movahedi and Mariana Raykova
-
2018/459 ( PDF )
- Supersingular Isogeny Oblivious Transfer (SIOT)
- Paulo Barreto and Anderson Nascimento and Glaucio Oliveira and Waldyr Benits
-
2018/458 ( PDF )
- Characterizing Collision and Second-Preimage Resistance in Linicrypt
- Ian McQuoid and Trevor Swope and Mike Rosulek
-
2018/457 ( PDF )
- From FE Combiners to Secure MPC and Back
- Prabhanjan Ananth and Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai
-
2018/456 ( PDF )
- An efficient structural attack on NIST submission DAGS
- Elise Barelli and Alain Couvreur
-
2018/455 ( PDF )
- On Renyi Entropies and their Applications to Guessing Attacks in Cryptography
- Serdar Boztas
-
2018/454 ( PDF )
- R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies
- Mohsen Minaei and Pedro Moreno-Sanchez and Aniket Kate
-
2018/453 ( PDF )
- Floppy-Sized Group Signatures from Lattices
- Cecilia Boschini and Jan Camenisch and Gregory Neven
-
2018/452 ( PDF )
- Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2
- Panjin Kim and Daewan Han and Kyung Chul Jeong
-
2018/451 ( PDF )
- Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
- Shuichi Katsumata and Shota Yamada and Takashi Yamakawa
-
2018/450 ( PDF )
- From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
- David W. Archer and Dan Bogdanov and Liina Kamm and Y. Lindell and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright
-
2018/449 ( PDF )
- Key Prediction Security of Keyed Sponges
- Bart Mennink
-
2018/448 ( PDF )
- Non-adaptive Group-Testing Aggregate MAC Scheme
- Shoichi Hirose and Junji Shikata
-
2018/447 ( PDF )
- Improved Distinguisher Search Techniques Based on Parity Sets
- Xiaofeng Xie and Tian Tian
-
2018/446 ( PDF )
- A voting scheme with post-quantum security based on physical laws
- Hua Dong and Li Yang
-
2018/445 ( PDF )
- CRPSF and NTRU Signatures over cyclotomic fields
- Yang Wang and Mingqiang Wang
-
2018/444 ( PDF )
- Founding Cryptography on Smooth Projective Hashing
- Bing Zeng
-
2018/443 ( PDF )
- Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits
- Rishab Goyal
-
2018/442 ( PDF )
- SecureNN: Efficient and Private Neural Network Training
- Sameer Wagh and Divya Gupta and Nishanth Chandran
-
2018/441 ( PDF )
- Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols
- Amos Beimel and Naty Peter
-
2018/440 ( PDF )
- Formal Analysis of Distance Bounding with Secure Hardware
- Handan Kılınç and Serge Vaudenay
-
2018/439 ( PDF )
- Tight Private Circuits: Achieving Probing Security with the Least Refreshing
- Sonia Belaïd and Dahmun Goudarzi and Matthieu Rivain
-
2018/438 ( PDF )
- Trivially and Efficiently Composing Masked Gadgets with Probe Isolating Non-Interference
- Gaëtan Cassiers and François-Xavier Standaert
-
2018/437 ( PDF )
- Zero-Knowledge Protocols for Search Problems
- Ben Berger and Zvika Brakerski
-
2018/436 ( PDF )
- Crash-tolerant Consensus in Directed Graph Revisited
- Ashish Choudhury and Gayathri Garimella and Arpita Patra and Divya Ravi and Pratik Sarkar
-
2018/435 ( PDF )
- A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence
- Bingsheng Zhang and Roman Oliynykov and Hamed Balogun
-
2018/434 ( PDF )
- Towards Tight Security of Cascaded LRW2
- Bart Mennink
-
2018/433 ( PDF )
- Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data
- Guowen Xu and Hongwei Li
-
2018/432 ( PDF )
- Hidden Shift Quantum Cryptanalysis and Implications
- Xavier Bonnetain and María Naya-Plasencia
-
2018/431 ( -- withdrawn -- )
- Lightweight ASIC Implementation of AEGIS-128
- Anubhab Baksi and Vikramkumar Pudi and Swagata Mandal and Anupam Chattopadhyay
-
2018/430 ( PDF )
- A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms
- Faruk Göloğlu and Antoine Joux
-
2018/429 ( PDF )
- Amortized Complexity of Information-Theoretically Secure MPC Revisited
- Ignacio Cascudo and Ronald Cramer and Chaoping Xing and Chen Yuan
-
2018/428 ( PDF )
- Differential Fault Analysis of Rectangle-80
- Shobhit Sinha and Sandip Karmakar
-
2018/427 ( PDF )
- Secure Boot and Remote Attestation in the Sanctum Processor
- Ilia Lebedev and Kyle Hogan and Srinivas Devadas
-
2018/426 ( PDF )
- Adaptively Secure Proxy Re-encryption
- Georg Fuchsbauer and Chethan Kamath and Karen Klein and Krzysztof Pietrzak
-
2018/425 ( PDF )
- Implementing RLWE-based Schemes Using an RSA Co-Processor
- Martin R. Albrecht and Christian Hanser and Andrea Hoeller and Thomas Pöppelmann and Fernando Virdia and Andreas Wallner
-
2018/424 ( PDF )
- Circumventing Cryptographic Deniability with Remote Attestation
- Lachlan J. Gunn and Ricardo Vieitez Parra and N. Asokan
-
2018/423 ( PDF )
- Yes, There is an Oblivious RAM Lower Bound!
- Kasper Green Larsen and Jesper Buus Nielsen
-
2018/422 ( PDF )
- Message-locked Encryption with File Update
- Suyash Kandele and Souradyuti Paul
-
2018/421 ( PDF )
- TFHE: Fast Fully Homomorphic Encryption over the Torus
- Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
-
2018/420 ( PDF )
- Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance
- Shuichi Katsumata and Takahiro Matsuda and Atsushi Takayasu
-
2018/419 ( PDF )
- Homomorphic Secret Sharing: Optimizations and Applications
- Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Michele Orrù
-
2018/418 ( PDF )
- DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
- Vladimir Kiriansky and Ilia Lebedev and Saman Amarasinghe and Srinivas Devadas and Joel Emer
-
2018/417 ( PDF )
- On the Security of Two-Round Multi-Signatures
- Manu Drijvers and Kasra Edalatnejad and Bryan Ford and Eike Kiltz and Julian Loss and Gregory Neven and Igors Stepanovs
-
2018/416 ( PDF )
- Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers
- Nadim Kobeissi and Natalia Kulatova
-
2018/415 ( PDF )
- Flux: Revisiting Near Blocks for Proof-of-Work Blockchains
- Alexei Zamyatin and Nicholas Stifter and Philipp Schindler and Edgar Weippl and William J. Knottenbelt
-
2018/414 ( PDF )
- Aggregation of Gamma-Signatures and Applications to Bitcoin
- Yunlei Zhao
-
2018/413 ( PDF )
- Scaling Backend Authentication at Facebook
- Kevin Lewi and Callen Rain and Stephen Weis and Yueting Lee and Haozhi Xiong and Benjamin Yang
-
2018/412 ( PDF )
- PRCash: Fast, Private and Regulated Transactions for Digital Currencies
- Karl Wüst and Kari Kostiainen and Vedran Capkun and Srdjan Capkun
-
2018/411 ( PDF )
- Unsupervised Machine Learning on Encrypted Data
- Angela Jäschke and Frederik Armknecht
-
2018/410 ( PDF )
- A Note On Clauser-Horne-Shimony-Holt Inequality
- Zhengjun Cao and Lihua Liu
-
2018/409 ( PDF )
- Laconic Function Evaluation and Applications
- Willy Quach and Hoeteck Wee and Daniel Wichs
-
2018/408 ( PDF )
- Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem
- Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee
-
2018/407 ( PDF )
- Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol
- Cencen Wan and Shuyang Tang and Yuncong Zhang and Chen Pan and Zhiqiang Liu and Yu Long and Zhen Liu and Yu Yu
-
2018/406 ( PDF )
- “Larger Keys, Less Complexity” A Strategic Proposition
- Gideon Samid
-
2018/405 ( PDF )
- A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.
