Cryptology ePrint Archive: Listing for 2016


2016/415 ( PDF )
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
Nina Bindel and Johannes Buchmann and Juliane Krämer
2016/414 ( PDF )
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version)
Li Lin and Wenling Wu and Yafei Zheng
2016/413 ( PDF )
Efficient algorithms for supersingular isogeny Diffie-Hellman
Craig Costello and Patrick Longa and Michael Naehrig
2016/412 ( PDF )
Solving Quadratic Equations with XL on Parallel Architectures - extended version
Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, and Bo-Yin Yang
2016/411 ( PDF )
Polymorphic Encryption and Pseudonymisation for Personalised Healthcare
Eric Verheul and Bart Jacobs and Carlo Meijer and Mireille Hildebrandt and Joeri de Ruiter
2016/410 ( PDF )
Efficient quantum-resistant trust Infrastructure based on HIMMO
Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Sauvik Bhattacharya and Maarten Bodlaender
2016/409 ( PDF )
Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}
Alex Biryukov; Vesselin Velichkov; Yann Le Corre
2016/408 ( PDF )
Towards Bitcoin Payment Networks
Patrick McCorry and Malte Möser and Siamak F. Shahandashti and Feng Hao
2016/407 ( PDF )
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck
Kai Fu; Meiqin Wang; Yinghua Guo; Siwei Sun; Lei Hu
2016/406 ( PDF )
On the Construction of Lightweight Circulant Involutory MDS Matrices
Yongqiang Li and Mingsheng Wang
2016/405 ( PDF )
Multiple Differential Cryptanalysis: A Rigorous Analysis
Subhabrata Samajder and Palash Sarkar
2016/404 ( PDF )
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
Subhabrata Samajder and Palash Sarkar
2016/403 ( PDF )
On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
Sanjit Chatterjee and Alfred Menezes and Francisco Rodriguez-Henriquez
2016/402 ( PDF )
Fully Homomorphic Encryption for Point Numbers
Seiko Arita and Shota Nakasato
2016/401 ( PDF )
Tower Number Field Sieve Variant of a Recent Polynomial Selection Method
Palash Sarkar and Shashank Singh
2016/400 ( PDF )
Towards Secure Quadratic Voting
Sunoo Park and Ronald L. Rivest
2016/399 ( PDF )
Slow Motion Zero Knowledge Identifying With Colliding Commitments
Houda Ferradi and Rémi Géraud and David Naccache
2016/398 ( PDF )
Algebraic Insights into the Secret Feistel Network (Full version)
Léo Perrin and Aleksei Udovenko
2016/397 ( PDF )
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model
Ronald Cramer and Ivan Damgård and Nico Döttling and Irene Giacomelli and Chaoping Xing
2016/396 ( PDF )
Cryptanalysis of Haraka
Jérémy Jean
2016/395 ( PDF )
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2016/394 ( PDF )
Strengthening the Known-Key Security Notion for Block Ciphers
Benoît Cogliati and Yannick Seurin
2016/393 ( PDF )
Adjacency Graphs, Irreducible Polynomials and Cyclotomy
Ming Li and Dongdai Lin
2016/392 ( -- withdrawn -- )
Towards a Further Understanding of Bit-Based Division Property
Ling Sun and Meiqin Wang
2016/391 ( PDF )
A Digital Signature Scheme Based on Random Split of St-Gen Codes
Danilo Gligoroski and Simona Samardjiska
2016/390 ( PDF )
Obfuscation without the Vulnerabilities of Multilinear Maps
Sanjam Garg and Pratyay Mukherjee and Akshayaram Srinivasan
2016/389 ( PDF )
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees
Georg Fuchsbauer and Zahra Jafargholi and Krzysztof Pietrzak
2016/388 ( PDF )
Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem
Mojahed Mohamed and Xiaofen Wang and Xiaosong Zhang
2016/387 ( PDF )
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
K. Baghery, B. Abdolmaleki, M. J. Emadi
2016/386 ( PDF )
Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators
Vladimir Rožić and Bohan Yang and Nele Mentens and Ingrid Verbauwhede
2016/385 ( PDF )
A note on Ring-LWE security in the case of Fully Homomorphic Encryption
Guillaume Bonnoron and Caroline Fontaine
2016/384 ( PDF )
Attacks against Filter Generators Exploiting Monomial Mappings
Anne Canteaut and Yann Rotella
2016/383 ( PDF )
Reducing the Key Size of the SRP Encryption Scheme - Extended version
Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi
2016/382 ( PDF )
Faster discrete logarithms on FPGAs
Daniel J. Bernstein and Susanne Engels and Tanja Lange and Ruben Niederhagen and Christof Paar and Peter Schwabe and Ralf Zimmermann
2016/381 ( PDF )
FHE Circuit Privacy Almost For Free
Florian Bourse and Rafaël Del Pino and Michele Minelli and Hoeteck Wee
2016/380 ( PDF )
Parallel Implementation of CVP enumeration for LWE
Elena Kirshanova and Alexander May and Friedrich Wiemer
2016/379 ( PDF )
Two More Efficient Variants of the J-PAKE Protocol
Jean Lancrenon and Marjan Skrobot and Qiang Tang
2016/378 ( PDF )
Using semidirect product of (semi)groups in public key cryptography
Delaram Kahrobaei and Vladimir Shpilrain
2016/377 ( PDF )
Differential Cryptanalysis of Salsa and ChaCha -- An Evaluation with a Hybrid Model
Arka Rai Choudhuri and Subhamoy Maitra
2016/376 ( PDF )
A Systematic Analysis of the Juniper Dual EC Incident
Stephen Checkoway and Shaanan Cohney and Christina Garman and Matthew Green and Nadia Heninger and Jacob Maskiewicz and Eric Rescorla and Hovav Shacham and Ralf-Philipp Weinmann
2016/375 ( PDF )
Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
Alon Rosen and Gil Segev and Ido Shahaf
2016/374 ( PDF )
Analysis of SHA-512/224 and SHA-512/256
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2016/373 ( PDF )
Adaptive partitioning
Dennis Hofheinz
2016/372 ( PDF )
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion
Mihir Bellare and Georg Fuchsbauer and Alessandra Scafuro
2016/371 ( PDF )
A Cryptographic Analysis of UMTS/LTE AKA
Stephanie Alt and Pierre-Alain Fouque and Gilles Macario-rat and Benjamin Richard and Cristina Onete
2016/370 ( PDF )
Malleability of the blockchain’s entropy
Cecile Pierrot and Benjamin Wesolowski
2016/369 ( PDF )
On Multi-Point Local Decoding of Reed-Muller Codes
Ronald Cramer and Chaoping Xing and Chen Yuan
2016/368 ( PDF )
Foundations of Fully Dynamic Group Signatures
Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth
2016/367 ( PDF )
An Analysis of OpenSSL's Random Number Generator
