Cryptology ePrint Archive: Listing for 2018

2018/366 ( PDF )
Directional Distance-Bounding Identification Protocols
Ahmad Ahmadi and Reihaneh Safavi-Naini
2018/365 ( PDF )
Anonymous Distance-Bounding Identification
Ahmad Ahmadi and Reihaneh Safavi-Naini and Mamunur Akand
2018/364 ( PDF )
Perfectly Secure Oblivious Parallel RAM
T-H. Hubert Chan and Kartik Nayak and Elaine Shi
2018/363 ( PDF )
Private Anonymous Data Access
Ariel Hamlin and Rafail Ostrovsky and Mor Weiss and Daniel Wichs
2018/362 ( PDF )
Backdoored Hash Functions: Immunizing HMAC and HKDF
Marc Fischlin and Christian Janson and Sogol Mazaheri
2018/361 ( PDF )
Two-message Key Exchange with Strong Security from Ideal Lattices
Zheng Yang and Yu Chen and Song Luo
2018/360 ( PDF )
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Yilei Chen and Vinod Vaikuntanathan and Hoeteck Wee
2018/359 ( PDF )
Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers
Christina-Angeliki Toli and Abdelrahaman Aly and Bart Preneel
2018/358 ( PDF )
Efficient Erasable PUFs from Programmable Logic and Memristors
Yansong Gao and Chenglu Jin and Jeeson Kim and Hussein Nili and Xiaolin Xu and Wayne Burleson and Omid Kavehei and Marten van Dijk and Damith C. Ranasinghe and Ulrich Rührmair
2018/357 ( PDF )
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Stefan Mangard and Florian Mendel and Robert Primas
2018/356 ( PDF )
In Praise of Twisted Canonical Embedding
Jheyne N. Ortiz and Robson R. de Araujo and Ricardo Dahab and Diego F. Aranha and Sueli I. R. Costa
2018/355 ( PDF )
Differential Fault Attacks on Deterministic Lattice Signatures
Leon Groot Bruinderink and Peter Pessl
2018/354 ( PDF )
Start your ENGINEs: dynamically loadable contemporary crypto
Nicola Tuveri and Billy B. Brumley
2018/353 ( PDF )
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
Xin Li
2018/352 ( PDF )
Cryptography with Dispensable Backdoors
Kai-Min Chung and Marios Georgiou and Ching-Yi Lai and Vassilis Zikas
2018/351 ( PDF )
A Chosen Plaintext Attack on Offset Public Permutation Mode
Miloslav Homer
2018/350 ( PDF )
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Ulrich Rührmair and Marten van Dijk
2018/349 ( PDF )
An Analysis of the NIST SP 800-90A Standard
Joanne Woodage and Dan Shumow
2018/348 ( PDF )
Monero Ring Attack: Recreating Zero Mixin Transaction Effect
Dimaz Ankaa Wijaya and Joseph Liu and Ron Steinfeld and Dongxi Liu
2018/347 ( PDF )
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval
Stanislaw Jarecki and Boyang Wei
2018/346 ( PDF )
Collusion Resistant Traitor Tracing from Learning with Errors
Rishab Goyal and Venkata Koppula and Brent Waters
2018/345 ( PDF )
In-region Authentication
Mamunur Rashid Akand and Reihaneh Safavi-Naini
2018/344 ( PDF )
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
Andrea Cerulli and Emiliano De Cristofaro and Claudio Soriente
2018/343 ( PDF )
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments
Duc Viet Le and Mahimna Kelkar and Aniket Kate
2018/342 ( PDF )
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
Ralph Ankele and Florian Böhl and Simon Friedberger
2018/341 ( PDF )
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens-Peter Kaps and Kris Gaj
2018/340 ( PDF )
Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures
Johannes Blömer and Jan Bobolz
2018/339 ( PDF )
A polynomial attack on a NIST proposal: RankSign, a code-based signature in rank metric
Thomas Debris-Alazard and Jean-Pierre Tillich
2018/338 ( PDF )
Quantum FHE (Almost) As Secure as Classical
Zvika Brakerski
2018/337 ( PDF )
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Marc Fischlin and Patrick Harasser
2018/336 ( PDF )
SoK: The Problem Landscape of SIDH
David Urbanik and David Jao
2018/335 ( PDF )
Fast modular squaring with AVX512IFMA
Nir Drucker and Shay Gueron
2018/334 ( PDF )
Impossible Differential Attack on QARMA Family of Block Ciphers
Dong Yang and Wen-feng Qi and Hua-jin Chen
2018/333 ( PDF )
Breaking the Circuit-Size Barrier in Secret Sharing
Tianren Liu and Vinod Vaikuntanathan
2018/332 ( PDF )
Differential Cryptanalysis of Round-Reduced Sparx-64/128
Ralph Ankele and Eik List
2018/331 ( PDF )
Estimate all the {LWE, NTRU} schemes!
