Cryptology ePrint Archive: Listing for 2018

2018/1251 ( PDF )
Accountable Tracing Signatures from Lattices
San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
2018/1250 ( PDF )
Function Private Predicate Encryption for Low Min-Entropy Predicates
Sikhar Patranabis and Debdeep Mukhopadhyay and Somindu C. Ramanna
2018/1249 ( PDF )
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations
NingBo Li and TanPing Zhou and XiaoYuan Yang and YiLiang Han and Longfei Liu and WenChao Liu
2018/1248 ( PDF )
Fiat-Shamir: From Practice to Theory, Part II (NIZK and Correlation Intractability from Circular-Secure FHE)
Ran Canetti and Alex Lombardi and Daniel Wichs
2018/1247 ( PDF )
qSCMS: Post-quantum certificate provisioning process for V2X
Paulo S. L. M. Barreto and Jefferson E. Ricardini and Marcos A. Simplicio Jr. and Harsh Kupwade Patil
2018/1246 ( PDF )
Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution
Dat Le Tien and Frank Eliassen
2018/1245 ( PDF )
Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics
Jung Hee Cheon and Andrey Kim and Donggeon Yhee
2018/1244 ( PDF )
Fully Deniable Interactive Encryption
Ran Canetti and Sunoo Park and Oxana Poburinnaya
2018/1243 ( -- withdrawn -- )
BoxDB: Realistic Adversary Model for Distance Bounding
Ioana Boureanu and David Gerault and Pascal Lafourcade
2018/1242 ( PDF )
Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions
Nicolas T. Courtois
2018/1241 ( PDF )
Universally Composable Accumulators
Foteini Baldimtsi and Ran Canetti and Sophia Yakoubov
2018/1240 ( -- withdrawn -- )
Jevil's Encryption Systems
Nadim Kobeissi
2018/1239 ( PDF )
Proof-of-Stake Sidechains
Peter Gaži and Aggelos Kiayias and Dionysis Zindros
2018/1238 ( PDF )
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform
Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi
2018/1237 ( PDF )
Sum-of-Squares Meets Program Obfuscation, Revisited
Boaz Barak and Samuel B. Hopkins and Aayush Jain and Pravesh Kothari and Amit Sahai
2018/1236 ( PDF )
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks
Mark Abspoel and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede
2018/1235 ( PDF )
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free
Adi Akavia and Craig Gentry and Shai Halevi and Max Leibovich
2018/1234 ( PDF )
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers
Raymond K. Zhao and Ron Steinfeld and Amin Sakzad
2018/1233 ( PDF )
Key Assignment Scheme with Authenticated Encryption
Suyash Kandele and Souradyuti Paul
2018/1232 ( PDF )
Certificate Transparency Using Blockchain
D S V Madala and Mahabir Prasad Jhanwar and Anupam Chattopadhyay
2018/1231 ( PDF )
Post-quantum verifiable random functions from ring signatures
Endre Abraham
2018/1230 ( PDF )
Pooled Mining Makes Selfish Mining Tricky
Suhyeon Lee and Seungjoo Kim
2018/1229 ( PDF )
On Some Computational Problems in Local Fields
Yingpu Deng, Lixia Luo and Guanju Xiao
2018/1228 ( -- withdrawn -- )
Multi-Party Oblivious RAM based on Function Secret Sharing and Replicated Secret Sharing Arithmetic
Marina Blanton and Chen Yuan
2018/1227 ( PDF )
Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation
Louis Cianciullo and Hossein Ghodosi
2018/1226 ( PDF )
Boolean Exponent Splitting
Michael Tunstall and Louiza Papachristodoulou and Kostas Papagiannopoulos
2018/1225 ( PDF )
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
Wen Wang and Bernhard Jungk and Julian Wälde and Shuwen Deng and Naina Gupta and Jakub Szefer and Ruben Niederhagen
2018/1224 ( PDF )
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups
Essam Ghadafi
2018/1223 ( PDF )
Error Amplification in Code-based Cryptography
Alexander Nilsson and Thomas Johansson and Paul Stankovski Wagner
2018/1222 ( PDF )
Implementing Token-Based Obfuscation under (Ring) LWE
Cheng Chen and Nicholas Genise and Daniele Micciancio and Yuriy Polyakov and Kurt Rohloff
2018/1221 ( PDF )
Using the Cloud to Determine Key Strengths -- Triennial Update
M. Delcourt and T. Kleinjung and A.K. Lenstra and S. Nath and D. Page and N. Smart
2018/1220 ( PDF )
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model
Taiga Mizuide and Atsushi Takayasu and Tsuyoshi Takagi
2018/1219 ( PDF )
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property
Tomer Ashur and Raluca Posteuca
2018/1218 ( PDF )
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications
Dan Boneh and Yuval Ishai and Alain Passelègue and Amit Sahai and David J. Wu
2018/1217 ( PDF )
Changing Points in APN Functions
Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nikolay Kaleyski
2018/1216 ( PDF )
This is Not an Attack on Wave
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2018/1215 ( PDF )
New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves
Suhri Kim and Kisoon Yoon and Jihoon Kwon and Young-Ho Park and Seokhie Hong
2018/1214 ( PDF )
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
Joohee Lee and Dongwoo Kim and Duhyeong Kim and Yongsoo Song and Junbum Shin and Jung Hee Cheon
2018/1213 ( PDF )
Deep Learning vs Template Attacks in front of fundamental targets: experimental study
Yevhenii ZOTKIN and Francis OLIVIER and Eric BOURBAO
2018/1212 ( PDF )
Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols
Itai Dinur and Niv Nadler
2018/1211 ( PDF )
Countering Block Withholding Attack Effciently
Suhyeon Lee and Seungjoo Kim
2018/1210 ( PDF )
MProve: A Proof of Reserves Protocol for Monero Exchanges
Arijit Dutta and Saravanan Vijayakumaran
2018/1209 ( PDF )
Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security
Min Liang
2018/1208 ( PDF )
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications
Jun Xu and Santanu Sarkar and Lei Hu
2018/1207 ( PDF )
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders
Nicolas Sendrier and Valentin Vasseur
2018/1206 ( PDF )
ARPA Whitepaper
Derek Zhang and Alex Su and Felix Xu and Jiang Chen
2018/1205 ( PDF )
Cryptanalysis of a code-based one-time signature
Jean-Christophe Deneuville and Philippe Gaborit
2018/1204 ( PDF )
The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
Antonis Michalas
2018/1203 ( PDF )
DAGS: Reloaded Revisiting Dyadic Key Encapsulation
Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre-Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thiecoumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane N'diaye and Duc Tri Nguyen and Edoardo Persichetti and Jefferson E. Ricardini
2018/1202 ( PDF )
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
Jihye Kim and Jiwon Lee and Hankyung Ko and Donghwan Oh and Semin Han and Kwonho Jeong and Hyunok Oh
2018/1201 ( PDF )
Subversion in Practice: How to Efficiently Undermine Signatures
Joonsang Baek and Willy Susilo and Jongkil Kim and Yang-Wai Chow
2018/1200 ( PDF )
On a Rank-Metric Code-Based Cryptosystem with Small Key Size
Julian Renner and Sven Puchinger and Antonia Wachter-Zeh
2018/1199 ( PDF )
Quantum Equivalence of the DLP and CDHP for Group Actions
Steven Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren
2018/1198 ( PDF )
On Lions and Elligators: An efficient constant-time implementation of CSIDH
Michael Meyer and Fabio Campos and Steffen Reith
2018/1197 ( PDF )
Automated software protection for the masses against side-channel attacks
2018/1196 ( PDF )
Gradient Visualization for General Characterization in Profiling Attacks
Loïc Masure and Cécile Dumas and Emmanuel Prouff
2018/1195 ( PDF )
M&M: Masks and Macs against Physical Attacks
Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2018/1194 ( PDF )
On Degree-d Zero-Sum Sets of Full Rank
Christof Beierle and Alex Biryukov and Aleksei Udovenko
2018/1193 ( PDF )
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers
Gembu Ito and Akinori Hosoyamada and Ryutaroh Matsumoto and Yu Sasaki and Tetsu Iwata
2018/1192 ( PDF )
Durandal: a rank metric based signature scheme
Nicolas Aragon and Olivier Blazy and Philippe Gaborit and Adrien Hauteville and Gilles Zémor
2018/1191 ( PDF )
Cryptanalysis of 2-round KECCAK-384
Rajendra Kumar and Nikhil Mittal and Shashank Singh
2018/1190 ( PDF )
Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)
Sanjit Chatterjee and Sayantan Mukherjee
2018/1189 ( PDF )
The Role of the Adversary Model in Applied Security Research
Quang Do and Ben Martini and Kim-Kwang Raymond Choo
2018/1188 ( PDF )
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
Dan Boneh and Benedikt Bünz and Ben Fisch
2018/1187 ( PDF )
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version)
Kai Hu and Meiqin Wang
2018/1186 ( PDF )
MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets
Senpeng Wang and Bin Hu and Jie Guan and Kai Zhang and Tairong Shi
2018/1185 ( PDF )
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
Gorjan Alagic and Stacey Jeffery and Maris Ozols and Alexander Poremba
2018/1184 ( PDF )
Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity
Nasser Alsalami and Bingsheng Zhang
2018/1183 ( PDF )
Lossy Trapdoor Permutations with Improved Lossiness
Benedikt Auerbach and Eike Kiltz and Bertram Poettering and Stefan Schoenen
2018/1182 ( -- withdrawn -- )
Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes
Fangguo Zhang and Zhuoran Zhang
2018/1181 ( PDF )
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe
Christian Wittke and Ievgen Kabin and Dan Klann and Zoya Dyka and Anton Datsuk and Peter Langendoerfer
2018/1180 ( PDF )
Lattice-Based Signature from Key Consensus
Leixiao Cheng and Boru Gong and Yunlei Zhao
2018/1179 ( PDF )
Elliptic Curves in Generalized Huff's Model
Ronal Pranil Chand and Maheswara Rao Valluri
2018/1178 ( PDF )
Pseudo-Free Families of Computational Universal Algebras
Mikhail Anokhin
2018/1177 ( PDF )
Excalibur Key-Generation Protocols For DAG Hierarchic Decryption
Louis Goubin and Geraldine Monsalve and Juan Reutter and Francisco Vial Prado
2018/1176 ( PDF )
Downgradable Identity-based Encryption and Applications
Olivier Blazy and Paul Germouty and Duong Hieu Phan
2018/1175 ( PDF )
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Ravishankar Borgaonkar and Lucca Hirschi and Shinjo Park and Altaf Shaik
2018/1174 ( PDF )
A Comparison of NTRU Variants
John M. Schanck
2018/1173 ( PDF )
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
Eyal Ronen and Robert Gillham and Daniel Genkin and Adi Shamir and David Wong and Yuval Yarom
2018/1172 ( PDF )
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
Jan-Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede
2018/1171 ( PDF )
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion
Chenglu Jin and Marten van Dijk and Michael K. Reiter and Haibin Zhang
2018/1170 ( PDF )
Toward RSA-OAEP without Random Oracles
Nairen Cao and Adam O'Neill and Mohammad Zaheri
2018/1169 ( PDF )
Placing Conditional Disclosure of Secrets in the Communication Complexity Universe
Benny Applebaum and Prashant Nalini Vasudevan
2018/1168 ( PDF )
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Shangqi Lai and Sikhar Patranabis and Amin Sakzad and Joseph K. Liu and Debdeep Mukhopadhyay and Ron Steinfeld and Shi-Feng Sun and Dongxi Liu and Cong Zuo
2018/1167 ( PDF )
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission
Ravi Kishore and Ashutosh Kumar and Chiranjeevi Vanarasa and Kannan Srinathan
2018/1166 ( PDF )
Keeping Time-Release Secrets through Smart Contracts
Jianting Ning and Hung Dang and Ruomu Hou and Ee-Chien Chang
2018/1165 ( PDF )
Identity-Concealed Authenticated Encryption and Key Exchange
Yunlei Zhao
2018/1164 ( PDF )
Can you sign a quantum state
Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz
2018/1163 ( PDF )
More on sliding right
Joachim Breitner
2018/1162 ( PDF )
On the Concrete Security of Goldreich’s Pseudorandom Generator
Geoffroy Couteau and Aurélien Dupin and Pierrick Méaux and Mélissa Rossi and Yann Rotella
2018/1161 ( PDF )
Adaptively Secure MPC with Sublinear Communication Complexity
Ran Cohen and abhi shelat and Daniel Wichs
2018/1160 ( PDF )
Algebraic normal form of a bent function: properties and restrictions
Natalia Tokareva
2018/1159 ( PDF )
Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions
Sihem Mesnager and Kwang Ho Kim and Myong Song Jo
2018/1158 ( PDF )
Adversarially Robust Property Preserving Hash Functions
Elette Boyle and Rio LaVigne and Vinod Vaikuntanathan
2018/1157 ( PDF )
Special Soundness Revisited
Douglas Wikström
2018/1156 ( PDF )
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS
Eunkyung Kim and Hyang-Sook Lee and Jeongeun Park
2018/1155 ( PDF )
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption
Pedro Branco and Jintai Ding and Manuel Goulão and Paulo Mateus
2018/1154 ( PDF )
Leakage Resilient Secret Sharing and Applications
Akshayaram Srinivasan and Prashant Nalini Vasudevan
2018/1153 ( PDF )
Dfinity Consensus, Explored
Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren
2018/1152 ( PDF )
Improvements of Blockchain’s Block Broadcasting:An Incentive Approach
Qingzhao Zhang and Yijun Leng and Lei Fan
2018/1151 ( PDF )
Analysis Of The Simulatability Of An Oblivious Transfer
Bing Zeng
2018/1150 ( PDF )
Quantum-secure message authentication via blind-unforgeability
Gorjan Alagic and Christian Majenz and Alexander Russell and Fang Song
2018/1149 ( PDF )
Compressive Sensing based Leakage Sampling and Reconstruction: A First Study
Changhai Ou and Chengju Zhou and Siew-Kei Lam
2018/1148 ( PDF )
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token
Mirosław Kutyłowski and Lucjan Hanzlik and Kamil Kluczniak
2018/1147 ( PDF )
Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures
Divesh Aggarwal and Ivan Damgard and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto and Joao Ribeiro and Mark Simkin
2018/1146 ( -- withdrawn -- )
Functional Analysis Attacks on Logic Locking
Deepak Sirone and Pramod Subramanyan
2018/1145 ( PDF )
Privacy Computing: Concept, Computing Framework And Future Development Trends
Fenghua Li and Hui Li and Ben Niu and Jinjun Chen
2018/1144 ( PDF )
Revisiting Non-Malleable Secret Sharing
Saikrishna Badrinarayanan and Akshayaram Srinivasan
2018/1143 ( PDF )
A new SNOW stream cipher called SNOW-V
Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang
2018/1142 ( PDF )
Factoring Products of Braids via Garside Normal Form
Simon-Philipp Merz and Christophe Petit
2018/1141 ( PDF )
Fast Authentication from Aggregate Signatures with Improved Security
Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz
2018/1140 ( PDF )
Efficient Fully-Leakage Resilient One-More Signature Schemes
Antonio Faonio
2018/1139 ( PDF )
Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications
Kexin Hu and Zhenfeng Zhang and Kaiven Guo
2018/1138 ( PDF )
Leakage-Resilient Secret Sharing
Ashutosh Kumar and Raghu Meka and Amit Sahai
2018/1137 ( PDF )
Genus 2 curves with given split Jacobian
Jasper Scholten
2018/1136 ( PDF )
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model
S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan
2018/1135 ( PDF )
PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains
Sébastien Andreina and Jens-Matthias Bohli and Ghassan O. Karame and Wenting Li and Giorgia Azzurra Marson
2018/1134 ( PDF )
Echoes of the Past: Recovering Blockchain Metrics From Merged Mining
Nicholas Stifter and Philipp Schindler and Aljosha Judmayer and Alexei Zamyatin and Andreas Kern and Edgar Weippl
2018/1133 ( PDF )
A Public Key Exchange Cryptosystem Based on Ideal Secrecy
Vamshi Krishna Kammadanam and Virendra R. Sule and Yi Hong
2018/1132 ( PDF )
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake
Thomas Kerber and Markulf Kohlweiss and Aggelos Kiayias and Vassilis Zikas
2018/1131 ( PDF )
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Arinjita Paul and Varshika Srinivasavaradhan and S. Sharmila Deva Selvi and C. Pandu Rangan
2018/1130 ( PDF )
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
Ashwin Jha and Mridul Nandi
2018/1129 ( PDF )
On Kilian's Randomization of Multilinear Map Encodings
Jean-Sebastien Coron and Hilder V. L. Pereira
2018/1128 ( PDF )
Direct Anonymous Attestation with Optimal TPM Signing Efficiency
Kang Yang and Liqun Chen and Zhenfeng Zhang and Christopher J.P. Newton and Bo Yang and Li Xi
2018/1127 ( PDF )
Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks
P. Arun Babu and Jithin Jose Thomas
2018/1126 ( PDF )
Lightweight AE and HASH in a Single Round Function
Dingfeng Ye and Danping Shi and Peng Wang
2018/1125 ( PDF )
Verifying liquidity of Bitcoin contracts
Massimo Bartoletti and Roberto Zunino
2018/1124 ( PDF )
Secure Opportunistic Multipath Key Exchange
Sergiu Costea and Marios O. Choudary and Doru Gucea and Björn Tackmann and Costin Raiciu
2018/1123 ( PDF )
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
Stjepan Picek and Annelie Heuser and Lichao Wu and Cesare Alippi and Francesco Regazzoni
2018/1122 ( PDF )
Improved Quantum Multicollision-Finding Algorithm
Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa
2018/1121 ( PDF )
An Analysis of the ProtonMail Cryptographic Architecture
Nadim Kobeissi
2018/1120 ( PDF )
Organizational Cryptography for Access Control
Masahito Gotaishi and Shigeo Tsujii
2018/1119 ( PDF )
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
Matthias Fitzi and Peter Ga{ž}i and Aggelos Kiayias and Alexander Russell
2018/1118 ( PDF )
Non-Interactive Non-Malleability from Quantum Supremacy
Yael Tauman Kalai and Dakshita Khurana
2018/1117 ( PDF )
A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness
Felix Wegener and Amir Moradi
2018/1116 ( PDF )
Fly, you fool! Faster Frodo for the ARM Cortex-M4
Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam
2018/1115 ( PDF )
Group Signature without Random Oracles from Randomizable Signatures
Remi Clarisse and Olivier Sanders
2018/1114 ( PDF )
Lightweight Circuits with Shift and Swap
Subhadeep Banik and Francesco Regazzoni and Serge Vaudenay
2018/1113 ( PDF )
Private Function Evaluation with Cards
Alexander Koch and Stefan Walzer
2018/1112 ( PDF )
DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm
Tai-Yuan Chen and Wei-Ning Huang and Po-Chun Kuo and Hao Chung and Tzu-Wei Chao
2018/1111 ( -- withdrawn -- )
Cryptanalysis of the Wave Signature Scheme
Paulo S. L. M. Barreto and Edoardo Persichetti
2018/1110 ( PDF )
Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies
Dominic Deuber and Nico Döttling and Bernardo Magri and Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan
2018/1109 ( PDF )
Faster SeaSign signatures through improved rejection sampling
Thomas Decru and Lorenz Panny and Frederik Vercauteren
2018/1108 ( PDF )
Covert Security with Public Verifiability: Faster, Leaner, and Simpler
