Cryptology ePrint Archive: Listing for 2010s
Regex
2019/1499 (PDF ) Authenticated Key Distribution: When the Coupon Collector is Your Enemy Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Roenne, Peter Y. A. Ryan
2019/1498 (PDF ) Supersingular Isogeny-Based Designated Verifier Blind Signature Rajeev Anand Sahu, Agnese Gini, Ankan Pal
2019/1497 (PDF ) Analysis of Modified Shell Sort for Fully Homomorphic Encryption Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
2019/1496 (PDF ) Improved on Identity-based quantum signature based on Bell states Chang-Bin Wang, Shu-Mei Hsu, Hsiang Chang, Jue-Sam Chou
2019/1495 (PDF ) Tight Security of Cascaded LRW2 Ashwin Jha, Mridul Nandi
2019/1494 (PDF ) Scaling Verifiable Computation Using Efficient Set Accumulators Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh
2019/1493 (PDF ) Solving $X^{q+1}+X+a=0$ over Finite Fields Kwang Ho Kim, Junyop Choe, Sihem Mesnager
2019/1492 (PDF ) Too Much Crypto Jean-Philippe Aumasson
2019/1491 (PDF ) Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9 Yuyin Yu, Nikolay Kaleyski, Lilya Budaghyan, Yongqiang Li
2019/1490 (PDF ) Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
2019/1489 (PDF ) Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
2019/1488 (PDF ) Fine-Grained Cryptography Revisited Shohei Egashira, Yuyu Wang, Keisuke Tanaka
2019/1487 (PDF ) SNR-Centric Power Trace Extractors for Side-Channel Attacks Changhai Ou, Degang Sun, Siew-Kei Lam, Xinping Zhou, Kexin Qiao, Qu Wang
2019/1486 (PDF ) RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations Ramiro Martínez, Paz Morillo
2019/1485 (PDF ) Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki
2019/1484 (PDF ) Force-Locking Attack on Sync Hotstuff Atsuki Momose, Jason Paul Cruz
2019/1483 (PDF ) Communication--Computation Trade-offs in PIR Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo
2019/1482 (PDF ) Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, Dawn Song
2019/1481 (PDF ) On metric regularity of Reed-Muller codes Alexey Oblaukhov
2019/1480 (PDF ) Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves Fouazou Lontouo Perez Broon, Emmanuel Fouotsa
2019/1479 (PDF ) A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li
2019/1478 (PDF ) Leakage Detection with Kolmogorov-Smirnov Test Xinping Zhou, Kexin Qiao, Changhai Ou
2019/1477 (PDF ) Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis Daan van der Valk, Stjepan Picek, Shivam Bhasin
2019/1476 (PDF ) On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis Leo Weissbart
2019/1475 (PDF ) On the Security of Sponge-type Authenticated Encryption Modes Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi
2019/1474 (PDF ) Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders Lichao Wu, Stjepan Picek
2019/1473 (PDF ) Splitting the Interpose PUF: A Novel Modeling Attack Strategy Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
2019/1472 (PDF ) Efficient Fully Secure Leakage-Deterring Encryption Jan Camenisch, Maria Dubovitskaya, Patrick Towa
2019/1471 (PDF ) A Privacy-Enhancing Framework for Internet of Things Services Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
2019/1470 (PDF ) PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server Carsten Baum, Tore K. Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
2019/1469 (PDF ) The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures Georg Maringer, Tim Fritzmann, Johanna Sepúlveda
2019/1468 (PDF ) A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption Jung Hee Cheon, Duhyeong Kim, Taechan Kim, Yongha Son
2019/1467 (PDF ) Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies Andrew M. K. Nassief
2019/1466 (PDF ) A Note on the Instantiability of the Quantum Random Oracle Edward Eaton, Fang Song
2019/1465 (PDF ) An optimist's Poisson model of cryptanalysis Daniel R. L. Brown
2019/1464 (PDF ) New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni
2019/1463 (PDF ) Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation Amin Rezaei, Yuanqi Shen, Hai Zhou
2019/1461 (PDF ) Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP Morteza Adeli, Nasour Bagheri
2019/1460 (PDF ) Byzantine Fault Tolerance in Partially Synchronous Networks Yongge Wang
2019/1459 (PDF ) Side Channel Information Set Decoding using Iterative Chunking Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
2019/1458 (PDF ) Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery Moni Naor, Lior Rotem, Gil Segev
2019/1457 (PDF ) Fast and Secure Updatable Encryption Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
2019/1456 (PDF ) ModFalcon: compact signatures based on module NTRU lattices Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa
2019/1455 (PDF ) Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance Yanyan Liu, Yiru Sun
2019/1454 (PDF ) Practical Relativistic Zero-Knowledge for NP Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Stinchcombe, Nan Yang
2019/1453 (PDF ) Saber on ESP32 Bin Wang, Xiaozhuo Gu, Yingshan Yang
2019/1452 (PDF ) Leakage-Resilient Lattice-Based Partially Blind Signatures D. Papachristoudis, D. Hristu-Varsakelis, F. Baldimtsi, G. Stephanides
2019/1451 (PDF ) Tight bound on NewHope failure probability Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca
2019/1450 (PDF ) Extractors for Adversarial Sources via Extremal Hypergraphs Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
2019/1449 (PDF ) Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL David Butler, David Aspinall, Adria Gascon
2019/1448 (PDF ) Investigating Profiled Side-Channel Attacks Against the DES Key Schedule Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
2019/1447 (PDF ) Benchmarking Post-Quantum Cryptography in TLS Christian Paquin, Douglas Stebila, Goutam Tamvada
2019/1446 (PDF ) Boolean functions for homomorphic-friendly stream ciphers Claude Carlet, Pierrick Méaux
2019/1445 (PDF ) Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
2019/1444 (PDF ) Compact Storage of Superblocks for NIPoPoW Applications Kostis Karantias, Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
2019/1443 (PDF ) CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist Abhrajit Sengupta, Ozgur Sinanoglu
2019/1441 (PDF ) A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce
2019/1440 (PDF ) Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems Sarah Azouvi, George Danezis, Valeria Nikolaenko
2019/1439 (PDF ) Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds S. Sharmila Deva Selvi, Irene Miriam Isaac, C. Pandu Rangan
2019/1438 (PDF ) A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang
2019/1437 (PDF ) Reverse Outsourcing: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme Fei Meng, Mingqiang Wang
2019/1436 (PDF ) Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
2019/1435 (PDF ) Confidential Assets on MimbleWimble Yi Zheng, Howard Ye, Patrick Dai, Tongcheng Sun, Vladislav Gelfer
2019/1434 (PDF ) About Low DFR for QC-MDPC Decoding Nicolas Sendrier, Valentin Vasseur
2019/1433 (PDF ) T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk
2019/1432 (PDF ) A Generic View on the Unified Zero-Knowledge Protocol and its Applications Diana Maimut, George Teseleanu
2019/1430 (PDF ) On the Impossibility of Probabilistic Proofs in Relativized Worlds Alessandro Chiesa, Siqi Liu
2019/1427 (PDF ) On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha
2019/1426 (PDF ) On asymptotically optimal tests for random number generators Boris Ryabko
2019/1425 (PDF ) HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT Zhiguo Wan, Wei Liu, Hui Cui
2019/1424 (PDF ) Efficient Side-Channel Secure Message Authentication with Better Bounds Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
2019/1423 (PDF ) QC-MDPC decoders with several shades of gray Nir Drucker, Shay Gueron, Dusan Kostic
2019/1422 (PDF ) IPDL: A Probabilistic Dataflow Logic for Cryptography Xiong Fan, Joshua Gancher, Greg Morrisett, Elaine Shi, Kristina Sojakova
2019/1421 (PDF ) Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations Nicky Mouha, Christopher Celi
2019/1420 (PDF ) A Non-Interactive Shuffle Argument With Low Trust Assumptions Antonis Aggelakis, Prastudy Fauzi, Georgios Korfiatis, Panos Louridas, Foteinos Mergoupis-Anagnou, Janno Siim, Michal Zajac
2019/1419 (PDF ) Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks Ahmet Turan Erozan, Michael Hefenbrock, Michael Beigl, Jasmin Aghassi-Hagmann, Mehdi B. Tahoori
2019/1418 (PDF ) Designated-ciphertext Searchable Encryption Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo
2019/1417 (PDF ) CSIDH on Other Form of Elliptic Curves Xuejun Fan, Song Tian, Bao Li, Xiu Xu
2019/1416 (PDF ) The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption Melissa Chase, Trevor Perrin, Greg Zaverucha
2019/1415 (PDF ) Toward A More Efficient Gröbner-based Algebraic Cryptanalysis Hossein Arabnezhad-Khanoki, Babak Sadeghiyan
2019/1413 (PDF ) Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/1412 (PDF ) Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism Augustin P. Sarr
2019/1411 (PDF ) Isochronous Gaussian Sampling: From Inception to Implementation James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi
2019/1409 (PDF ) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang
2019/1408 (PDF ) The group of automorphisms of the set of self-dual bent functions Aleksandr Kutsenko
2019/1407 (PDF ) Incrementally Verifiable Computation via Incremental PCPs Moni Naor, Omer Paneth, Guy N. Rothblum
2019/1406 (PDF ) Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting Tassos Dimtiriou
2019/1405 (PDF ) Revisiting Higher-Order Computational Attacks against White-Box Implementations Houssem Maghrebi, Davide Alessio
2019/1404 (PDF ) CSIDH on the surface Wouter Castryck, Thomas Decru
2019/1402 (PDF ) Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations Vincent HERBERT
2019/1401 (PDF ) SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1400 (PDF ) RedShift: Transparent SNARKs from List Polynomial Commitments Assimakis Kattis, Konstantin Panarin, Alexander Vlasov
2019/1399 (PDF ) (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia
2019/1398 (PDF ) How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework Xiaoxia Jiang, Youliang Tian
2019/1397 (PDF ) How to compartment secrets Gaëlle Candel, Rémi Géraud-Stewart, David Naccache
2019/1396 (PDF ) A note on the multivariate cryptosystem based on a linear code Yasufumi Hashimoto
2019/1395 (PDF ) McTiny: fast high-confidence post-quantum key erasure for tiny network servers Daniel J. Bernstein, Tanja Lange
2019/1394 (PDF ) Voltage-based Covert Channels using FPGAs Dennis R. E. Gnad, Cong Dang Khoa Nguyen, Syed Hashim Gillani, Mehdi B. Tahoori
2019/1393 (PDF ) SoK: Computer-Aided Cryptography Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
2019/1392 (PDF ) Decryption failure is more likely after success Nina Bindel, John M. Schanck
2019/1391 (PDF ) Are These Pairing Elements Correct? Automated Verification and Applications Susan Hohenberger, Satyanarayana Vusirikala
2019/1390 (PDF ) Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2019/1389 (PDF ) Generic Attack on Iterated Tweakable FX Constructions Ferdinand Sibleyras
2019/1388 (PDF ) Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code Jayashree Dey, Ratna Dutta
2019/1387 (PDF ) The supersingular isogeny problem in genus 2 and beyond Craig Costello, Benjamin Smith
2019/1386 (PDF ) Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version) Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You
2019/1385 (PDF ) Improvements of the Balance Discovery Attack on Lightning Network Payment Channels Gijs van Dam, Rabiah Abdul Kadir, Puteri N. E. Nohuddin, Halimah Badioze Zaman
2019/1384 (PDF ) Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations Keita Emura, Shuichi Katsumata, Yohei Watanabe
2019/1383 (PDF ) Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
2019/1382 (PDF ) On the Power of Multiple Anonymous Messages Badih Ghazi, Noah Golowich, Ravi Kumar, Rasmus Pagh, Ameya Velingker
2019/1381 (PDF ) The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions Kaisa Nyberg
2019/1380 (PDF ) Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs Elif Bilge Kavun, Nele Mentens, Jo Vliegen, Tolga Yalcin
2019/1379 (PDF ) Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes Christophe Clavier, Léo Reynaud
2019/1378 (PDF ) Alzette: a 64-bit ARX-box (feat. CRAX and TRAX) Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang
2019/1377 (PDF ) A Scalable Post-quantum Hash-Based Group Signature Masoumeh Shafieinejad, Navid Nasr Esfahani
2019/1376 (PDF ) Generic Constructions of RIBE via Subset Difference Method Xuecheng Ma, Dongdai Lin
2019/1375 (PDF ) New ideas to build noise-free homomorphic cryptosystems Gérald Gavin, Sandrine Tainturier
2019/1374 (PDF ) Challenges of Post-Quantum Digital Signing in Real-world Applications: A Survey Teik Guan Tan, Pawel Szalachowski, Jianying Zhou
2019/1373 (PDF ) A note on the cost of computing odd degree isogenies Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
2019/1372 (PDF ) Analyzing the Linear Keystream Biases in AEGIS Maria Eichlseder, Marcel Nageler, Robert Primas
2019/1371 (PDF ) A short-list of pairing-friendly curves resistant to Special TNFS at the 128-bit security level Aurore Guillevic
2019/1370 (PDF ) A Subset Fault Analysis of ASCON Priyanka Joshi, Bodhisatwa Mazumdar
2019/1369 (PDF ) Impeccable Circuits II Aein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi
2019/1368 (PDF ) Efficient FPGA Implementations of LowMC and Picnic Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner
2019/1367 (PDF ) Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption Keitaro Hashimoto, Wakaha Ogata, Toi Tomita
2019/1366 (PDF ) A Lattice-based Enhanced Privacy ID Nada EL Kassem, Luis Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa
2019/1365 (PDF ) FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh
2019/1364 (PDF ) Boolean Functions with Multiplicative Complexity 3 and 4 Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
2019/1363 (PDF ) Multi-Device for Signal Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque
2019/1362 (PDF ) A Modern View on Forward Security Colin Boyd, Kai Gellert
2019/1361 (PDF ) Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level Kaushik Nath, Palash Sarkar
2019/1360 (PDF ) Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol Daniele Cozzo, Nigel P. smart
2019/1359 (PDF ) Universal Forgery Attack against GCM-RUP Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu
2019/1358 (PDF ) Traceable Inner Product Functional Encryption Xuan Thanh Do, Duong Hieu Phan, David Pointcheval
2019/1357 (PDF ) Cryptanalysis of the Legendre PRF and generalizations Ward Beullens, Tim Beyne, Aleksei Udovenko, Giuseppe Vitto
2019/1356 (PDF ) Towards Post-Quantum Security for Signal's X3DH Handshake Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila
2019/1355 (PDF ) A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code Daniel Smith-Tone, Cristina Tone
2019/1354 (PDF ) BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, Butian Huang
2019/1353 (PDF ) Laconic Conditional Disclosure of Secrets and Applications Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta
2019/1352 (PDF ) Spectral analysis of ZUC-256 Jing Yang, Thomas Johansson, Alexander Maximov
2019/1351 (PDF ) Speeding Up OMD Instantiations in Hardware Diana Maimut, Alexandru Stefan Mega
2019/1350 (PDF ) Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun
2019/1349 (PDF ) UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
2019/1348 (PDF ) Network Time with a Consensus on Clock Handan Kilinc Alper
2019/1347 (PDF ) Variants of Wegman-Carter Message Authentication Code Supporting Variable Tag Lengths Sebati Ghosh, Palash Sarkar
2019/1346 (PDF ) Privacy-Preserving Decentralised Singular Value Decomposition Bowen Liu, Qiang Tang
2019/1345 (PDF ) Audita: A Blockchain-based Auditing Framework for Off-chain Storage Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano
2019/1344 (PDF ) From Fairness to Full Security in Multiparty Computation Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
2019/1343 (PDF ) An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber Yue Qin, Chi Cheng, Jintai Ding
2019/1342 (PDF ) Scalable Wildcarded Identity-Based Encryption Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh
2019/1341 (PDF ) Succinct Non-Interactive Secure Computation Andrew Morgan, Rafael Pass, Antigoni Polychroniadou
2019/1340 (PDF ) Secret Shared Shuffle Melissa Chase, Esha Ghosh, Oxana Poburinnaya
2019/1339 (PDF ) Extracting Randomness from Extractor-Dependent Sources Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
2019/1338 (PDF ) Two-party Private Set Intersection with an Untrusted Third Party Phi Hung Le, Samuel Ranellucci, S. Dov Gordon
2019/1337 (PDF ) Offline Witness Encryption with Semi-Adaptive Security Peter Chvojka, Tibor Jager, Saqib A. Kakvi
2019/1336 (PDF ) Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers Neal Koblitz, Alfred Menezes
2019/1335 (PDF ) On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions Tibor Jager, David Niehues
2019/1334 (PDF ) Privacy-Preserving Distributed Machine Learning based on Secret Sharing Ye Dong, Xiaojun Chen, Liyan Shen
2019/1333 (PDF ) The Dark SIDH of Isogenies Paul Bottinelli, Victoria de Quehen, Chris Leonardi, Anton Mosunov, Filip Pawlega, Milap Sheth
2019/1332 (PDF ) SEAL: Sealed-Bid Auction Without Auctioneers Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil G. Ray
2019/1331 (PDF ) Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating? Melissa Azouaoui, Romain Poussier, François-Xavier Standaert, Vincent Verneuil
2019/1330 (PDF ) OptiSwap: Fast Optimistic Fair Exchange Lisa Eckey, Sebastian Faust, Benjamin Schlosser
2019/1329 (PDF ) Drinfeld modules may not be for isogeny based cryptography Antoine Joux, Anand Kumar Narayanan
2019/1328 (PDF ) Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
2019/1327 (PDF ) Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain Donghoon Chang, Munawar Hasan, Pranav Jain
2019/1326 (PDF ) Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
2019/1325 (PDF ) Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2019/1324 (PDF ) Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme Avijit Dutta, Mridul Nandi
2019/1323 (PDF ) Secure Quantum Extraction Protocols Prabhanjan Ananth, Rolando L. La Placa
2019/1322 (PDF ) An Efficient Micropayment Channel on Ethereum Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef
2019/1321 (PDF ) Supersingular isogeny key exchange for beginners Craig Costello
2019/1320 (PDF ) Homomorphic Encryption Random Beacon Alisa Cherniaeva, Ilia Shirobokov, Omer Shlomovits
2019/1319 (PDF ) Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64 (Full Version) Mingjiang Huang, Liming Wang
2019/1318 (PDF ) Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications (Full Version) Mingjiang Huang, Liming Wang
2019/1317 (PDF ) Reverse Firewalls for Actively Secure MPCs Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
2019/1316 (PDF ) Binary Kummer Line Sabyasachi Karati
2019/1315 (PDF ) Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning Harsh Chaudhari, Rahul Rachuri, Ajith Suresh
2019/1314 (PDF ) Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang
2019/1313 (PDF ) On Oblivious Amplification of Coin-Tossing Protocols Nir Bitansky, Nathan Geier
2019/1312 (PDF ) Cryptographic Fault Diagnosis using VerFI Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova
2019/1311 (PDF ) BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments Jiwon Lee, Jihye Kim, Hyunok Oh
2019/1310 (PDF ) Lightweight Iterative MDS Matrices: How Small Can We Go? Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu
2019/1309 (PDF ) SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism Sujoy Sinha Roy
2019/1308 (PDF ) A Novel CCA Attack using Decryption Errors against LAC Qian Guo, Thomas Johansson, Jing Yang
2019/1305 (PDF ) Privacy-Preserving Computation over Genetic Data: HLA Matching and so on Jinming Cui, Huaping Li, Meng Yang
2019/1304 (PDF ) Reduction Modulo $2^{448}-2^{224}-1$ Kaushik Nath, Palash Sarkar
2019/1302 (PDF ) There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt
2019/1301 (PDF ) Modular lattice signatures, revisited Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
2019/1300 (PDF ) Actively Secure Setup for SPDZ Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Frederik Vercauteren, Tim Wood
2019/1299 (PDF ) A constant-rate non-malleable code in the split-state model. Divesh Aggarwal, Maciej Obremski
2019/1298 (PDF ) An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings Mark Abspoel, Anders Dalskov, Daniel Escudero, Ariel Nof
2019/1297 (PDF ) Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors Hamid Nejatollahi, Sina Shahhosseini, Rosario Cammarota, Nikil Dutt
2019/1296 (PDF ) FastSwap: Concretely Efficient Contingent Payments for Complex Predicates Mathias Hall-Andersen
2019/1295 (PDF ) A trip between creation and destruction of non-commutative public key exchange protocols Borja Gómez
2019/1294 (PDF ) Hashing to elliptic curves of $j$-invariant $1728$ Dmitrii Koshelev
2019/1293 (PDF ) LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek
2019/1292 (PDF ) Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2019/1291 (PDF ) SÉTA: Supersingular Encryption from Torsion Attacks Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski
2019/1290 (PDF ) Trapdoor DDH groups from pairings and isogenies Péter Kutas, Christophe Petit, Javier Silva
2019/1289 (PDF ) On constant-time QC-MDPC decoding with negligible failure rate Nir Drucker, Shay Gueron, Dusan Kostic
2019/1288 (PDF ) Threshold Schemes from Isogeny Assumptions Luca De Feo, Michael Meyer
2019/1287 (PDF ) MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
2019/1286 (PDF ) Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains Ambili K N, Jimmy Jose
2019/1285 (PDF ) Full-Round Differential Attack on DoT Block Cipher Manoj Kumar
2019/1284 (PDF ) Shorter QA-NIZK and SPS with Tighter Security Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang
2019/1283 (PDF ) Breaking the Hidden Irreducible Polynomials Scheme Christian Eder
2019/1282 (PDF ) Privacy-Preserving Decision Tree Training and Prediction against Malicious Server Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
2019/1281 (PDF ) Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer Geoffroy Couteau, Bill Roscoe, Peter Ryan
2019/1280 (PDF ) Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2019/1279 (PDF ) Post-quantum Zero Knowledge in Constant Rounds Nir Bitansky, Omri Shmueli
2019/1278 (PDF ) An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric Hamad Al Shehhi, Emanuele Bellini, Filipe Borba, Florian Caullery, Marc Manzano, Victor Mateu
2019/1277 (PDF ) Towards Quantum-Safe VPNs and Internet Maran van Heesch, Niels van Adrichem, Thomas Attema, Thijs Veugen
2019/1276 (PDF ) Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. Panos Kampanakis, Dimitrios Sikeridis
2019/1275 (PDF ) Updatable Oblivious Key Management for Storage Systems Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
2019/1274 (PDF ) Rank-metric Encryption on Arm-Cortex M0 Ameirah al Abdouli, Emanuele Bellini, Florian Caullery, Marc Manzano, Victor Mateu
2019/1273 (PDF ) A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol, Kris Gaj
2019/1272 (PDF ) The Niederreiter cryptosystem and Quasi-Cyclic codes Upendra Kapshikar, Ayan Mahalanobis
2019/1271 (PDF ) Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart
2019/1270 (PDF ) SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh
2019/1269 (PDF ) Repudiable Ring Signature: Stronger Security and Logarithmic-Size Hao Lin, Mingqiang Wang
2019/1268 (PDF ) On the Security of RSA-PSS in the Wild Saqib A. Kakvi
2019/1266 (PDF ) Note on the noise growth of the RNS variants of the BFV scheme Jean Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
2019/1264 (PDF ) Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era Juan Garay, Aggelos Kiayias, Rafail Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas
2019/1263 (PDF ) Comments on Cryptographic Entropy Measurement Anna Johnston
2019/1262 (PDF ) A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran
2019/1261 (PDF ) On Round-By-Round Soundness and State Restoration Attacks Justin Holmgren
2019/1260 (PDF ) TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions Anita Aghaie, Amir Moradi
2019/1259 (PDF ) Security and Efficiency Trade-offs for Elliptic Curve Diffie-Hellman at the 128-bit and 224-bit Security Levels Kaushik Nath, Palash Sarkar
2019/1258 (PDF ) Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper) Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2019/1257 (PDF ) Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, Nishant Raj
2019/1256 (PDF ) Permuted Puzzles and Cryptographic Hardness Elette Boyle, Justin Holmgren, Mor Weiss
2019/1255 (PDF ) Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular Daniel Benarroch, Matteo Campanelli, Dario Fiore, Kobi Gurkan, Dimitris Kolonelos
2019/1254 (PDF ) Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map Jiseung Kim, Changmin Lee
2019/1253 (PDF ) Probabilistic Properties of Modular Addition \\ (Extended abstract) Victoria Vysotskaya
2019/1252 (PDF ) Simplifying Constructions and Assumptions for $i\mathcal{O}$ Aayush Jain, Huijia Lin, Amit Sahai
2019/1251 (PDF ) Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits Anca Nitulescu
2019/1250 (PDF ) The Price of Active Security in Cryptographic Protocols Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2019/1249 (PDF ) Related-key Attack on 5-Round Kuznyechik Vitaly Kiryukhin
2019/1248 (PDF ) A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis Bastian Richter, David Knichel, Amir Moradi
2019/1247 (PDF ) A Note on Masking Generic Boolean Functions Lauren De Meyer, Felix Wegener, Amir Moradi
2019/1246 (PDF ) A Note on Our Submission to Track 4 of iDASH 2019 Marcel Keller, Ke Sun
2019/1245 (PDF ) Observations on the Quantum Circuit of the SBox of AES Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong
2019/1244 (PDF ) A Note on a Static SIDH Protocol Samuel Dobson, Trey Li, Lukas Zobernig
2019/1242 (PDF ) Non-Profiled Side Channel Attack based on Deep Learning using Picture Trace Jong-Yoen Park, Dong-Guk Han, Dirmanto Jap, Shivam Bhasin, Yoo-Seung Won
2019/1241 (PDF ) SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim
2019/1240 (PDF ) Forward and Backward Private DSSE for Range Queries Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu
2019/1239 (PDF ) Computationally Modeling User-Mediated Authentication Protocols Britta Hale
2019/1238 (PDF ) Linear-Regression on Packed Encrypted Data in the Two-Server Model Adi Akavia, Hayim Shaul, Mor Weiss, Zohar Yakhini
2019/1237 (PDF ) QFactory: classically-instructed remote secret qubits preparation Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden
2019/1236 (PDF ) Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack Bo-Yeon Sim, Dong-Guk Han
2019/1235 (PDF ) Physical Cryptography Mariana Costiuc, Diana Maimut, George Teseleanu
2019/1234 (PDF ) Efficient Homomorphic Comparison Methods with Optimal Complexity Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim
2019/1233 (PDF ) Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts Koji Nuida, Satsuya Ohata, Shigeo Mitsunari, Nuttapong Attrapadung
2019/1232 (PDF ) Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
2019/1231 (PDF ) Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications Zhao Chunhuan, Zheng Zhongxiang, Wang Xiaoyun, Xu Guangwu
2019/1230 (PDF ) Linear-Size Constant-Query IOPs for Delegating Computation Eli Ben-Sasson, Alessandro Chiesa, Lior Goldberg, Tom Gur, Michael Riabzev, Nicholas Spooner
2019/1229 (PDF ) Transparent SNARKs from DARK Compilers Benedikt Bünz, Ben Fisch, Alan Szepieniec
2019/1228 (PDF ) Guess what?! On the impossibility of unconditionally secure public-key encryption Lorenz Panny
2019/1227 (PDF ) Dynamic Searchable Encryption with Small Client Storage Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou
2019/1225 (PDF ) Analysis of Nakamoto Consensus, Revisited Jianyu Niu, Chen Feng, Hoang Dau, Yu-Chih Huang, Jingge Zhu
2019/1224 (PDF ) Practical Volume-Based Attacks on Encrypted Databases Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa
2019/1223 (PDF ) Integrita: Protecting View-Consistency in Online Social Network with Federated Servers Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/1222 (PDF ) Sub-Linear Privacy-Preserving Near-Neighbor Search M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan Wallach, Farinaz Koushanfar
2019/1221 (PDF ) Probabilistic Data Structures in Adversarial Environments David Clayton, Christopher Patton, Thomas Shrimpton
2019/1220 (PDF ) Side-channel Attacks on Blinded Scalar Multiplications Revisited Thomas Roche, Laurent Imbert, Victor Lomné
2019/1219 (PDF ) Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper) Nugier Cyrius, Adelin Remi, Migliore Vincent, Alata Eric
2019/1218 (PDF ) On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages Abdur Rehman Raza, Khawir Mahmood, Muhammad Faisal Amjad, Haider Abbas, Mehreen Afzal
2019/1216 (PDF ) Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
2019/1215 (PDF ) Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/1214 (PDF ) A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption Farokhlagha Moazami, Masoumeh Safkhani
2019/1213 (PDF ) Exploring Lightweight Efficiency of ForkAES Fatih Balli, Subhadeep Banik
2019/1212 (PDF ) Swap and Rotate: Lightweight linear layers for SPN-based blockciphers Subhadeep Banik, Fatih Balli, Francesco Regazzoni, Serge Vaudenay
2019/1211 (PDF ) Topology-Hiding Computation for Networks with Unknown Delays Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
2019/1210 (PDF ) Adaptive Security of Practical Garbling Schemes Zahra Jafargholi, Sabine Oechsner
2019/1209 (PDF ) On collisions related to an ideal class of order 3 in CSIDH Hiroshi Onuki, Tsuyoshi Takagi
2019/1208 (PDF ) Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective Xenia Bogomolec, John Gregory Underhill, Stiepan Aurélien Kovac
2019/1207 (PDF ) Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications Borja Gómez
2019/1206 (PDF ) High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography Jing Tian, Zhe Liu, Jun Lin, Zhongfeng Wang, Binjing Li
2019/1205 (PDF ) Secure Multi-party Quantum Computation with a Dishonest Majority Yfke Dulek, Alex Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner
2019/1204 (PDF ) Efficient simulation of random states and random unitaries Gorjan Alagic, Christian Majenz, Alexander Russell
2019/1203 (PDF ) Authentication in Key-Exchange: Definitions, Relations and Composition Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi
2019/1202 (PDF ) Rational isogenies from irrational endomorphisms Wouter Castryck, Lorenz Panny, Frederik Vercauteren
2019/1201 (PDF ) Efficient Redactable Signature and Application to Anonymous Credentials Olivier Sanders
2019/1200 (PDF ) A note on short invertible ring elements and applications to cyclotomic and trinomials number fields Thomas Attema, Ronald Cramer, Chaoping Xing
2019/1199 (PDF ) Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp
2019/1198 (PDF ) Encrypted Databases: New Volume Attacks against Range Queries Zichen Gui, Oliver Johnson, Bogdan Warinschi
2019/1197 (PDF ) Secret sharing and duality Laszlo Csirmaz
2019/1196 (PDF ) Evaluating Octic Residue Symbols Marc Joye
2019/1195 (PDF ) Non-Malleable Commitments Using Goldreich-Levin List Decoding Vipul Goyal, Silas Richelson
2019/1194 (PDF ) Perfect Forward Security of SPAKE2 Michel Abdalla, Manuel Barbosa
2019/1193 (PDF ) Security models for everlasting privacy Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis
2019/1192 (PDF ) Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets Daniel Berend, Dor Bitan, Shlomi Dolev
2019/1191 (PDF ) On the equivalence of authentication codes and robust (2,2)-threshold schemes Maura B. Paterson, Douglas R. Stinson
2019/1190 (PDF ) Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT Fulei Ji, Wentao Zhang, Tianyou Ding
2019/1189 (PDF ) Security Analysis and Improvements for the IETF MLS Standard for Group Messaging Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
2019/1188 (PDF ) Improving Password Guessing via Representation Learning Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti
2019/1187 (PDF ) Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs Orr Dunkelman, Léo Perrin
2019/1186 (PDF ) Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences Mahabir Prasad Jhanwar, Pratyush Ranjan Tiwari
2019/1185 (PDF ) Formalising $\Sigma$-Protocols and Commitment Schemes using CryptHOL David Butler, Andreas Lochbihler, David Aspinall, Adria Gascon
2019/1184 (PDF ) A concrete instantiation of Bulletproof zero-knowledge proof Andrey Jivsov
2019/1183 (PDF ) Broadcast-Optimal Two-Round MPC Ran Cohen, Juan Garay, Vassilis Zikas
2019/1182 (PDF ) Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries Serge Fehr, Chen Yuan
2019/1180 (PDF ) Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2019/1179 (PDF ) Practical MP-LWE-based encryption balancing security-risk vs. efficiency Ron Steinfeld, Amin Sakzad, Raymond K. Zhao
2019/1178 (PDF ) SoK: Sharding on Blockchain Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1177 (PDF ) Proofs for Inner Pairing Products and Applications Benedikt Bünz, Mary Maller, Pratyush Mishra, Nirvan Tyagi, Psi Vesely
2019/1176 (PDF ) The Thirteenth Power Residue Symbol Eric Brier, David Naccache
2019/1175 (PDF ) Revisiting Leakage Abuse Attacks Laura Blackstone, Seny Kamara, Tarik Moataz
2019/1174 (PDF ) Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography Borja Gómez
2019/1173 (PDF ) Immunization against Complete Subversion without Random Oracles Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi
2019/1172 (PDF ) Lever: Breaking the Shackles of Scalable On-chain Validation Mingming Wang, Qianhong Wu
2019/1171 (PDF ) Almost universal codes for MIMO wiretap channels Laura Luzzi, Roope Vehkalahti, Cong Ling
2019/1170 (PDF ) Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count Iggy van Hoof
2019/1169 (PDF ) Semantically Secure Lattice Codes for Compound MIMO Channels Antonio Campello, Cong Ling, Jean-Claude Belfiore
2019/1168 (PDF ) Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting) Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu
2019/1167 (PDF ) BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
2019/1166 (PDF ) The complete cost of cofactor h=1 Peter Schwabe, Amber Sprenkels
2019/1165 (PDF ) Fast verification of masking schemes in characteristic two Nicolas Bordes, Pierre Karpman
2019/1164 (PDF ) Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version) Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao
2019/1163 (PDF ) On the Difficulty of FSM-based Hardware Obfuscation Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar
2019/1162 (PDF ) Subversion-Resistant Simulation (Knowledge) Sound NIZKs Karim Baghery
2019/1161 (PDF ) Estimating quantum speedups for lattice sieves Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck
2019/1160 (PDF ) Cryptanalysis of the Multivariate Encryption Scheme EFLASH Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid
2019/1159 (PDF ) Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
2019/1158 (PDF ) Practical Privacy-Preserving K-means Clustering Payman Mohassel, Mike Rosulek, Ni Trieu
2019/1157 (PDF ) A Note on the Chi-square Method : A Tool for Proving Cryptographic Security Srimanta Bhattacharya, Mridul Nandi
2019/1156 (PDF ) How to Extract Useful Randomness from Unreliable Sources Divesh Aggarwal, Maciej Obremski, João Ribeiro, Luisa Siniscalchi, Ivan Visconti
2019/1155 (PDF ) Machine-Checked Proofs for Cryptographic Standards José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub
2019/1154 (PDF ) The Retracing Boomerang Attack Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2019/1153 (PDF ) Stronger Security and Constructions of Multi-Designated Verifier Signatures Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nițulescu, Claudio Orlandi, Sophia Yakoubov
2019/1152 (PDF ) Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs Jonas Krautter, Dennis R. E. Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
2019/1151 (PDF ) Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
2019/1150 (PDF ) The Bitcoin Backbone Protocol Against Quantum Adversaries Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, Petros Wallden
2019/1149 (PDF ) LockDown: Balance Availability Attack against Lightning Network Channels Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquin Garcia-Alfaro
2019/1148 (PDF ) On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption Benjamin R. Curtis, Rachel Player
2019/1147 (PDF ) Batching non-membership proofs with bilinear accumulators Steve Thakur
2019/1146 (PDF ) Implementing Grover oracles for quantum key search on AES and LowMC Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia
2019/1145 (PDF ) B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion Craig Costello
2019/1144 (PDF ) Rerandomizable Signatures under Standard Assumption Sanjit Chatterjee, R. Kabaleeshwaran
2019/1143 (PDF ) Auditable Compressed Storage Iraklis Leontiadis, Reza Curtmola
2019/1142 (PDF ) Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP Tamalika Mukherjee, Noah Stephens-Davidowitz
2019/1141 (PDF ) KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2019/1140 (PDF ) Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version) Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan
2019/1139 (PDF ) Coded Merkle Tree: Solving Data Availability Attacks in Blockchains Mingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
2019/1138 (PDF ) ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1137 (PDF ) On the Complexity of Arithmetic Secret Sharing Ronald Cramer, Chaoping Xing, Chen Yuan
2019/1136 (PDF ) An implementation of the Paillier crypto system with threshold decryption without a trusted dealer Thijs Veugen, Thomas Attema, Gabriele Spini
2019/1135 (PDF ) A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2019/1134 (PDF ) Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes Ronald Cramer, Chaoping Xing
2019/1133 (PDF ) Threat Models and Security of Phase-Change Memory Gang Wang
2019/1132 (PDF ) Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2019/1131 (PDF ) Nearly Optimal Robust Secret Sharing against Rushing Adversaries Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan
2019/1130 (PDF ) On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode. V. Ustimenko
2019/1129 (PDF ) Privacy-Enhanced Machine Learning with Functional Encryption Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic
2019/1128 (PDF ) SoK: Communication Across Distributed Ledgers Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt
2019/1127 (PDF ) Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing Kazuhiko Minematsu, Norifumi Kamiya
2019/1126 (PDF ) Encrypted Distributed Dictionaries Archita Agarwal, Seny Kamara
2019/1125 (PDF ) Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols Karim Baghery, Behzad Abdolmaleki, Shahram Khazaei, Mohammad Reza Aref
2019/1124 (PDF ) Evolving Ramp Secret Sharing with a Small Gap Amos Beimel, Hussien Othman
2019/1123 (PDF ) FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme Laltu Sardar, Sushmita Ruj
2019/1122 (PDF ) Exploring Trade-offs in Batch Bounded Distance Decoding Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer
2019/1121 (PDF ) Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors Aaron Hutchinson, Jason LeGrow, Brian Koziel, Reza Azarderakhsh
2019/1120 (PDF ) Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian
2019/1119 (PDF ) MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version) Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko
2019/1118 (PDF ) A Diffie-Hellman quantum session key establishment protocol without entanglement Yalin Chen, Chang Hsiang, Liang-Chun Wang, Yu-Yuan Chou, Jue-Sam Chou
2019/1116 (PDF ) Computational Extractors with Negligible Error in the CRS Model Ankit Garg, Yael Tauman Kalai, Dakshita Khurana
2019/1115 (PDF ) Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2019/1114 (PDF ) A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE Jung Hee Cheon, Minki Hhan, Seungwan Hong, Yongha Son
2019/1113 (PDF ) Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector Oliver Masters, Hamish Hunt, Enrico Steffinlongo, Jack Crawford, Flavio Bergamaschi, Maria E. Dela Rosa, Caio C. Quini, Camila T. Alves, Feranda de Souza, Deise G. Ferreira
2019/1112 (PDF ) Subliminal Hash Channels George Teseleanu
2019/1111 (PDF ) Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers Mikerah Quintyne-Collins
2019/1109 (PDF ) Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González
2019/1108 (PDF ) Lower Bounds for Multi-Server Oblivious RAMs Kasper Green Larsen, Mark Simkin, Kevin Yeo
2019/1107 (PDF ) On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger
2019/1106 (PDF ) Side-channel Masking with Pseudo-Random Generator Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun
2019/1105 (PDF ) On the Multi-User Security of Short Schnorr Signatures with Preprocessing Jeremiah Blocki, Seunghoon Lee
2019/1104 (PDF ) More Efficient MPC from Improved Triple Generation and Authenticated Garbling Kang Yang, Xiao Wang, Jiang Zhang
2019/1103 (PDF ) Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels
2019/1101 (PDF ) On the (Quantum) Random Oracle Methodology: New Separations and More Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang
2019/1100 (PDF ) Efficient Explicit Constructions of Multipartite Secret Sharing Schemes Qi Chen, Chunming Tang, Zhiqiang Lin
2019/1099 (PDF ) On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name Eman Salem Alashwali, Kasper Rasmussen
2019/1098 (PDF ) Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling Eleftheria Makri, Tim Wood
2019/1097 (PDF ) Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann
2019/1096 (PDF ) Proof-of-Burn Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2019/1095 (PDF ) Secure Computation with Preprocessing via Function Secret Sharing Elette Boyle, Niv Gilboa, Yuval Ishai
2019/1094 (PDF ) Is Information-Theoretic Topology-Hiding Computation Possible? Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, Tal Moran
2019/1093 (PDF ) Quantum Random Oracle Model with Auxiliary Input Minki Hhan, Keita Xagawa, Takashi Yamakawa
2019/1092 (PDF ) Cerberus Channels: Incentivizing Watchtowers for Bitcoin Georgia Avarikioti, Orfeas Stefanos Thyfronitis Litos, Roger Wattenhofer
2019/1091 (PDF ) Short Paper: XOR Arbiter PUFs have Systematic Response Bias Nils Wisiol, Niklas Pirnay
2019/1090 (PDF ) Low Complexity MDS Matrices Using $GF(2^n)$ SPB or GPB Xinggu Chen, Haining Fan
2019/1089 (PDF ) Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing Josiah Johnson Umezurike
2019/1088 (PDF ) KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability Clinton Ehrlich, Anna Guzova
2019/1087 (PDF ) Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data Shyam Murthy, Srinivas Vivek
2019/1086 (PDF ) The SPHINCS+ Signature Framework Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe
2019/1085 (PDF ) Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee
2019/1084 (PDF ) Distributed Vector-OLE: Improved Constructions and Implementation Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova
2019/1083 (PDF ) What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS Eman Salem Alashwali, Kasper Rasmussen
2019/1082 (PDF ) On the Security of Multikey Homomorphic Encryption Hyang-Sook Lee, Jeongeun Park
2019/1081 (PDF ) OCEAN: A Built-In Replacement for Mining Pools Raymond Chee, Kartik Chitturi, Edouard Dufour-Sans, Kyle Soska
2019/1080 (PDF ) Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods Fukang Liu, Takanori Isobe, Willi Meier
2019/1079 (PDF ) When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited Yiming Zhu, Zhen Liu, Yanbin Pan
2019/1078 (PDF ) Puncturable Proxy Re-Encryption supporting to Group Messaging Service Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu
2019/1077 (PDF ) Adaptively Secure Garbling Schemes for Parallel Computations Kai-Min Chung, Luowen Qian
2019/1076 (PDF ) Fractal: Post-Quantum and Transparent Recursive Proofs from Holography Alessandro Chiesa, Dev Ojha, Nicholas Spooner
2019/1075 (PDF ) Private Information Retrieval with Sublinear Online Time Henry Corrigan-Gibbs, Dmitry Kogan
2019/1074 (PDF ) Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe Dirk Thatmann
2019/1073 (PDF ) iUC: Flexible Universal Composability Made Simple Jan Camenisch, Stephan Krenn, Ralf Kuesters, Daniel Rausch
2019/1072 (PDF ) Rate-1 Trapdoor Functions from the Diffie-Hellman Problem Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta
2019/1071 (PDF ) DLSCA: a Tool for Deep Learning Side Channel Analysis Martin Brisfors, Sebastian Forsmark
2019/1070 (PDF ) Secure Delegation of Isogeny Computations and Cryptographic Applications Robi Pedersen, Osmanbey Uzunkol
2019/1069 (PDF ) Efficient Private PEZ Protocols for Symmetric Functions Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta
2019/1068 (PDF ) Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets Efficiently Joey Green, Tilo Burghardt, Elisabeth Oswald
2019/1067 (PDF ) Lattice Trapdoors and IBE from Middle-Product LWE Alex Lombardi, Vinod Vaikuntanathan, Thuy Duong Vuong
2019/1066 (PDF ) HEAX: An Architecture for Computing on Encrypted Data M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai
2019/1065 (PDF ) Subversion-Resistant Commitment Schemes: Definitions and Constructions Karim Baghery
2019/1064 (PDF ) Separating Symmetric and Asymmetric Password-Authenticated Key Exchange Julia Hesse
2019/1063 (PDF ) A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig
2019/1062 (PDF ) Local Proofs Approaching the Witness Length Noga Ron-Zewi, Ron D. Rothblum
2019/1061 (PDF ) Breaking and Fixing Anonymous Credentials for the Cloud Ulrich Haböck, Stephan Krenn
2019/1060 (PDF ) Sharing the LUOV: Threshold Post-Quantum Signatures Daniele Cozzo, Nigel P. smart
2019/1059 (PDF ) A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem Daniele Di Tullio, Ankan Pal
2019/1058 (PDF ) Privacy-preserving auditable token payments in a permissioned blockchain system Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann
2019/1057 (PDF ) A Study of Persistent Fault Analysis Andrea Caforio, Subhadeep Banik
2019/1056 (PDF ) Adventures in Supersingularland Sarah Arpin, Catalina Camacho-Navarro, Kristin Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková
2019/1055 (PDF ) Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
2019/1054 (PDF ) Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence David Cerezo Sánchez
2019/1053 (PDF ) Modeling Memory Faults in Signature and Authenticated Encryption Schemes Marc Fischlin, Felix Günther
2019/1052 (PDF ) Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2019/1051 (PDF ) A New Public Key Cryptosystem Based on Edwards Curves Maher Boudabra, Abderrahmane Nitaj
2019/1050 (PDF ) A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem Abderrahmane Nitaj, Emmanuel Fouotsa
2019/1049 (PDF ) CrypTFlow: Secure TensorFlow Inference Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2019/1048 (PDF ) New point compression method for elliptic $\mathbb{F}_{\!q^2}$-curves of $j$-invariant $0$ Dmitrii Koshelev
2019/1047 (PDF ) Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Psi Vesely, Nicholas Ward
2019/1046 (PDF ) The Function-Inversion Problem: Barriers and Opportunities Henry Corrigan-Gibbs, Dmitry Kogan
2019/1045 (PDF ) Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank Josh Alman, Robin Hui
2019/1044 (PDF ) Verifiable Registration-Based Encryption Rishab Goyal, Satyanarayana Vusirikala
2019/1043 (PDF ) Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack Eli Biham, Lior Neumann
2019/1042 (PDF ) A Machine-Checked Proof of Security for AWS Key Management Service José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Gregoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran
2019/1041 (PDF ) A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs Swapnil Paliwal, Anvita Chandrakar
2019/1040 (PDF ) Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators Abhishek Chakraborty, Ankur Srivastava
2019/1039 (PDF ) Accelerated V2X provisioning with Extensible Processor Platform Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Marcos Simplicio Jr., Diego F. Aranha, Ruud Derwig, Harsh Kupwade-Patil
2019/1038 (PDF ) Dynamic Searchable Encryption with Access Control Johannes Blömer, Nils Löken
2019/1037 (PDF ) Card-based Cryptography Meets Formal Verification Alexander Koch, Michael Schrempp, Michael Kirsten
2019/1036 (PDF ) Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies Kazuki Yoneyama
2019/1035 (PDF ) An LLL Algorithm for Module Lattices Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
2019/1034 (PDF ) Sponges Resist Leakage: The Case of Authenticated Encryption Jean Paul Degabriele, Christian Janson, Patrick Struck
2019/1033 (PDF ) Anonymous AE John Chan, Phillip Rogaway
2019/1032 (PDF ) On Fully Secure MPC with Solitary Output Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin
2019/1031 (PDF ) An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice Rahim Toluee, Taraneh Eghlidos
2019/1030 (PDF ) How to leverage hardness of constant degree expanding polynomials over R to build iO Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
2019/1029 (PDF ) Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures Yilei Chen, Nicholas Genise, Pratyay Mukherjee
2019/1028 (PDF ) Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors Divesh Aggarwal, Bogdan Ursu, Serge Vaudenay
2019/1027 (PDF ) Quantum LLL with an Application to Mersenne Number Cryptosystems Marcel Tiepelt, Alan Szepieniec
2019/1025 (PDF ) On Perfect Correctness without Derandomization Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
2019/1024 (PDF ) Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix Dor Bitan, Shlomi Dolev
2019/1023 (PDF ) Randomly Choose an Angle from Immense Number of Angles to Rotate Qubits, Compute and Reverse Dor Bitan, Shlomi Dolev
2019/1022 (PDF ) A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
2019/1021 (PDF ) Recursive Proof Composition without a Trusted Setup Sean Bowe, Jack Grigg, Daira Hopwood
2019/1020 (PDF ) Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity Alexander Vlasov, Konstantin Panarin
2019/1019 (PDF ) Revisiting the Hybrid attack on sparse and ternary secret LWE Yongha Son, Jung Hee Cheon
2019/1018 (PDF ) Towards Instantiating the Algebraic Group Model Julia Kastner, Jiaxin Pan
2019/1017 (PDF ) The Local Forking Lemma and its Application to Deterministic Encryption Mihir Bellare, Wei Dai, Lucy Li
2019/1016 (PDF ) Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik
2019/1015 (PDF ) Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures. Eleftherios Kokoris-Kogias, Dahlia Malkhi, Alexander Spiegelman
2019/1014 (PDF ) Security Reductions for White-Box Key-Storage in Mobile Payments Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels
2019/1013 (PDF ) A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules') Carolyn Whitnall, Elisabeth Oswald
2019/1012 (PDF ) Simple and Efficient KDM-CCA Secure Public Key Encryption Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
2019/1011 (PDF ) COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
2019/1010 (PDF ) On Perfect Correctness in (Lockable) Obfuscation Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters
2019/1009 (PDF ) LLL and stochastic sandpile models Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang
2019/1008 (PDF ) Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations Olivier Bronchain, François-Xavier Standaert
2019/1007 (PDF ) SPAE a mode of operation for AES on low-cost hardware Philippe Elbaz-Vincent, Cyril Hugounenq, Sébastien Riou
2019/1006 (PDF ) Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable) Francesco Lucente Stabile, Carey Patrick Atkins
2019/1005 (PDF ) Threshold Implementations in the Robust Probing Model Siemen Dhooghe, Svetla Nikova, Vincent Rijmen
2019/1004 (PDF ) Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, Damian Vizar
2019/1003 (PDF ) Twisted Hessian Isogenies Thinh Dang, Dustin Moody
2019/1002 (PDF ) Boomerang Uniformity of Popular S-box Constructions Shizhu Tian, Christina Boura, Léo Perrin
2019/1001 (PDF ) Middle-Product Learning with Rounding Problem and its Applications Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
2019/1000 (PDF ) Security of Symmetric Primitives against Key-Correlated Attacks Aisling Connolly, Pooya Farshim, Georg Fuchsbauer
2019/999 (PDF ) On the Fast Algebraic Immunity of Majority Functions Pierrick Méaux
2019/998 (PDF ) Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation Arpita Patra, Divya Ravi
2019/997 (PDF ) On the (In)security of Kilian-Based SNARGs James Bartusek, Liron Bronfman, Justin Holmgren, Fermi Ma, Ron Rothblum
2019/996 (PDF ) Pseudorandom Black Swans: Cache Attacks on CTR_DRBG Shaanan Cohney, Andrew Kwong, Shachar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom
2019/995 (PDF ) Blackbox Constructions from Mix-Nets Douglas Wikström
2019/994 (PDF ) A new family of APN quadrinomials Lilya Budaghyan, Tor Helleseth, Nikolay Kaleyski
2019/993 (PDF ) Private Set Relations with Bloom Filters for Outsourced SLA Validation Louis Tajan, Dirk Westhoff, Frederik Armknecht
2019/992 (PDF ) Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin
2019/991 (PDF ) Vectorized linear approximations for attacks on SNOW 3G Jing Yang, Thomas Johansson, Alexander Maximov