Falko Strenzke
2016/366 ( PDF )
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers
Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina
2016/365 ( PDF )
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
Masahiro Ishii and Jérémie Detrey and Pierrick Gaudry and Atsuo Inomata and Kazutoshi Fujikawa
2016/364 ( PDF )
Cryptographic Analysis of the 3GPP AKA Protocol
Stéphanie Alt and Pierre-Alain Fouque and Gilles Macario-rat and Cristina Onete and Benjamin Richard
2016/363 ( PDF )
Legally Fair Contract Signing Without Keystones
Houda Ferradi, Rémi Géraud, Diana Maimut,, David Naccache, and David Pointcheval
2016/362 ( PDF )
An Empirical Study towards Refining the AKS Primality Testing Algorithm
Lalitha Kiran Nemana and V. Ch. Venkaiah
2016/361 ( PDF )
Online-Offline Functional Encryption for Bounded Collusions
Shweta Agrawal and Alon Rosen
2016/360 ( PDF )
Another Look at Tightness II: Practical Issues in Cryptography
Sanjit Chatterjee and Neal Koblitz and Alfred Menezes and Palash Sarkar
2016/359 ( PDF )
Less is More - Dimensionality Reduction from a Theoretical Perspective
Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul
2016/358 ( PDF )
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
Ari Juels and Ahmed Kosba and Elaine Shi
2016/357 ( PDF )
State Management for Hash Based Signatures
David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, and Johannes Buchmann
2016/356 ( PDF )
More Efficient Constructions for Inner-Product Encryption
Somindu C. Ramanna
2016/355 ( PDF )
Fruit: Ultra-Lightweight Stream Cipher with Shorter Internal State
Vahid Amin Ghafari and Honggang Hu
2016/354 ( PDF )
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan
2016/353 ( PDF )
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA
Atsushi Takayasu and Noboru Kunihiro
2016/352 ( PDF )
Closing the Gap in RFC 7748: Implementing Curve448 in Hardware
Pascal Sasdrich and Tim Güneysu
2016/351 ( PDF )
How (Not) to Instantiate Ring-LWE
Chris Peikert
2016/350 ( PDF )
Probabilistic Termination and Composability of Cryptographic Protocols
Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas
2016/349 ( PDF )
Note on Impossible Differential Attacks
Patrick Derbez
2016/348 ( PDF )
A Note on Non-Perfect Secret Sharing
Oriol Farràs and Sebastià Martín and Carles Padró
2016/347 ( PDF )
Cryptanalysis of Searchable Anonymous Attribute Based Encryption
Payal Chaudhari and Manik Lal Das
2016/346 ( PDF )
New Framework for Secure Server-Designation Public Key Encryption with Keyword Search
Xi-Jun Lin and Lin Sun and Haipeng Qu
2016/345 ( PDF )
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction
Satsuya Ohata and Takahiro Matsuda and Kanta Matsuura
2016/344 ( PDF )
Encoding Rational Numbers for FHE-based Applications
HeeWon Chung and Myungsun Kim
2016/343 ( PDF )
On the complexity of constructing pseudorandom functions (especially when they don't exist)
Eric Miles and Emanuele Viola
2016/342 ( PDF )
On the Selective Opening Security of Practical Public-Key Encryption Schemes
Felix Heuer and Tibor Jager and Eike Kiltz and Sven Schäge
2016/341 ( PDF )
Semantically Secure Anonymity: Foundations of Re-encryption
Adam L. Young and Moti Yung
2016/340 ( PDF )
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Eshan Chattopadhyay and Vipul Goyal and Xin Li
2016/339 ( PDF )
Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
Zvika Brakerski and Renen Perlman
2016/338 ( PDF )
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or
Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu
2016/337 ( PDF )
State recovery of RC4 and Spritz Revisited
Martin Gábriš and Martin Stanek
2016/336 ( PDF )
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA
Margarita Osadchy and Julio Hernandez-Castro and Stuart Gibson and Orr Dunkelman and Daniel P ́erez-Cabo
2016/335 ( PDF )
Complete characterization of generalized bent and 2^k-bent Boolean functions
Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng
2016/334 ( PDF )
Probability that the k-gcd of products of positive integers is B-smooth
Jung Hee Cheon and Duhyeong Kim
2016/333 ( PDF )
Proof of Space from Stacked Bipartite Graphs
Ling Ren and Srinivas Devadas
2016/332 ( PDF )
Micropayments for Decentralized Currencies
Rafael Pass and abhi shelat
2016/331 ( PDF )
TRVote: A New, Trustworthy and Robust Electronic Voting System
Fatih Tiryakioğlu and Mehmet Sabir Kiraz and Fatih Birinci and Mehmet Karahan
2016/330 ( PDF )
NaCl's Crypto_Box in Hardware
Michael Hutter and Jürgen Schilling and Peter Schwabe and Wolfgang Wieser
2016/329 ( PDF )
A modified block Lanczos algorithm with fewer vectors
Emmanuel Thomé
2016/328 ( PDF )
Constructing genus 3 hyperelliptic Jacobians with CM
Jennifer Balakrishnan and Sorina Ionica and Kristin Lauter and Christelle Vincent
2016/327 ( PDF )
Proxy Re-Encryption Schemes with Key Privacy from LWE
Le Trieu Phong and Lihua Wang and Yoshinori Aono and Manh Ha Nguyen and Xavier Boyen
2016/326 ( PDF )
Square Attack on 7-Round Kiasu-BC
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2016/325 ( PDF )
Optimized quantization in Zero Leakage Helper Data Systems
Taras Stanko and Fitria Nur Andini and Boris Skoric
2016/324 ( PDF )
Short Interactive Oracle Proofs with Constant Query Complexity, via Composition and Sumcheck
Eli Ben-Sasson and Alessandro Chiesa and Ariel Gabizon and Michael Riabzev and Nicholas Spooner
2016/323 ( PDF )
A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems
Chaohui Du and Guoqiang Bai
2016/322 ( PDF )
On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks
Ulrich Rührmair
2016/321 ( PDF )
Algebraic Decomposition for Probing Security
Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche
2016/320 ( PDF )
On Metrics to Quantify the Inter-Device Uniqueness of PUFs
Linus Feiten, Matthias Sauer, Bernd Becker
2016/319 ( PDF )
High-precision Secure Computation of Satellite Collision Probabilities
Brett Hemenway and Steve Lu and Rafail Ostrovsky and William Welser IV
2016/318 ( PDF )
Generic Construction of Certificateless Signcryption Scheme
Jayaprakash Kar and Sagar Naik
2016/317 ( PDF )
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