Martin R. Albrecht and Benjamin R. Curtis and Amit Deo and Alex Davidson and Rachel Player and Eamonn W. Postlethwaite and Fernando Virdia and Thomas Wunderer
2018/330 ( PDF )
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
Joseph K. Liu and Tsz Hon Yuen and Peng Zhang and Kaitai Liang
2018/329 ( PDF )
Symbolic Side-Channel Analysis for Probabilistic Programs
Pasquale Malacaria and MHR. Khouzani and Corina S. Păsăreanu and Quoc-Sang Phan and Kasper Luckow
2018/328 ( PDF )
Improved High-Order Conversion From Boolean to Arithmetic Masking
Luk Bettale and Jean-Sebastien Coron and Rina Zeitoun
2018/327 ( PDF )
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System
Zhengjun Cao and Lihua Liu
2018/326 ( PDF )
Verifier Non-Locality in Interactive Proofs
Claude Crepeau and Nan Yang
2018/325 ( PDF )
Multi-power Post-quantum RSA
John M. Schanck
2018/324 ( PDF )
ACPC: Efficient revocation of pseudonym certificates using activation codes
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva
2018/323 ( PDF )
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks
Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap
2018/322 ( PDF )
DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks
Huili Chen and Bita Darvish Rohani and Farinaz Koushanfar
2018/321 ( PDF )
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
David Derler and Stephan Krenn and Thomas Lorünser and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks
2018/320 ( PDF )
Foundations of State Channel Networks
Stefan Dziembowski and Sebastian Faust and Kristina Hostakova
2018/319 ( PDF )
HydRand: Practical Continuous Distributed Randomness
Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl
2018/318 ( PDF )
Practical attacks against the Walnut digital signature scheme
Ward Beullens and Simon R. Blackburn
2018/317 ( PDF )
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Dor Fledel and Avishai Wool
2018/316 ( PDF )
Non-Malleable Secret Sharing
Vipul Goyal and Ashutosh Kumar
2018/315 ( PDF )
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
Dahmun Goudarzi and Anthony Journault and Matthieu Rivain and François-Xavier Standaert
2018/314 ( PDF )
Secure top most significant genome variants search: iDASH 2017 competition
Sergiu Carpov and Thibaud Tortech
2018/313 ( PDF )
On the cost of computing isogenies between supersingular elliptic curves
Gora Adj and Daniel Cervantes-Vázquez and Jesús-Javier Chi-Domínguez and Alfred Menezes and Francisco Rodríguez-Henríquez
2018/312 ( PDF )
Multilinear maps via secret ring
Chunsheng Gu
2018/311 ( PDF )
DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models
Bita Darvish Rouhani and Huili Chen and Farinaz Koushanfar
2018/310 ( PDF )
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi
2018/309 ( PDF )
Error Estimation of Practical Convolution Discrete Gaussian Sampling
Zhongxiang Zheng and Xiaoyun Wang and Guangwu Xu and Chunhuan Zhao
2018/308 ( PDF )
On Perfectly Secure 2PC in the OT-hybrid model
Anat Paskin-Cherniavsky
2018/307 ( PDF )
Isolated Curves and the MOV Attack
Travis Scholl
2018/306 ( PDF )
State-Separating Proofs: A Reduction Methodology for Real-World Protocols
Chris Brzuska and Antoine Delignat-Lavaud and Konrad Kohbrok and Markulf Kohlweiss
2018/305 ( PDF )
Efficient four-dimensional GLV curve with high security
Olivier Bernard and Renaud Dubois and Simon Masson
2018/304 ( PDF )
Geosocial Query with User-Controlled Privacy
Peizhao Hu and Sherman S.M. Chow and Asma Aloufi
2018/303 ( PDF )
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State
Bernardo David and Rafael Dowsley and Mario Larangeira
2018/302 ( PDF )
Rethinking Large-Scale Consensus
Rafael Pass and Elaine Shi
2018/301 ( PDF )
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
Estuardo Alpirez Bock and Chris Brzuska and Wil Michiels and Alexander Treff
2018/300 ( PDF )
Outsourcing Modular Exponentiation in Cryptographic Web Applications
Pascal Mainini and Rolf Haenni
2018/299 ( PDF )
Clusters of Re-used Keys
Stephen Farrell
2018/298 ( PDF )
In search of CurveSwap: Measuring elliptic curve implementations in the wild
Luke Valenta and Nick Sullivan and Antonio Sanso and Nadia Heninger
2018/297 ( PDF )
Fine-Grained Secure Computation
Matteo Campanelli and Rosario Gennaro
2018/296 ( PDF )
Ratcheted key exchange, revisited
Bertram Poettering and Paul Rösler
2018/295 ( PDF )
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers
Sayandeep Saha and Debdeep Mukhopadhyay and Pallab Dasgupta
2018/294 ( PDF )
Learning strikes again: the case of the DRS signature scheme
Yang Yu and Léo Ducas
2018/293 ( PDF )
Privacy Amplification from Non-malleable Codes
Eshan Chattopadhyay and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar
2018/292 ( PDF )
Linear Biases in AEGIS Keystream
Brice Minaud
2018/291 ( PDF )
Simulations of Optical Emissions for Attacking AES and Masked AES
Guido Marco Bertoni and Lorenzo Grassi and Filippo Melzani
2018/290 ( PDF )
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System
Vireshwar Kumar and He Li and Noah Luther and Pranav Asokan and Jung-Min (Jerry) Park and Kaigui Bian and Martin B. H. Weiss and Taieb Znati
2018/289 ( PDF )
Private Nearest Neighbors Classification in Federated Databases
Phillipp Schoppmann and Adriŕ Gascón and Borja Balle
2018/288 ( PDF )
Constant Size Traceable Ring Signature Scheme without Random Oracles
Ke Gu and Na Wu
2018/287 ( PDF )
Secure Cloud Storage Scheme Based On Hybrid Cryptosystem
Atanu Basu and Indranil Sengupta
2018/286 ( PDF )
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
Björn Haase and Benoît Labrique
2018/285 ( PDF )
Collateral Damage of Facebook Applications: a Comprehensive Study
Iraklis Symeonidis and Gergely Biczók and Fatemeh Shirazi and Cristina Pérez-Solŕ and Jessica Schroers and Bart Preneel
2018/284 ( PDF )
Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Qichun Wang
2018/283 ( PDF )
Homomorphic Rank Sort Using Surrogate Polynomials
Gizem S. Çetin and Berk Sunar
2018/282 ( PDF )
Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol
Jason LeGrow and David Jao and Reza Azarderakhsh
2018/281 ( PDF )
Upgrading to Functional Encryption
Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters
2018/280 ( PDF )
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs
Jens Groth and Markulf Kohlweiss and Mary Maller and Sarah Meiklejohn and Ian Miers
2018/279 ( PDF )
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing
Zvika Brakerski and Vadim Lyubashevsky and Vinod Vaikuntanathan and Daniel Wichs
2018/278 ( PDF )
Mixed-radix Naccache-Stern encryption
Rémi Géraud and David Naccache
2018/277 ( PDF )
Approximate and Probabilistic Differential Privacy Definitions
Sebastian Meiser
2018/276 ( PDF )
How to Record Quantum Queries, and Applications to Quantum Indifferentiability
Mark Zhandry
2018/275 ( PDF )
Lattice-Based zk-SNARKs from Square Span Programs
Rosario Gennaro and Michele Minelli and Anca Nitulescu and Michele Orrů
2018/274 ( PDF )
G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions
Rachid El Bansarkhani and Rafael Misoczki
2018/273 ( PDF )
Attribute Based Encryption for RAMs from LWE
Prabhanjan Ananth and Xiong Fan
2018/272 ( PDF )
Multi-Theorem Preprocessing NIZKs from Lattices
Sam Kim and David J. Wu
2018/271 ( PDF )
MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public
Borching Su
2018/270 ( PDF )
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
Douglas R. Stinson
2018/269 ( PDF )
Vault: Fast Bootstrapping for Cryptocurrencies
Derek Leung and Adam Suhl and Yossi Gilad and Nickolai Zeldovich
2018/268 ( PDF )
Oblivious RAM with Small Storage Overhead
Michael Raskin and Mark Simkin
2018/267 ( PDF )
A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies
Patrick Longa
2018/266 ( PDF )
Authenticated key exchange for SIDH
Steven D. Galbraith
2018/265 ( PDF )
Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography
Ayesha Khalid and James Howe and Ciara Rafferty and Francesco Regazzoni and Maire O’Neill
2018/264 ( PDF )
Security proof for Quantum Key Recycling with noise
Daan Leermakers and Boris Skoric
2018/263 ( PDF )
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
Seyyed Mahdi Sedaghat and Mohammad Hassan Ameri and Mahshid Delavar and Javad Mohajeri and Mohammad Reza Aref
2018/262 ( PDF )
Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies
Joachim Zahnentferner
2018/261 ( PDF )
Post-Quantum EPID Group Signatures from Symmetric Primitives
Dan Boneh and Saba Eskandarian and Ben Fisch
2018/260 ( PDF )
MDS Matrices with Lightweight Circuits
Sébastien Duval and Gaëtan Leurent
2018/259 ( PDF )
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption
Zheng Yang and Kimmo Järvinen
2018/258 ( PDF )
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers
Alya Geogiana Buja and Shekh Faisal Abdul-Latip and Rabiah Ahmad
2018/257 ( PDF )
On Quantum Indifferentiability
Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Noel Tabia and Dominique Unruh
2018/256 ( PDF )
QC-MDPC: A Timing Attack and a CCA2 KEM
Edward Eaton and Matthieu Lequesne and Alex Parent and Nicolas Sendrier
2018/255 ( PDF )
Topology-Hiding Computation Beyond Semi-Honest Adversaries
Rio Lavigne and Chen-Da Liu-Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi
2018/254 ( PDF )
Logistic Regression Model Training based on the Approximate Homomorphic Encryption
Andrey Kim and Yongsoo Song and Miran Kim and Keewoo Lee and Jung Hee Cheon
2018/253 ( PDF )
Capsule: A Protocol for Secure Collaborative Document Editing
Nadim Kobeissi
2018/252 ( PDF )
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract
Yongge Wang and Qutaibah m. Malluhi
2018/251 ( PDF )
VeritasDB: High Throughput Key-Value Store with Integrity
Rohit Sinha and Mihai Christodorescu
2018/250 ( PDF )
Making Public Key Functional Encryption Function Private, Distributively
Xiong Fan and Qiang Tang
2018/249 ( PDF )
Analysis of Deutsch-Jozsa Quantum Algorithm
Zhengjun Cao and Jeffrey Uhlmann and Lihua Liu
2018/248 ( PDF )
Stake-Bleeding Attacks on Proof-of-Stake Blockchains
Peter Gaži and Aggelos Kiayias and Alexander Russell
2018/247 ( PDF )
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset
Thang Hoang and Muslum Ozgur Ozmen and Yeongjin Jang and Attila A. Yavuz
2018/246 ( PDF )
Universally Verifiable MPC with Applications to IRV Ballot Counting
Chris Culnane and Olivier Pereira and Kim Ramchen and Vanessa Teague
2018/245 ( PDF )
Secure Search via Multi-Ring Fully Homomorphic Encryption
Adi Akavia and Dan Feldman and Hayim Shaul
2018/244 ( PDF )
Faster Homomorphic Linear Transformations in HElib
Shai Halevi and Victor Shoup
2018/243 ( PDF )
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
Indra Deep Mastan and Souradyuti Paul
2018/242 ( PDF )
A New Constant-size Accountable Ring Signature Scheme Without Random Oracles
Sudhakar Kumawat and Souradyuti Paul
2018/241 ( PDF )
zkLedger: Privacy-Preserving Auditing for Distributed Ledgers
Neha Narula and Willy Vasquez and Madars Virza
2018/240 ( PDF )
Towards Non-Interactive Zero-Knowledge for NP from LWE
Ron D. Rothblum and Adam Sealfon and Katerina Sotiraki
2018/239 ( PDF )
RepuCoin: Your Reputation is Your Power
Jiangshan Yu and David Kozhaya and Jeremie Decouchant and Paulo Esteves-Verissimo
2018/238 ( PDF )
Private Set Intersection with Linear Communication from General Assumptions
Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky
2018/237 ( PDF )
On Tightly Secure Non-Interactive Key Exchange
Julia Hesse and Dennis Hofheinz and Lisa Kohl
2018/236 ( PDF )
Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network
Yuval Marcus and Ethan Heilman and Sharon Goldberg
2018/235 ( PDF )
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
Julian Loss and Tal Moran
2018/234 ( PDF )
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations
Hagen Sparka and Florian Tschorsch and Björn Scheuermann
2018/233 ( PDF )
Privacy-Preserving Logistic Regression Training
Charlotte Bonte and Frederik Vercauteren
2018/232 ( PDF )
Improved fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
2018/231 ( PDF )
Remarks on Bell's Inequality
Zhengjun Cao and Lihua Liu
2018/230 ( PDF )
Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
Jan-Pieter D’Anvers, Angshuman Karmakar Sujoy Sinha Roy, and Frederik Vercauteren
2018/229 ( PDF )
Optimizing polynomial convolution for NTRUEncrypt
Wei Dai and William Whyte and Zhenfei Zhang
2018/228 ( PDF )
Non-interactive zaps of knowledge
Georg Fuchsbauer and Michele Orrů
2018/227 ( PDF )
Can We Overcome the $n \log n$ Barrier for Oblivious Sorting?
