Cryptology ePrint Archive: Listing for 2017

2017/1016 ( PDF )
Differentially Private Access Patterns in Secure Computation
Sahar Mazloom and S. Dov Gordon
2017/1015 ( PDF )
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
Armando Faz-Hernández and Julio López and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez
2017/1014 ( PDF )
Attacking Deterministic Signature Schemes using Fault Attacks
Damian Poddebniak and Juraj Somorovsky and Sebastian Schinzel and Manfred Lochter and Paul Rösler
2017/1013 ( PDF )
Homomorphic SIMMD Operations: Single Instruction Much More Data
Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2017/1012 ( PDF )
Conditional Cube Attack on Round-Reduced River Keyak
Wenquan Bi and Zheng Li and Xiaoyang Dong and Lu Li and Xiaoyun Wang
2017/1011 ( PDF )
Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption
Eduard Hauck and Julian Loss
2017/1010 ( PDF )
A New Digital Rights Management Solution Based on White-Box Cryptography
Jun Liu and Yupu Hu
2017/1009 ( PDF )
Architecture level Optimizations for Kummer based HECC on FPGAs
Gabriel Gallin and Turku Ozlum Celik and Arnaud Tisserand
2017/1008 ( PDF )
Automatic Characterization of Exploitable Faults: A Machine Learning Approach
Sayandeep Saha and Dirmanto Jap and Sikhar Patranabis and Debdeep Mukhopadhyay and Shivam Bhasin and Pallab Dasgupta
2017/1007 ( PDF )
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys
Herman Galteland and Kristian Gjøsteen
2017/1006 ( PDF )
Round and Communication Efficient Unconditionally-secure MPC with $t < n/3$ in Partially Synchronous Network
Ashish Choudhury and Arpita Patra and Divya Ravi
2017/1005 ( PDF )
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Tsunekazu Saito and Keita Xagawa and Takashi Yamakawa
2017/1004 ( PDF )
Garbled Protocols and Two-Round MPC from Bilinear Maps
Sanjam Garg and Akshayaram Srinivasan
2017/1003 ( PDF )
Secure Multi-Party Computation in Large Networks
Varsha Dani and Valerie King and Mahnush Movahedi and Jared Saia and Mahdi Zamani
2017/1002 ( PDF )
On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications
Zhe Li and San Ling and Chaoping Xing and Sze Ling Yeo
2017/1001 ( PDF )
Impossibility of Order-Revealing Encryption in Idealized Models
Mark Zhandry and Cong Zhang
2017/1000 ( PDF )
No right to remain silent: Isolating Malicious Mixes
Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg
2017/999 ( PDF )
Shortest Vector from Lattice Sieving: a Few Dimensions for Free
Léo Ducas
2017/998 ( PDF )
A Comparative Investigation of Approximate Attacks on Logic Encryptions
Yuanqi Shen and Amin Rezaei and Hai Zhou
2017/997 ( PDF )
Hash Proof Systems over Lattices Revisited
Fabrice Benhamouda and Olivier Blazy and Léo Ducas and Willy Quach
2017/996 ( PDF )
Large FHE gates from Tensored Homomorphic Accumulator
Guillaume Bonnoron and Léo Ducas and Max Fillinger
2017/995 ( PDF )
A signature scheme from Learning with Truncation
Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang
2017/994 ( PDF )
Separable Statistics and Multidimensional Linear Cryptanalysis
S. Fauskanger and I. Semaev
2017/993 ( PDF )
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Paulo S. L. M. Barreto and Bernardo David and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento
2017/992 ( PDF )
Leakage Bounds for Gaussian Side Channels
Thomas Unterluggauer and Thomas Korak and Stefan Mangard and Robert Schilling and Luca Benini and Frank Gürkaynak and Michael Muehlberghuber
2017/991 ( PDF )
Secure Code Updates for Smart Embedded Devices based on PUFs
Wei Feng and Yu Qin and Shijun Zhao and Dengguo Feng
2017/990 ( PDF )
Bounds on the Differential Branch Number of Permutations
Sumanta Sarkar and Habeeb Syed
2017/989 ( PDF )
Decentralized Multi-Client Functional Encryption for Inner Product
Jérémy Chotard and Edouard Dufour Sans and Duong Hieu Phan and David Pointcheval
2017/988 ( PDF )
On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers
Yusong Du and Baodian Wei
2017/987 ( PDF )
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
Fuyuki Kitagawa and Keisuke Tanaka
2017/986 ( PDF )
On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves
Kirsten Eisentraeger and Sean Hallgren and Travis Morrison
2017/985 ( PDF )
Breaking Ed25519 in WolfSSL
Niels Samwel and Lejla Batina and Guido Bertoni and Joan Daemen and Ruggero Susella
2017/984 ( PDF )
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Marc Fischlin and Sogol Mazaheri
2017/983 ( PDF )
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions
Miguel Ambrona and Gilles Barthe and Romain Gay and Hoeteck Wee
2017/982 ( PDF )
Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet
Katriel Cohn-Gordon and Cas Cremers
2017/981 ( PDF )
Efficient Maliciously Secure Multiparty Computation for RAM
Marcel Keller and Avishay Yanai
2017/980 ( PDF )
Yoyo Tricks with AES
Sondre Rønjom and Navid Ghaedi Bardeh and Tor Helleseth
2017/979 ( PDF )
Privacy-Preserving Ridge Regression over Distributed Data from LHE
Irene Giacomelli and Somesh Jha and Marc Joye and C. David Page and Kyonghwan Yoon
2017/978 ( PDF )
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny
2017/977 ( PDF )
Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations
Akinori Hosoyamada and Yu Sasaki
2017/976 ( PDF )
Improvements for Gate-Hiding Garbled Circuits
Mike Rosulek
2017/975 ( PDF )
Differential Attacks on Deterministic Signatures
Christopher Ambrose and Joppe W. Bos and Björn Fay and Marc Joye and Manfred Lochter and Bruce Murray
2017/974 ( PDF )
Obscuro: A Bitcoin Mixer using Trusted Execution Environments
Muoi Tran and Loi Luu and Min Suk Kang and Iddo Bentov and Prateek Saxena
2017/973 ( PDF )
Symmetric Searchable Encryption with Sharing and Unsharing
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2017/972 ( PDF )
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings
Michel Abdalla and Dario Catalano and Dario Fiore and Romain Gay and Bogdan Ursu
2017/971 ( PDF )
An Improved Protocol for Securely Solving the Shortest Path Problem and its Application to Combinatorial Auctions
Abdelrahaman Aly and Sara Cleemput
2017/970 ( PDF )
A New Functional Encryption for Multidimensional Range Query
Jia Xu and Ee-Chien Chang and Jianying Zhou
2017/969 ( PDF )
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation
Bei Liang and Aikaterini Mitrokotsa
2017/968 ( PDF )
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls
Sarani Bhattacharya and Clementine Maurice and Shivam Bhasin and Debdeep Mukhopadhyay
2017/967 ( PDF )
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions
Zvika Brakerski and Alex Lombardi and Gil Segev and Vinod Vaikuntanathan
2017/966 ( PDF )
Optimal Parameters for XMSS^MT
Andreas Hülsing and Lea Rausch and Johannes Buchmann
2017/965 ( PDF )
WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes
Andreas Hülsing
2017/964 ( PDF )
Recursive ORAMs with Practical Constructions
Sarvar Patel and Giuseppe Persiano and Kevin Yeo
2017/963 ( PDF )
Non-interactive proofs of proof-of-work
Aggelos Kiayias and Andrew Miller and Dionysis Zindros
2017/962 ( PDF )
Hard and easy problems for supersingular isogeny graphs
Christophe Petit and Kristin Lauter
2017/961 ( PDF )
An Offline Dictionary Attack against zkPAKE Protocol
José Becerra and Petra Sala and Marjan Škrobot
2017/960 ( PDF )
Unforgeable Quantum Encryption
Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz
2017/959 ( PDF )
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU
Dung Hoang Duong and Masaya Yasuda and Tsuyoshi Takagi
2017/958 ( PDF )
Two-Message, Oblivious Evaluation of Cryptographic Functionalities
Nico Döttling and Nils Fleischhacker and Johannes Krupp and Dominique Schröder
2017/957 ( PDF )
From Selective IBE to Full IBE and Selective HIBE
Nico Döttling and Sanjam Garg
2017/956 ( PDF )
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption
Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai
2017/955 ( PDF )
Privacy-Preserving Genome-Wide Association Study is Practical
Charlotte Bonte and Eleftheria Makri and Amin Ardeshirdavani and Jaak Simm and Yves Moreau and Frederik Vercauteren
2017/954 ( PDF )
Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency---Choose Two
Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate
2017/953 ( PDF )
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures
George Teseleanu
2017/952 ( PDF )
Secure Two-Party Computation with Fairness -- A Necessary Design Principle
Yehuda Lindell and Tal Rabin
2017/951 ( PDF )
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
Nina Bindel and Johannes Buchmann and Juliane Krämer and Heiko Mantel and Johannes Schickel and Alexandra Weber
2017/950 ( PDF )
Blockwise $p$-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
Saeed Mahloujifar and Mohammad Mahmoody
2017/949 ( PDF )
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Gunnar Hartung and Björn Kaidel and Alexander Koch and Jessica Koch and Dominik Hartmann
2017/948 ( PDF )
Evolving Secret Sharing: Dynamic Thresholds and Robustness
Ilan Komargodski and Anat Paskin-Cherniavsky
2017/947 ( PDF )
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model
Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam
2017/946 ( PDF )
New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks
Fermi Ma and Mark Zhandry
2017/945 ( PDF )
Moderately Hard Functions: Definition, Instantiations, and Applications
Joël Alwen and Björn Tackmann
2017/944 ( PDF )
A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models
Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam
2017/943 ( PDF )
When does Functional Encryption Imply Obfuscation?
Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed
2017/942 ( PDF )
On Secure Two-Party Computation in Three Rounds
Prabhanjan Ananth and Abhishek Jain
2017/941 ( PDF )
CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage
Reyhaneh Rabaninejad and Mahmoud Ahmadian Attari and Maryam Rajabzadeh Asaar and Mohammad Reza Aref
2017/940 ( PDF )
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
Amos Beimel and Oriol Farràs and Yuval Mintz and Naty Peter
2017/939 ( PDF )
Towards Optimal Pre-processing in Leakage Detection
Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou
2017/938 ( PDF )
On the security of the WOTS-PRF signature scheme
Philip Lafrance and Alfred Menezes
2017/937 ( PDF )
Random Oracles and Non-Uniformity
Sandro Coretti and Yevgeniy Dodis and Siyao Guo and John Steinberger
2017/936 ( PDF )
A tight security reduction in the quantum random oracle model for code-based signature schemes
André Chailloux and Thomas Debris-Alazard
2017/935 ( PDF )
Overcoming Cryptographic Impossibility Results using Blockchains
Rishab Goyal and Vipul Goyal
2017/934 ( PDF )
Adaptively Indistinguishable Garbled Circuits
Zahra Jafargholi and Alessandra Scafuro and Daniel Wichs
2017/933 ( PDF )
Improving Stateless Hash-Based Signatures
Jean-Philippe Aumasson and Guillaume Endignoux
2017/932 ( PDF )
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs
Nils Wisiol and Christoph Graebnitz and Marian Margraf and Manuel Oswald and Tudor A. A. Soroceanu and Benjamin Zengin
2017/931 ( PDF )
Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds
Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti
2017/930 ( PDF )
Four-state Non-malleable Codes with Explicit Constant Rate
Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
2017/929 ( PDF )
How to Securely Compute with Noisy Leakage in Quasilinear Complexity
Dahmun Goudarzi and Antoine Joux and Matthieu Rivain
2017/928 ( PDF )
Environmental Authentication in Malware
Jeremy Blackthorne and Benjamin Kaiser and Benjamin Fuller and Bulent Yener
2017/927 ( PDF )
Near-Optimal Secret Sharing and Error Correcting Codes in AC0
Kuan Cheng and Yuval Ishai and Xin Li
2017/926 ( PDF )
How to Construct a Leakage-Resilient (Stateless) Trusted Party
Daniel Genkin and Yual Ishai and Mor Weiss
2017/925 ( PDF )
Resettably-Sound Resettable Zero Knowledge in Constant Rounds
Wutichai Chongchitmate and Rafail Ostrovsky and Ivan Visconti
2017/924 ( PDF )
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM
T-H. Hubert Chan and Yue Guo and Wei-Kai Lin and Elaine Shi
2017/923 ( PDF )
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension
Long Chen and Zhenfeng Zhang and Xueqing Wang
2017/922 ( PDF )
On the impossibility of entropy reversal, and its application to zero-knowledge proofs
Shachar Lovett and Jiapeng Zhang
2017/921 ( PDF )
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
Shi-Feng Sun and Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Dawu Gu
2017/920 ( PDF )
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations
Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti
2017/919 ( PDF )
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
Oriol Farras and Tarik Kaced and Sebastia Martin and Carles Padro
2017/918 ( PDF )
Linear Repairing Codes and Side-Channel Attacks
Hervé Chabanne and Houssem Maghrebi and Emmanuel Prouff
2017/917 ( PDF )
A practical, perfectly secure password scheme in the bounded retrieval model
Moses Liskov
2017/916 ( PDF )
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model
Eike Kiltz and Vadim Lyubashevsky and Christian Schaffner
2017/915 ( PDF )
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work
Lisa Eckey and Sebastian Faust and Julian Loss
2017/914 ( PDF )
Cache-Oblivious and Data-Oblivious Sorting and Applications
T-H. Hubert Chan and Yue Guo and Wei-Kai Lin and Elaine Shi
2017/913 ( PDF )
Thunderella: Blockchains with Optimistic Instant Confirmation
Rafael Pass and Elaine Shi
2017/912 ( PDF )
On Two Round Rerunnable MPC Protocols
Paul Laird
2017/911 ( PDF )
Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Vincent Immler and Matthias Hiller and Qinzhi Liu and Andreas Lenz and Antonia Wachter-Zeh
2017/910 ( PDF )
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)
Benjamin Lac and Anne Canteaut and Jacques J.A. Fournier and Renaud Sirdey
2017/909 ( PDF )
Clarifying the subset-resilience problem
Jean-Philippe Aumasson and Guillaume Endignoux
2017/908 ( PDF )
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
Ivan Damgård and Claudio Orlandi and Mark Simkin
2017/907 ( PDF )
On differential equivalence of APN functions
Anastasiya Gorodilova
2017/906 ( PDF )
Notes On GGH13 Without The Presence Of Ideals
Martin R. Albrecht and Alex Davidson and Enrique Larraia