Cheng Hong and Jonathan Katz and Vladimir Kolesnikov and Wen-jie Lu and Xiao Wang
2018/1107 ( PDF )
Further observations on SIMON and SPECK families of block ciphers
S. M. Dehnavi
2018/1106 ( PDF )
P4TC—Provably-Secure yet Practical Privacy-Preserving Toll Collection
Valerie Fetzer and Max Hoffmann and Matthias Nagel and Andy Rupp and Rebecca Schwerdt
2018/1105 ( PDF )
Proof-of-Stake Protocols for Privacy-Aware Blockchains
Chaya Ganesh and Claudio Orlandi and Daniel Tschudi
2018/1104 ( PDF )
Tropical cryptography II: extensions by homomorphisms
Dima Grigoriev and Vladimir Shpilrain
2018/1103 ( PDF )
Some Properties of Modular Addition
Victoria Vysotskaya
2018/1102 ( PDF )
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing
Mohammad Ali and Javad Mohajeri and Mohammad-Reza Sadeghi
2018/1101 ( PDF )
Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments
Lunzhi Deng
2018/1100 ( PDF )
Correction to "Improving the DGK comparison protocol"
Thijs Veugen
2018/1099 ( PDF )
SoK: Modular and Efficient Private Decision Tree Evaluation
Ágnes Kiss and Masoud Naderpour and Jian Liu and N. Asokan and Thomas Schneider
2018/1098 ( PDF )
MARVELlous: a STARK-Friendly Family of Cryptographic Primitives
Tomer Ashur and Siemen Dhooghe
2018/1097 ( PDF )
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
Michael Schliep and Nicholas Hopper
2018/1096 ( PDF )
On Finding Quantum Multi-collisions
Qipeng Liu and Mark Zhandry
2018/1095 ( PDF )
Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security
Wen-Ran Zhang
2018/1094 ( PDF )
Match Me if You Can: Matchmaking Encryption and its Applications
Giuseppe Ateniese and Danilo Francati and David Nuñez and Daniele Venturi
2018/1093 ( PDF )
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima
2018/1092 ( PDF )
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
Felix Wegener and Christian Baiker and Amir Moradi
2018/1091 ( PDF )
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
Keisuke Hara and Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka
2018/1090 ( PDF )
Plaintext Recovery Attack of OCB2
Tetsu Iwata
2018/1089 ( PDF )
On the impact of decryption failures on the security of LWE/LWR based schemes
Jan-Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede
2018/1088 ( PDF )
High-speed Side-channel-protected Encryption and Authentication in Hardware
Nele Mentens and Vojtech Miskovsky and Martin Novotny and Jo Vliegen
2018/1087 ( PDF )
Breaking the confidentiality of OCB2
Bertram Poettering
2018/1086 ( PDF )
Two Party Distribution Testing: Communication and Security
Alexandr Andoni and Tal Malkin and Negev Shekel Nosatzki
2018/1085 ( PDF )
Exact maximum expected differential and linear probability for 2-round Kuznyechik
Vitaly Kiryukhin
2018/1084 ( PDF )
A Deep Dive into Blockchain Selfish Mining
Qianlan Bai and Xinyan Zhou and Xing Wang and Yuedong Xu and Xin Wang and Qingsheng Kong
2018/1083 ( PDF )
Private Stateful Information Retrieval
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2018/1082 ( PDF )
An Algebraic Method to Recover Superpolies in Cube Attacks
Chen-Dong Ye and Tian Tian
2018/1081 ( PDF )
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
Jung Hee Cheon and Wonhee Cho and Minki Hhan and Jiseung Kim and Changmin Lee
2018/1080 ( PDF )
How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation
Yiwen Gao and Yongbin Zhou and Wei Cheng
2018/1079 ( PDF )
Analysis of Deterministic Longest-Chain Protocols
Elaine Shi
2018/1078 ( PDF )
Two Round Information-Theoretic MPC with Malicious Security
Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
2018/1077 ( PDF )
More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers
Hart Montgomery
2018/1076 ( PDF )
Game Theoretic Notions of Fairness in Multi-Party Coin Toss
Kai-Min Chung and Yue Guo and Wei-Kai Lin and Rafael Pass and Elaine Shi
2018/1075 ( -- withdrawn -- )
Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES
Jannis Bossert and Eik List and Stefan Lucks
2018/1074 ( PDF )
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
Felix Wegener and Amir Moradi
2018/1073 ( PDF )
Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping
Jung Hee Cheon and Kyoohyung Han and Minki Hhan
2018/1072 ( PDF )
Construction of MDS Matrices from Generalized Feistel Structures
Mahdi Sajadieh and Mohsen Mousavi
2018/1071 ( PDF )
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar
2018/1070 ( PDF )
A New Batch FHE Scheme over the Integers
Kwak Wi Song and Kim Chol Un
2018/1069 ( PDF )
Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering
Eshan Chattopadhyay and Xin Li
2018/1068 ( PDF )
Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience
Dana Dachman-Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi
2018/1067 ( PDF )
On Quantum Slide Attacks
Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher
2018/1066 ( PDF )
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness
Akinori Hosoyamada and Takashi Yamakawa
2018/1065 ( PDF )
Homomorphic Secret Sharing for Low Degree Polynomials
Russell W. F. Lai and Giulio Malavolta and Dominique Schröder
2018/1064 ( PDF )
Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction
Nithyashankari Gummidipoondi Jayasankaran and Adriana Sanabria Borbon and Edgar Sanchez-Sinencio and Jiang Hu and Jeyavijayan Rajendran
2018/1063 ( PDF )
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
Mashael AlSabah and Gabriele Oligeri and Ryan Riley
2018/1062 ( PDF )
DAGsim: Simulation of DAG-based distributed ledger protocols
Manuel Zander and Tom Waite and Dominik Harz
2018/1061 ( PDF )
On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks
Behnam Zahednejad and Majid Bayat and Ashok Kumar Das
2018/1060 ( PDF )
Port Contention for Fun and Profit
Alejandro Cabrera Aldaya and Billy Bob Brumley and Sohaib ul Hassan and Cesar Pereida García and Nicola Tuveri
2018/1059 ( PDF )
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
Daniel J. Bernstein and Tanja Lange and Chloe Martindale and Lorenz Panny
2018/1058 ( PDF )
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Yuzhao Cui and Qiong Huang and Jianye Huang and Hongbo Li and Guomin Yang
2018/1057 ( PDF )
Limiting the impact of unreliable randomness in deployed security protocols
Liliya Akhmetzyanova and Cas Cremers and Luke Garratt and Stanislav V. Smyshlyaev and Nick Sullivan
2018/1056 ( PDF )
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs
Ahmad Al Badawi and Jin Chao and Jie Lin and Chan Fook Mun and Jun Jie Sim and Benjamin Hong Meng Tan and Xiao Nan and Khin Mi Mi Aung and Vijay Ramaseshan Chandrasekhar
2018/1055 ( PDF )
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation
Pan Dongxue and Li Hongda and Ni Peifang
2018/1054 ( PDF )
Efficient Multi-key FHE with short extended ciphertexts and less public parameters
Tanping Zhou and Ningbo Li and Xiaoyuan Yang and Yiliang Han and Wenchao Liu
2018/1053 ( PDF )
Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation
Jothi Rangasamy and Lakshmi Kuppusamy
2018/1052 ( PDF )
Verifiability Analysis of CHVote
David Bernhard and Véronique Cortier and Pierrick Gaudry and Mathieu Turuani and Bogdan Warinschi
2018/1051 ( PDF )
Lower Bounds for Differentially Private RAMs
Giuseppe Persiano and Kevin Yeo
2018/1050 ( PDF )
Towards Automatically Penalizing Multimedia Breaches
Easwar Vivek Mangipudi and Krutarth Rao and Jeremy Clark and Aniket Kate
2018/1049 ( PDF )
Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol
Aggelos Kiayias and Alexander Russell
2018/1048 ( PDF )
Proof-of-Work Sidechains
Aggelos Kiayias and Dionysis Zindros
2018/1047 ( PDF )
On the Linear Transformation in White-box Cryptography
Seungkwang Lee and Nam-su Jho and Myungchul Kim
2018/1046 ( PDF )
Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$
Claude Carlet and Xi Chen* and Longjiang Qu
2018/1045 ( PDF )
MPC Joins the Dark Side
John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui
2018/1044 ( PDF )
Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions
Masahito Ishizaka and Kanta Matsuura
2018/1043 ( PDF )
Improved Bootstrapping for Approximate Homomorphic Encryption
Hao Chen and Ilaria Chillotti and Yongsoo Song
2018/1042 ( PDF )
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
Brice Colombier and Alexandre Menu and Jean-Max Dutertre and Pierre-Alain Moëllic and Jean-Baptiste Rigaud and Jean-Luc Danger
2018/1041 ( PDF )
Secure Outsourced Matrix Computation and Application to Neural Networks
Xiaoqian Jiang and Miran Kim and Kristin Lauter and Yongsoo Song
2018/1040 ( PDF )
Cryptanalysis of OCB2
Akiko Inoue and Kazuhiko Minematsu
2018/1039 ( PDF )
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
Georg Fuchsbauer and Michele Orrù and Yannick Seurin
2018/1038 ( PDF )
On inversion modulo pseudo-Mersenne primes
Michael Scott
2018/1037 ( PDF )
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
Joël Alwen and Sandro Coretti and Yevgeniy Dodis
2018/1036 ( PDF )
If a Generalised Butterfly is APN then it Operates on 6 Bits
Anne Canteaut and Léo Perrin and Shizhu Tian
2018/1035 ( PDF )
Relating different Polynomial-LWE problems
Madalina Bolboceanu
2018/1034 ( PDF )
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme
Michael Kraitsberg and Yehuda Lindell and Valery Osheter and Nigel P. Smart and Younes Talibi Alaoui
2018/1033 ( PDF )
One-Round Authenticated Group Key Exchange from Isogenies
Atsushi Fujioka and Katsuyuki Takashima and Kazuki Yoneyama
2018/1032 ( PDF )
Conditionals in Homomorphic Encryption and Machine Learning Applications
Diego Chialva and Ann Dooms
2018/1031 ( PDF )
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking
Roderick Bloem and Rinat Iusupov and Martin Krenn and Stefan Mangard
2018/1030 ( PDF )
Registration-Based Encryption from Standard Assumptions
Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar
2018/1029 ( PDF )
Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations
Zhe Li and Chaoping Xing and Sze Ling Yeo
2018/1028 ( PDF )
Synchronous Byzantine Agreement with Expected $O(1)$ Rounds, Expected $O(n^2)$ Communication, and Optimal Resilience
Ittai Abraham and Srinivas Devadas and Danny Dolev and Kartik Nayak and Ling Ren
2018/1027 ( PDF )
A Unified Security Perspective on Legally Fair Contract Signing Protocols
Diana Maimut and George Teseleanu
2018/1026 ( PDF )
Pairing-Friendly Twisted Hessian Curves
Chitchanok Chuengsatiansup and Chloe Martindale
2018/1025 ( PDF )
Integer Matrices Homomorphic Encryption and Its application
Yanan Bai and Jingwei Chen and Yong Feng and Wenyuan Wu
2018/1024 ( PDF )
ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution
Karl Wüst and Sinisa Matetic and Moritz Schneider and Ian Miers and Kari Kostiainen and Srdjan Capkun
2018/1023 ( PDF )
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Jaehun Kim and Stjepan Picek and Annelie Heuser and Shivam Bhasin and Alan Hanjalic
2018/1022 ( PDF )
Blind Certificate Authorities
Liang Wang and Gilad Asharov and Rafael Pass and Thomas Ristenpart and abhi shelat
2018/1021 ( PDF )
Multi-Client Functional Encryption with Repetition for Inner Product
Jérémy Chotard and Edouard Dufour-Sans and Romain Gay and Duong Hieu Phan and David Pointcheval
2018/1020 ( PDF )
Non-Interactive Secure Computation from One-Way Functions
Saikrishna Badrinarayanan and Abhishek Jain and Rafail Ostrovsky and Ivan Visconti
2018/1019 ( PDF )
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
Chloé Hébant and Duong Hieu Phan and David Pointcheval
2018/1018 ( PDF )
Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates
Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe
2018/1017 ( PDF )
TNFS Resistant Families of Pairing-Friendly Elliptic Curves
Georgios Fotiadis and Elisavet Konstantinou
2018/1016 ( PDF )
Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
Gerben Geltink
2018/1015 ( PDF )
Non-Malleable Codes Against Bounded Polynomial Time Tampering
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin
2018/1014 ( PDF )
An FPGA-based programmable processor for bilinear pairings
Eduardo Cuevas-Farfán and Miguel Morales-Sandoval and René Cumplido
2018/1013 ( PDF )
E3: A Framework for Compiling C++ Programs with Encrypted Operands
Eduardo Chielle and Oleg Mazonka and Homer Gamil and Nektarios Georgios Tsoutsos and Michail Maniatakos
2018/1012 ( PDF )
The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE
Guido Bertoni and Joan Daemen and Seth Hoffert and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
2018/1011 ( PDF )
BISON - Instantiating the Whitened Swap-Or-Not Construction
Anne Canteaut and Virginie Lallemand and Gregor Leander and Patrick Neumann and Friedrich Wiemer
2018/1010 ( PDF )
Space Efficient Computational Multi-Secret Sharing and Its Applications
Aggelos Kiayias and Murat Osmanoglu and Alexander Russell and Qiang Tang
2018/1009 ( PDF )
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
Xianhui Lu and Yamin Liu and Zhenfei Zhang and Dingding Jia and Haiyang Xue and Jingnan He and Bao Li and Kunpeng Wang
2018/1007 ( PDF )
Masking the AES with Only Two Random Bits
Hannes Gross and Ko Stoffelen and Lauren De Meyer and Martin Krenn and Stefan Mangard
2018/1005 ( PDF )
Code Offset in the Exponent
Luke Demarest and Benjamin Fuller and Alexander Russell
2018/1004 ( PDF )
Fiat-Shamir From Simpler Assumptions
Ran Canetti and Yilei Chen and Justin Holmgren and Alex Lombardi and Guy N. Rothblum and Ron D. Rothblum
2018/1003 ( PDF )
Secure Data Retrieval On The Cloud: Homomorphic Encryption Meets Coresets
Adi Akavia and Dan Feldman and Hayim Shaul
2018/1002 ( PDF )
"S-Box" Implementation of AES is NOT side-channel resistant
C Ashokkumar and Bholanath Roy and M Bhargav Sri Venkatesh and Bernard L Menezes
2018/1001 ( PDF )
Illuminating the Dark or how to recover what should not be seen in FE-based classifiers
Sergiu Carpov and Caroline Fontaine and Damien Ligier and Renaud Sirdey
2018/1000 ( PDF )
Adaptively Single-Key Secure Constrained PRFs for NC1
Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2018/999 ( PDF )
A Refinement of ``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier and Yonglin Hao and Boxin Zhao
2018/998 ( -- withdrawn -- )
A Key Recovery Attack on Streamlined NTRU Prime
Chen Li
2018/997 ( PDF )
Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
Leonid Reyzin and Adam Smith and Sophia Yakoubov
2018/996 ( PDF )
Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2018/995 ( PDF )
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE
Shuai Zhou and Haiyang Xue and Daode Zhang and Kunpeng Wang and Xianhui Lu and Bao Li and Jingnan He
2018/994 ( PDF )
People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes
Long Chen and Qiang Tang
2018/993 ( PDF )
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
Viet Tung Hoang and Stefano Tessaro and Aishwarya Thiruvengadam
2018/992 ( PDF )
Deconstructing the Blockchain to Approach Physical Limits
Vivek Bagaria and Sreeram Kannan and David Tse and Giulia Fanti and Pramod Viswanath
2018/991 ( PDF )
Reconsidering Generic Composition: the Tag-then-Encrypt case
Francesco Berti and Olivier Pereira and Thomas Peters
2018/990 ( PDF )
Quisquis: A New Design for Anonymous Cryptocurrencies
Prastudy Fauzi and Sarah Meiklejohn and Rebekah Mercer and Claudio Orlandi
2018/989 ( PDF )
Kleptography trapdoor free cryptographic protocols
Bohdan Kovalenko and Anton Kudin
2018/988 ( PDF )
On the Hardness of Learning With Errors with Binary Secrets
Daniele Micciancio
2018/987 ( PDF )
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
Yehuda Lindell and Ariel Nof and Samuel Ranellucci
2018/986 ( PDF )
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs
Sam Kim and David J. Wu
2018/985 ( PDF )
Efficient Arithmetic In (Pseudo-)Mersenne Prime Order Fields
Kaushik Nath and Palash Sarkar
2018/984 ( PDF )
Pseudorandomness Against Mean and Variance Bounded Attackers
Maciej Skorski
2018/983 ( PDF )
Efficient UC Commitment Extension with Homomorphism for Free (and Applications)
Ignacio Cascudo and Ivan Damgård and Bernardo David and Nico Döttling and Rafael Dowsley and Irene Giacomelli
2018/982 ( PDF )
Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance
Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada
2018/981 ( PDF )
PaLa: A Simple Partially Synchronous Blockchain
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2018/980 ( PDF )
PiLi: An Extremely Simple Synchronous Blockchain
T-H. Hubert Chan and Rafael Pass and Elaine Shi
2018/979 ( PDF )
FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers
Carlos Andres Lara-Nino and Arturo Diaz-Perez and Miguel Morales-Sandoval
2018/978 ( PDF )
Encrypted Multi-Maps with Computationally-Secure Leakage
Seny Kamara and Tarik Moataz
2018/977 ( PDF )
Threshold Single Password Authentication
Devriş İşler and Alptekin Küpçü
2018/976 ( PDF )
Distributed Single Password Protocol Framework
Devriş İşler and Alptekin Küpçü
2018/975 ( PDF )
User Study on Single Password Authentication
Devriş İşler and Alptekin Küpçü and Aykut Coskun
2018/974 ( PDF )
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa
2018/973 ( PDF )
How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO
Aayush Jain and Amit Sahai
2018/972 ( PDF )
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
Yonglin Hao and Lin Jiao and Chaoyun Li and Willi Meier and Yosuke Todo and Qingju Wang
2018/971 ( PDF )
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2018/970 ( PDF )
Protean Signature Schemes
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2018/969 ( PDF )
Optimal TNFS-secure pairings on elliptic curves with even embedding degree
Georgios Fotiadis and Chloe Martindale
2018/968 ( PDF )
Edrax: A Cryptocurrency with Stateless Transaction Validation
Alexander Chepurnoy and Charalampos Papamanthou and Shravan Srinivasan and Yupeng Zhang
2018/967 ( PDF )
Higher dimensional sieving for the number field sieve algorithms
Laurent Grémy
2018/966 ( PDF )
On the Security of the Multivariate Ring Learning with Errors Problem
Carl Bootland and Wouter Castryck and Frederik Vercauteren
2018/965 ( PDF )
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenny Paterson
2018/964 ( PDF )
Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas
Saud Al Musa and Guangwu Xu
2018/963 ( PDF )
On Enabling Attribute-Based Encryption to Be Traceable against Traitors
Zhen Liu and Qiong Huang and Duncan S. Wong
2018/962 ( PDF )
Zexe: Enabling Decentralized Private Computation
Sean Bowe and Alessandro Chiesa and Matthew Green and Ian Miers and Pratyush Mishra and Howard Wu
2018/961 ( PDF )
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs
Shaofeng Zhu and Hua Chen and Limin Fan and Meihui Chen and Wei Xi and Dengguo Feng
2018/960 ( PDF )
Towards Quantum One-Time Memories from Stateless Hardware
Anne Broadbent and Sevag Gharibian and Hong-Sheng Zhou
2018/959 ( PDF )
Information Entropy Based Leakage Certification
Changhai Ou and Xinping Zhou and Siew-Kei Lam
2018/958 ( PDF )
On Tightly Secure Primitives in the Multi-Instance Setting
Dennis Hofheinz and Ngoc Khanh Nguyen
2018/957 ( PDF )
Same Point Composable and Nonmalleable Obfuscated Point Functions
Peter Fenteany and Benjamin Fuller
2018/956 ( PDF )
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang
2018/955 ( PDF )
Compact Sparse Merkle Trees
Faraz Haider
2018/954 ( PDF )
Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging
Daniel Jost and Ueli Maurer and Marta Mularczyk
2018/953 ( PDF )
A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols
Dmytro Bogatov and George Kollios and Leonid Reyzin
2018/952 ( PDF )
Approximate Homomorphic Encryption over the Conjugate-invariant Ring
Duhyeong Kim and Yongsoo Song
2018/951 ( PDF )
The Landscape of Optimal Card-based Protocols
Alexander Koch
2018/950 ( PDF )
Security bound for CTR-ACPKM internally re-keyed encryption mode
Liliya R. Akhmetzyanova, and Evgeny K. Alekseev, and Stanislav V. Smyshlyaev
2018/949 ( PDF )
Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations
Si Gao and Arnab Roy and Elisabeth Oswald
2018/948 ( PDF )
MILP-Based Automatic Differential Searches for LEA and HIGHT
Elnaz Bagherzadeh and Zahra Ahmadian
2018/947 ( PDF )
On the security of Circulant UOV/Rainbow
Yasufumi Hashimoto
2018/946 ( PDF )
Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More
Nicholas Genise and Daniele Micciancio and Yuriy Polyakov
2018/945 ( PDF )
On the Inner Product Predicate and a Generalization of Matching Vector Families
Balthazar Bauer and Jevgēnijs Vihrovs and Hoeteck Wee
2018/944 ( PDF )
Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions
Jeremiah Blocki and Ben Harsha and Siteng Kang and Seunghoon Lee and Lu Xing and Samson Zhou
2018/943 ( PDF )
Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound
Shuoyao Zhao and Yu Yu and Jiang Zhang and Hanlin Liu
2018/942 ( PDF )
Insured MPC: Efficient Secure Computation with Financial Penalties
Carsten Baum and Bernardo David and Rafael Dowsley
2018/941 ( PDF )
A tutorial introduction to CryptHOL
Andreas Lochbihler and S. Reza Sefidgar
2018/940 ( PDF )
Reusable Non-Interactive Secure Computation
Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan
2018/939 ( PDF )
The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms
Marcella Hastings and Nadia Heninger and Eric Wustrow
2018/938 ( PDF )
Private Message Franking with After Opening Privacy
Iraklis Leontiadis and Serge Vaudenay
2018/937 ( PDF )
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
Mathias Wagner and Stefan Heyse
2018/936 ( PDF )
New Techniques for Obfuscating Conjunctions
James Bartusek and Tancrède Lepoint and Fermi Ma and Mark Zhandry
2018/935 ( PDF )
Distinguishing Error of Nonlinear Invariant Attacks
Subhabrata Samajder and Palash Sarkar
2018/934 ( PDF )
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices
Yuichi Komano and Hideo Shimizu and Hideyuki Miyake
2018/933 ( PDF )
Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures
Ferucio Laurentiu Tiplea and Constantin Catalin Dragan
2018/932 ( PDF )
18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices
Philipp Koppermann and Eduard Pop and Johann Heyszl and Georg Sigl
2018/931 ( PDF )
A Full RNS Variant of Approximate Homomorphic Encryption
Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song
2018/930 ( PDF )
A study on the fast ElGamal encryption
Kim Gyu-Chol and Li Su-Chol
2018/929 ( PDF )
Expander Graphs are Non-Malleable Codes
Peter M. R. Rasmussen and Amit Sahai
2018/928 ( PDF )
Generic Authenticated Key Exchange in the Quantum Random Oracle Model
Kathrin Hövelmanns and Eike Kiltz and Sven Schäge and Dominique Unruh
2018/927 ( PDF )
Adaptively Secure Distributed PRFs from LWE
Benoît Libert and Damien Stehlé and Radu Titiu
2018/926 ( PDF )
Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion
Salim Ali Altug and Yilei Chen
2018/925 ( PDF )
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Songze Li and Mingchao Yu and A. Salman Avestimehr and Sreeram Kannan and Pramod Viswanath
2018/924 ( PDF )
Forward Secure Signatures on Smart Cards
Andreas Hülsing and Christoph Busold and Johannes Buchmann
2018/923 ( PDF )
Delegatable Anonymous Credentials from Mercurial Signatures
Elizabeth C. Crites and Anna Lysyanskaya
2018/922 ( PDF )
Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
Dušan Božilov and Miroslav Knežević and Ventzislav Nikov
2018/921 ( PDF )
Round Optimal Black-Box “Commit-and-Prove”
Dakshita Khurana and Rafail Ostrovsky and Akshayaram Srinivasan
2018/920 ( PDF )
A Message Franking Channel
Loïs Huguenin-Dumittan and Iraklis Leontiadis
2018/919 ( PDF )
Registration-Based Encryption: Removing Private-Key Generator from IBE
Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi
2018/918 ( PDF )
Scalable Lightning Factories for Bitcoin
Alejandro Ranchal-Pedrosa and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
2018/917 ( PDF )
Secure multiparty PageRank algorithm for collaborative fraud detection
Alex Sangers and Maran van Heesch and Thomas Attema and Thijs Veugen and Mark Wiggerman and Jan Veldsink and Oscar Bloemen and Daniël Worm
2018/916 ( PDF )
Forking a Blockcipher for Authenticated Encryption of Very Short Messages
Elena Andreeva and Reza Reyhanitabar and Kerem Varici and Damian Vizár
2018/915 ( PDF )
On the Security of a Certificateless Strong Designated Verifier Signature Scheme
Nasrollah Pakniat
2018/914 ( PDF )
Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance
Shuichi Katsumata and Shota Yamada
2018/913 ( PDF )
Best Possible Information-Theoretic MPC
Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin
2018/912 ( PDF )
Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2018/911 ( PDF )
Achieving Fair Treatment in Algorithmic Classification
Andrew Morgan and Rafael Pass
2018/910 ( PDF )
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation
Frédéric Dupuis and Serge Fehr and Philippe Lamontagne and Louis Salvail
2018/909 ( PDF )
Two-Round MPC: Information-Theoretic and Black-Box
Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan
2018/908 ( PDF )
FE and iO for Turing Machines from Minimal Assumptions
Shweta Agrawal, Monosij Maitra
2018/907 ( PDF )
Proving the correct execution of concurrent services in zero-knowledge
Srinath Setty and Sebastian Angel and Trinabh Gupta and Jonathan Lee
2018/906 ( PDF )
Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries
Willy Quach and Daniel Wichs and Giorgos Zirdelis
2018/905 ( PDF )
On the Security Loss of Unique Signatures
Andrew Morgan and Rafael Pass
2018/904 ( PDF )
Quantum security proofs using semi-classical oracles
Andris Ambainis and Mike Hamburg and Dominique Unruh
2018/903 ( PDF )
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Nina Bindel and Jacqueline Brendel and Marc Fischlin and Brian Goncalves and Douglas Stebila
2018/902 ( PDF )
ProximiTEE: Hardened SGX Attestation by Proximity Verification
Aritra Dhar and Evan Puddu and Kari Kostiainen and Srdjan Capkun
2018/901 ( PDF )
On the Complexity of Fair Coin Flipping
Iftach Haitner and Nikolaos Makriyannis and Eran Omri
2018/900 ( PDF )
Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations
Mohammad Hajiabadi
2018/899 ( PDF )
Differential Cryptanalysis of Round-Reduced SPECK
Ashutosh Dhar Dwivedi and Pawel Morawiecki
2018/898 ( PDF )
Differential Cryptanalysis in ARX Ciphers with specific applications to LEA
Ashutosh Dhar Dwivedi and Gautam Srivastava
2018/897 ( PDF )
Traitor-Tracing from LWE Made Simple and Attribute-Based
Yilei Chen and Vinod Vaikuntanathan and Brent Waters and Hoeteck Wee and Daniel Wichs
2018/896 ( PDF )
Proofs of Ignorance and Applications to 2-Message Witness Hiding
Apoorvaa Deshpande and Yael Kalai
2018/895 ( PDF )
Weak Zero-Knowledge Beyond the Black-Box Barrier
Nir Bitansky and Dakshita Khurana and Omer Paneth
2018/894 ( PDF )
Perfect Secure Computation in Two Rounds
Benny Applebaum and Zvika Brakerski and Rotem Tsabary
2018/893 ( PDF )
Blockchain as cryptanalytic tool
Manfred Lochter
2018/892 ( PDF )
OptORAMa: Optimal Oblivious RAM
Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Kartik Nayak and Enoch Peserico and Elaine Shi
2018/891 ( PDF )
Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment
Seyed Farhad Aghili and Hamid Mala
2018/890 ( PDF )
A Bit-fixing PRF with O(1) Collusion-Resistance from LWE
Alex Davidson and Ryo Nishimaki
2018/889 ( PDF )
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
F. Betül Durak and Serge Vaudenay
2018/888 ( PDF )
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg
Thom Wiggers
2018/887 ( PDF )
Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions
Serge Fehr
2018/886 ( PDF )
Towards Isogeny-Based Password-Authenticated Key Establishment
Oleg Taraskin and Vladimir Soukharev and David Jao and Jason LeGrow
2018/885 ( PDF )
PASTA: PASsword-based Threshold Authentication
Shashank Agrawal and Peihan Miao and Payman Mohassel and Pratyay Mukherjee
2018/884 ( PDF )
Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model
Alan Szepieniec and Reza Reyhanitabar and Bart Preneel
2018/883 ( PDF )
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
Suvradip Chakraborty and C. Pandu Rangan
2018/882 ( PDF )
Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies
Benjamin Smith
2018/881 ( PDF )
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
Falk Schellenberg and Dennis R.E. Gnad and Amir Moradi and Mehdi B. Tahoori
2018/880 ( PDF )
Spread: a new layer for profiled deep-learning side-channel attacks
Christophe Pfeifer and Patrick Haddad
2018/879 ( PDF )
Efficient Group Signature Scheme without Pairings
Ke Gu and Bo Yin
2018/878 ( PDF )
RSA Signatures Under Hardware Restrictions
Marc Joye and Yan Michalevsky
2018/877 ( PDF )
On QA-NIZK in the BPK Model
Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając
2018/876 ( PDF )
Identity Confidentiality in 5G Mobile Telephony Systems
Haibat Khan and Benjamin Dowling and Keith M. Martin
2018/875 ( PDF )
Oblivious Transfer in Incomplete Networks
Varun Narayanan and Vinod M. Prabhakaran
2018/874 ( PDF )
Enhanced Security of Attribute-Based Signatures
Johannes Blömer and Fabian Eidens and Jakob Juhnke
2018/873 ( PDF )
TACHYON: Fast Signatures from Compact Knapsack
Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz and Mike Rosulek
2018/872 ( PDF )
New Techniques for Efficient Trapdoor Functions and Applications
Sanjam Garg and Romain Gay and Mohammad Hajiabadi
2018/871 ( PDF )
Non-profiled Mask Recovery: the impact of Independent Component Analysis
Si Gao and Elisabeth Oswald and Hua Chen and Wei Xi
2018/870 ( PDF )
Unifying Kleptographic Attacks
George Teseleanu
2018/869 ( PDF )
Higher-Order DCA against Standard Side-Channel Countermeasures
Andrey Bogdanov and Matthieu Rivain and Philip S. Vejre and Junwei Wang
2018/868 ( PDF )
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Dea Saka Kurnia Putra and Mohamad Ali Sadikin and Susila Windarta
2018/867 ( PDF )
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling
Liron David and Avishai Wool
2018/866 ( PDF )
Output Compression, MPC, and iO for Turing Machines
Saikrishna Badrinarayanan and Rex Fernando and Venkata Koppula and Amit Sahai and Brent Waters
2018/865 ( PDF )
Multiplicative Masking for AES in Hardware
Lauren De Meyer and Oscar Reparaz and Begül Bilgin
2018/864 ( -- withdrawn -- )
Optimistic Mixing, Revisited
Antonio Faonio and Dario Fiore
2018/863 ( PDF )
Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation
Avi Asayag and Gad Cohen and Ido Grayevsky and Maya Leshkowitz and Ori Rottenstreich and Ronen Tamari and David Yakira
2018/862 ( PDF )
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
Nils Wisiol and Marian Margraf
2018/861 ( PDF )
Delegating Computations with (almost) Minimal Time and Space Overhead
Justin Holmgren and Ron D. Rothblum
2018/860 ( PDF )
Encrypted Databases for Differential Privacy
Archita Agarwal and Maurice Herlihy and Seny Kamara and Tarik Moataz
2018/859 ( PDF )
Cryptanalysis of Low-Data Instances of Full LowMCv2
Christian Rechberger and Hadi Soleimany and Tyge Tiessen
2018/858 ( PDF )
Stronger Security for Sanitizable Signatures
Stephan Krenn and Kai Samelin and Dieter Sommer
2018/857 ( PDF )
Raptor: A Practical Lattice-Based (Linkable) Ring Signature
Xingye Lu and Man Ho Au and Zhenfei Zhang
2018/856 ( PDF )
Measuring, simulating and exploiting the head concavity phenomenon in BKZ
Shi Bai and Damien Stehlé and Weiqiang Wen
2018/855 ( PDF )
On the Security of the PKCS#1 v1.5 Signature Scheme
Tibor Jager and Saqib A. Kakvi and Alexander May
2018/854 ( PDF )
Universal Multi-Party Poisoning Attacks
Saeed Mahloujifar and Mahammad Mahmoody and Ameer Mohammed
2018/853 ( PDF )
Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
Christos Patsonakis and Katerina Samari and Mema Roussopoulos and Aggelos Kiayias
2018/852 ( PDF )
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Christoph Dobraunig and Stefan Mangard and Florian Mendel and Robert Primas
2018/851 ( PDF )
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
T-H. Hubert Chan and Jonathan Katz and Kartik Nayak and Antigoni Polychroniadou and Elaine Shi
2018/850 ( PDF )
Computing supersingular isogenies on Kummer surfaces
Craig Costello
2018/849 ( PDF )
Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications
Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy
2018/848 ( PDF )
A Universally Composable Framework for the Privacy of Email Ecosystems
Pyrros Chaidos and Olga Fourtounelli and Aggelos Kiayias and Thomas Zacharias
2018/847 ( PDF )
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
Venkata Koppula and Brent Waters
2018/846 ( PDF )
Strong Leakage Resilient Encryption: Enhancing Data Confidentiality by Hiding Partial Ciphertext
Jia Xu and Jianying Zhou
2018/845 ( PDF )
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
Fuyuki Kitagawa and Keisuke Tanaka
2018/844 ( PDF )
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Jean Paul Degabriele and Marc Fischlin
2018/843 ( PDF )
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)
Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
2018/842 ( PDF )
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions
Yusuke Sakai and Shuichi Katsumata and Nuttapong Attrapadung and Goichiro Hanaoka
2018/841 ( PDF )
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions
Akinori Hosoyamada and Kan Yasuda
2018/840 ( PDF )
Universal Proxy Re-Encryption
Nico Döttling and Ryo Nishimaki
2018/839 ( PDF )
On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography
Huseyin Hisil and Joost Renes
2018/838 ( PDF )
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Keita Xagawa and Takashi Yamakawa
2018/837 ( PDF )
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem
Yu Ning and Fuyou Miao and Wenchao Huang and Keju Meng and Yan Xiong and Xingfu Wang
2018/836 ( PDF )
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques
Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar Weippl
2018/835 ( PDF )
Fully-Featured Anonymous Credentials with Reputation System
Kai Bemmann and Johannes Blömer and Jan Bobolz and Henrik Bröcher and Denis Diemert and Fabian Eidens and Lukas Eilers and Jan Haltermann and Jakob Juhnke and Burhan Otour and Laurens Porzenheim and Simon Pukrop and Erik Schilling and Michael Schlichtig and Marcel Stienemeier
2018/834 ( PDF )
Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks
Dennis Hofheinz and Dingding Jia and Jiaxin Pan
2018/833 ( PDF )
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
Jie Chen and Junqing Gong and Hoeteck Wee
2018/832 ( PDF )
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules
Ashrujit Ghoshal and Rajat Sadhukhan and Sikhar Patranabis and Nilanjan Datta and Stjepan Picek and Debdeep Mukhopadhyay
2018/831 ( PDF )
Practical Attack on RaCoSS-R
Keita Xagawa
2018/830 ( PDF )
A remark on a success rate model fpr DPA and CPA
Andreas Wiemers
2018/829 ( PDF )
Information-Theoretic Broadcast with Dishonest Majority for Long Messages
Wutichai Chongchitmate and Rafail Ostrovsky
2018/828 ( PDF )
Aurora: Transparent Succinct Arguments for R1CS
Eli Ben-Sasson and Alessandro Chiesa and Michael Riabzev and Nicholas Spooner and Madars Virza and Nicholas P. Ward
2018/827 ( PDF )
Practical Strategy-Resistant Privacy-Preserving Elections
Sébastien Canard and David Pointcheval and Quentin Santos and Jacques Traoré
2018/826 ( PDF )
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
Tibor Jager and Rafael Kurek and Jiaxin Pan
2018/825 ( PDF )
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
Kostas Papagiannopoulos
2018/824 ( PDF )
SeaSign: Compact isogeny signatures from class group actions
Luca De Feo and Steven D. Galbraith
2018/823 ( PDF )
The Security of Lazy Users in Out-of-Band Authentication
Moni Naor and Lior Rotem and Gil Segev
2018/822 ( PDF )
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS
Jonathan Bootle and Claire Delaplace and Thomas Espitau and Pierre-Alain Fouque and Mehdi Tibouchi
2018/821 ( PDF )
Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate
Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay and Shivam Bhasin
2018/820 ( PDF )
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
David Sommer and Sebastian Meiser and Esfandiar Mohammadi
2018/819 ( PDF )
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls
Ritam Bhaumik and Eik List and Mridul Nandi
2018/818 ( PDF )
Robustly Reusable Fuzzy Extractor from Standard Assumptions
Yunhua Wen and Shengli Liu
2018/817 ( PDF )
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism
Haiyang Xue and Xianhui Lu and Bao Li and Bei Liang and Jingnan He
2018/816 ( PDF )
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security
Chun Guo and Lei Wang
2018/815 ( PDF )
Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation
Yoshitatsu Matsuda and Tadanori Teruya and Kenji Kasiwabara
2018/814 ( PDF )
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
Yudi Zhang and Debiao He and Xinyi Huang and Ding Wang and Kim-Kwang Raymond Choo
2018/813 ( PDF )
Programming the Demirci-Sel{ç}uk Meet-in-the-Middle Attack with Constraints
Danping Shi and Siwei Sun and Patrick Derbez and Yosuke Todo and Bing Sun and Lei Hu
2018/812 ( PDF )
Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?