Wei-Kai Lin and Elaine Shi and Tiancheng Xie
2018/226 ( PDF )
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models
Sandro Coretti and Yevgeniy Dodis and Siyao Guo
2018/225 ( PDF )
A foundation for secret, verifiable elections
Ben Smyth
2018/224 ( PDF )
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons
Rhys Carlton and Aleksander Essex and Krzysztof Kapulkin
2018/223 ( PDF )
Shorter double-authentication preventing signatures for small address spaces
Bertram Poettering
2018/222 ( PDF )
Authentication with weaker trust assumptions for voting systems
Elizabeth A. Quaglia and Ben Smyth
2018/221 ( PDF )
Bandwidth-Hard Functions: Reductions and Lower Bounds
Jeremiah Blocki and Ling Ren and Samson Zhou
2018/220 ( PDF )
PRO-ORAM: Constant Latency Read-Only Oblivious RAM
Shruti Tople and Yaoqi Jia and Prateek Saxena
2018/219 ( PDF )
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering
Jakub Breier and Dirmanto Jap and Xiaolu Hou and Shivam Bhasin
2018/218 ( PDF )
Fault Resilient Encoding Schemes in Software: How Far Can We Go?
Jakub Breier and Xiaolu Hou and Yang Liu
2018/217 ( PDF )
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Mihir Bellare and Wei Dai
2018/216 ( PDF )
Secure Computation with Low Communication from Cross-checking
S. Dov Gordon and Samuel Ranellucci and Xiao Wang
2018/215 ( PDF )
Towards everlasting privacy and efficient coercion resistance in remote electronic voting
Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis and Bingsheng Zhang
2018/214 ( PDF )
R-MAC - A lightwheight authentication protocol for RFID Tags
Ahmad Khoureich Ka
2018/213 ( PDF )
Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack
I. Stewart and D. Ilie and A. Zamyatin and S. Werner and M.F. Torshizi and W.J. Knottenbelt
2018/212 ( PDF )
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts
Thibaut Horel and Sunoo Park and Silas Richelson and Vinod Vaikuntanathan
2018/211 ( PDF )
Number "Not" Used Once - Key Recovery Fault Attacks on LWE Based Lattice Cryptographic Schemes
Prasanna Ravi and Shivam Bhasin and Anupam Chattopadhyay
2018/210 ( PDF )
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi
2018/209 ( PDF )
Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger
Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Sandra Deepthy Siby and Nicolas Gaillya and Philipp Jovanovic and Linus Gasser and Bryan Ford
2018/208 ( PDF )
Efficient MPC from Syndrome Decoding (or: Honey, I Shrunk the Keys)
Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez
2018/207 ( PDF )
Non-Malleable Codes for Small-Depth Circuits
Marshall Ball and Dana Dachman-Soled and Siyao Guo and Tal Malkin and Li-Yang Tan
2018/206 ( PDF )
Reading in the Dark: Classifying Encrypted Digits with Functional Encryption
Edouard Dufour Sans and Romain Gay and David Pointcheval
2018/205 ( PDF )
Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling
Thaddeus Dryja and Quanquan C. Liu and Sunoo Park
2018/204 ( PDF )
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Serge Fehr and Pierre Karpman and Bart Mennink
2018/203 ( PDF )
Impeccable Circuits
Anita Aghaie and Amir Moradi and Shahram Rasoolzadeh and Falk Schellenberg and Tobias Schneider
2018/202 ( PDF )
Doing Real Work with FHE: The Case of Logistic Regression
Jack L.H. Crawford and Craig Gentry and Shai Halevi and Daniel Platt and Victor Shoup
2018/201 ( PDF )
Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers
Jim Basilakis and Bahman Javadi
2018/200 ( PDF )
Hermes. A framework for cryptographically assured access control and data security
Eugene Pilyankevich and Ignat Korchagin and Andrey Mnatsakanov
2018/199 ( PDF )
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
David Derler and Kai Gellert and Tibor Jager and Daniel Slamanig and Christoph Striecks
2018/198 ( PDF )
A Key-recovery Attack on 855-round Trivium
Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier
2018/197 ( PDF )
Green Mining: toward a less energetic impact of cryptocurrencies
Philippe Jacquet and Bernard Mans
2018/196 ( PDF )
Non-Profiled Deep Learning-Based Side-Channel Attacks
Benjamin Timon
2018/195 ( PDF )
Breach-Resistant Structured Encryption
Ghous Amjad and Seny Kamara and Tarik Moataz
2018/194 ( PDF )
Proofs of Catalytic Space
Krzysztof Pietrzak
2018/193 ( PDF )
A New Family of Pairing-Friendly elliptic curves
Michael Scott and Aurore Guillevic
2018/192 ( PDF )
SoK: unraveling Bitcoin smart contracts
Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino
2018/191 ( PDF )
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version)
Michael Backes and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider
2018/190 ( PDF )
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption
Sikhar Patranabis and Debdeep Mukhopadhyay
2018/189 ( PDF )
Threshold Implementation in Software - Case Study of PRESENT
Pascal Sasdrich and René Bock and Amir Moradi
2018/188 ( PDF )
Generalizations of Banaszczyk's transference theorems and tail bound
Stephen D. Miller and Noah Stephens-Davidowitz
2018/187 ( PDF )
Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model
Sean Bowe and Ariel Gabizon
2018/186 ( PDF )
RKHD ElGamal signing and 1-way sums
Daniel R. L. Brown
2018/185 ( PDF )
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius M. Silva
2018/184 ( PDF )
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI
Yongjun Zhao and Sherman S. M. Chow
2018/183 ( PDF )
Simple Proofs of Sequential Work
Bram Cohen and Krzysztof Pietrzak
2018/182 ( PDF )
New Rigorous Analysis of Truncated Differentials for 5-round AES
Lorenzo Grassi and Christian Rechberger
2018/181 ( PDF )
Rasta: A cipher with low ANDdepth and few ANDs per bit
Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger
2018/180 ( PDF )
Two-Round Multiparty Secure Computation Minimizing Public Key Operations
Sanjam Garg and Peihan Miao and Akshayaram Srinivasan
2018/179 ( PDF )
Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations
Ken Goss and Wei Jiang
2018/178 ( -- withdrawn -- )
2018/177 ( PDF )
On the Use of Independent Component Analysis to Denoise Side-Channel Measurements
Houssem Maghrebi and Emmanuel Prouff
2018/176 ( PDF )
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability
Kamil Kluczniak and Man Ho Au
2018/175 ( PDF )
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys
Vincent Grosso
2018/174 ( PDF )
A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers
Chen-Dong Ye and Tian Tian
2018/173 ( PDF )
Vectorizing Higher-Order Masking
Benjamin Grégoire and Kostas Papagiannopoulos and Peter Schwabe and Ko Stoffelen
2018/172 ( PDF )
A First-Order SCA Resistant AES without Fresh Randomness
Felix Wegener and Amir Moradi
2018/171 ( PDF )
On the Complexity of Simulating Auxiliary Input
Yi-Hsiu Chen and Kai-Min Chung and Jyun-Jie Liao
2018/170 ( PDF )
On the Ring-LWE and Polynomial-LWE problems
Miruna Rosca and Damien Stehlé and Alexandre Wallet
2018/169 ( PDF )
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method
Srimanta Bhattacharya and Mridul Nandi
2018/168 ( PDF )
Statistical Witness Indistinguishability (and more) in Two Messages
Yael Tauman Kalai and Dakshita Khurana and Amit Sahai
2018/167 ( PDF )
On the Existence of Three Round Zero-Knowledge Proofs
Nils Fleischhacker and Vipul Goyal and Abhishek Jain
2018/166 ( PDF )
Optimal Forgeries Against Polynomial-Based MACs and GCM
Atul Luykx and Bart Preneel
2018/165 ( PDF )
The Wonderful World of Global Random Oracles
Jan Camenisch and Manu Drijvers and Tommaso Gagliardoni and Anja Lehmann and Gregory Neven
2018/164 ( PDF )
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
Pavel Hubáček and Alon Rosen and Margarita Vald
2018/163 ( PDF )
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu
2018/162 ( PDF )
Untagging Tor: A Formal Treatment of Onion Encryption
Jean Paul Degabriele and Martijn Stam
2018/161 ( PDF )
Boomerang Connectivity Table: A New Cryptanalysis Tool
Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song
2018/160 ( PDF )
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun
2018/159 ( PDF )
The Missing Difference Problem, and its Applications to Counter Mode Encryption
Gaëtan Leurent and Ferdinand Sibleyras
2018/158 ( PDF )
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin
2018/157 ( PDF )
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
Bernardo David and Rafael Dowsley and Mario Larangeira
2018/156 ( PDF )
A New Approach to Black-Box Concurrent Secure Computation
Sanjam Garg and Susumu Kiyoshima and Omkant Pandey
2018/155 ( PDF )
Memory Lower Bounds of Reductions Revisited
Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka
2018/154 ( PDF )
Constrained PRFs for NC1 in Traditional Groups
Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa
2018/153 ( PDF )
Bootstrapping for Approximate Homomorphic Encryption
Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song
2018/152 ( PDF )
Related-Key Linear Cryptanalysis on SIMON
Jung-Keun Lee and Bonwook Koo and Woo-Hwan Kim
2018/151 ( PDF )
Adaptively Secure Garbling with Near Optimal Online Complexity
Sanjam Garg and Akshayaram Srinivasan
2018/150 ( PDF )
Analysis of Error-Correcting Codes for Lattice-Based Key Exchange
Tim Fritzmann and Thomas Pöppelmann and Johanna Sepulveda
2018/149 ( PDF )
Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation
Ilan Komargodski and Eylon Yogev
2018/148 ( PDF )
The Complexity of Multiparty PSM Protocols and Related Models
Amos Beimel and Eyal Kushilevitz and Pnina Nissim
2018/147 ( PDF )
Sustained Space Complexity
Joel Alwen and Jeremiah Blocki and Krzysztof Pietrzak
2018/146 ( PDF )
Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices
Léo Ducas and Cécile Pierrot
2018/145 ( PDF )
Fast Near Collision Attack on the Grain v1 Stream Cipher
Bin Zhang and Chao Xu and Willi Meier
2018/144 ( PDF )
The Communication Complexity of Private Simultaneous Messages, Revisited
Benny Applebaum and Thomas Holenstein and Manoj Mishra and Ofer Shayevitz
2018/143 ( PDF )
Conjecturally Superpolynomial Lower Bound for Share Size
Shahram Khazaei
2018/142 ( PDF )
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC
Rui Zong and Xiaoyang Dong and Xiaoyun Wang
2018/141 ( PDF )
Symbolic security of garbled circuits
Baiyu Li and Daniele Micciancio
2018/140 ( PDF )
A Reaction Attack on LEDApkc
Tomas Fabsic and Viliam Hromada and Pavol Zajac
2018/139 ( PDF )
Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth
Wen-jie Lu and Jun Sakuma
2018/138 ( PDF )
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Christian Badertscher and Juan Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas
2018/137 ( PDF )
Naor-Reingold Goes Public: The Complexity of Known-key Security
Pratik Soni and Stefano Tessaro
2018/136 ( PDF )
