Cryptology ePrint Archive: Listing for 2019

2019/043 ( PDF )
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
Qian Guo and Thomas Johansson and Alexander Nilsson
2019/042 ( PDF )
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs
Lisa Kohl
2019/041 ( PDF )
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
Bartosz Zoltak
2019/040 ( PDF )
NTTRU: Truly Fast NTRU Using NTT
Vadim Lyubashevsky and Gregor Seiler
2019/039 ( PDF )
Fully Invisible Protean Signatures Schemes
Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2019/038 ( PDF )
Identity-based Broadcast Encryption with Efficient Revocation
Aijun Ge and Puwen Wei
2019/037 ( PDF )
Improving Attacks on Speck32/64 using Deep Learning
Aron Gohr
2019/036 ( PDF )
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR
Shuichi Katsumata and Shota Yamada
2019/035 ( PDF )
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
Daniele Cozzo and Nigel P. Smart
2019/034 ( PDF )
A Formal Treatment of Hardware Wallets
Myrto Arapinis and Andriana Gkaniatsou and Dimitris Karakostas and Aggelos Kiayias
2019/033 ( PDF )
FE for Inner Products and Its Application to Decentralized ABE
Zhedong Wang and Xiong Fan and Feng-Hao Liu
2019/032 ( PDF )
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation
Steven Galbraith and Jake Massimo and Kenneth G. Paterson
2019/031 ( PDF )
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Rishab Goyal and Satyanarayana Vusirikala and Brent Waters
2019/030 ( -- withdrawn -- )
Analysis of Two Countermeasures against the Signal Leakage Attack
Ke Wang and Zhenfeng Zhang
2019/029 ( -- withdrawn -- )
Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$
Huiwen Jia and Chunming Tang and Yanhua Zhang
2019/028 ( PDF )
nQUIC: Noise-Based QUIC Packet Protection
Mathias Hall-Andersen and David Wong and Nick Sullivan and Alishah Chator
2019/027 ( PDF )
Group Signatures with Selective Linkability
Lydia Garms and Anja Lehmann
2019/026 ( PDF )
Non-malleable encryption with proofs of plaintext knowledge and applications to voting
Ben Smyth and Yoshikazu Hanatani
2019/025 ( PDF )
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
Yu Liu and Huicong Liang and Muzhou Li and Luning Huang and Kai Hu and Chenhe Yang and Meiqin Wang
2019/024 ( PDF )
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Yalin Chen and Jue-Sam Chou and Fang-Qi Zhou
2019/023 ( PDF )
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Joachim Breitner and Nadia Heninger
2019/022 ( PDF )
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Anthony Demeri and Thomas Conroy and Alex Nolan and William Diehl
2019/021 ( PDF )
Ilya Aldanov
2019/020 ( PDF )
Decentralizing Inner-Product Functional Encryption
Michel Abdalla and Fabrice Benhamouda and Markulf Kolhweiss and Hendrik Waldner
2019/019 ( PDF )
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach
Chunning Zhou and Wentao Zhang and Tianyou Ding and Zejun Xiang
2019/018 ( PDF )
Generic Constructions of Robustly Reusable Fuzzy Extractor
Yunhua Wen and Shengli Liu and Dawu Gu
2019/017 ( PDF )
CHURP: Dynamic-Committee Proactive Secret Sharing
Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song
2019/016 ( PDF )
Fast Message Franking: From Invisible Salamanders to Encryptment
Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage
2019/015 ( PDF )
More Efficient Algorithms for the NTRU Key Generation using the Field Norm
Thomas Pornin and Thomas Prest
2019/014 ( PDF )
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks
Gaurav Panwar and Satyajayant Misra and Roopa Vishwanathan
2019/013 ( PDF )
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
Changhai Ou and Siew-Kei Lam
2019/012 ( PDF )
A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$
Sihem Mesnager and Kwang Ho Kim and Dujin Jo and Junyop Choe and Munhyon Han and Dok Nam Lee
2019/011 ( PDF )
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson
2019/010 ( PDF )
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC
Rodrigo Abarzúa and Claudio Valencia and Julio López
2019/009 ( PDF )
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
Qian Guo and Thomas Johansson and Erik Mårtensson and Paul Stankovski Wagner
2019/008 ( PDF )
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
Jingyu Pan and Shivam Bhasin and Fan Zhang and Kui Ren
2019/007 ( PDF )
Tight Security Bounds for Generic Stream Cipher Constructions
Matthias Hamann and Matthias Krause
2019/006 ( PDF )
Minimizing Trust in Hardware Wallets with Two Factor Signatures
Antonio Marcedone and Rafael Pass and abhi shelat
2019/005 ( PDF )
ScanSAT: Unlocking Obfuscated Scan Chains
Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, and Ozgur Sinanoglu
2019/004 ( PDF )
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
Guillaume Dabosville and Houssem Maghrebi and Alexis Lhuillery and Julien Bringer and Thanh-Ha Le
2019/003 ( PDF )
Secure and Effective Logic Locking for Machine Learning Applications
Yuntao Liu and Yang Xie and Abhishek Charkraborty and Ankur Srivastava
2019/002 ( PDF )
Leakage-Resilient Group Signature: Definitions and Constructions
Jianye Huang and Qiong Huang
2019/001 ( PDF )
Sanctorum: A lightweight security monitor for secure enclaves
Ilia Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanović and Dawn Song and Srinivas Devadas

[ Cryptology ePrint archive ]