Rishab Goyal and Venkata Koppula and Brent Waters
2016/316 ( PDF )
A Note on Black-Box Complexity of Indistinguishability Obfuscation
Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and abhi shelat
2016/315 ( PDF )
Flattening NTRU for Evaluation Key Free Homomorphic Encryption
Yarkın Doröz and Berk Sunar
2016/314 ( PDF )
Blind Source Separation from Single Measurements using Singular Spectrum Analysis
Santos Merino Del Pozo and François-Xavier Standaert
2016/313 ( PDF )
Fiat-Shamir for Highly Sound Protocols is Instantiable
Arno Mittelbach and Daniele Venturi
2016/312 ( PDF )
Refinements of the k-tree Algorithm for the Generalized Birthday Problem
Ivica Nikolic and Yu Sasaki
2016/311 ( PDF )
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0
Bin Zhang and Chao Xu and Willi Meier
2016/310 ( PDF )
Coded-BKW: Solving LWE Using Lattice Codes
Qian Guo and Thomas Johansson and Paul Stankovski
2016/309 ( PDF )
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
Celine Chevalier and Fabien Laguillaumie and Damien Vergnaud
2016/308 ( PDF )
Strongly Leakage-Resilient Authenticated Key Exchange
Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo
2016/307 ( PDF )
Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits
Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin
2016/306 ( PDF )
A Formal Treatment of Backdoored Pseudorandom Generators
Yevgeniy Dodis and Chaya Ganesh and Alexander Golovnev and Ari Juels and Thomas Ristenpart
2016/305 ( PDF )
Certi cateless Aggregate Short Signature Scheme
Jayaprakash Kar
2016/304 ( PDF )
A Fast Attribute Based Encryption
Yacov Yacobi
2016/303 ( PDF )
From Obfuscation to the Security of Fiat-Shamir for Proofs
Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum
2016/302 ( PDF )
A Polynomial-Time Attack on the BBCRS Scheme
Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich and Valérie Gauthier-Umana
2016/301 ( PDF )
Constrained Pseudorandom Functions for Unconstrained Inputs
Apoorvaa Deshpande and Venkata Koppula and Brent Waters
2016/300 ( PDF )
Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme
Leon Groot Bruinderink and Andreas Hülsing and Tanja Lange and Yuval Yarom
2016/299 ( PDF )
Efficient Design Strategies Based on the AES Round Function
Jérémy Jean and Ivica Nikolic
2016/298 ( PDF )
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
Max Fillinger and Marc Stevens
2016/297 ( PDF )
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Liwei Zhang and A. Adam Ding and Yunsi Fei and Pei Luo
2016/296 ( PDF )
How to Sequentialize Independent Parallel Attacks?
Sonia Bogos and Serge Vaudenay
2016/295 ( PDF )
Collision Attack on GRINDAHL
Thomas Peyrin
2016/294 ( PDF )
Evaluation and Improvement of Generic-Emulating DPA Attacks
Weijia Wang and Yu Yu and Junrong Liu and Zheng Guo and François-Xavier Standaert Standaert and Dawu Gu and Sen Xu and Rong Fu
2016/293 ( PDF )
A Parametric Family of Attack Models for Proxy Re-Encryption
David Nuñez, Isaac Agudo, and Javier Lopez
2016/292 ( PDF )
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length
Yusuke Naito and Kan Yasuda
2016/291 ( PDF )
Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems
Cynthia Dwork and Moni Naor and Guy N. Rothblum
2016/290 ( PDF )
Nonce-Based Cryptography: Retaining Security when Randomness Fails
Mihir Bellare and Björn Tackmann
2016/289 ( PDF )
Obfuscation Combiners
Marc Fischlin and Amir Herzberg and Hod Bin Noon and Haya Shulman
2016/288 ( PDF )
Optimization of LPN Solving Algorithms
Sonia Bogos and Serge Vaudenay
2016/287 ( PDF )
Verifiability Notions for E-Voting Protocols
Veronique Cortier and David Galindo and Ralf Kuesters and Johannes Mueller and Tomasz Truderung
2016/286 ( PDF )
On a remarkable property of APN Gold functions
Anastasiya Gorodilova
2016/285 ( PDF )
Bit-Based Division Property and Application to Simon Family
Yosuke Todo and Masakatu Morii
2016/284 ( PDF )
Co-location detection on the Cloud
Mehmet Sinan Inci and Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar
2016/283 ( PDF )
Secure Audit Logs with Verifiable Excerpts
Gunnar Hartung
2016/282 ( PDF )
Detecting flawed masking schemes with leakage detection tests
Oscar Reparaz
2016/281 ( PDF )
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev
2016/280 ( PDF )
Low Power Montgomery Modular Multiplication on Reconfigurable Systems
Pedro Maat C. Massolino and Lejla Batina and Ricardo Chaves and Nele Mentens
2016/279 ( PDF )
Constrained PRFs for Unbounded Inputs with Short Keys
Hamza Abusalah and Georg Fuchsbauer
2016/278 ( PDF )
Various Proxy Re-Encryption Schemes from Lattices
Xiong Fan and Feng-Hao Liu
2016/277 ( PDF )
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings
Xi-Jun Lin and Haipeng Qu and Xiaoshuai Zhang
2016/276 ( PDF )
Arithmetic Coding and Blinding Countermeasures for Ring-LWE
Markku-Juhani O. Saarinen
2016/275 ( PDF )
Faster Algorithms for Solving LPN
Bin Zhang and Lin Jiao and Mingsheng Wang
2016/274 ( PDF )
What users should know about Full Disk Encryption based on LUKS
Simone Bossi and Andrea Visconti
2016/273 ( PDF )
On the weaknesses of PBKDF2
Andrea Visconti and Simone Bossi and Hany Ragab and Alexandro Calò
2016/272 ( PDF )
Spooky Encryption and its Applications
Yevgeniy Dodis and Shai Halevi and Ron D. Rothblum and Daniel Wichs
2016/271 ( PDF )
Cryptanalysis of the FLIP Family of Stream Ciphers
Sébastien Duval and Virginie Lallemand and Yann Rotella
2016/270 ( PDF )
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model
Miguel Ambrona and Gilles Barthe and Benedikt Schmidt
2016/269 ( PDF )
The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials
Ming Li and Dongdai Lin
2016/268 ( PDF )
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach
Ahmad Boorghany and Siavash Bayat-Sarmadi and Rasool Jalili
2016/267 ( PDF )
Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256
Yonglin Hao
2016/266 ( PDF )
Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic
Shinichi Kawamura and Tomoko Yonemura and Yuichi Komano and Hideo Shimizu
2016/265 ( PDF )
Multi-prover Proof-of-Retrievability
Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay
2016/264 ( PDF )
How Fast Can Higher-Order Masking Be in Software?