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Priyanka Bose and Viet Tung Hoang and Stefano Tessaro
2018/135 ( PDF )
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT
Daniel Jost and Christian Badertscher and Fabio Banfi
2018/134 ( PDF )
A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem
Ayan Mahalanobis and Vivek Mallick
2018/133 ( PDF )
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs
Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu
2018/132 ( PDF )
Gora Adj and Omran Ahmadi and Alfred Menezes
2018/131 ( PDF )
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption
Ran Canetti and Yilei Chen and Leonid Reyzin and Ron D. Rothblum
2018/130 ( PDF )
SMT-based Cube Attack on Simeck32/64
Mojtaba Zaheri and Babak Sadeghiyan
2018/129 ( PDF )
Multi-mode Cryptocurrency Systems
Tuyet Duong and Alexander Chepurnoy and Hong-Sheng Zhou
2018/128 ( PDF )
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation
Charanjit S. Jutla
2018/127 ( PDF )
Accountability in Security Protocols
Robert Künnemann and Deepak Garg and Michael Backes
2018/126 ( PDF )
Onion-AE: Foundations of Nested Encryption
Phillip Rogaway and Yusi Zhang
2018/125 ( PDF )
Challenges in cyber security - Ransomware Phenomenon
Pasca Vlad-Raul and Simion Emil
2018/124 ( PDF )
Evaluating the indistinguishability of the XTS mode in the proposed security model
Nguyen Tuan Anh and Nguyen Bui Cuong
2018/123 ( PDF )
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
Howard M. Heys
2018/122 ( PDF )
BitML: a calculus for Bitcoin smart contracts
Massimo Bartoletti and Roberto Zunino
2018/121 ( PDF )
ECC mod 8^91+5
Daniel R. L. Brown
2018/120 ( PDF )
Efficient Circuit-based PSI via Cuckoo Hashing
Benny Pinkas and Thomas Schneider and Christian Weinert and Udi Wieder
2018/119 ( PDF )
Drive-by Key-Extraction Cache Attacks from Portable Code
Daniel Genkin and Lev Pachmanov and Eran Tromer and Yuval Yarom
2018/118 ( PDF )
Updatable Encryption with Post-Compromise Security
Anja Lehmann and Bjoern Tackmann
2018/117 ( PDF )
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
Shai Halevi and Yuriy Polyakov and Victor Shoup
2018/116 ( PDF )
Unbounded ABE via Bilinear Entropy Expansion, Revisited
Jie Chen and Junqing Gong and Lucas Kowalczyk and Hoeteck Wee
2018/115 ( PDF )
An Improved Affine Equivalence Algorithm for Random Permutations
Itai Dinur
2018/114 ( PDF )
Offline Assisted Group Key Exchange
Colin Boyd and Gareth T. Davies and Kristian Gjřsteen and Yao Jiang
2018/113 ( PDF )
Classification of Balanced Quadratic Functions
Lauren De Meyer and Begül Bilgin
2018/112 ( PDF )
Just in Time Hashing
Benjamin Harsha and Jeremiah Blocki
2018/111 ( PDF )
MRHS Solver Based on Linear Algebra and Exhaustive Search
Hĺvard Raddum and Pavol Zajac
2018/110 ( PDF )
Rank Analysis of Cubic Multivariate Cryptosystems
John Baena and Daniel Cabarcas and Daniel Escudero and Karan Khathuria and Javier Verbel
2018/109 ( PDF )
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme
Soda Diop and Bernard Ousmane Sané and Nafissatou Diarra and Michel Seck
2018/108 ( PDF )
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
F. Betül Durak and Serge Vaudenay
2018/107 ( PDF )
Towards Practical Lattice-Based One-Time Linkable Ring Signatures
Carsten Baum and Huang Lin and and Sabine Oechsner
2018/106 ( PDF )
On the Gold Standard for Security of Universal Steganography
Sebastian Berndt and Maciej Liśkiewicz
2018/105 ( PDF )
Combining Private Set-Intersection with Secure Two-Party Computation
Michele Ciampi and Claudio Orlandi
2018/104 ( PDF )
PHANTOM: A Scalable BlockDAG Protocol
Yonatan Sompolinsky and Aviv Zohar
2018/103 ( PDF )
Decomposition of Permutations in a Finite Field
Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2018/102 ( PDF )
Grafting Trees: a Fault Attack against the SPHINCS framework
Laurent Castelnovi and Ange Martinelli and Thomas Prest
2018/101 ( PDF )
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
Mustafa A. Mustafa and Sara Cleemput and Abdelrahaman Aly and Aysajan Abidin
2018/100 ( PDF )
A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples
Hart Montgomery
2018/099 ( PDF )
Improved Bounds on the Threshold Gap in Ramp Secret Sharing
Ignacio Cascudo and Jaron Skovsted Gundersen and Diego Ruano
2018/098 ( PDF )
How to Reveal the Secrets of an Obscure White-Box Implementation
Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang
2018/097 ( PDF )
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
Andrea Visconti and Federico Gorla
2018/096 ( PDF )
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More
Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels
2018/095 ( PDF )
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage
Cees-Bart Breunesse and Ilya Kizhvatov and Ruben Muijrers and Albert Spruyt
2018/094 ( PDF )
Parameterization of Edwards curves on the rational field Q with given torsion subgroups
Linh Tung Vo
2018/093 ( PDF )
Statistical Attacks on Cookie Masking for RC4
Kenneth G. Paterson and Jacob C.N. Schuldt
2018/092 ( PDF )
Constructions of S-boxes with uniform sharing
Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen
2018/091 ( PDF )
Polynomial multiplication over binary finite fields: new upper bounds
Alessandro De Piccoli and Andrea Visconti and Ottavio Giulio Rizzo
2018/090 ( PDF )
Secure and Scalable Multi-User Searchable Encryption