2019/990 (PDF ) Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More Sanjam Garg, Mohammad Hajiabadi, Rafail Ostrovsky
2019/989 (PDF ) Substitution Attacks against Message Authentication Marcel Armour, Bertram Poettering
2019/988 (PDF ) RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications David W. Archer, Jose Manuel Calderon Trilla, Jason Dagit, Alex J. Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan
2019/987 (PDF ) Subverting Decryption in AEAD Marcel Armour, Bertram Poettering
2019/986 (PDF ) Outpost: A Responsive Lightweight Watchtower Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
2019/985 (PDF ) EthDKG: Distributed Key Generation with Ethereum Smart Contracts Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
2019/984 (PDF ) Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions Sam Kim, David J. Wu
2019/983 (PDF ) Graph Similarity and Its Applications to Hardware Security Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
2019/982 (PDF ) CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama
2019/981 (PDF ) Traceback for End-to-End Encrypted Messaging Nirvan Tyagi, Ian Miers, Thomas Ristenpart
2019/980 (PDF ) New Approaches to Traitor Tracing with Embedded Identities Rishab Goyal, Venkata Koppula, Brent Waters
2019/979 (PDF ) PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks Kalikinkar Mandal, Guang Gong
2019/978 (PDF ) Strength in Numbers: Improving Generalization with Ensembles in Profiled Side-channel Analysis Guilherme Perin, Lukasz Chmielewski, Stjepan Picek
2019/977 (PDF ) Non-malleable Zero-Knowledge Arguments with Lower Round Complexity Zhenbin Yan, Yi Deng
2019/976 (PDF ) Towards real-time hidden speaker recognition by means of fully homomorphic encryption Martin Zuber, Sergiu Carpov, Renaud Sirdey
2019/974 (PDF ) Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE Abdelrahaman Aly, Emmanuela Orsini, Dragos Rotaru, Nigel P. Smart, Tim Wood
2019/973 (PDF ) On the Non-Existence of Short Vectors in Random Module Lattices Ngoc Khanh Nguyen
2019/972 (PDF ) Noninteractive Zero Knowledge Proof System for NP from Ring LWE Wenping MA
2019/971 (PDF ) Verifpal: Cryptographic Protocol Analysis for the Real World Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari
2019/969 (PDF ) Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge
2019/968 (PDF ) There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero William Black, Ryan Henry
2019/967 (PDF ) On NIST's Compression Estimate Test Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
2019/966 (PDF ) Fast, Compact, and Expressive Attribute-Based Encryption Junichi Tomida, Yuto Kawahara, Ryo Nishimaki
2019/965 (PDF ) Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness Andrea Caforio, F Betül Durak, Serge Vaudenay
2019/964 (PDF ) WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited Georg Fuchsbauer
2019/963 (PDF ) Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits Pascal Aubry, Sergiu Carpov, Renaud Sirdey
2019/962 (PDF ) New Constructions of Hinting PRGs, OWFs with Encryption, and more Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
2019/961 (PDF ) Computing across Trust Boundaries using Distributed Homomorphic Cryptography Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
2019/960 (PDF ) Another Look at Key Randomisation Hypotheses Subhabrata Samajder, Palash Sarkar
2019/959 (PDF ) Table Redundancy Method for Protecting against Fault Attacks Seungkwang Lee, Nam-su Jho, Myungchul Kim
2019/958 (PDF ) Using SMT Solvers to Automate Chosen Ciphertext Attacks Gabrielle Beck, Maximilian Zinkus, Matthew Green
2019/957 (PDF ) TaaS: Commodity MPC via Triples-as-a-Service Nigel P. Smart, Titouan Tanguy
2019/956 (PDF ) Security of Hedged Fiat-Shamir Signatures under Fault Attacks Diego F. Aranha, Claudio Orlandi, Akira Takahashi, Greg Zaverucha
2019/955 (PDF ) Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols
2019/954 (PDF ) CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri
2019/953 (PDF ) PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge Ariel Gabizon, Zachary J. Williamson, Oana Ciobotaru
2019/952 (PDF ) Non-Interactive Zero Knowledge Proofs in the Random Oracle Model Vincenzo Iovino, Ivan Visconti
2019/951 (PDF ) Collisions on Feistel-MiMC and univariate GMiMC Xavier Bonnetain
2019/950 (PDF ) Another look at some isogeny hardness assumptions Simon-Philipp Merz, Romy Minko, Christophe Petit
2019/949 (PDF ) A Note on Parameter Choices of Round5 Yongha Son
2019/948 (PDF ) Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin
2019/947 (PDF ) nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski
2019/946 (PDF ) Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design M Sazadur Rahman, Adib Nahiyan, Sarah Amir, Fahim Rahman, Farimah Farahmandi, Domenic Forte, Mark Tehranipoor
2019/945 (PDF ) A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting Navid Ghaedi Bardeh
2019/944 (PDF ) Efficient zero-knowledge arguments in the discrete log setting, revisited Max Hoffmann, Michael Klooß, Andy Rupp
2019/943 (PDF ) Analysis of Nakamoto Consensus Ling Ren
2019/942 (PDF ) Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model Handan Kılınç Alper
2019/941 (PDF ) Does "www." Mean Better Transport Layer Security? Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2019/940 (PDF ) Security analysis of two lightweight certificateless signature schemes Nasrollah Pakniat
2019/939 (PDF ) Homomorphic Encryption Standard Martin Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan
2019/938 (PDF ) Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem Gaëtan Leurent, Ferdinand Sibleyras
2019/937 (PDF ) Fault Template Attacks on Block Ciphers Exploiting Fault Propagation Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay
2019/936 (PDF ) SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions Markku-Juhani O. Saarinen
2019/934 (PDF ) Linear Approximations of Random Functions and Permutations Mohsin Khan, Kaisa Nyberg
2019/933 (PDF ) Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen
2019/932 (PDF ) Related-key Differential Cryptanalysis of Full Round CRAFT Muhammad ElSheikh, Amr M. Youssef
2019/931 (PDF ) Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory Andre Esser, Alexander May
2019/930 (PDF ) Module-LWE versus Ring-LWE, Revisited Yang Wang, Mingqiang Wang
2019/929 (PDF ) On the Degree-Insensitive SI-GDH problem and assumption Samuel Dobson, Steven D. Galbraith
2019/928 (PDF ) Blockchain-enabled Cryptographically-secure Hardware Obfuscation Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert, Domenic Forte
2019/927 (PDF ) Isogeny-based hashing despite known endomorphisms Lorenz Panny
2019/926 (PDF ) Formal Verification of a Constant-Time Preserving C Compiler Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin, Vincent Laporte, David Pichardie, Alix Trieu
2019/925 (PDF ) Fully Auditable Privacy-preserving Cryptocurrency Against Malicious Auditors Wulu Li, Yongcan Wang, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
2019/924 (PDF ) Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill
2019/923 (PDF ) Automated Probe Repositioning for On-Die EM Measurements Bastian Richter, Alexander Wild, Amir Moradi
2019/922 (PDF ) A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation Karim Eldefrawy, Vitor Pereira
2019/921 (PDF ) Tree authenticated ephemeral keys Pavol Zajac
2019/920 (PDF ) Related-Key Differential Slide Attack Against Fountain V1 Raluca Posteuca
2019/919 (PDF ) Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (extended version∗) Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger
2019/918 (PDF ) Resolving the Trilemma in Logic Encryption Hai Zhou, Amin Rezaei, Yuanqi Shen
2019/917 (PDF ) Simplified Revocable Hierarchical Identity-Based Encryption from Lattices Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li
2019/915 (PDF ) Unique Rabin-Williams Signature Scheme Decryption Lynn Margaret Batten, Hugh Cowie Williams
2019/914 (PDF ) Composable and Finite Computational Security of Quantum Message Transmission Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu
2019/913 (PDF ) Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — An Analytical Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography Wen-Ran Zhang
2019/912 (PDF ) Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2019/911 (PDF ) IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography Gildas Avoine, Sébastien Canard, Loïc Ferreira
2019/910 (PDF ) Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
2019/909 (PDF ) A Practicable Timing Attack Against HQC and its Countermeasure Guillaume Wafo-Tapa, Slim Bettaieb, Loic Bidoux, Philippe Gaborit, Etienne Marcatel
2019/908 (PDF ) Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
2019/907 (PDF ) Practical Forgery Attacks on Limdolen and HERN Raghvendra Rohit, Guang Gong
2019/906 (PDF ) Efficient and secure software implementations of Fantomas Rafael J. Cruz, Antonio Guimarães, Diego F. Aranha
2019/904 (PDF ) Timed-Release Encryption With Master Time Bound Key (Full Version) Gwangbae Choi, Serge Vaudenay
2019/903 (PDF ) Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases Igor Semaev, Andrea Tenti
2019/902 (PDF ) Fractional LWE: a nonlinear variant of LWE Gérald Gavin, Stéphane Bonnevay
2019/901 (PDF ) Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs Thomas Haines, Clementine Gritti
2019/899 (PDF ) A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P Michael Yonli
2019/898 (PDF ) One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips Mehdi Tibouchi, Alexandre Wallet
2019/897 (PDF ) On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem Vasyl Ustimenko
2019/896 (PDF ) On the optionality and fairness of Atomic Swaps Runchao Han, Haoyu Lin, Jiangshan Yu
2019/895 (PDF ) The Singularity Attack to the Multivariate Signature Scheme Himq-3 Jintai Ding, Zheng Zhang, Joshua Deaton, Vishakha
2019/894 (PDF ) BioID: a Privacy-Friendly Identity Document Fatih Balli, F. Betül Durak, Serge Vaudenay
2019/893 (PDF ) New Efficient, Constant-Time Implementations of Falcon Thomas Pornin
2019/892 (PDF ) CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption Patrick Kresmer, Alexander Zeh
2019/891 (PDF ) Shielded Computations in Smart Contracts Overcoming Forks Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti
2019/890 (PDF ) An Adaptive Attack on 2-SIDH Samuel Dobson, Steven D. Galbraith, Jason LeGrow, Yan Bo Ti, Lukas Zobernig
2019/889 (PDF ) Securing DNSSEC Keys via Threshold ECDSA From Generic MPC Anders Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Shulman
2019/888 (PDF ) Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed Mustafa Khairallah
2019/887 (PDF ) Accelerating V2X Cryptography through Batch Operations Paul Bottinelli, Robert Lambert
2019/886 (PDF ) Round Complexity of Byzantine Agreement, Revisited T-H. Hubert Chan, Rafael Pass, Elaine Shi
2019/885 (PDF ) On the alpha value of polynomials in the tower number field sieve algorithm Aurore Guillevic, Shashank Singh
2019/884 (PDF ) Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures Mahesh Sreekumar Rajasree
2019/883 (PDF ) HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller
2019/882 (PDF ) Modifying The Tropical Version of Stickel’s Key Exchange Protocol Any Muanalifah, Serge˘ı Sergeev
2019/881 (PDF ) On the Boomerang Uniformity of some Permutation Polynomials Marco Calderini, Irene Villa
2019/880 (PDF ) A Blockchain-Based Access Control Scheme for Smart Grids Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li
2019/879 (PDF ) Cube-Based Cryptanalysis of Subterranean-SAE Fukang Liu, Takanori Isobe, Willi Meier
2019/878 (PDF ) Algebraically Structured LWE, Revisited Chris Peikert, Zachary Pepin
2019/877 (PDF ) Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin
2019/876 (PDF ) Kadcast: A Structured Approach to Broadcast in Blockchain Networks Elias Rohrer, Florian Tschorsch
2019/875 (PDF ) Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication Daan Leermakers, Boris Skoric
2019/874 (PDF ) ABDKS Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing Fei Meng, Mingqiang Wang
2019/873 (PDF ) Count of rotational symmetric bent Boolean functions Shashi Kant Pandey, P. R. Mishra
2019/872 (PDF ) Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan
2019/871 (PDF ) Non-Locality and Zero-Knowledge MIPs Claude Crépeau, Nan Yang
2019/870 (PDF ) The Eleventh Power Residue Symbol Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache
2019/869 (PDF ) ProtectIOn: Root-of-Trust for IO in Compromised Platforms Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
2019/868 (PDF ) On the Round Complexity of Randomized Byzantine Agreement Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky
2019/867 (PDF ) A Practical Forgery Attack on Lilliput-AE Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki
2019/866 (PDF ) A Fast Characterization Method for Semi-invasive Fault Injection Attacks Lichao Wu, Gerard Ribera, Noemie Beringuier-Boher, Stjepan Picek
2019/865 (PDF ) Cryptanalysis of Reduced-Round SipHash Le He, Hongbo Yu
2019/863 (PDF ) Fast Actively Secure Five-Party Computation with Security Beyond Abort Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla
2019/862 (PDF ) Key recovery attacks on the Legendre PRFs within the birthday bound Dmitry Khovratovich
2019/861 (PDF ) A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli, Rémi Piau, Cécile Pierrot
2019/860 (PDF ) Machine learning and side channel analysis in a CTF competition Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, Karim Tobich
2019/859 (PDF ) A Coin-Free Oracle-Based Augmented Black Box Framework Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe
2019/858 (PDF ) Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH Eric Crockett, Christian Paquin, Douglas Stebila
2019/857 (PDF ) Bitcontracts: Supporting Smart Contracts in Legacy Blockchains Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
2019/856 (PDF ) More results on Shortest Linear Programs Subhadeep Banik, Yuki Funabiki, Takanori Isobe
2019/855 (PDF ) WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery Dominic Dams, Jeff Lataille, Rino Sanchez, John Wade
2019/854 (PDF ) Reducing the Cost of Implementing AES as a Quantum Circuit Brandon Langenberg, Hai Pham, Rainer Steinwandt
2019/853 (PDF ) A critique of game-based definitions of receipt-freeness for voting Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth
2019/852 (PDF ) Weak-Key Distinguishers for AES Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer
2019/851 (PDF ) On Designing Lightweight RFID Security Protocols for Medical IoT Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri
2019/850 (PDF ) Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles Morteza Adeli, Nasour Bagheri
2019/849 (PDF ) Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems Ambili K N, Jimmy Jose
2019/848 (PDF ) Observations on the DLCT and Absolute Indicators Anne Canteaut, Lukas Kölsch, Friedrich Wiemer
2019/847 (PDF ) Improved Heuristics for Short Linear Programs Quan Quan Tan, Thomas Peyrin
2019/846 (PDF ) Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions Yuechen Chen, Linru Zhang, Siu-Ming Yiu
2019/845 (PDF ) A Reaction Attack against Cryptosystems based on LRPC Codes Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas
2019/844 (PDF ) pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4 Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, Ko Stoffelen
2019/843 (PDF ) How to Construct CSIDH on Edwards Curves Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
2019/842 (PDF ) Improved SIMD Implementation of Poly1305 Sreyosi Bhattacharyya, Palash Sarkar
2019/841 (PDF ) Practical Cryptanalysis of k-ary C* Daniel Smith-Tone
2019/840 (PDF ) A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
2019/839 (PDF ) Statistical Zap Arguments from Quasi-Polynomial LWE Abhishek Jain, Zhengzhong Jin
2019/838 (PDF ) Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2019/837 (PDF ) Stronger and Faster Side-Channel Protections for CSIDH Daniel Cervantes-Vázquez, Mathilde Chenu, Jesús-Javier Chi-Domínguez, Luca De Feo, Francisco Rodríguez-Henríquez, Benjamin Smith
2019/836 (PDF ) Optimal Transport Layer for Secure Computation Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Shulman
2019/835 (PDF ) ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
2019/834 (PDF ) Succinct Arguments in the Quantum Random Oracle Model Alessandro Chiesa, Peter Manohar, Nicholas Spooner
2019/833 (PDF ) AES MixColumn with 92 XOR gates Alexander Maximov
2019/832 (PDF ) Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC Ronald Cramer, Matthieu Rambaud, Chaoping Xing
2019/831 (PDF ) Privacy of Stateful RFID Systems with Constant Tag Identifiers Cristian Hristea, Ferucio Laurentiu Tiplea
2019/830 (PDF ) The Simplest Multi-key Linearly Homomorphic Signature Scheme Diego F. Aranha, Elena Pagnin
2019/829 (PDF ) Batch Binary Weierstrass Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi
2019/828 (PDF ) Optimal Collision Side-Channel Attacks Cezary Glowacz, Vincent Grosso
2019/827 (PDF ) k-root-n: An efficient algorithm for avoiding short term double-spending alongside distributed ledger technologies such as blockchain Zvi Schreiber
2019/826 (PDF ) Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations Erdinç Öztürk
2019/825 (PDF ) Plaintext Recovery Attacks against XTS Beyond Collisions Takanori Isobe, Kazuhiko Minematsu
2019/824 (PDF ) Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look Behnaz Rezvani, Flora Coleman, Sachin Sachin, William Diehl
2019/823 (PDF ) Securely Sampling Biased Coins with Applications to Differential Privacy Jeffrey Champion, abhi shelat, Jonathan Ullman
2019/822 (PDF ) Surveying definitions of coercion resistance Thomas Haines, Ben Smyth
2019/821 (PDF ) Towards Forward Secure Internet Traffic Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2019/820 (PDF ) Universal Location Referencing and Homomorphic Evaluation of Geospatial Query Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow
2019/819 (PDF ) Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow
2019/818 (PDF ) X-DeepSCA: Cross-Device Deep Learning Side Channel Attack Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen
2019/817 (PDF ) Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions Tapas Pal, Ratna Dutta
2019/816 (PDF ) Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks Mirco Richter
2019/814 (PDF ) Faster Subgroup Checks for BLS12-381 Sean Bowe
2019/813 (PDF ) Multi-Client Symmetric Searchable Encryption with Forward Privacy Alexandros Bakas, Antonis Michalas
2019/812 (PDF ) Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree Chaoyun Li, Bart Preneel
2019/811 (PDF ) SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
2019/810 (PDF ) Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs Jeroen Delvaux
2019/809 (PDF ) On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet Yosuke Todo, Willi Meier, Kazumaro Aoki
2019/808 (PDF ) 2-Message Publicly Verifiable WI from (Subexponential) LWE Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2019/807 (PDF ) Provable Security for PKI Schemes Sara Wrótniak, Hemi Leibowitz, Ewa Syta, Amir Herzberg
2019/806 (PDF ) Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk
2019/805 (PDF ) RRTxFM: Probabilistic Counting for Differentially Private Statistics Saskia Nuñez von Voigt, Florian Tschorsch
2019/804 (PDF ) Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions Claire Delaplace, Andre Esser, Alexander May
2019/803 (PDF ) Methodology for Efficient CNN Architectures in Profiling Attacks -- Extended Version Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2019/802 (PDF ) New Circuit Minimization Techniques for Smaller and Faster AES SBoxes Alexander Maximov, Patrik Ekdahl
2019/801 (PDF ) A Chosen Random Value Attack on WPA3 SAE authentication protocol Sheng Sun
2019/800 (PDF ) Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations? Claire Delaplace, Alexander May
2019/799 (PDF ) Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin
2019/798 (PDF ) A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods Kwangsu Lee
2019/797 (PDF ) Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$ Douglas Martins, Gustavo Banegas, Ricardo Custodio
2019/796 (PDF ) The End of Logic Locking? A Critical View on the Security of Logic Locking Susanne Engels, Max Hoffmann, Christof Paar
2019/795 (PDF ) More Practical Single-Trace Attacks on the Number Theoretic Transform Peter Pessl, Robert Primas
2019/794 (PDF ) Efficient Cryptography on the RISC-V Architecture Ko Stoffelen
2019/793 (PDF ) On equivalence between known families of quadratic APN functions Lylia Budaghyan, Marco Calderini, Irene Villa
2019/792 (PDF ) TICK: Tiny Client for Blockchains Wei Zhang, Jiangshan Yu, Qingqiang He, Nan Zhang, Nan Guan
2019/791 (PDF ) Sublattice Attacks on LWE over Arbitrary Number Field Lattices Hao Chen
2019/790 (PDF ) Simple and Efficient Approach for Achieving End-to-End Anonymous Communication Wei Jiang, Adam Bowers, Dan Lin
2019/789 (PDF ) Relation between o-equivalence and EA-equivalence for Niho bent functions Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila
2019/788 (PDF ) The Impact of Time on DNS Security Aanchal Malhotra, Willem Toorop, Benno Overeinder, Ralph Dolmans, Sharon Goldberg
2019/787 (PDF ) Optimized implementation of the NIST PQC submission ROLLO on microcontroller Jérôme Lablanche, Lina Mortajine, Othman Benchaalal, Pierre-Louis Cayrel, Nadia El Mrabet
2019/786 (PDF ) P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation Rebecca Schwerdt, Matthias Nagel, Valerie Fetzer, Tobias Gräf, Andy Rupp
2019/785 (PDF ) A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography Yalin Chen, Jue-Sam Chou, Liang-Chun Wang, Yu-Yuan Chou
2019/784 (PDF ) Towards a Hybrid Public Key Infrastructure (PKI): A Review Priyadarshi Singh, Abdul Basit, N Chaitanya Kumar, V. Ch. Venkaiah
2019/783 (PDF ) Dissecting the CHES 2018 AES Challenge Tobias Damm, Sven Freud, Dominik Klein
2019/782 (PDF ) Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms Antoine Joux, Cecile Pierrot
2019/781 (PDF ) BBQ: Using AES in Picnic Signatures Cyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart
2019/780 (PDF ) Statistical ZAP Arguments Saikrishna Badrinarayan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai
2019/779 (PDF ) Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse
2019/778 (PDF ) A Composable Security Treatment of the Lightning Network Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
2019/777 (PDF ) A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos Jörg Schwenk, Douglas Stebila
2019/776 (PDF ) Scalable Private Set Union from Symmetric-Key Techniques Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang
2019/775 (PDF ) Pay To Win: Cheap, Crowdfundable, Cross-chain Algorithmic Incentive Manipulation Attacks on PoW Cryptocurrencies Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar Weippl
2019/774 (PDF ) Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness Hamidreza Amini Khorasgani, Hemanta Maji, Tamalika Mukherjee
2019/773 (PDF ) Efficient Secure Ridge Regression from Randomized Gaussian Elimination Frank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
2019/772 (PDF ) Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box Lorenzo Grassi, Markus Schofnegger
2019/771 (PDF ) DDH-based Multisignatures with Public Key Aggregation Duc-Phong Le, Guomin Yang, Ali Ghorbani
2019/770 (PDF ) Practical Attacks on Reduced-Round AES Navid Ghaedi Bardeh, Sondre Rønjom
2019/769 (PDF ) Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2019/768 (PDF ) Distributing any Elliptic Curve Based Protocol Nigel P. Smart, Younes Talibi Alaoui
2019/767 (PDF ) On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$ Jaeseong Jeong, Chang Heon Kim, Namhun Koo, Soonhak Kwon, Sumin Lee
2019/766 (PDF ) Complexity of Estimating Renyi Entropy of Markov Chains Maciej Obremski, Maciej Skorski
2019/765 (PDF ) SPQCop: Side-channel protected Post-Quantum Cryptoprocessor Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2019/764 (PDF ) The Adversarial Robustness of Sampling Omri Ben-Eliezer, Eylon Yogev
2019/763 (PDF ) Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80 Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma
2019/762 (PDF ) Verifiable Computing for Approximate Computation Shuo Chen, Jung Hee Cheon, Dongwoo Kim, Daejun Park
2019/761 (PDF ) Athena: A verifiable, coercion-resistant voting system with linear complexity Ben Smyth
2019/760 (PDF ) Differential Fault Analysis of NORX Amit Jana, Dhiman Saha, Goutam Paul
2019/759 (PDF ) Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer
2019/758 (PDF ) Genus 2 Supersingular Isogeny Oblivious Transfer Ramsès Fernàndez-València
2019/757 (PDF ) EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cedric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph Wintersteiger, Santiago Zanella-Beguelin
2019/756 (PDF ) SKIVA: Flexible and Modular Side-channel and Fault Countermeasures Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
2019/755 (PDF ) Generic Attacks on Hash Combiners Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang
2019/754 (PDF ) Is it Easier to Prove Theorems that are Guaranteed to be True? Rafael Pass, Muthuramakrishnan Venkitasubramaniam
2019/753 (PDF ) Design of Anonymous Endorsement System in Hyperledger Fabric Subhra Mazumdar, Sushmita Ruj
2019/752 (PDF ) Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, Shiping Chen
2019/751 (PDF ) Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic Thorsten Kleinjung, Benjamin Wesolowski
2019/750 (PDF ) A Short Note on a Weight Probability Distribution Related to SPNs Sondre Rønjom
2019/749 (PDF ) The privacy of the TLS 1.3 protocol Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete
2019/748 (PDF ) Temporary Censorship Attacks in the Presence of Rational Miners Fredrik Winzer, Benjamin Herd, Sebastian Faust
2019/747 (PDF ) Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte
2019/746 (PDF ) Public-Key Function-Private Hidden Vector Encryption (and More) James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova
2019/745 (PDF ) Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation Vincenzo Iovino
2019/744 (PDF ) Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento
2019/743 (PDF ) Lattice-Based Remote User Authentication from Reusable Fuzzy Signature Yangguang Tian, Yingjiu Li, Robert. H Deng, Binanda Sengupta, Guomin Yang
2019/742 (PDF ) Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps
2019/741 (PDF ) Comprehensive Security Analysis of CRAFT Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Nasour Bagheri
2019/740 (PDF ) A Secure Publish/Subscribe Protocol for Internet of Things Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
2019/739 (PDF ) A Survey on Authenticated Encryption -- ASIC Designer's Perspective Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalcin
2019/737 (PDF ) Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
2019/736 (PDF ) Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE Hao Chen, Ilaria Chillotti, Ling Ren
2019/735 (PDF ) SoK of Used Cryptography in Blockchain Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
2019/734 (PDF ) From Usability to Secure Computing and Back Again Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
2019/733 (PDF ) Compressible FHE with Applications to PIR Craig Gentry, Shai Halevi
2019/732 (PDF ) Fully Homomorphic NIZK and NIWI Proofs Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya
2019/731 (PDF ) On the Complexity of ``Superdetermined'' Minrank Instances Javier Verbel, John Baena, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone
2019/730 (PDF ) PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH Vladimir Soukharev, Basil Hess
2019/729 (PDF ) Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients Jingwei Zhang, Shuhong Gao, Chang-An Zhao
2019/728 (PDF ) Verifying Solutions to LWE with Implications for Concrete Security Palash Sarkar, Subhadip Singha
2019/727 (PDF ) Iterative Differential Characteristic of TRIFLE-BC Fukang Liu, Takanori Isobe
2019/726 (PDF ) A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
2019/725 (PDF ) He Gives C-Sieves on the CSIDH Chris Peikert
2019/724 (PDF ) Breaking Tweakable Enciphering Schemes using Simon's Algorithm Sebati Ghosh, Palash Sarkar
2019/723 (PDF ) On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
2019/722 (PDF ) Neural Network Model Assessment for Side-Channel Analysis Guilherme Perin, Baris Ege, Lukasz Chmielewski
2019/721 (PDF ) Optimized SIKE Round 2 on 64-bit ARM Hwajeong Seo, Amir Jalali, Reza Azarderakhsh
2019/720 (PDF ) Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2019/718 (PDF ) Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority Marina Blanton, Ahreum Kang, Chen Yuan
2019/717 (PDF ) Homomorphism learning problems and its applications to public-key cryptography Christopher Leonardi, Luis Ruiz-Lopez
2019/716 (PDF ) On the Quantum Complexity of the Continuous Hidden Subgroup Problem Koen de Boer, Léo Ducas, Serge Fehr
2019/715 (PDF ) On the Security of Lattice-based Fiat-Shamir Signatures in the Presence of Randomness Leakage Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming
2019/714 (PDF ) Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang
2019/713 (PDF ) Public Ledger for Sensitive Data Riccardo Longo, Massimiliano Sala
2019/712 (PDF ) SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting Shay Gueron, Yehuda Lindell
2019/711 (PDF ) SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation Brian Koziel, A-Bon Ackie, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2019/709 (PDF ) Secure Computation for Cloud data Storage Davood Rezaeipour
2019/708 (PDF ) Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions Luís T. A. N. Brandão, Çağdaş Çalık, Meltem Sönmez Turan, René Peralta
2019/707 (PDF ) Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions Olivier Blazy, Céline Chevalier, Quoc Huy Vu
2019/706 (PDF ) Endemic Oblivious Transfer Daniel Masny, Peter Rindal
2019/705 (PDF ) Commodity-Based 2PC for Arithmetic Circuits Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi
2019/704 (PDF ) Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese
2019/703 (PDF ) A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation Carolyn Whitnall, Elisabeth Oswald
2019/702 (PDF ) Cryptanalysis of Plantlet Subhadeep Banik, Khashayar Barooti, Takanori Isobe
2019/701 (PDF ) Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs Hiroaki Anada
2019/700 (PDF ) SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki
2019/699 (PDF ) Tight quantum security of the Fiat-Shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes André Chailloux
2019/698 (PDF ) A Formal Treatment of Deterministic Wallets Poulami Das, Sebastian Faust, Julian Loss
2019/697 (PDF ) Breaking ACORN with a Single Fault Elena Dubrova
2019/696 (PDF ) Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments Masayuki Abe, Miguel Ambrona, Miyako Ohkubo
2019/695 (PDF ) An Efficient Secure Three-Party Sorting Protocol with an Honest Majority Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas
2019/694 (PDF ) A Unified and Composable Take on Ratcheting Daniel Jost, Ueli Maurer, Marta Mularczyk
2019/693 (PDF ) Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions Raphael Bost, Pierre-Alain Fouque
2019/692 (PDF ) Synchronous Consensus with Optimal Asynchronous Fallback Guarantees Erica Blum, Jonathan Katz, Julian Loss
2019/691 (PDF ) Comparing proofs of security for lattice-based encryption Daniel J. Bernstein
2019/690 (PDF ) Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
2019/689 (PDF ) On-Device Power Analysis Across Hardware Security Domains Colin O'Flynn, Alex Dewar
2019/688 (PDF ) Better Bootstrapping for Approximate Homomorphic Encryption Kyoohyung Han, Dohyeong Ki
2019/687 (PDF ) General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun
2019/686 (PDF ) On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations Nir Bitansky, Akshay Degwekar
2019/685 (PDF ) Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5 Markku-Juhani O. Saarinen
2019/684 (PDF ) Revelio: A MimbleWimble Proof of Reserves Protocol Arijit Dutta, Saravanan Vijayakumaran
2019/683 (PDF ) The Notion of Transparency Order, Revisited Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin
2019/682 (PDF ) Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX Alexandros Bakas, Antonis Michalas
2019/681 (PDF ) Lattice-based Cryptography for IoT in A Quantum World: Are We Ready? Ayesha Khalid, Sarah McCarthy, Weiqiang Liu, Maire O’Neill
2019/680 (PDF ) Non-Commutative Ring Learning With Errors From Cyclic Algebras Charles Grover, Andrew Mendelsohn, Cong Ling, Roope Vehkalahti
2019/679 (PDF ) Forgery Attacks on FlexAE and FlexAEAD Maria Eichlseder, Daniel Kales, Markus Schofnegger
2019/678 (PDF ) A Modified pqsigRM: RM Code-Based Signature Scheme Yongwoo Lee, Wijik Lee, Young-Sik Kim, Jong-Seon No
2019/677 (PDF ) A Note on Lower Digits Extraction Polynomial for Bootstrapping Mingjia Huo, Kewen Wu, Qi Ye
2019/676 (PDF ) Robust and Scalable Consensus for Sharded Distributed Ledgers Eleftherios Kokoris-Kogias
2019/675 (PDF ) Balance: Dynamic Adjustment of Cryptocurrency Deposits Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt
2019/674 (PDF ) Polar Sampler: A Novel Bernoulli Sampler Using Polar Codes with Application to Integer Gaussian Sampling Jiabo Wang, Cong Ling
2019/673 (PDF ) A New Approach to Constructing Digital Signature Schemes (Extended Paper) Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu
2019/672 (PDF ) A Blockchain-Assisted Hash-Based Signature Scheme Ahto Buldas, Risto Laanoja, Ahto Truu
2019/671 (PDF ) A Server-Assisted Hash-Based Signature Scheme Ahto Buldas, Risto Laanoja, Ahto Truu
2019/670 (PDF ) On designing secure small-state stream ciphers against time-memory-data tradeoff attacks Vahid Amin Ghafari, Honggang Hu, Fujiang Lin
2019/669 (PDF ) Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect Yunwen Liu, Yu Sasaki
2019/668 (PDF ) New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160 Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
2019/667 (PDF ) PPAD-Hardness via Iterated Squaring Modulo a Composite Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
2019/666 (PDF ) On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling Zheng Wang, Cong Ling
2019/665 (PDF ) Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption Jintai Ding, Pedro Branco, Kevin Schmitt
2019/664 (PDF ) How Diversity Affects Deep-Learning Side-Channel Attacks Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova
2019/663 (PDF ) Can Verifiable Delay Functions be Based on Random Oracles? Mohammad Mahmoody, Caleb Smith, David J. Wu
2019/662 (PDF ) Generalized Proofs of Knowledge with Fully Dynamic Setup Christian Badertscher, Daniel Jost, Ueli Maurer
2019/661 (PDF ) Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa
2019/660 (PDF ) Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling Zheng Wang, Cong Ling
2019/659 (PDF ) Tight Verifiable Delay Functions Nico Döttling, Sanjam Garg, Giulio Malavolta, Prashant Nalini Vasudevan
2019/658 (PDF ) Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest Jun Furukawa, Yehuda Lindell
2019/657 (PDF ) Multi-Party PSM, Revisited: Improved Communication and Unbalanced Communication Leonard Assouline, Tianren Liu
2019/655 (PDF ) Visualizing size-security tradeoffs for lattice-based encryption Daniel J. Bernstein
2019/654 (PDF ) Concise Linkable Ring Signatures and Forgery Against Adversarial Keys Brandon Goodell, Sarang Noether, Arthur Blue
2019/653 (PDF ) On the Local Leakage Resilience of Linear Secret Sharing Schemes Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin
2019/652 (PDF ) The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts Navid Ghaedi Bardeh, Sondre Rønjom
2019/651 (PDF ) Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing Muhammad Ishaq, Ana Milanova, Vassilis Zikas
2019/650 (PDF ) Incremental Proofs of Sequential Work Nico Döttling, Russell W. F. Lai, Giulio Malavolta
2019/649 (PDF ) Txilm: Lossy Block Compression with Salted Short Hashing Donghui Ding, Xin Jiang, Jiaping Wang, Hao Wang, Xiaobing Zhang, Yi Sun
2019/648 (PDF ) Efficient Invisible and Unlinkable Sanitizable Signatures Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan
2019/647 (PDF ) Strong Asymmetric PAKE based on Trapdoor CKEM Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu
2019/646 (PDF ) Communication-Efficient Unconditional MPC with Guaranteed Output Delivery Vipul Goyal, Yanyi Liu, Yifan Song
2019/645 (PDF ) Attribute Based Encryption for Deterministic Finite Automata from DLIN Shweta Agrawal, Monosij Maitra, Shota Yamada
2019/644 (PDF ) Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era- Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas
2019/643 (PDF ) Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
2019/642 (PDF ) Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler
2019/641 (PDF ) Simulation Extractability in Groth's zk-SNARK Shahla Atapoor, Karim Baghery
2019/640 (PDF ) On Round Optimal Statistical Zero Knowledge Arguments Nir Bitansky, Omer Paneth
2019/639 (PDF ) Trapdoor Hash Functions and Their Applications Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky
2019/638 (PDF ) On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
2019/637 (PDF ) Cryptographic Sensing Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2019/636 (PDF ) Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs
2019/635 (PDF ) Homomorphic Time-Lock Puzzles and Applications Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
2019/634 (PDF ) SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2019/633 (PDF ) New non-linearity parameters of Boolean functions Igor Semaev
2019/632 (PDF ) Fully Homomorphic Encryption for RAMs Ariel Hamlin, Justin Holmgren, Mor Weiss, Daniel Wichs
2019/631 (PDF ) Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge Cody Freitag, Ilan Komargodski, Rafael Pass
2019/630 (PDF ) ABE for DFA from k-Lin Junqing Gong, Brent Waters, Hoeteck Wee
2019/629 (PDF ) Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE Shweta Agrawal, Monosij Maitra, Shota Yamada
2019/628 (PDF ) Watermarking Public-Key Cryptographic Primitives Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu
2019/627 (PDF ) Unconditionally Secure Computation Against Low-Complexity Leakage Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan
2019/626 (PDF ) Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge Vipul Goyal, Aayush Jain, Amit Sahai
2019/625 (PDF ) Public-Key Cryptography in the Fine-Grained Setting Rio Lavigne, Andrea Lincoln, Virginia Vassilevska Williams
2019/624 (PDF ) Nonces are Noticed: AEAD Revisited Mihir Bellare, Ruth Ng, Björn Tackmann
2019/623 (PDF ) Exploring Constructions of Compact NIZKs from Various Assumptions Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2019/622 (PDF ) Extended Truncated-differential Distinguishers on Round-reduced AES Zhenzhen Bao, Jian Guo, Eik List
2019/621 (PDF ) A Modified Simple Substitution Cipher With Unbounded Unicity Distance Bruce Kallick
2019/620 (PDF ) Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems Steven D. Galbraith, Lukas Zobernig
2019/619 (PDF ) Continuous Verifiable Delay Functions Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
2019/618 (PDF ) Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods Fukang Liu, Takanori Isobe
2019/617 (PDF ) Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model Sebastian Gajek, Marco Lewandowsky
2019/616 (PDF ) Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak
2019/615 (PDF ) My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks Siemen Dhooghe, Svetla Nikova
2019/614 (PDF ) Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher
2019/613 (PDF ) MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas
2019/611 (PDF ) Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set Thaddeus Dryja
2019/610 (PDF ) Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem Jean-Sebastien Coron, Agnese Gini
2019/609 (PDF ) CPA-to-CCA Transformation for KDM Security Fuyuki Kitagawa, Takahiro Matsuda
2019/608 (PDF ) Symmetric Primitives with Structured Secrets Navid Alamati, Hart Montgomery, Sikhar Patranabis
2019/607 (PDF ) Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang
2019/606 (PDF ) An Efficient and Provable Masked Implementation of qTESLA François Gérard, Mélissa Rossi
2019/605 (PDF ) A note on different types of ransomware attacks Mihail Anghel, Andrei Racautanu
2019/604 (PDF ) New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan
2019/603 (PDF ) How to Delegate Computations Publicly Yael Kalai, Omer Paneth, Lisa Yang
2019/602 (PDF ) Continuously Non-Malleable Secret Sharing for General Access Structures Gianluca Brian, Antonio Faonio, Daniele Venturi
2019/601 (PDF ) AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system Ariel Gabizon
2019/600 (PDF ) ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu
2019/599 (PDF ) New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning Ivan Damgård, Daniel Escudero, Tore Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev
2019/597 (PDF ) A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio Shahram Khazaei
2019/596 (PDF ) Discretisation and Product Distributions in Ring-LWE Sean Murphy, Rachel Player
2019/595 (PDF ) DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero Pedro Moreno-Sanchez, Arthur Blue, Duc V. Le, Sarang Noether, Brandon Goodell, Aniket Kate
2019/594 (PDF ) Computing Primitive Idempotents in Finite Commutative Rings and Applications Mugurel Barcau, Vicentiu Pasol
2019/593 (PDF ) On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces V. Ustimenko, M. Klisowski
2019/592 (PDF ) Statistical Analysis and Anonymity of TOR's Path Selection Andrei Mogage, Emil Simion
2019/591 (PDF ) Simulating Homomorphic Evaluation of Deep Learning Predictions Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2019/590 (PDF ) Tighter proofs of CCA security in the quantum random oracle model Nina Bindel, Mike Hamburg, Kathrin Hövelmanns, Andreas Hülsing, Edoardo Persichetti
2019/589 (PDF ) A${^2}$L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2019/588 (PDF ) Formal Notions of Security for Verifiable Homomorphic Encryption Jakub Klemsa, Ivana Trummová
2019/587 (PDF ) Polygraph: Accountable Byzantine Agreement Pierre Civit, Seth Gilbert, Vincent Gramoli
2019/586 (PDF ) Simulation-Extractable zk-SNARK with a Single Verification Jihye Kim, Jiwon Lee, Hyunok Oh
2019/585 (PDF ) On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay
2019/583 (PDF ) Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei
2019/582 (PDF ) EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security Ran Canetti, Alley Stoughton, Mayank Varia
2019/580 (PDF ) Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang
2019/579 (PDF ) BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices Dominic Letz
2019/578 (PDF ) Deep Learning based Side Channel Attacks in Practice Houssem Maghrebi
2019/577 (PDF ) Improved Multiplication Triple Generation over Rings via RLWE-based AHE Deevashwer Rathee, Thomas Schneider, K. K. Shukla
2019/576 (PDF ) On Group-Characterizability of Homomorphic Secret Sharing Schemes Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
2019/575 (PDF ) On Abelian and Homomorphic Secret Sharing Schemes Amir Jafari, Shahram Khazaei
2019/574 (PDF ) Subliminal channels in post-quantum digital signature schemes Herman Galteland, Kristian Gjøsteen
2019/573 (PDF ) Security of the Suffix Keyed Sponge Christoph Dobraunig, Bart Mennink
2019/572 (PDF ) On the Commitment Capacity of Unfair Noisy Channels Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento
2019/571 (PDF ) Multi-Party Virtual State Channels Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková
2019/570 (PDF ) Bias-variance Decomposition in Machine Learning-based Side-channel Analysis Daan van der Valk, Stjepan Picek
2019/569 (PDF ) Lattice RingCT v2.0 with Multiple Input and Output Wallets Wilson Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng
2019/568 (PDF ) Post Quantum ECC on FPGA Platform Debapriya Basu Roy, Debdeep Mukhopadhyay
2019/567 (PDF ) (Linkable) Ring Signature from Hash-Then-One-Way Signature Xingye Lu, Man Ho Au, Zhenfei Zhang
2019/566 (PDF ) Deep Learning based Model Building Attacks on Arbiter PUF Compositions Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty
2019/565 (PDF ) Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart
2019/564 (PDF ) Verification of Authenticated Firmware Load Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray
2019/563 (PDF ) ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA Omer Shlomovits, István András Seres
2019/562 (PDF ) Towards More Secure Constructions of Adjustable Join Schemes Shahram Khazaei, Mojtaba Rafiee
2019/561 (PDF ) Faster Bootstrapping of FHE over the integers with large prime message space Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang
2019/560 (PDF ) Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$ Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee, Dae Song Go, Sihem Mesnager
2019/559 (PDF ) Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables Evgeny K. Alekseev, Lyudmila A. Kushchinskaya
2019/558 (PDF ) How to not break SIDH Chloe Martindale, Lorenz Panny
2019/557 (PDF ) Extended Galbraith's Test on the Anonymity of IBEs from Higher Residuosity Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao
2019/556 (PDF ) When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop) Gideon Samid
2019/555 (PDF ) Optimal TNFS-secure pairings on elliptic curves with composite embedding degree Georgios Fotiadis, Chloe Martindale
2019/554 (PDF ) How to Build Pseudorandom Functions From Public Random Permutations Yu Long Chen, Eran Lambooij, Bart Mennink
2019/553 (PDF ) Towards post-quantum symmetric cryptography John Gregory Underhill, Stiepan Aurélien Kovac, Xenia Bogomolec
2019/552 (PDF ) Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space Binyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee
2019/551 (PDF ) A note on the correlations between NIST cryptographic statistical tests suite Emil Simion, Paul Burciu
2019/550 (PDF ) Spartan: Efficient and general-purpose zkSNARKs without trusted setup Srinath Setty
2019/549 (PDF ) Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
2019/548 (PDF ) About Wave Implementation and its Leakage Immunity Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2019/547 (PDF ) Linearly-Homomorphic Signatures and Scalable Mix-Nets Chloé Hébant, Duong Hieu Phan, David Pointcheval
2019/546 (PDF ) Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies David Cerezo Sánchez
2019/544 (PDF ) Evaluation of Code-based Signature Schemes Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto
2019/543 (PDF ) TMPS: Ticket-Mediated Password Strengthening John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sonmez Turan
2019/542 (PDF ) Formally Verified Cryptographic Web Applications in WebAssembly Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan
2019/541 (PDF ) A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement James Shook, Scott Simon, Peter Mell
2019/540 (PDF ) A chosen key attack against the secret S-boxes of GOST Markku-Juhani O. Saarinen
2019/539 (PDF ) Cryptanalysis of FlexAEAD Mostafizar Rahman, Dhiman Saha, Goutam Paul
2019/538 (PDF ) On Perfect Endomorphic Ciphers Nikolay Shenets
2019/537 (PDF ) Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard
2019/536 (PDF ) Protecting against Statistical Ineffective Fault Attacks Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Florian Mendel, Robert Primas
2019/535 (PDF ) SIKE Round 2 Speed Record on ARM Cortex-M4 Hwajeong soe, Amir Jalali, Reza Azarderakhsh
2019/534 (PDF ) Theoretical and Practical Approaches for Hardness Amplification of PUFs Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark Tehranipoor
2019/533 (PDF ) Stopping time signatures for some algorithms in cryptography Percy Deift, Stephen D. Miller, Thomas Trogdon
2019/532 (PDF ) Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography Carsten Baum, Ariel Nof
2019/531 (PDF ) How to Correct Errors in Multi-Server PIR Kaoru Kurosawa
2019/530 (PDF ) Speed-up of SCA attacks on 32-bit multiplications Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad
2019/529 (PDF ) UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions Pedro Branco, Manuel Goulão, Paulo Mateus
2019/528 (PDF ) Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version) Xavier Bonnetain, Léo Perrin, Shizhu Tian
2019/527 (PDF ) Revisiting Privacy-aware Blockchain Public Key Infrastructure Olamide Omolola, Paul Plessing
2019/526 (PDF ) Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman Cas Cremers, Dennis Jackson
2019/525 (PDF ) Misuse Attacks on Post-Quantum Cryptosystems Ciprian Băetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay
2019/524 (PDF ) Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
2019/523 (PDF ) Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2019/522 (PDF ) Secret-Sharing from Robust Conditional Disclosure of Secrets Amos Beimel, Naty Peter
2019/521 (PDF ) Fully Homomorphic Encryption with k-bit Arithmetic Operations Benjamin M. Case, Shuhong Gao, Gengran Hu, Qiuxia Xu
2019/520 (PDF ) A Note on Sub-Gaussian Random Variables Benjamin M. Case, Colin Gallagher, Shuhong Gao
2019/519 (PDF ) Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications Christopher Patton, Thomas Shrimpton
2019/518 (PDF ) Fast Database Joins and PSI for Secret Shared Data Payman Mohassel, Peter Rindal, Mike Rosulek
2019/517 (PDF ) Mobile Private Contact Discovery at Scale Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert
2019/516 (PDF ) CellTree: A New Paradigm for Distributed Data Repositories Anasuya Acharya, Manoj Prabhakaran, Akash Trehan
2019/515 (PDF ) A Countermeasure Against Statistical Ineffective Fault Analysis Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu
2019/514 (PDF ) Pixel: Multi-signatures for Consensus Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
2019/513 (PDF ) New Code-Based Privacy-Preserving Cryptographic Constructions Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng
2019/512 (PDF ) Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu
2019/511 (PDF ) GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi
2019/510 (PDF ) Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang
2019/509 (PDF ) New Slide Attacks on Almost Self-Similar Ciphers Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir
2019/508 (PDF ) RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu
2019/507 (PDF ) Simple Schemes in the Bounded Storage Model Jiaxin Guan, Mark Zhandry
2019/506 (PDF ) Forward Security with Crash Recovery for Secure Logs Erik-Oliver Blass, Guevara Noubir
2019/505 (PDF ) DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations Thorben Moos, Felix Wegener, Amir Moradi
2019/504 (PDF ) Afgjort: A Partially Synchronous Finality Layer for Blockchains Thomas Dinsdale-Young, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
2019/503 (PDF ) Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2019/502 (PDF ) A refined analysis of the cost for solving LWE via uSVP Shi Bai, Shaun Miller, Weiqiang Wen
2019/501 (PDF ) Optimal Merging in Quantum k-xor and k-sum Algorithms María Naya-Plasencia, André Schrottenloher
2019/500 (PDF ) An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
2019/499 (PDF ) Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography Michael Naehrig, Joost Renes
2019/498 (PDF ) CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren
2019/497 (PDF ) Forward and Backward-Secure Range-Searchable Symmetric Encryption Jiafan Wang, Sherman S. M. Chow
2019/496 (PDF ) Non-malleability for quantum public-key encryption Christian Majenz, Christian Schaffner, Jeroen van Wier
2019/495 (PDF ) Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited Marc Joye
2019/494 (PDF ) On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/493 (PDF ) Evaluating the effectiveness of heuristic worst-case noise analysis in FHE Anamaria Costache, Kim Laine, Rachel Player
2019/492 (PDF ) Decisional second-preimage resistance: When does SPR imply PRE? Daniel J. Bernstein, Andreas Hülsing
2019/491 (PDF ) Best Information is Most Successful Eloi de Cherisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida
2019/490 (PDF ) Sigma protocols for MQ, PKP and SIS, and fishy signature schemes Ward Beullens
2019/489 (PDF ) Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4 Leon Botros, Matthias J. Kannwischer, Peter Schwabe
2019/488 (PDF ) Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication Alan Kaminsky
2019/487 (PDF ) From Single-Input to Multi-Client Inner-Product Functional Encryption Michel Abdalla, Fabrice Benhamouda, Romain Gay
2019/486 (PDF ) Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment Suhyeon Lee, Seungjoo Kim
2019/485 (PDF ) A taxonomy of pairings, their security, their complexity Razvan Barbulescu, Nadia El Mrabet, Loubna Ghammam
2019/484 (PDF ) New Number-Theoretic Cryptographic Primitives Eric Brier, Houda Ferradi, Marc Joye, David Naccache
2019/483 (PDF ) Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert
2019/482 (PDF ) Tiny WireGuard Tweak Jacob Appelbaum, Chloe Martindale, Peter Wu
2019/481 (PDF ) An Efficient and Compact Reformulation of NIST Collision Estimate Test Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
2019/480 (PDF ) On the Efficiency of Privacy-Preserving Smart Contract Systems Karim Baghery
2019/479 (PDF ) Extended 3-Party ACCE and Application to LoRaWAN 1.1 Sébastien Canard, Loïc Ferreira
2019/478 (PDF ) BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme Sarah McCarthy, James Howe, Neil Smyth, Seamus Brannigan, Máire O’Neill