2017/905 ( PDF )
A Ring Signature of size $\Theta(\sqrt[3]{n})$ without Random Oracles
Alonso González
2017/904 ( PDF )
On Iterative Collision Search for LPN and Subset Sum
Srinivas Devadas and Ling Ren and Hanshen Xiao
2017/903 ( PDF )
On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments
Omer Paneth and Guy N. Rothblum
2017/902 ( PDF )
How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors
Essam Ghadafi
2017/901 ( PDF )
Stateful Multi-Client Verifiable Computation
Christian Cachin and Esha Ghosh and Dimitrios Papadopoulos and Björn Tackmann
2017/900 ( PDF )
Proof of a shuffle for lattice-based cryptography (Full version)
Núria Costa and Ramiro Martínez and Paz Morillo
2017/899 ( PDF )
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement
Bernardo David and Rafael Dowsley and Mario Larangeira
2017/898 ( PDF )
Putting Wings on SPHINCS
Stefan Kölbl
2017/897 ( PDF )
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
Roderick Bloem and Hannes Gross and Rinat Iusupov and Bettina Könighofer and Stefan Mangard and Johannes Winter
2017/896 ( PDF )
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks
Ashokkumar C and M. Bhargav Sri Venkatesh and Ravi Prakash Giri and Bernard Menezes
2017/895 ( PDF )
Linear Cryptanalysis of DES with Asymmetries
Andrey Bogdanov and Philip S. Vejre
2017/894 ( PDF )
An Efficient Pairing-Based Shuffle Argument
Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac
2017/893 ( PDF )
Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space
Hamza Abusalah and Joël Alwen and Bram Cohen and Danylo Khilko and Krzysztof Pietrzak and Leonid Reyzin
2017/892 ( PDF )
The Iterated Random Function Problem
Ritam Bhaumik and Nilanjan Datta and Avijit Dutta and Nicky Mouha and Mridul Nandi
2017/891 ( PDF )
Finding Bugs in Cryptographic Hash Function Implementations
Nicky Mouha and Mohammad S Raunak and D. Richard Kuhn and Raghu Kacker
2017/890 ( PDF )
On the One-Per-Message Unforgeability of (EC)DSA and its Variants
Manuel Fersch and Eike Kiltz and Bertram Poettering
2017/889 ( PDF )
On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2)
Alexander Maximov and Helena Sjoberg
2017/888 ( PDF )
An asynchronous provably-secure protocol for hidden services
Philippe Camacho and Fernando Krell
2017/887 ( PDF )
Succinct Spooky Free Compilers Are Not Black Box Sound
Zvika Brakerski and Yael Tauman Kalai and Renen Perlman
2017/886 ( PDF )
Compression for trace zero points on twisted Edwards curves
Giulia Bianco and Elisa Gorla
2017/885 ( PDF )
PermuteRam: Optimizing Oblivious Computation for Efficiency
Shruti Tople and Hung Dang and Prateek Saxena and Ee-Chien Chang
2017/884 ( PDF )
Scalar multiplication in compressed coordinates in the trace-zero subgroup
Giulia Bianco and Elisa Gorla
2017/883 ( PDF )
Strengthening the Security of Encrypted Databases: Non-Transitive JOINs
Ilya Mironov and Gil Segev and Ido Shahaf
2017/882 ( PDF )
Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms
Baptiste Olivier and Tony Quertier
2017/881 ( PDF )
Möbius: Trustless Tumbling for Transaction Privacy
Sarah Meiklejohn and Rebekah Mercer
2017/880 ( PDF )
Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version)
Danielle Morgan and Arnis Parsovs
2017/879 ( PDF )
Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations
Jean-Sebastien Coron
2017/878 ( PDF )
Raziel: Private and Verifiable Smart Contracts on Blockchains
David Cerezo Sánchez
2017/877 ( PDF )
Identity-Based Format-Preserving Encryption
Mihir Bellare and Viet Tung Hoang
2017/876 ( PDF )
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE
Benoit Libert and Amin Sakzad and Damien Stehle and Ron Steinfeld
2017/875 ( PDF )
Instantaneous Decentralized Poker
Iddo Bentov and Ranjit Kumaresan and Andrew Miller
2017/874 ( PDF )
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
Zvika Brakerski and Aayush Jain and Ilan Komargodski and Alain Passelegue and Daniel Wichs
2017/873 ( PDF )
Cycle Slicer: An Algorithm for Building Permutations on Special Domains
Sarah Miracle and Scott Yilek
2017/872 ( PDF )
Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability
Jonathan Bootle and Andrea Cerulli and Essam Ghadafi and Jens Groth and Mohammad Hajiabadi and Sune K. Jakobsen
2017/871 ( PDF )
Non-Interactive Multiparty Computation without Correlated Randomness
Shai Halevi and Yuval Ishai and Abhishek Jain and Ilan Komargodski and Amit Sahai and Eylon Yogev
2017/870 ( PDF )
Tightly-Secure Signatures from Five-Move Identification Protocols
Eike Kiltz and Julian Loss and Jiaxin Pan
2017/869 ( PDF )
Amortizing Randomness Complexity in Private Circuits
Sebastian Faust and Clara Paglialonga and Tobias Schneider
2017/868 ( PDF )
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
Takanori Isobe and Kyoji Shibutani
2017/867 ( PDF )
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing
S.Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan
2017/866 ( PDF )
Enhanced Modelling of Authenticated Key Exchange Security
Papa B. Seye and Augustin P. Sarr
2017/865 ( PDF )
The First Thorough Side-Channel Hardware Trojan
Maik Ender and Samaneh Ghandali and Amir Moradi and Christof Paar
2017/864 ( PDF )
Quantum Multicollision-Finding Algorithm
Akinori Hosoyamada and Yu Sasaki and Keita Xagawa
2017/863 ( PDF )
The Minimum Number of Cards in Practical Card-based Protocols
Julia Kastner and Alexander Koch and Stefan Walzer and Daiki Miyahara and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone
2017/862 ( PDF )
Efficient Scalable Constant-Round MPC via Garbled Circuits
Aner Ben-Efraim and Yehuda Lindell and Eran Omri
2017/861 ( PDF )
On the Depth of Oblivious Parallel RAM
T-H. Hubert Chan and Kai-Min Chung and Elaine Shi
2017/860 ( PDF )
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property
Ling Sun and Wei Wang and Meiqin Wang
2017/859 ( PDF )
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups
Jie Chen and Junqing Gong
2017/858 ( PDF )
Differential Fault Analysis of SHA-3 under Relaxed Fault Models
Pei Luo and Yunsi Fei and Liwei Zhang and A. Adam Ding
2017/857 ( PDF )
Image Classification using non-linear Support Vector Machines on Encrypted Data
Anthony Barnett and Jay Santokhi and Michael Simpson and Nigel P. Smart and Charlie Stainton-Bygrave and Srnivas Vivek and Adrian Waller
2017/856 ( PDF )
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash
Benoît Libert and San Ling and Khoa Nguyen and Huaxiong Wang
2017/855 ( PDF )
Fault Attack on ACORN v3
Xiaojuan Zhang and Xiutao Feng and Dongdai Lin
2017/854 ( PDF )
Zero-Knowledge Password Policy Check from Lattices
Khoa Nguyen and Benjamin Hong Meng Tan and Huaxiong Wang
2017/853 ( PDF )
Generic Forward-Secure Key Agreement Without Signatures
Cyprien de Saint Guilhem and Nigel P. Smart and Bogdan Warinschi
2017/852 ( PDF )
Blockcipher-based MACs: Beyond the Birthday Bound without Message Length
Yusuke Naito
2017/851 ( PDF )
How to Use Metaheuristics for Design of Symmetric-Key Primitives
Ivica Nikolić
2017/850 ( PDF )
Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs
Evgenios M. Kornaropoulos and Petros Efstathopoulos
2017/849 ( PDF )
FAST: A New Family of Secure and Efficient Tweakable Enciphering Schemes
Debrup Chakraborty and Sebati Ghosh and Cuauhtemoc Mancillas Lopez and Palash Sarkar
2017/848 ( PDF )
Single Key Variant of PMAC_Plus
Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang
2017/847 ( PDF )
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography
André Chailloux and María Naya-Plasencia and André Schrottenloher
2017/846 ( PDF )
How to Prove Megabytes (Per Second)
Yaron Gvili
2017/845 ( PDF )
Improved Security for OCB3
Ritam Bhaumik and Mridul Nandi
2017/844 ( PDF )
Implementing Conjunction Obfuscation under Entropic Ring LWE
David Bruce Cousins and Giovanni Di Crescenzo and Kamil Doruk Gür and Kevin King and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savaş
2017/843 ( PDF )
Hybrid Encryption in a Multi-User Setting, Revisited
Federico Giacon and Eike Kiltz and Bertram Poettering
2017/842 ( PDF )
Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators
Darren Hurley-Smith and Julio Hernandez-Castro
2017/841 ( PDF )
Efficient Length Doubling From Tweakable Block Ciphers
Yu Long Chen and Atul Luykx and Bart Mennink and Bart Preneel
2017/840 ( PDF )
Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas
Saud Al Musa and Guangwu Xu
2017/839 ( PDF )
Noiseless Fully Homomorphic Encryption
Jing Li and Licheng Wang
2017/838 ( PDF )
Two-Round PAKE from Approximate SPH and Instantiations from Lattices
Jiang Zhang and Yu Yu
2017/837 ( PDF )
Tight Security Analysis of EHtM MAC
Avijit Dutta and Ashwin Jha and Mridul Nandi
2017/836 ( PDF )
Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials
Yin Li and Xingpo Ma and Qin Chen and Chuanda Qi
2017/835 ( PDF )
Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA
Stephen D. Miller and Bhargav Narayanan and Ramarathnam Venkatesan
2017/834 ( PDF )
Authentication from Weak PRFs with Hidden Auxiliary Input
Daniel Masny
2017/833 ( PDF )
Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation
Steven Myers and Adam Shull
2017/832 ( PDF )
Structural Truncated Differential Attacks on round-reduced AES
Lorenzo Grassi
2017/831 ( PDF )
Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases
Geng Wang and Haiyang Zhang and Fengmei Liu
2017/830 ( PDF )
Security proof for Round Robin Differential Phase Shift QKD
Daan Leermakers and Boris Skoric
2017/829 ( PDF )
Automated Fault Analysis of Assembly Code (With a Case Study on PRESENT Implementation)
Jakub Breier and Xiaolu Hou
2017/828 ( PDF )
Standardizing Bad Cryptographic Practice - A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property
Animesh Chhotaray and Adib Nahiyan and Thomas Shrimpton and Domenic J Forte and Mark Tehranipoor
2017/827 ( PDF )
Scaling ORAM for Secure Computation
Jack Doerner and abhi shelat
2017/826 ( PDF )
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits
Brent Carmer and Alex J. Malozemoff and Mariana Raykova
2017/825 ( PDF )
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR
Syed Mahbub Hafiz and Ryan Henry
2017/824 ( PDF )
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control
Ela Berners-Lee
2017/823 ( PDF )
Revive: Rebalancing Off-Blockchain Payment Networks
Rami Khalil and Arthur Gervais
2017/822 ( PDF )
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
Shahin Tajik and Heiko Lohrke and Jean-Pierre Seifert and Christian Boit
2017/821 ( PDF )
A Fast and Verified Software Stack for Secure Function Evaluation
José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir and Benjamin Grégoire and Vincent Laporte and Vitor Pereira
2017/820 ( PDF )
Concurrency and Privacy with Payment-Channel Networks
Giulio Malavolta and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei and Srivatsan Ravi
2017/819 ( PDF )
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
Thang Hoang and Ceyhun D. Ozkaptan and Attila A. Yavuz and Jorge Guajardo and Tam Nguyen
2017/818 ( PDF )
No-Match Attacks and Robust Partnering Definitions – Defining Trivial Attacks for Security Protocols is Not Trivial
Yong Li and Sven Schäge
2017/817 ( PDF )
A Universal Designated Verifier Signature Scheme with Non-Delegatability in the Standard Model
Parvin Rastegari and Mehdi Berenjkoub
2017/816 ( PDF )
A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority
Yehuda Lindell and Ariel Nof
2017/815 ( PDF )
Revisiting the Expected Cost of Solving uSVP and Applications to LWE
Martin R. Albrecht and Florian Göpfert and Fernando Virdia and Thomas Wunderer
2017/814 ( PDF )
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve
Philipp Koppermann and Fabrizio De Santis and Johann Heyszl and Georg Sigl
2017/813 ( PDF )
Industrial Feasibility of Private Information Retrieval
Angela Jäschke and Björn Grohmann and Frederik Armknecht and Andreas Schaad
2017/812 ( PDF )
Optimal PRFs from Blockcipher Designs
Bart Mennink and Samuel Neves
2017/811 ( PDF )
Reassessing Grover's Algorithm
Scott Fluhrer
2017/810 ( PDF )
The TypTop System: Personalized Typo-Tolerant Password Checking
Rahul Chatterjee and Joanne Woodage and Yuval Pnueli and Anusha Chowdhury and Thomas Ristenpart
2017/809 ( PDF )
High-Precision Arithmetic in Homomorphic Encryption
Hao Chen and Kim Laine and Rachel Player and Yuhou Xia
2017/808 ( PDF )
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications
Shuichi Katsumata
2017/807 ( PDF )
FAME: Fast Attribute-based Message Encryption
Shashank Agrawal and Melissa Chase
2017/806 ( PDF )
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
Daniel Genkin and Luke Valenta and Yuval Yarom
2017/805 ( PDF )
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Raphael Bost and Brice Minaud and Olga Ohrimenko
2017/804 ( PDF )
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method
Zheng Li and Wenquan Bi and Xiaoyang Dong and Xiaoyun Wang
2017/803 ( PDF )
Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications
Andrei Lapets and Mayank Varia and Azer Bestavros and Frederick Jansen
2017/802 ( PDF )
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Gottfried Herold and Max Hoffmann and Michael Klooß and Carla Ràfols and Andy Rupp
2017/801 ( PDF )
Attribute-Based Signatures for Turing Machines
Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay
2017/800 ( PDF )
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160
Fukang Liu and Florian Mendel and Gaoli Wang
2017/799 ( PDF )
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques
Vladimir Kolesnikov and Naor Matania and Benny Pinkas and Mike Rosulek and Ni Trieu
2017/798 ( PDF )
More Efficient Universal Circuit Constructions
Daniel Günther and Ágnes Kiss and Thomas Schneider
2017/797 ( PDF )
Multi-Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model
Parvin Rastegari and Mehdi Berenjkoub
2017/796 ( PDF )
Lightweight Symmetric-Key Hidden Vector Encryption without Pairings
Sikhar Patranabis and Debdeep Mukhopadhyay
2017/795 ( PDF )
Private Constrained PRFs (and More) from LWE
Zvika Brakerski and Rotem Tsabary and Vinod Vaikuntanathan and Hoeteck Wee
2017/794 ( PDF )
Anonymous Single-Round Server-Aided Verification
Elena Pagnin and Aikaterini Mitrokotsa and Keisuke Tanaka
2017/793 ( PDF )
McBits Revisited
Tung Chou
2017/792 ( PDF )
Gimli, Lord of the Glittering TRS-80
Jean-Marie Chauvet
2017/791 ( PDF )
Merged Mining: Curse of Cure?