Lior Rotem and Gil Segev
2018/811 ( PDF )
Reconstructing an S-box from its Difference Distribution Table
Orr Dunkelman and Senyang Huang
2018/810 ( PDF )
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Ling Song and Jian Guo
2018/809 ( PDF )
Algebraic Cryptanalysis of Frit
Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Markus Schofnegger
2018/808 ( PDF )
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing
Jiyong Yu and Lucas Hsiung and Mohamad El Hajj and Christopher W. Fletcher
2018/807 ( PDF )
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
Nicolas T. Courtois
2018/806 ( PDF )
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Victor Arribas and Svetla Nikova and Vincent Rijmen
2018/805 ( PDF )
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers
Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda
2018/804 ( PDF )
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul
2018/803 ( PDF )
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
Sinisa Matetic and Karl Wüst and Moritz Schneider and Kari Kostiainen and Ghassan Karame and Srdjan Capkun
2018/802 ( PDF )
Secure Modulo Zero-Sum Randomness as Cryptographic Resource
Masahito Hayashi and Takeshi Koshiba
2018/801 ( PDF )
Faster PCA and Linear Regression through Hypercubes in HElib
Deevashwer Rathee and Pradeep Kumar Mishra and Masaya Yasuda
2018/800 ( PDF )
Security of the Blockchain against Long Delay Attack
Puwen Wei and Quan Yuan and Yuliang Zheng
2018/799 ( PDF )
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
Fukang Liu and Zhenfu Cao and Gaoli Wang
2018/798 ( PDF )
Recovering Secrets From Prefix-Dependent Leakage
Houda Ferradi and Rémi Géraud and Sylvain Guilley and David Naccache and Mehdi Tibouchi
2018/797 ( PDF )
Quantum algorithms for computing general discrete logarithms and orders with tradeoffs
Martin Ekerå
2018/796 ( PDF )
On relations between CCZ- and EA-equivalences
Lilya Budaghyan and Marco Calderini and Irene Villa
2018/795 ( PDF )
Solving ECDLP via List Decoding
Fangguo Zhang and Shengli Liu
2018/794 ( PDF )
Blending FHE-NTRU keys – The Excalibur Property
Louis Goubin and Francisco Vial-Prado
2018/793 ( PDF )
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
Tetsu Iwata and Virginie Lallemand and Gregor Leander and Yu Sasaki
2018/792 ( PDF )
Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices
Joppe W. Bos and Simon J. Friedberger
2018/791 ( PDF )
Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$
Guilhem Castagnos and Fabien Laguillaumie and Ida Tucker
2018/790 ( PDF )
Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation
David Derler and Sebastian Ramacher and Daniel Slamanig
2018/789 ( PDF )
Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free
Vladimir Kolesnikov
2018/788 ( PDF )
Privacy-preserving certificate linkage/revocation in VANETs without Linkage Authorities
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius M. Silva
2018/787 ( PDF )
Labeled PSI from Fully Homomorphic Encryption with Malicious Security
Hao Chen and Zhicong Huang and Kim Laine and Peter Rindal
2018/786 ( PDF )
Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices
Zhongxiang Zheng and Guangwu Xu and Chunhuan Zhao
2018/785 ( PDF )
Efficiently Processing Complex-Valued Data in Homomorphic Encryption
Carl Bootland and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2018/784 ( PDF )
Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model
ByeongHak Lee and Jooyoung Lee
2018/783 ( PDF )
Short Variable Length Domain Extenders With Beyond Birthday Bound Security
Yu Long Chen and Bart Mennink and Mridul Nandi
2018/782 ( PDF )
A faster way to the CSIDH
Michael Meyer and Steffen Reith
2018/781 ( PDF )
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
Yu Chen and Yuyu Wang and Hong-sheng Zhou
2018/780 ( PDF )
A Game Theoretic Analysis of Resource Mining in Blockchain
Rajani Singh and Ashutosh Dhar Dwivedi and Gautam Srivastava and Agnieszka Wiszniewska-Matyszkiel and Xiaochun Cheng
2018/779 ( PDF )
Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability
Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler
2018/778 ( PDF )
PPP-Completeness with Connections to Cryptography
Katerina Sotiraki and Manolis Zampetakis and Giorgos Zirdelis
2018/777 ( PDF )
Delegation of Decryption Rights with Revocability from Learning with Errors
Wei Yin and Qiaoyan Wen and Kaitai Liang and Zhenfei Zhang and Liqun Chen and Hanbing Yan and Hua Zhang
2018/776 ( PDF )
On Publicly Verifiable Delegation From Standard Assumptions
Yael Kalai and Omer Paneth and Lisa Yang
2018/775 ( PDF )
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants
Matilda Backendal and Mihir Bellare and Jessica Sorrell and Jiahao Sun
2018/774 ( PDF )
Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies
Brandon Goodell and Sarang Noether
2018/773 ( PDF )
Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures
Muhammed F. Esgin and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Dongxi Liu
2018/772 ( PDF )
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Itai Dinur and Daniel Kales and Angela Promitzer and Sebastian Ramacher and Christian Rechberger
2018/771 ( PDF )
A Simple Construction of iO for Turing Machines
Sanjam Garg and Akshayaram Srinivasan
2018/770 ( PDF )
Combiners for Backdoored Random Oracles
Balthazar Bauer and Pooya Farshim and Sogol Mazaheri
2018/769 ( PDF )
Constructing APN functions through isotopic shifts
Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa
2018/768 ( PDF )
DRANKULA: a McEliece-like rank metric based cryptosystem implementation
Ameera Salem Al Abdouli and Mohamed Al Ali and Emanuele Bellini and Florian Caullery and Alexandros Hasikos and Marc Manzano and Victor Mateu
2018/767 ( PDF )
Xoodoo cookbook
Joan Daemen and Seth Hoffert and Michaël Peeters and Gilles Van Assche and Ronny Van Keer
2018/766 ( PDF )
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
Nadim Kobeissi and Georgio Nicolas and Karthikeyan Bhargavan
2018/765 ( PDF )
Symbolic Proofs for Lattice-Based Cryptography
Gilles Barthe and Xiong Fan and Joshua Gancher and Benjamin Grégoire and Charlie Jacomme and Elaine Shi
2018/764 ( PDF )
Generating Graphs Packed with Paths
Mathias Hall-Andersen and Philip S. Vejre
2018/763 ( PDF )
Block Cipher Invariants as Eigenvectors of Correlation Matrices (Full Version)
Tim Beyne
2018/762 ( PDF )
Generalizing the SPDZ Compiler For Other Protocols
Toshinori Araki and Assi Barak and Jun Furukawa and Marcel Keller and Yehuda Lindell and Kazuma Ohara and Hikaru Tsuchida
2018/761 ( PDF )
New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem
Parinaz Mahdion and Hadi Soleimany and Pouya Habibi and Farokhlagha Moazami
2018/760 ( PDF )
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
Xiu Xu and Haiyang Xue and Kunpeng Wang and Man Ho Au and Bei Liang and Song Tian
2018/759 ( PDF )
Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm
Prabhanjan Ananth and Alex Lombardi
2018/758 ( PDF )
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
Christina Boura and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev
2018/757 ( PDF )
Cryptography for Human Senses
Kimmo Halunen and Outi-Marja Latvala
2018/756 ( PDF )
Obfuscation Using Tensor Products
Craig Gentry and Charanjit S. Jutla and Daniel Kane
2018/755 ( PDF )
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li
2018/754 ( PDF )
SoK: A Consensus Taxonomy in the Blockchain Era
Juan Garay and Aggelos Kiayias
2018/753 ( PDF )
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
Yan Michalevsky and Marc Joye
2018/752 ( PDF )
Isogeny Secrets can be Traded
David Urbanik
2018/751 ( PDF )
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
Assi Barak and Martin Hirt and Lior Koskas and Yehuda Lindell
2018/750 ( PDF )
Non-Malleable Secret Sharing for General Access Structures
Vipul Goyal and Ashutosh Kumar
2018/749 ( PDF )
Prime and Prejudice: Primality Testing Under Adversarial Conditions
Martin R. Albrecht and Jake Massimo and Kenneth G. Paterson and Juraj Somorovsky
2018/748 ( PDF )
Definitions for Plaintext-Existence Hiding in Cloud Storage
Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Håvard Raddum and Mohsen Toorani
2018/747 ( PDF )
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Eyal Ronen and Kenneth G. Paterson and Adi Shamir
2018/746 ( PDF )
Secret Sharing with Binary Shares
Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi-Naini and Huaxiong Wang
2018/745 ( PDF )
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure
Jingdian Ming and Wei Cheng and Huizhong Li and Guang Yang and Yongbin Zhou and Qian Zhang
2018/744 ( PDF )
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing
Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin
2018/743 ( PDF )
On the Leakage of Corrupted Garbled Circuits
Aurélien Dupin and David Pointcheval and Christophe Bidan
2018/742 ( PDF )
Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities
Hiroaki Anada and Seiko Arita
2018/741 ( PDF )
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
Alexander May and Gottfried Herold
2018/740 ( PDF )
FairSwap: How to fairly exchange digital goods
Stefan Dziembowski and Lisa Eckey and Sebastian Faust
2018/739 ( PDF )
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism
Mahdi Sajadieh and Mohammad Vaziri
2018/738 ( PDF )
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature
Sanjit Chatterjee and R. Kabaleeshwaran
2018/737 ( PDF )
Steady: A Simple End-to-End Secure Logging System
Tobias Pulls and Rasmus Dahlberg
2018/736 ( PDF )
Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs
Marina Blanton and Myoungin Jeong
2018/735 ( -- withdrawn -- )
AntNest: Fully Non-interactive Secure Multi-party Computation
Lijing Zhou and Licheng Wang and Yiru Sun and Tianyi Ai
2018/734 ( PDF )
Random Number Generators Can Be Fooled to Behave Badly
George Teseleanu
2018/733 ( PDF )
Threshold Partially-Oblivious PRFs with Applications to Key Management
Stanislaw Jarecki and Hugo Krawczyk and Jason Resch
2018/732 ( PDF )
Data Oblivious Genome Variants Search on Intel SGX
Avradip Mandal and John C. Mitchell and Hart Montgomery and Arnab Roy
2018/731 ( PDF )
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing
Itai Dinur and Nathan Keller and Ohad Klein
2018/730 ( PDF )
Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange
Atsushi Fujioka and Katsuyuki Takashima and Shintaro Terada and Kazuki Yoneyama
2018/729 ( -- withdrawn -- )
Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection
Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel
2018/728 ( PDF )
A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers
Takeshi Okamoto and Raylin Tso and Michitomo Yamaguchi and Eiji Okamoto
2018/727 ( PDF )
DiSE: Distributed Symmetric-key Encryption
Shashank Agrawal and Payman Mohassel and Pratyay Mukherjee and Peter Rindal
2018/726 ( PDF )
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES
Kai Hu and Tingting Cui and Chao Gao and Meiqin Wang
2018/725 ( PDF )
Round5: KEM and PKE based on GLWR
Sauvik Bhattacharya and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang
2018/724 ( PDF )
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
Nele Mentens and Edoardo Charbon and Francesco Regazzoni
2018/723 ( PDF )
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
Markku-Juhani O. Saarinen and Sauvik Bhattacharya and Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Zhenfei Zhang
2018/722 ( PDF )
uMine: a Blockchain based on Human Miners
Henning Kopp and Frank Kargl and Christoph Bösch and Andreas Peter
2018/721 ( PDF )
Transparency Logs via Append-only Authenticated Dictionaries
Alin Tomescu and Vivek Bhupatiraju and Dimitrios Papadopoulos and Charalampos Papamanthou and Nikos Triandopoulos and Srinivas Devadas
2018/720 ( PDF )
{Adiantum}: length-preserving encryption for entry-level processors
Paul Crowley and Eric Biggers
2018/719 ( PDF )
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage
Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia
2018/718 ( PDF )
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic
Koji Nuida
2018/717 ( PDF )
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
Heiko Lohrke and Shahin Tajik and Thilo Krachenfels and Christian Boit and Jean-Pierre Seifert
2018/716 ( PDF )
Lattice-Based Zero-Knowledge Arguments for Integer Relations
Benoît Libert and San Ling and Khoa Nguyen and Huaxiong Wang
2018/715 ( PDF )
Practical Attacks on Relational Databases Protected via Searchable Encryption
Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann and Cornelius Glackin
2018/714 ( PDF )
PKP-Based Signature Scheme
Ward Beullens and Jean-Charles Faugère and Eliane Koussa and Gilles Macario-Rat and Jacques Patarin and Ludovic Perret
2018/713 ( PDF )
On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting
Anne Canteaut and Léo Perrin
2018/712 ( PDF )
A Survey of Two Verifiable Delay Functions
Dan Boneh and Benedikt Bünz and Ben Fisch
2018/711 ( PDF )
Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures
Kallepu Raju and Appala Naidu Tentuand and V. Ch. Venkaiah
2018/710 ( PDF )
Fast Secure Computation for Small Population over the Internet
Megha Byali and Arun Joseph and Arpita Patra and Divya Ravi
2018/709 ( PDF )
Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies
Vanessa Vitse
2018/708 ( PDF )
Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software
Alexandre Adomnicai and Jacques J.A. Fournier and Laurent Masson
2018/707 ( PDF )
Function Secret Sharing: Improvements and Extensions
Elette Boyle and Niv Gilboa and Yuval Ishai
2018/706 ( PDF )
Efficient 3-Party Distributed ORAM
Paul Bunn and Jonathan Katz and Eyal Kushilevitz and Rafail Ostrovsky
2018/705 ( PDF )
Subvector Commitments with Application to Succinct Arguments
Russell W.F. Lai and Giulio Malavolta
2018/704 ( PDF )
Verifiable Sealed-Bid Auction on the Ethereum Blockchain
Hisham S. Galal and Amr M. Youssef
2018/703 ( PDF )
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
Niek J. Bouman and Niels de Vreede
2018/702 ( PDF )
Tight Proofs of Space and Replication
Ben Fisch
2018/701 ( -- withdrawn -- )
Secure Sketch for All Noisy Sources
Yen-Lung Lai
2018/700 ( PDF )
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
Hwajeong Seo and Zhe Liu and Patrick Longa and Zhi Hu
2018/699 ( PDF )
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64
Raghvendra Rohit and Guang Gong
2018/698 ( PDF )
Parameter-Hiding Order Revealing Encryption
David Cash and Feng-Hao Liu and Adam O'Neill and Mark Zhandry and Cong Zhang
2018/697 ( PDF )
AUDIT: Practical Accountability of Secret Processes
Jonathan Frankle and Sunoo Park and Daniel Shaar and Shafi Goldwasser and Daniel J. Weitzner
2018/696 ( PDF )
Unbounded Inner Product Functional Encryption from Bilinear Maps
Junichi Tomida and Katsuyuki Takashima
2018/695 ( PDF )
SPHINX: A Password Store that Perfectly Hides Passwords from Itself
Maliheh Shirvanian and Stanislaw Jarecki and Hugo Krawczyk and Nitesh Saxena
2018/694 ( PDF )
Faster Privacy-Preserving Location Proximity Schemes
Kimmo Järvinen and Ágnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang
2018/693 ( PDF )
Efficient Side-Channel Protections of ARX Ciphers
Bernhard Jungk and Richard Petri and Marc Stöttinger
2018/692 ( PDF )
New Configurations of Grain Ciphers: Security Against Slide Attacks
Diana Maimut and George Teseleanu
2018/691 ( PDF )
DIZK: A Distributed Zero Knowledge Proof System
Howard Wu and Wenting Zheng and Alessandro Chiesa and Raluca Ada Popa and Ion Stoica
2018/690 ( PDF )
Efficient KEA-Style Lattice-Based Authenticated Key Exchange
Zilong Wang and Honggang Hu
2018/689 ( PDF )
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Ralph Ankele and Stefan Kölbl
2018/688 ( PDF )
Finding Integral Distinguishers with Ease
Zahra Eskandari and Andreas Brasen Kidmose and Stefan Kölbl and Tyge Tiessen
2018/687 ( PDF )
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam
2018/686 ( PDF )
Standard Lattice-Based Key Encapsulation on Embedded Devices
James Howe and Tobias Oder and Markus Krausz and Tim Güneysu
2018/685 ( PDF )
On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards
Sven Heiberg and Ivo Kubjas and Janno Siim and Jan Willemson
2018/684 ( PDF )
PIEs: Public Incompressible Encodings for Decentralized Storage
Ethan Cecchetti and Ben Fisch and Ian Miers and Ari Juels
2018/683 ( PDF )
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability
Oksana Kulyk and Melanie Volkamer
2018/682 ( PDF )
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM
Angshuman Karmakar and Jose Maria Bermudo Mera and Sujoy Sinha Roy and Ingrid Verbauwhede
2018/681 ( PDF )
A Reusable Fuzzy Extractor with Practical Storage Size
Jung Hee Cheon and Jinhyuck Jeong and Dongwoo Kim and Jongchan Lee
2018/680 ( PDF )
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256
Rui Zong and Xiaoyang Dong and Xiaoyun Wang
2018/679 ( PDF )
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive
Jiasi Weng and Jian Weng and Jilian Zhang and Ming Li and Yue Zhang and Weiqi Luo
2018/678 ( PDF )
PoReps: Proofs of Space on Useful Data
Ben Fisch
2018/677 ( PDF )
Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems
François Gérard
2018/676 ( PDF )
Static Power Side-Channel Analysis - An Investigation of Measurement Factors
Thorben Moos and Amir Moradi and Bastian Richter
2018/675 ( PDF )
A signature scheme from the finite field isomorphism problem
Jeffrey Hoffstein and Joseph H. Silverman and William Whyte and Zhenfei Zhang
2018/674 ( PDF )
Practical Fault Injection Attacks on SPHINCS
Aymeric Genêt and Matthias J. Kannwischer and Hervé Pelletier and Andrew McLauchlan
2018/673 ( PDF )
Differential Power Analysis of XMSS and SPHINCS
Matthias J. Kannwischer and Aymeric Genêt and Denis Butin and Juliane Krämer and Johannes Buchmann
2018/672 ( PDF )
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
Martin R. Albrecht and Amit Deo and Kenneth G. Paterson
2018/671 ( PDF )
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
Joey Green and Elisabeth Oswald and Arnab Roy
2018/670 ( PDF )
Public Key Compression for Constrained Linear Signature Schemes
Ward Beullens and Bart Preneel and Alan Szepieniec
2018/669 ( PDF )
Faster cofactorization with ECM using mixed representations
Cyril Bouvier and Laurent Imbert
2018/668 ( PDF )
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
Takanori Isobe and Kazuhiko Minematsu
2018/667 ( PDF )
On Hardware Implementation of Tang-Maitra Boolean Functions
Mustafa Khairallah and Anupam Chattopadhyay and Bimal Mandal and Subhamoy Maitra
2018/666 ( PDF )
Reproducible Families of Codes and Cryptographic Applications
Paolo Santini and Edoardo Persichetti and Marco Baldi
2018/665 ( PDF )
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
Dan Boneh and Darren Glass and Daniel Krashen and Kristin Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry
2018/664 ( PDF )
Public Accountability vs. Secret Laws: Can They Coexist?
Shafi Goldwasser and Sunoo Park
2018/663 ( PDF )
Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption
Pradeep Kumar Mishra and Deevashwer Rathee and Dung Hoang Duong and Masaya Yasuda
2018/662 ( PDF )
Efficient Logistic Regression on Large Encrypted Data
Kyoohyung Han and Seungwan Hong and Jung Hee Cheon and Daejun Park
2018/661 ( PDF )
Exploring Deployment Strategies for the Tor Network
Christoph Döpmann and Sebastian Rust and Florian Tschorsch
2018/660 ( PDF )
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity
Xun Yi and Kwok-Yan Lam and Dieter Gollmann
2018/659 ( PDF )
On the Menezes-Teske-Weng’s conjecture
Sihem Mesnager and Kwang Ho Kim and Junyop Choe and Chunming Tang
2018/658 ( PDF )
Blockchained Post-Quantum Signatures
Konstantinos Chalkias and James Brown and Mike Hearn and Tommy Lillehagen and Igor Nitto and Thomas Schroeter
2018/657 ( PDF )
Platform-independent Secure Blockchain-Based Voting System
Bin Yu and Joseph Liu and Amin Sakzad and Surya Nepal and Paul Rimba and Ron Steinfeld and Man Ho Au
2018/656 ( PDF )
FPGA Cluster based high performance Cryptanalysis framework
Abhishek Bajpai and S V Kulgod
2018/655 ( PDF )
Loamit: A Blockchain-based Residual Loanable-limit Query System
Lijing Zhou and Licheng Wang and Yiru Sun and Pin Lv
2018/654 ( PDF )
Proofs of Replicated Storage Without Timing Assumptions
Ivan Damgård and Chaya Ganesh and Claudio Orlandi
2018/653 ( PDF )
Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
Pierre-Alain Fouque and Benjamin Hadjibeyli and Paul Kirchner
2018/652 ( PDF )
Efficient Collision Attack Frameworks for RIPEMD-160
Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao
2018/651 ( PDF )
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
Nicola Tuveri and Sohaib ul Hassan and Cesar Pereida García and Billy Brumley
2018/650 ( PDF )
Designing Efficient Dyadic Operations for Cryptographic Applications
Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini
2018/649 ( PDF )
No-signaling Linear PCPs
Susumu Kiyoshima
2018/648 ( PDF )
Semi-Commutative Masking: A Framework for Isogeny-based Protocols, with an Application to Fully Secure Two-Round Isogeny-based OT
Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Christophe Petit and Nigel P. Smart
2018/647 ( PDF )
A new perspective on the powers of two descent for discrete logarithms in finite fields
Thorsten Kleinjung and Benjamin Wesolowski
2018/646 ( PDF )
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation
Huijia Lin and Christian Matt
2018/645 ( PDF )
Mitigating the One-Use Restriction in Attribute-Based Encryption
Lucas Kowalczyk and Jiahui Liu and Kailash Meiyappan and Tal Malkin
2018/644 ( PDF )
Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
Osmanbey Uzunkol and Jothi Rangasamy and Lakshmi Kuppusamy
2018/643 ( PDF )
XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets
Alexei Zamyatin and Dominik Harz and Joshua Lind and Panayiotis Panayiotou and Arthur Gervais and William J. Knottenbelt
2018/642 ( PDF )
Commit-Chains: Secure, Scalable Off-Chain Payments
Rami Khalil and Alexei Zamyatin and Guillaume Felley and Pedro Moreno-Sanchez and Arthur Gervais
2018/641 ( PDF )
Membership Privacy for Fully Dynamic Group Signatures
Michael Backes and Lucjan Hanzlik and Jonas Schneider
2018/640 ( PDF )
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages
Masayuki Abe and Miguel Ambrona and Miyako Ohkubo and Mehdi Tibouchi
2018/639 ( PDF )
Function-Dependent Commitments for Verifiable Multi-Party Computation
Lucas Schabhüser and Denis Butin and Denise Demirel and Johanens Buchmann
2018/638 ( PDF )
BurnBox: Self-Revocable Encryption in a World of Compelled Access
Nirvan Tyagi and Muhammad Haris Mughees and Thomas Ristenpart and Ian Miers
2018/637 ( PDF )
Efficient Fully Homomorphic Encryption Scheme
Shuhong Gao
2018/636 ( PDF )
Lattice-Based Dual Receiver Encryption and More
Daode Zhang and Kai Zhang and Bao Li and Xianhui Lu and Haiyang Xue and Jie Li
2018/635 ( PDF )
On linear hulls in one round of DES
Tomer Ashur and Raluca Posteuca
2018/634 ( PDF )
Partially Specified Channels: The TLS 1.3 Record Layer without Elision
Christopher Patton and Thomas Shrimpton
2018/633 ( PDF )
New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation
Shweta Agrawal
2018/632 ( PDF )
CHARIOT: Cloud-Assisted Access Control for the Internet of Things
Clementine Gritti and Melek Onen and Refik Molva
2018/631 ( PDF )
Efficient Construction of the Boomerang Connection Table
Orr Dunkelman
2018/630 ( PDF )
Characterizing overstretched NTRU attacks
Gabrielle De Micheli and Nadia Heninger and Barak Shani
2018/629 ( PDF )
Context Hiding Multi-Key Linearly Homomorphic Authenticators
Lucas Schabhüser and Denis Butin and Johannes Buchmann
2018/628 ( -- withdrawn -- )
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk
2018/627 ( PDF )
Simple Verifiable Delay Functions
Krzysztof Pietrzak
2018/626 ( PDF )
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes
Sergiu Carpov and Oana Stan
2018/625 ( PDF )
Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions
Mihir Bellare and Joseph Jaeger and Julia Len
2018/624 ( PDF )
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
Gergei Bana and Rohit Chadha and Ajay Kumar Eeralla
2018/623 ( PDF )
Efficient verifiable delay functions
Benjamin Wesolowski
2018/622 ( PDF )
New techniques for Multi-value input Homomorphic Evaluation and Applications
Sergiu Carpov and Malika Izabachène and Victor Mollimard
2018/621 ( PDF )
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
Ben Lapid and Avishai Wool
2018/620 ( PDF )
STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis
Debayan Das and Mayukh Nath and Baibhab Chatterjee and Santosh Ghosh and Shreyas Sen
2018/619 ( PDF )
Is there an Oblivious RAM Lower Bound for Online Reads?