2019/477 (PDF ) The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter Cas Cremers, Britta Hale, Konrad Kohbrok
2019/476 (PDF ) On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef
2019/475 (PDF ) Dual-Mode NIZKs from Obfuscation Dennis Hofheinz, Bogdan Ursu
2019/473 (PDF ) A Method to Reduce the Key Size of UOV Signature Scheme Chengdong Tao
2019/472 (PDF ) Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM) Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2019/471 (PDF ) UC-Secure CRS Generation for SNARKs Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac
2019/470 (PDF ) A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals Niek J. Bouman, Niels de Vreede
2019/469 (PDF ) Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan
2019/468 (PDF ) The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem Alessandro Budroni, Andrea Tenti
2019/467 (PDF ) Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version) Clément Massart, François-Xavier Standaert
2019/465 (PDF ) Towards a Practical Cluster Analysis over Encrypted Data Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park
2019/464 (PDF ) The complexity of MinRank Alessio Caminata, Elisa Gorla
2019/463 (PDF ) In Pursuit of Clarity In Obfuscation Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
2019/462 (PDF ) How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11 Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes
2019/461 (PDF ) Physical Security of Deep Learning on Edge Devices: Comprehensive Evaluation of Fault Injection Attack Vectors Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu
2019/460 (PDF ) Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
2019/459 (PDF ) From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1 Gaëtan Leurent, Thomas Peyrin
2019/458 (PDF ) Poseidon: A New Hash Function for Zero-Knowledge Proof Systems Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger
2019/457 (PDF ) Forgery Attack on mixFeed in the Nonce-Misuse Scenario Mustafa Khairallah
2019/456 (PDF ) UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan
2019/455 (PDF ) FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol João Otávio Massari Chervinski, Diego Kreutz, Jiangshan Yu
2019/454 (PDF ) Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung
2019/453 (PDF ) A New Approach to Modelling Centralised Reputation Systems Lydia Garms, Elizabeth A. Quaglia
2019/452 (PDF ) A Central Limit Framework for Ring-LWE Noise Analysis Sean Murphy, Rachel Player
2019/451 (PDF ) Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher Francesco Berti, Olivier Pereira, François-Xavier Standaert
2019/450 (PDF ) HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou
2019/449 (PDF ) Limits to Non-Malleability Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2019/448 (PDF ) Efficient Pseudorandom Correlation Generators: Silent OT Extension and More Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2019/447 (PDF ) Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier
2019/446 (PDF ) Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah
2019/445 (PDF ) Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
2019/444 (PDF ) Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy Gildas Avoine, Sébastien Canard, Loïc Ferreira
2019/443 (PDF ) Contingent payments on a public ledger: models and reductions for automated verification Sergiu Bursuc, Steve Kremer
2019/442 (PDF ) K2SN-MSS: An Efficient Post-Quantum Signature (Full Version) Sabyasachi Karati, Reihaneh Safavi-Naini
2019/441 (PDF ) The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2019/440 (PDF ) Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas Lopez, Mridul Nandi, Yu Sasaki
2019/439 (PDF ) A Comprehensive Study of Deep Learning for Side-Channel Analysis Loïc Masure, Cécile Dumas, Emmanuel Prouff
2019/438 (PDF ) Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti
2019/437 (PDF ) Efficient coding for secure computing with additively-homomorphic encrypted data Thijs Veugen
2019/436 (PDF ) Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework Benjamin Dowling, Paul Rösler, Jörg Schwenk
2019/435 (PDF ) A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope Yue Qin, Chi Cheng, Jintai Ding
2019/434 (PDF ) Masking Fuzzy-Searchable Public Databases Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi
2019/433 (PDF ) Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru
2019/432 (PDF ) Cryptanalysis of a System Based on Twisted Reed-Solomon Codes Julien Lavauzelle, Julian Renner
2019/431 (PDF ) Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation Aurore Guillevic, Simon Masson, Emmanuel Thomé
2019/429 (PDF ) ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh
2019/428 (PDF ) Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur
2019/427 (PDF ) Improved Secure Integer Comparison via Homomorphic Encryption Florian Bourse, Olivier Sanders, Jacques Traoré
2019/426 (PDF ) Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec
2019/425 (PDF ) Homomorphic Training of 30,000 Logistic Regression Models Flavio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt
2019/423 (PDF ) Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name Peter T. Breuer
2019/422 (PDF ) Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound Alexander Moch, Eik List
2019/421 (PDF ) Continuing to reflect on TLS 1.3 with external PSK Liliya Akhmetzyanova, Evgeny Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov
2019/420 (PDF ) Improving Speed of Dilithium’s Signing Procedure Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin
2019/419 (PDF ) Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
2019/418 (PDF ) Sharing of Encrypted files in Blockchain Made Simpler S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan
2019/417 (PDF ) Numerical Method for Comparison on Homomorphically Encrypted Numbers Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun Hee Lee, Keewoo Lee
2019/416 (PDF ) How many transactions per second can bitcoin really handle ? Theoretically. Evangelos Georgiadis
2019/415 (PDF ) Refinement and Verification of CBC Casper Ryuya Nakamura, Takayuki Jimba, Dominik Harz
2019/414 (PDF ) Two-Round Oblivious Transfer from CDH or LPN Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs
2019/413 (PDF ) On the Streaming Indistinguishability of a Random Permutation and a Random Function Itai Dinur
2019/412 (PDF ) On the complexity of the Permuted Kernel Problem Eliane KOUSSA, Gilles MACARIO-RAT, Jacques PATARIN
2019/411 (PDF ) Exploring the Monero Peer-to-Peer Network Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Verissimo
2019/410 (PDF ) Policy-Based Sanitizable Signatures Kai Samelin, Daniel Slamanig
2019/409 (PDF ) Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes Houda Ferradi, Keita Xagawa
2019/408 (PDF ) Forgery Attack on SNEIKEN Mustafa Khairallah
2019/407 (PDF ) Privacy-Preserving Network Path Validation Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng
2019/406 (PDF ) Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
2019/405 (PDF ) A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens
2019/404 (PDF ) Efficient Message Authentication Codes with Combinatorial Group Testing Kazuhiko Minematsu
2019/403 (PDF ) Fast and simple constant-time hashing to the BLS12-381 elliptic curve Riad S. Wahby, Dan Boneh
2019/402 (PDF ) ILC: A Calculus for Composable, Computational Cryptography Kevin Liao, Matthew A. Hammer, Andrew Miller
2019/401 (PDF ) Side-Channel assessment of Open Source Hardware Wallets Manuel San Pedro, Victor Servant, Charles Guillemet
2019/400 (PDF ) Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL Akira Takahashi, Mehdi Tibouchi
2019/399 (PDF ) Inception makes non-malleable codes shorter as well! Divesh Aggarwal, Maciej Obremski
2019/398 (PDF ) Constant-Round Group Key Exchange from the Ring-LWE Assumption Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz
2019/397 (PDF ) Feistel Structures for MPC, and More Martin R. Albrecht, Lorenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
2019/396 (PDF ) Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries Evangelia Anna Markatou, Roberto Tamassia
2019/395 (PDF ) Full Database Reconstruction with Access and Search Pattern Leakage Evangelia Anna Markatou, Roberto Tamassia
2019/394 (PDF ) Masking Dilithium: Efficient Implementation and Side-Channel Evaluation Vincent Migliore, Benoit Gérard, Mehdi Tibouchi, Pierre-Alain Fouque
2019/393 (PDF ) A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence Itay Berman, Iftach Haitner, Eliad Tsfadia
2019/392 (PDF ) New Conditional Cube Attack on Keccak Keyed Modes Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier
2019/391 (PDF ) Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense Biswabandan Panda
2019/390 (PDF ) KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures Michael Specter, Sunoo Park, Matthew Green
2019/389 (PDF ) Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution Sauvik Bhattacharya, Oscar Garcia-Morchon, Rachel Player, Ludo Tolhuizen
2019/388 (PDF ) Towards Secret-Free Security Ulrich Rührmair
2019/387 (PDF ) SoK : On DFA Vulnerabilities of Substitution-Permutation Networks Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin
2019/386 (PDF ) Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt
2019/385 (PDF ) Miller Inversion is Easy for the Reduced Tate Pairing of Embedding Degree Greater than one Takakazu Satoh
2019/384 (PDF ) What Storage Access Privacy is Achievable with Small Overhead? Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2019/383 (PDF ) Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd Mathy Vanhoef, Eyal Ronen
2019/382 (PDF ) Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length Daniel Gardham, Mark Manulis
2019/380 (PDF ) A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit Kazumasa Shinagawa, Koji Nuida
2019/379 (PDF ) Non-Malleable Codes for Decision Trees Marshall Ball, Siyao Guo, Daniel Wichs
2019/378 (PDF ) pRate: Anonymous Star Rating with Rating Secrecy Jia Liu, Mark Manulis
2019/377 (PDF ) Lower Bounds for Oblivious Near-Neighbor Search Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo
2019/376 (PDF ) SELL v1.0: Searchable Encrypted Logging Library Amir Jalali, Neil Davenport
2019/375 (PDF ) Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters Xavier Bultel, Pascal Lafourcade
2019/374 (PDF ) Probability 1 Iterated Differential in the SNEIK Permutation Léo Perrin
2019/373 (PDF ) Lelantus: A New Design for Anonymous and Confidential Cryptocurrencies Aram Jivanyan
2019/372 (PDF ) Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/371 (PDF ) Adding Linkability to Ring Signatures with One-Time Signatures Xueli Wang, Yu Chen, Xuecheng Ma
2019/370 (PDF ) Indifferentiability for Public Key Cryptosystems Mark Zhandry, Cong Zhang
2019/369 (PDF ) On the EA-classes of known APN functions in small dimensions Marco Calderini
2019/368 (PDF ) Strong Post-Compromise Secure Proxy Re-Encryption Alex Davidson, Amit Deo, Ela Lee, Keith Martin
2019/367 (PDF ) SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin
2019/366 (PDF ) Triggerflow: Regression Testing by Advanced Execution Path Inspection Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
2019/365 (PDF ) Fully Secure Attribute-Based Encryption for $t$-CNF from LWE Rotem Tsabary
2019/364 (PDF ) Everybody's a Target: Scalability in Public-Key Encryption Benedikt Auerbach, Federico Giacon, Eike Kiltz
2019/363 (PDF ) Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
2019/362 (PDF ) Game Channels: State Channels for the Gambling Industry with Built-In PRNG Alisa Cherniaeva, Ilia Shirobokov, Alexander Davydov
2019/361 (PDF ) On polynomial secret sharing schemes Anat Paskin-Chernivasky, Artiom Radune
2019/360 (PDF ) SoK: Layer-Two Blockchain Protocols Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais
2019/359 (PDF ) SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
2019/358 (PDF ) One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA Leo Weissbart, Stjepan Picek, Lejla Batina
2019/357 (PDF ) Lattice-based proof of a shuffle Núria Costa, Ramiro Martínez, Paz Morillo
2019/356 (PDF ) Ad Hoc Multi-Input Functional Encryption Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O’Neill, Justin Thaler
2019/355 (PDF ) To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks Anubhab Baksi, Dhiman Saha, Sumanta Sarkar
2019/354 (PDF ) Benchmarking Privacy Preserving Scientific Operations Abdelrahaman Aly, Nigel P. Smart
2019/353 (PDF ) A Faster Constant-time Algorithm of CSIDH keeping Two Points Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi
2019/352 (PDF ) SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, Keisuke Tanaka
2019/351 (PDF ) Forward Secrecy of SPAKE2 Jose Becerra, Dimiter Ostrev, Marjan Skrobot
2019/350 (PDF ) nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski
2019/349 (PDF ) Spin Me Right Round: Rotational Symmetry for FPGA-specific AES Felix Wegener, Lauren De Meyer, Amir Moradi
2019/348 (PDF ) Efficient and Scalable Universal Circuits Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider
2019/347 (PDF ) Selfie: reflections on TLS 1.3 with PSK Nir Drucker, Shay Gueron
2019/346 (PDF ) Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm Christophe Clavier, Leo Reynaud, Antoine Wurcker
2019/345 (PDF ) Second-order Scatter Attack Hugues Thiebeauld, Aurélien Vasselle, Antoine Wurcker
2019/344 (PDF ) Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja
2019/343 (PDF ) Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input Aurelien Vasselle, Antoine Wurcker
2019/342 (PDF ) LightChain: A DHT-based Blockchain for Resource Constrained Environments Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap
2019/341 (PDF ) MixEth: efficient, trustless coin mixing service for Ethereum István András Seres, Dániel A. Nagy, Chris Buckland, Péter Burcsi
2019/340 (PDF ) Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys Antoine Wurcker
2019/339 (PDF ) Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers Yusuke Naito, Takeshi Sugawara
2019/338 (PDF ) Garbled Neural Networks are Practical Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, Nichole Schimanski
2019/337 (PDF ) Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
2019/336 (PDF ) DEEP-FRI: Sampling Outside the Box Improves Soundness Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf
2019/335 (PDF ) Examining the Practical Side Channel Resilience of ARX-boxes Yan Yan, Elisabeth Oswald
2019/334 (PDF ) Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova
2019/333 (PDF ) Key-and-Argument-Updatable QA-NIZKs Helger Lipmaa
2019/332 (PDF ) Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung
2019/331 (PDF ) Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao
2019/330 (PDF ) Practical Supersingular Isogeny Group Key Agreement Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
2019/329 (PDF ) Doubly half-injective PRGs for incompressible white-box cryptography Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels
2019/328 (PDF ) On the Difficulty of Hiding the Balance of Lightning Network Channels Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro
2019/327 (PDF ) Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers Gembu Ito, Tetsu Iwata
2019/326 (PDF ) Shorter Pairing-based Arguments under Standard Assumptions Alonso Gonzalez, Carla Rafols
2019/325 (PDF ) An Efficient Private Evaluation of a Decision Graph Hiroki Sudo, Koji Nuida, Kana Shimizu
2019/324 (PDF ) A Traceable Ring Signature Scheme based on Coding Theory Pedro Branco, Paulo Mateus
2019/323 (PDF ) Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited Sabyasachi Dutta, Kouichi Sakurai
2019/322 (PDF ) A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj
2019/321 (PDF ) Horizontal Collision Correlation Attack on Elliptic Curves Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild
2019/320 (PDF ) Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
2019/319 (PDF ) PGC: Pretty Good Decentralized Confidential Payment System with Auditability Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au
2019/318 (PDF ) Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256 Boyu Ni, Xiaoyang Dong
2019/317 (PDF ) Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song
2019/316 (PDF ) Extended Affine and CCZ Equivalence up to Dimension 4 Marcus Brinkmann
2019/315 (PDF ) Blockchains from Non-Idealized Hash Functions Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
2019/314 (PDF ) Optimal Bounded-Collusion Secure Functional Encryption Prabhanjan Ananth, Vinod Vaikuntanathan
2019/313 (PDF ) A SAT-based approach for index calculus on binary elliptic curves Monika Trimoska, Sorina Ionica, Gilles Dequen
2019/312 (PDF ) Side-Channel Analysis of the TERO PUF Lars Tebelmann, Michael Pehl, Vincent Immler
2019/311 (PDF ) Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering
2019/310 (PDF ) A Formal Approach to Secure Speculation Kevin Cheang, Cameron Rasmussen, Sanjit Seshia, Pramod Subramanyan
2019/309 (PDF ) Cryptanalysis of CLT13 Multilinear Maps with Independent Slots Jean-Sebastien Coron, Luca Notarnicola
2019/308 (PDF ) Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova
2019/307 (PDF ) Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$ Kwang Ho Kim, Sihem Mesnager
2019/306 (PDF ) Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields Madhurima Mukhopadhyay, Palash Sarkar
2019/305 (PDF ) Practical Algebraic Side-Channel Attacks Against ACORN Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier
2019/304 (PDF ) Ternary Syndrome Decoding with Large Weight Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne
2019/303 (PDF ) Analysis of TPL Signature Scheme Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo
2019/302 (PDF ) A Survey of Leakage-Resilient Cryptography Yael Tauman Kalai, Leonid Reyzin
2019/301 (PDF ) Safe Compilation for Encrypted Computing Peter T. Breuer, Simon Pickin
2019/300 (PDF ) Transient Effect Ring Oscillators Leak Too Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer
2019/299 (PDF ) A Generic Construction of Revocable Identity-Based Encryption Xuecheng Ma, Dongdai Lin
2019/298 (PDF ) Improved Classical Cryptanalysis of SIKE in Practice Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia
2019/297 (PDF ) Towards Optimized and Constant-Time CSIDH on Embedded Devices Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
2019/296 (PDF ) Hash functions from superspecial genus-2 curves using Richelot isogenies Wouter Castryck, Thomas Decru, Benjamin Smith
2019/295 (PDF ) Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng
2019/294 (PDF ) Semi-parallel Logistic Regression for GWAS on Encrypted Data Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio
2019/293 (PDF ) Impossibility of Strong KDM Security with Auxiliary Input Cody Freitag, Ilan Komargodski, Rafael Pass
2019/292 (PDF ) Timing attacks on Error Correcting Codes in Post-Quantum Schemes Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede
2019/291 (PDF ) CCA Security and Trapdoor Functions via Key-Dependent-Message Security Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
2019/290 (PDF ) Cost effective techniques for chip delayering and in-situ depackaging Philippe Loubet Moundi
2019/289 (PDF ) Cryptanalysis of ForkAES Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki
2019/288 (PDF ) On the construction of S-boxes using the leaders and followers metaheuristic Alejandro Freyre-Echevarría, Ismel Martínez-Díaz
2019/287 (PDF ) Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields A. N. Alekseychuk, S. M. Koniushok, M. V. Poremskyi
2019/286 (PDF ) Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function Yindong Chen, Fei Guo, Liu Zhang
2019/285 (PDF ) SpaceFlip : Unbound Geometry Cryptography Gideon Samid
2019/284 (PDF ) Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2 Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
2019/283 (PDF ) An Attack on Small Private Keys of RSA Based on Euclidean Algorithm Dimitrios Poulakis
2019/282 (PDF ) A Framework for Cryptographic Problems from Linear Algebra Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
2019/281 (PDF ) Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning Phillipp Schoppmann, Adria Gascon, Mariana Raykova, Benny Pinkas
2019/280 (PDF ) Multi-Authority Attribute-Based Encryption from LWE in the OT Model Sam Kim
2019/279 (PDF ) A Note on Key Agreement and Non-Interactive Commitments Alex Lombardi, Luke Schaeffer
2019/278 (PDF ) Uncovering Algebraic Structures in the MPC Landscape Navneet Agarwal, Sanat Anand, Manoj Prabhakaran
2019/277 (PDF ) On the boomerang uniformity of quadratic permutations Sihem Mesnager, Chunming Tang, Maosheng Xiong
2019/276 (PDF ) BOREALIS: Building Block for Sealed Bid Auctions on Blockchains Erik-Oliver Blass, Florian Kerschbaum
2019/275 (PDF ) MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar
2019/274 (PDF ) Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue Elaine Shi
2019/273 (PDF ) Compressing Vector OLE Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai
2019/272 (PDF ) Quantum Security Analysis of AES Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
2019/271 (PDF ) A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs) Jintai Ding, Chi Cheng, Yue Qin
2019/270 (PDF ) Sync HotStuff: Simple and Practical Synchronous State Machine Replication Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin
2019/269 (PDF ) Digital Signatures for Consensus Sergey Gorbunov, Hoeteck Wee
2019/268 (PDF ) Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys* Sergei Bauer, Martin Brunner, Peter Schartner
2019/267 (PDF ) Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon. Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2019/266 (PDF ) Fast constant-time gcd computation and modular inversion Daniel J. Bernstein, Bo-Yin Yang
2019/265 (PDF ) TEX - A Securely Scalable Trustless Exchange Rami Khalil, Arthur Gervais, Guillaume Felley
2019/264 (PDF ) Unifying computational entropies via Kullback-Leibler divergence Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil Vadhan
2019/263 (PDF ) Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones Jiaping Wang, Hao Wang
2019/262 (PDF ) Revisiting Post-Quantum Fiat-Shamir Qipeng Liu, Mark Zhandry
2019/261 (PDF ) Forward-Secure Multi-Signatures Manu Drijvers, Gregory Neven
2019/260 (PDF ) A Modular Treatment of Blind Signatures from Identification Schemes Eduard Hauck, Eike Kiltz, Julian Loss
2019/259 (PDF ) A Practical Method to Recover Exact Superpoly in Cube Attack SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, TaiRong Shi
2019/258 (PDF ) Tight Time-Memory Trade-offs for Symmetric Encryption Joseph Jaeger, Stefano Tessaro
2019/257 (PDF ) Uncloneable Quantum Encryption via Oracles Anne Broadbent, Sébastien Lord
2019/256 (PDF ) DLCT: A New Tool for Differential-Linear Cryptanalysis Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman
2019/255 (PDF ) Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2019/254 (PDF ) A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick
2019/253 (PDF ) Founding Secure Computation on Blockchains Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
2019/252 (PDF ) Reversible Proofs of Sequential Work Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
2019/251 (PDF ) Consensus through Herding T-H. Hubert Chan, Rafael Pass, Elaine Shi
2019/250 (PDF ) Function-Dependent Commitments from Homomorphic Authenticators Lucas Schabhüser, Denis Butin, Johannes Buchmann
2019/249 (PDF ) Revisiting Variable Output Length XOR Pseudorandom Function Srimanta Bhattacharya, Mridul Nandi
2019/248 (PDF ) Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach Ting Li, Yao Sun
2019/247 (PDF ) Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources Andrea Coladangelo, Alex B. Grilo, Stacey Jeffery, Thomas Vidick
2019/246 (PDF ) Towards optimal robust secret sharing with security against a rushing adversary Serge Fehr, Chen Yuan
2019/245 (PDF ) Distributed Differential Privacy via Shuffling Albert Cheu, Adam Smith, Jonathan Ullman, David Zeber, Maxim Zhilyaev
2019/244 (PDF ) Attacks Only Get Better: How to Break FF3 on Large Domains Viet Tung Hoang, David Miller, Ni Trieu
2019/243 (PDF ) 4-Round Luby-Rackoff Construction is a qPRP: Tight Quantum Security Bound Akinori Hosoyamada, Tetsu Iwata
2019/242 (PDF ) New Constructions of Reusable Designated-Verifier NIZKs Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu
2019/241 (PDF ) Efficient Circuit-based PSI with Linear Communication Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai
2019/240 (PDF ) Correlated-Source Extractors and Cryptography with Correlated-Random Tapes Vipul Goyal, Yifan Song
2019/239 (PDF ) Cheaper Private Set Intersection via Differentially Private Leakage Adam Groce, Peter Rindal, Mike Rosulek
2019/238 (PDF ) Robust Encryption, Extended Rémi Géraud, David Naccache, Răzvan Roşie
2019/237 (PDF ) Optimal Oblivious Priority Queues Zahra Jafargholi, Kasper Green Larsen, Mark Simkin
2019/236 (PDF ) Designated-verifier pseudorandom generators, and their applications Geoffroy Couteau, Dennis Hofheinz
2019/235 (PDF ) Reusable Designated-Verifier NIZKs for all NP from CDH Willy Quach, Ron D. Rothblum, Daniel Wichs
2019/234 (PDF ) On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm Léo Ducas, Maxime Plançon, Benjamin Wesolowski
2019/233 (PDF ) Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption Nuttapong Attrapadung
2019/232 (PDF ) On Quantum Advantage in Information Theoretic Single-Server PIR Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath
2019/231 (PDF ) Secret-Sharing Schemes for General and Uniform Access Structures Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, Naty Peter
2019/230 (PDF ) Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino
2019/229 (PDF ) XOR-counts and lightweight multiplication with fixed elements in binary finite fields Lukas Kölsch
2019/228 (PDF ) Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT Nimrod Aviram, Kai Gellert, Tibor Jager
2019/227 (PDF ) Securing Update Propagation with Homomorphic Hashing Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen Weis
2019/226 (PDF ) Flyclient: Super-Light Clients for Cryptocurrencies Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani
2019/225 (PDF ) Leakage Resilience of the Duplex Construction Christoph Dobraunig, Bart Mennink
2019/224 (PDF ) Compact Adaptively Secure ABE for NC1 from k-Lin Lucas Kowalczyk, Hoeteck Wee
2019/223 (PDF ) Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan
2019/222 (PDF ) (R)CCA Secure Updatable Encryption with Integrity Protection Michael Klooß, Anja Lehmann, Andy Rupp
2019/221 (PDF ) Group Signatures without NIZK: From Lattices in the Standard Model Shuichi Katsumata, Shota Yamada
2019/220 (PDF ) Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen
2019/219 (PDF ) Nitro Protocol Tom Close
2019/218 (PDF ) Computational Limitations in Robust Classification and Win-Win Results Akshay Degwekar, Vinod Vaikuntanathan