Aljosha Judmayer and Alexei Zamyatin and Nicholas Stifter and Artemios G. Voyiatzis and Edgar Weippl
2017/790 ( PDF )
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation
Nico Döttling and Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges and Roberto Trifiletti
2017/789 ( PDF )
Low-communication parallel quantum multi-target preimage search
Gustavo Banegas and Daniel J. Bernstein
2017/788 ( PDF )
Attack on AES Implementation Exploiting Publicly-visible Partial Result
William Diehl
2017/787 ( PDF )
Indistinguishable Predicates: A New Tool for Obfuscation
Lukas Zobernig and Steven D. Galbraith and Giovanni Russello
2017/786 ( PDF )
With one it is easy, with many it gets complicated: Understanding Channel Security for Groups
Giorgia Azzurra Marson and Bertram Poettering
2017/785 ( PDF )
What about Bob? The Inadequacy of CPA Security for Proxy Reencryption
Aloni Cohen
2017/784 ( PDF )
Secure Channels and Termination: The Last Word on TLS
Colin Boyd and Britta Hale
2017/783 ( PDF )
HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
Marc Fyrbiak and Sebastian Wallat and Pawel Swierczynski and Max Hoffmann and Sebastian Hoppach and Matthias Wilhelm and Tobias Weidlich and Russell Tessier and Christof Paar
2017/782 ( PDF )
Efficient Attribute-Based Secure Keyword Search on the Cloud Storage
Wanfen Guo and Xiaolei Dong and Zhenfu Cao and Jiachen Shen
2017/781 ( PDF )
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR
Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu
2017/780 ( PDF )
New Algorithms for Solving LPN
Bin Zhang and Xinxin Gong
2017/779 ( PDF )
Efficient Constructions for $t$-$ (k,n)^{*}$-Random Grid Visual Cryptographic Schemes
Bibhas Chandra Das and Md Kutubuddin Sardar and Avishek Adhikari
2017/778 ( PDF )
MCMix: Anonymous Messaging via Secure Multiparty Computation
Nikolaos Alexopoulos and Aggelos Kiayias and Riivo Talviste and Thomas Zacharias
2017/777 ( PDF )
Encrypting Messages for Incomplete Chains of Certificates
Sanjit Chatterjee and Deepak Garg and Aniket Kate and Tobias Theobald
2017/776 ( PDF )
Field lifting for smaller UOV public keys
Ward Beullens and Bart Preneel
2017/775 ( PDF )
Proofs of Work for Blockchain Protocols
Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos
2017/774 ( PDF )
Computational problems in supersingular elliptic curve isogenies
Steven D. Galbraith and Frederik Vercauteren
2017/773 ( PDF )
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
Sebastian Messmer and Jochen Rill and Dirk Achenbach and Jörn Müller-Quade
2017/772 ( PDF )
Oblivious Computation with Data Locality
Gilad Asharov and T-H. Hubert Chan and Kartik Nayak and Rafael Pass and Ling Ren and Elaine Shi
2017/771 ( PDF )
Post-quantum security of the sponge construction
Jan Czajkowski and Leon Groot Bruinderink and Andreas Hülsing and Christian Schaffner and Dominique Unruh
2017/770 ( PDF )
PAPEETE: Private, Authorized, and Fast Personal Genomic Testing
Angelo Massimo Perillo and Emiliano De Cristofaro
2017/769 ( PDF )
Malicious-Secure Private Set Intersection via Dual Execution
Peter Rindal and Mike Rosulek
2017/768 ( PDF )
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing
S.Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan
2017/767 ( PDF )
Quantum Key-Recovery on full AEZ
Xavier Bonnetain
2017/766 ( PDF )
GLYPH: A New Insantiation of the GLP Digital Signature Scheme
Arjun Chopra
2017/765 ( PDF )
Necessary conditions for designing secure stream ciphers with the minimal internal states
Vahid Amin Ghafari and Honggang Hu and Mohammadsadegh alizadeh
2017/764 ( PDF )
Categorising and Comparing Cluster-Based DPA Distinguishers
Xinping Zhou and Carolyn Whitnall and Elisabeth Oswald and Degang Sun and Zhu Wang
2017/763 ( PDF )
Improved Fully Homomorphic Encryption without Bootstrapping
Masahiro Yagisawa
2017/762 ( PDF )
Private Collaborative Neural Network Learning
Melissa Chase and Ran Gilad-Bachrach and Kim Laine and Kristin Lauter and Peter Rindal
2017/761 ( PDF )
Anti-SAT: Mitigating SAT Attack on Logic Locking
Yang Xie and Ankur Srivastava
2017/760 ( -- withdrawn -- )
GIFT: A Small Present (Full version)
Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo
2017/759 ( PDF )
Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings
Carsten Baum and Vadim Lyubashevsky
2017/758 ( PDF )
On Improving Integer Factorization and Discrete Logarithm Computation using Partial Triangulation
Fabrice Boudot
2017/757 ( PDF )
CAKE: Code-based Algorithm for Key Encapsulation
Paulo S. L. M. Barreto and Shay Gueron and Tim Gueneysu and Rafael Misoczki and Edoardo Persichetti and Nicolas Sendrier and Jean-Pierre Tillich
2017/756 ( PDF )
Verifiable Private Polynomial Evaluation
Xavier Bultel and Manik Lal Das and Hardik Gajera and David Gérault and Matthieu Giraud and Pascal Lafourcade
2017/755 ( PDF )
Efficient, Reusable Fuzzy Extractors from LWE
Daniel Apon and Chongwon Cho and Karim Eldefrawy and Jonathan Katz
2017/754 ( PDF )
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions
Ahto Buldas and Matthias Geihs and Johannes Buchmann
2017/753 ( PDF )
CryptHOL: Game-based Proofs in Higher-order Logic
David A. Basin and Andreas Lochbihler and S. Reza Sefidgar
2017/752 ( PDF )
Attribute-Based Group Homomorphic Encryption and Additively Homomorphic IBE
Michael Clear and Ciaran McGoldrick
2017/751 ( PDF )
Twisting Lattice and Graph Techniques to Compress Transactional Ledgers
Rémi Géraud and David Naccache and Răzvan Roşie
2017/750 ( PDF )
Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
Răzvan Roşie
2017/749 ( PDF )
Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency
Ioannis Demertzis and Dimitrios Papadopoulos and Charalampos Papamanthou
2017/748 ( PDF )
Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes
Jean-Claude Bajard and Julien Eynard and Anwar Hasan and Paulo Martins and Leonel Sousa and Vincent Zucca
2017/747 ( PDF )
sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives
Riham AlTawy and Raghvendra Rohit and Morgan He and Kalikinkar Mandal and Gangqiang Yang and Guang Gong
2017/746 ( PDF )
On the Tightness of Forward-Secure Signature Reductions
Michel Abdalla and Fabrice Benhamouda and David Pointcheval
2017/745 ( PDF )
A Quantum ``Magic Box'' for the Discrete Logarithm Problem
Burton S. Kaliski Jr.
2017/744 ( PDF )
Binary Hash Tree based Certificate Access Management
Virendra Kumar and Jonathan Petit and William Whyte
2017/743 ( PDF )
Cryptanalysis of 22 1/2 rounds of Gimli
Mike Hamburg
2017/742 ( PDF )
Cryptanalysis of Compact-LWE
Jonathan Bootle and Mehdi Tibouchi
2017/741 ( PDF )
Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security
Peng Xu and Xia Gao and Wei Wang and Willy Susilo and Qianhong Wu and Hai Jin
2017/740 ( PDF )
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures -- Profiling Attacks without Pre-Processing --
Eleonora Cagli and Cécile Dumas and Emmanuel Prouff
2017/739 ( -- withdrawn -- )
Secure Storage with Replication and Transparent Deduplication
Iraklis Leontiadis and Reza Curtmola
2017/738 ( PDF )
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions
Mihaela Ion and Ben Kreuter and Erhan Nergiz and Sarvar Patel and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung
2017/737 ( PDF )
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
Hanyu Quan and Boyang Wang and Iraklis Leontiadis and Ming Li and Yuqing Zhang
2017/736 ( PDF )
SGX Remote Attestation is not Sufficient
Yogesh Swami
2017/735 ( PDF )
Faster Bootstrapping with Multiple Addends
TanPing ZHOU and XiaoYuan YANG and LongFei LIU and Wei ZHANG and YiTao DING
2017/734 ( PDF )
Round Optimal Concurrent Non-Malleability from Polynomial Hardness
Dakshita Khurana
2017/733 ( PDF )
Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme
Yongge Wang
2017/732 ( PDF )
Privacy-Preserving Ridge Regression Without Garbled Circuits
Marc Joye
2017/731 ( PDF )
Revisiting Difficulty Control for Blockchain Systems
Dmitry Meshkov and Alexander Chepurnoy and Marc Jansen
2017/730 ( PDF )
Second Order Statistical Behavior of LLL and BKZ
Yang Yu and Léo Ducas
2017/729 ( PDF )
Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses
Subhabrata Samajder and Palash Sarkar
2017/728 ( PDF )
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
Giulia Traverso and Carlos Garcia Cordero and Mehrdad Nojoumian and Reza Azarderakhsh and Denise Demirel and Sheikh Mahbub Habib and Johannes Buchmann
2017/727 ( PDF )
A note on the implementation of the Number Theoretic Transform
Michael Scott
2017/726 ( PDF )
Proposal of primitive polynomials for Linux kernel PRNG
2017/725 ( PDF )
AS$^3$: Adaptive Social Secret Sharing for Distributed Storage Systems
Giulia Traverso and Denise Demirel and Sheikh Mahbub Habib and Johannes Buchmann
2017/724 ( PDF )
Dynamic and Verifiable Hierarchical Secret Sharing
Giulia Traverso and Denise Demirel and Johannes Buchmann
2017/723 ( PDF )
An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both
Rotem Tsabary
2017/722 ( PDF )
A Simpler Rate-Optimal CPIR Protocol
Helger Lipmaa and Kateryna Pavlyk
2017/721 ( PDF )
On Making U2F Protocol Leakage-Resilient via Re-keying
Donghoon Chang and Sweta Mishra and Somitra Kumar Sanadhya and Ajit Pratap Singh1
2017/720 ( PDF )
Computing Low-Weight Discrete Logarithms
Bailey Kacsmar and Sarah Plosker and Ryan Henry
2017/719 ( PDF )
Efficient Proactive Secret Sharing
Jacqueline Brendel and Denise Demirel
2017/718 ( PDF )
Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper)
Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura
2017/717 ( PDF )
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes
Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon-Ho Wong
2017/716 ( PDF )
Anonymous Post-Quantum Cryptocash
Huang Zhang and Fangguo Zhang and Haibo Tian and Man Ho Au
2017/715 ( PDF )
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Le Trieu Phong and Yoshinori Aono and Takuya Hayashi and Lihua Wang and Shiho Moriai
2017/714 ( PDF )
The Edited Truth
Shafi Goldwasser and Saleet Klein and Daniel Wichs
2017/713 ( PDF )
More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema
Paul Rösler and Christian Mainka and Jörg Schwenk
2017/712 ( PDF )
On desynchronised El Gamal algorithm
Vasyl Ustimenko
2017/711 ( PDF )
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model
Sebastian Faust and Vincent Grosso and Santos Merino Del Pozo and Clara Paglialonga and François-Xavier Standaert
2017/710 ( PDF )
Distributed Computing with Channel Noise
Abhinav Aggarwal and Varsha Dani and Thomas P. Hayes and Jared Saia
2017/709 ( PDF )
spKEX: An optimized lattice-based key exchange
Sauvik Bhattacharya and Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen
2017/708 ( PDF )
Reconsidering the Security Bound of AES-GCM-SIV
Tetsu Iwata and Yannick Seurin
2017/707 ( PDF )
Privacy-Preserving Ridge Regression on Distributed Data
Irene Giacomelli and Somesh Jha and C. David Page and Kyonghwan Yoon
2017/706 ( PDF )
SCATTER : A New Dimension in Side-Channel
Hugues Thiebeauld and Georges Gagnerot and Antoine Wurcker and Christophe Clavier
2017/705 ( PDF )
Multi-Hop Distance Estimation: How Far are You?
Aikaterini Mitrokotsa and Cristina Onete and Elena Pagnin and Mahesh Perera
2017/704 ( PDF )
A Key Backup Scheme Based on Bitcoin
Zhongxiang Zheng and Chunhuan Zhao and Haining Fan and Xiaoyun Wang
2017/703 ( PDF )
Optimally Sound Sigma Protocols Under DCRA
Helger Lipmaa
2017/702 ( PDF )
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
Shay Gueron and Yehuda Lindell
2017/701 ( PDF )
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson
2017/700 ( PDF )
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
Johannes Buchmann and Denise Demirel and Lucas Schabhüser and Patrick Struck
2017/699 ( PDF )
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
Damien Couroussé and Thierno Barry and Bruno Robisson and Philippe Jaillon and Olivier Potin and Jean-Louis Lanet
2017/698 ( PDF )
Noise Distributions in Homomorphic Ring-LWE
Sean Murphy and Rachel Player
2017/697 ( PDF )
Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying
Liliya R. Ahmetzyanova and Evgeny K. Alekseev and Igor B. Oshkin and Stanislav V. Smyshlyaev
2017/696 ( PDF )
A Humble Theory and Application for Logic Encryption
Hai Zhou
2017/695 ( PDF )
Updatable Tokenization: Formal Definitions and Provably Secure Constructions
Christian Cachin and Jan Camenisch and Eduarda Freire-Stoegbuchner and Anja Lehmann
2017/694 ( PDF )
Atomically Trading with Roger: Gambling on the success of a hardfork
Patrick McCorry and Ethan Heilman and Andrew Miller
2017/693 ( PDF )
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers
Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song
2017/692 ( PDF )
Towards Characterizing Securely Computable Two-Party Randomized Functions
Deepesh Data and Manoj Prabhakaran
2017/691 ( PDF )
Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak
Fanbao Liu and Fengmei Liu
2017/690 ( PDF )
Post-Quantum Key Exchange on FPGAs
Po-Chun Kuo and Wen-Ding Li and Yu-Wei Chen and Yuan-Che Hsu and Bo-Yuan Peng and Chen-Mou Cheng and Bo-Yin Yang
2017/689 ( PDF )
On the security of HMFEv
Yasufumi Hashimoto
2017/688 ( PDF )
Quantum Collision-Finding in Non-Uniform Random Functions
Marko Balogh and Edward Eaton and Fang Song
2017/687 ( -- withdrawn -- )
Impossibility of Secure Multi-Party Products in Non-Abelian Groups
Jessica Covington and Megan Golbek and Mike Rosulek
2017/686 ( PDF )
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol
Ren Zhang and Bart Preneel
2017/685 ( PDF )
Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication
Dongxi Liu and Nan Li and Jongkil Kim and Surya Nepal
2017/684 ( PDF )
Z-Channel: Scalable and Efficient Scheme in Zerocash
Yuncong Zhang and Yu Long and Zhen Liu and Zhiqiang Liu and Dawu Gu
2017/683 ( PDF )
Efficient Privacy-Preserving General Edit Distance and Beyond
Ruiyu Zhu and Yan Huang
2017/682 ( PDF )
Conditional Blind Signatures
Alexandros Zacharakis and Panagiotis Grontas and Aris Pagourtzis
2017/681 ( PDF )
Controlled-NOT function can provoke biased interpretation from Bell's test experiments
Alexandre de Castro
2017/680 ( PDF )
SOFIA: MQ-based signatures in the QROM
Ming-Shing Chen and Andreas Hülsing and Joost Rijneveld and Simona Samardjiska and Peter Schwabe
2017/679 ( PDF )
Searchable Encryption with Access Control
Nils Löken
2017/678 ( PDF )
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Akhilesh Anilkumar Siddhanti and Santanu Sarkar and Subhamoy Maitra and Anupam Chattopadhyay
2017/677 ( PDF )
Faster Unbalanced Private Set Intersection
Amanda C. Davi Resende and Diego F. Aranha
2017/676 ( PDF )
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC
Rajkumar Ramasamy and S.Sree Vivek and Praveen George and Bharat S. Rawal Kshatriya
2017/675 ( PDF )
Memory-Tight Reductions
Benedikt Auerbach and David Cash and Manuel Fersch and Eike Kiltz
2017/674 ( PDF )
Transparent Memory Encryption and Authentication
Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard
2017/673 ( PDF )
Differential Fault Analysis Automation
Sayandeep Saha, and Ujjawal Kumar, and Debdeep Mukhopadhyay, and Pallab Dasgupta
2017/672 ( PDF )
Coding for interactive communication beyond threshold adversaries
Anat Paskin-Cherniavsky and Slava Radune
2017/671 ( PDF )
Guru: Universal Reputation Module for Distributed Consensus Protocols
Alex Biryukov and Daniel Feher and Dmitry Khovratovich
2017/670 ( PDF )
Private Set Intersection for Unequal Set Sizes with Mobile Applications
Ágnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas
2017/669 ( PDF )
Speeding up Elliptic Curve Scalar Multiplication without Precomputation
Kwang Ho Kim and Junyop Choe and Song Yun Kim and Namsu Kim and Sekung Hong
2017/668 ( PDF )
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
Sikhar Patranabis and Debdeep Mukhopadhyay
2017/667 ( PDF )
High-speed key encapsulation from NTRU
Andreas Hülsing and Joost Rijneveld and John M. Schanck and Peter Schwabe
2017/666 ( PDF )
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees
Katriel Cohn-Gordon and Cas Cremers and Luke Garratt and Jon Millican and Kevin Milner
2017/665 ( PDF )
Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing
Michael Raskin
2017/664 ( PDF )
Message Franking via Committing Authenticated Encryption
Paul Grubbs and Jiahui Lu and Thomas Ristenpart
2017/663 ( PDF )
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Thomas Unterluggauer and Mario Werner and Stefan Mangard
2017/662 ( PDF )
SURF: A new code-based signature scheme
Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich
2017/661 ( PDF )
MuSE: Multimodal Searchable Encryption for Cloud Applications
Bernardo Ferreira and João Leitão and Henrique Domingos
2017/660 ( PDF )
Profiling Good Leakage Models For Masked Implementations
Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou
2017/659 ( PDF )
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
Russell W. F. Lai and Sherman S. M. Chow
2017/658 ( PDF )
Privacy for Targeted Advertising
Avradip Mandal and John Mitchell and Hart Montgomery and Arnab Roy
2017/657 ( PDF )
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Sanjit Chatterjee and Sayantan Mukherjee and Tapas Pandit
2017/656 ( PDF )
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
Lei Fan and Hong-Sheng Zhou
2017/655 ( PDF )
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
Jiao Hu and Ruilin Li and Chaojing Tang
2017/654 ( PDF )
A Secure and Private Billing Protocol for Smart Metering
Tom Eccles and Basel Halak
2017/653 ( PDF )
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
Fanbao Liu and Fengmei Liu
2017/652 ( PDF )
Pseudorandom Functions: Three Decades Later
Andrej Bogdanov and Alon Rosen
2017/651 ( -- withdrawn -- )
Rescuing LoRaWAN 1.0
Gildas Avoine and Loïc Ferreira
2017/650 ( PDF )
Efficient Public Trace and Revoke from Standard Assumptions
Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehle and Shota Yamada
2017/649 ( PDF )
Blockcipher-based Authenticated Encryption: How Small Can We Go?
Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi
2017/648 ( PDF )
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ismail Khoffi and Justin Cappos and Bryan Ford
2017/647 ( PDF )
A TMDTO Attack Against Lizard
Subhamoy Maitra and Nishant Sinha and Akhilesh Siddhanti and Ravi Anand and Sugata Gangopadhyay
2017/646 ( PDF )
Rational Trust Modeling
Mehrdad Nojoumian
2017/645 ( PDF )
SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security
Shay Gueron and Nicky Mouha
2017/644 ( PDF )
On Space-Scarce Economy In Blockchain Systems
Alexander Chepurnoy and Dmitry Meshkov
2017/643 ( PDF )
Private Data Aggregation on a Budget
Morten Dahl and Valerio Pastro and Mathieu Poumeyrol
2017/642 ( PDF )
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
Nasrollah Pakniat and Mahnaz Noroozi and Ziba Eslami
2017/641 ( PDF )
Integer Version of Ring-LWE and its Applications
Gu Chunsheng
2017/640 ( PDF )
Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
Fabrice Benhamouda and Houda Ferradi and Rémi Géraud and David Naccache
2017/639 ( PDF )
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Jan Camenisch and Liqun Chen and Manu Drijvers and Anja Lehmann and David Novick and Rainer Urian
2017/638 ( PDF )
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
2017/637 ( PDF )
Very High Order Masking: Efficient Implementation and Security Evaluation
Anthony Journault and François-Xavier Standaert
2017/636 ( PDF )
Implementing 128-bit Secure MPKC Signatures
Ming-Shing Chen and Wen-Ding Li and Bo-Yuan Peng and Bo-Yin Yang and Chen-Mou Cheng
2017/635 ( PDF )
PERUN: Virtual Payment Channels over Cryptographic Currencies
Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski
2017/634 ( PDF )
CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM
Joppe Bos and Léo Ducas and Eike Kiltz and Tancrède Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehlé
2017/633 ( PDF )
CRYSTALS -- Dilithium: Digital Signatures from Module Lattices
Leo Ducas and Tancrede Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehle
2017/632 ( PDF )
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
Dahmun Goudarzi and Matthieu Rivain and Damien Vergnaud and Srinivas Vivek
2017/631 ( PDF )
Certifying Trapdoor Permutations, Revisited
Ran Canetti and Amit Lichtenberg
2017/630 ( PDF )
Gimli: a cross-platform permutation
Daniel J. Bernstein and Stefan Kölbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and François-Xavier Standaert and Yosuke Todo and Benoît Viguier
2017/629 ( PDF )
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
Romain Poussier and Yuanyuan Zhou and François-Xavier Standaert
2017/628 ( PDF )
Middle-Product Learning With Errors
Miruna Rosca and Amin Sakzad and Ron Steinfeld and Damien Stehle
2017/627 ( PDF )
Sliding right into disaster: Left-to-right sliding windows leak
Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom
2017/626 ( PDF )
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
Hai Zhou and Ruifeng Jiang and Shuyu Kong
2017/625 ( PDF )
How to Break Secure Boot on FPGA SoCs through Malicious Hardware
Nisha Jacob and Johann Heyszl and Andreas Zankl and Carsten Rolfes and Georg Sigl
2017/624 ( PDF )
Fast Leakage Assessment
Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede
2017/623 ( PDF )
Back to Massey: Impressively fast, scalable and tight security evaluation tools
Marios O. Choudary and P.G. Popescu
2017/622 ( PDF )
GIFT: A Small Present
Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Siang Meng Sim and Yosuke Todo and Yu Sasaki
2017/621 ( PDF )
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks
Xiaolin Xu and Bicky Shakya and Mark M. Tehranipoor and Domenic Forte
2017/620 ( PDF )
The Algebraic Group Model and its Applications
Georg Fuchsbauer and Eike Kiltz and Julian Loss
2017/619 ( PDF )
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting
Qiong Huang and Jianye Huang
2017/618 ( PDF )
CacheZoom: How SGX Amplifies The Power of Cache Attacks
Ahmad Moghimi and Gorka Irazoqui and Thomas Eisenbarth
2017/617 ( PDF )
Secure Arithmetic Computation with Constant Computational Overhead
Benny Applebaum and Ivan Damgård and Yuval Ishai and Michael Nielsen and Lior Zichron
2017/616 ( PDF )
Statement Voting
Bingsheng Zhang and Hong-Sheng Zhou
2017/615 ( PDF )
A Framework to Select Parameters for Lattice-Based Cryptography
Nabil Alkeilani Alkadri and Johannes Buchmann and Rachid El Bansarkhani and Juliane Krämer
2017/614 ( PDF )
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
Mathias Wagner and Stefan Heyse
2017/613 ( PDF )
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
Hocheol Shin and Dohyun Kim and Yujin Kwon and Yongdae Kim
2017/612 ( PDF )
Large Modulus Ring-LWE >= Module-LWE
Martin R. Albrecht and Amit Deo
2017/611 ( PDF )
Multi-Rate Threshold FlipThem
David Leslie and Chris Sherfield and Nigel P. Smart
2017/610 ( PDF )
Differential Attacks: Using Alternative Operations
Céline Blondeau and Roberto Civino and Massimiliano Sala
2017/609 ( PDF )
On the discrete logarithm problem for prime-field elliptic curves
Alessandro Amadori and Federico Pintore and Massimiliano Sala
2017/608 ( PDF )
Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs
Vincent Immler and Robert Specht and Florian Unterstein
2017/607 ( PDF )
Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
Edward Eaton
2017/606 ( PDF )
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
Johannes Buchmann and Niklas Büscher and Florian Göpfert and Stefan Katzenbeisser and Juliane Krämer and Daniele Micciancio and Sander Siim and Christine van Vredendaal and Michael Walter
2017/605 ( PDF )
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures
Xavier Bultel and Pascal Lafourcade
2017/604 ( PDF )
A Modular Analysis of the Fujisaki-Okamoto Transformation
Dennis Hofheinz and Kathrin Hövelmanns and Eike Kiltz
2017/603 ( PDF )
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya
2017/602 ( PDF )
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK
Sean Bowe and Ariel Gabizon and Matthew D. Green
2017/601 ( PDF )
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
Wei Dai and Yarkın Doröz and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Savaş and Berk Sunar
2017/600 ( PDF )
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
Jeremy Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich
2017/599 ( PDF )
A Subversion-Resistant SNARK
Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac
2017/598 ( PDF )
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
Martin Roetteler and Michael Naehrig and Krysta M. Svore and Kristin Lauter
2017/597 ( PDF )
Round Optimal Concurrent MPC via Strong Simulation
Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Dakshita Khurana and Amit Sahai
2017/596 ( PDF )
A Side-Channel Assisted Cryptanalytic Attack Against QcBits
Mélissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson
2017/595 ( PDF )
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes
Wen Wang and Jakub Szefer and Ruben Niederhagen
2017/594 ( PDF )
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Robert Primas and Peter Pessl and Stefan Mangard
2017/593 ( PDF )
Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra
Alessio Caminata and Elisa Gorla
2017/592 ( PDF )
Speeding up lattice sieve with Xeon Phi coprocessor
Anja Becker and Dusan Kostic
2017/591 ( PDF )
On the Security of Carrier Phase-based Ranging
Hildur Olafsdottir and Aanjhan Ranganathan and Srdjan Capkun
2017/590 ( PDF )
Constant bandwidth ORAM with small block size using PIR operations
Linru Zhang and Gongxian Zeng and Yuechen Chen and Siu-Ming Yiu and Nairen Cao and Zheli Liu
2017/589 ( PDF )
An Attempt to Cryptanalyze A Partially Known Cipher Algorithm
Juay Guan Hee
2017/588 ( PDF )
Renyi Entropy Estimation Revisited
Maciej Obremski and Maciej Skorski
2017/587 ( PDF )
Subversion-zero-knowledge SNARKs
Georg Fuchsbauer
2017/586 ( PDF )
Deterministic, Stash-Free Write-Only ORAM
Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry
2017/585 ( PDF )
Internet Voting Using Zcash
Pavel Tarasov and Hitesh Tewari
2017/584 ( PDF )
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
Luka Malisa and Kari Kostiainen and Thomas Knell and David Sommer and Srdjan Capkun
2017/583 ( -- withdrawn -- )
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
2017/582 ( PDF )
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation
Angela Jäschke and Frederik Armknecht
2017/581 ( PDF )
Parallel Collision Search with Radix Trees
Gilles Dequen and Sorina Ionica and Monika Trimoska
2017/580 ( PDF )
Analysing Relations involving small number of Monomials in AES S- Box
Riddhi Ghosal
2017/579 ( PDF )
Birthday Attack on Dual EWCDM
Mridul Nandi
2017/578 ( PDF )
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
Hubert Ritzdorf and Karl Wüst and Arthur Gervais and Guillaume Felley and Srdjan Capkun
2017/577 ( PDF )
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
Steffen Schulz and André Schaller and Florian Kohnhäuser and Stefan Katzenbeisser
2017/576 ( PDF )
The Security of SIMON-like Ciphers Against Linear Cryptanalysis
Zhengbin Liu and Yongqiang Li and Mingsheng Wang
2017/575 ( PDF )
Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds
Ehsan Ebrahimi and Dominique Unruh
2017/574 ( PDF )
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Hamidreza Yazdanpanah, Mohammadreza Hasani Ahangar, Mahdi Azizi and Arash Ghafouri
2017/573 ( PDF )
Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol
Bernardo David and Peter Gaži and Aggelos Kiayias and Alexander Russell
2017/572 ( PDF )
MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks
Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Marten van Dijk
2017/571 ( PDF )
Faster Algorithms for Isogeny Problems using Torsion Point Images
Christophe Petit
2017/570 ( PDF )
Assessing the No-Knowledge Property of SpiderOak ONE
Anders P. K. Dalskov and Claudio Orlandi
2017/569 ( PDF )
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
2017/568 ( PDF )
Towards Doubly Efficient Private Information Retrieval
Ran Canetti and Justin Holmgren and Silas Richelson
2017/567 ( PDF )
Can We Access a Database Both Locally and Privately?
Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters
2017/566 ( PDF )
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services
Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo
2017/565 ( PDF )
A Formal Foundation for Secure Remote Execution of Enclaves
Pramod Subramanyan and Rohit Sinha and Ilia Lebedev and Srinivas Devadas and Sanjit Seshia
2017/564 ( PDF )
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
Manaar Alam and Sarani Bhattacharya and Debdeep Mukhopadhyay and Sourangshu Bhattacharya
2017/563 ( PDF )
Weak is Better: Tightly Secure Short Signatures from Weak PRFs
Jacob Alperin-Sheriff and Daniel Apon
2017/562 ( PDF )
Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices
Björn Haase and Benoît Labrique
2017/561 ( PDF )
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
Yashvanth Kondi and Arpita Patra
2017/560 ( PDF )
Notes on the design and analysis of SIMON and SPECK
Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers
2017/559 ( PDF )
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Alexandra Boldyreva and Shan Chen and Pierre-Alain Dupont and David Pointcheval
2017/558 ( PDF )
Detecting Large Integer Arithmetic for Defense Against Crypto Ransomware
Mehmet Sabir Kiraz and Ziya Alper Genç and Erdinç Öztürk
2017/557 ( PDF )
Watermarking Public-key Cryptographic Functionalities and Implementations
Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari
2017/556 ( PDF )
Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$).