Mor Weiss and Daniel Wichs
2018/618 ( PDF )
On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks
Reynier Antonio de la Cruz Jiménez
2018/617 ( PDF )
Two Notions of Differential Equivalence on Sboxes
Christina Boura and Anne Canteaut and Jérémy Jean and Valentin Suder
2018/616 ( PDF )
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
Dario Fiore and Elena Pagnin
2018/615 ( PDF )
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness
Prabhanjan Ananth and Aayush Jain and Amit Sahai
2018/614 ( PDF )
A Note on Key Rank
Daniel P. Martin and Marco Martinoli
2018/613 ( PDF )
One-Message Zero Knowledge and Non-Malleable Commitments
Nir Bitansky and Huijia Lin
2018/612 ( PDF )
Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol
Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder
2018/611 ( PDF )
Is Java Card ready for hash-based signatures?
Ebo van der Laan and Erik Poll and Joost Rijneveld and Joeri de Ruiter and Peter Schwabe and Jan Verschuren
2018/610 ( PDF )
Hierarchical Attribute-based Signatures
Constantin-Catalin Dragan and Daniel Gardham and Mark Manulis
2018/609 ( PDF )
Improved Results on Factoring General RSA Moduli with Known Bits
Mengce Zheng
2018/608 ( PDF )
Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols
Hamid Nejatollahi and Nikil Dutt and Indranil Banerjee and Rosario Cammarota
2018/607 ( PDF )
SEEMless: Secure End-to-End Encrypted Messaging with less trust
Melissa Chase and Apoorvaa Deshpande and Esha Ghosh and Harjasleen Malvai
2018/606 ( PDF )
Continuously Non-Malleable Codes with Split-State Refresh
Antonio Faonio and Jesper Buus Nielsen and Mark Simkin and Daniele Venturi
2018/605 ( PDF )
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials
Yin Li and Yu Zhang and Xiaoli Guo and Chuanda Qi
2018/604 ( PDF )
Attack on Kayawood Protocol: Uncloaking Private Keys
Matvei Kotov and Anton Menshov and Alexander Ushakov
2018/603 ( PDF )
Actively Secure OT-Extension from q-ary Linear Codes
Ignacio Cascudo and René Bødker Christensen and Jaron Skovsted Gundersen
2018/602 ( PDF )
On the Universally Composable Security of OpenStack
Kyle Hogan and Hoda Maleki and Reza Rahaeimehr and Ran Canetti and Marten van Dijk and Jason Hennessey and Mayank Varia and Haibin Zhang
2018/601 ( PDF )
Verifiable Delay Functions
Dan Boneh and Joseph Bonneau and Benedikt Bünz and Ben Fisch
2018/600 ( PDF )
GRANULE: An Ultra lightweight cipher design for embedded security
Gaurav Bansod and Abhijit Patil and Narayan Pisharoty
2018/599 ( PDF )
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
Lucas Schabhüser and Denis Butin and Johannes Buchmann
2018/598 ( PDF )
Trends in design of ransomware viruses
Vlad Constantin Craciun and Andrei Mogage and Emil Simion
2018/597 ( PDF )
Consolidating Security Notions in Hardware Masking
Lauren De Meyer and Begül Bilgin and Oscar Reparaz
2018/596 ( PDF )
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments
Ivan Damgård and Tomasz Kazana and Maciej Obremski and Varun Raj and Luisa Siniscalchi
2018/595 ( -- withdrawn -- )
Randomness analysis for multiple-recursive matrix generator
Subhrajyoti Deb and Bubu Bhuyan, and Sartaj Ul Hasan
2018/594 ( PDF )
Cryptanalysis of SFN Block Cipher
Sadegh Sadeghi and Nasour Bagheri
2018/593 ( PDF )
Ramanujan graphs in cryptography
Anamaria Costache and Brooke Feigon and Kristin Lauter and Maike Massierer and Anna Puskas
2018/592 ( PDF )
XS-circuits in Block Ciphers
Sergey Agievich
2018/591 ( PDF )
4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis.
Sankhanil Dey and Ranjan Ghosh
2018/590 ( PDF )
The Twin Conjugacy Search Problem and Applications
Xiaoming Chen and Weiqing You
2018/589 ( PDF )
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme
Ahmad Al Badawi and Yuriy Polyakov and Khin Mi Mi Aung and Bharadwaj Veeravalli and Kurt Rohloff
2018/588 ( PDF )
BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage
Guilherme Borges and Henrique Domingos and Bernardo Ferreira and João Leitão and Tiago Oliveira and Bernardo Portela
2018/587 ( PDF )
Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model
Tapas Pal and Ratna Dutta
2018/586 ( PDF )
Lower Bounds on Lattice Enumeration with Extreme Pruning
Yoshinori Aono and Phong Q. Nguyen and Takenobu Seito and Junji Shikata
2018/585 ( PDF )
Polynomial Functional Encryption Scheme with Linear Ciphertext Size
Jung Hee Cheon and Seungwan Hong and Changmin Lee and Yongha Son
2018/584 ( PDF )
Bounded Fully Homomorphic Encryption from Monoid Algebras
Mugurel Barcau and Vicentiu Pasol
2018/583 ( PDF )
Ring Homomorphic Encryption Schemes
Mugurel Barcau and Vicentiu Pasol
2018/582 ( PDF )
Pisa: Arbitration Outsourcing for State Channels
Patrick McCorry and Surya Bakshi and Iddo Bentov and Andrew Miller and Sarah Meiklejohn
2018/581 ( PDF )
Smart contracts for bribing miners
Patrick McCorry and Alexander Hicks and Sarah Meiklejohn
2018/580 ( PDF )
Secure MPC: Laziness Leads to GOD
Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai
2018/579 ( PDF )
PIR-PSI: Scaling Private Contact Discovery
Daniel Demmler and Peter Rindal and Mike Rosulek and Ni Trieu
2018/578 ( PDF )
Optimizing Authenticated Garbling for Faster Secure Two-Party Computation
Jonathan Katz and Samuel Ranellucci and Mike Rosulek and Xiao Wang
2018/577 ( PDF )
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
Tore Kasper Frederiksen and Yehuda Lindell and Valery Osheter and Benny Pinkas
2018/576 ( PDF )
Simpler Constructions of Asymmetric Primitives from Obfuscation
Pooya Farshim and Georg Fuchsbauer and Alain Passelègue
2018/575 ( PDF )
An Algorithmic Framework for the Generalized Birthday Problem
Itai Dinur
2018/574 ( PDF )
Correctness and Fairness of Tendermint-core Blockchains
Yackolley Amoussou-Guenou and Antonella Del Pozzo and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
2018/573 ( PDF )
Improved Lightweight Implementations of CAESAR Authenticated Ciphers
Farnoud Farahmand and William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj
2018/572 ( PDF )
Round-Optimal Secure Multiparty Computation with Honest Majority
Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain
2018/571 ( PDF )
Limits of Practical Sublinear Secure Computation
Elette Boyle and Yuval Ishai and Antigoni Polychroniadou
2018/570 ( PDF )
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
Koji Chida and Daniel Genkin and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Yehuda Lindell and Ariel Nof
2018/569 ( PDF )
Andre Esser and Felix Heuer and Robert Kübler and Alexander May and Christian Sohler
2018/568 ( PDF )
Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem
Shixiong Wang and Longjiang Qu and Chao Li and Shaojing Fu and Hao Chen
2018/567 ( PDF )
On the Security Properties of e-Voting Bulletin Boards
Aggelos Kiayias and Annabell Kuldmaa and Helger Lipmaa and Janno Siim and Thomas Zacharias
2018/566 ( PDF )
Private Circuits: A Modular Approach
Prabhanjan Ananth and Yuval Ishai and Amit Sahai
2018/565 ( -- withdrawn -- )
Homomorphic Encryption for Approximate Matrix Arithmetic
Jung Hee Cheon and Andrey Kim
2018/564 ( PDF )
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties
Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka
2018/563 ( PDF )
Multi-client Predicate-only Encryption for Conjunctive Equality Tests
Tim van de Kamp and Andreas Peter and Maarten H. Everts and Willem Jonker
2018/562 ( PDF )
maskVerif: automated analysis of software and hardware higher-order masked implementations
Gilles Barthe and Sonia Belaïd and Gaëtan Cassiers and Pierre-Alain Fouque and Benjamin Grégoire and François-Xavier Standaert
2018/561 ( PDF )
Blockchain Abstract Data Type
Emmanuelle Anceaume and Antonella Del Pozzo and Romaric Ludinard and Maria Potop-Butucaru and Sara Tucci-Piergiovanni
2018/560 ( PDF )
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits
Carsten Baum and Jonathan Bootle and Andrea Cerulli and Rafael del Pino and Jens Groth and Vadim Lyubashevsky
2018/559 ( PDF )
Proofs of Work from Worst-Case Assumptions
Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
2018/558 ( PDF )
Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE
Phillip Rogaway and Yusi Zhang
2018/557 ( PDF )
Non-Interactive Zero-Knowledge Proofs for Composite Statements
Shashank Agrawal and Chaya Ganesh and Payman Mohassel
2018/556 ( PDF )
The Curse of Small Domains: New Attacks on Format-Preserving Encryption
Viet Tung Hoang and Stefano Tessaro and Ni Trieu
2018/555 ( PDF )
Limits on the Power of Garbling Techniques for Public-Key Encryption
Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed
2018/554 ( PDF )
A new class of irreducible pentanomials for polynomial based multipliers in binary fields
Gustavo Banegas and Ricardo Custodio and Daniel Panario
2018/553 ( PDF )
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging
Joseph Jaeger and Igors Stepanovs
2018/552 ( PDF )
On the Complexity of Compressing Obfuscation
Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass
2018/551 ( PDF )
Structured Encryption and Leakage Suppression
Seny Kamara and Tarik Moataz and Olga Ohrimenko
2018/550 ( PDF )
PRank: Fast Analytical Rank Estimation via Pareto Distributions
Liron David and Avishai Wool
2018/549 ( PDF )
Adaptive Garbled RAM from Laconic Oblivious Transfer
Sanjam Garg and Rafail Ostrovsky and Akshayaram Srinivasan
2018/548 ( PDF )
From Laconic Zero-Knowledge to Public-Key Cryptography
Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan
2018/547 ( PDF )
Indifferentiable Authenticated Encryption
Manuel Barbosa and Pooya Farshim
2018/546 ( PDF )
Quantum Lattice Enumeration and Tweaking Discrete Pruning
Yoshinori Aono and Phong Q. Nguyen and Yixin Shen
2018/545 ( PDF )
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
Xiaolu Hou and Jakub Breier and Fuyuan Zhang and Yang Liu
2018/544 ( PDF )
Pseudorandom Quantum States
Zhengfeng Ji and Yi-Kai Liu and Fang Song
2018/543 ( PDF )
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
Kristian Gjøsteen and Tibor Jager
2018/542 ( PDF )
Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions
Rafail Ostrovsky and Giuseppe Persiano and Daniele Venturi and Ivan Visconti
2018/541 ( PDF )
Generic Attacks against Beyond-Birthday-Bound MACs
Gaëtan Leurent and Mridul Nandi and Ferdinand Sibleyras
2018/540 ( PDF )
Must the Communication Graph of MPC Protocols be an Expander?
Elette Boyle and Ran Cohen and Deepesh Data and Pavel Hubacek
2018/539 ( PDF )
Extracting Linearization Equations from Noisy Sources
Daniel Smith-Tone
2018/538 ( PDF )
Non-Malleable Codes for Partial Functions with Manipulation Detection
Aggelos Kiayias and Feng-Hao Liu and Yiannis Tselekounis
2018/537 ( PDF )
Quantum Security Analysis of CSIDH
Xavier Bonnetain and André Schrottenloher
2018/536 ( PDF )
On the Hardness of the Computational Ring-LWR Problem and its Applications
Long Chen and Zhenfeng Zhang and Zhenfei Zhang
2018/535 ( PDF )
Monero - Privacy in the Blockchain
Kurt M. Alonso and Jordi Herrera Joancomartí
2018/534 ( PDF )
Cryptographic Constructions Supporting Implicit Data Integrity
Michael Kounavis and David Durham and Sergej Deutsch
2018/533 ( PDF )
Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model
Alice Pellet-Mary
2018/532 ( PDF )
Ring packing and amortized FHEW bootstrapping
Daniele Micciancio and Jessica Sorrell
2018/531 ( PDF )
Polynomial direct sum masking to protect against both SCA and FIA
Claude Carlet and Abderrahman Daif and Sylvain Guilley and Cédric Tavernier
2018/530 ( PDF )
Two-Message Statistically Sender-Private OT from LWE
Zvika Brakerski and Nico Döttling
2018/529 ( PDF )
Trapdoor Functions from the Computational Diffie-Hellman Assumption
Sanjam Garg and Mohammad Hajiabadi
2018/528 ( PDF )
Recovering short secret keys of RLCE in polynomial time
Alain Couvreur and Matthieu Lequesne and Jean-Pierre Tillich
2018/527 ( PDF )
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities
Achiya Bar-On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir
2018/526 ( PDF )
Towards KEM Unification
Daniel J. Bernstein and Edoardo Persichetti
2018/525 ( PDF )
Location-Proof System based on Secure Multi-Party Computations
Aurélien Dupin and Jean-Marc Robert and Christophe Bidan
2018/524 ( PDF )
New Smooth Projective Hashing For Oblivious Transfer
Bing Zeng
2018/523 ( PDF )
Reducing Complexity of Pairing Comparisons using Polynomial Evaluation
Adam Bobowski and Marcin Słowik
2018/522 ( PDF )
Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1
Yosuke Todo and Takanori Isobe and Willi Meier and Kazumaro Aoki and Bin Zhang
2018/521 ( PDF )
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
Gil Segev and Ido Shahaf
2018/520 ( PDF )
Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries
Mridul Nandi
2018/519 ( PDF )
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules
Brandon Broadnax and Alexander Koch and Jeremias Mechler and Tobias Müller and Jörn Müller-Quade and Matthias Nagel
2018/518 ( PDF )
Secure and Reliable Key Agreement with Physical Unclonable Functions
Onur Gunlu and Tasnad Kernetzky and Onurcan Iscan and Vladimir Sidorenko and Gerhard Kramer and Rafael F. Schaefer
2018/517 ( PDF )
Upper and Lower Bounds for Continuous Non-Malleable Codes
Dana Dachman-Soled and Mukul Kulkarni
2018/516 ( PDF )
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
Atsushi Takayasu and Noboru Kunihiro
2018/515 ( PDF )
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
Osman Bicer and Muhammed Ali Bingol and Mehmet Sabir Kiraz and Albert Levi
2018/514 ( PDF )
Weak Compression and (In)security of Rational Proofs of Storage
Ben Fisch and Shashwat Silas
2018/513 ( PDF )
Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies
Cristina Pérez-Solà and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart
2018/512 ( PDF )
Provably Secure Integration Cryptosystem on Non-Commutative Group
Weiqing You and Xiaoming Chen
2018/511 ( PDF )
Return of GGH15: Provable Security Against Zeroizing Attacks
James Bartusek and Jiaxin Guan and Fermi Ma and Mark Zhandry
2018/510 ( PDF )
Key-Secrecy of PACE with OTS/CafeOBJ
Dominik Klein
2018/509 ( -- withdrawn -- )
Improved Collision Attack on Reduced RIPEMD-160
Fukang Liu and Gaoli Wang and Zhenfu Cao
2018/508 ( PDF )
Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
Mriganka Mandal and Ratna Dutta
2018/507 ( PDF )
Tight Tradeoffs in Searchable Symmetric Encryption
Gilad Asharov and Gil Segev and Ido Shahaf
2018/506 ( PDF )
Secure Two-Party Computation over Unreliable Channels
Ran Gelles and Anat Paskin-Cherniavsky and Vassilis Zikas
2018/505 ( PDF )
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations
Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and François-Xavier Standaert and Pierre-Yves Strub
2018/504 ( PDF )
Quantum Attacks on Some Feistel Block Ciphers
Xiaoyang Dong and Bingyou Dong and Xiaoyun Wang
2018/503 ( PDF )
Finger Printing Data
Gideon Samid
2018/502 ( PDF )
Computer-aided proofs for multiparty computation with active security
Helene Haagh and Aleksandr Karbyshev and Sabine Oechsner and Bas Spitters and Pierre-Yves Strub
2018/501 ( -- withdrawn -- )
Secure Grouping and Aggregation with MapReduce
Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade and Lihua Ye
2018/500 ( PDF )
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda
2018/499 ( PDF )
Secure Two-party Threshold ECDSA from ECDSA Assumptions
Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat
2018/498 ( PDF )
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Qian Guo and Vincent Grosso and François-Xavier Standaert and Olivier Bronchain
2018/497 ( PDF )
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
Xiangfu Song and Changyu Dong and Dandan Yuan and Qiuliang Xu and Minghao Zhao
2018/496 ( PDF )
Efficient Delegated Private Set Intersection on Outsourced Private Datasets
Aydin Abadi and Sotirios Terzis and Roberto Metere and Changyu Dong
2018/495 ( PDF )
Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity
Changyu Dong and Grigorios Loukides
2018/494 ( PDF )
Order-LWE and the Hardness of Ring-LWE with Entropic Secrets
Madalina Bolboceanu and Zvika Brakerski and Renen Perlman and Devika Sharma
2018/493 ( PDF )
Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal
Lior Rotem and Gil Segev
2018/492 ( PDF )
New Instantiations of the CRYPTO 2017 Masking Schemes
Pierre Karpman and Daniel S. Roche
2018/491 ( PDF )
Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol
Matvei Kotov and Anton Menshov and Alexey Myasnikov and Dmitry Panteleev and Alexander Ushakov
2018/490 ( PDF )
Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed
Thorben Moos and Amir Moradi and Tobias Schneider and François-Xavier Standaert
2018/489 ( PDF )
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad van Moorsel
2018/488 ( PDF )
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
Benoît Cogliati and Jooyoung Lee
2018/487 ( PDF )
Unbounded Inner-Product Functional Encryption, with Succinct Keys
Edouard Dufour-Sans and David Pointcheval
2018/486 ( PDF )
Pushing the Communication Barrier in Secure Computation using Lookup Tables
Ghada Dessouky and Farinaz Koushanfar and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni and Michael Zohner
2018/485 ( PDF )
Towards practical key exchange from ordinary isogeny graphs
Luca De Feo and Jean Kieffer and Benjamin Smith
2018/484 ( PDF )
Authenticated Encryption with Nonce Misuse and Physical Leakages: Definitions, Separation Results, and Leveled Constructions
Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert
2018/483 ( PDF )
Compact Multi-Signatures for Smaller Blockchains
Dan Boneh and Manu Drijvers and Gregory Neven
2018/482 ( PDF )
SPDZ2k: Efficient MPC mod 2^k for Dishonest Majority
Ronald Cramer and Ivan Damgård and Daniel Escudero and Peter Scholl and Chaoping Xing
2018/481 ( PDF )
On the Exact Round Complexity of Secure Three-Party Computation
Arpita Patra and Divya Ravi
2018/480 ( PDF )
On Distributional Collision Resistant Hashing
Ilan Komargodski and Eylon Yogev
2018/479 ( PDF )
On the security of Jhanwar-Barua Identity-Based Encryption Scheme
Adrian G. Schipor
2018/478 ( PDF )
On Non-Monotonicity of the Success Probability in Linear Cryptanalysis
Ali Aydin Selcuk
2018/477 ( PDF )
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek
2018/476 ( PDF )