- Sankhanil Dey and Ranjan Ghosh
-
2018/404 ( PDF )
- Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks
- José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Hugo Pacheco and Vitor Pereira and Bernardo Portela
-
2018/403 ( PDF )
- ABY3: A Mixed Protocol Framework for Machine Learning
- Payman Mohassel and Peter Rindal
-
2018/402 ( PDF )
- Another Look at Relay and Distance-based Attacks in Contactless Payments
- Ioana Boureanu and Anda Anda
-
2018/401 ( PDF )
- Lattice-based Direct Anonymous Attestation (LDAA)
- Nada EL Kassem and Liqun Chen and Rachid El Bansarkhani and Ali El Kaafarani and Jan Camenisch and Patrick Hough and Paulo Martins and Leonel Sousa
-
2018/400 ( PDF )
- Agreement with Satoshi – On the Formalization of Nakamoto Consensus
- Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Alexei Zamyatin and Edgar Weippl
-
2018/399 ( PDF )
- On the Feasibility of an ECDLP Algorithm
- Sergey Grebnev
-
2018/398 ( PDF )
- Fun with Bitcoin smart contracts
- Massimo Bartoletti and Tiziana Cimoli and Roberto Zunino
-
2018/397 ( PDF )
- Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards
- Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee
-
2018/396 ( PDF )
- New Bleichenbacher Records: Fault Attacks on qDSA Signatures
- Akira Takahashi and Mehdi Tibouchi and Masayuki Abe
-
2018/395 ( PDF )
- Secure Computation with Constant Communication Overhead using Multiplication Embeddings
- Alexander R. Block and Hemanta K. Maji and Hai H. Nguyen
-
2018/394 ( PDF )
- Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited
- Laasya Bangalore and Ashish Choudhury and Arpita Patra
-
2018/393 ( PDF )
- AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM
- Matvei Kotov and Anton Menshov and Alexander Ushakov
-
2018/392 ( PDF )
- Making AES great again: the forthcoming vectorized AES instruction
- Nir Drucker, Shay Gueron and Vlad Krasnov
-
2018/391 ( PDF )
- Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
- Romain Gay and Lucas Kowalczyk and Hoeteck Wee
-
2018/390 ( PDF )
- MILP-based Differential Attack on Round-reduced GIFT
- Baoyu Zhu and Xiaoyang Dong and Hongbo Yu
-
2018/389 ( PDF )
- Distributed SSH Key Management with Proactive RSA Threshold Signatures
- Yotam Harchol and Ittai Abraham and Benny Pinkas
-
2018/388 ( PDF )
- Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
- Seyed Farhad Aghili and Hamid Mala
-
2018/387 ( PDF )
- Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority
- Ryo Kikuchi and Dai Ikarashi and Takahiro Matsuda and Koki Hamada and Koji Chida
-
2018/386 ( PDF )
- Certificateless Public Key Signature Schemes from Standard Algorithms
- Zhaohui Cheng and Liqun Chen
-
2018/385 ( PDF )
- Cryptographic Hashing From Strong One-Way Functions
- Justin Holmgren and Alex Lombardi
-
2018/384 ( -- withdrawn -- )
- Fine-Grained and Application-Ready Distance-Bounding Security
- Ioana Boureanu and David Gerault and Pascal Lafourcade
-
2018/383 ( PDF )
- CSIDH: An Efficient Post-Quantum Commutative Group Action
- Wouter Castryck and Tanja Lange and Chloe Martindale and Lorenz Panny and Joost Renes
-
2018/382 ( PDF )
- Revocable Identity-based Encryption from Codes with Rank Metric
- Donghoon Chang and Amit Kumar Chauhan and Sandeep Kumar and Somitra Kumar Sanadhya
-
2018/381 ( PDF )
- Masking the GLP Lattice-Based Signature Scheme at Any Order
- Gilles Barthe and Sonia Belaïd and Thomas Espitau and Pierre-Alain Fouque and Benjamin Grégoire and Mélissa Rossi and Mehdi Tibouchi
-
2018/380 ( PDF )
- Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution
- Jonathan Bootle and Andrea Cerulli and Jens Groth and Sune Jakobsen and Mary Maller
-
2018/379 ( PDF )
- Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)
- Wilson Alberto Torres and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Veronika Kuchta and Nandita Bhattacharjee and Man Ho Au and Jacob Cheng
-
2018/378 ( PDF )
- Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability
- Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
-
2018/377 ( PDF )
- ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement
- Jing Chen and Sergey Gorbunov and Silvio Micali and Georgios Vlachos
-
2018/376 ( PDF )
- Arithmetic Considerations for Isogeny Based Cryptography
- Joppe W. Bos and Simon Friedberger
-
2018/375 ( PDF )
- Witness Indistinguishability for any Single-Round Argument with Applications to Access Control
- Zvika Brakerski and Yael Tauman Kalai
-
2018/374 ( PDF )
- Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
- Zhenzhen Bao and Jian Guo and Lei Wang
-
2018/373 ( PDF )
- PanORAMa: Oblivious RAM with Logarithmic Overhead
- Sarvar Patel and Giuseppe Persiano and Mariana Raykova and Kevin Yeo
-
2018/372 ( PDF )
- Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)
- Alexander R. Block and Divya Gupta and Hemanta K. Maji and Hai H. Nguyen
-
2018/371 ( PDF )
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter and Travis Morrison and Christophe Petit
-
2018/370 ( PDF )
- Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
- A.V. Menyachikhin
-
2018/369 ( PDF )
- Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
- Hyung Tae Lee and Huaxiong Wang and Kai Zhang
-
2018/368 ( PDF )
- Encryption with Untrusted Keys: Security against Chosen Objects Attack
- Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
-
2018/367 ( PDF )
- Cache-Timing Attacks on RSA Key Generation
- Alejandro Cabrera Aldaya and Cesar Pereida García and Luis Manuel Alvarez Tapia and Billy Bob Brumley
-
2018/366 ( PDF )
- Directional Distance-Bounding Identification Protocols
- Ahmad Ahmadi and Reihaneh Safavi-Naini
-
2018/365 ( PDF )
- Anonymous Distance-Bounding Identification
- Ahmad Ahmadi and Reihaneh Safavi-Naini and Mamunur Akand
-
2018/364 ( PDF )
- Perfectly Secure Oblivious Parallel RAM
- T-H. Hubert Chan and Kartik Nayak and Elaine Shi
-
2018/363 ( PDF )
- Private Anonymous Data Access
- Ariel Hamlin and Rafail Ostrovsky and Mor Weiss and Daniel Wichs
-
2018/362 ( PDF )
- Backdoored Hash Functions: Immunizing HMAC and HKDF
- Marc Fischlin and Christian Janson and Sogol Mazaheri
-
2018/361 ( PDF )
- Two-message Key Exchange with Strong Security from Ideal Lattices
- Zheng Yang and Yu Chen and Song Luo
-
2018/360 ( PDF )
- GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
- Yilei Chen and Vinod Vaikuntanathan and Hoeteck Wee
-
2018/359 ( -- withdrawn -- )
- Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers
- Christina-Angeliki Toli and Abdelrahaman Aly and Bart Preneel
-
2018/358 ( PDF )
- Efficient Erasable PUFs from Programmable Logic and Memristors
- Yansong Gao and Chenglu Jin and Jeeson Kim and Hussein Nili and Xiaolin Xu and Wayne Burleson and Omid Kavehei and Marten van Dijk and Damith C. Ranasinghe and Ulrich Rührmair
-
2018/357 ( PDF )
- Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
- Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Stefan Mangard and Florian Mendel and Robert Primas
-
2018/356 ( PDF )
- In Praise of Twisted Embeddings
- Jheyne N. Ortiz and Robson R. de Araujo and Diego F. Aranha and Sueli I. R. Costa and Ricardo Dahab
-
2018/355 ( PDF )
- Differential Fault Attacks on Deterministic Lattice Signatures
- Leon Groot Bruinderink and Peter Pessl
-
2018/354 ( PDF )
- Start your ENGINEs: dynamically loadable contemporary crypto
- Nicola Tuveri and Billy B. Brumley
-
2018/353 ( PDF )
- Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
- Xin Li
-
2018/352 ( PDF )
- Cryptography with Disposable Backdoors
- Kai-Min Chung and Marios Georgiou and Ching-Yi Lai and Vassilis Zikas
-
2018/351 ( PDF )
- A Chosen Plaintext Attack on Offset Public Permutation Mode
- Miloslav Homer
-
2018/350 ( PDF )
- The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
- Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Ulrich Rührmair and Marten van Dijk