Cédric Van Rompay and Refik Molva and Melek Önen
2018/089 ( PDF )
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva
2018/088 ( PDF )
Fully homomorphic public-key encryption with small ciphertext size
Masahiro Yagisawa
2018/087 ( PDF )
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice
Alexei Zamyatin and Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Edgar Weippl and William J. Knottenbelt
2018/086 ( PDF )
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
Claude Carlet and Xi Chen
2018/085 ( PDF )
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin
2018/084 ( PDF )
Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher
Gideon Samid
2018/083 ( PDF )
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017
Maki Yoshida and Satoshi Obana
2018/082 ( PDF )
Synchronized Aggregate Signatures from the RSA Assumption
Susan Hohenberger and Brent Waters
2018/081 ( PDF )
How to validate the secret of a Ring Learning with Errors (RLWE) key
Jintai Ding and Saraswathy RV and Saed Alsayigh and Crystal Clough
2018/080 ( PDF )
A Cryptographic Analysis of the WireGuard Protocol
Benjamin Dowling and Kenneth G. Paterson
2018/079 ( PDF )
Progressive lattice sieving
Thijs Laarhoven and Artur Mariano
2018/078 ( PDF )
A Systematic Approach To Cryptocurrency Fees
Alexander Chepurnoy and Vasily Kharin and Dmitry Meshkov
2018/077 ( PDF )
On the Bit Security of Cryptographic Primitives
Daniele Micciancio and Michael Walter
2018/076 ( PDF )
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
Daniel Dinu and Ilya Kizhvatov
2018/075 ( PDF )
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes
Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang
2018/074 ( PDF )
Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation
Miran Kim and Yongsoo Song and Shuang Wang and Yuhou Xia and Xiaoqian Jiang
2018/073 ( PDF )
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
Chiraag Juvekar and Vinod Vaikuntanathan and Anantha Chandrakasan
2018/072 ( PDF )
Template-based Fault Injection Analysis of Block Ciphers
Ashrujit Ghoshal and Sikhar Patranabis and Debdeep Mukhopadhyay
2018/071 ( PDF )
Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas
2018/070 ( PDF )
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Craig Gentry and Adam O'Neill and Leonid Reyzin
2018/069 ( PDF )
Reusing Nonces in Schnorr Signatures
Marc Beunardeau and Aisling Connolly and Houda Ferradi and Rémi Géraud and David Naccache and Damien Vergnaud
2018/068 ( PDF )
Simple Schnorr Multi-Signatures with Applications to Bitcoin
Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille
2018/067 ( PDF )
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping
Hao Chen and Kyoohyung Han
2018/066 ( PDF )
Tweaking Generic OTR to Avoid Forgery Attacks
Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon-Ho Wong
2018/065 ( PDF )
New Perspectives on Multi-Prover Interactive Proofs
Claude Crépeau and Nan Yang
2018/064 ( PDF )
Systematization Of A 256-Bit Lightweight Block Cipher Marvin
Sukanya Saha and Krishnendu Rarhi and Abhishek Bhattacharya
2018/063 ( PDF )
The Viability of Post-quantum X.509 Certificates
Panos Kampanakis and Peter Panburana and Ellie Daw and Daniel Van Geest
2018/062 ( PDF )
Countermeasures against a side-channel attack in a kernel memory
Na-Young Ahn and Dong Hoon Lee
2018/061 ( PDF )
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption
Pratish Datta and Tatsuaki Okamoto and Junichi Tomida
2018/060 ( PDF )
A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks
Abhinav Aggarwal and Yue Guo
2018/059 ( PDF )
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
Chen-Dong Ye and Tian Tian
2018/058 ( PDF )
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters
Divesh Aggarwal and Tomasz Kazana and Maciej Obremski
2018/057 ( PDF )
Certifying RSA Public Keys with an Efficient NIZK
Sharon Goldberg and Leonid Reyzin and Omar Sagga and Foteini Baldimtsi
2018/056 ( PDF )
Post-Quantum Signcryption From Lattice-Based Signatures
François Gérard and Keno Merckx
2018/055 ( PDF )
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction
Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht and Georg Sigl
2018/054 ( PDF )
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures
Romain Gay and Dennis Hofheinz and Lisa Kohl and Jiaxin Pan
2018/053 ( PDF )
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database
Emmanuel Prouff and Remi Strullu and Ryad Benadjila and Eleonora Cagli and Cecile Dumas
2018/052 ( PDF )
Optimizing Trees for Static Searchable Encryption
Mohammad Etemad and Mohammad Mahmoody and David Evans
2018/051 ( PDF )
Semantic Security Invariance under Variant Computational Assumptions
Eftychios Theodorakis and John C. Mitchell
2018/050 ( PDF )
A Constructive Perspective on Signcryption Security
Christian Badertscher and Fabio Banfi and Ueli Maurer
2018/049 ( PDF )
Attacks and Countermeasures for White-box Designs
Alex Biryukov and Aleksei Udovenko
2018/048 ( PDF )
Impossible Differential Cryptanalysis on Deoxys-BC-256
Alireza mehrdad and Farokhlagha Moazami and Hadi Soleimany
2018/047 ( PDF )
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
Boris Ryabko and Aleksandr Soskov
2018/046 ( PDF )
Scalable, transparent, and post-quantum secure computational integrity
Eli Ben-Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev
2018/045 ( PDF )
Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials
Jonathan Bootle and Jens Groth
2018/044 ( PDF )
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem
Tadanori Teruya and Kenji Kashiwabara and Goichiro Hanaoka
2018/043 ( PDF )
Efficient Adaptively Secure Zero-knowledge from Garbled Circuits
Chaya Ganesh and Yashvanth Kondi and Arpita Patra and Pratik Sarkar
2018/042 ( PDF )
Improved (Almost) Tightly-Secure Structure-Preserving Signatures
Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy
2018/041 ( PDF )
Related Randomness Security for Public Key Encryption, Revisited
Takahiro Matsuda and Jacob C.N. Schuldt
2018/040 ( PDF )
An Analysis of Acceptance Policies For Blockchain Transactions
Seb Neumayer and Mayank Varia and Ittay Eyal
2018/039 ( PDF )
Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography
Gregor Seiler
2018/038 ( PDF )
On the Message Complexity of Secure Multiparty Computation
Yuval Ishai and Manika Mittal and Rafail Ostrovsky
2018/037 ( PDF )
Weakly Secure Equivalence-Class Signatures from Standard Assumptions
Georg Fuchsbauer and Romain Gay
2018/036 ( PDF )
Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs
Peter Scholl
2018/035 ( PDF )
A Linearly Homomorphic Signature Scheme From Weaker Assumptions
Lucas Schabhüser and Johannes Buchmann and Patrick Struck
2018/034 ( PDF )
Constant-size Group Signatures from Lattices
San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu
2018/033 ( PDF )
Two-Factor Authentication with End-to-End Password Security
Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena
2018/032 ( -- withdrawn -- )
Publicly Verifiable Proofs of Space
Markus Jakobsson
2018/031 ( PDF )
Secure Remote Attestation
Markus Jakobsson
2018/030 ( PDF )
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
Lin Lyu and Shengli Liu and Shuai Han and Dawu Gu
2018/029 ( PDF )
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
Johannes Blömer and Fabian Eidens and Jakob Juhnke
2018/028 ( PDF )
Compact Energy and Delay-aware Authentication
Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz
2018/027 ( PDF )
A verifiable shuffle for the GSW cryptosystem
Martin Strand
2018/026 ( PDF )
Zero-Knowledge Proof of Decryption for FHE Ciphertexts
Christopher Carr and Anamaria Costache and Gareth T. Davies and Kristian Gjřsteen and Martin Strand
2018/025 ( PDF )
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures
Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li
2018/024 ( PDF )
KEM Combiners
Federico Giacon and Felix Heuer and Bertram Poettering
2018/023 ( PDF )
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups
Benedikt Auerbach and Mihir Bellare and Eike Kiltz
2018/022 ( PDF )
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices
Ali El Kaafarani and Shuichi Katsumata
2018/021 ( PDF )
Regularly Lossy Functions and Their Applications
Yu Chen and Baodong Qin and Haiyang Xue
2018/020 ( PDF )
Cryptanalysis of Compact-LWE Submitted to NIST PQC Project
Haoyu Li and Renzhang Liu and Yanbin Pan and Tianyuan Xie
2018/019 ( PDF )
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
Daniel P. Martin and Luke Mather and Elisabeth Oswald
2018/018 ( PDF )
Multi-Key Searchable Encryption, Revisited
Ariel Hamlin and abhi shelat and Mor Weiss and Daniel Wichs
2018/017 ( PDF )
Verifiability of Helios Mixnet
Ben Smyth
2018/016 ( PDF )
New Techniques for Public Key Encryption with Sender Recovery
Murali Godi and Roopa Vishwanathan
2018/015 ( PDF )
On Composable Security for Digital Signatures
Christian Badertscher and Ueli Maurer and Björn Tackmann
2018/014 ( PDF )
Ubiquitous Weak-key Classes of BRW-polynomial Function
Kaiyan Zheng and Peng Wang and Dingfeng Ye
2018/013 ( PDF )
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
Benedikt Auerbach and Bertram Poettering
2018/012 ( PDF )
An Inside Job: Remote Power Analysis Attacks on FPGAs
Falk Schellenberg and Dennis R.E. Gnad and Amir Moradi and Mehdi B. Tahoori
2018/011 ( PDF )
Graded Encoding Schemes from Obfuscation
Pooya Farshim and Julia Hesse and Dennis Hofheinz and Enrique Larraia
2018/010 ( PDF )
Interactively Secure Groups from Obfuscation
Thomas Agrikola and Dennis Hofheinz
2018/009 ( PDF )
Evaluation of Resilience of randomized RNS implementation
Jérôme Courtois and Lokman Abbas-Turki and Jean-Claude Bajard
2018/008 ( PDF )
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
Yu-Ao Chen and Xiao-Shan Gao
2018/007 ( PDF )
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks
Qiong Huang and Hongbo Li
2018/006 ( PDF )
Higher Order Side-Channel Attacks Resilient S-boxes
Liran Lerman and Stjepan Picek and Nikita Veshchikov and Olivier Markowitch
2018/005 ( PDF )
Simple and Efficient Two-Server ORAM
Xiao Wang and Dov Gordon and Jonathan Katz
2018/004 ( PDF )
On the Performance of Deep Learning for Side-channel Analysis
Stjepan Picek and Ioannis Petros Samiotis and Annelie Heuser and Jaehun Kim and Shivam Bhasin and Axel Legay
2018/003 ( PDF )
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
Moni Naor and Benny Pinkas and Eyal Ronen
2018/002 ( PDF )
The Multiplicative Complexity of 6-variable Boolean Functions
Cagdas Calik and Meltem Sonmez Turan and Rene Peralta
2018/001 ( PDF )
Conditional Disclosure of Secrets and $d$-Uniform Secret Sharing with Constant Information Rate
Benny Applebaum and Barak Arkis

[ Cryptology ePrint archive ]