Dahmun Goudarzi and Matthieu Rivain
2016/263 ( PDF )
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit
2016/262 ( PDF )
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters
Riccardo Longo and Chiara Marcolla and Massimiliano Sala
2016/261 ( PDF )
MEMS-based Gyroscopes as Physical Unclonable Functions
Oliver Willers and Christopher Huth and Jorge Guajardo and Helmut Seidel
2016/260 ( PDF )
On the Size of Pairing-based Non-interactive Arguments
Jens Groth
2016/259 ( PDF )
Adaptive Oblivious Transfer and Generalizations
Olivier Blazy and Céline Chevalier and Paul Germouty
2016/258 ( PDF )
Structure-Preserving Smooth Projective Hashing
Olivier Blazy and Céline Chevalier
2016/257 ( PDF )
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes
Huijia Lin
2016/256 ( PDF )
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage
Qiumao Ma and Jinsheng Zhang and Wensheng Zhang and Daji Qiao
2016/255 ( PDF )
More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds
Essam Ghadafi
2016/254 ( PDF )
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
Pierrick Méaux and Anthony Journault and François-Xavier Standaert and Claude Carlet
2016/253 ( PDF )
Practical DRAM PUFs in Commodity Devices
Wenjie Xiong and André Schaller and Nikolaos Anagnostopoulos and Muhammad Umair Saleem and Sebastian Gabmeyer and Stefan Katzenbeisser and Jakub Szefer
2016/252 ( PDF )
The Exact Round Complexity of Secure Computation
Sanjam Garg and Pratyay Mukherjee and Omkant Pandey and Antigoni Polychroniadou
2016/251 ( PDF )
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations
Gilad Asharov and Moni Naor and Gil Segev and Ido Shahaf
2016/250 ( PDF )
Fixed Point Arithmetic in SHE Scheme
A. Costache and N.P. Smart and S. Vivek and A. Waller
2016/249 ( PDF )
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Amir Moradi and Tobias Schneider
2016/248 ( PDF )
Invariant subspaces in Simpira
Sondre Rønjom
2016/247 ( PDF )
Public Veri able Function Secret Sharing
Wang Qiang and Zhou Fucai and Chen Chunyu and Li Fuxiang and Xu Zifeng
2016/246 ( PDF )
LINGUISTIC CRACKING OF PASSPHRASES USING MARKOV CHAINS
Peder Sparell and Mikael Simovits
2016/245 ( PDF )
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors
Peter Linder
2016/244 ( PDF )
Cryptanalysis of Simpira
Christoph Dobraunig and Maria Eichlseder and Florian Mendel
2016/243 ( PDF )
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka
2016/242 ( PDF )
Attribute-Based Signatures for Circuits from Bilinear Map
Yusuke Sakai and Nuttapong Attrapadung and Goichiro Hanaoka
2016/241 ( PDF )
A trivial debiasing scheme for Helper Data Systems
Boris Skoric
2016/240 ( PDF )
On the tightness of the error bound in Ring-LWE
Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2016/239 ( PDF )
Provably Weak Instances of Ring-LWE Revisited
Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren
2016/238 ( PDF )
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Ágnes Kiss and Juliane Krämer and Pablo Rauzy and Jean-Pierre Seifert
2016/237 ( PDF )
May-Ozerov Algorithm for Nearest-Neighbor Problem over $\mathbb{F}_{q}$ and Its Application to Information Set Decoding
Shoichi Hirose
2016/236 ( PDF )
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT
Guoyan Zhang and Meicheng Liu
2016/235 ( PDF )
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
Takahiro Matsuda and Goichiro Hanaoka
2016/234 ( PDF )
Trick or Tweak: On the (In)security of OTR’s Tweaks
Raphael Bost and Olivier Sanders
2016/233 ( PDF )
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE
Charanjit Jutla and Arnab Roy
2016/232 ( PDF )
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption
Sungwook Kim and Jinsu Kim and Dongyoung Koo and Yuna Kim and Hyunsoo Yoon and Junbum Shin
2016/231 ( PDF )
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
Pierre Belgarric and Pierre-Alain Fouque and Gilles Macario-Rat and Mehdi Tibouchi
2016/230 ( PDF )
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer and Yuval Yarom
2016/229 ( PDF )
Key Compression for Isogeny-Based Cryptosystems
Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, and Christopher Leonardi
2016/228 ( PDF )
On a decentralized trustless pseudo-random number generation algorithm
Serguei Popov
2016/227 ( PDF )
Process Table Covert Channels: Exploitation and Countermeasures
Jean-Michel Cioranesco and Houda Ferradi and Rémi Géraud and David Naccache
2016/226 ( PDF )
On Statistically Secure Obfuscation with Approximate Correctness
Zvika Brakerski and Christina Brzuska and Nils Fleischhacker
2016/225 ( PDF )
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure
Qian Guo, and Thomas Johansson
2016/224 ( PDF )
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
Yuval Yarom and Daniel Genkin and Nadia Heninger
2016/223 ( PDF )
Still Wrong Use of Pairings in Cryptography
Mehmet Sabır Kiraz and Osmanbey Uzunkol
2016/222 ( PDF )
Time-Memory Trade-Off for Lattice Enumeration in a Ball
Paul Kirchner and Pierre-Alain Fouque
2016/221 ( PDF )
On Post-Compromise Security
Katriel Cohn-Gordon and Cas Cremers and Luke Garratt
2016/220 ( PDF )
Algorithms on Ideal over Complex Multiplication order
Paul Kirchner
2016/219 ( PDF )
Nonce-based Kerberos is a Secure Delegated AKE Protocol
Jörg Schwenk
2016/218 ( PDF )
Semantic Security and Key-Privacy With Random Split of St-Gen Codes
Danilo Gligoroski and Simona Samardjiska
2016/217 ( PDF )
Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove
Eric R. Verheul
2016/216 ( PDF )
Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary
Sumit Kumar Debnath and Ratna Dutta
2016/215 ( PDF )
Algorithms for the Approximate Common Divisor Problem
Steven D. Galbraith and Shishay W. Gebregiyorgis and Sean Murphy
2016/214 ( PDF )
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card
Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding
2016/213 ( PDF )
3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky and Zvika Brakerski and Yael Kalai and Omer Paneth and Vinod Vaikuntanathan
2016/212 ( PDF )
Low Linear Complexity Estimates for Coordinate Sequences of Linear Recurrences of Maximal Period over Galois Ring
Vadim N.Tsypyschev
2016/211 ( PDF )
Randomness Complexity of Private Circuits for Multiplication