-
2018/349 ( PDF )
- An Analysis of the NIST SP 800-90A Standard
- Joanne Woodage and Dan Shumow
-
2018/348 ( PDF )
- Monero Ring Attack: Recreating Zero Mixin Transaction Effect
- Dimaz Ankaa Wijaya and Joseph Liu and Ron Steinfeld and Dongxi Liu
-
2018/347 ( PDF )
- 3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
- Stanislaw Jarecki and Boyang Wei
-
2018/346 ( PDF )
- Collusion Resistant Traitor Tracing from Learning with Errors
- Rishab Goyal and Venkata Koppula and Brent Waters
-
2018/345 ( PDF )
- In-region Authentication
- Mamunur Rashid Akand and Reihaneh Safavi-Naini
-
2018/344 ( PDF )
- Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
- Andrea Cerulli and Emiliano De Cristofaro and Claudio Soriente
-
2018/343 ( PDF )
- Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments
- Duc Viet Le and Mahimna Kelkar and Aniket Kate
-
2018/342 ( PDF )
- MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
- Ralph Ankele and Florian Böhl and Simon Friedberger
-
2018/341 ( PDF )
- Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
- William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens-Peter Kaps and Kris Gaj
-
2018/340 ( PDF )
- Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures
- Johannes Blömer and Jan Bobolz
-
2018/339 ( PDF )
- Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme
- Thomas Debris-Alazard and Jean-Pierre Tillich
-
2018/338 ( PDF )
- Quantum FHE (Almost) As Secure As Classical
- Zvika Brakerski
-
2018/337 ( PDF )
- Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
- Marc Fischlin and Patrick Harasser
-
2018/336 ( PDF )
- SoK: The Problem Landscape of SIDH
- David Urbanik and David Jao
-
2018/335 ( PDF )
- Fast modular squaring with AVX512IFMA
- Nir Drucker and Shay Gueron
-
2018/334 ( PDF )
- Impossible Differential Attack on QARMA Family of Block Ciphers
- Dong Yang and Wen-feng Qi and Hua-jin Chen
-
2018/333 ( PDF )
- Breaking the Circuit-Size Barrier in Secret Sharing
- Tianren Liu and Vinod Vaikuntanathan
-
2018/332 ( PDF )
- Differential Cryptanalysis of Round-Reduced Sparx-64/128
- Ralph Ankele and Eik List
-
2018/331 ( PDF )
- Estimate all the {LWE, NTRU} schemes!
- Martin R. Albrecht and Benjamin R. Curtis and Amit Deo and Alex Davidson and Rachel Player and Eamonn W. Postlethwaite and Fernando Virdia and Thomas Wunderer
-
2018/330 ( PDF )
- Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
- Joseph K. Liu and Tsz Hon Yuen and Peng Zhang and Kaitai Liang
-
2018/329 ( PDF )
- Symbolic Side-Channel Analysis for Probabilistic Programs
- Pasquale Malacaria and MHR. Khouzani and Corina S. Păsăreanu and Quoc-Sang Phan and Kasper Luckow
-
2018/328 ( PDF )
- Improved High-Order Conversion From Boolean to Arithmetic Masking
- Luk Bettale and Jean-Sebastien Coron and Rina Zeitoun
-
2018/327 ( PDF )
- A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System
- Zhengjun Cao and Lihua Liu
-
2018/326 ( -- withdrawn -- )
- Verifier Non-Locality in Interactive Proofs
- Claude Crepeau and Nan Yang
-
2018/325 ( PDF )
- Multi-power Post-quantum RSA
- John M. Schanck
-
2018/324 ( PDF )
- ACPC: Efficient revocation of pseudonym certificates using activation codes
- Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva
-
2018/323 ( PDF )
- PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks
- Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
-
2018/322 ( PDF )
- DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks
- Huili Chen and Bita Darvish Rohani and Farinaz Koushanfar
-
2018/321 ( PDF )
- Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
- David Derler and Stephan Krenn and Thomas Lorünser and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
-
2018/320 ( PDF )
- General State Channel Networks
- Stefan Dziembowski and Sebastian Faust and Kristina Hostáková
-
2018/319 ( PDF )
- HydRand: Practical Continuous Distributed Randomness
- Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl
-
2018/318 ( PDF )
- Practical attacks against the Walnut digital signature scheme
- Ward Beullens and Simon R. Blackburn
-
2018/317 ( PDF )
- Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
- Dor Fledel and Avishai Wool
-
2018/316 ( PDF )
- Non-Malleable Secret Sharing
- Vipul Goyal and Ashutosh Kumar
-
2018/315 ( PDF )
- Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
- Dahmun Goudarzi and Anthony Journault and Matthieu Rivain and François-Xavier Standaert
-
2018/314 ( PDF )
- Secure top most significant genome variants search: iDASH 2017 competition
- Sergiu Carpov and Thibaud Tortech
-
2018/313 ( PDF )
- On the cost of computing isogenies between supersingular elliptic curves
- Gora Adj and Daniel Cervantes-Vázquez and Jesús-Javier Chi-Domínguez and Alfred Menezes and Francisco Rodríguez-Henríquez
-
2018/312 ( PDF )
- Multilinear maps via secret ring
- Chunsheng Gu
-
2018/311 ( PDF )
- DeepSigns: A Generic Watermarking Framework for Protecting the Ownership of Deep Learning Models
- Bita Darvish Rouhani and Huili Chen and farinaz Koushanfar
-
2018/310 ( PDF )
- Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
- Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi
-
2018/309 ( -- withdrawn -- )
- Error Estimation of Practical Convolution Discrete Gaussian Sampling with Rejection Sampling
- Zhongxiang Zheng and Xiaoyun Wang and Guangwu Xu and Chunhuan Zhao
-
2018/308 ( PDF )
- On perfectly secure 2PC in the OT-hybrid model
- Bar Alon and Anat Paskin-Cherniavsky
-
2018/307 ( PDF )
- Isolated Curves and the MOV Attack
- Travis Scholl
-
2018/306 ( PDF )
- State Separation for Code-Based Game-Playing Proofs
- Chris Brzuska and Antoine Delignat-Lavaud and Cedric Fournet and Konrad Kohbrok and Markulf Kohlweiss
-
2018/305 ( PDF )
- Efficient four-dimensional GLV curve with high security
- Olivier Bernard and Renaud Dubois and Simon Masson
-
2018/304 ( PDF )
- Geosocial Query with User-Controlled Privacy
- Peizhao Hu and Sherman S.M. Chow and Asma Aloufi
-
2018/303 ( PDF )
- 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State
- Bernardo David and Rafael Dowsley and Mario Larangeira
-
2018/302 ( PDF )
- Rethinking Large-Scale Consensus
- Rafael Pass and Elaine Shi
-
2018/301 ( PDF )
- On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
- Estuardo Alpirez Bock and Chris Brzuska and Wil Michiels and Alexander Treff
-
2018/300 ( PDF )
- Outsourcing Modular Exponentiation in Cryptographic Web Applications
- Pascal Mainini and Rolf Haenni
-
2018/299 ( PDF )
- Clusters of Re-used Keys
- Stephen Farrell
-
2018/298 ( PDF )
- In search of CurveSwap: Measuring elliptic curve implementations in the wild
- Luke Valenta and Nick Sullivan and Antonio Sanso and Nadia Heninger
-
2018/297 ( PDF )
- Fine-Grained Secure Computation
- Matteo Campanelli and Rosario Gennaro
-
2018/296 ( PDF )
- Asynchronous ratcheted key exchange
- Bertram Poettering and Paul Rösler
-
2018/295 ( PDF )
- ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers (Revised Version)
- Sayandeep Saha and Debdeep Mukhopadhyay and Pallab Dasgupta
-
2018/294 ( PDF )
- Learning strikes again: the case of the DRS signature scheme
- Léo Ducas and Yang Yu
-
2018/293 ( PDF )
- Privacy Amplification from Non-malleable Codes
- Eshan Chattopadhyay and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
-
2018/292 ( PDF )
- Linear Biases in AEGIS Keystream
- Brice Minaud
-
2018/291 ( PDF )
- Simulations of Optical Emissions for Attacking AES and Masked AES
- Guido Marco Bertoni and Lorenzo Grassi and Filippo Melzani
-
2018/290 ( PDF )
- Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System
- Vireshwar Kumar and He Li and Noah Luther and Pranav Asokan and Jung-Min (Jerry) Park and Kaigui Bian and Martin B. H. Weiss and Taieb Znati
-
2018/289 ( PDF )
- Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue
- Phillipp Schoppmann and Lennart Vogelsang and Adrià Gascón and Borja Balle
-
2018/288 ( PDF )
- Constant Size Traceable Ring Signature Scheme without Random Oracles
- Ke Gu and Na Wu
-
2018/287 ( PDF )
- Secure Cloud Storage Scheme Based On Hybrid Cryptosystem
- Atanu Basu and Indranil Sengupta
-
2018/286 ( PDF )
- AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
- Björn Haase and Benoît Labrique
-
2018/285 ( PDF )
- Collateral Damage of Facebook Applications: a Comprehensive Study
- Iraklis Symeonidis and Gergely Biczók and Fatemeh Shirazi and Cristina Pérez-Solà and Jessica Schroers and Bart Preneel
-
2018/284 ( PDF )
- Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
- Qichun Wang
-
2018/283 ( PDF )
- Homomorphic Rank Sort Using Surrogate Polynomials
- Gizem S. Çetin and Berk Sunar
-
2018/282 ( PDF )
- Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
- Jason LeGrow and David Jao and Reza Azarderakhsh
-
2018/281 ( PDF )
- Upgrading to Functional Encryption
- Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters
-
2018/280 ( PDF )
- Updatable and Universal Common Reference Strings with Applications to zk-SNARKs
- Jens Groth and Markulf Kohlweiss and Mary Maller and Sarah Meiklejohn and Ian Miers
-
2018/279 ( PDF )
- Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing
- Zvika Brakerski and Vadim Lyubashevsky and Vinod Vaikuntanathan and Daniel Wichs
-
2018/278 ( PDF )
- Mixed-radix Naccache-Stern encryption
- Rémi Géraud and David Naccache
-
2018/277 ( PDF )
- Approximate and Probabilistic Differential Privacy Definitions
- Sebastian Meiser
-
2018/276 ( PDF )
- How to Record Quantum Queries, and Applications to Quantum Indifferentiability
- Mark Zhandry
-
2018/275 ( PDF )
- Lattice-Based zk-SNARKs from Square Span Programs
- Rosario Gennaro and Michele Minelli and Anca Nitulescu and Michele Orrù
-
2018/274 ( PDF )
- G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions
- Rachid El Bansarkhani and Rafael Misoczki
-
2018/273 ( PDF )
- Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More
- Prabhanjan Ananth and Xiong Fan and Elaine Shi
-
2018/272 ( PDF )
- Multi-Theorem Preprocessing NIZKs from Lattices
- Sam Kim and David J. Wu
-
2018/271 ( PDF )
- MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public
- Borching Su
-
2018/270 ( PDF )
- A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
- Douglas R. Stinson
-
2018/269 ( PDF )
- Vault: Fast Bootstrapping for the Algorand Cryptocurrency
- Derek Leung and Adam Suhl and Yossi Gilad and Nickolai Zeldovich
-
2018/268 ( PDF )
- Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead
- Michael Raskin and Mark Simkin
-
2018/267 ( PDF )
- A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies
- Patrick Longa
-
2018/266 ( PDF )
- Authenticated key exchange for SIDH
- Steven D. Galbraith
-
2018/265 ( PDF )
- Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography
- Ayesha Khalid and James Howe and Ciara Rafferty and Francesco Regazzoni and Maire O’Neill
-
2018/264 ( PDF )
- Security proof for Quantum Key Recycling with noise
- Daan Leermakers and Boris Skoric
-
2018/263 ( -- withdrawn -- )
- An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
- Seyyed Mahdi Sedaghat and Mohammad Hassan Ameri and Mahshid Delavar and Javad Mohajeri and Mohammad Reza Aref
-
2018/262 ( PDF )
- Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies
- Joachim Zahnentferner
-
2018/261 ( PDF )
- Post-Quantum EPID Signatures from Symmetric Primitives
- Dan Boneh and Saba Eskandarian and Ben Fisch
-
2018/260 ( PDF )
- MDS Matrices with Lightweight Circuits
- Sébastien Duval and Gaëtan Leurent
-
2018/259 ( PDF )
- The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption
- Zheng Yang and Kimmo Järvinen
-
2018/258 ( PDF )
- Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers
- Alya Geogiana Buja and Shekh Faisal Abdul-Latip and Rabiah Ahmad
-
2018/257 ( PDF )
- On Quantum Indifferentiability
- Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Noel Tabia and Dominique Unruh
-
2018/256 ( PDF )
- QC-MDPC: A Timing Attack and a CCA2 KEM
- Edward Eaton and Matthieu Lequesne and Alex Parent and Nicolas Sendrier
-
2018/255 ( PDF )
- Topology-Hiding Computation Beyond Semi-Honest Adversaries
- Rio LaVigne and Chen-Da Liu-Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi
-
2018/254 ( PDF )
- Logistic Regression Model Training based on the Approximate Homomorphic Encryption
- Andrey Kim and Yongsoo Song and Miran Kim and Keewoo Lee and Jung Hee Cheon
-
2018/253 ( PDF )
- Capsule: A Protocol for Secure Collaborative Document Editing
- Nadim Kobeissi
-
2018/252 ( PDF )
- The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract
- Yongge Wang and Qutaibah m. Malluhi
-
2018/251 ( PDF )
- VeritasDB: High Throughput Key-Value Store with Integrity
- Rohit Sinha and Mihai Christodorescu
-
2018/250 ( PDF )
- Making Public Key Functional Encryption Function Private, Distributively
- Xiong Fan and Qiang Tang
-
2018/249 ( PDF )
- Analysis of Deutsch-Jozsa Quantum Algorithm
- Zhengjun Cao and Lihua Liu
-
2018/248 ( PDF )
- Stake-Bleeding Attacks on Proof-of-Stake Blockchains
- Peter Gaži and Aggelos Kiayias and Alexander Russell
-
2018/247 ( PDF )
- Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
- Thang Hoang and Muslum Ozgur Ozmen and Yeongjin Jang and Attila A. Yavuz
-
2018/246 ( PDF )
- Universally Verifiable MPC with Applications to IRV Ballot Counting
- Chris Culnane and Olivier Pereira and Kim Ramchen and Vanessa Teague
-
2018/245 ( PDF )
- Secure Search via Multi-Ring Fully Homomorphic Encryption
- Adi Akavia and Dan Feldman and Hayim Shaul
-
2018/244 ( PDF )
- Faster Homomorphic Linear Transformations in HElib
- Shai Halevi and Victor Shoup
-
2018/243 ( PDF )
- A New Approach to Deanonymization of Unreachable Bitcoin Nodes
- Indra Deep Mastan and Souradyuti Paul
-
2018/242 ( PDF )
- A New Constant-size Accountable Ring Signature Scheme Without Random Oracles
- Sudhakar Kumawat and Souradyuti Paul
-
2018/241 ( PDF )
- zkLedger: Privacy-Preserving Auditing for Distributed Ledgers
- Neha Narula and Willy Vasquez and Madars Virza
-
2018/240 ( PDF )
- Towards Non-Interactive Zero-Knowledge for NP from LWE
- Ron D. Rothblum and Adam Sealfon and Katerina Sotiraki
-
2018/239 ( PDF )
- RepuCoin: Your Reputation is Your Power
- Jiangshan Yu and David Kozhaya and Jeremie Decouchant and Paulo Esteves-Verissimo
-
2018/238 ( PDF )
- Private Set Intersection with Linear Communication from General Assumptions
- Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky
-
2018/237 ( PDF )
- On Tightly Secure Non-Interactive Key Exchange
- Julia Hesse and Dennis Hofheinz and Lisa Kohl
-
2018/236 ( PDF )
- Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network
- Yuval Marcus and Ethan Heilman and Sharon Goldberg
-
2018/235 ( PDF )
- Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
- Julian Loss and Tal Moran
-
2018/234 ( PDF )
- P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations
- Hagen Sparka and Florian Tschorsch and Björn Scheuermann
-
2018/233 ( PDF )
- Privacy-Preserving Logistic Regression Training
- Charlotte Bonte and Frederik Vercauteren
-
2018/232 ( PDF )
- Improved fully homomorphic public-key encryption with small ciphertext size
- Masahiro Yagisawa
-
2018/231 ( PDF )
- Remarks on Bell's Inequality
- Zhengjun Cao and Lihua Liu
-
2018/230 ( PDF )
- Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- Jan-Pieter D’Anvers and Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren
-
2018/229 ( PDF )
- Optimizing polynomial convolution for NTRUEncrypt
- Wei Dai and William Whyte and Zhenfei Zhang
-
2018/228 ( PDF )
- Non-interactive zaps of knowledge
- Georg Fuchsbauer and Michele Orrù
-
2018/227 ( PDF )
- Can We Overcome the $n \log n$ Barrier for Oblivious Sorting?