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Stjepan Picek and Annelie Heuser and Alan Jovic and Shivam Bhasin and Francesco Regazzoni
2018/475 ( PDF )
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
Jonathan Katz and Vladimir Kolesnikov and Xiao Wang
2018/474 ( PDF )
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification
Peter Sebastian Nordholt and Meilof Veeningen
2018/473 ( PDF )
A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement
Daniele Friolo and Daniel Masny and Daniele Venturi
2018/472 ( PDF )
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
Giulio Malavolta and Pedro Moreno-Sanchez and Clara Schneidewind and Aniket Kate and Matteo Maffei
2018/471 ( PDF )
Efficient Range ORAM with $\mathbb{O}(\log^{2}{N})$ Locality
Anrin Chakraborti and Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche and Radu Sion
2018/470 ( PDF )
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
Thomas Agrikola and Geoffroy Couteau and Dennis Hofheinz
2018/469 ( PDF )
An Abstract Model of UTxO-based Cryptocurrencies with Scripts
Joachim Zahnentferner
2018/468 ( PDF )
On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs
Yaobin Shen and Lei Wang
2018/467 ( PDF )
Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation
Nigel P. Smart and Tim Wood
2018/466 ( PDF )
A secure end-to-end verifiable e-voting system using zero knowledge based blockchain
Somnath Panja and Bimal Kumar Roy
2018/465 ( PDF )
A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model
Geoffroy Couteau
2018/464 ( PDF )
Cryptanalysis of MORUS
Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Gaëtan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Benoît Viguier
2018/463 ( PDF )
Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map
Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro
2018/462 ( PDF )
Logistic regression over encrypted data from fully homomorphic encryption
Hao Chen and Ran Gilad-Bachrach and Kyoohyung Han and Zhicong Huang and Amir Jalali and Kim Laine and Kristin Lauter
2018/461 ( PDF )
Continuous-Source Fuzzy Extractors: Source uncertainty and security
Benjamin Fuller and Lowen Peng
2018/460 ( PDF )
RapidChain: Scaling Blockchain via Full Sharding
Mahdi Zamani and Mahnush Movahedi and Mariana Raykova
2018/459 ( PDF )
Supersingular Isogeny Oblivious Transfer (SIOT)
Paulo Barreto and Anderson Nascimento and Glaucio Oliveira and Waldyr Benits
2018/458 ( PDF )
Characterizing Collision and Second-Preimage Resistance in Linicrypt
Ian McQuoid and Trevor Swope and Mike Rosulek
2018/457 ( PDF )
From FE Combiners to Secure MPC and Back
Prabhanjan Ananth and Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai
2018/456 ( PDF )
An efficient structural attack on NIST submission DAGS
Elise Barelli and Alain Couvreur
2018/455 ( PDF )
On Renyi Entropies and their Applications to Guessing Attacks in Cryptography
Serdar Boztas
2018/454 ( PDF )
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies
Mohsen Minaei and Pedro Moreno-Sanchez and Aniket Kate
2018/453 ( PDF )
Floppy-Sized Group Signatures from Lattices
Cecilia Boschini and Jan Camenisch and Gregory Neven
2018/452 ( PDF )
Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2
Panjin Kim and Daewan Han and Kyung Chul Jeong
2018/451 ( PDF )
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model
Shuichi Katsumata and Shota Yamada and Takashi Yamakawa
2018/450 ( PDF )
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
David W. Archer and Dan Bogdanov and Liina Kamm and Y. Lindell and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright
2018/449 ( PDF )
Key Prediction Security of Keyed Sponges
Bart Mennink
2018/448 ( PDF )
Non-adaptive Group-Testing Aggregate MAC Scheme
Shoichi Hirose and Junji Shikata
2018/447 ( PDF )
Improved Distinguisher Search Techniques Based on Parity Sets
Xiaofeng Xie and Tian Tian
2018/446 ( PDF )
A voting scheme with post-quantum security based on physical laws
Hua Dong and Li Yang
2018/445 ( PDF )
CRPSF and NTRU Signatures over cyclotomic fields
Yang Wang and Mingqiang Wang
2018/444 ( PDF )
Founding Cryptography on Smooth Projective Hashing
Bing Zeng
2018/443 ( PDF )
Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits
Rishab Goyal
2018/442 ( PDF )
SecureNN: Efficient and Private Neural Network Training
Sameer Wagh and Divya Gupta and Nishanth Chandran
2018/441 ( PDF )
Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols
Amos Beimel and Naty Peter
2018/440 ( PDF )
Formal Analysis of Distance Bounding with Secure Hardware
Handan Kılınç and Serge Vaudenay
2018/439 ( PDF )
Tight Private Circuits: Achieving Probing Security with the Least Refreshing
Sonia Belaïd and Dahmun Goudarzi and Matthieu Rivain
2018/438 ( PDF )
Trivially and Efficiently Composing Masked Gadgets with Probe Isolating Non-Interference
Gaëtan Cassiers and François-Xavier Standaert
2018/437 ( PDF )
Zero-Knowledge Protocols for Search Problems
Ben Berger and Zvika Brakerski
2018/436 ( PDF )
Crash-tolerant Consensus in Directed Graph Revisited
Ashish Choudhury and Gayathri Garimella and Arpita Patra and Divya Ravi and Pratik Sarkar
2018/435 ( PDF )
A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence
Bingsheng Zhang and Roman Oliynykov and Hamed Balogun
2018/434 ( PDF )
Towards Tight Security of Cascaded LRW2
Bart Mennink
2018/433 ( PDF )
Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data
Guowen Xu and Hongwei Li
2018/432 ( PDF )
Hidden Shift Quantum Cryptanalysis and Implications
Xavier Bonnetain and María Naya-Plasencia
2018/431 ( -- withdrawn -- )
Lightweight ASIC Implementation of AEGIS-128
Anubhab Baksi and Vikramkumar Pudi and Swagata Mandal and Anupam Chattopadhyay
2018/430 ( PDF )
A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms
Faruk Göloğlu and Antoine Joux
2018/429 ( PDF )
Amortized Complexity of Information-Theoretically Secure MPC Revisited
Ignacio Cascudo and Ronald Cramer and Chaoping Xing and Chen Yuan
2018/428 ( PDF )
Differential Fault Analysis of Rectangle-80
Shobhit Sinha and Sandip Karmakar
2018/427 ( PDF )
Secure Boot and Remote Attestation in the Sanctum Processor
Ilia Lebedev and Kyle Hogan and Srinivas Devadas
2018/426 ( PDF )
Adaptively Secure Proxy Re-encryption
Georg Fuchsbauer and Chethan Kamath and Karen Klein and Krzysztof Pietrzak
2018/425 ( PDF )
Implementing RLWE-based Schemes Using an RSA Co-Processor
Martin R. Albrecht and Christian Hanser and Andrea Hoeller and Thomas Pöppelmann and Fernando Virdia and Andreas Wallner
2018/424 ( PDF )
Circumventing Cryptographic Deniability with Remote Attestation
Lachlan J. Gunn and Ricardo Vieitez Parra and N. Asokan
2018/423 ( PDF )
Yes, There is an Oblivious RAM Lower Bound!
Kasper Green Larsen and Jesper Buus Nielsen
2018/422 ( PDF )
Message-locked Encryption with File Update
Suyash Kandele and Souradyuti Paul
2018/421 ( PDF )
TFHE: Fast Fully Homomorphic Encryption over the Torus
Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
2018/420 ( PDF )
Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance
Shuichi Katsumata and Takahiro Matsuda and Atsushi Takayasu
2018/419 ( PDF )
Homomorphic Secret Sharing: Optimizations and Applications
Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Michele Orrù
2018/418 ( PDF )
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
Vladimir Kiriansky and Ilia Lebedev and Saman Amarasinghe and Srinivas Devadas and Joel Emer
2018/417 ( PDF )
On the Security of Two-Round Multi-Signatures
Manu Drijvers and Kasra Edalatnejad and Bryan Ford and Eike Kiltz and Julian Loss and Gregory Neven and Igors Stepanovs
2018/416 ( PDF )
Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers
Nadim Kobeissi and Natalia Kulatova
2018/415 ( PDF )
Flux: Revisiting Near Blocks for Proof-of-Work Blockchains
Alexei Zamyatin and Nicholas Stifter and Philipp Schindler and Edgar Weippl and William J. Knottenbelt
2018/414 ( PDF )
Aggregation of Gamma-Signatures and Applications to Bitcoin
Yunlei Zhao
2018/413 ( PDF )
Scaling Backend Authentication at Facebook
Kevin Lewi and Callen Rain and Stephen Weis and Yueting Lee and Haozhi Xiong and Benjamin Yang
2018/412 ( PDF )
PRCash: Fast, Private and Regulated Transactions for Digital Currencies
Karl Wüst and Kari Kostiainen and Vedran Capkun and Srdjan Capkun
2018/411 ( PDF )
Unsupervised Machine Learning on Encrypted Data
Angela Jäschke and Frederik Armknecht
2018/410 ( PDF )
A Note On Clauser-Horne-Shimony-Holt Inequality
Zhengjun Cao and Lihua Liu
2018/409 ( PDF )
Laconic Function Evaluation and Applications
Willy Quach and Hoeteck Wee and Daniel Wichs
2018/408 ( PDF )
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem
Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee
2018/407 ( PDF )
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol
Cencen Wan and Shuyang Tang and Yuncong Zhang and Chen Pan and Zhiqiang Liu and Yu Long and Zhen Liu and Yu Yu
2018/406 ( PDF )
“Larger Keys, Less Complexity” A Strategic Proposition
Gideon Samid
2018/405 ( PDF )
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.
Sankhanil Dey and Ranjan Ghosh
2018/404 ( PDF )
Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Hugo Pacheco and Vitor Pereira and Bernardo Portela
2018/403 ( PDF )
ABY3: A Mixed Protocol Framework for Machine Learning
Payman Mohassel and Peter Rindal
2018/402 ( PDF )
Another Look at Relay and Distance-based Attacks in Contactless Payments
Ioana Boureanu and Anda Anda
2018/401 ( PDF )
Lattice-based Direct Anonymous Attestation (LDAA)
Nada EL Kassem and Liqun Chen and Rachid El Bansarkhani and Ali El Kaafarani and Jan Camenisch and Patrick Hough and Paulo Martins and Leonel Sousa
2018/400 ( PDF )
Agreement with Satoshi – On the Formalization of Nakamoto Consensus
Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Alexei Zamyatin and Edgar Weippl
2018/399 ( PDF )
On the Feasibility of an ECDLP Algorithm
Sergey Grebnev
2018/398 ( PDF )
Fun with Bitcoin smart contracts
Massimo Bartoletti and Tiziana Cimoli and Roberto Zunino
2018/397 ( PDF )
Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards
Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee
2018/396 ( PDF )
New Bleichenbacher Records: Fault Attacks on qDSA Signatures
Akira Takahashi and Mehdi Tibouchi and Masayuki Abe
2018/395 ( PDF )
Secure Computation with Constant Communication Overhead using Multiplication Embeddings
Alexander R. Block and Hemanta K. Maji and Hai H. Nguyen
2018/394 ( PDF )
Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited
Laasya Bangalore and Ashish Choudhury and Arpita Patra
2018/393 ( PDF )
Matvei Kotov and Anton Menshov and Alexander Ushakov
2018/392 ( PDF )
Making AES great again: the forthcoming vectorized AES instruction
Nir Drucker, Shay Gueron and Vlad Krasnov
2018/391 ( PDF )
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
Romain Gay and Lucas Kowalczyk and Hoeteck Wee
2018/390 ( PDF )
MILP-based Differential Attack on Round-reduced GIFT
Baoyu Zhu and Xiaoyang Dong and Hongbo Yu
2018/389 ( PDF )
Distributed SSH Key Management with Proactive RSA Threshold Signatures
Yotam Harchol and Ittai Abraham and Benny Pinkas
2018/388 ( PDF )
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
Seyed Farhad Aghili and Hamid Mala
2018/387 ( PDF )
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority
Ryo Kikuchi and Dai Ikarashi and Takahiro Matsuda and Koki Hamada and Koji Chida
2018/386 ( PDF )
Certificateless Public Key Signature Schemes from Standard Algorithms
Zhaohui Cheng and Liqun Chen
2018/385 ( PDF )
Cryptographic Hashing From Strong One-Way Functions
Justin Holmgren and Alex Lombardi
2018/384 ( -- withdrawn -- )
Fine-Grained and Application-Ready Distance-Bounding Security
Ioana Boureanu and David Gerault and Pascal Lafourcade
2018/383 ( PDF )
CSIDH: An Efficient Post-Quantum Commutative Group Action
Wouter Castryck and Tanja Lange and Chloe Martindale and Lorenz Panny and Joost Renes
2018/382 ( PDF )
Revocable Identity-based Encryption from Codes with Rank Metric
Donghoon Chang and Amit Kumar Chauhan and Sandeep Kumar and Somitra Kumar Sanadhya
2018/381 ( PDF )
Masking the GLP Lattice-Based Signature Scheme at Any Order
Gilles Barthe and Sonia Belaïd and Thomas Espitau and Pierre-Alain Fouque and Benjamin Grégoire and Mélissa Rossi and Mehdi Tibouchi
2018/380 ( PDF )
Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution
Jonathan Bootle and Andrea Cerulli and Jens Groth and Sune Jakobsen and Mary Maller
2018/379 ( PDF )
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)
Wilson Alberto Torres and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Veronika Kuchta and Nandita Bhattacharjee and Man Ho Au and Jacob Cheng
2018/378 ( PDF )
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability
Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas
2018/377 ( PDF )
ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement
Jing Chen and Sergey Gorbunov and Silvio Micali and Georgios Vlachos
2018/376 ( PDF )
Arithmetic Considerations for Isogeny Based Cryptography
Joppe W. Bos and Simon Friedberger
2018/375 ( PDF )
Witness Indistinguishability for any Single-Round Argument with Applications to Access Control
Zvika Brakerski and Yael Tauman Kalai
2018/374 ( PDF )
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
Zhenzhen Bao and Jian Guo and Lei Wang
2018/373 ( PDF )
PanORAMa: Oblivious RAM with Logarithmic Overhead
Sarvar Patel and Giuseppe Persiano and Mariana Raykova and Kevin Yeo
2018/372 ( PDF )
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)
Alexander R. Block and Divya Gupta and Hemanta K. Maji and Hai H. Nguyen
2018/371 ( PDF )
Supersingular isogeny graphs and endomorphism rings: reductions and solutions
Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter and Travis Morrison and Christophe Petit
2018/370 ( PDF )
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
A.V. Menyachikhin
2018/369 ( PDF )
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
Hyung Tae Lee and Huaxiong Wang and Kai Zhang
2018/368 ( PDF )
Encryption with Untrusted Keys: Security against Chosen Objects Attack
Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran
2018/367 ( PDF )
Cache-Timing Attacks on RSA Key Generation
Alejandro Cabrera Aldaya and Cesar Pereida García and Luis Manuel Alvarez Tapia and Billy Bob Brumley
2018/366 ( PDF )
Directional Distance-Bounding Identification Protocols
Ahmad Ahmadi and Reihaneh Safavi-Naini
2018/365 ( PDF )
Anonymous Distance-Bounding Identification
Ahmad Ahmadi and Reihaneh Safavi-Naini and Mamunur Akand
2018/364 ( PDF )
Perfectly Secure Oblivious Parallel RAM
T-H. Hubert Chan and Kartik Nayak and Elaine Shi
2018/363 ( PDF )
Private Anonymous Data Access
Ariel Hamlin and Rafail Ostrovsky and Mor Weiss and Daniel Wichs
2018/362 ( PDF )
Backdoored Hash Functions: Immunizing HMAC and HKDF
Marc Fischlin and Christian Janson and Sogol Mazaheri
2018/361 ( PDF )
Two-message Key Exchange with Strong Security from Ideal Lattices
Zheng Yang and Yu Chen and Song Luo
2018/360 ( PDF )
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Yilei Chen and Vinod Vaikuntanathan and Hoeteck Wee
2018/359 ( -- withdrawn -- )
Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers
Christina-Angeliki Toli and Abdelrahaman Aly and Bart Preneel
2018/358 ( PDF )
Efficient Erasable PUFs from Programmable Logic and Memristors
Yansong Gao and Chenglu Jin and Jeeson Kim and Hussein Nili and Xiaolin Xu and Wayne Burleson and Omid Kavehei and Marten van Dijk and Damith C. Ranasinghe and Ulrich Rührmair
2018/357 ( PDF )
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Stefan Mangard and Florian Mendel and Robert Primas
2018/356 ( PDF )
In Praise of Twisted Embeddings
Jheyne N. Ortiz and Robson R. de Araujo and Diego F. Aranha and Sueli I. R. Costa and Ricardo Dahab
2018/355 ( PDF )
Differential Fault Attacks on Deterministic Lattice Signatures
Leon Groot Bruinderink and Peter Pessl
2018/354 ( PDF )
Start your ENGINEs: dynamically loadable contemporary crypto
Nicola Tuveri and Billy B. Brumley
2018/353 ( PDF )
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
Xin Li
2018/352 ( PDF )
Cryptography with Disposable Backdoors
Kai-Min Chung and Marios Georgiou and Ching-Yi Lai and Vassilis Zikas
2018/351 ( PDF )
A Chosen Plaintext Attack on Offset Public Permutation Mode
Miloslav Homer
2018/350 ( PDF )
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Ulrich Rührmair and Marten van Dijk
2018/349 ( PDF )
An Analysis of the NIST SP 800-90A Standard
Joanne Woodage and Dan Shumow
2018/348 ( PDF )
Monero Ring Attack: Recreating Zero Mixin Transaction Effect
Dimaz Ankaa Wijaya and Joseph Liu and Ron Steinfeld and Dongxi Liu
2018/347 ( PDF )
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
Stanislaw Jarecki and Boyang Wei
2018/346 ( PDF )
Collusion Resistant Traitor Tracing from Learning with Errors
Rishab Goyal and Venkata Koppula and Brent Waters
2018/345 ( PDF )
In-region Authentication
Mamunur Rashid Akand and Reihaneh Safavi-Naini
2018/344 ( PDF )
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
Andrea Cerulli and Emiliano De Cristofaro and Claudio Soriente
2018/343 ( PDF )
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments
Duc Viet Le and Mahimna Kelkar and Aniket Kate
2018/342 ( PDF )
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
Ralph Ankele and Florian Böhl and Simon Friedberger
2018/341 ( PDF )
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens-Peter Kaps and Kris Gaj
2018/340 ( PDF )
Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures
Johannes Blömer and Jan Bobolz
2018/339 ( PDF )
Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme
Thomas Debris-Alazard and Jean-Pierre Tillich
2018/338 ( PDF )
Quantum FHE (Almost) As Secure As Classical
Zvika Brakerski
2018/337 ( PDF )
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Marc Fischlin and Patrick Harasser
2018/336 ( PDF )
SoK: The Problem Landscape of SIDH
David Urbanik and David Jao
2018/335 ( PDF )
Fast modular squaring with AVX512IFMA
Nir Drucker and Shay Gueron
2018/334 ( PDF )
Impossible Differential Attack on QARMA Family of Block Ciphers
Dong Yang and Wen-feng Qi and Hua-jin Chen
2018/333 ( PDF )
Breaking the Circuit-Size Barrier in Secret Sharing
Tianren Liu and Vinod Vaikuntanathan
2018/332 ( PDF )
Differential Cryptanalysis of Round-Reduced Sparx-64/128
Ralph Ankele and Eik List
2018/331 ( PDF )
Estimate all the {LWE, NTRU} schemes!