2019/217 (PDF ) A family of boolean functions with good cryptographic properties Guillermo Sosa Gómez, Octavio Paez Osuna
2019/216 (PDF ) Round Optimal Secure Multiparty Computation from Minimal Assumptions Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
2019/215 (PDF ) Approx-SVP in Ideal Lattices with Pre-processing Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé
2019/214 (PDF ) Four-Round Secure Multiparty Computation from General Assumptions Michele Ciampi, Rafail Ostrovsky
2019/213 (PDF ) On ELFs, Deterministic Encryption, and Correlated-Input Security Mark Zhandry
2019/212 (PDF ) A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes Hossein Oraei, Massoud Hadian Dehkordi
2019/211 (PDF ) MonZa: Fast Maliciously Secure Two Party Computation on Z_{2^k} Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli
2019/210 (PDF ) CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
2019/209 (PDF ) SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki
2019/208 (PDF ) Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Muzhou Li, Kai Hu, Meiqin Wang
2019/207 (PDF ) MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security Dragos Rotaru, Tim Wood
2019/206 (PDF ) Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald
2019/205 (PDF ) A note on isogeny-based hybrid verifiable delay functions Barak Shani
2019/204 (PDF ) The Security of All Private-key Bits in Isogeny-based Schemes Barak Shani
2019/203 (PDF ) Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures Osman Bicer, Alptekin Kupcu
2019/202 (PDF ) The Distinction Between Fixed and Random Generators in Group-Based Assumptions James Bartusek, Fermi Ma, Mark Zhandry
2019/201 (PDF ) DL-Extractable UC-Commitment Schemes Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
2019/200 (PDF ) Degree 2 is Complete for the Round-Complexity of Malicious MPC Benny Applebaum, Zvika Brakerski, Rotem Tsabary
2019/199 (PDF ) Password-Authenticated Public-Key Encryption Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu
2019/198 (PDF ) Seedless Fruit is the Sweetest: Random Number Generation, Revisited Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro
2019/197 (PDF ) Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions Esteban Landerreche, Marc Stevens, Christian Schaffner
2019/196 (PDF ) Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
2019/195 (PDF ) Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, Changmin Lee
2019/194 (PDF ) Classical zero-knowledge arguments for quantum computations Thomas Vidick, Tina Zhang
2019/193 (PDF ) Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/192 (PDF ) An Omission-Tolerant Cryptographic Checksum Francisco Corella, Karen Lewison
2019/191 (PDF ) Zether: Towards Privacy in a Smart Contract World Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh
2019/190 (PDF ) Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2019/189 (PDF ) An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis Yaoling Ding, An Wang, Siu Ming YIU
2019/188 (PDF ) Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2019/187 (PDF ) Fully homomorphic encryption modulo Fermat numbers Antoine Joux
2019/186 (PDF ) Re-thinking untraceability in the CryptoNote-style blockchain Jiangshan Yu, Man Ho Allen Au, Paulo Esteves-Verissimo
2019/185 (PDF ) Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019/184 (PDF ) Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2019/183 (PDF ) Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm Katherine E. Stange
2019/182 (PDF ) Security is an Architectural Design Constraint Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin
2019/181 (PDF ) Lower Bounds for Leakage-Resilient Secret Sharing Jesper Buus Nielsen, Mark Simkin
2019/180 (PDF ) Disco: Modern Session Encryption David Wong
2019/179 (PDF ) Synchronous, with a Chance of Partition Tolerance Yue Guo, Rafael Pass, Elaine Shi
2019/178 (PDF ) LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness Rohit Sinha, Sivanarayana Gaddam, Ranjit Kumaresan
2019/177 (PDF ) Genus Two Isogeny Cryptography E. V. Flynn, Yan Bo Ti
2019/176 (PDF ) Homomorphic Encryption for Finite Automata Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio
2019/175 (PDF ) The Communication Complexity of Threshold Private Set Intersection Satrajit Ghosh, Mark Simkin
2019/174 (PDF ) Towards an Exponential Lower Bound for Secret Sharing Kasper Green Larsen, Mark Simkin
2019/173 (PDF ) Shorter Quadratic QA-NIZK Proofs Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva
2019/172 (PDF ) Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu
2019/171 (PDF ) XONN: XNOR-based Oblivious Deep Neural Network Inference M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
2019/170 (PDF ) Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong
2019/169 (PDF ) Updatable Anonymous Credentials and Applications to Incentive Systems Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens
2019/168 (PDF ) Profiling Side-channel Analysis in the Efficient Attacker Framework Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley
2019/167 (PDF ) Analysis of Secure Caches using a Three-Step Model for Timing-Based Attacks Shuwen Deng, Wenjie Xiong, Jakub Szefer
2019/166 (PDF ) Verifiable Delay Functions from Supersingular Isogenies and Pairings Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso
2019/165 (PDF ) libInterMAC: Beyond Confidentiality and Integrity in Practice Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson
2019/164 (PDF ) Use your Brain! Arithmetic 3PC For Any Modulus with Active Security Hendrik Eerikson, Marcel Keller, Claudio Orlandi, Pille Pullonen, Joonas Puura, Mark Simkin
2019/163 (PDF ) Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder Melissa Azouaoui, Romain Poussier, François-Xavier Standaert
2019/162 (PDF ) A New Blockchain Proposal Supporting Multi-Stage Proof-of-Work Palash Sarkar
2019/161 (PDF ) Understanding Optimizations and Measuring Performances of PBKDF2 Andrea Francesco Iuorio, Andrea Visconti
2019/160 (PDF ) FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, Ingrid Verbauwhede
2019/159 (PDF ) MPC with Synchronous Security and Asynchronous Responsiveness Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi
2019/158 (PDF ) Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors Chris Peikert, Sina Shiehian
2019/157 (PDF ) Schnorr-based implicit certification: improving the security and efficiency of V2X communications Paulo S. L. M. Barreto, Marcos A. Simplicio Jr., Jefferson E. Ricardini, Harsh Kupwade Patil
2019/156 (PDF ) Efficient Constructions for Almost-everywhere Secure Computation Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas
2019/155 (PDF ) Constant-time BCH Error-Correcting Code Matthew Walters, Sujoy Sinha Roy
2019/154 (PDF ) FastKitten: Practical Smart Contracts on Bitcoin Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi
2019/153 (PDF ) Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren
2019/152 (PDF ) Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon
2019/151 (PDF ) Solving binary MQ with Grover's algorithm Peter Schwabe, Bas Westerbaan
2019/150 (PDF ) QcBits: Constant-Time Small-Key Code-Based Cryptography Tung Chou
2019/149 (PDF ) Improved Lattice-based CCA2-Secure PKE in the Standard Model Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang
2019/148 (PDF ) On the efficiency of pairing-based proofs under the d-PKE Ariel Gabizon
2019/147 (PDF ) Practical Collision Attacks against Round-Reduced SHA-3 Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song
2019/146 (PDF ) Boomerang Connectivity Table Revisited Ling Song, Xianrui Qin, Lei Hu
2019/145 (PDF ) Achieving GWAS with Homomorphic Encryption Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung
2019/144 (PDF ) Modeling Power Efficiency of S-boxes Using Machine Learning Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay
2019/143 (PDF ) Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery Benjamin Hettwer, Stefan Gehrer, Tim Güneysu
2019/142 (PDF ) LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs Matteo Campanelli, Dario Fiore, Anaïs Querol
2019/141 (PDF ) A General Proof Framework for Recent AES Distinguishers Christina Boura, Anne Canteaut, Daniel Coggia
2019/140 (PDF ) CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning Jinhyun So, Basak Guler, A. Salman Avestimehr, Payman Mohassel
2019/139 (PDF ) Vulnerability and Remedy of Stripped Function Logic Locking Hai Zhou, Yuanqi Shen, Amin Rezaei
2019/138 (PDF ) Unifying Leakage Models on a Rényi Day Thomas Prest, Dahmun Goudarzi, Ange Martinelli, Alain Passelègue
2019/137 (PDF ) TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/136 (PDF ) Divisible E-Cash from Constrained Pseudo-Random Functions Florian Bourse, David Pointcheval, Olivier Sanders
2019/135 (PDF ) It wasn't me! Repudiability and Unclaimability of Ring Signatures Sunoo Park, Adam Sealfon
2019/134 (PDF ) Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/133 (PDF ) On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography. Vasyl Ustimenko
2019/132 (PDF ) Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert
2019/131 (PDF ) Secure Evaluation of Quantized Neural Networks Anders Dalskov, Daniel Escudero, Marcel Keller
2019/130 (PDF ) Are Certificate Thumbprints Unique? Greg Zaverucha, Dan Shumow
2019/129 (PDF ) Homomorphic Secret Sharing from Lattices Without FHE Elette Boyle, Lisa Kohl, Peter Scholl
2019/128 (PDF ) Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions Junichi Tomida
2019/127 (PDF ) Beyond Birthday Bound Secure MAC in Faulty Nonce Model Avijit Dutta, Mridul Nandi, Suprita Talnikar
2019/126 (PDF ) New Automatic search method for Truncated-differential characteristics: Application to Midori, SKINNY and CRAFT AmirHossein E. Moghaddam, Zahra Ahmadian
2019/124 (PDF ) Anomalous Look at Provable Security Douglas Wikström
2019/123 (PDF ) Security of Multilinear Galois Mode (MGM) Liliya Akhmetzyanova, Evgeny Alekseev, Grigory Karpunin, Vladislav Nozdrunov
2019/122 (PDF ) Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry
2019/121 (PDF ) Anonymous Attestation for IoT Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry
2019/120 (PDF ) Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019 Keita Xagawa
2019/119 (PDF ) On the security of the BCTV Pinocchio zk-SNARK variant Ariel Gabizon
2019/117 (PDF ) Non-Interactive Keyed-Verification Anonymous Credentials Geoffroy Couteau, Michael Reichle
2019/116 (PDF ) Multi-Key Homomophic Encryption from TFHE Hao Chen, Ilaria Chillotti, Yongsoo Song
2019/115 (PDF ) Distributional Collision Resistance Beyond One-Way Functions Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev
2019/114 (PDF ) Fast Multiparty Threshold ECDSA with Fast Trustless Setup Rosario Gennaro, Steven Goldfeder
2019/113 (PDF ) Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure Ferucio Laurentiu Tiplea, Cristian Hristea
2019/112 (PDF ) Variable Elimination - a Tool for Algebraic Cryptanalysis Bjørn Greve, Øyvind Ytrehus, Håvard Raddum
2019/111 (PDF ) On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials Yin Li, Shantanu Sharma, Yu Zhang, Xingpo Ma, Chuanda Qi
2019/110 (PDF ) Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
2019/109 (PDF ) Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2019/108 (PDF ) Minicrypt Primitives with Algebraic Structure and Applications Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy
2019/107 (PDF ) Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu
2019/106 (PDF ) Identity-Based Higncryption Hongbing Wang, Yunlei Zhao
2019/105 (PDF ) Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate Antonio Faonio, Daniele Venturi
2019/104 (PDF ) BADGER - Blockchain Auditable Distributed (RSA) key GEneRation Naomi Farley, Robert Fitzpatrick, Duncan Jones
2019/103 (PDF ) Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE Samuel Jaques, John M. Schanck
2019/102 (PDF ) Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum Hisham S. Galal, Amr M. Youssef
2019/101 (PDF ) Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramon Troncoso-Pastoriza
2019/100 (PDF ) Power Analysis on NTRU Prime Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang
2019/099 (PDF ) Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn
2019/098 (PDF ) A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions Pedro Branco
2019/097 (PDF ) Linearly equivalent S-boxes and the Division Property Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin
2019/096 (PDF ) On Recovering Affine Encodings in White-Box Implementations Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud
2019/095 (PDF ) Variants of the AES Key Schedule for Better Truncated Differential Bounds Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin
2019/094 (PDF ) CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges Aron Gohr, Sven Jacob, Werner Schindler
2019/092 (PDF ) Partitions in the S-Box of Streebog and Kuznyechik Léo Perrin
2019/091 (PDF ) Efficient Zero-Knowledge for NP from Secure Two-Party Computation Li Hongda, Pan Dongxue, Ni Peifang
2019/090 (PDF ) Round5: Compact and Fast Post-Quantum Public-Key Encryption Hayo Baan, Sauvik Bhattacharya, Scott Fluhrer, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
2019/089 (PDF ) The General Sieve Kernel and New Records in Lattice Reduction Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens
2019/088 (PDF ) Continuous Key Agreement with Reduced Bandwidth Nir Drucker, Shay Gueron
2019/087 (PDF ) The Secure Link Prediction Problem Laltu Sardar, Sushmita Ruj
2019/086 (PDF ) Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG George Teseleanu
2019/085 (PDF ) The Lattice-Based Digital Signature Scheme qTESLA Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Kramer, Patrick Longa, Jefferson E. Ricardini
2019/084 (PDF ) An Information Obfuscation Calculus for Encrypted Computing Peter T. Breuer
2019/083 (PDF ) Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 Zhen Liu, Yanbin Pan, Zhenfei Zhang
2019/082 (PDF ) Arithmetic Garbling from Bilinear Maps Nils Fleischhacker, Giulio Malavolta, Dominique Schröder
2019/081 (PDF ) Practical Group-Signatures with Privacy-Friendly Openings Stephan Krenn, Kai Samelin, Christoph Striecks
2019/080 (PDF ) Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing Aner Ben Efraim, Michael Nielsen, Eran Omri
2019/079 (PDF ) New Results about the Boomerang Uniformity of Permutation Polynomials Kangquan Li, Longjiang Qu, Bing Sun, Chao Li
2019/078 (PDF ) Testing the Randomness of Cryptographic Function Mappings Alan Kaminsky
2019/077 (PDF ) Pairing Implementation Revisited Michael Scott
2019/076 (PDF ) Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations Matthieu Rivain, Junwei Wang
2019/075 (PDF ) Assessment of the Key-Reuse Resilience of NewHope Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
2019/074 (PDF ) Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu
2019/073 (PDF ) Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model Cristian Hristea, Ferucio Laurentiu Tiplea
2019/072 (PDF ) ZeroCT: Improving ZeroCoin with Confidential Transactions and more Alex Vazquez
2019/071 (PDF ) Repeatable Oblivious Shuffling of Large Outsourced Data Blocks Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong
2019/070 (PDF ) Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt
2019/069 (PDF ) Quantum Indistinguishability of Random Sponges Jan Czajkowski, Andreas Hülsing, Christian Schaffner
2019/068 (PDF ) Sampling the Integers with Low Relative Error Michael Walter
2019/067 (PDF ) Managing Your Kleptographic Subscription Plan George Teseleanu
2019/066 (PDF ) Publicly Verifiable Proofs from Blockchains Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2019/065 (PDF ) Multi-Protocol UC and its Use for Building Modular and Efficient Protocols Jan Camenisch, Manu Drijvers, Björn Tackmann
2019/064 (PDF ) A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management Keita Emura, Takuya Hayashi
2019/063 (PDF ) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov
2019/062 (PDF ) Additively Homomorphic IBE from Higher Residuosity Michael Clear, Ciaran McGoldrick
2019/061 (PDF ) SigAttack: New High-level SAT-based Attack on Logic Encryptions Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou
2019/060 (PDF ) CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou
2019/059 (PDF ) BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou
2019/058 (PDF ) Tightly secure hierarchical identity-based encryption Roman Langrehr, Jiaxin Pan
2019/057 (PDF ) Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
2019/056 (PDF ) Obfuscating simple functionalities from knowledge assumptions Ward Beullens, Hoeteck Wee
2019/055 (PDF ) Rate-Optimizing Compilers for Continuously Non-Malleable Codes Sandro Coretti, Antonio Faonio, Daniele Venturi
2019/054 (PDF ) Deep Learning to Evaluate Secure RSA Implementations Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, Francois Dassance, Guillaume Dufresne, Cecile Dumas, Emmanuel Prouff, Alexandre Venelli
2019/052 (PDF ) Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/051 (PDF ) Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu
2019/050 (PDF ) Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
2019/049 (PDF ) The Relationship between the Construction and Solution of the MILP Models and Applications Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang
2019/048 (PDF ) Sub-logarithmic Distributed Oblivious RAM with Small Block Size Eyal Kushilevitz, Tamer Mour
2019/047 (PDF ) NIST Post-Quantum Cryptography- A Hardware Evaluation Study Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri
2019/046 (PDF ) Block-Anti-Circulant Unbalanced Oil and Vinegar Alan Szepieniec, Bart Preneel
2019/045 (PDF ) Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio Ryo Nishimaki, Takashi Yamakawa
2019/044 (PDF ) Toha Key Hardened Function Ahmad Almorabea
2019/043 (PDF ) A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke Qian Guo, Thomas Johansson, Alexander Nilsson
2019/042 (PDF ) Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs Lisa Kohl
2019/041 (PDF ) Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher Bartosz Zoltak
2019/040 (PDF ) NTTRU: Truly Fast NTRU Using NTT Vadim Lyubashevsky, Gregor Seiler
2019/039 (PDF ) Fully Invisible Protean Signatures Schemes Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2019/038 (PDF ) Identity-based Broadcast Encryption with Efficient Revocation Aijun Ge, Puwen Wei
2019/037 (PDF ) Improving Attacks on Round-Reduced Speck32/64 using Deep Learning Aron Gohr
2019/036 (PDF ) Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR Shuichi Katsumata, Shota Yamada
2019/035 (PDF ) Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ Carsten Baum, Daniele Cozzo, Nigel P. Smart
2019/034 (PDF ) A Formal Treatment of Hardware Wallets Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias
2019/033 (PDF ) FE for Inner Products and Its Application to Decentralized ABE Zhedong Wang, Xiong Fan, Feng-Hao Liu
2019/032 (PDF ) Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation Steven Galbraith, Jake Massimo, Kenneth G. Paterson
2019/031 (PDF ) Collusion Resistant Broadcast and Trace from Positional Witness Encryption Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
2019/028 (PDF ) nQUIC: Noise-Based QUIC Packet Protection Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator
2019/027 (PDF ) Group Signatures with Selective Linkability Lydia Garms, Anja Lehmann
2019/026 (PDF ) Non-malleable encryption with proofs of plaintext knowledge and applications to voting Ben Smyth, Yoshikazu Hanatani
2019/025 (PDF ) STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang
2019/024 (PDF ) A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou, Shu-Mei Hsu
2019/023 (PDF ) Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Joachim Breitner, Nadia Heninger
2019/022 (PDF ) The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl
2019/021 (PDF ) CryptoNote+ Ilya Aldanov
2019/020 (PDF ) Decentralizing Inner-Product Functional Encryption Michel Abdalla, Fabrice Benhamouda, Markulf Kolhweiss, Hendrik Waldner
2019/019 (PDF ) Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang
2019/018 (PDF ) Generic Constructions of Robustly Reusable Fuzzy Extractor Yunhua Wen, Shengli Liu, Dawu Gu
2019/017 (PDF ) CHURP: Dynamic-Committee Proactive Secret Sharing Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song
2019/016 (PDF ) Fast Message Franking: From Invisible Salamanders to Encryptment Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage
2019/015 (PDF ) More Efficient Algorithms for the NTRU Key Generation using the Field Norm Thomas Pornin, Thomas Prest
2019/014 (PDF ) BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan
2019/013 (PDF ) The Science of Guessing in Collision Optimized Divide-and-Conquer Attacks Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
2019/012 (PDF ) A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$ Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee
2019/011 (PDF ) Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2019/010 (PDF ) Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC Rodrigo Abarzúa, Claudio Valencia, Julio López
2019/009 (PDF ) On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
2019/008 (PDF ) One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren
2019/007 (PDF ) Tight Security Bounds for Generic Stream Cipher Constructions Matthias Hamann, Matthias Krause
2019/006 (PDF ) Minimizing Trust in Hardware Wallets with Two Factor Signatures Antonio Marcedone, Rafael Pass, abhi shelat
2019/005 (PDF ) ScanSAT: Unlocking Obfuscated Scan Chains Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu
2019/004 (PDF ) On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le
2019/002 (PDF ) Leakage-Resilient Group Signature: Definitions and Constructions Jianye Huang, Qiong Huang
2019/001 (PDF ) Sanctorum: A lightweight security monitor for secure enclaves Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas
2018/1251 (PDF ) Accountable Tracing Signatures from Lattices San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2018/1250 (PDF ) Function Private Predicate Encryption for Low Min-Entropy Predicates Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna
2018/1249 (PDF ) Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations NingBo Li, TanPing Zhou, XiaoYuan Yang, YiLiang Han, Longfei Liu, WenChao Liu
2018/1248 (PDF ) Fiat-Shamir: From Practice to Theory, Part II (NIZK and Correlation Intractability from Circular-Secure FHE) Ran Canetti, Alex Lombardi, Daniel Wichs
2018/1247 (PDF ) qSCMS: Post-quantum certificate provisioning process for V2X Paulo S. L. M. Barreto, Jefferson E. Ricardini, Marcos A. Simplicio Jr., Harsh Kupwade Patil
2018/1246 (PDF ) Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution Dat Le Tien, Frank Eliassen
2018/1245 (PDF ) Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics Jung Hee Cheon, Andrey Kim, Donggeon Yhee
2018/1244 (PDF ) Fully Deniable Interactive Encryption Ran Canetti, Sunoo Park, Oxana Poburinnaya
2018/1242 (PDF ) Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions Nicolas T. Courtois
2018/1241 (PDF ) Universally Composable Accumulators Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov
2018/1239 (PDF ) Proof-of-Stake Sidechains Peter Gaži, Aggelos Kiayias, Dionysis Zindros
2018/1238 (PDF ) Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi
2018/1237 (PDF ) Sum-of-Squares Meets Program Obfuscation, Revisited Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai
2018/1236 (PDF ) Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks Mark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
2018/1235 (PDF ) Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich
2018/1234 (PDF ) FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
2018/1233 (PDF ) Key Assignment Scheme with Authenticated Encryption Suyash Kandele, Souradyuti Paul
2018/1232 (PDF ) Certificate Transparency Using Blockchain D S V Madala, Mahabir Prasad Jhanwar, Anupam Chattopadhyay
2018/1231 (PDF ) Post-quantum verifiable random functions from ring signatures Endre Abraham
2018/1230 (PDF ) Pooled Mining Makes Selfish Mining Tricky Suhyeon Lee, Seungjoo Kim
2018/1229 (PDF ) On Some Computational Problems in Local Fields Yingpu Deng, Lixia Luo, Guanju Xiao
2018/1227 (PDF ) Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation Louis Cianciullo, Hossein Ghodosi
2018/1226 (PDF ) Boolean Exponent Splitting Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos
2018/1225 (PDF ) XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen
2018/1224 (PDF ) Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups Essam Ghadafi
2018/1223 (PDF ) Error Amplification in Code-based Cryptography Alexander Nilsson, Thomas Johansson, Paul Stankovski Wagner
2018/1222 (PDF ) Implementing Token-Based Obfuscation under (Ring) LWE Cheng Chen, Nicholas Genise, Daniele Micciancio, Yuriy Polyakov, Kurt Rohloff
2018/1221 (PDF ) Using the Cloud to Determine Key Strengths -- Triennial Update M. Delcourt, T. Kleinjung, A. K. Lenstra, S. Nath, D. Page, N. Smart
2018/1220 (PDF ) Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi
2018/1219 (PDF ) Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property Tomer Ashur, Raluca Posteuca
2018/1218 (PDF ) Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu
2018/1217 (PDF ) Changing Points in APN Functions Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay Kaleyski
2018/1216 (PDF ) This is Not an Attack on Wave Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2018/1215 (PDF ) New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves Suhri Kim, Kisoon Yoon, Jihoon Kwon, Young-Ho Park, Seokhie Hong
2018/1214 (PDF ) Instant Privacy-Preserving Biometric Authentication for Hamming Distance Joohee Lee, Dongwoo Kim, Duhyeong Kim, Yongsoo Song, Junbum Shin, Jung Hee Cheon
2018/1213 (PDF ) Deep Learning vs Template Attacks in front of fundamental targets: experimental study Yevhenii ZOTKIN, Francis OLIVIER, Eric BOURBAO
2018/1212 (PDF ) Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols Itai Dinur, Niv Nadler
2018/1211 (PDF ) Countering Block Withholding Attack Effciently Suhyeon Lee, Seungjoo Kim
2018/1210 (PDF ) MProve: A Proof of Reserves Protocol for Monero Exchanges Arijit Dutta, Saravanan Vijayakumaran
2018/1209 (PDF ) Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security Min Liang
2018/1208 (PDF ) Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications Jun Xu, Santanu Sarkar, Lei Hu
2018/1207 (PDF ) On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders Nicolas Sendrier, Valentin Vasseur
2018/1206 (PDF ) ARPA Whitepaper Derek Zhang, Alex Su, Felix Xu, Jiang Chen
2018/1205 (PDF ) Cryptanalysis of a code-based one-time signature Jean-Christophe Deneuville, Philippe Gaborit
2018/1204 (PDF ) The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing Antonis Michalas