- Wei-Kai Lin and Elaine Shi and Tiancheng Xie
-
2018/226 ( PDF )
- Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models
- Sandro Coretti and Yevgeniy Dodis and Siyao Guo
-
2018/225 ( PDF )
- A foundation for secret, verifiable elections
- Ben Smyth
-
2018/224 ( PDF )
- Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons
- Rhys Carlton and Aleksander Essex and Krzysztof Kapulkin
-
2018/223 ( PDF )
- Shorter double-authentication preventing signatures for small address spaces
- Bertram Poettering
-
2018/222 ( PDF )
- Authentication with weaker trust assumptions for voting systems
- Elizabeth A. Quaglia and Ben Smyth
-
2018/221 ( PDF )
- Bandwidth-Hard Functions: Reductions and Lower Bounds
- Jeremiah Blocki and Peiyuan Liu and Ling Ren and Samson Zhou
-
2018/220 ( PDF )
- PRO-ORAM: Constant Latency Read-Only Oblivious RAM
- Shruti Tople and Yaoqi Jia and Prateek Saxena
-
2018/219 ( PDF )
- On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering
- Jakub Breier and Dirmanto Jap and Xiaolu Hou and Shivam Bhasin
-
2018/218 ( PDF )
- On Evaluating Fault Resilient Encoding Schemes in Software
- Jakub Breier and Xiaolu Hou and Yang Liu
-
2018/217 ( PDF )
- Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
- Mihir Bellare and Wei Dai
-
2018/216 ( PDF )
- Secure Computation with Low Communication from Cross-checking
- S. Dov Gordon and Samuel Ranellucci and Xiao Wang
-
2018/215 ( PDF )
- Towards everlasting privacy and efficient coercion resistance in remote electronic voting
- Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis and Bingsheng Zhang
-
2018/214 ( PDF )
- RMAC -- A Lightweight Authentication Protocol for Highly Constrained IoT Devices
- Ahmad Khoureich Ka
-
2018/213 ( PDF )
- Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack
- I. Stewart and D. Ilie and A. Zamyatin and S. Werner and M.F. Torshizi and W.J. Knottenbelt
-
2018/212 ( PDF )
- How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts
- Thibaut Horel and Sunoo Park and Silas Richelson and Vinod Vaikuntanathan
-
2018/211 ( PDF )
- Number "Not Used" Once - Practical fault attack on pqm4 implementations of NIST candidates
- Prasanna Ravi and Debapriya Basu Roy and Shivam Bhasin and Anupam Chattopadhyay and Debdeep Mukhopadhyay
-
2018/210 ( PDF )
- A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
- Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi
-
2018/209 ( PDF )
- CALYPSO: Private Data Management for Decentralized Ledgers
- Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Linus Gasser and Philipp Jovanovic and Ewa Syta and Bryan Ford
-
2018/208 ( PDF )
- TinyKeys: A New Approach to Efficient Multi-Party Computation
- Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
-
2018/207 ( PDF )
- Non-Malleable Codes for Small-Depth Circuits
- Marshall Ball and Dana Dachman-Soled and Siyao Guo and Tal Malkin and Li-Yang Tan
-
2018/206 ( PDF )
- Reading in the Dark: Classifying Encrypted Digits with Functional Encryption
- Edouard Dufour-Sans and Romain Gay and David Pointcheval
-
2018/205 ( PDF )
- Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time
- Thaddeus Dryja and Quanquan C. Liu and Sunoo Park
-
2018/204 ( PDF )
- Short Non-Malleable Codes from Related-Key Secure Block Ciphers
- Serge Fehr and Pierre Karpman and Bart Mennink
-
2018/203 ( PDF )
- Impeccable Circuits
- Anita Aghaie and Amir Moradi and Shahram Rasoolzadeh and Aein Rezaei Shahmirzadi and Falk Schellenberg and Tobias Schneider
-
2018/202 ( PDF )
- Doing Real Work with FHE: The Case of Logistic Regression
- Jack L.H. Crawford and Craig Gentry and Shai Halevi and Daniel Platt and Victor Shoup
-
2018/201 ( PDF )
- Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers
- Jim Basilakis and Bahman Javadi
-
2018/200 ( PDF )
- Hermes. A framework for cryptographically assured access control and data security
- Eugene Pilyankevich and Ignat Korchagin and Andrey Mnatsakanov
-
2018/199 ( PDF )
- Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
- David Derler and Kai Gellert and Tibor Jager and Daniel Slamanig and Christoph Striecks
-
2018/198 ( PDF )
- A Key-recovery Attack on 855-round Trivium
- Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier
-
2018/197 ( PDF )
- Green Mining: toward a less energetic impact of cryptocurrencies
- Philippe Jacquet and Bernard Mans
-
2018/196 ( PDF )
- Non-Profiled Deep Learning-Based Side-Channel Attacks
- Benjamin Timon
-
2018/195 ( PDF )
- Breach-Resistant Structured Encryption
- Ghous Amjad and Seny Kamara and Tarik Moataz
-
2018/194 ( PDF )
- Proofs of Catalytic Space
- Krzysztof Pietrzak
-
2018/193 ( PDF )
- A New Family of Pairing-Friendly elliptic curves
- Michael Scott and Aurore Guillevic
-
2018/192 ( PDF )
- SoK: unraveling Bitcoin smart contracts
- Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino
-
2018/191 ( PDF )
- Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys
- Michael Backes and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider
-
2018/190 ( PDF )
- New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption
- Sikhar Patranabis and Debdeep Mukhopadhyay
-
2018/189 ( PDF )
- Threshold Implementation in Software - Case Study of PRESENT
- Pascal Sasdrich and René Bock and Amir Moradi
-
2018/188 ( PDF )
- Kissing numbers and transference theorems from generalized tail bounds
- Stephen D. Miller and Noah Stephens-Davidowitz
-
2018/187 ( PDF )
- Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model
- Sean Bowe and Ariel Gabizon
-
2018/186 ( PDF )
- RKHD ElGamal signing and 1-way sums
- Daniel R. L. Brown
-
2018/185 ( PDF )
- A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
- Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius M. Silva
-
2018/184 ( PDF )
- Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI
- Yongjun Zhao and Sherman S. M. Chow
-
2018/183 ( PDF )
- Simple Proofs of Sequential Work
- Bram Cohen and Krzysztof Pietrzak
-
2018/182 ( PDF )
- Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES
- Lorenzo Grassi and Christian Rechberger
-
2018/181 ( PDF )
- Rasta: A cipher with low ANDdepth and few ANDs per bit
- Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger
-
2018/180 ( PDF )
- Two-Round Multiparty Secure Computation Minimizing Public Key Operations
- Sanjam Garg and Peihan Miao and Akshayaram Srinivasan
-
2018/179 ( PDF )
- Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations
- Ken Goss and Wei Jiang
-
2018/178 ( -- withdrawn -- )
- --Withdrawn--
-
-
2018/177 ( PDF )
- On the Use of Independent Component Analysis to Denoise Side-Channel Measurements
- Houssem Maghrebi and Emmanuel Prouff
-
2018/176 ( PDF )
- Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability
- Kamil Kluczniak and Man Ho Au
-
2018/175 ( PDF )
- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys
- Vincent Grosso
-
2018/174 ( PDF )
- A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers
- Chen-Dong Ye and Tian Tian
-
2018/173 ( PDF )
- Vectorizing Higher-Order Masking
- Benjamin Grégoire and Kostas Papagiannopoulos and Peter Schwabe and Ko Stoffelen
-
2018/172 ( PDF )
- A First-Order SCA Resistant AES without Fresh Randomness
- Felix Wegener and Amir Moradi
-
2018/171 ( PDF )
- On the Complexity of Simulating Auxiliary Input