Martin R. Albrecht and Benjamin R. Curtis and Amit Deo and Alex Davidson and Rachel Player and Eamonn W. Postlethwaite and Fernando Virdia and Thomas Wunderer
2018/330 ( PDF )
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
Joseph K. Liu and Tsz Hon Yuen and Peng Zhang and Kaitai Liang
2018/329 ( PDF )
Symbolic Side-Channel Analysis for Probabilistic Programs
Pasquale Malacaria and MHR. Khouzani and Corina S. Păsăreanu and Quoc-Sang Phan and Kasper Luckow
2018/328 ( PDF )
Improved High-Order Conversion From Boolean to Arithmetic Masking
Luk Bettale and Jean-Sebastien Coron and Rina Zeitoun
2018/327 ( PDF )
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System
Zhengjun Cao and Lihua Liu
2018/326 ( -- withdrawn -- )
Verifier Non-Locality in Interactive Proofs
Claude Crepeau and Nan Yang
2018/325 ( PDF )
Multi-power Post-quantum RSA
John M. Schanck
2018/324 ( PDF )
ACPC: Efficient revocation of pseudonym certificates using activation codes
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva
2018/323 ( PDF )
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2018/322 ( PDF )
DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks
Huili Chen and Bita Darvish Rohani and Farinaz Koushanfar
2018/321 ( PDF )
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
David Derler and Stephan Krenn and Thomas Lorünser and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
2018/320 ( PDF )
General State Channel Networks
Stefan Dziembowski and Sebastian Faust and Kristina Hostáková
2018/319 ( PDF )
HydRand: Practical Continuous Distributed Randomness
Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl
2018/318 ( PDF )
Practical attacks against the Walnut digital signature scheme
Ward Beullens and Simon R. Blackburn
2018/317 ( PDF )
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Dor Fledel and Avishai Wool
2018/316 ( PDF )
Non-Malleable Secret Sharing
Vipul Goyal and Ashutosh Kumar
2018/315 ( PDF )
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
Dahmun Goudarzi and Anthony Journault and Matthieu Rivain and François-Xavier Standaert
2018/314 ( PDF )
Secure top most significant genome variants search: iDASH 2017 competition
Sergiu Carpov and Thibaud Tortech
2018/313 ( PDF )
On the cost of computing isogenies between supersingular elliptic curves
Gora Adj and Daniel Cervantes-Vázquez and Jesús-Javier Chi-Domínguez and Alfred Menezes and Francisco Rodríguez-Henríquez
2018/312 ( PDF )
Multilinear maps via secret ring
Chunsheng Gu
2018/311 ( PDF )
DeepSigns: A Generic Watermarking Framework for Protecting the Ownership of Deep Learning Models
Bita Darvish Rouhani and Huili Chen and farinaz Koushanfar
2018/310 ( PDF )
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi
2018/309 ( -- withdrawn -- )
Error Estimation of Practical Convolution Discrete Gaussian Sampling with Rejection Sampling
Zhongxiang Zheng and Xiaoyun Wang and Guangwu Xu and Chunhuan Zhao
2018/308 ( PDF )
On perfectly secure 2PC in the OT-hybrid model
Bar Alon and Anat Paskin-Cherniavsky
2018/307 ( PDF )
Isolated Curves and the MOV Attack
Travis Scholl
2018/306 ( PDF )
State Separation for Code-Based Game-Playing Proofs
Chris Brzuska and Antoine Delignat-Lavaud and Cedric Fournet and Konrad Kohbrok and Markulf Kohlweiss
2018/305 ( PDF )
Efficient four-dimensional GLV curve with high security
Olivier Bernard and Renaud Dubois and Simon Masson
2018/304 ( PDF )
Geosocial Query with User-Controlled Privacy
Peizhao Hu and Sherman S.M. Chow and Asma Aloufi
2018/303 ( PDF )
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State
Bernardo David and Rafael Dowsley and Mario Larangeira
2018/302 ( PDF )
Rethinking Large-Scale Consensus
Rafael Pass and Elaine Shi
2018/301 ( PDF )
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
Estuardo Alpirez Bock and Chris Brzuska and Wil Michiels and Alexander Treff
2018/300 ( PDF )
Outsourcing Modular Exponentiation in Cryptographic Web Applications
Pascal Mainini and Rolf Haenni
2018/299 ( PDF )
Clusters of Re-used Keys
Stephen Farrell
2018/298 ( PDF )
In search of CurveSwap: Measuring elliptic curve implementations in the wild
Luke Valenta and Nick Sullivan and Antonio Sanso and Nadia Heninger
2018/297 ( PDF )
Fine-Grained Secure Computation
Matteo Campanelli and Rosario Gennaro
2018/296 ( PDF )
Asynchronous ratcheted key exchange
Bertram Poettering and Paul Rösler
2018/295 ( PDF )
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers (Revised Version)
Sayandeep Saha and Debdeep Mukhopadhyay and Pallab Dasgupta
2018/294 ( PDF )
Learning strikes again: the case of the DRS signature scheme
Léo Ducas and Yang Yu
2018/293 ( PDF )
Privacy Amplification from Non-malleable Codes
Eshan Chattopadhyay and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
2018/292 ( PDF )
Linear Biases in AEGIS Keystream
Brice Minaud
2018/291 ( PDF )
Simulations of Optical Emissions for Attacking AES and Masked AES
Guido Marco Bertoni and Lorenzo Grassi and Filippo Melzani
2018/290 ( PDF )
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System
Vireshwar Kumar and He Li and Noah Luther and Pranav Asokan and Jung-Min (Jerry) Park and Kaigui Bian and Martin B. H. Weiss and Taieb Znati
2018/289 ( PDF )
Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue
Phillipp Schoppmann and Lennart Vogelsang and Adrià Gascón and Borja Balle
2018/288 ( PDF )
Constant Size Traceable Ring Signature Scheme without Random Oracles
Ke Gu and Na Wu
2018/287 ( PDF )
Secure Cloud Storage Scheme Based On Hybrid Cryptosystem
Atanu Basu and Indranil Sengupta
2018/286 ( PDF )
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
Björn Haase and Benoît Labrique
2018/285 ( PDF )
Collateral Damage of Facebook Applications: a Comprehensive Study
Iraklis Symeonidis and Gergely Biczók and Fatemeh Shirazi and Cristina Pérez-Solà and Jessica Schroers and Bart Preneel
2018/284 ( PDF )
Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Qichun Wang
2018/283 ( PDF )
Homomorphic Rank Sort Using Surrogate Polynomials
Gizem S. Çetin and Berk Sunar
2018/282 ( PDF )
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
Jason LeGrow and David Jao and Reza Azarderakhsh
2018/281 ( PDF )
Upgrading to Functional Encryption
Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters
2018/280 ( PDF )
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs
Jens Groth and Markulf Kohlweiss and Mary Maller and Sarah Meiklejohn and Ian Miers
2018/279 ( PDF )
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing
Zvika Brakerski and Vadim Lyubashevsky and Vinod Vaikuntanathan and Daniel Wichs
2018/278 ( PDF )
Mixed-radix Naccache-Stern encryption
Rémi Géraud and David Naccache
2018/277 ( PDF )
Approximate and Probabilistic Differential Privacy Definitions
Sebastian Meiser
2018/276 ( PDF )
How to Record Quantum Queries, and Applications to Quantum Indifferentiability
Mark Zhandry
2018/275 ( PDF )
Lattice-Based zk-SNARKs from Square Span Programs
Rosario Gennaro and Michele Minelli and Anca Nitulescu and Michele Orrù
2018/274 ( PDF )
G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions
Rachid El Bansarkhani and Rafael Misoczki
2018/273 ( PDF )
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More
Prabhanjan Ananth and Xiong Fan and Elaine Shi
2018/272 ( PDF )
Multi-Theorem Preprocessing NIZKs from Lattices
Sam Kim and David J. Wu
2018/271 ( PDF )
MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public
Borching Su
2018/270 ( PDF )
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
Douglas R. Stinson
2018/269 ( PDF )
Vault: Fast Bootstrapping for the Algorand Cryptocurrency
Derek Leung and Adam Suhl and Yossi Gilad and Nickolai Zeldovich
2018/268 ( PDF )
Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead
Michael Raskin and Mark Simkin
2018/267 ( PDF )
A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies
Patrick Longa
2018/266 ( PDF )
Authenticated key exchange for SIDH
Steven D. Galbraith
2018/265 ( PDF )
Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography
Ayesha Khalid and James Howe and Ciara Rafferty and Francesco Regazzoni and Maire O’Neill
2018/264 ( PDF )
Security proof for Quantum Key Recycling with noise
Daan Leermakers and Boris Skoric
2018/263 ( -- withdrawn -- )
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
Seyyed Mahdi Sedaghat and Mohammad Hassan Ameri and Mahshid Delavar and Javad Mohajeri and Mohammad Reza Aref
2018/262 ( PDF )
Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies
Joachim Zahnentferner
2018/261 ( PDF )
Post-Quantum EPID Signatures from Symmetric Primitives
Dan Boneh and Saba Eskandarian and Ben Fisch
2018/260 ( PDF )
MDS Matrices with Lightweight Circuits
Sébastien Duval and Gaëtan Leurent
2018/259 ( PDF )
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption
Zheng Yang and Kimmo Järvinen
2018/258 ( PDF )
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers
Alya Geogiana Buja and Shekh Faisal Abdul-Latip and Rabiah Ahmad
2018/257 ( PDF )
On Quantum Indifferentiability
Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Noel Tabia and Dominique Unruh
2018/256 ( PDF )
QC-MDPC: A Timing Attack and a CCA2 KEM
Edward Eaton and Matthieu Lequesne and Alex Parent and Nicolas Sendrier
2018/255 ( PDF )
Topology-Hiding Computation Beyond Semi-Honest Adversaries
Rio LaVigne and Chen-Da Liu-Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi
2018/254 ( PDF )
Logistic Regression Model Training based on the Approximate Homomorphic Encryption
Andrey Kim and Yongsoo Song and Miran Kim and Keewoo Lee and Jung Hee Cheon
2018/253 ( PDF )
Capsule: A Protocol for Secure Collaborative Document Editing
Nadim Kobeissi
2018/252 ( PDF )
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract
Yongge Wang and Qutaibah m. Malluhi
2018/251 ( PDF )
VeritasDB: High Throughput Key-Value Store with Integrity
Rohit Sinha and Mihai Christodorescu
2018/250 ( PDF )
Making Public Key Functional Encryption Function Private, Distributively
Xiong Fan and Qiang Tang
2018/249 ( PDF )
Analysis of Deutsch-Jozsa Quantum Algorithm
Zhengjun Cao and Lihua Liu
2018/248 ( PDF )
Stake-Bleeding Attacks on Proof-of-Stake Blockchains
Peter Gaži and Aggelos Kiayias and Alexander Russell
2018/247 ( PDF )
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Thang Hoang and Muslum Ozgur Ozmen and Yeongjin Jang and Attila A. Yavuz
2018/246 ( PDF )
Universally Verifiable MPC with Applications to IRV Ballot Counting
Chris Culnane and Olivier Pereira and Kim Ramchen and Vanessa Teague
2018/245 ( PDF )
Secure Search via Multi-Ring Fully Homomorphic Encryption
Adi Akavia and Dan Feldman and Hayim Shaul
2018/244 ( PDF )
Faster Homomorphic Linear Transformations in HElib
Shai Halevi and Victor Shoup
2018/243 ( PDF )
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
Indra Deep Mastan and Souradyuti Paul
2018/242 ( PDF )
A New Constant-size Accountable Ring Signature Scheme Without Random Oracles
Sudhakar Kumawat and Souradyuti Paul
2018/241 ( PDF )
zkLedger: Privacy-Preserving Auditing for Distributed Ledgers
Neha Narula and Willy Vasquez and Madars Virza
2018/240 ( PDF )
Towards Non-Interactive Zero-Knowledge for NP from LWE
Ron D. Rothblum and Adam Sealfon and Katerina Sotiraki
2018/239 ( PDF )
RepuCoin: Your Reputation is Your Power
Jiangshan Yu and David Kozhaya and Jeremie Decouchant and Paulo Esteves-Verissimo
2018/238 ( PDF )
Private Set Intersection with Linear Communication from General Assumptions
Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky
2018/237 ( PDF )
On Tightly Secure Non-Interactive Key Exchange
Julia Hesse and Dennis Hofheinz and Lisa Kohl
2018/236 ( PDF )
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network
Yuval Marcus and Ethan Heilman and Sharon Goldberg
2018/235 ( PDF )
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
Julian Loss and Tal Moran
2018/234 ( PDF )
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations
Hagen Sparka and Florian Tschorsch and Björn Scheuermann
2018/233 ( PDF )
Privacy-Preserving Logistic Regression Training
Charlotte Bonte and Frederik Vercauteren
2018/232 ( PDF )
Improved fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
2018/231 ( PDF )
Remarks on Bell's Inequality
Zhengjun Cao and Lihua Liu
2018/230 ( PDF )
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
Jan-Pieter D’Anvers and Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren
2018/229 ( PDF )
Optimizing polynomial convolution for NTRUEncrypt
Wei Dai and William Whyte and Zhenfei Zhang
2018/228 ( PDF )
Non-interactive zaps of knowledge
Georg Fuchsbauer and Michele Orrù
2018/227 ( PDF )
Can We Overcome the $n \log n$ Barrier for Oblivious Sorting?
Wei-Kai Lin and Elaine Shi and Tiancheng Xie
2018/226 ( PDF )
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models
Sandro Coretti and Yevgeniy Dodis and Siyao Guo
2018/225 ( PDF )
A foundation for secret, verifiable elections
Ben Smyth
2018/224 ( PDF )
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons
Rhys Carlton and Aleksander Essex and Krzysztof Kapulkin
2018/223 ( PDF )
Shorter double-authentication preventing signatures for small address spaces
Bertram Poettering
2018/222 ( PDF )
Authentication with weaker trust assumptions for voting systems
Elizabeth A. Quaglia and Ben Smyth
2018/221 ( PDF )
Bandwidth-Hard Functions: Reductions and Lower Bounds
Jeremiah Blocki and Peiyuan Liu and Ling Ren and Samson Zhou
2018/220 ( PDF )
PRO-ORAM: Constant Latency Read-Only Oblivious RAM
Shruti Tople and Yaoqi Jia and Prateek Saxena
2018/219 ( PDF )
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering
Jakub Breier and Dirmanto Jap and Xiaolu Hou and Shivam Bhasin
2018/218 ( PDF )
On Evaluating Fault Resilient Encoding Schemes in Software
Jakub Breier and Xiaolu Hou and Yang Liu
2018/217 ( PDF )
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Mihir Bellare and Wei Dai
2018/216 ( PDF )
Secure Computation with Low Communication from Cross-checking
S. Dov Gordon and Samuel Ranellucci and Xiao Wang
2018/215 ( PDF )
Towards everlasting privacy and efficient coercion resistance in remote electronic voting
Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis and Bingsheng Zhang
2018/214 ( PDF )
RMAC -- A Lightweight Authentication Protocol for Highly Constrained IoT Devices
Ahmad Khoureich Ka
2018/213 ( PDF )
Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack
I. Stewart and D. Ilie and A. Zamyatin and S. Werner and M.F. Torshizi and W.J. Knottenbelt
2018/212 ( PDF )
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts
Thibaut Horel and Sunoo Park and Silas Richelson and Vinod Vaikuntanathan
2018/211 ( PDF )
Number "Not Used" Once - Practical fault attack on pqm4 implementations of NIST candidates
Prasanna Ravi and Debapriya Basu Roy and Shivam Bhasin and Anupam Chattopadhyay and Debdeep Mukhopadhyay
2018/210 ( PDF )
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi
2018/209 ( PDF )
CALYPSO: Private Data Management for Decentralized Ledgers
Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Linus Gasser and Philipp Jovanovic and Ewa Syta and Bryan Ford
2018/208 ( PDF )
TinyKeys: A New Approach to Efficient Multi-Party Computation
Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
2018/207 ( PDF )
Non-Malleable Codes for Small-Depth Circuits
Marshall Ball and Dana Dachman-Soled and Siyao Guo and Tal Malkin and Li-Yang Tan
2018/206 ( PDF )
Reading in the Dark: Classifying Encrypted Digits with Functional Encryption
Edouard Dufour-Sans and Romain Gay and David Pointcheval
2018/205 ( PDF )
Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time
Thaddeus Dryja and Quanquan C. Liu and Sunoo Park
2018/204 ( PDF )
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Serge Fehr and Pierre Karpman and Bart Mennink
2018/203 ( PDF )
Impeccable Circuits
Anita Aghaie and Amir Moradi and Shahram Rasoolzadeh and Aein Rezaei Shahmirzadi and Falk Schellenberg and Tobias Schneider
2018/202 ( PDF )
Doing Real Work with FHE: The Case of Logistic Regression
Jack L.H. Crawford and Craig Gentry and Shai Halevi and Daniel Platt and Victor Shoup
2018/201 ( PDF )
Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers
Jim Basilakis and Bahman Javadi
2018/200 ( PDF )
Hermes. A framework for cryptographically assured access control and data security
Eugene Pilyankevich and Ignat Korchagin and Andrey Mnatsakanov
2018/199 ( PDF )
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
David Derler and Kai Gellert and Tibor Jager and Daniel Slamanig and Christoph Striecks
2018/198 ( PDF )
A Key-recovery Attack on 855-round Trivium
Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier
2018/197 ( PDF )
Green Mining: toward a less energetic impact of cryptocurrencies
Philippe Jacquet and Bernard Mans
2018/196 ( PDF )
Non-Profiled Deep Learning-Based Side-Channel Attacks
Benjamin Timon
2018/195 ( PDF )
Breach-Resistant Structured Encryption
Ghous Amjad and Seny Kamara and Tarik Moataz
2018/194 ( PDF )
Proofs of Catalytic Space
Krzysztof Pietrzak
2018/193 ( PDF )
A New Family of Pairing-Friendly elliptic curves
Michael Scott and Aurore Guillevic
2018/192 ( PDF )
SoK: unraveling Bitcoin smart contracts
Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino
2018/191 ( PDF )
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys
Michael Backes and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider
2018/190 ( PDF )
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption
Sikhar Patranabis and Debdeep Mukhopadhyay
2018/189 ( PDF )
Threshold Implementation in Software - Case Study of PRESENT
Pascal Sasdrich and René Bock and Amir Moradi
2018/188 ( PDF )
Kissing numbers and transference theorems from generalized tail bounds
Stephen D. Miller and Noah Stephens-Davidowitz
2018/187 ( PDF )
Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model
Sean Bowe and Ariel Gabizon
2018/186 ( PDF )
RKHD ElGamal signing and 1-way sums
Daniel R. L. Brown
2018/185 ( PDF )
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius M. Silva
2018/184 ( PDF )
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI
Yongjun Zhao and Sherman S. M. Chow
2018/183 ( PDF )
Simple Proofs of Sequential Work
Bram Cohen and Krzysztof Pietrzak
2018/182 ( PDF )
Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES
Lorenzo Grassi and Christian Rechberger
2018/181 ( PDF )
Rasta: A cipher with low ANDdepth and few ANDs per bit
Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger
2018/180 ( PDF )
Two-Round Multiparty Secure Computation Minimizing Public Key Operations
Sanjam Garg and Peihan Miao and Akshayaram Srinivasan
2018/179 ( PDF )
Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations
Ken Goss and Wei Jiang
2018/178 ( -- withdrawn -- )
2018/177 ( PDF )
On the Use of Independent Component Analysis to Denoise Side-Channel Measurements
Houssem Maghrebi and Emmanuel Prouff
2018/176 ( PDF )
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability
Kamil Kluczniak and Man Ho Au
2018/175 ( PDF )
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys
Vincent Grosso
2018/174 ( PDF )
A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers
Chen-Dong Ye and Tian Tian
2018/173 ( PDF )
Vectorizing Higher-Order Masking
Benjamin Grégoire and Kostas Papagiannopoulos and Peter Schwabe and Ko Stoffelen
2018/172 ( PDF )
A First-Order SCA Resistant AES without Fresh Randomness
Felix Wegener and Amir Moradi
2018/171 ( PDF )
On the Complexity of Simulating Auxiliary Input
Yi-Hsiu Chen and Kai-Min Chung and Jyun-Jie Liao
2018/170 ( PDF )
On the Ring-LWE and Polynomial-LWE problems
Miruna Rosca and Damien Stehlé and Alexandre Wallet
2018/169 ( PDF )
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method
Srimanta Bhattacharya and Mridul Nandi
2018/168 ( PDF )
Statistical Witness Indistinguishability (and more) in Two Messages
Yael Tauman Kalai and Dakshita Khurana and Amit Sahai