2018/1203 (PDF ) DAGS: Reloaded Revisiting Dyadic Key Encapsulation Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
2018/1202 (PDF ) AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Kwonho Jeong, Hyunok Oh
2018/1201 (PDF ) Subversion in Practice: How to Efficiently Undermine Signatures Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow
2018/1200 (PDF ) On a Rank-Metric Code-Based Cryptosystem with Small Key Size Julian Renner, Sven Puchinger, Antonia Wachter-Zeh
2018/1199 (PDF ) Quantum Equivalence of the DLP and CDHP for Group Actions Steven Galbraith, Lorenz Panny, Benjamin Smith, Frederik Vercauteren
2018/1198 (PDF ) On Lions and Elligators: An efficient constant-time implementation of CSIDH Michael Meyer, Fabio Campos, Steffen Reith
2018/1197 (PDF ) Automated software protection for the masses against side-channel attacks NICOLAS BELLEVILLE, DAMIEN COUROUSSÉ, KARINE HEYDEMANN, HENRI-PIERRE CHARLES
2018/1196 (PDF ) Gradient Visualization for General Characterization in Profiling Attacks Loïc Masure, Cécile Dumas, Emmanuel Prouff
2018/1195 (PDF ) M&M: Masks and Macs against Physical Attacks Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/1194 (PDF ) On Degree-d Zero-Sum Sets of Full Rank Christof Beierle, Alex Biryukov, Aleksei Udovenko
2018/1193 (PDF ) Quantum Chosen-Ciphertext Attacks against Feistel Ciphers Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata
2018/1192 (PDF ) Durandal: a rank metric based signature scheme Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor
2018/1191 (PDF ) Cryptanalysis of 2-round KECCAK-384 Rajendra Kumar, Nikhil Mittal, Shashank Singh
2018/1190 (PDF ) Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle) Sanjit Chatterjee, Sayantan Mukherjee
2018/1189 (PDF ) The Role of the Adversary Model in Applied Security Research Quang Do, Ben Martini, Kim-Kwang Raymond Choo
2018/1188 (PDF ) Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains Dan Boneh, Benedikt Bünz, Ben Fisch
2018/1187 (PDF ) Automatic Search for A Variant of Division Property Using Three Subsets (Full Version) Kai Hu, Meiqin Wang
2018/1186 (PDF ) MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
2018/1185 (PDF ) On Quantum Chosen-Ciphertext Attacks and Learning with Errors Gorjan Alagic, Stacey Jeffery, Maris Ozols, Alexander Poremba
2018/1184 (PDF ) Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity Nasser Alsalami, Bingsheng Zhang
2018/1183 (PDF ) Lossy Trapdoor Permutations with Improved Lossiness Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen
2018/1181 (PDF ) Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendoerfer
2018/1180 (PDF ) Lattice-Based Signature from Key Consensus Leixiao Cheng, Boru Gong, Yunlei Zhao
2018/1179 (PDF ) Elliptic Curves in Generalized Huff's Model Ronal Pranil Chand, Maheswara Rao Valluri
2018/1178 (PDF ) Pseudo-Free Families of Computational Universal Algebras Mikhail Anokhin
2018/1177 (PDF ) Excalibur Key-Generation Protocols For DAG Hierarchic Decryption Louis Goubin, Geraldine Monsalve, Juan Reutter, Francisco Vial Prado
2018/1176 (PDF ) Downgradable Identity-based Encryption and Applications Olivier Blazy, Paul Germouty, Duong Hieu Phan
2018/1175 (PDF ) New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, Altaf Shaik
2018/1174 (PDF ) A Comparison of NTRU Variants John M. Schanck
2018/1173 (PDF ) The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom
2018/1172 (PDF ) The impact of error dependencies on Ring/Mod-LWE/LWR based schemes Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
2018/1171 (PDF ) PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang
2018/1170 (PDF ) Toward RSA-OAEP without Random Oracles Nairen Cao, Adam O'Neill, Mohammad Zaheri
2018/1169 (PDF ) Placing Conditional Disclosure of Secrets in the Communication Complexity Universe Benny Applebaum, Prashant Nalini Vasudevan
2018/1168 (PDF ) Result Pattern Hiding Searchable Encryption for Conjunctive Queries Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shi-Feng Sun, Dongxi Liu, Cong Zuo
2018/1167 (PDF ) On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan
2018/1166 (PDF ) Keeping Time-Release Secrets through Smart Contracts Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang
2018/1165 (PDF ) Identity-Concealed Authenticated Encryption and Key Exchange Yunlei Zhao
2018/1164 (PDF ) Can you sign a quantum state Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2018/1163 (PDF ) More on sliding right Joachim Breitner
2018/1162 (PDF ) On the Concrete Security of Goldreich’s Pseudorandom Generator Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
2018/1161 (PDF ) Adaptively Secure MPC with Sublinear Communication Complexity Ran Cohen, abhi shelat, Daniel Wichs
2018/1160 (PDF ) Algebraic normal form of a bent function: properties and restrictions Natalia Tokareva
2018/1159 (PDF ) Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions Sihem Mesnager, Kwang Ho Kim, Myong Song Jo
2018/1158 (PDF ) Adversarially Robust Property Preserving Hash Functions Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan
2018/1157 (PDF ) Special Soundness Revisited Douglas Wikström
2018/1156 (PDF ) Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park
2018/1155 (PDF ) Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
2018/1154 (PDF ) Leakage Resilient Secret Sharing and Applications Akshayaram Srinivasan, Prashant Nalini Vasudevan
2018/1153 (PDF ) Dfinity Consensus, Explored Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren
2018/1152 (PDF ) Improvements of Blockchain’s Block Broadcasting:An Incentive Approach Qingzhao Zhang, Yijun Leng, Lei Fan
2018/1151 (PDF ) Analysis Of The Simulatability Of An Oblivious Transfer Bing Zeng
2018/1150 (PDF ) Quantum-secure message authentication via blind-unforgeability Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song
2018/1149 (PDF ) Compressive Sensing based Leakage Sampling and Reconstruction: A First Study Changhai Ou, Chengju Zhou, Siew-Kei Lam
2018/1148 (PDF ) Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak
2018/1147 (PDF ) Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures Divesh Aggarwal, Ivan Damgard, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, Joao Ribeiro, Mark Simkin
2018/1145 (PDF ) Privacy Computing: Concept, Computing Framework And Future Development Trends Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
2018/1144 (PDF ) Revisiting Non-Malleable Secret Sharing Saikrishna Badrinarayanan, Akshayaram Srinivasan
2018/1143 (PDF ) A new SNOW stream cipher called SNOW-V Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
2018/1142 (PDF ) Factoring Products of Braids via Garside Normal Form Simon-Philipp Merz, Christophe Petit
2018/1141 (PDF ) Fast Authentication from Aggregate Signatures with Improved Security Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
2018/1140 (PDF ) Efficient Fully-Leakage Resilient One-More Signature Schemes Antonio Faonio
2018/1139 (PDF ) Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications Kexin Hu, Zhenfeng Zhang, Kaiven Guo
2018/1138 (PDF ) Leakage-Resilient Secret Sharing Ashutosh Kumar, Raghu Meka, Amit Sahai
2018/1137 (PDF ) Genus 2 curves with given split Jacobian Jasper Scholten
2018/1136 (PDF ) A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
2018/1135 (PDF ) PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains Sébastien Andreina, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li, Giorgia Azzurra Marson
2018/1134 (PDF ) Echoes of the Past: Recovering Blockchain Metrics From Merged Mining Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl
2018/1133 (PDF ) A Public Key Exchange Cryptosystem Based on Ideal Secrecy Vamshi Krishna Kammadanam, Virendra R. Sule, Yi Hong
2018/1132 (PDF ) Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake Thomas Kerber, Markulf Kohlweiss, Aggelos Kiayias, Vassilis Zikas
2018/1131 (PDF ) A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan
2018/1130 (PDF ) A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF Ashwin Jha, Mridul Nandi
2018/1129 (PDF ) On Kilian's Randomization of Multilinear Map Encodings Jean-Sebastien Coron, Hilder V. L. Pereira
2018/1128 (PDF ) Direct Anonymous Attestation with Optimal TPM Signing Efficiency Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi
2018/1127 (PDF ) Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks P. Arun Babu, Jithin Jose Thomas
2018/1126 (PDF ) Lightweight AE and HASH in a Single Round Function Dingfeng Ye, Danping Shi, Peng Wang
2018/1125 (PDF ) Verifying liquidity of Bitcoin contracts Massimo Bartoletti, Roberto Zunino
2018/1124 (PDF ) Secure Opportunistic Multipath Key Exchange Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu
2018/1123 (PDF ) When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis Stjepan Picek, Annelie Heuser, Lichao Wu, Cesare Alippi, Francesco Regazzoni
2018/1122 (PDF ) Improved Quantum Multicollision-Finding Algorithm Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa
2018/1121 (PDF ) An Analysis of the ProtonMail Cryptographic Architecture Nadim Kobeissi
2018/1120 (PDF ) Organizational Cryptography for Access Control Masahito Gotaishi, Shigeo Tsujii
2018/1119 (PDF ) Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition Matthias Fitzi, Peter Ga{ž}i, Aggelos Kiayias, Alexander Russell
2018/1118 (PDF ) Non-Interactive Non-Malleability from Quantum Supremacy Yael Tauman Kalai, Dakshita Khurana
2018/1117 (PDF ) A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness Felix Wegener, Amir Moradi
2018/1116 (PDF ) Fly, you fool! Faster Frodo for the ARM Cortex-M4 Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
2018/1115 (PDF ) Group Signature without Random Oracles from Randomizable Signatures Remi Clarisse, Olivier Sanders
2018/1114 (PDF ) Lightweight Circuits with Shift and Swap Subhadeep Banik, Francesco Regazzoni, Serge Vaudenay
2018/1113 (PDF ) Private Function Evaluation with Cards Alexander Koch, Stefan Walzer
2018/1112 (PDF ) DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm Tai-Yuan Chen, Wei-Ning Huang, Po-Chun Kuo, Hao Chung, Tzu-Wei Chao
2018/1110 (PDF ) Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies Dominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
2018/1109 (PDF ) Faster SeaSign signatures through improved rejection sampling Thomas Decru, Lorenz Panny, Frederik Vercauteren
2018/1108 (PDF ) Covert Security with Public Verifiability: Faster, Leaner, and Simpler Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, Xiao Wang
2018/1107 (PDF ) Further observations on SIMON and SPECK families of block ciphers S. M. Dehnavi
2018/1106 (PDF ) P4TC—Provably-Secure yet Practical Privacy-Preserving Toll Collection Valerie Fetzer, Max Hoffmann, Matthias Nagel, Andy Rupp, Rebecca Schwerdt
2018/1105 (PDF ) Proof-of-Stake Protocols for Privacy-Aware Blockchains Chaya Ganesh, Claudio Orlandi, Daniel Tschudi
2018/1104 (PDF ) Tropical cryptography II: extensions by homomorphisms Dima Grigoriev, Vladimir Shpilrain
2018/1103 (PDF ) Some Properties of Modular Addition Victoria Vysotskaya
2018/1102 (PDF ) A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi
2018/1101 (PDF ) Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments Lunzhi Deng
2018/1100 (PDF ) Correction to "Improving the DGK comparison protocol" Thijs Veugen
2018/1099 (PDF ) SoK: Modular and Efficient Private Decision Tree Evaluation Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider
2018/1098 (PDF ) MARVELlous: a STARK-Friendly Family of Cryptographic Primitives Tomer Ashur, Siemen Dhooghe
2018/1097 (PDF ) End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability Michael Schliep, Nicholas Hopper
2018/1096 (PDF ) On Finding Quantum Multi-collisions Qipeng Liu, Mark Zhandry
2018/1095 (PDF ) Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security Wen-Ran Zhang
2018/1094 (PDF ) Match Me if You Can: Matchmaking Encryption and its Applications Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi
2018/1093 (PDF ) Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
2018/1092 (PDF ) Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak Felix Wegener, Christian Baiker, Amir Moradi
2018/1091 (PDF ) Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/1090 (PDF ) Plaintext Recovery Attack of OCB2 Tetsu Iwata
2018/1089 (PDF ) On the impact of decryption failures on the security of LWE/LWR based schemes Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
2018/1088 (PDF ) High-speed Side-channel-protected Encryption and Authentication in Hardware Nele Mentens, Vojtech Miskovsky, Martin Novotny, Jo Vliegen
2018/1087 (PDF ) Breaking the confidentiality of OCB2 Bertram Poettering
2018/1086 (PDF ) Two Party Distribution Testing: Communication and Security Alexandr Andoni, Tal Malkin, Negev Shekel Nosatzki
2018/1085 (PDF ) Exact maximum expected differential and linear probability for 2-round Kuznyechik Vitaly Kiryukhin
2018/1084 (PDF ) A Deep Dive into Blockchain Selfish Mining Qianlan Bai, Xinyan Zhou, Xing Wang, Yuedong Xu, Xin Wang, Qingsheng Kong
2018/1083 (PDF ) Private Stateful Information Retrieval Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2018/1082 (PDF ) An Algebraic Method to Recover Superpolies in Cube Attacks Chen-Dong Ye, Tian Tian
2018/1081 (PDF ) Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, Changmin Lee
2018/1080 (PDF ) How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation Yiwen Gao, Yongbin Zhou, Wei Cheng
2018/1079 (PDF ) Analysis of Deterministic Longest-Chain Protocols Elaine Shi
2018/1078 (PDF ) Two Round Information-Theoretic MPC with Malicious Security Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2018/1077 (PDF ) More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers Hart Montgomery
2018/1076 (PDF ) Game Theoretic Notions of Fairness in Multi-Party Coin Toss Kai-Min Chung, Yue Guo, Wei-Kai Lin, Rafael Pass, Elaine Shi
2018/1074 (PDF ) Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication Felix Wegener, Amir Moradi
2018/1073 (PDF ) Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping Jung Hee Cheon, Kyoohyung Han, Minki Hhan
2018/1072 (PDF ) Construction of MDS Matrices from Generalized Feistel Structures Mahdi Sajadieh, Mohsen Mousavi
2018/1071 (PDF ) CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2018/1070 (PDF ) A New Batch FHE Scheme over the Integers Kwak Wi Song, Kim Chol Un
2018/1069 (PDF ) Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering Eshan Chattopadhyay, Xin Li
2018/1068 (PDF ) Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
2018/1067 (PDF ) On Quantum Slide Attacks Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
2018/1066 (PDF ) Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness Akinori Hosoyamada, Takashi Yamakawa
2018/1065 (PDF ) Homomorphic Secret Sharing for Low Degree Polynomials Russell W. F. Lai, Giulio Malavolta, Dominique Schröder
2018/1064 (PDF ) Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction Nithyashankari Gummidipoondi Jayasankaran, Adriana Sanabria Borbon, Edgar Sanchez-Sinencio, Jiang Hu, Jeyavijayan Rajendran
2018/1063 (PDF ) Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset Mashael AlSabah, Gabriele Oligeri, Ryan Riley
2018/1062 (PDF ) DAGsim: Simulation of DAG-based distributed ledger protocols Manuel Zander, Tom Waite, Dominik Harz
2018/1061 (PDF ) On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks Behnam Zahednejad, Majid Bayat, Ashok Kumar Das
2018/1060 (PDF ) Port Contention for Fun and Profit Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, Nicola Tuveri
2018/1059 (PDF ) Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny
2018/1058 (PDF ) Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
2018/1057 (PDF ) Limiting the impact of unreliable randomness in deployed security protocols Liliya Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav V. Smyshlyaev, Nick Sullivan
2018/1056 (PDF ) Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar
2018/1055 (PDF ) Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation Pan Dongxue, Li Hongda, Ni Peifang
2018/1054 (PDF ) Efficient Multi-key FHE with short extended ciphertexts and less public parameters Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Yiliang Han, Wenchao Liu
2018/1053 (PDF ) Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation Jothi Rangasamy, Lakshmi Kuppusamy
2018/1052 (PDF ) Verifiability Analysis of CHVote David Bernhard, Véronique Cortier, Pierrick Gaudry, Mathieu Turuani, Bogdan Warinschi
2018/1051 (PDF ) Lower Bounds for Differentially Private RAMs Giuseppe Persiano, Kevin Yeo
2018/1050 (PDF ) Towards Automatically Penalizing Multimedia Breaches Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate
2018/1049 (PDF ) Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol Aggelos Kiayias, Alexander Russell
2018/1048 (PDF ) Proof-of-Work Sidechains Aggelos Kiayias, Dionysis Zindros
2018/1047 (PDF ) On the Linear Transformation in White-box Cryptography Seungkwang Lee, Nam-su Jho, Myungchul Kim
2018/1046 (PDF ) Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$ Claude Carlet, Xi Chen, Longjiang Qu
2018/1045 (PDF ) MPC Joins the Dark Side John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2018/1044 (PDF ) Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions Masahito Ishizaka, Kanta Matsuura
2018/1043 (PDF ) Improved Bootstrapping for Approximate Homomorphic Encryption Hao Chen, Ilaria Chillotti, Yongsoo Song
2018/1042 (PDF ) Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger
2018/1041 (PDF ) Secure Outsourced Matrix Computation and Application to Neural Networks Xiaoqian Jiang, Miran Kim, Kristin Lauter, Yongsoo Song
2018/1040 (PDF ) Cryptanalysis of OCB2 Akiko Inoue, Kazuhiko Minematsu
2018/1039 (PDF ) Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble Georg Fuchsbauer, Michele Orrù, Yannick Seurin
2018/1038 (PDF ) On inversion modulo pseudo-Mersenne primes Michael Scott
2018/1037 (PDF ) The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol Joël Alwen, Sandro Coretti, Yevgeniy Dodis
2018/1036 (PDF ) If a Generalised Butterfly is APN then it Operates on 6 Bits Anne Canteaut, Léo Perrin, Shizhu Tian
2018/1035 (PDF ) Relating different Polynomial-LWE problems Madalina Bolboceanu
2018/1034 (PDF ) Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui
2018/1033 (PDF ) One-Round Authenticated Group Key Exchange from Isogenies Atsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama
2018/1032 (PDF ) Conditionals in Homomorphic Encryption and Machine Learning Applications Diego Chialva, Ann Dooms
2018/1031 (PDF ) Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking Roderick Bloem, Rinat Iusupov, Martin Krenn, Stefan Mangard
2018/1030 (PDF ) Registration-Based Encryption from Standard Assumptions Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar
2018/1029 (PDF ) Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations Zhe Li, Chaoping Xing, Sze Ling Yeo
2018/1028 (PDF ) Synchronous Byzantine Agreement with Expected $O(1)$ Rounds, Expected $O(n^2)$ Communication, and Optimal Resilience Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
2018/1027 (PDF ) A Unified Security Perspective on Legally Fair Contract Signing Protocols Diana Maimut, George Teseleanu
2018/1026 (PDF ) Pairing-Friendly Twisted Hessian Curves Chitchanok Chuengsatiansup, Chloe Martindale
2018/1025 (PDF ) Integer Matrices Homomorphic Encryption and Its application Yanan Bai, Jingwei Chen, Yong Feng, Wenyuan Wu
2018/1024 (PDF ) ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun
2018/1023 (PDF ) Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic
2018/1022 (PDF ) Blind Certificate Authorities Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, abhi shelat
2018/1021 (PDF ) Multi-Client Functional Encryption with Repetition for Inner Product Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2018/1020 (PDF ) Non-Interactive Secure Computation from One-Way Functions Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
2018/1019 (PDF ) Decentralized Evaluation of Quadratic Polynomials on Encrypted Data Chloé Hébant, Duong Hieu Phan, David Pointcheval
2018/1018 (PDF ) Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
2018/1017 (PDF ) TNFS Resistant Families of Pairing-Friendly Elliptic Curves Georgios Fotiadis, Elisavet Konstantinou
2018/1016 (PDF ) Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol Gerben Geltink
2018/1015 (PDF ) Non-Malleable Codes Against Bounded Polynomial Time Tampering Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin
2018/1014 (PDF ) An FPGA-based programmable processor for bilinear pairings Eduardo Cuevas-Farfán, Miguel Morales-Sandoval, René Cumplido
2018/1013 (PDF ) E3: A Framework for Compiling C++ Programs with Encrypted Operands Eduardo Chielle, Oleg Mazonka, Homer Gamil, Nektarios Georgios Tsoutsos, Michail Maniatakos
2018/1012 (PDF ) The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2018/1011 (PDF ) BISON - Instantiating the Whitened Swap-Or-Not Construction Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer
2018/1010 (PDF ) Space Efficient Computational Multi-Secret Sharing and Its Applications Aggelos Kiayias, Murat Osmanoglu, Alexander Russell, Qiang Tang
2018/1009 (PDF ) LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li, Kunpeng Wang
2018/1007 (PDF ) Masking the AES with Only Two Random Bits Hannes Gross, Ko Stoffelen, Lauren De Meyer, Martin Krenn, Stefan Mangard
2018/1005 (PDF ) Code Offset in the Exponent Luke Demarest, Benjamin Fuller, Alexander Russell
2018/1004 (PDF ) Fiat-Shamir From Simpler Assumptions Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum
2018/1003 (PDF ) Secure Data Retrieval On The Cloud: Homomorphic Encryption Meets Coresets Adi Akavia, Dan Feldman, Hayim Shaul
2018/1002 (PDF ) "S-Box" Implementation of AES is NOT side-channel resistant C Ashokkumar, Bholanath Roy, M Bhargav Sri Venkatesh, Bernard L Menezes
2018/1001 (PDF ) Illuminating the Dark or how to recover what should not be seen in FE-based classifiers Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey
2018/1000 (PDF ) Adaptively Single-Key Secure Constrained PRFs for NC1 Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2018/999 (PDF ) A Refinement of ``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018 Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao
2018/997 (PDF ) Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC Leonid Reyzin, Adam Smith, Sophia Yakoubov
2018/996 (PDF ) Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2018/995 (PDF ) Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He
2018/994 (PDF ) People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes Long Chen, Qiang Tang
2018/993 (PDF ) The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam
2018/992 (PDF ) Deconstructing the Blockchain to Approach Physical Limits Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath
2018/991 (PDF ) Reconsidering Generic Composition: the Tag-then-Encrypt case Francesco Berti, Olivier Pereira, Thomas Peters
2018/990 (PDF ) Quisquis: A New Design for Anonymous Cryptocurrencies Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi
2018/989 (PDF ) Kleptography trapdoor free cryptographic protocols Bohdan Kovalenko, Anton Kudin
2018/988 (PDF ) On the Hardness of Learning With Errors with Binary Secrets Daniele Micciancio
2018/987 (PDF ) Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody Iftach Haitner, Yehuda Lindell, Ariel Nof, Samuel Ranellucci
2018/986 (PDF ) Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs Sam Kim, David J. Wu
2018/985 (PDF ) Efficient Arithmetic In (Pseudo-)Mersenne Prime Order Fields Kaushik Nath, Palash Sarkar
2018/984 (PDF ) Pseudorandomness Against Mean and Variance Bounded Attackers Maciej Skorski
2018/983 (PDF ) Efficient UC Commitment Extension with Homomorphism for Free (and Applications) Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli
2018/982 (PDF ) Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada
2018/981 (PDF ) PaLa: A Simple Partially Synchronous Blockchain T-H. Hubert Chan, Rafael Pass, Elaine Shi
2018/980 (PDF ) PiLi: An Extremely Simple Synchronous Blockchain T-H. Hubert Chan, Rafael Pass, Elaine Shi
2018/979 (PDF ) FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval
2018/978 (PDF ) Encrypted Multi-Maps with Computationally-Secure Leakage Seny Kamara, Tarik Moataz
2018/977 (PDF ) Threshold Single Password Authentication Devriş İşler, Alptekin Küpçü
2018/976 (PDF ) Distributed Single Password Protocol Framework Devriş İşler, Alptekin Küpçü
2018/975 (PDF ) User Study on Single Password Authentication Devriş İşler, Alptekin Küpçü, Aykut Coskun
2018/974 (PDF ) Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka, Takashi Yamakawa
2018/973 (PDF ) How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO Aayush Jain, Amit Sahai
2018/972 (PDF ) Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18 Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang
2018/971 (PDF ) Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2018/970 (PDF ) Protean Signature Schemes Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2018/969 (PDF ) Optimal TNFS-secure pairings on elliptic curves with even embedding degree Georgios Fotiadis, Chloe Martindale
2018/968 (PDF ) Edrax: A Cryptocurrency with Stateless Transaction Validation Alexander Chepurnoy, Charalampos Papamanthou, Shravan Srinivasan, Yupeng Zhang
2018/967 (PDF ) Higher dimensional sieving for the number field sieve algorithms Laurent Grémy
2018/966 (PDF ) On the Security of the Multivariate Ring Learning with Errors Problem Carl Bootland, Wouter Castryck, Frederik Vercauteren
2018/965 (PDF ) Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenny Paterson
2018/964 (PDF ) Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas Saud Al Musa, Guangwu Xu
2018/963 (PDF ) On Enabling Attribute-Based Encryption to Be Traceable against Traitors Zhen Liu, Qiong Huang, Duncan S. Wong
2018/962 (PDF ) Zexe: Enabling Decentralized Private Computation Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu
2018/961 (PDF ) Jitter Estimation with High Accuracy for Oscillator-Based TRNGs Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng
2018/960 (PDF ) Towards Quantum One-Time Memories from Stateless Hardware Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
2018/959 (PDF ) Information Entropy Based Leakage Certification Changhai Ou, Xinping Zhou, Siew-Kei Lam
2018/958 (PDF ) On Tightly Secure Primitives in the Multi-Instance Setting Dennis Hofheinz, Ngoc Khanh Nguyen
2018/957 (PDF ) Same Point Composable and Nonmalleable Obfuscated Point Functions Peter Fenteany, Benjamin Fuller
2018/956 (PDF ) Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang
2018/955 (PDF ) Compact Sparse Merkle Trees Faraz Haider
2018/954 (PDF ) Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging Daniel Jost, Ueli Maurer, Marta Mularczyk
2018/953 (PDF ) A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols Dmytro Bogatov, George Kollios, Leonid Reyzin