Sankhanil Dey and Ranjan Ghosh
2017/555 ( PDF )
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion
Fabrice Benhamouda and Hugo Krawczyk and Tal Rabin
2017/554 ( PDF )
Trapping ECC with Invalid Curve Bug Attacks
Renaud Dubois
2017/553 ( PDF )
Further Analysis of a Proposed Hash-Based Signature Standard
Scott Fluhrer
2017/552 ( PDF )
Fast Secure Two-Party ECDSA Signing
Yehuda Lindell
2017/551 ( PDF )
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions
Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert
2017/550 ( PDF )
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments
Tore Frederiksen and Benny Pinkas and Avishay Yanay
2017/549 ( PDF )
ZeroTrace : Oblivious Memory Primitives from Intel SGX
Sajin Sasy and Sergey Gorbunov and Christopher W. Fletcher
2017/548 ( PDF )
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem
Yarkın Doröz and Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman and Berk Sunar and William Whyte and Zhenfei Zhang
2017/547 ( PDF )
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
Seyed Farhad Aghili and Hamid Mala
2017/546 ( PDF )
Hitesh Tewari and Arthur Hughes and Stefan Weber and Tomas Barry
2017/545 ( PDF )
Resource-efficient OT combiners with active security
Ignacio Cascudo and Ivan Damgård and Oriol Farràs and Samuel Ranellucci
2017/544 ( PDF )
Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability
Elette Boyle and Saleet Klein and Alon Rosen and Gil Segev
2017/543 ( PDF )
Identity-Based Encryption from the Diffie-Hellman Assumption
Nico Döttling and Sanjam Garg
2017/542 ( PDF )
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing
Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart
2017/541 ( PDF )
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed
2017/540 ( PDF )
Snarky Signatures: \\ Minimal Signatures of Knowledge from Simulation-Extractable SNARKs
Jens Groth and Mary Maller
2017/539 ( PDF )
Public-Seed Pseudorandom Permutations
Pratik Soni and Stefano Tessaro
2017/538 ( PDF )
New security notions and feasibility results for authentication of quantum data
Sumegha Garg and Henry Yuen and Mark Zhandry
2017/537 ( PDF )
Information-theoretic Indistinguishability via the Chi-squared Method
Wei Dai and Viet Tung Hoang and Stefano Tessaro
2017/536 ( PDF )
HACL*: A Verified Modern Cryptographic Library
Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
2017/535 ( PDF )
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin
2017/534 ( PDF )
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners
Zhenzhen Bao and Lei Wang and Jian Guo and Dawu Gu
2017/533 ( PDF )
Quantum non-malleability and authentication
Gorjan Alagic and Christian Majenz
2017/532 ( PDF )
All-But-Many Lossy Trapdoor Functions from Lattices and Applications
Xavier Boyen and Qinyi Li
2017/531 ( PDF )
Template Attack vs Bayes Classifier
Stjepan Picek and Annelie Heuser and Sylvain Guilley
2017/530 ( PDF )
Non-Malleable Codes for Space-Bounded Tampering
Sebastian Faust and Kristina Hostakova and Pratyay Mukherjee and Daniele Venturi
2017/529 ( PDF )
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
Ling Song and Guohong Liao and Jian Guo
2017/528 ( PDF )
Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets
Claude Carlet
2017/527 ( PDF )
Key Rotation for Authenticated Encryption
Adam Everspaugh and Kenneth Paterson and Thomas Ristenpart and Sam Scott
2017/526 ( PDF )
Evaluating web PKIs
Jiangshan Yu and Mark Ryan
2017/525 ( PDF )
Kurosawa-Desmedt Meets Tight Security
Romain Gay and Dennis Hofheinz and Lisa Kohl
2017/524 ( PDF )
Compact Structure-preserving Signatures with Almost Tight Security
Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan
2017/523 ( PDF )
Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge Proofs
Vadim Lyubashevsky and Gregor Seiler
2017/522 ( PDF )
On the Hardness of the Mersenne Low Hamming Ratio Assumption
Marc Beunardeau and Aisling Connolly and Rémi Géraud and David Naccache
2017/521 ( PDF )
Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains
F. Betül Durak and Serge Vaudenay
2017/520 ( PDF )
The Price of Low Communication in Secure Multi-Party Computation
Juan Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas
2017/519 ( PDF )
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
Nishanth Chandran and Juan A. Garay and Payman Mohassel and Satyanarayana Vusirikala
2017/518 ( PDF )
qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs
Joost Renes and Benjamin Smith
2017/517 ( PDF )
PRF-ODH: Relations, Instantiations, and Impossibility Results
Jacqueline Brendel and Marc Fischlin and Felix Günther and Christian Janson
2017/516 ( PDF )
Characterizations of the differential uniformity of vectorial functions by the Walsh transform
Claude Carlet
2017/515 ( PDF )
Be Adaptive, Avoid Overcommitting
Zahra Jafargholi and Chethan Kamath and Karen Klein and Ilan Komargodski and Krzysztof Pietrzak and Daniel Wichs
2017/514 ( PDF )
Identity-based Encryption from Codes with Rank Metric
Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean-Pierre Tillich
2017/513 ( PDF )
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$
Patrick Holzer and Thomas Wunderer
2017/512 ( PDF )
2017/511 ( PDF )
State of the Art in Lightweight Symmetric Cryptography
Alex Biryukov and Leo Perrin
2017/510 ( PDF )
Hedging Public-Key Encryption in the Real World
Alexandra Boldyreva and Christopher Patton and Thomas Shrimpton
2017/509 ( PDF )
Quantum Security of NMAC and Related Constructions
Fang Song and Aaram Yun
2017/508 ( PDF )
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
Victor Cauchois and Clément Gomez and Reynald Lercier
2017/507 ( PDF )
Inverted Leftover Hash Lemma
Maciej Obremski and Maciej Skórski
2017/506 ( PDF )
Optimal Overcoming Weak Expectations
Maciej Skorski
2017/505 ( PDF )
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi
2017/504 ( PDF )
A simple and compact algorithm for SIDH with arbitrary degree isogenies
Craig Costello and Huseyin Hisil
2017/503 ( PDF )
Encryption Switching Protocols Revisited: Switching modulo $p$
Guilhem Castagnos and Laurent Imbert and Fabien Laguillaumie
2017/502 ( PDF )
DeepSecure: Scalable Provably-Secure Deep Learning
Bita Darvish Rouhani and M. Sadegh Riazi and Farinaz Koushanfar
2017/501 ( PDF )
A Formal Treatment of Multi-key Channels
Felix Günther and Sogol Mazaheri
2017/500 ( PDF )
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps
Michel Abdalla and Fabrice Benhamouda and Alain Passelègue
2017/499 ( PDF )
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample
Fuchun Guo and Rongmao Chen and Willy Susilo and Jianchang Lai and Guomin Yang and Yi Mu
2017/498 ( PDF )
Full-State Keyed Duplex With Built-In Multi-User Support
Joan Daemen and Bart Mennink and Gilles Van Assche
2017/497 ( PDF )
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
Itai Dinur and Niv Nadler
2017/496 ( PDF )
Modes of Operation Suitable for Computing on Encrypted Data
Dragos Rotaru and Nigel P. Smart and Martijn Stam
2017/495 ( PDF )
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy
Tibor Jager and Martijn Stam and Ryan Stanley-Oakes and Bogdan Warinschi
2017/494 ( PDF )
A Reaction Attack on the QC-LDPC McEliece Cryptosystem
Tomas Fabsic and Viliam Hromada and Paul Stankovski and Pavol Zajac and Qian Guo and Thomas Johansson
2017/493 ( PDF )
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
Georg T. Becker
2017/492 ( PDF )
Reducing Communication Channels in MPC
Marcel Keller and Dragos Rotaru and Nigel P. Smart and Tim Wood
2017/491 ( PDF )
Laconic Oblivious Transfer and its Applications
Chongwon Cho and Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou
2017/490 ( PDF )
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures
Peter Pessl and Leon Groot Bruinderink and Yuval Yarom
2017/489 ( PDF )
Multi Collision Resistant Hash Functions and their Applications
Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan
2017/488 ( PDF )
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions
Nir Bitansky and Yael Tauman Kalai and Omer Paneth
2017/487 ( PDF )
New Linear Attacks on Block Cipher GOST
2017/486 ( PDF )
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions
Ilan Komargodski and Moni Naor and Eylon Yogev
2017/485 ( PDF )
Authenticating compromisable storage systems
Jiangshan Yu and Mark Ryan and Liqun Chen
2017/484 ( PDF )
Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial
Jung Hee Cheon and Minki Hhan and Changmin Lee
2017/483 ( PDF )
A multi-start heuristic for multiplicative depth minimization of boolean circuits
Sergiu Carpov and Pascal Aubry and Renaud Sirdey
2017/482 ( PDF )
On the Statistical Leak of the GGH13 Multilinear Map and some Variants
Léo Ducas and Alice Pellet--Mary
2017/481 ( PDF )
A New Public-Key Cryptosystem via Mersenne Numbers
Divesh Aggarwal and Antoine Joux and Anupam Prakash and Miklos Santha
2017/480 ( PDF )
Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence
Thomas Prest
2017/479 ( PDF )
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Keita Emura
2017/478 ( PDF )
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
Anne Canteaut and Eran Lambooij and Samuel Neves and Shahram Rasoolzadeh and Yu Sasaki and Marc Stevens
2017/477 ( PDF )
Constrained Keys for Invertible Pseudorandom Functions
Dan Boneh and Sam Kim and David J. Wu
2017/476 ( PDF )
Forward-Security under Continual Leakage
Mihir Bellare and Adam O'Neill and Igors Stepanovs
2017/475 ( PDF )
Security of Even--Mansour Ciphers under Key-Dependent Messages
Pooya Farshim and Louiza Khati and Damien Vergnaud
2017/474 ( PDF )
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
Bart Mennink
2017/473 ( PDF )
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
Bart Mennink and Samuel Neves
2017/472 ( PDF )
A Unified Framework for Secure Search Over Encrypted Cloud Data
Cengiz Orencik and Erkay Savas and Mahmoud Alewiwi
2017/471 ( PDF )
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree
Jacob Alperin-Sheriff and Jintai Ding and Albrecht Petzoldt and Daniel Smith Tone
2017/470 ( PDF )
On the Relation Between SIM and IND-RoR Security Models for PAKEs
José Becerra and Vincenzo Iovino and Dimiter Ostrev and Marjan Skrobot
2017/469 ( PDF )
Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
Hiroaki Anada and Seiko Arita
2017/468 ( PDF )
Why Your Encrypted Database Is Not Secure
Paul Grubbs and Thomas Ristenpart and Vitaly Shmatikov
2017/467 ( PDF )
Access Control Encryption for General Policies from Standard Assumptions
Sam Kim and David J. Wu
2017/466 ( PDF )
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security
Yusuke Naito
2017/465 ( PDF )
Lelantos: A Blockchain-based Anonymous Physical Delivery System
Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong
2017/464 ( PDF )
On the Structure of Unconditional UC Hybrid Protocols
Mike Rosulek and Morgan Shirley
2017/463 ( PDF )
Proving Resistance against Invariant Attacks: How to Choose the Round Constants
Christof Beierle and Anne Canteaut and Gregor Leander and Yann Rotella
2017/462 ( PDF )
Leakage-Resilient Tweakable Encryption from One-Way Functions
Suvradip Chakraborty and Chester Rebeiro and Debdeep Mukhopadhyay and C. Pandu Rangan
2017/461 ( PDF )
Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions
Daniel Jost and Ueli Maurer
2017/460 ( PDF )
Transitioning to a Quantum-Resistant Public Key Infrastructure
Nina Bindel and Udyani Herath and Matthew McKague and Douglas Stebila
2017/459 ( PDF )
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test
Phuong Ha Nguyen and Durga Prasad Sahoo and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay
2017/458 ( -- withdrawn -- )
Fully Homomorphic Encryption Using Multivariate Polynomials
Matthew Tamayo-Rios and Jean-Charles Faugère and Ludovic Perret and Peng Hui How and Robin Zhang
2017/457 ( PDF )
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority
Masahito Hayashi and Takeshi Koshiba
2017/456 ( PDF )
Proxy Re-Encryption and Re-Signatures from Lattices
Xiong Fan and Feng-Hao Liu
2017/455 ( PDF )
Vector Encoding over Lattices and Its Applications
Daniel Apon and Xiong Fan and Feng-Hao Liu
2017/454 ( PDF )
Algorand: Scaling Byzantine Agreements for Cryptocurrencies
Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich
2017/453 ( PDF )
Subtleties in Security Definitions for Predicate Encryption with Public Index
Johannes Blömer and Gennadij Liske
2017/452 ( PDF )
Oblivious Neural Network Predictions via MiniONN transformations
Jian Liu and Mika Juuti and Yao Lu and N. Asokan
2017/451 ( PDF )
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE
Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan
2017/450 ( PDF )
Privacy-preserving biometric authentication: challenges and directions
Elena Pagnin and Aikaterini Mitrokotsa
2017/449 ( PDF )
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies
Shihui Fu and Xiutao Feng and Baofeng Wu
2017/448 ( PDF )
Obfuscation of Bloom Filter Queries from Ring-LWE
Alex Davidson
2017/447 ( PDF )
Block Chain based Searchable Symmetric Encryption
Huige Li and Haibo Tian and Fangguo Zhang
2017/446 ( PDF )
Secretly Embedding Trapdoors into Contract Signing Protocols
Diana Maimut and George Teseleanu
2017/445 ( PDF )
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Michael Till Beck and Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2017/444 ( PDF )
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing
Ming Li, Jian Weng, Anjia Yang, Wei Lu,Yue Zhang, Lin Hou, Jianan Liu
2017/443 ( PDF )
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
Joel Alwen and Jeremiah Blocki and Ben Harsha
2017/442 ( PDF )
On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i
Jeremiah Blocki and Samson Zhou
2017/441 ( PDF )
New Approach to Practical Leakage-Resilient Public-Key Cryptography
Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan
2017/440 ( PDF )
Cryptographic Security Analysis of T-310
Nicolas T. Courtois and Klaus Schmeh and Jörg Drobick and Jacques Patarin and Maria-Bristena Oprisanu and Matteo Scarlata and Om Bhallamudi
2017/439 ( PDF )
Practically Efficient Secure Single-Commodity Multi-Market Auctions
Abdelrahaman Aly and Mathieu Van Vyve
2017/438 ( PDF )
GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography
James Howe and Máire O'Neill
2017/437 ( PDF )
Slothful reduction
Michael Scott
2017/436 ( PDF )
A Uniform Class of Weak Keys for Universal Hash Functions
Kaiyan Zheng and Peng Wang
2017/435 ( PDF )
Analyzing Multi-Key Security Degradation
Atul Luykx and Bart Mennink and Kenneth G. Paterson
2017/434 ( PDF )
FourQ on embedded devices with strong countermeasures against side-channel attacks
Zhe Liu and Patrick Longa and Geovandro Pereira and Oscar Reparaz and Hwajeong Seo
2017/433 ( PDF )
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia
2017/432 ( PDF )
Statistical and Linear Independence of Binary Random Variables
Kaisa Nyberg
2017/431 ( PDF )
Understanding RUP Integrity of COLM
Nilanjan Datta and Atul Luykx and Bart Mennink and Mridul Nandi
2017/430 ( PDF )
Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping
Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène
2017/429 ( PDF )
Strengthening Access Control Encryption
Christian Badertscher and Christian Matt and Ueli Maurer
2017/428 ( PDF )
Optimal Ramp Schemes and Related Combinatorial Objects
Douglas R. Stinson
2017/427 ( PDF )
Grover Meets Simon - Quantumly Attacking the FX-construction
Gregor Leander and Alexander May
2017/426 ( PDF )
FHPKE based on multivariate discrete logarithm problem
Masahiro Yagisawa
2017/425 ( PDF )
Card-Based Protocols Using Unequal Division Shuffles
Akihiro Nishimura and Takuya Nishida and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone
2017/424 ( PDF )
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
Markku-Juhani O. Saarinen
2017/423 ( PDF )
Foundations for Actively Secure Card-based Cryptography
Alexander Koch and Stefan Walzer
2017/422 ( PDF )
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs
Urbi Chatterjee and Vidya Govindan and Rajat Sadhukhan and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Debashis Mahata and Mukesh Prabhu
2017/421 ( PDF )
Exploring Naccache-Stern Knapsack Encryption
Éric Brier and Rémi Géraud and David Naccache
2017/420 ( PDF )
Construction and Filtration of Lightweight Formalized MDS Matrices
Shiyi Zhang and Yongjuan Wang and Yang Gao and Tao Wang
2017/419 ( PDF )
Efficient hash maps to \mathbb{G}_2 on BLS curves
Alessandro Budroni and Federico Pintore
2017/418 ( PDF )
Strong Authenticated Key Exchange with Auxiliary Inputs
Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
2017/417 ( PDF )
A Proof-of-Stake protocol for consensus on Bitcoin subchains
Massimo Bartoletti and Stefano Lande and Alessandro Sebastian Podda
2017/416 ( PDF )
Breaking and Fixing the HB+DB protocol
Ioana Boureanu and David Gerault and Pascal Lafourcade and Cristina Onete
2017/415 ( PDF )
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
Osman Bicer and Muhammed Ali Bingol and Mehmet Sabir Kiraz and Albert Levi
2017/414 ( PDF )
Symmetrically and Asymmetrically Hard Cryptography (Full Version)
Alex Biryukov and Leo Perrin
2017/413 ( PDF )
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava
2017/412 ( PDF )
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently
Ximing Fu and Xiaoyun Wang and Jiazhe Chen and Marc Stevens
2017/411 ( PDF )
A New Algorithm for Inversion mod $p^k$
Çetin Kaya Koç
2017/410 ( PDF )
Fast Proxy Re-Encryption for Publish/Subscribe Systems
Yuriy Polyakov and Kurt Rohloff and Gyana Sahu and Vinod Vaikuntanthan
2017/409 ( PDF )
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges
2017/408 ( PDF )
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh
2017/407 ( PDF )
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments
Peter Rindal and Roberto Trifiletti
2017/406 ( PDF )
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ewa Syta and Bryan Ford
2017/405 ( PDF )
Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''
Jingjing Wang and Xiaoyu Zhang and Jingjing guo and Jianfeng Wang
2017/404 ( PDF )
Short generators without quantum computers: the case of multiquadratics
Jens Bauch and Daniel J. Bernstein and Henry de Valence and Tanja Lange and Christine van Vredendaal
2017/403 ( PDF )
Condition on composite numbers easily factored with elliptic curve method
Masaaki Shirase
2017/402 ( PDF )
A New Approach to Round-Optimal Secure Multiparty Computation
Prabhanjan Ananth and Arka Rai Choudhuri and Abhishek Jain
2017/401 ( PDF )
Synthesis of Adaptive Side-Channel Attacks
Quoc-Sang Phan and Lucas Bang and Corina S. Păsăreanu and Pasquale Malacaria and Tevfik Bultan
2017/400 ( PDF )
A Leakage-Abuse Attack Against Multi-User Searchable Encryption
Cédric Van Rompay and Refik Molva and Melek Önen
2017/399 ( PDF )
Practical Evaluation of Masking Software Countermeasures on an IoT processor
David McCann and Elisabeth Oswald
2017/398 ( PDF )
Post-Quantum Security of Fiat-Shamir
Dominique Unruh
2017/397 ( PDF )
Efficient Digital Signatures From Coding Theory
Edoardo Persichetti
2017/396 ( PDF )
SecureML: A System for Scalable Privacy-Preserving Machine Learning
Payman Mohassel and Yupeng Zhang
2017/395 ( PDF )
Higher-Order Side-Channel Protected Implementations of Keccak
Hannes Gross and David Schaffenrath and Stefan Mangard
2017/394 ( PDF )
Double-spending Prevention for Bitcoin zero-confirmation transactions
Cristina Pérez-Solà and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomartı́
2017/393 ( PDF )
Privacy-Preserving Interdomain Routing at Internet Scale
Gilad Asharov and Daniel Demmler and Michael Schapira and Thomas Schneider and Gil Segev and Scott Shenker and Michael Zohner
2017/392 ( PDF )
Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE
Sébastien Canard and Sergiu Carpov and Donald Nokam Kuate and Renaud Sirdey
2017/391 ( PDF )
Another Look at Success Probability in Linear Cryptanalysis
Subhabrata Samajder and Palash Sarkar
2017/390 ( PDF )
On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations
Yi Deng and Xuyang Song and Jingyue Yu and Yu Chen
2017/389 ( PDF )
Decentralized Blacklistable Anonymous Credentials with Reputation
Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu
2017/388 ( PDF )
Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple
Silvan Streit and Fabrizio De Santis
2017/387 ( PDF )
Homomorphically Encrypted Arithmetic Operations over the Integer Ring
Chen Xu and Jingwei Chen and Wenyuan Wu and Yong Feng
2017/386 ( PDF )
Four Round Secure Computation without Setup
Zvika Brakerski and Shai Halevi and Antigoni Polychroniadou
2017/385 ( PDF )
Garbled Circuits as Randomized Encodings of Functions: a Primer
Benny Applebaum
2017/384 ( PDF )
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang
2017/383 ( PDF )
Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
Travis Scholl
2017/382 ( PDF )
A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK
Steven Cavanaugh
2017/381 ( PDF )
Quantum one-way permutation over the finite field of two elements
Alexandre de Castro
2017/380 ( PDF )
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
Sam Kim and David J. Wu
2017/379 ( PDF )
Fault attack on Supersingular Isogeny Cryptosystems
Yan Bo Ti
2017/378 ( PDF )
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
Marcel Keller and Emmanuela Orsini and Dragos Rotaru and Peter Scholl and Eduardo Soria-Vazquez and Srinivas Vivek
2017/377 ( PDF )
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries
Stefan Wüller and Ulrike Meyer and Susanne Wetzel
2017/376 ( PDF )
Determining the Minimum Degree of an S-box
P. R. Mishra, Sumanta Sarkar and Indivar Gupta
2017/375 ( PDF )
Do you need a Blockchain?