Sonia Belaïd and Fabrice Benhamouda and Alain Passelègue and Emmanuel Prouff and Adrian Thillard and Damien Vergnaud
2016/210 ( PDF )
Hopes, Fears and Software Obfuscation: A Survey
Boaz Barak
2016/209 ( PDF )
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
Ling Song and Zhangjie Huang and Qianqian Yang
2016/208 ( PDF )
Constant-Round Asynchronous Multi-Party Computation
Sandro Coretti and Juan Garay and Martin Hirt and Vassilis Zikas
2016/207 ( PDF )
Fault analysis and weak key-IV attack on Sprout
Dibyendu Roy and Sourav Mukhopadhyay
2016/206 ( PDF )
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
Johannes Blömer and Gennadij Liske
2016/205 ( PDF )
Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol
Derek Atkins and Dorian Goldfeld
2016/204 ( PDF )
A Memory Encryption Engine Suitable for General Purpose Processors
Shay Gueron
2016/203 ( PDF )
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
Pascal Sasdrich and Amir Moradi and Tim Güneysu
2016/202 ( PDF )
An Encryption Scheme based on Random Split of St-Gen Codes
Simona Samardjiska and Danilo Gligoroski
2016/201 ( PDF )
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
Nico Doettling and Daniel Kraschewski and Joern Mueller-Quade and Tobias Nilges
2016/200 ( PDF )
An Alternative View of the Graph-Induced Multilinear Maps
Yilei Chen
2016/199 ( PDF )
The Honey Badger of BFT Protocols
Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song
2016/198 ( PDF )
Optimizing S-box Implementations for Several Criteria using SAT Solvers
Ko Stoffelen
2016/197 ( PDF )
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Mayuresh Vivekanand Anand and Ehsan Ebrahimi Targhi and Gelo Noel Tabia and Dominique Unruh
2016/196 ( PDF )
Multi-Key FHE from LWE, Revisited
Chris Peikert and Sina Shiehian
2016/195 ( PDF )
How to Generalize RSA Cryptanalyses
Atsushi Takayasu and Noboru Kunihiro
2016/194 ( PDF )
How to Share a Secret, Infinitely
Ilan Komargodski and Moni Naor and Eylon Yogev
2016/193 ( PDF )
Vulnerable Galois RLWE Families and Improved Attacks
Hao Chen, Kristin Lauter and Katherine E. Stange
2016/192 ( PDF )
On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography
Douglas Miller and Adam Scrivener and Jesse Stern and Muthuramakrishnan Venkitasubramaniam
2016/191 ( PDF )
Optimal Security Proofs for Signatures from Identification Schemes
Eike Kiltz and Daniel Masny and Jiaxin Pan
2016/190 ( PDF )
A MAC Mode for Lightweight Block Ciphers
Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
2016/189 ( PDF )
Compositions of linear functions and applications to hashing
Vladimir Shpilrain and Bianca Sosnovski
2016/188 ( PDF )
On the division property of S-boxes
Faruk Göloğlu and Vincent Rijmen and Qingju Wang
2016/187 ( PDF )
Efficient Secure Multiparty Computation with Identifiable Abort
Carsten Baum and Emmanuela Orsini and Peter Scholl
2016/186 ( PDF )
Lightweight MDS Generalized Circulant Matrices (Full Version)
Meicheng Liu and Siang Meng Sim
2016/185 ( PDF )
On the Influence of Message Length in PMAC's Security Bounds
Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda
2016/184 ( PDF )
Efficiently Enforcing Input Validity in Secure Two-party Computation
Jonathan Katz and Alex J. Malozemoff and Xiao Wang
2016/183 ( PDF )
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks -- Extended Version --
Houssem Maghrebi and Victor Servant and Julien Bringer
2016/182 ( PDF )
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems
Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay
2016/181 ( PDF )
Cryptographic Properties of Addition Modulo $2^n$
S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha
2016/180 ( PDF )
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Dennis Hofheinz and Tibor Jager and Andy Rupp
2016/179 ( PDF )
Computing theta functions in quasi-linear time in genus 2 and above
Hugo Labrande and Emmanuel Thomé
2016/178 ( PDF )
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants
Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun\inst, Long Wen, Andrey Bogdanov
2016/177 ( PDF )
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key
Christine van Vredendaal
2016/176 ( PDF )
Anonymous Role-Based Access Control on E-Health Records
Xingguang Zhou and Jianwei Liu and Weiran Liu and Qianhong Wu
2016/175 ( PDF )
Online/Offline OR Composition of Sigma Protocols
Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti
2016/174 ( PDF )
Honey Encryption Beyond Message Recovery Security
Joseph Jaeger and Thomas Ristenpart and Qiang Tang
2016/173 ( PDF )
Circuit Compilers with O(1/ log(n)) Leakage Rate
Marcin Andrychowicz and Stefan Dziembowski and and Sebastian Faust
2016/172 ( PDF )
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption
Yupeng Zhang and Jonathan Katz and Charalampos Papamanthou
2016/171 ( PDF )
Commutativity, Associativity, and Public Key Cryptography
Jacques Patarin and Valérie Nachef
2016/170 ( PDF )
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning
Ran Raz
2016/169 ( PDF )
Provably Robust Sponge-Based PRNGs and KDFs
Peter Gaži and Stefano Tessaro
2016/168 ( PDF )
Town Crier: An Authenticated Data Feed for Smart Contracts
Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi
2016/167 ( PDF )
On Bitcoin Security in the Presence of Broken Crypto Primitives
Ilias Giechaskiel and Cas Cremers and Kasper Rasmussen
2016/166 ( PDF )
Per-Session Security: Password-Based Cryptography Revisited
Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann
2016/165 ( PDF )
PrAd: Enabling Privacy-Aware Location based Advertising
Hung Dang and Ee-Chien Chang
2016/164 ( PDF )
Sanitization of FHE Ciphertexts
Léo Ducas and Damien Stehle
2016/163 ( PDF )
ZKBoo: Faster Zero-Knowledge for Boolean Circuits
Irene Giacomelli and Jesper Madsen and Claudio Orlandi
2016/162 ( PDF )
New Negative Results on Differing-Inputs Obfuscation
Mihir Bellare and Igors Stepanovs and Brent Waters
2016/161 ( PDF )
Revisiting Structure Graph and Its Applications to CBC-MAC and EMAC
Ashwin Jha and Mridul Nandi
2016/160 ( PDF )
Polytopic Cryptanalysis
Tyge Tiessen
2016/159 ( PDF )
Pseudoentropy: Lower-bounds for Chain rules and Transformations
Krzysztof Pietrzak and Maciej Skorski