- Yi-Hsiu Chen and Kai-Min Chung and Jyun-Jie Liao
-
2018/170 ( PDF )
- On the Ring-LWE and Polynomial-LWE problems
- Miruna Rosca and Damien Stehlé and Alexandre Wallet
-
2018/169 ( PDF )
- Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method
- Srimanta Bhattacharya and Mridul Nandi
-
2018/168 ( PDF )
- Statistical Witness Indistinguishability (and more) in Two Messages
- Yael Tauman Kalai and Dakshita Khurana and Amit Sahai
-
2018/167 ( PDF )
- On the Existence of Three Round Zero-Knowledge Proofs
- Nils Fleischhacker and Vipul Goyal and Abhishek Jain
-
2018/166 ( PDF )
- Optimal Forgeries Against Polynomial-Based MACs and GCM
- Atul Luykx and Bart Preneel
-
2018/165 ( PDF )
- The Wonderful World of Global Random Oracles
- Jan Camenisch and Manu Drijvers and Tommaso Gagliardoni and Anja Lehmann and Gregory Neven
-
2018/164 ( PDF )
- An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
- Pavel Hubáček and Alon Rosen and Margarita Vald
-
2018/163 ( PDF )
- OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
- Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu
-
2018/162 ( PDF )
- Untagging Tor: A Formal Treatment of Onion Encryption
- Jean Paul Degabriele and Martijn Stam
-
2018/161 ( PDF )
- Boomerang Connectivity Table: A New Cryptanalysis Tool
- Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song
-
2018/160 ( PDF )
- DelegaTEE: Brokered Delegation Using Trusted Execution Environments
- Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun
-
2018/159 ( PDF )
- The Missing Difference Problem, and its Applications to Counter Mode Encryption
- Gaëtan Leurent and Ferdinand Sibleyras
-
2018/158 ( PDF )
- Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
- Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin
-
2018/157 ( PDF )
- ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
- Bernardo David and Rafael Dowsley and Mario Larangeira
-
2018/156 ( PDF )
- A New Approach to Black-Box Concurrent Secure Computation
- Sanjam Garg and Susumu Kiyoshima and Omkant Pandey
-
2018/155 ( PDF )
- Memory Lower Bounds of Reductions Revisited
- Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, and Keisuke Tanaka
-
2018/154 ( PDF )
- Constrained PRFs for NC1 in Traditional Groups
- Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
-
2018/153 ( PDF )
- Bootstrapping for Approximate Homomorphic Encryption
- Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song
-
2018/152 ( PDF )
- A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules
- Jung-Keun Lee and Bonwook Koo and Woo-Hwan Kim
-
2018/151 ( PDF )
- Adaptively Secure Garbling with Near Optimal Online Complexity
- Sanjam Garg and Akshayaram Srinivasan
-
2018/150 ( PDF )
- Analysis of Error-Correcting Codes for Lattice-Based Key Exchange
- Tim Fritzmann and Thomas Pöppelmann and Johanna Sepulveda
-
2018/149 ( PDF )
- Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation
- Ilan Komargodski and Eylon Yogev
-
2018/148 ( PDF )
- The Complexity of Multiparty PSM Protocols and Related Models
- Amos Beimel and Eyal Kushilevitz and Pnina Nissim
-
2018/147 ( PDF )
- Sustained Space Complexity
- Joel Alwen and Jeremiah Blocki and Krzysztof Pietrzak
-
2018/146 ( PDF )
- Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices
- Léo Ducas and Cécile Pierrot
-
2018/145 ( PDF )
- Fast Near Collision Attack on the Grain v1 Stream Cipher
- Bin Zhang and Chao Xu and Willi Meier
-
2018/144 ( PDF )
- The Communication Complexity of Private Simultaneous Messages, Revisited
- Benny Applebaum and Thomas Holenstein and Manoj Mishra and Ofer Shayevitz
-
2018/143 ( PDF )
- Conjecturally Superpolynomial Lower Bound for Share Size
- Shahram Khazaei
-
2018/142 ( PDF )
- MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC
- Rui Zong and Xiaoyang Dong
-
2018/141 ( PDF )
- Symbolic security of garbled circuits
- Baiyu Li and Daniele Micciancio
-
2018/140 ( PDF )
- A Reaction Attack on LEDApkc
- Tomas Fabsic and Viliam Hromada and Pavol Zajac
-
2018/139 ( -- withdrawn -- )
- Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth
- Wen-jie Lu and Jun Sakuma
-
2018/138 ( PDF )
- But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
- Christian Badertscher and Juan Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas
-
2018/137 ( PDF )
- Naor-Reingold Goes Public: The Complexity of Known-key Security
- Pratik Soni and Stefano Tessaro
-
2018/136 ( PDF )
- Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
- Priyanka Bose and Viet Tung Hoang and Stefano Tessaro
-
2018/135 ( PDF )
- A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT
- Daniel Jost and Christian Badertscher and Fabio Banfi
-
2018/134 ( PDF )
- A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem
- Ayan Mahalanobis and Vivek Mallick
-
2018/133 ( PDF )
- Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs
- Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu
-
2018/132 ( PDF )
- On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields
- Gora Adj and Omran Ahmadi and Alfred Menezes
-
2018/131 ( PDF )
- Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption
- Ran Canetti and Yilei Chen and Leonid Reyzin and Ron D. Rothblum
-
2018/130 ( PDF )
- SMT-based Cube Attack on Simeck32/64
- Mojtaba Zaheri and Babak Sadeghiyan
-
2018/129 ( PDF )
- Multi-mode Cryptocurrency Systems
- Tuyet Duong and Alexander Chepurnoy and Hong-Sheng Zhou
-
2018/128 ( PDF )
- Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation
- Charanjit S. Jutla
-
2018/127 ( PDF )
- Accountability in Security Protocols
- Robert Künnemann and Deepak Garg and Michael Backes
-
2018/126 ( PDF )
- Onion-AE: Foundations of Nested Encryption
- Phillip Rogaway and Yusi Zhang
-
2018/125 ( PDF )
- Challenges in cyber security - Ransomware Phenomenon
- Pasca Vlad-Raul and Simion Emil
-
2018/124 ( PDF )
- Evaluating the indistinguishability of the XTS mode in the proposed security model
- Nguyen Tuan Anh and Nguyen Bui Cuong
-
2018/123 ( PDF )
- Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
- Howard M. Heys
-
2018/122 ( PDF )
- BitML: A Calculus for Bitcoin Smart Contracts
- Massimo Bartoletti and Roberto Zunino
-
2018/121 ( PDF )
- ECC mod 8^91+5
- Daniel R. L. Brown
-
2018/120 ( PDF )
- Efficient Circuit-based PSI via Cuckoo Hashing
- Benny Pinkas and Thomas Schneider and Christian Weinert and Udi Wieder
-
2018/119 ( PDF )
- Drive-by Key-Extraction Cache Attacks from Portable Code
- Daniel Genkin and Lev Pachmanov and Eran Tromer and Yuval Yarom
-
2018/118 ( PDF )
- Updatable Encryption with Post-Compromise Security
- Anja Lehmann and Bjoern Tackmann
-
2018/117 ( PDF )
- An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
- Shai Halevi and Yuriy Polyakov and Victor Shoup
-
2018/116 ( PDF )
- Unbounded ABE via Bilinear Entropy Expansion, Revisited
- Jie Chen and Junqing Gong and Lucas Kowalczyk and Hoeteck Wee
-
2018/115 ( PDF )
- An Improved Affine Equivalence Algorithm for Random Permutations
- Itai Dinur
-
2018/114 ( PDF )
- Offline Assisted Group Key Exchange
- Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Yao Jiang
-
2018/113 ( PDF )
- Classification of Balanced Quadratic Functions
- Lauren De Meyer and Begül Bilgin
-
2018/112 ( PDF )
- Just in Time Hashing