Karl Wüst and Arthur Gervais
2017/374 ( PDF )
Loop-abort faults on supersingular isogeny cryptosystems
Alexandre Gélin and Benjamin Wesolowski
2017/373 ( PDF )
Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption
Ryo Hiromasa and Yutaka Kawai
2017/372 ( PDF )
A crossbred algorithm for solving Boolean polynomial systems
Antoine Joux and Vanessa Vitse
2017/371 ( PDF )
On the Construction of Lightweight Orthogonal MDS Matrices
Lijing Zhou, Licheng Wang and Yiru Sun
2017/370 ( PDF )
"The Simplest Protocol for Oblivious Transfer'' Revisited
Ziya Alper Genç and Vincenzo Iovino and Alfredo Rial
2017/369 ( -- withdrawn -- )
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani
2017/368 ( PDF )
Analysis of Toeplitz MDS Matrices
Sumanta Sarkar and Habeeb Syed
2017/367 ( PDF )
Fork-Free Hybrid Consensus with Flexible Proof-of-Activity
Zhiqiang Liu and Shuyang Tang and Sherman S.M. Chow and Zhen Liu and Yu Long
2017/366 ( PDF )
BitFlip: A Randomness-Rich Cipher
Gideon Samid and Serguei Popov
2017/365 ( PDF )
The Complexity of Public-Key Cryptography
Boaz Barak
2017/364 ( PDF )
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas
2017/363 ( PDF )
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF
Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu
2017/362 ( PDF )
Universally Composable Zero-Knowledge Proof of Membership
Jesper Buus Nielsen
2017/361 ( PDF )
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
2017/360 ( PDF )
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error
Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
2017/359 ( PDF )
Conditional Disclosure of Secrets via Non-Linear Reconstruction
Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee
2017/358 ( PDF )
Almost Optimal Oblivious Transfer from QA-NIZK
Olivier Blazy and Céline Chevalier and Paul Germouty
2017/357 ( PDF )
Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model
Nico Döttling and Jesper Buus Nielsen and Maciej Obremski
2017/356 ( PDF )
XOR of PRPs in a Quantum World
Bart Mennink and Alan Szepieniec
2017/355 ( PDF )
White-Box Cryptography: Don't Forget About Grey Box Attacks
Joppe W. Bos and Charles Hubain and Wil Michiels and Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe Teuwen
2017/354 ( PDF )
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart
2017/353 ( PDF )
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
2017/352 ( PDF )
A low-resource quantum factoring algorithm
Daniel J. Bernstein and Jean-François Biasse and Michele Mosca
2017/351 ( PDF )
Post-quantum RSA
Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta
2017/350 ( PDF )
The Montgomery ladder on binary elliptic curves
Thomaz Oliveira and Julio López and Francisco Rodríguez-Henríquez
2017/349 ( PDF )
LMS vs XMSS: Comparion of two Hash-Based Signature Standards
Panos Kampanakis, Scott Fluhrer
2017/348 ( PDF )
Removal Attacks on Logic Locking and Camouflaging Techniques
Muhammad Yasin and Bodhisatwa Mazumdar and Ozugr Sinanoglu and Jeyavijayan Rajendran
2017/347 ( PDF )
Predictive Aging of Reliability of two Delay PUFs
Naghmeh Karimi and Jean-Luc Danger and Florent Lozac'h and Sylvain Guilley
2017/346 ( PDF )
Some cryptanalytic results on Lizard
Subhadeep Banik and Takanori Isobe
2017/345 ( PDF )
Mind the Gap: Towards Secure 1st-order Masking in Software
Kostas Papagiannopoulos and Nikita Veshchikov
2017/344 ( PDF )
DUPLO: Unifying Cut-and-Choose for Garbled Circuits
Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti
2017/343 ( PDF )
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
Essam Ghadafi and Jens Groth
2017/342 ( PDF )
Multilinear Maps Using a Variant of Ring-LWE
Gu Chunsheng
2017/341 ( PDF )
Steganography techniques
Dragoş Dumitrescu and Ioan-Mihail Stan and Emil Simion
2017/340 ( -- withdrawn -- )
Enhancing Security by Combining Biometrics and Cryptography
Diana Popa and Emil Simion
2017/339 ( PDF )
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
Alan Kaminsky
2017/338 ( PDF )
A Traceability Analysis of Monero's Blockchain
Amrit Kumar and Clément Fischer and Shruti Tople and Prateek Saxena
2017/337 ( PDF )
Authentication of Outsourced Linear Function Query with Efficient Updates
Gang Sheng and Chunming Tang and Wei Gao and Yunlu Cai and Xing Hu
2017/336 ( PDF )
Carmina GEORGESCU and Alina PETRESCU-NITA and Emil SIMION and Antonela TOMA
2017/335 ( -- withdrawn -- )
Privacy-Preserving Linear Regression on Distributed Data
Irene Giacomelli and Somesh Jha and C. David Page
2017/334 ( PDF )
Updating key size estimations for pairings
Razvan Barbulescu and Sylvain Duquesne
2017/333 ( PDF )
Faster Homomorphic Function Evaluation using Non-Integral Base Encoding
Charlotte Bonte and Carl Bootland and Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2017/332 ( PDF )
Reforgeability of Authenticated Encryption Schemes
Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2017/331 ( PDF )
Optimal attacks on qubit-based Quantum Key Recycling
Daan Leermakers and Boris Skoric
2017/330 ( PDF )
Distinguisher-Dependent Simulation in Two Rounds and its Applications
Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum
2017/329 ( PDF )
Maliciously Secure Multi-Client ORAM
Matteo Maffei (TU Wien); Giulio Malavolta (FAU); Manuel Reinert (CISPA, Saarland University); Dominique Schröder (FAU)
2017/328 ( PDF )
Evaluating Bernstein-Rabin-Winograd Polynomials
Debrup Chakraborty and Sebati Ghosh and Palash Sarkar
2017/327 ( PDF )
MQ Signatures for PKI
Alan Szepieniec and Ward Beullens and Bart Preneel
2017/326 ( PDF )
Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data
Manuel Barbosa and Dario Catalano and Dario Fiore
2017/325 ( PDF )
CHVote System Specification
Rolf Haenni and Reto E. Koenig and Philipp Locher and Eric Dubuis
2017/324 ( PDF )
Family of PRGs based on Collections of Arithmetic Progressions
Srikanth ch, Veni Madhavan C.E. and Kumar Swamy H.V.
2017/323 ( PDF )
Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
Atsushi Takayasu and Yohei Watanabe
2017/322 ( PDF )
Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction
Jun Xu and Santanu Sarkar and Lei Hu
2017/321 ( PDF )
Towards Practical Obfuscation of General Circuits
Dingfeng Ye and Peng Liu and Jun Xu
2017/320 ( PDF )
Speeding up Huff Form of Elliptic Curves
Neriman Gamze Orhon and Huseyin Hisil
2017/319 ( PDF )
Embed-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting
Sikhar Patranabis and Debdeep Mukhopadhyay
2017/318 ( -- withdrawn -- )
Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
Sikhar Patranabis and Debdeep Mukhopadhyay
2017/317 ( PDF )
Solidus: Confidential Distributed Ledger Transactions via PVORM
Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed Kosba and Ari Juels and Elaine Shi
2017/316 ( PDF )
Exploring Potential 6LoWPAN Traffic Side Channels
Yan Yan and Elisabeth Oswald and Theo Tryfonas
2017/315 ( PDF )
Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)
Bernardo Ferreira, Joaão Leitão, Henrique Domingos
2017/314 ( PDF )
Post-quantum cryptography---dealing with the fallout of physics success
Daniel J. Bernstein and Tanja Lange
2017/313 ( -- withdrawn -- )
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Yanqing Yao, Hua Guo, Zhoujun Li
2017/312 ( PDF )
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
Boaz Barak and Zvika Brakerski and Ilan Komargodski and Pravesh K. Kothari
2017/311 ( PDF )
Constructing Multidimensional Differential Addition Chains and their Applications
Aaron Hutchinson and Koray Karabina
2017/310 ( PDF )
KDM-Secure Public-Key Encryption from Constant-Noise LPN
Shuai Han and Shengli Liu
2017/309 ( PDF )
Perfectly Secure Message Transmission Scheme against Rational Adversaries
Maiki Fujita and Takeshi Koshiba
2017/308 ( PDF )
Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus
Nicholas Genise and Daniele Micciancio
2017/307 ( PDF )
Efficient Synchronous Byzantine Consensus
Ittai Abraham and Srinivas Devadas and Danny Dolev and Kartik Nayak and Ling Ren
2017/306 ( PDF )
Cube Attacks on Non-Blackbox Polynomials Based on Division Property
Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
2017/305 ( PDF )
A Zero Knowledge Sumcheck and its Applications
Alessandro Chiesa and Michael A. Forbes and Nicholas Spooner
2017/304 ( PDF )
Provably Secure NTRUEncrypt over More General Cyclotomic Rings
Yang Yu and Guangwu Xu and Xiaoyun Wang
2017/303 ( PDF )
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model
Dana Dachman-Soled and Mukul Kulkarni and Aria Shahverdi
2017/302 ( -- withdrawn -- )
Quantum preimage, 2nd-preimage, and collision resistance of SHA3
Jan Czajkowski and Leon Groot Bruinderink and Andreas Hülsing and Christian Schaffner
2017/301 ( PDF )
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
Alex Lombardi and Vinod Vaikuntanathan
2017/300 ( PDF )
Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies
Iddo Bentov and Pavel Hubáček and Tal Moran and Asaf Nadler
2017/299 ( PDF )
Fast Private Set Intersection from Homomorphic Encryption
Hao Chen and Kim Laine and Peter Rindal
2017/298 ( PDF )
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling
Séamus Brannigan and Neil Smyth and Tobias Oder and Felipe Valencia and Elizabeth O’Sullivan and Tim Güneysu and Francesco Regazzoni
2017/297 ( PDF )
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
Gildas Avoine and Xavier Bultel and Sébastien Gambs and David Gérault and Pascal Lafourcade and Cristina Onete and Jean-Marc Robert
2017/296 ( PDF )
Topology-Hiding Computation on all Graphs
Adi Akavia and Rio LaVigne and Tal Moran
2017/295 ( PDF )
Improved key-reconciliation method
Ludo Tolhuizen and Ronald Rietman and Oscar Garcia-Morchon
2017/294 ( PDF )
Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme
Jung Hee Cheon and Miran Kim and Yongsoo Song
2017/293 ( PDF )
Montgomery curves and the Montgomery ladder
Daniel J. Bernstein and Tanja Lange
2017/292 ( PDF )
Involutory Differentially 4-Uniform Permutations from Known Constructions
Shihui Fu and Xiutao Feng
2017/291 ( PDF )
How to Achieve Non-Malleability in One or Two Rounds
Dakshita Khurana and Amit Sahai
2017/290 ( PDF )
Double DIP: Re-Evaluating Security of Logic Encryption Algorithms
Yuanqi Shen and Hai Zhou
2017/289 ( PDF )
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
Matthias Krause
2017/288 ( PDF )
Security of Symmetric Primitives under Incorrect Usage of Keys
Pooya Farshim and Claudio Orlandi and Răzvan Roşie
2017/287 ( PDF )
Towards Sound and Optimal Leakage Detection Procedure (Extended Version)
Liwei Zhang and A. Adam Ding and Francois Durvaux and Francois-Xavier Standaert and Yunsi Fei
2017/286 ( PDF )
Impossible Differential Attack on Midori128 Using Rebound-like Technique
Wenquan Bi and Zheng Li and Xiaoyang Dong and Xiaoyun Wang
2017/285 ( PDF )
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
Kamil Doruk Gür and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Savaş
2017/284 ( PDF )
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
Maik Ender and Alexander Wild and Amir Moradi
2017/283 ( PDF )
On the Easiness of Turning Higher-Order Leakages into First-Order
Thorben Moos and Amir Moradi
2017/282 ( PDF )
Collapsing sponges: Post-quantum security of the sponge construction
Dominique Unruh
2017/281 ( PDF )
Practical Secure Aggregation for Privacy Preserving Machine Learning
Keith Bonawitz and Vladimir Ivanov and Ben Kreuter and Antonio Marcedone and H. Brendan McMahan and Sarvar Patel and Daniel Ramage and Aaron Segal and Karn Seth
2017/280 ( PDF )
Amortization with Fewer Equations for Proving Knowledge of Small Secrets
Rafael del Pino and Vadim Lyubashevsky
2017/279 ( PDF )
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
Melissa Chase and David Derler and Steven Goldfeder and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig and Greg Zaverucha
2017/278 ( PDF )
New Observations on Invariant Subspace Attack
Yunwen Liu and Vincent Rijmen
2017/277 ( PDF )
Minimizing the Complexity of Goldreich's Pseudorandom Generator
Alex Lombardi and Vinod Vaikuntanathan
2017/276 ( PDF )
Obfuscating Compute-and-Compare Programs under LWE
Daniel Wichs and Giorgos Zirdelis
2017/275 ( PDF )
Simple Generic Constructions of Succinct Functional Encryption
Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka
2017/274 ( PDF )
Lockable Obfuscation
Rishab Goyal and Venkata Koppula and Brent Waters
2017/273 ( PDF )
Two-Round and Non-interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles
Huijia Lin and Rafael Pass and Pratik Soni
2017/272 ( PDF )
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA
Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht
2017/271 ( PDF )
High Order Masking of Look-up Tables with Common Shares
Jean-Sebastien Coron and Franck Rondepierre and Rina Zeitoun
2017/270 ( PDF )
Rational Proofs against Rational Verifiers
Keita Inasawa and Kenji Yasunaga
2017/269 ( PDF )
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
Okan Seker and Thomas Eisenbarth and Rainer Steinwandt
2017/268 ( PDF )
Efficient Sanitizable Signatures without Random Oracles
Russell W. F. Lai and Tao Zhang and Sherman S. M. Chow and Dominique Schröder
2017/267 ( PDF )
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
Seungkwang Lee
2017/266 ( PDF )
From Higher-Order Differentials to Polytopic Cryptanalysis
Tyge Tiessen
2017/265 ( PDF )
Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation
Kamalesh Acharya and Ratna Dutta
2017/264 ( PDF )
A note on how to (pre-)compute a ladder
Thomaz Oliveira and Julio López and Hüseyin Hışıl and Armando Faz-Hernández and Francisco Rodrıíguez-Henrıíquez
2017/263 ( PDF )
Bivariate attacks and confusion coefficients
Sylvain Guilley and Liran Lerman
2017/262 ( PDF )
When It’s All Just Too Much: Outsourcing MPC-Preprocessing
Peter Scholl and Nigel P. Smart and Tim Wood
2017/261 ( PDF )
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
2017/260 ( PDF )
Message-Recovery MACs and Verification-Unskippable AE
Shoichi Hirose and Yu Sasaki and Kan Yasuda
2017/259 ( PDF )
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
Daniele Micciancio and Michael Walter
2017/258 ( PDF )
Pseudorandomness of Ring-LWE for Any Ring and Modulus
Chris Peikert and Oded Regev and Noah Stephens-Davidowitz
2017/257 ( PDF )
Threshold Fully Homomorphic Encryption
Aayush Jain and Peter M. R. Rasmussen and Amit Sahai
2017/256 ( PDF )
A Framework for Universally Composable Diffie-Hellman Key Exchange
Ralf Kuesters and Daniel Rausch
2017/255 ( PDF )
New and Old Limits for AES Known-Key Distinguishers
Lorenzo Grassi and Christian Rechberger
2017/254 ( PDF )
Towards Easy Key Enumeration
Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou
2017/253 ( PDF )
A Modular Security Analysis of EAP and IEEE 802.11
Chris Brzuska and Håkon Jacobsen
2017/252 ( PDF )
High-Order Conversion From Boolean to Arithmetic Masking