2016/158 ( PDF )
A Subgradient Algorithm For Computational Distances and Applications to Cryptography
Maciej Skórski
2016/157 ( PDF )
Key Derivation for Squared-Friendly Applications: Lower Bounds
Maciej Skorski
2016/156 ( PDF )
More Efficient Constant-Round Multi-Party Computation from BMR and SHE
Yehuda Lindell and Nigel P. Smart and Eduardo Soria-Vazquez
2016/155 ( PDF )
Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption
Jun Xu and Lei Hu and Santanu Sarkar and Xiaona Zhang and Zhangjie Huang and Liqiang Peng
2016/154 ( PDF )
Fully-Anonymous Short Dynamic Group Signatures Without Encryption
David Derler and Daniel Slamanig
2016/153 ( PDF )
Differentially Private Password Frequency Lists
Jeremiah Blocki and Anupam Datta and Joseph Bonneau
2016/152 ( PDF )
Attacks and parameter choices in HIMMO
Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Moon Sung Lee and Domingo Gomez-Perez and Jaime Gutierrez and Berry Schoenmakers
2016/151 ( PDF )
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
Yu Yu and John Steinberger
2016/150 ( PDF )
On Garbling Schemes With And Without Privacy
Carsten Baum
2016/149 ( PDF )
Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher
Wentan Yi and Shaozhen Chen
2016/148 ( PDF )
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
Srinath M. S. and V. Chandrasekaran
2016/147 ( PDF )
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
Eric Miles and Amit Sahai and Mark Zhandry
2016/146 ( PDF )
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator
Yoshinori Aono and Yuntao Wang and Takuya Hayashi and Tsuyoshi Takagi
2016/145 ( PDF )
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki and Hong-Sheng Zhou
2016/144 ( PDF )
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)
Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu
2016/143 ( PDF )
On the (non-)existence of APN $(n,n)$-functions of algebraic degree $n$
Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nian Li
2016/142 ( PDF )
Hash-Function based PRFs: AMAC and its Multi-User Security
Mihir Bellare and Daniel J. Bernstein and Stefano Tessaro
2016/141 ( PDF )
On low degree polynomials in 2-round AES
Igor Semaev
2016/140 ( PDF )
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
Shota Yamada
2016/139 ( PDF )
An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without a low level encoding of zero
Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee
2016/138 ( PDF )
A new algorithm for residue multiplication modulo $2^{521}-1$
Shoukat Ali, Murat Cenk
2016/137 ( PDF )
Rate-1, Linear Time and Additively Homomorphic UC Commitments
Ignacio Cascudo and Ivan Damgård and Bernardo David and Nico Döttling and Jesper Buus Nielsen
2016/136 ( PDF )
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
Emmanuel Volte and Valérie Nachef and Nicolas Marrière
2016/135 ( PDF )
Cryptanalysis of the New CLT Multilinear Map over the Integers
Jung Hee Cheon and Pierre-Alain Fouque and Changmin Lee and Brice Minaud and Hansol Ryu
2016/134 ( PDF )
More Practical and Secure History-Independent Hash Tables
Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia
2016/133 ( PDF )
On the nonlinearity of monotone Boolean functions
Claude Carlet
2016/132 ( PDF )
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
Shahram Rasoolzadeh and Håvard Raddum
2016/131 ( PDF )
New Attacks on the Concatenation and XOR Hash Combiners
Itai Dinur
2016/130 ( PDF )
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level
Loubna Ghammam and Emmanuel Fouotsa
2016/129 ( PDF )
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer
2016/128 ( PDF )
Removing the Strong RSA Assumption from Arguments over the Integers
Geoffroy Couteau and Thomas Peters and David Pointcheval
2016/127 ( PDF )
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes
Martin Albrecht, Shi Bai, Léo Ducas
2016/126 ( PDF )
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Emre Yüce and Ali Aydın Selçuk
2016/125 ( PDF )
Fully-Secure Lattice-Based IBE as Compact as PKE
Daniel Apon and Xiong Fan and Feng-Hao Liu
2016/124 ( PDF )
Collecting relations for the Number Field Sieve in $GF(p^6)$
Pierrick Gaudry and Laurent Grémy and Marion Videau
2016/123 ( PDF )
Robust Password-Protected Secret Sharing
Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval
2016/122 ( PDF )
Simpira v2: A Family of Efficient Permutations Using the AES Round Function
Shay Gueron and Nicky Mouha
2016/121 ( PDF )
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
Tibor Jager
2016/120 ( PDF )
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
Ignacio Cascudo and Ivan Damgård and Felipe Lacerda and Samuel Ranellucci
2016/119 ( PDF )
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices
Christof Beierle and Thorsten Kranz and Gregor Leander
2016/118 ( PDF )
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security
Zvika Brakerski and Vinod Vaikuntanathan
2016/117 ( PDF )
Circular Security Counterexamples for Arbitrary Length Cycles from LWE
Venkata Koppula and Brent Waters
2016/116 ( PDF )
Interactive Oracle Proofs
Eli Ben-Sasson and Alessandro Chiesa and Nicholas Spooner
2016/115 ( PDF )
Efficiently Computing Data-Independent Memory-Hard Functions
Joel Alwen and Jeremiah Blocki
2016/114 ( PDF )
The Magic of ELFs
Mark Zhandry
2016/113 ( PDF )
On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments
Serge Fehr and Max Fillinger
2016/112 ( PDF )
On the (In)security of SNARKs in the Presence of Oracles
Dario Fiore and Anca Nitulescu
2016/111 ( PDF )
Scalable and Secure Logistic Regression via Homomorphic Encryption
Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang
2016/110 ( PDF )
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
Navid Alamati and Chris Peikert
2016/109 ( PDF )
Fast Multiparty Multiplications from shared bits
Ivan Damgård and Tomas Toft and Rasmus Winther Zakarias
2016/108 ( PDF )
Computing Private Set Operations with Linear Complexities
Alex Davidson and Carlos Cid
2016/107 ( PDF )
Fully Anonymous Transferable Ecash
Hitesh Tewari and Arthur Hughes
2016/106 ( PDF )
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård and Helene Haagh and Claudio Orlandi
2016/105 ( PDF )
Fully homomorphic encryption must be fat or ugly?