- Benjamin Harsha and Jeremiah Blocki
-
2018/111 ( PDF )
- MRHS Solver Based on Linear Algebra and Exhaustive Search
- Håvard Raddum and Pavol Zajac
-
2018/110 ( PDF )
- Rank Analysis of Cubic Multivariate Cryptosystems
- John Baena and Daniel Cabarcas and Daniel Escudero and Karan Khathuria and Javier Verbel
-
2018/109 ( PDF )
- NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme
- Soda Diop and Bernard Ousmane Sané and Nafissatou Diarra and Michel Seck
-
2018/108 ( PDF )
- Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
- F. Betül Durak and Serge Vaudenay
-
2018/107 ( PDF )
- Towards Practical Lattice-Based One-Time Linkable Ring Signatures
- Carsten Baum and Huang Lin and Sabine Oechsner
-
2018/106 ( PDF )
- On the Gold Standard for Security of Universal Steganography
- Sebastian Berndt and Maciej Liśkiewicz
-
2018/105 ( PDF )
- Combining Private Set-Intersection with Secure Two-Party Computation
- Michele Ciampi and Claudio Orlandi
-
2018/104 ( PDF )
- PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus
- Yonatan Sompolinsky and Shai Wyborski and Aviv Zohar
-
2018/103 ( PDF )
- Decomposition of Permutations in a Finite Field
- Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
-
2018/102 ( PDF )
- Grafting Trees: a Fault Attack against the SPHINCS framework
- Laurent Castelnovi and Ange Martinelli and Thomas Prest
-
2018/101 ( PDF )
- A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
- Mustafa A. Mustafa and Sara Cleemput and Abdelrahaman Aly and Aysajan Abidin
-
2018/100 ( PDF )
- A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples
- Hart Montgomery
-
2018/099 ( PDF )
- Improved Bounds on the Threshold Gap in Ramp Secret Sharing
- Ignacio Cascudo and Jaron Skovsted Gundersen and Diego Ruano
-
2018/098 ( PDF )
- How to Reveal the Secrets of an Obscure White-Box Implementation
- Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang
-
2018/097 ( PDF )
- Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
- Andrea Visconti and Federico Gorla
-
2018/096 ( PDF )
- Paralysis Proofs: Secure Access-Structure Updates for Cryptocurrencies and More
- Fan Zhang and Philip Daian and Gabriel Kaptchuk and Iddo Bentov and Ian Miers and Ari Juels
-
2018/095 ( PDF )
- Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage
- Cees-Bart Breunesse and Ilya Kizhvatov and Ruben Muijrers and Albert Spruyt
-
2018/094 ( PDF )
- Parameterization of Edwards curves on the rational field Q with given torsion subgroups
- Linh Tung Vo
-
2018/093 ( PDF )
- Statistical Attacks on Cookie Masking for RC4
- Kenneth G. Paterson and Jacob C.N. Schuldt
-
2018/092 ( PDF )
- Constructions of S-boxes with uniform sharing
- Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
-
2018/091 ( PDF )
- Polynomial multiplication over binary finite fields: new upper bounds
- Alessandro De Piccoli and Andrea Visconti and Ottavio Giulio Rizzo
-
2018/090 ( PDF )
- Secure and Scalable Multi-User Searchable Encryption
- Cédric Van Rompay and Refik Molva and Melek Önen
-
2018/089 ( PDF )
- The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
- Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva
-
2018/088 ( PDF )
- Fully homomorphic public-key encryption with small ciphertext size
- Masahiro Yagisawa
-
2018/087 ( PDF )
- (Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
- Alexei Zamyatin and Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Edgar Weippl and William J. Knottenbelt
-
2018/086 ( PDF )
- Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
- Claude Carlet and Xi Chen
-
2018/085 ( PDF )
- Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
- Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin
-
2018/084 ( PDF )
- Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher
- Gideon Samid
-
2018/083 ( PDF )
- Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017
- Maki Yoshida and Satoshi Obana
-
2018/082 ( PDF )
- Synchronized Aggregate Signatures from the RSA Assumption
- Susan Hohenberger and Brent Waters
-
2018/081 ( PDF )
- How to validate the secret of a Ring Learning with Errors (RLWE) key
- Jintai Ding and Saraswathy RV and Saed Alsayigh and Crystal Clough
-
2018/080 ( PDF )
- A Cryptographic Analysis of the WireGuard Protocol
- Benjamin Dowling and Kenneth G. Paterson
-
2018/079 ( PDF )
- Progressive lattice sieving
- Thijs Laarhoven and Artur Mariano
-
2018/078 ( PDF )
- A Systematic Approach To Cryptocurrency Fees
- Alexander Chepurnoy and Vasily Kharin and Dmitry Meshkov
-
2018/077 ( PDF )
- On the Bit Security of Cryptographic Primitives
- Daniele Micciancio and Michael Walter
-
2018/076 ( PDF )
- EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
- Daniel Dinu and Ilya Kizhvatov
-
2018/075 ( PDF )
- MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes
- Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang
-
2018/074 ( PDF )
- Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation
- Miran Kim and Yongsoo Song and Shuang Wang and Yuhou Xia and Xiaoqian Jiang
-
2018/073 ( PDF )
- GAZELLE: A Low Latency Framework for Secure Neural Network Inference
- Chiraag Juvekar and Vinod Vaikuntanathan and Anantha Chandrakasan
-
2018/072 ( PDF )
- Template-based Fault Injection Analysis of Block Ciphers
- Ashrujit Ghoshal and Sikhar Patranabis and Debdeep Mukhopadhyay
-
2018/071 ( PDF )
- SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
- Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas
-
2018/070 ( PDF )
- A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
- Craig Gentry and Adam O'Neill and Leonid Reyzin
-
2018/069 ( PDF )
- Reusing Nonces in Schnorr Signatures
- Marc Beunardeau and Aisling Connolly and Houda Ferradi and Rémi Géraud and David Naccache and Damien Vergnaud
-
2018/068 ( PDF )
- Simple Schnorr Multi-Signatures with Applications to Bitcoin
- Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille
-
2018/067 ( PDF )
- Homomorphic Lower Digits Removal and Improved FHE Bootstrapping
- Hao Chen and Kyoohyung Han
-
2018/066 ( PDF )
- Tweaking Generic OTR to Avoid Forgery Attacks
- Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon-Ho Wong
-
2018/065 ( PDF )
- Non-Locality in Interactive Proofs
- Claude Crépeau and Nan Yang
-
2018/064 ( PDF )
- Systematization Of A 256-Bit Lightweight Block Cipher Marvin
- Sukanya Saha and Krishnendu Rarhi and Abhishek Bhattacharya
-
2018/063 ( PDF )
- The Viability of Post-quantum X.509 Certificates
- Panos Kampanakis and Peter Panburana and Ellie Daw and Daniel Van Geest
-
2018/062 ( PDF )
- Countermeasures against a side-channel attack in a kernel memory
- Na-Young Ahn and Dong Hoon Lee
-
2018/061 ( PDF )
- Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption
- Pratish Datta and Tatsuaki Okamoto and Junichi Tomida
-
2018/060 ( PDF )
- A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks
- Abhinav Aggarwal and Yue Guo
-
2018/059 ( PDF )
- New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
- Chen-Dong Ye and Tian Tian
-
2018/058 ( PDF )
- Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters
- Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
-
2018/057 ( PDF )
- Efficient Noninteractive Certification of RSA Moduli and Beyond