Jean-Sebastien Coron
2017/251 ( PDF )
A Lattice-Based Universal Thresholdizer for Cryptographic Systems
Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim
2017/250 ( PDF )
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
Huijia Lin and Stefano Tessaro
2017/249 ( PDF )
Proof of Luck: an Efficient Blockchain Consensus Protocol
Mitar Milutinovic and Warren He and Howard Wu and Maxinder Kanwal
2017/248 ( PDF )
IPcore implementation susceptibility: A case study of Low latency ciphers
Dillibabu Shanmugam and Ravikumar Selvam and Suganya Annadurai
2017/247 ( PDF )
Efficient Multivariate Ring Signature Schemes
Mohamed Saied Emam Mohamed and Albrecht Petzoldt
2017/246 ( PDF )
An Analysis of FV Parameters Impact Towards its Hardware Acceleration
Joël Cathébras and Alexandre Carbon and Renaud Sirdey and Nicolas Ventroux
2017/245 ( PDF )
Cache-Base Application Detection in the Cloud Using Machine Learning
Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar
2017/244 ( PDF )
Model-counting Approaches For Nonlinear Numerical Constraints
Mateus Borges and Quoc-Sang Phan and Antonio Filieri and Corina S. Păsăreanu
2017/243 ( PDF )
Key Recovery: Inert and Public
Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines
2017/242 ( PDF )
Full accounting for verifiable outsourcing
Riad S. Wahby and Ye Ji and Andrew J. Blumberg and abhi shelat and Justin Thaler and Michael Walfish and Thomas Wies
2017/241 ( PDF )
Forkable Strings are Rare
Alexander Russell and Cristopher Moore and Aggelos Kiayias and Saad Quader
2017/240 ( PDF )
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu
2017/239 ( PDF )
Boosting Authenticated Encryption Robustness With Minimal Modifications
Tomer Ashur and Orr Dunkelman and Atul Luykx
2017/238 ( PDF )
Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin
Tim Ruffing and Pedro Moreno-Sanchez
2017/237 ( PDF )
Switch Commitments: A Safety Switch for Confidential Transactions
Tim Ruffing and Giulio Malavolta
2017/236 ( PDF )
A new rank metric codes based encryption scheme
Pierre Loidreau
2017/235 ( PDF )
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption
Isheeta Nargis
2017/234 ( PDF )
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Kevin Milner and Cas Cremers and Jiangshan Yu and Mark Ryan
2017/233 ( PDF )
Simplifying Design and Analysis of Complex Predicate Encryption Schemes
Shashank Agrawal and Melissa Chase
2017/232 ( PDF )
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou
2017/231 ( PDF )
EHE: nonce misuse-resistant message authentication
Sergey Agievich
2017/230 ( PDF )
Smart Contracts Make Bitcoin Mining Pools Vulnerable
Yaron Velner and Jason Teutsch and Loi Luu
2017/229 ( PDF )
Multi-Prover Interactive Proofs: Unsound Foundations
Claude Crépeau and Nan Yang
2017/228 ( PDF )
Efficient and Secure Outsourcing of Genomic Data Storage
João Sá Sousa and Cédric Lefebvre and Zhicong Huang and Jean Louis Raisaro and Carlos Aguilar and Marc-Olivier Killijian and Jean-Pierre Hubaux
2017/227 ( PDF )
Towards Shared Ownership in the Cloud
Hubert Ritzdorf and Claudio Soriente and Ghassan O. Karame and Srdjan Marinovic and Damian Gruber and Srdjan Capkun
2017/226 ( PDF )
JIMU: Faster LEGO-based Secure Computation using Additive Homomorphic Hashes
Ruiyu Zhu and Yan Huang
2017/225 ( PDF )
Bandwidth Hard Functions for ASIC Resistance
Ling Ren and Srinivas Devadas
2017/224 ( PDF )
Simple Encrypted Arithmetic Library - SEAL v2.1
Hao Chen and Kim Laine and Rachel Player
2017/223 ( PDF )
0-RTT Key Exchange with Full Forward Secrecy
Felix Günther and Britta Hale and Tibor Jager and Sebastian Lauer
2017/222 ( PDF )
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
Nizamud Dina, Arif Iqbal Umar, Abdul Waheed, Noor ul Amin
2017/221 ( PDF )
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE
Florian Göpfert and Christine van Vredendaal and Thomas Wunderer
2017/220 ( PDF )
Cryptanalysis of PMACx, PMAC2x, and SIVx
Kazuhiko Minematsu and Tetsu Iwata
2017/219 ( PDF )
Attribute-Based Encryption from Identity-Based Encryption
Chun-I Fan and Yi-Fan Tseng and Chih-Wen Lin
2017/218 ( PDF )
Repeated Games for Generating Randomness in Encryption
Kenji Yasunaga and Kosuke Yuzawa
2017/217 ( PDF )
Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings
Kuo-Hui Yeh
2017/216 ( PDF )
SCRAPE: Scalable Randomness Attested by Public Entities
Ignacio Cascudo and Bernardo David
2017/215 ( -- withdrawn -- )
SEVDSI: Secure, Efficient and Verifiable Data Set Intersection
Ozgur Oksuz and Iraklis Leontiadis and Sixia Chen and Alexander Russell and Qiang Tang and Bing Wang
2017/214 ( PDF )
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer
Carmit Hazay and Peter Scholl and Eduardo Soria-Vazquez
2017/213 ( PDF )
Quantum Information Set Decoding Algorithms
Ghazal Kachigar and Jean-Pierre Tillich
2017/212 ( PDF )
Montgomery curves and their arithmetic: The case of large characteristic fields
Craig Costello and Benjamin Smith
2017/211 ( PDF )
Multi-level Access in Searchable Symmetric Encryption
James Alderman and Keith M. Martin and Sarah Louise Renwick
2017/210 ( PDF )
Public Key Cryptosystems with Noisy Secret Keys
Charles Herder and Benjamin Fuller and Marten van Dijk and Srinivas Devadas
2017/209 ( PDF )
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
Qipeng Liu and Mark Zhandry
2017/208 ( PDF )
SoK: Security Models for Pseudo-Random Number Generators
Sylvain Ruhault
2017/207 ( PDF )
Private Queries on Encrypted Genomic Data
Gizem S Cetin and Hao Chen and Kim Laine and Kristin Lauter and Peter Rindal and Yuhou Xia
2017/206 ( PDF )
Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes
Yongge Wang
2017/205 ( PDF )
ZETA: Towards Tagless Authenticated Encryption
Anindya Shankar Bhandari and Dipanwita Roy Chowdhury
2017/204 ( PDF )
Linear Cryptanalysis Using Low-bias Linear Approximations
Tomer Ashur, Daniël Bodden, and Orr Dunkelman
2017/203 ( PDF )
Proofs of Useful Work
Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
2017/202 ( PDF )
Average-Case Fine-Grained Hardness
Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan
2017/201 ( PDF )
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control
Gabriel Kaptchuk and Ian Miers and Matthew Green
2017/200 ( PDF )
Anonymous Attestation with Subverted TPMs
Jan Camenisch and Manu Drijvers and Anja Lehmann
2017/199 ( PDF )
Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme
Dustin Moody and Ray Perlner and Daniel Smith-Tone
2017/198 ( PDF )
FHE with Recursive Ciphertext
Masahiro Yagisawa
2017/197 ( PDF )
A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group
Wenying Zhang, Zhaohui Xing and Keqin Feng
2017/196 ( PDF )
Attribute-based concurrent signatures
BaoHong Li, Guoqing Xu and Yinliang Zhao
2017/195 ( PDF )
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
Chaoyun Li and Qingju Wang
2017/194 ( PDF )
Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2)
Andrea Visconti and Chiara Valentina Schiavo and René Peralta
2017/193 ( PDF )
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures
Shuwen Deng and Doğuhan Gümüşoğlu and Wenjie Xiong and Y. Serhan Gener and Onur Demir and Jakub Szefer
2017/192 ( -- withdrawn -- )
Improved Hybrid Consensus Scheme with Privacy-preserving Property
Shuyang Tang and Zhiqiang Liu and Zhen Liu and Yu Long and Shengli Liu
2017/191 ( PDF )
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks
David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun
2017/190 ( PDF )
The first collision for full SHA-1
Marc Stevens and Elie Bursztein and Pierre Karpman and Ange Albertini and Yarik Markov
2017/189 ( PDF )
Global-Scale Secure Multiparty Computation
Xiao Wang and Samuel Ranellucci and Jonathan Katz
2017/188 ( PDF )
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer
Wenying Zhang and Vincent Rijmen
2017/187 ( PDF )
The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives
H. Gopalakrishna Gadiyar and R. Padma
2017/186 ( PDF )
A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies
Youngho Yoo and Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev
2017/185 ( PDF )
A Virtual Wiretap Channel for Secure MessageTransmission
Setareh Sharifian, and Reihaneh Safavi-Naini, and Fuchun Lin
2017/184 ( PDF )
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Guillaume Endignoux, Damian Vizár
2017/183 ( PDF )
Analysis of Software Countermeasures for Whitebox Encryption
Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Martin Bjerregaard Jepsen
2017/182 ( PDF )
The Approximate $k$-List Problem
Leif Both and Alexander May
2017/181 ( PDF )
New techniques for trail bounds and application to differential trails in Keccak
Silvia Mella and Joan Daemen and Gilles Van Assche
2017/180 ( PDF )
Robust Synchronous P2P Primitives Using SGX Enclaves
Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang
2017/179 ( PDF )
REM: Resource-Efficient Mining for Blockchains
Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse
2017/178 ( PDF )
Optimal Differential Trails in SIMON-like Ciphers
Zhengbin Liu and Yongqiang Li and Mingsheng Wang
2017/177 ( PDF )
Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets
Navid Nasr Esfahani, Ian Goldberg and D. R. Stinson
2017/176 ( PDF )
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge
Yuval Ishai and Mor Weiss
2017/175 ( PDF )
Analysis of Burn-in period for RC4 State Transition
Goutam Paul and Souvik Ray
2017/174 ( PDF )
Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes
Ruiyu Zhu and Yan Huang
2017/173 ( PDF )
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions
Marc Stevens and Dan Shumow
2017/172 ( PDF )
On The Exact Security of Message Authentication Using Pseudorandom Functions
Ashwin Jha and Avradip Mandal and Mridul Nandi
2017/171 ( PDF )
Quantum Key Search with Side Channel Advice
Daniel P. Martin and Ashley Montanaro and Elisabeth Oswald and Dan Shepherd
2017/170 ( PDF )
Error-free protection of EC point multiplication by modular extension
Martin Seysen
2017/169 ( PDF )
UFace: Your Universal Password That No One Can See
Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
2017/168 ( PDF )
AES-GCM-SIV: Specification and Analysis
Shay Gueron and Adam Langley and Yehuda Lindell
2017/167 ( PDF )
Cloud Storage File Recoverability
Christian A. Gorke and Christian Janson and Frederik Armknecht and Carlos Cid
2017/166 ( PDF )
A roadmap to fully homomorphic elections: Stronger security, better verifiability
Kristian Gjøsteen and Martin Strand
2017/165 ( PDF )
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
Dhiman Saha and Sukhendu Kuila and Dipanwita Roy Chowdhury
2017/164 ( PDF )
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
Benny Applebaum and Barak Arkis and Pavel Raykov and Prashant Nalini Vasudevan
2017/163 ( PDF )
Homomorphic Encryption without Gaussian Noise
Anamaria Costache and Nigel P. Smart
2017/162 ( PDF )
Analysis of AES, SKINNY, and Others with Constraint Programming
Siwei Sun and David Gerault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu
2017/161 ( PDF )
Security Notions for Bidirectional Channels
Giorgia Azzurra Marson and Bertram Poettering
2017/160 ( PDF )
Conditional Cube Attack on Round-Reduced ASCON
Zheng Li and Xiaoyang Dong and Xiaoyun Wang
2017/159 ( PDF )
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
Xiaoyang Dong and Zheng Li and Xiaoyun Wang and Ling Qin
2017/158 ( PDF )
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy
Martin Potthast and Christian Forler and Eik List and Stefan Lucks
2017/157 ( PDF )
Detecting General Algebraic Manipulation Attacks
Kim Ramchen
2017/156 ( PDF )
Trust Is Risk: A Decentralized Financial Trust Platform
Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros
2017/155 ( PDF )
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning
Yoshinori Aono and Phong Q. Nguyen
2017/154 ( PDF )
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
Thorsten Kranz and Friedrich Wiemer and Gregor Leander
2017/153 ( PDF )
Storage Efficient Substring Searchable Symmetric Encryption
Iraklis Leontiadis and Ming Li
2017/152 ( PDF )
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
Fermi Ma and Mark Zhandry
2017/151 ( PDF )
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay
2017/150 ( PDF )
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
Elette Boyle and Niv Gilboa and Yuval Ishai
2017/149 ( PDF )
Bitcoin as a Transaction Ledger: A Composable Treatment
Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas
2017/148 ( PDF )
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data
Olivier Sanders and Cristina Onete and Pierre-Alain Fouque
2017/147 ( PDF )
Ad Hoc PSM Protocols: Secure Computation Without Coordination
Amos Beimel and Yuval Ishai and Eyal Kushilevitz
2017/146 ( PDF )
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Mohammad Hajiabadi and Bruce M. Kapron
2017/145 ( PDF )
The Multi-User Security of Double Encryption
Viet Tung Hoang and Stefano Tessaro
2017/144 ( PDF )
Privacy-Preserving Search of Similar Patients in Genomic Data
Gilad Asharov and Shai Halevi and Yehuda Lindell and Tal Rabin
2017/143 ( PDF )
Constraint-hiding Constrained PRFs for NC1 from LWE
Ran Canetti and Yilei Chen
2017/142 ( PDF )
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme
Jean-François Biasse and Thomas Espitau and Pierre-Alain Fouque and Alexandre Gélin and Paul Kirchner
2017/141 ( PDF )
Partitioned Group Password-Based Authenticated Key Exchange
Dario Fiore and Maria Isabel Gonzalez Vasco and Claudio Soriente
2017/140 ( PDF )
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Nina Bindel and Johannes Buchmann and Florian Göpfert and Markus Schmidt
2017/139 ( PDF )
Revisiting AES Related-Key Differential Attacks with Constraint Programming
David Gérault and Pascal Lafourcade and Marine Minier and Christine Solnon
2017/138 ( PDF )
How (not) to Use Welch's T-test in Side-Channel Security Evaluations
François-Xavier Standaert
2017/137 ( PDF )
Modifying an Enciphering Scheme after Deployment
Paul Grubbs and Thomas Ristenpart and Yuval Yarom
2017/136 ( PDF )
Dispersed Cryptography and the Quotient Ring Transform
Anna Johnston
2017/135 ( PDF )
Hashing Garbled Circuits for Free
Xiong Fan and Chaya Ganesh and Vladimir Kolesnikov
2017/134 ( PDF )
A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes
Ryan Stanley-Oakes
2017/133 ( PDF )
Composable and Robust Outsourced Storage
Christian Badertscher and Ueli Maurer
2017/132 ( PDF )
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol
Roel Peeters, Jens Hermans and Aysajan Abidin
2017/131 ( PDF )
A Practical Multivariate Blind Signature Scheme
Albrecht Petzoldt and Alan Szepieniec and Mohamed Saied Emam Mohamed
2017/130 ( PDF )
Topology-Hiding Computation Beyond Logarithmic Diameter
Adi Akavia and Tal Moran
2017/129 ( PDF )
Sublinear Zero-Knowledge Arguments for RAM Programs