Kristian Gjøsteen and Martin Strand
2016/104 ( PDF )
Open Sesame: The Password Hashing Competition and Argon2
Jos Wetzels
2016/103 ( PDF )
Speed Optimizations in Bitcoin Key Recovery Attacks
Nicolas Courtois and Guangyan Song and Ryan Castellucci
2016/102 ( PDF )
Breaking the Sub-Exponential Barrier in Obfustopia
Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan and Mark Zhandry
2016/101 ( PDF )
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
Benoit Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang
2016/100 ( PDF )
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
Joël Alwen and Binyi Chen and Chethan Kamath and Vladimir Kolmogorov and Krzysztof Pietrzak and Stefano Tessaro
2016/099 ( PDF )
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
Michael Clear and Ciaran McGoldrick
2016/098 ( PDF )
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications
Stefan Kölbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger
2016/097 ( PDF )
A Maiorana-McFarland Construction of a GBF on Galois ring
Shashi Kant Pandey and P.R.Mishra and B.K.Dass
2016/096 ( PDF )
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
Bing Sun and Meicheng Liu and Jian Guo and Vincent Rijmen and Ruilin Li
2016/095 ( PDF )
Obfuscation without Multilinear Maps
Dingfeng Ye and Peng Liu
2016/094 ( PDF )
Tightly CCA-Secure Encryption without Pairings
Romain Gay and Dennis Hofheinz and Eike Kiltz and Hoeteck Wee
2016/093 ( PDF )
Valiant's Universal Circuit is Practical
Ágnes Kiss and Thomas Schneider
2016/092 ( PDF )
Cryptanalysis of the Full Spritz Stream Cipher
Subhadeep Banik and Takanori Isobe
2016/091 ( PDF )
On the Security of the Algebraic Eraser Tag Authentication Protocol
Simon R.~Blackburn and M.J.B.~Robshaw
2016/090 ( PDF )
Spectral characterization of iterating lossy mappings
Joan Daemen
2016/089 ( PDF )
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Johannes Buchmann and Florian Göpfert and Rachel Player and Thomas Wunderer
2016/088 ( PDF )
On Linear Hulls and Trails in Simon
Tomer Ashur and Vincent Rijmen
2016/087 ( PDF )
Safely Exporting Keys from Secure Channels: On the Security of EAP-TLS and TLS Key Exporters
Christina Brzuska and Håkon Jacobsen and Douglas Stebila
2016/086 ( PDF )
Intel SGX Explained
Victor Costan and Srinivas Devadas
2016/085 ( PDF )
Cryptanalysis of ring-LWE based key exchange with key share reuse
Scott Fluhrer
2016/084 ( PDF )
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher
Qianqian Yang and Lei Hu and Siwei Sun and Ling Song
2016/083 ( PDF )
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses
Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin
2016/082 ( PDF )
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
Olivier Blazy and David Derler and Daniel Slamanig and Raphael Spreitzer
2016/081 ( PDF )
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila
2016/080 ( PDF )
Cryptanalysis of PRINCE with Minimal Data
Shahram Rasoolzadeh and Håvard Raddum
2016/079 ( PDF )
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Qiang Tang and Balazs Pejo and Husen Wang
2016/078 ( PDF )
Non-Interactive Verifiable Secret Sharing For Monotone Circuits
Ge Bai \and Ivan Damgård \and Claudio Orlandi \and Yu Xia
2016/077 ( PDF )
Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN
Shahram Rasoolzadeh and Håvard Raddum
2016/076 ( PDF )
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings
Xi-Jun Lin and Haipeng Qu and Xiaoshuai Zhang
2016/075 ( PDF )
Weaknesses in Hadamard Based Symmetric Key Encryption Schemes
Gajraj Kuldeep and Devendra Kumar Yadav and A. K. Sharma
2016/074 ( PDF )
On the Power of Secure Two-Party Computation
Carmit Hazay and Muthuramakrishnan Venkitasubramaniam
2016/073 ( PDF )
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Jinsheng Zhang and Wensheng Zhang and Daji Qiao
2016/072 ( PDF )
Downgrade Resilience in Key-Exchange Protocols
Karthikeyan Bhargavan and Christina Brzuska and Cédric Fournet and Matthew Green and Markulf Kohlweiss and Santiago Zanella-Béguelin
2016/071 ( PDF )
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version)
Alex Biryukov and Léo Perrin and Aleksei Udovenko
2016/070 ( PDF )
Domain-Specific Pseudonymous Signatures Revisited
Kamil Kluczniak
2016/069 ( PDF )
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
Gergei Bana and Rohit Chadha
2016/068 ( -- withdrawn -- )
Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes
Yongge Wang
2016/067 ( PDF )
OPFE: Outsourcing Computation for Private Function Evaluation
Henry Carter and Patrick Traynor
2016/066 ( PDF )
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Lingyue Qin and Huaifeng Chen and Xiaoyun Wang
2016/065 ( PDF )
A note on Tensor Simple Matrix Encryption Scheme
Yasufumi Hashimoto
2016/064 ( PDF )
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
Yohei Watanabe and Goichiro Hanaoka and Junji Shikata
2016/063 ( PDF )
Analysing and Exploiting the Mantin Biases in RC4
Remi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe
2016/062 ( PDF )
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security
Raphael Bost and Pierre-Alain Fouque and David Pointcheval
2016/061 ( PDF )
Accountable Privacy for Decentralized Anonymous Payments
Christina Garman and Matthew Green and Ian Miers
2016/060 ( PDF )
Topology-based Plug-and-Play Key-Setup
Amir Herzberg nd Yehonatan Kfir
2016/059 ( PDF )
Secure positioning and quantum non-local correlations
Muhammad Nadeem
2016/058 ( PDF )
New Lattice Attacks on DSA Schemes
Dimitrios Poulakis
2016/057 ( PDF )
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants
Durga Prasad Sahoo and Phuong Ha Nguyen and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay
2016/056 ( PDF )
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
Ethan Heilman and Foteini Baldimtsi and Sharon Goldberg
2016/055 ( PDF )
Attacking NTP's Authenticated Broadcast Mode
Aanchal Malhotra and Sharon Goldberg
2016/054 ( PDF )
Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem
Masahiro Yagisawa
2016/053 ( PDF )
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers
khalid Javeed and Xiaojun Wang
2016/052 ( PDF )
Fault-Tolerant Aggregate Signatures
Gunnar Hartung and Björn Kaidel and Alexander Koch and Jessica Koch and Andy Rupp
2016/051 ( PDF )
Capacity and Data Complexity in Multidimensional Linear Attack
Jialin Huang and Serge Vaudenay and Xuejia Lai and Kaisa Nyberg