2018/167 ( PDF )
On the Existence of Three Round Zero-Knowledge Proofs
Nils Fleischhacker and Vipul Goyal and Abhishek Jain
2018/166 ( PDF )
Optimal Forgeries Against Polynomial-Based MACs and GCM
Atul Luykx and Bart Preneel
2018/165 ( PDF )
The Wonderful World of Global Random Oracles
Jan Camenisch and Manu Drijvers and Tommaso Gagliardoni and Anja Lehmann and Gregory Neven
2018/164 ( PDF )
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
Pavel Hubáček and Alon Rosen and Margarita Vald
2018/163 ( PDF )
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu
2018/162 ( PDF )
Untagging Tor: A Formal Treatment of Onion Encryption
Jean Paul Degabriele and Martijn Stam
2018/161 ( PDF )
Boomerang Connectivity Table: A New Cryptanalysis Tool
Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song
2018/160 ( PDF )
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun
2018/159 ( PDF )
The Missing Difference Problem, and its Applications to Counter Mode Encryption
Gaëtan Leurent and Ferdinand Sibleyras
2018/158 ( PDF )
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin
2018/157 ( PDF )
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
Bernardo David and Rafael Dowsley and Mario Larangeira
2018/156 ( PDF )
A New Approach to Black-Box Concurrent Secure Computation
Sanjam Garg and Susumu Kiyoshima and Omkant Pandey
2018/155 ( PDF )
Memory Lower Bounds of Reductions Revisited
Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, and Keisuke Tanaka
2018/154 ( PDF )
Constrained PRFs for NC1 in Traditional Groups
Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2018/153 ( PDF )
Bootstrapping for Approximate Homomorphic Encryption
Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song
2018/152 ( PDF )
A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules
Jung-Keun Lee and Bonwook Koo and Woo-Hwan Kim
2018/151 ( PDF )
Adaptively Secure Garbling with Near Optimal Online Complexity
Sanjam Garg and Akshayaram Srinivasan
2018/150 ( PDF )
Analysis of Error-Correcting Codes for Lattice-Based Key Exchange
Tim Fritzmann and Thomas Pöppelmann and Johanna Sepulveda
2018/149 ( PDF )
Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation
Ilan Komargodski and Eylon Yogev
2018/148 ( PDF )
The Complexity of Multiparty PSM Protocols and Related Models
Amos Beimel and Eyal Kushilevitz and Pnina Nissim
2018/147 ( PDF )
Sustained Space Complexity
Joel Alwen and Jeremiah Blocki and Krzysztof Pietrzak
2018/146 ( PDF )
Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices
Léo Ducas and Cécile Pierrot
2018/145 ( PDF )
Fast Near Collision Attack on the Grain v1 Stream Cipher
Bin Zhang and Chao Xu and Willi Meier
2018/144 ( PDF )
The Communication Complexity of Private Simultaneous Messages, Revisited
Benny Applebaum and Thomas Holenstein and Manoj Mishra and Ofer Shayevitz
2018/143 ( PDF )
Conjecturally Superpolynomial Lower Bound for Share Size
Shahram Khazaei
2018/142 ( PDF )
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC
Rui Zong and Xiaoyang Dong
2018/141 ( PDF )
Symbolic security of garbled circuits
Baiyu Li and Daniele Micciancio
2018/140 ( PDF )
A Reaction Attack on LEDApkc
Tomas Fabsic and Viliam Hromada and Pavol Zajac
2018/139 ( -- withdrawn -- )
Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth
Wen-jie Lu and Jun Sakuma
2018/138 ( PDF )
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Christian Badertscher and Juan Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas
2018/137 ( PDF )
Naor-Reingold Goes Public: The Complexity of Known-key Security
Pratik Soni and Stefano Tessaro
2018/136 ( PDF )
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Priyanka Bose and Viet Tung Hoang and Stefano Tessaro
2018/135 ( PDF )
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT
Daniel Jost and Christian Badertscher and Fabio Banfi
2018/134 ( PDF )
A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem
Ayan Mahalanobis and Vivek Mallick
2018/133 ( PDF )
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs
Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu
2018/132 ( PDF )
On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields
Gora Adj and Omran Ahmadi and Alfred Menezes
2018/131 ( PDF )
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption
Ran Canetti and Yilei Chen and Leonid Reyzin and Ron D. Rothblum
2018/130 ( PDF )
SMT-based Cube Attack on Simeck32/64
Mojtaba Zaheri and Babak Sadeghiyan
2018/129 ( PDF )
Multi-mode Cryptocurrency Systems
Tuyet Duong and Alexander Chepurnoy and Hong-Sheng Zhou
2018/128 ( PDF )
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation
Charanjit S. Jutla
2018/127 ( PDF )
Accountability in Security Protocols
Robert Künnemann and Deepak Garg and Michael Backes
2018/126 ( PDF )
Onion-AE: Foundations of Nested Encryption
Phillip Rogaway and Yusi Zhang
2018/125 ( PDF )
Challenges in cyber security - Ransomware Phenomenon
Pasca Vlad-Raul and Simion Emil
2018/124 ( PDF )
Evaluating the indistinguishability of the XTS mode in the proposed security model
Nguyen Tuan Anh and Nguyen Bui Cuong
2018/123 ( PDF )
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
Howard M. Heys
2018/122 ( PDF )
BitML: A Calculus for Bitcoin Smart Contracts
Massimo Bartoletti and Roberto Zunino
2018/121 ( PDF )
ECC mod 8^91+5
Daniel R. L. Brown
2018/120 ( PDF )
Efficient Circuit-based PSI via Cuckoo Hashing
Benny Pinkas and Thomas Schneider and Christian Weinert and Udi Wieder
2018/119 ( PDF )
Drive-by Key-Extraction Cache Attacks from Portable Code
Daniel Genkin and Lev Pachmanov and Eran Tromer and Yuval Yarom
2018/118 ( PDF )
Updatable Encryption with Post-Compromise Security
Anja Lehmann and Bjoern Tackmann
2018/117 ( PDF )
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
Shai Halevi and Yuriy Polyakov and Victor Shoup
2018/116 ( PDF )
Unbounded ABE via Bilinear Entropy Expansion, Revisited
Jie Chen and Junqing Gong and Lucas Kowalczyk and Hoeteck Wee
2018/115 ( PDF )
An Improved Affine Equivalence Algorithm for Random Permutations
Itai Dinur
2018/114 ( PDF )
Offline Assisted Group Key Exchange
Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Yao Jiang
2018/113 ( PDF )
Classification of Balanced Quadratic Functions
Lauren De Meyer and Begül Bilgin
2018/112 ( PDF )
Just in Time Hashing
Benjamin Harsha and Jeremiah Blocki
2018/111 ( PDF )
MRHS Solver Based on Linear Algebra and Exhaustive Search
Håvard Raddum and Pavol Zajac
2018/110 ( PDF )
Rank Analysis of Cubic Multivariate Cryptosystems
John Baena and Daniel Cabarcas and Daniel Escudero and Karan Khathuria and Javier Verbel
2018/109 ( PDF )
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme
Soda Diop and Bernard Ousmane Sané and Nafissatou Diarra and Michel Seck
2018/108 ( PDF )
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
F. Betül Durak and Serge Vaudenay
2018/107 ( PDF )
Towards Practical Lattice-Based One-Time Linkable Ring Signatures
Carsten Baum and Huang Lin and Sabine Oechsner
2018/106 ( PDF )
On the Gold Standard for Security of Universal Steganography
Sebastian Berndt and Maciej Liśkiewicz
2018/105 ( PDF )
Combining Private Set-Intersection with Secure Two-Party Computation
Michele Ciampi and Claudio Orlandi
2018/104 ( PDF )
PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus
Yonatan Sompolinsky and Shai Wyborski and Aviv Zohar
2018/103 ( PDF )
Decomposition of Permutations in a Finite Field
Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2018/102 ( PDF )
Grafting Trees: a Fault Attack against the SPHINCS framework
Laurent Castelnovi and Ange Martinelli and Thomas Prest
2018/101 ( PDF )
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
Mustafa A. Mustafa and Sara Cleemput and Abdelrahaman Aly and Aysajan Abidin
2018/100 ( PDF )
A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples
Hart Montgomery
2018/099 ( PDF )
Improved Bounds on the Threshold Gap in Ramp Secret Sharing
Ignacio Cascudo and Jaron Skovsted Gundersen and Diego Ruano
2018/098 ( PDF )
How to Reveal the Secrets of an Obscure White-Box Implementation
Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang
2018/097 ( PDF )
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
Andrea Visconti and Federico Gorla
2018/096 ( PDF )
Paralysis Proofs: Secure Access-Structure Updates for Cryptocurrencies and More
Fan Zhang and Philip Daian and Gabriel Kaptchuk and Iddo Bentov and Ian Miers and Ari Juels
2018/095 ( PDF )
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage
Cees-Bart Breunesse and Ilya Kizhvatov and Ruben Muijrers and Albert Spruyt
2018/094 ( PDF )
Parameterization of Edwards curves on the rational field Q with given torsion subgroups
Linh Tung Vo
2018/093 ( PDF )
Statistical Attacks on Cookie Masking for RC4
Kenneth G. Paterson and Jacob C.N. Schuldt
2018/092 ( PDF )
Constructions of S-boxes with uniform sharing
Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2018/091 ( PDF )
Polynomial multiplication over binary finite fields: new upper bounds
Alessandro De Piccoli and Andrea Visconti and Ottavio Giulio Rizzo
2018/090 ( PDF )
Secure and Scalable Multi-User Searchable Encryption
Cédric Van Rompay and Refik Molva and Melek Önen
2018/089 ( PDF )
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva
2018/088 ( PDF )
Fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
2018/087 ( PDF )
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
Alexei Zamyatin and Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Edgar Weippl and William J. Knottenbelt
2018/086 ( PDF )
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
Claude Carlet and Xi Chen
2018/085 ( PDF )
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin
2018/084 ( PDF )
Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher
Gideon Samid
2018/083 ( PDF )
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017
Maki Yoshida and Satoshi Obana
2018/082 ( PDF )
Synchronized Aggregate Signatures from the RSA Assumption
Susan Hohenberger and Brent Waters
2018/081 ( PDF )
How to validate the secret of a Ring Learning with Errors (RLWE) key
Jintai Ding and Saraswathy RV and Saed Alsayigh and Crystal Clough
2018/080 ( PDF )
A Cryptographic Analysis of the WireGuard Protocol
Benjamin Dowling and Kenneth G. Paterson
2018/079 ( PDF )
Progressive lattice sieving
Thijs Laarhoven and Artur Mariano
2018/078 ( PDF )
A Systematic Approach To Cryptocurrency Fees
Alexander Chepurnoy and Vasily Kharin and Dmitry Meshkov
2018/077 ( PDF )
On the Bit Security of Cryptographic Primitives
Daniele Micciancio and Michael Walter
2018/076 ( PDF )
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
Daniel Dinu and Ilya Kizhvatov
2018/075 ( PDF )
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes
Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang
2018/074 ( PDF )
Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation
Miran Kim and Yongsoo Song and Shuang Wang and Yuhou Xia and Xiaoqian Jiang
2018/073 ( PDF )
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
Chiraag Juvekar and Vinod Vaikuntanathan and Anantha Chandrakasan
2018/072 ( PDF )
Template-based Fault Injection Analysis of Block Ciphers
Ashrujit Ghoshal and Sikhar Patranabis and Debdeep Mukhopadhyay
2018/071 ( PDF )
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas
2018/070 ( PDF )
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Craig Gentry and Adam O'Neill and Leonid Reyzin
2018/069 ( PDF )
Reusing Nonces in Schnorr Signatures
Marc Beunardeau and Aisling Connolly and Houda Ferradi and Rémi Géraud and David Naccache and Damien Vergnaud
2018/068 ( PDF )
Simple Schnorr Multi-Signatures with Applications to Bitcoin
Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille
2018/067 ( PDF )
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping
Hao Chen and Kyoohyung Han
2018/066 ( PDF )
Tweaking Generic OTR to Avoid Forgery Attacks
Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon-Ho Wong
2018/065 ( PDF )
Non-Locality in Interactive Proofs
Claude Crépeau and Nan Yang
2018/064 ( PDF )
Systematization Of A 256-Bit Lightweight Block Cipher Marvin
Sukanya Saha and Krishnendu Rarhi and Abhishek Bhattacharya
2018/063 ( PDF )
The Viability of Post-quantum X.509 Certificates
Panos Kampanakis and Peter Panburana and Ellie Daw and Daniel Van Geest
2018/062 ( PDF )
Countermeasures against a side-channel attack in a kernel memory
Na-Young Ahn and Dong Hoon Lee
2018/061 ( PDF )
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption
Pratish Datta and Tatsuaki Okamoto and Junichi Tomida
2018/060 ( PDF )
A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks
Abhinav Aggarwal and Yue Guo
2018/059 ( PDF )
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
Chen-Dong Ye and Tian Tian
2018/058 ( PDF )
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters
Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
2018/057 ( PDF )
Efficient Noninteractive Certification of RSA Moduli and Beyond
Sharon Goldberg and Leonid Reyzin and Omar Sagga and Foteini Baldimtsi
2018/056 ( PDF )
SETLA: Signature and Encryption from Lattices
François Gérard and Keno Merckx
2018/055 ( PDF )
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction
Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht and Georg Sigl
2018/054 ( PDF )
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures
Romain Gay and Dennis Hofheinz and Lisa Kohl and Jiaxin Pan
2018/053 ( PDF )
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
Emmanuel Prouff and Remi Strullu and Ryad Benadjila and Eleonora Cagli and Cecile Dumas
2018/052 ( PDF )
Optimizing Trees for Static Searchable Encryption
Mohammad Etemad and Mohammad Mahmoody and David Evans
2018/051 ( PDF )
Semantic Security Invariance under Variant Computational Assumptions
Eftychios Theodorakis and John C. Mitchell
2018/050 ( PDF )
A Constructive Perspective on Signcryption Security
Christian Badertscher and Fabio Banfi and Ueli Maurer
2018/049 ( PDF )
Attacks and Countermeasures for White-box Designs
Alex Biryukov and Aleksei Udovenko
2018/048 ( PDF )
Impossible Differential Cryptanalysis on Deoxys-BC-256
Alireza mehrdad and Farokhlagha Moazami and Hadi Soleimany
2018/047 ( PDF )
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
Boris Ryabko and Aleksandr Soskov
2018/046 ( PDF )
Scalable, transparent, and post-quantum secure computational integrity
Eli Ben-Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev
2018/045 ( PDF )
Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials
Jonathan Bootle and Jens Groth
2018/044 ( PDF )
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem
Tadanori Teruya and Kenji Kashiwabara and Goichiro Hanaoka
2018/043 ( PDF )
Efficient Adaptively Secure Zero-knowledge from Garbled Circuits
Chaya Ganesh and Yashvanth Kondi and Arpita Patra and Pratik Sarkar
2018/042 ( PDF )
Improved (Almost) Tightly-Secure Structure-Preserving Signatures
Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy
2018/041 ( PDF )
Related Randomness Security for Public Key Encryption, Revisited
Takahiro Matsuda and Jacob C.N. Schuldt
2018/040 ( PDF )
An Analysis of Acceptance Policies For Blockchain Transactions
Seb Neumayer and Mayank Varia and Ittay Eyal
2018/039 ( PDF )
Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography
Gregor Seiler
2018/038 ( PDF )
On the Message Complexity of Secure Multiparty Computation
Yuval Ishai and Manika Mittal and Rafail Ostrovsky
2018/037 ( PDF )
Weakly Secure Equivalence-Class Signatures from Standard Assumptions
Georg Fuchsbauer and Romain Gay
2018/036 ( PDF )
Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs
Peter Scholl
2018/035 ( PDF )
A Linearly Homomorphic Signature Scheme From Weaker Assumptions
Lucas Schabhüser and Johannes Buchmann and Patrick Struck
2018/034 ( PDF )
Constant-size Group Signatures from Lattices
San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
2018/033 ( PDF )
Two-Factor Password-Authenticated Key Exchange with End-to-End Password Security
Stanislaw Jarecki and Mohammed Jubur and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena
2018/032 ( -- withdrawn -- )
Publicly Verifiable Proofs of Space
Markus Jakobsson
2018/031 ( PDF )
Secure Remote Attestation
Markus Jakobsson
2018/030 ( PDF )
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
Lin Lyu and Shengli Liu and Shuai Han and Dawu Gu
2018/029 ( PDF )
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
Johannes Blömer and Fabian Eidens and Jakob Juhnke
2018/028 ( PDF )
Compact Energy and Delay-Aware Authentication
Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz
2018/027 ( PDF )
A verifiable shuffle for the GSW cryptosystem
Martin Strand
2018/026 ( PDF )
Zero-Knowledge Proof of Decryption for FHE Ciphertexts
Christopher Carr and Anamaria Costache and Gareth T. Davies and Kristian Gjøsteen and Martin Strand
2018/025 ( PDF )
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures
Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li
2018/024 ( PDF )
KEM Combiners
Federico Giacon and Felix Heuer and Bertram Poettering
2018/023 ( PDF )
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups
Benedikt Auerbach and Mihir Bellare and Eike Kiltz
2018/022 ( PDF )
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
Ali El Kaafarani and Shuichi Katsumata
2018/021 ( PDF )
Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography
Yu Chen and Baodong Qin and Haiyang Xue
2018/020 ( PDF )
Ciphertext-Only Attacks against Compact-LWE Submitted to NIST PQC Project
Haoyu Li and Renzhang Liu and Yanbin Pan and Tianyuan Xie
2018/019 ( PDF )
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
Daniel P. Martin and Luke Mather and Elisabeth Oswald
2018/018 ( PDF )
Multi-Key Searchable Encryption, Revisited
Ariel Hamlin and abhi shelat and Mor Weiss and Daniel Wichs
2018/017 ( PDF )
Verifiability of Helios Mixnet
Ben Smyth
2018/016 ( PDF )
New Techniques for Public Key Encryption with Sender Recovery
Murali Godi and Roopa Vishwanathan
2018/015 ( PDF )
On Composable Security for Digital Signatures
Christian Badertscher and Ueli Maurer and Björn Tackmann
2018/014 ( PDF )
Ubiquitous Weak-key Classes of BRW-polynomial Function
Kaiyan Zheng and Peng Wang and Dingfeng Ye
2018/013 ( PDF )
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
Benedikt Auerbach and Bertram Poettering
2018/012 ( PDF )
An Inside Job: Remote Power Analysis Attacks on FPGAs
Falk Schellenberg and Dennis R.E. Gnad and Amir Moradi and Mehdi B. Tahoori
2018/011 ( PDF )
Graded Encoding Schemes from Obfuscation
Pooya Farshim and Julia Hesse and Dennis Hofheinz and Enrique Larraia
2018/010 ( PDF )
Interactively Secure Groups from Obfuscation
Thomas Agrikola and Dennis Hofheinz
2018/009 ( PDF )
Evaluation of Resilience of randomized RNS implementation
Jérôme Courtois and Lokman Abbas-Turki and Jean-Claude Bajard
2018/008 ( PDF )
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
Yu-Ao Chen and Xiao-Shan Gao
2018/007 ( PDF )
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks
Qiong Huang and Hongbo Li
2018/006 ( PDF )
Higher Order Side-Channel Attacks Resilient S-boxes
Liran Lerman and Stjepan Picek and Nikita Veshchikov and Olivier Markowitch
2018/005 ( PDF )
Simple and Efficient Two-Server ORAM
S. Dov Gordon and Jonathan Katz and Xiao Wang
2018/004 ( PDF )
On the Performance of Convolutional Neural Networks for Side-channel Analysis
Stjepan Picek and Ioannis Petros Samiotis and Annelie Heuser and Jaehun Kim and Shivam Bhasin and Axel Legay
2018/003 ( PDF )
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
Moni Naor and Benny Pinkas and Eyal Ronen
2018/002 ( PDF )
The Multiplicative Complexity of 6-variable Boolean Functions
Cagdas Calik and Meltem Sonmez Turan and Rene Peralta
2018/001 ( PDF )
On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate
Benny Applebaum and Barak Arkis

[ Cryptology ePrint archive ]