- Sharon Goldberg and Leonid Reyzin and Omar Sagga and Foteini Baldimtsi
-
2018/056 ( PDF )
- SETLA: Signature and Encryption from Lattices
- François Gérard and Keno Merckx
-
2018/055 ( PDF )
- High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction
- Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht and Georg Sigl
-
2018/054 ( PDF )
- More Efficient (Almost) Tightly Secure Structure-Preserving Signatures
- Romain Gay and Dennis Hofheinz and Lisa Kohl and Jiaxin Pan
-
2018/053 ( PDF )
- Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
- Emmanuel Prouff and Remi Strullu and Ryad Benadjila and Eleonora Cagli and Cecile Dumas
-
2018/052 ( PDF )
- Optimizing Trees for Static Searchable Encryption
- Mohammad Etemad and Mohammad Mahmoody and David Evans
-
2018/051 ( PDF )
- Semantic Security Invariance under Variant Computational Assumptions
- Eftychios Theodorakis and John C. Mitchell
-
2018/050 ( PDF )
- A Constructive Perspective on Signcryption Security
- Christian Badertscher and Fabio Banfi and Ueli Maurer
-
2018/049 ( PDF )
- Attacks and Countermeasures for White-box Designs
- Alex Biryukov and Aleksei Udovenko
-
2018/048 ( PDF )
- Impossible Differential Cryptanalysis on Deoxys-BC-256
- Alireza mehrdad and Farokhlagha Moazami and Hadi Soleimany
-
2018/047 ( PDF )
- The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
- Boris Ryabko and Aleksandr Soskov
-
2018/046 ( PDF )
- Scalable, transparent, and post-quantum secure computational integrity
- Eli Ben-Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev
-
2018/045 ( PDF )
- Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials
- Jonathan Bootle and Jens Groth
-
2018/044 ( PDF )
- Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem
- Tadanori Teruya and Kenji Kashiwabara and Goichiro Hanaoka
-
2018/043 ( PDF )
- Efficient Adaptively Secure Zero-knowledge from Garbled Circuits
- Chaya Ganesh and Yashvanth Kondi and Arpita Patra and Pratik Sarkar
-
2018/042 ( PDF )
- Improved (Almost) Tightly-Secure Structure-Preserving Signatures
- Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy
-
2018/041 ( PDF )
- Related Randomness Security for Public Key Encryption, Revisited
- Takahiro Matsuda and Jacob C.N. Schuldt
-
2018/040 ( PDF )
- An Analysis of Acceptance Policies For Blockchain Transactions
- Seb Neumayer and Mayank Varia and Ittay Eyal
-
2018/039 ( PDF )
- Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography
- Gregor Seiler
-
2018/038 ( PDF )
- On the Message Complexity of Secure Multiparty Computation
- Yuval Ishai and Manika Mittal and Rafail Ostrovsky
-
2018/037 ( PDF )
- Weakly Secure Equivalence-Class Signatures from Standard Assumptions
- Georg Fuchsbauer and Romain Gay
-
2018/036 ( PDF )
- Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs
- Peter Scholl
-
2018/035 ( PDF )
- A Linearly Homomorphic Signature Scheme From Weaker Assumptions
- Lucas Schabhüser and Johannes Buchmann and Patrick Struck
-
2018/034 ( PDF )
- Constant-size Group Signatures from Lattices
- San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
-
2018/033 ( PDF )
- Two-Factor Password-Authenticated Key Exchange with End-to-End Password Security
- Stanislaw Jarecki and Mohammed Jubur and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena
-
2018/032 ( -- withdrawn -- )
- Publicly Verifiable Proofs of Space
- Markus Jakobsson
-
2018/031 ( PDF )
- Secure Remote Attestation
- Markus Jakobsson
-
2018/030 ( PDF )
- Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
- Lin Lyu and Shengli Liu and Shuai Han and Dawu Gu
-
2018/029 ( PDF )
- Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
- Johannes Blömer and Fabian Eidens and Jakob Juhnke
-
2018/028 ( PDF )
- Compact Energy and Delay-Aware Authentication
- Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz
-
2018/027 ( PDF )
- A verifiable shuffle for the GSW cryptosystem
- Martin Strand
-
2018/026 ( PDF )
- Zero-Knowledge Proof of Decryption for FHE Ciphertexts
- Christopher Carr and Anamaria Costache and Gareth T. Davies and Kristian Gjøsteen and Martin Strand
-
2018/025 ( PDF )
- Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures
- Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li
-
2018/024 ( PDF )
- KEM Combiners
- Federico Giacon and Felix Heuer and Bertram Poettering
-
2018/023 ( PDF )
- Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups
- Benedikt Auerbach and Mihir Bellare and Eike Kiltz
-
2018/022 ( PDF )
- Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
- Ali El Kaafarani and Shuichi Katsumata
-
2018/021 ( PDF )
- Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography
- Yu Chen and Baodong Qin and Haiyang Xue
-
2018/020 ( PDF )
- Ciphertext-Only Attacks against Compact-LWE Submitted to NIST PQC Project
- Haoyu Li and Renzhang Liu and Yanbin Pan and Tianyuan Xie
-
2018/019 ( PDF )
- Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
- Daniel P. Martin and Luke Mather and Elisabeth Oswald
-
2018/018 ( PDF )
- Multi-Key Searchable Encryption, Revisited
- Ariel Hamlin and abhi shelat and Mor Weiss and Daniel Wichs
-
2018/017 ( PDF )
- Verifiability of Helios Mixnet
- Ben Smyth
-
2018/016 ( PDF )
- New Techniques for Public Key Encryption with Sender Recovery
- Murali Godi and Roopa Vishwanathan
-
2018/015 ( PDF )
- On Composable Security for Digital Signatures
- Christian Badertscher and Ueli Maurer and Björn Tackmann
-
2018/014 ( PDF )
- Ubiquitous Weak-key Classes of BRW-polynomial Function
- Kaiyan Zheng and Peng Wang and Dingfeng Ye
-
2018/013 ( PDF )
- Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
- Benedikt Auerbach and Bertram Poettering
-
2018/012 ( PDF )
- An Inside Job: Remote Power Analysis Attacks on FPGAs
- Falk Schellenberg and Dennis R.E. Gnad and Amir Moradi and Mehdi B. Tahoori
-
2018/011 ( PDF )
- Graded Encoding Schemes from Obfuscation
- Pooya Farshim and Julia Hesse and Dennis Hofheinz and Enrique Larraia
-
2018/010 ( PDF )
- Interactively Secure Groups from Obfuscation
- Thomas Agrikola and Dennis Hofheinz
-
2018/009 ( PDF )
- Evaluation of Resilience of randomized RNS implementation
- Jérôme Courtois and Lokman Abbas-Turki and Jean-Claude Bajard
-
2018/008 ( PDF )
- Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
- Yu-Ao Chen and Xiao-Shan Gao
-
2018/007 ( PDF )
- An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks
- Qiong Huang and Hongbo Li
-
2018/006 ( PDF )
- Higher Order Side-Channel Attacks Resilient S-boxes
- Liran Lerman and Stjepan Picek and Nikita Veshchikov and Olivier Markowitch
-
2018/005 ( PDF )
- Simple and Efficient Two-Server ORAM
- S. Dov Gordon and Jonathan Katz and Xiao Wang
-
2018/004 ( PDF )
- On the Performance of Convolutional Neural Networks for Side-channel Analysis
- Stjepan Picek and Ioannis Petros Samiotis and Annelie Heuser and Jaehun Kim and Shivam Bhasin and Axel Legay
-
2018/003 ( PDF )
- How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
- Moni Naor and Benny Pinkas and Eyal Ronen
-
2018/002 ( PDF )
- The Multiplicative Complexity of 6-variable Boolean Functions
- Cagdas Calik and Meltem Sonmez Turan and Rene Peralta
-
2018/001 ( PDF )
- On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate
- Benny Applebaum and Barak Arkis
[ Cryptology ePrint archive ]