2016/050 ( PDF )
Improved Fully Homomorphic Encryption with Composite Number Modulus
Masahiro Yagisawa
2016/049 ( PDF )
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
Christoph M. Mayer
2016/048 ( PDF )
Better Preprocessing for Secure Multiparty Computation
Carsten Baum and Ivan Damgård and Tomas Toft and Rasmus Zakarias
2016/047 ( PDF )
Comb to Pipeline: Fast Software Encryption Revisited
Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser
2016/046 ( PDF )
How To Simulate It - A Tutorial on the Simulation Proof Technique
Yehuda Lindell
2016/045 ( PDF )
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
Xi-Jun Lin and Lin Sun and Haipeng Qu and Xiaoshuai Zhang
2016/044 ( PDF )
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells
2016/043 ( PDF )
Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection
Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
2016/042 ( PDF )
Neeva: A Lightweight Hash Function
Khushboo Bussi and Dhananjoy Dey and Manoj Kumar and B. K. Dass
2016/041 ( PDF )
A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS
Preeti Kulshrestha and Arun Kumar
2016/040 ( PDF )
Packet Header Anomaly Detection Using Bayesian Topic Models
Xuefei Cao, Bo Chen, Hui Li and Yulong Fu
2016/039 ( PDF )
Standard quantum bit commitment – an indefinite commitment time
Muhammad Nadeem
2016/038 ( PDF )
Collateral Damage in Online Social Networks: computing the significance of information collection
Iraklis Symeonids and Bart Preneel
2016/037 ( PDF )
A Framework for Outsourcing of Secure Computation
Thomas P. Jakobsen and Jesper Buus Nielsen and Claudio Orlandi
2016/036 ( PDF )
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family
wentan Yi and Shaozhen Chen
2016/035 ( PDF )
Proofs of Space-Time and Rational Proofs of Storage
Tal Moran and Ilan Orlov
2016/034 ( PDF )
Universal Composition with Responsive Environments
Jan Camenisch and Robert R. Enderlein and Stephan Krenn and Ralf Kuesters and Daniel Rausch
2016/033 ( PDF )
Towards a Unified Security Model for Physically Unclonable Functions
Frederik Armknecht and Daisuke Moriyama and Ahmad-Reza Sadeghi and Moti Yung
2016/032 ( PDF )
On the Leakage-Resilient Key Exchange
Janaka Alawatugoda
2016/031 ( PDF )
Beyond the selective disclosure of ABCs on RAM-constrained devices
Antonio de la Piedra
2016/030 ( PDF )
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek and Nina Bindel and Johannes Buchmann and Juliane Krämer and Giorgia Azzurra Marson
2016/029 ( PDF )
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
Jos Wetzels and Wouter Bokslag
2016/028 ( PDF )
Sponges and Engines: An introduction to Keccak and Keyak
Jos Wetzels and Wouter Bokslag
2016/027 ( PDF )
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns
Henry Corrigan-Gibbs and Dan Boneh and Stuart Schechter
2016/026 ( PDF )
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM
Abhishek Chakraborty and Debdeep Mukhopadhyay
2016/025 ( PDF )
Human-readable Proof of the Related-Key Security of AES-128
Khoongming Khoo and Eugene Lee and Thomas Peyrin and Siang Meng Sim
2016/024 ( PDF )
Refund attacks on Bitcoin’s Payment Protocol
Patrick McCorry and Siamak F. Shahandashti and Feng Hao
2016/023 ( PDF )
Improved on an improved remote user authentication scheme with key agreement
Yalin Chen1 and Jue-Sam Chou*2 and I - Chiung Liao3
2016/022 ( PDF )
On derivatives of polynomials over finite fields through integration
Enes Pasalic and Amela Muratovic-Ribic and Samir Hodzic and Sugata Gangopadhyay
2016/021 ( PDF )
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs
Eli Ben-Sasson and Alessandro Chiesa and Ariel Gabizon and Madars Virza
2016/020 ( PDF )
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon
Yonglin Hao and Willi Meier
2016/019 ( PDF )
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
Hyung Tae Lee and San Ling and Huaxiong Wang
2016/018 ( PDF )
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Afonso Arriaga and Manuel Barbosa and Pooya Farshim
2016/017 ( PDF )
Valiant's Universal Circuit: Improvements, Implementation, and Applications
Helger Lipmaa and Payman Mohassel and Saeed Sadeghian
2016/016 ( PDF )
A trustless privacy-preserving reputation system
Alexander Schaub and Rémi Bazin and Omar Hasan and Lionel Brunie
2016/015 ( PDF )
Quantum Collision-Resistance of Non-Uniformly Distributed Functions
Ehsan Ebrahimi Targhi and Gelo Noel Tabia and Dominique Unruh
2016/014 ( PDF )
Foundations of Hardware-Based Attested Computation and Application to SGX
Manuel Barbosa and Bernardo Portela and Guillaume Scerri and Bogdan Warinschi
2016/013 ( PDF )
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Rosario Gennaro and Steven Goldfeder and Arvind Narayanan
2016/012 ( PDF )
Cryptography for Big Data Security
Ariel Hamlin and Nabil Schear and Emily Shen and Mayank Varia and Sophia Yakoubov and Arkady Yerukhimovich
2016/011 ( PDF )
Better Security for Functional Encryption for Inner Product Evaluations
Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval
2016/010 ( PDF )
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme
Albrecht Petzoldt and Jintai Ding and Lih-Chung Wang
2016/009 ( PDF )
PUF-BASED SOLUTIONS FOR SECURE COMMUNICATIONS IN ADVANCED METERING INFRASTRUCTURE (AMI)
Mahshid Delavar and Sattar Mirzakuchaki and Mohammad Hassan Ameri and Javad Mohajeri
2016/008 ( PDF )
cMix: Anonymization by High-Performance Scalable Mixing
David Chaum and Farid Javani and Aniket Kate and Anna Krasnova and Joeri de Ruiter and Alan T. Sherman and Debajyoti Das
2016/007 ( PDF )
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
Fabrice Benhamouda and Céline Chevalier and Adrian Thillard and Damien Vergnaud
2016/006 ( PDF )
Indistinguishability Obfuscation with Non-trivial Efficiency
Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang
2016/005 ( PDF )
A Columnar Transposition cipher in a contemporary setting.
John Jones
2016/004 ( PDF )
Bounding basis reduction properties
Arnold Neumaier
2016/003 ( PDF )
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves
Nicolas T. Courtois
2016/002 ( PDF )
Remote Cache-Timing Attack without Learning Phase
Ali Can Atici and Cemal Yilmaz and Erkay Savas
2016/001 ( PDF )
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Yalin Chen1 and Jue-Sam Chou*2 and Hung - Sheng Wu


[ Cryptology ePrint archive ]