Payman Mohassel and Mike Rosulek and Alessandra Scafuro
2017/128 ( PDF )
New Collision Attacks on Round-Reduced Keccak
Kexin Qiao and Ling Song and Meicheng Liu and Jian Guo
2017/127 ( PDF )
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
Prabhanjan Ananth and Aayush Jain and Amit Sahai
2017/126 ( PDF )
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
Seny Kamara and Tarik Moataz
2017/125 ( PDF )
Non-Interactive Secure 2PC in the Offline/Online and Batch Settings
Payman Mohassel and Mike Rosulek
2017/124 ( PDF )
On the Exact Round Complexity of Self-Composable Two-Party Computation
Sanjam Garg and Susumu Kiyoshima and Omkant Pandey
2017/123 ( PDF )
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Rishab Goyal and Venkata Koppula and Brent Waters
2017/122 ( PDF )
One-Shot Verifiable Encryption from Lattices
Vadim Lyubashevsky and Gregory Neven
2017/121 ( PDF )
Twisted $\mu_4$-normal form for elliptic curves
David Kohel
2017/120 ( PDF )
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
Rishab Goyal and Venkata Koppula and Brent Waters
2017/119 ( PDF )
Quantum Authentication with Key Recycling
Christopher Portmann
2017/118 ( PDF )
A New Structural-Differential Property of 5-Round AES
Lorenzo Grassi and Christian Rechberger and and Sondre Rønjom
2017/117 ( PDF )
The SM9 Cryptographic Schemes
Zhaohui Cheng
2017/116 ( PDF )
Masking Proofs are Tight (and How to Exploit it in Security Evaluations)
Vincent Grosso and François-Xavier Standaert
2017/115 ( PDF )
An efficient self-blindable attribute-based credential scheme
Sietse Ringers and Eric Verheul and Jaap-Henk Hoepman
2017/114 ( PDF )
Zero-Knowledge Proofs of Proximity
Itay Berman and Ron D. Rothblum and Vinod Vaikuntanathan
2017/113 ( PDF )
Algebraic Fault Analysis of SHA-3
Pei Luo and Konstantinos Athanasiou and Yunsi Fei and Thomas Wahl
2017/112 ( PDF )
Zero-Knowledge Proxy Re-Identification Revisited
Xavier Bultel and Pascal Lafourcade
2017/111 ( PDF )
EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves
Jonathan Burns and Daniel Moore and Katrina Ray and Ryan Speers and Brian Vohaska
2017/110 ( PDF )
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Patrick McCorry and Siamak F. Shahandashti and Feng Hao
2017/109 ( PDF )
Unilaterally-Authenticated Key Exchange
Yevgeniy Dodis and Dario Fiore
2017/108 ( PDF )
Photonic Side Channel Attacks Against RSA
Elad Carmon and Jean-Pierre Seifert and Avishai Wool
2017/107 ( PDF )
Secure Logging with Crash Tolerance
Erik-Oliver Blass and Guevara Noubir
2017/106 ( PDF )
$\mu$chain: How to Forget without Hard Forks
Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
2017/105 ( PDF )
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem
Ling Yang and Fuyang Fang and Xianhui Lu and Wen-Tao Zhu and Qiongxiao Wang and Shen Yan and Shiran Pan
2017/104 ( PDF )
Implementing BP-Obfuscation Using Graph-Induced Encoding
Shai Halevi and Tzipora Halevi and Victor Shoup and Noah Stephens-Davidowitz
2017/103 ( PDF )
Reconciling d+1 Masking in Hardware and Software
Hannes Gross and Stefan Mangard
2017/102 ( PDF )
Quantum Authentication and Encryption with Key Recycling
Serge Fehr and Louis Salvail
2017/101 ( PDF )
Optimizing Implementations of Lightweight Building Blocks
Jérémy Jean and Thomas Peyrin and Siang Meng Sim
2017/100 ( PDF )
Private Puncturable PRFs From Standard Lattice Assumptions
Dan Boneh and Sam Kim and Hart Montgomery
2017/099 ( PDF )
Making NSEC5 Practical for DNSSEC
Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan Včelák and Leonid Reyzin and Sharon Goldberg
2017/098 ( PDF )
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions
Vanesa Daza and Nikolaos Makriyannis
2017/097 ( PDF )
Boolean functions with restricted input and their robustness; application to the FLIP cipher
Claude Carlet and Pierrick Méaux and Yann Rotella
2017/096 ( PDF )
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
Shota Yamada
2017/095 ( PDF )
Attacks on Secure Logging Schemes
Gunnar Hartung
2017/094 ( PDF )
Quantum Tokens for Digital Signatures
Shalev Ben-David and Or Sattath
2017/093 ( PDF )
On new multivariate cryptosystems based on hidden Eulerian equations over finite fields
Vasyl Ustimenko
2017/092 ( PDF )
Small CRT-Exponent RSA Revisited
Atsushi Takayasu and Yao Lu and Liqiang Peng
2017/091 ( PDF )
Design and Implementation of Low Depth Pairing-based Homomorphic Encryption Scheme
Vincent Herbert and Bhaskar Biswas and Caroline Fontaine
2017/090 ( PDF )
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Saiyu Qi and Yichen Li and Yuanqing Zheng and Yong Qi
2017/089 ( PDF )
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
Yuri Borissov, and Peter Boyvalenkov, and Robert Tsenkov
2017/088 ( PDF )
A Differential Fault Attack on Plantlet
Subhamoy Maitra, Akhilesh Siddhanti
2017/087 ( PDF )
Cryptanalysis of full round Fruit
Sabyasachi Dey and Santanu Sarkar
2017/086 ( PDF )
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
David Derler and Sebastian Ramacher and Daniel Slamanig
2017/085 ( PDF )
Information Security Applications of Bit-Mixers
Laszlo Hars
2017/084 ( PDF )
Hardware Bit-Mixers
Laszlo Hars
2017/083 ( PDF )
Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders
Anna Johnston
2017/082 ( PDF )
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin and Felix Günther
2017/081 ( PDF )
Estonian Voting Verification Mechanism Revisited Again
Ivo Kubjas and Tiit Pikma and Jan Willemson
2017/080 ( PDF )
From Minicrypt to Obfustopia via Private-Key Functional Encryption
Ilan Komargodski and Gil Segev
2017/079 ( PDF )
Faster Bootstrapping of FHE over the Integers
Jung Hee Cheon and Kyoohyung Han and Duhyeong Kim
2017/078 ( PDF )
LPN Decoded
Andre Esser and Robert Kübler and Alexander May
2017/077 ( PDF )
Quantum algorithms for computing short discrete logarithms and factoring RSA integers
Martin Ekerå and Johan Håstad
2017/076 ( PDF )
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version)
Benjamin Lac and Anne Canteaut and Jacques Fournier and Renaud Sirdey
2017/075 ( PDF )
A First DFA on PRIDE: from Theory to Practice (extended version)
Benjamin Lac and Marc Beunardeau and Anne Canteaut and Jacques Fournier and Renaud Sirdey
2017/074 ( PDF )
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
Joo-Im Kim and Ji Won Yoon
2017/073 ( PDF )
Visual Honey Encryption: Application to Steganography
Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee and Kwangsu Lee
2017/072 ( PDF )
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes
Carmen Kempka and Ryo Kikuchi and Koutarou Suzuki
2017/071 ( PDF )
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2017/070 ( PDF )
Symbolic Models for Isolated Execution Environments
Charlie Jacomme and Steve Kremer and Guillaume Scerri
2017/069 ( PDF )
The Exact Security of PMAC
Peter Gaži and Krzysztof Pietrzak and Michal Rybár
2017/068 ( PDF )
Authenticated Encryption in the Face of Protocol and Side Channel Leakage
Guy Barwell and Daniel P. Martin and Elisabeth Oswald and Martijn Stam
2017/067 ( PDF )
Computation of a 768-bit prime field discrete logarithm
Thorsten Kleinjung and Claus Diem and Arjen K. Lenstra and Christine Priplata and Colin Stahlke
2017/066 ( PDF )
Subring Homomorphic Encryption
Seiko Arita and Sari Handa
2017/065 ( PDF )
FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime
Daniel Benarroch and Zvika Brakerski and Tancrède Lepoint
2017/064 ( PDF )
Fast Montgomery-like Square Root Computation over $GF(2^m)$ for All Trinomials
Yin Li and Yu Zhang
2017/063 ( PDF )
Optimal Extension Protocols for Byzantine Broadcast and Agreement
Chaya Ganesh and Arpita Patra
2017/062 ( PDF )
Efficient Maliciously Secure Two Party Computation for Mixed Programs
Arash Afshar and Payman Mohassel and Mike Rosulek
2017/061 ( PDF )
Continuous Collision Resistance and its Applications
Tibor Jager and Rafael Kurek
2017/060 ( PDF )
Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel and Marc Fischlin
2017/059 ( PDF )
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext
Kamalesh Acharya and Ratna Dutta
2017/058 ( PDF )
WalnutDSA(TM): A Quantum-Resistant Digital Signature Algorithm
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells
2017/057 ( PDF )
Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card
Mathias Wagner and Stefan Heyse
2017/056 ( PDF )
Verifiable Classroom Voting in Practice
Feng Hao and Dylan Clarke and Brian Randell and Siamak F. Shahandashti
2017/055 ( PDF )
A Probabilistic Baby-Step Giant-Step Algorithm
Prabhat Kushwaha and Ayan Mahalanobis
2017/054 ( PDF )
Attribute-Based Encryption Implies Identity-Based Encryption
Javier Herranz
2017/053 ( PDF )
Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem
Dimitar Jetchev and Benjamin Wesolowski
2017/052 ( PDF )
A short note on the security of Round-Robin Differential Phase-Shift QKD
Boris Skoric
2017/051 ( PDF )
A note on VRFs from Verifiable Functional Encryption
Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai
2017/050 ( PDF )
An Obfuscating Compiler
Peter T. Breuer
2017/049 ( PDF )
LARA - A Design Concept for Lattice-based Encryption
El Bansarkhani Rachid
2017/048 ( PDF )
ROTE: Rollback Protection for Trusted Execution
Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun
2017/047 ( PDF )
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
Martin R. Albrecht
2017/046 ( PDF )
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption
Matthieu Giraud and Alexandre Anzala-Yamajako and Olivier Bernard and Pascal Lafourcade
2017/045 ( PDF )
Efficient Round-Optimal Blind Signatures in the Standard Model
Essam Ghadafi
2017/044 ( PDF )
Anonymous contribution of data
Matthew McKague and David Eyers
2017/043 ( PDF )
Accumulators with Applications to Anonymity-Preserving Revocation
Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov
2017/042 ( PDF )
Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient
Yuanxi Dai and Yannick Seurin and John Steinberger and Aishwarya Thiruvengadam
2017/041 ( PDF )
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy
Yongge Wang and Qutaibah m. Malluhi
2017/040 ( PDF )
Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions
Aggelos Kiayias and Feng-Hao Liu and Yiannis Tselekounis
2017/039 ( PDF )
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version)
Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
2017/038 ( PDF )
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
Fabrice Benhamouda and Florian Bourse and Helger Lipmaa
2017/037 ( PDF )
Double-base scalar multiplication revisited
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange
2017/036 ( PDF )
Low-Complexity Cryptographic Hash Functions
Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan
2017/035 ( PDF )
Privacy-Preserving Classification on Deep Neural Network
Hervé Chabanne and Amaury de Wargny and Jonathan Milgram and Constance Morel and Emmanuel Prouff
2017/034 ( PDF )
Analysis of the NORX Core Permutation
Alex Biryukov and Aleksei Udovenko and Vesselin Velichkov
2017/033 ( PDF )
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Peter Pessl
2017/032 ( PDF )
Cryptanalysis of GlobalPlatform Secure Channel Protocols
Mohamed Sabt and Jacques Traoré
2017/031 ( PDF )
Honey Encryption for Language
Marc Beunardeau and Houda Ferradi and Rémi Géraud and David Naccache
2017/030 ( PDF )
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
Xiao Wang and Samuel Ranellucci and Jonathan Katz
2017/029 ( PDF )
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
Gene Itkis and Emily Shen and Mayank Varia and David Wilson and Arkady Yerukhimovich
2017/028 ( -- withdrawn -- )
A Decentralized PKI In A Mobile Ecosystem
Varun Chandrasekaran and Lakshminarayanan Subramanian
2017/027 ( PDF )
Scalable Multi-Party Private Set-Intersection
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2017/026 ( PDF )
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam
2017/025 ( PDF )
Improved Structure Preserving Signatures under Standard Bilinear Assumptions
Charanjit S. Jutla and Arnab Roy
2017/024 ( PDF )
Searchable Encrypted Relational Databases: Risks and Countermeasures
Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann
2017/023 ( PDF )
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
Nuttapong Attrapadung
2017/022 ( PDF )
Privacy for Distributed Databases via (Un)linkable Pseudonyms
Jan Camenisch and Anja Lehmann
2017/021 ( PDF )
A Generic Approach to Constructing and Proving Verifiable Random Functions
Rishab Goyal and Susan Hohenberger and Venkata Koppula and Brent Waters
2017/020 ( PDF )
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
Olivier Levillain and Maxence Tury and Nicolas Vivet
2017/019 ( PDF )
SmartPool: Practical Decentralized Pooled Mining
Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena
2017/018 ( PDF )
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs
Nir Bitansky
2017/017 ( PDF )
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm
Gottfried Herold and Elena Kirshanova
2017/016 ( PDF )
Provable Security of Substitution-Permutation Networks
Yevgeniy Dodis and Jonathan Katz and John Steinberger and Aishwarya Thiruvengadam and Zhe Zhang
2017/015 ( PDF )
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes
Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/014 ( PDF )
ORAMs in a Quantum World
Tommaso Gagliardoni and Nikolaos P. Karvelas and Stefan Katzenbeisser
2017/013 ( PDF )
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
Meilof Veeningen
2017/012 ( PDF )
Universal Samplers with Fast Verification
Venkata Koppula and Andrew Poelstra and Brent Waters
2017/011 ( PDF )
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig
2017/010 ( PDF )
Circuit-Private Multi-Key FHE
Wutichai Chongchitmate and Rafail Ostrovsky
2017/009 ( PDF )
Access Control Encryption for Equality, Comparison, and More
Georg Fuchsbauer and Romain Gay and Lucas Kowalczyk and Claudio Orlandi
2017/008 ( PDF )
Externally Verifiable Oblivious RAM
Joshua Gancher and Adam Groce and Alex Ledger
2017/007 ( PDF )
Algebraic Attack Efficiency versus S-box Representation
Hossein Arabnezhad-Khanoki and Babak Sadeghiyan and Josef Pieprzyk
2017/006 ( PDF )
Reduced Mumford divisors of a genus 2 curve through its jacobian function field
Eduardo Ruiz Duarte
2017/005 ( PDF )
High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves
Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi
2017/004 ( PDF )
A New Approach for Practical Function-Private Inner Product Encryption
Sungwook Kim and Jinsu Kim and Jae Hong Seo
2017/003 ( PDF )
The STROBE protocol framework
Mike Hamburg
2017/002 ( -- withdrawn -- )
Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption
Ping Zhang, Honggang Hu, and Peng Wang
2017/001 ( PDF )
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
Jorge Luis Villar

[ Cryptology ePrint archive ]