2018/952 (PDF ) Approximate Homomorphic Encryption over the Conjugate-invariant Ring Duhyeong Kim, Yongsoo Song
2018/951 (PDF ) The Landscape of Optimal Card-based Protocols Alexander Koch
2018/950 (PDF ) Security bound for CTR-ACPKM internally re-keyed encryption mode Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Stanislav V. Smyshlyaev
2018/949 (PDF ) Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations Si Gao, Arnab Roy, Elisabeth Oswald
2018/948 (PDF ) MILP-Based Automatic Differential Searches for LEA and HIGHT Elnaz Bagherzadeh, Zahra Ahmadian
2018/947 (PDF ) On the security of Circulant UOV/Rainbow Yasufumi Hashimoto
2018/946 (PDF ) Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More Nicholas Genise, Daniele Micciancio, Yuriy Polyakov
2018/945 (PDF ) On the Inner Product Predicate and a Generalization of Matching Vector Families Balthazar Bauer, Jevgēnijs Vihrovs, Hoeteck Wee
2018/944 (PDF ) Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions Jeremiah Blocki, Ben Harsha, Siteng Kang, Seunghoon Lee, Lu Xing, Samson Zhou
2018/943 (PDF ) Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu
2018/942 (PDF ) Insured MPC: Efficient Secure Computation with Financial Penalties Carsten Baum, Bernardo David, Rafael Dowsley
2018/941 (PDF ) A tutorial introduction to CryptHOL Andreas Lochbihler, S. Reza Sefidgar
2018/940 (PDF ) Reusable Non-Interactive Secure Computation Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
2018/939 (PDF ) The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms Marcella Hastings, Nadia Heninger, Eric Wustrow
2018/938 (PDF ) Private Message Franking with After Opening Privacy Iraklis Leontiadis, Serge Vaudenay
2018/937 (PDF ) Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys Mathias Wagner, Stefan Heyse
2018/936 (PDF ) New Techniques for Obfuscating Conjunctions James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry
2018/935 (PDF ) Distinguishing Error of Nonlinear Invariant Attacks Subhabrata Samajder, Palash Sarkar
2018/934 (PDF ) Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices Yuichi Komano, Hideo Shimizu, Hideyuki Miyake
2018/933 (PDF ) Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
2018/932 (PDF ) 18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices Philipp Koppermann, Eduard Pop, Johann Heyszl, Georg Sigl
2018/931 (PDF ) A Full RNS Variant of Approximate Homomorphic Encryption Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
2018/930 (PDF ) A study on the fast ElGamal encryption Kim Gyu-Chol, Li Su-Chol
2018/929 (PDF ) Expander Graphs are Non-Malleable Codes Peter M. R. Rasmussen, Amit Sahai
2018/928 (PDF ) Generic Authenticated Key Exchange in the Quantum Random Oracle Model Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh
2018/927 (PDF ) Adaptively Secure Distributed PRFs from LWE Benoît Libert, Damien Stehlé, Radu Titiu
2018/926 (PDF ) Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion Salim Ali Altug, Yilei Chen
2018/925 (PDF ) PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously Songze Li, Mingchao Yu, A. Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
2018/924 (PDF ) Forward Secure Signatures on Smart Cards Andreas Hülsing, Christoph Busold, Johannes Buchmann
2018/923 (PDF ) Delegatable Anonymous Credentials from Mercurial Signatures Elizabeth C. Crites, Anna Lysyanskaya
2018/922 (PDF ) Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications Dušan Božilov, Miroslav Knežević, Ventzislav Nikov
2018/921 (PDF ) Round Optimal Black-Box “Commit-and-Prove” Dakshita Khurana, Rafail Ostrovsky, Akshayaram Srinivasan
2018/920 (PDF ) A Message Franking Channel Loïs Huguenin-Dumittan, Iraklis Leontiadis
2018/919 (PDF ) Registration-Based Encryption: Removing Private-Key Generator from IBE Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi
2018/918 (PDF ) Scalable Lightning Factories for Bitcoin Alejandro Ranchal-Pedrosa, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/917 (PDF ) Secure multiparty PageRank algorithm for collaborative fraud detection Alex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, Daniël Worm
2018/916 (PDF ) Forking a Blockcipher for Authenticated Encryption of Very Short Messages Elena Andreeva, Reza Reyhanitabar, Kerem Varici, Damian Vizár
2018/915 (PDF ) On the Security of a Certificateless Strong Designated Verifier Signature Scheme Nasrollah Pakniat
2018/914 (PDF ) Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance Shuichi Katsumata, Shota Yamada
2018/913 (PDF ) Best Possible Information-Theoretic MPC Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
2018/912 (PDF ) Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2018/911 (PDF ) Achieving Fair Treatment in Algorithmic Classification Andrew Morgan, Rafael Pass
2018/910 (PDF ) Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail
2018/909 (PDF ) Two-Round MPC: Information-Theoretic and Black-Box Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
2018/908 (PDF ) FE and iO for Turing Machines from Minimal Assumptions Shweta Agrawal, Monosij Maitra
2018/907 (PDF ) Proving the correct execution of concurrent services in zero-knowledge Srinath Setty, Sebastian Angel, Trinabh Gupta, Jonathan Lee
2018/906 (PDF ) Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries Willy Quach, Daniel Wichs, Giorgos Zirdelis
2018/905 (PDF ) On the Security Loss of Unique Signatures Andrew Morgan, Rafael Pass
2018/904 (PDF ) Quantum security proofs using semi-classical oracles Andris Ambainis, Mike Hamburg, Dominique Unruh
2018/903 (PDF ) Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila
2018/902 (PDF ) ProximiTEE: Hardened SGX Attestation by Proximity Verification Aritra Dhar, Evan Puddu, Kari Kostiainen, Srdjan Capkun
2018/901 (PDF ) On the Complexity of Fair Coin Flipping Iftach Haitner, Nikolaos Makriyannis, Eran Omri
2018/900 (PDF ) Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations Mohammad Hajiabadi
2018/899 (PDF ) Differential Cryptanalysis of Round-Reduced SPECK Ashutosh Dhar Dwivedi, Pawel Morawiecki
2018/898 (PDF ) Differential Cryptanalysis in ARX Ciphers with specific applications to LEA Ashutosh Dhar Dwivedi, Gautam Srivastava
2018/897 (PDF ) Traitor-Tracing from LWE Made Simple and Attribute-Based Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs
2018/896 (PDF ) Proofs of Ignorance and Applications to 2-Message Witness Hiding Apoorvaa Deshpande, Yael Kalai
2018/895 (PDF ) Weak Zero-Knowledge Beyond the Black-Box Barrier Nir Bitansky, Dakshita Khurana, Omer Paneth
2018/894 (PDF ) Perfect Secure Computation in Two Rounds Benny Applebaum, Zvika Brakerski, Rotem Tsabary
2018/893 (PDF ) Blockchain as cryptanalytic tool Manfred Lochter
2018/892 (PDF ) OptORAMa: Optimal Oblivious RAM Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi
2018/891 (PDF ) Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment Seyed Farhad Aghili, Hamid Mala
2018/890 (PDF ) A Bit-fixing PRF with O(1) Collusion-Resistance from LWE Alex Davidson, Ryo Nishimaki
2018/889 (PDF ) Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity F. Betül Durak, Serge Vaudenay
2018/888 (PDF ) Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg Thom Wiggers
2018/887 (PDF ) Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions Serge Fehr
2018/886 (PDF ) Towards Isogeny-Based Password-Authenticated Key Establishment Oleg Taraskin, Vladimir Soukharev, David Jao, Jason LeGrow
2018/885 (PDF ) PASTA: PASsword-based Threshold Authentication Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee
2018/884 (PDF ) Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model Alan Szepieniec, Reza Reyhanitabar, Bart Preneel
2018/883 (PDF ) Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks Suvradip Chakraborty, C. Pandu Rangan
2018/882 (PDF ) Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies Benjamin Smith
2018/881 (PDF ) Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
2018/880 (PDF ) Spread: a new layer for profiled deep-learning side-channel attacks Christophe Pfeifer, Patrick Haddad
2018/879 (PDF ) Efficient Group Signature Scheme without Pairings Ke Gu, Bo Yin
2018/878 (PDF ) RSA Signatures Under Hardware Restrictions Marc Joye, Yan Michalevsky
2018/877 (PDF ) On QA-NIZK in the BPK Model Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
2018/876 (PDF ) Identity Confidentiality in 5G Mobile Telephony Systems Haibat Khan, Benjamin Dowling, Keith M. Martin
2018/875 (PDF ) Oblivious Transfer in Incomplete Networks Varun Narayanan, Vinod M. Prabhakaran
2018/874 (PDF ) Enhanced Security of Attribute-Based Signatures Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018/873 (PDF ) TACHYON: Fast Signatures from Compact Knapsack Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek
2018/872 (PDF ) New Techniques for Efficient Trapdoor Functions and Applications Sanjam Garg, Romain Gay, Mohammad Hajiabadi
2018/871 (PDF ) Non-profiled Mask Recovery: the impact of Independent Component Analysis Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi
2018/870 (PDF ) Unifying Kleptographic Attacks George Teseleanu
2018/869 (PDF ) Higher-Order DCA against Standard Side-Channel Countermeasures Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang
2018/868 (PDF ) S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard Dea Saka Kurnia Putra, Mohamad Ali Sadikin, Susila Windarta
2018/867 (PDF ) Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling Liron David, Avishai Wool
2018/866 (PDF ) Output Compression, MPC, and iO for Turing Machines Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters
2018/865 (PDF ) Multiplicative Masking for AES in Hardware Lauren De Meyer, Oscar Reparaz, Begül Bilgin
2018/863 (PDF ) Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation Avi Asayag, Gad Cohen, Ido Grayevsky, Maya Leshkowitz, Ori Rottenstreich, Ronen Tamari, David Yakira
2018/862 (PDF ) Attacking RO-PUFs with Enhanced Challenge-Response Pairs Nils Wisiol, Marian Margraf
2018/861 (PDF ) Delegating Computations with (almost) Minimal Time and Space Overhead Justin Holmgren, Ron D. Rothblum
2018/860 (PDF ) Encrypted Databases for Differential Privacy Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
2018/859 (PDF ) Cryptanalysis of Low-Data Instances of Full LowMCv2 Christian Rechberger, Hadi Soleimany, Tyge Tiessen
2018/858 (PDF ) Stronger Security for Sanitizable Signatures Stephan Krenn, Kai Samelin, Dieter Sommer
2018/857 (PDF ) Raptor: A Practical Lattice-Based (Linkable) Ring Signature Xingye Lu, Man Ho Au, Zhenfei Zhang
2018/856 (PDF ) Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai, Damien Stehlé, Weiqiang Wen
2018/855 (PDF ) On the Security of the PKCS#1 v1.5 Signature Scheme Tibor Jager, Saqib A. Kakvi, Alexander May
2018/854 (PDF ) Universal Multi-Party Poisoning Attacks Saeed Mahloujifar, Mahammad Mahmoody, Ameer Mohammed
2018/853 (PDF ) Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias
2018/852 (PDF ) Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas
2018/851 (PDF ) More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting T-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi
2018/850 (PDF ) Computing supersingular isogenies on Kummer surfaces Craig Costello
2018/849 (PDF ) Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
2018/848 (PDF ) A Universally Composable Framework for the Privacy of Email Ecosystems Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias
2018/847 (PDF ) Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption Venkata Koppula, Brent Waters
2018/846 (PDF ) Strong Leakage Resilient Encryption: Enhancing Data Confidentiality by Hiding Partial Ciphertext Jia Xu, Jianying Zhou
2018/845 (PDF ) A Framework for Achieving KDM-CCA Secure Public-Key Encryption Fuyuki Kitagawa, Keisuke Tanaka
2018/844 (PDF ) Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove Jean Paul Degabriele, Marc Fischlin
2018/843 (PDF ) Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT) Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2018/842 (PDF ) Attribute-Based Signatures for Unbounded Languages from Standard Assumptions Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
2018/841 (PDF ) Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions Akinori Hosoyamada, Kan Yasuda
2018/840 (PDF ) Universal Proxy Re-Encryption Nico Döttling, Ryo Nishimaki
2018/839 (PDF ) On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography Huseyin Hisil, Joost Renes
2018/838 (PDF ) (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model Keita Xagawa, Takashi Yamakawa
2018/837 (PDF ) Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang
2018/836 (PDF ) Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
2018/835 (PDF ) Fully-Featured Anonymous Credentials with Reputation System Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier
2018/834 (PDF ) Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks Dennis Hofheinz, Dingding Jia, Jiaxin Pan
2018/833 (PDF ) Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding Jie Chen, Junqing Gong, Hoeteck Wee
2018/832 (PDF ) Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
2018/831 (PDF ) Practical Attack on RaCoSS-R Keita Xagawa
2018/830 (PDF ) A remark on a success rate model fpr DPA and CPA Andreas Wiemers
2018/829 (PDF ) Information-Theoretic Broadcast with Dishonest Majority for Long Messages Wutichai Chongchitmate, Rafail Ostrovsky
2018/828 (PDF ) Aurora: Transparent Succinct Arguments for R1CS Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, Nicholas P. Ward
2018/827 (PDF ) Practical Strategy-Resistant Privacy-Preserving Elections Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
2018/826 (PDF ) Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH Tibor Jager, Rafael Kurek, Jiaxin Pan
2018/825 (PDF ) Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information Kostas Papagiannopoulos
2018/824 (PDF ) SeaSign: Compact isogeny signatures from class group actions Luca De Feo, Steven D. Galbraith
2018/823 (PDF ) The Security of Lazy Users in Out-of-Band Authentication Moni Naor, Lior Rotem, Gil Segev
2018/822 (PDF ) LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi
2018/821 (PDF ) Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2018/820 (PDF ) Privacy Loss Classes: The Central Limit Theorem in Differential Privacy David Sommer, Sebastian Meiser, Esfandiar Mohammadi
2018/819 (PDF ) ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls Ritam Bhaumik, Eik List, Mridul Nandi
2018/818 (PDF ) Robustly Reusable Fuzzy Extractor from Standard Assumptions Yunhua Wen, Shengli Liu
2018/817 (PDF ) Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He
2018/816 (PDF ) Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security Chun Guo, Lei Wang
2018/815 (PDF ) Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation Yoshitatsu Matsuda, Tadanori Teruya, Kenji Kasiwabara
2018/814 (PDF ) White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo
2018/813 (PDF ) Programming the Demirci-Sel{ç}uk Meet-in-the-Middle Attack with Constraints Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu
2018/812 (PDF ) Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier? Lior Rotem, Gil Segev
2018/811 (PDF ) Reconstructing an S-box from its Difference Distribution Table Orr Dunkelman, Senyang Huang
2018/810 (PDF ) Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP Ling Song, Jian Guo
2018/809 (PDF ) Algebraic Cryptanalysis of Frit Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger
2018/808 (PDF ) Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher
2018/807 (PDF ) On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers Nicolas T. Courtois
2018/806 (PDF ) Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness Victor Arribas, Svetla Nikova, Vincent Rijmen
2018/805 (PDF ) Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda
2018/804 (PDF ) Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul
2018/803 (PDF ) BITE: Bitcoin Lightweight Client Privacy using Trusted Execution Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
2018/802 (PDF ) Secure Modulo Zero-Sum Randomness as Cryptographic Resource Masahito Hayashi, Takeshi Koshiba
2018/801 (PDF ) Faster PCA and Linear Regression through Hypercubes in HElib Deevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda
2018/800 (PDF ) Security of the Blockchain against Long Delay Attack Puwen Wei, Quan Yuan, Yuliang Zheng
2018/799 (PDF ) Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm Fukang Liu, Zhenfu Cao, Gaoli Wang
2018/798 (PDF ) Recovering Secrets From Prefix-Dependent Leakage Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi
2018/797 (PDF ) Quantum algorithms for computing general discrete logarithms and orders with tradeoffs Martin Ekerå
2018/796 (PDF ) On relations between CCZ- and EA-equivalences Lilya Budaghyan, Marco Calderini, Irene Villa
2018/795 (PDF ) Solving ECDLP via List Decoding Fangguo Zhang, Shengli Liu
2018/794 (PDF ) Blending FHE-NTRU keys – The Excalibur Property Louis Goubin, Francisco Vial-Prado
2018/793 (PDF ) Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki
2018/792 (PDF ) Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices Joppe W. Bos, Simon J. Friedberger
2018/791 (PDF ) Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$ Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
2018/790 (PDF ) Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation David Derler, Sebastian Ramacher, Daniel Slamanig
2018/789 (PDF ) Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free Vladimir Kolesnikov
2018/788 (PDF ) Privacy-preserving certificate linkage/revocation in VANETs without Linkage Authorities Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
2018/787 (PDF ) Labeled PSI from Fully Homomorphic Encryption with Malicious Security Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal
2018/786 (PDF ) Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices Zhongxiang Zheng, Guangwu Xu, Chunhuan Zhao
2018/785 (PDF ) Efficiently Processing Complex-Valued Data in Homomorphic Encryption Carl Bootland, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2018/784 (PDF ) Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model ByeongHak Lee, Jooyoung Lee
2018/783 (PDF ) Short Variable Length Domain Extenders With Beyond Birthday Bound Security Yu Long Chen, Bart Mennink, Mridul Nandi
2018/782 (PDF ) A faster way to the CSIDH Michael Meyer, Steffen Reith
2018/781 (PDF ) Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation Yu Chen, Yuyu Wang, Hong-sheng Zhou
2018/780 (PDF ) A Game Theoretic Analysis of Resource Mining in Blockchain Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng
2018/779 (PDF ) Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
2018/778 (PDF ) PPP-Completeness with Connections to Cryptography Katerina Sotiraki, Manolis Zampetakis, Giorgos Zirdelis
2018/777 (PDF ) Delegation of Decryption Rights with Revocability from Learning with Errors Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang
2018/776 (PDF ) On Publicly Verifiable Delegation From Standard Assumptions Yael Kalai, Omer Paneth, Lisa Yang
2018/775 (PDF ) The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun
2018/774 (PDF ) Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies Brandon Goodell, Sarang Noether
2018/773 (PDF ) Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
2018/772 (PDF ) Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
2018/771 (PDF ) A Simple Construction of iO for Turing Machines Sanjam Garg, Akshayaram Srinivasan
2018/770 (PDF ) Combiners for Backdoored Random Oracles Balthazar Bauer, Pooya Farshim, Sogol Mazaheri
2018/769 (PDF ) Constructing APN functions through isotopic shifts Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa
2018/768 (PDF ) DRANKULA: a McEliece-like rank metric based cryptosystem implementation Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Victor Mateu
2018/767 (PDF ) Xoodoo cookbook Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2018/766 (PDF ) Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan
2018/765 (PDF ) Symbolic Proofs for Lattice-Based Cryptography Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi
2018/764 (PDF ) Generating Graphs Packed with Paths Mathias Hall-Andersen, Philip S. Vejre
2018/763 (PDF ) Block Cipher Invariants as Eigenvectors of Correlation Matrices (Full Version) Tim Beyne
2018/762 (PDF ) Generalizing the SPDZ Compiler For Other Protocols Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida
2018/761 (PDF ) New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami
2018/760 (PDF ) Strongly Secure Authenticated Key Exchange from Supersingular Isogenies Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Bei Liang, Song Tian
2018/759 (PDF ) Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm Prabhanjan Ananth, Alex Lombardi
2018/758 (PDF ) CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2018/757 (PDF ) Cryptography for Human Senses Kimmo Halunen, Outi-Marja Latvala
2018/756 (PDF ) Obfuscation Using Tensor Products Craig Gentry, Charanjit S. Jutla, Daniel Kane
2018/755 (PDF ) Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
2018/754 (PDF ) SoK: A Consensus Taxonomy in the Blockchain Era Juan Garay, Aggelos Kiayias
2018/753 (PDF ) Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy Yan Michalevsky, Marc Joye
2018/752 (PDF ) Isogeny Secrets can be Traded David Urbanik
2018/751 (PDF ) An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell
2018/750 (PDF ) Non-Malleable Secret Sharing for General Access Structures Vipul Goyal, Ashutosh Kumar
2018/749 (PDF ) Prime and Prejudice: Primality Testing Under Adversarial Conditions Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky
2018/748 (PDF ) Definitions for Plaintext-Existence Hiding in Cloud Storage Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani
2018/747 (PDF ) Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure Eyal Ronen, Kenneth G. Paterson, Adi Shamir
2018/746 (PDF ) Secret Sharing with Binary Shares Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang
2018/745 (PDF ) Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang
2018/744 (PDF ) BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin
2018/743 (PDF ) On the Leakage of Corrupted Garbled Circuits Aurélien Dupin, David Pointcheval, Christophe Bidan
2018/742 (PDF ) Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities Hiroaki Anada, Seiko Arita
2018/741 (PDF ) LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE Alexander May, Gottfried Herold
2018/740 (PDF ) FairSwap: How to fairly exchange digital goods Stefan Dziembowski, Lisa Eckey, Sebastian Faust
2018/739 (PDF ) Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism Mahdi Sajadieh, Mohammad Vaziri
2018/738 (PDF ) Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature Sanjit Chatterjee, R. Kabaleeshwaran
2018/737 (PDF ) Steady: A Simple End-to-End Secure Logging System Tobias Pulls, Rasmus Dahlberg
2018/736 (PDF ) Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs Marina Blanton, Myoungin Jeong
2018/734 (PDF ) Random Number Generators Can Be Fooled to Behave Badly George Teseleanu
2018/733 (PDF ) Threshold Partially-Oblivious PRFs with Applications to Key Management Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
2018/732 (PDF ) Data Oblivious Genome Variants Search on Intel SGX Avradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy
2018/731 (PDF ) An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing Itai Dinur, Nathan Keller, Ohad Klein
2018/730 (PDF ) Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama
2018/728 (PDF ) A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto
2018/727 (PDF ) DiSE: Distributed Symmetric-key Encryption Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal
2018/726 (PDF ) Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang
2018/725 (PDF ) Round5: KEM and PKE based on GLWR Sauvik Bhattacharya, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
2018/724 (PDF ) Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow Nele Mentens, Edoardo Charbon, Francesco Regazzoni
2018/723 (PDF ) Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang
2018/722 (PDF ) uMine: a Blockchain based on Human Miners Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter
2018/721 (PDF ) Transparency Logs via Append-only Authenticated Dictionaries Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas
2018/720 (PDF ) {Adiantum}: length-preserving encryption for entry-level processors Paul Crowley, Eric Biggers
2018/719 (PDF ) Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2018/718 (PDF ) Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic Koji Nuida
2018/717 (PDF ) Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert
2018/716 (PDF ) Lattice-Based Zero-Knowledge Arguments for Integer Relations Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
2018/715 (PDF ) Practical Attacks on Relational Databases Protected via Searchable Encryption Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin
2018/714 (PDF ) PKP-Based Signature Scheme Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret
2018/713 (PDF ) On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting Anne Canteaut, Léo Perrin
2018/712 (PDF ) A Survey of Two Verifiable Delay Functions Dan Boneh, Benedikt Bünz, Ben Fisch
2018/711 (PDF ) Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures Kallepu Raju, Appala Naidu Tentuand, V. Ch. Venkaiah
2018/710 (PDF ) Fast Secure Computation for Small Population over the Internet Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi
2018/709 (PDF ) Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies Vanessa Vitse
2018/708 (PDF ) Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
2018/707 (PDF ) Function Secret Sharing: Improvements and Extensions Elette Boyle, Niv Gilboa, Yuval Ishai
2018/706 (PDF ) Efficient 3-Party Distributed ORAM Paul Bunn, Jonathan Katz, Eyal Kushilevitz, Rafail Ostrovsky
2018/705 (PDF ) Subvector Commitments with Application to Succinct Arguments Russell W. F. Lai, Giulio Malavolta
2018/704 (PDF ) Verifiable Sealed-Bid Auction on the Ethereum Blockchain Hisham S. Galal, Amr M. Youssef
2018/703 (PDF ) New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition Niek J. Bouman, Niels de Vreede
2018/702 (PDF ) Tight Proofs of Space and Replication Ben Fisch
2018/700 (PDF ) SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu
2018/699 (PDF ) Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64 Raghvendra Rohit, Guang Gong
2018/698 (PDF ) Parameter-Hiding Order Revealing Encryption David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang
2018/697 (PDF ) AUDIT: Practical Accountability of Secret Processes Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner
2018/696 (PDF ) Unbounded Inner Product Functional Encryption from Bilinear Maps Junichi Tomida, Katsuyuki Takashima
2018/695 (PDF ) SPHINX: A Password Store that Perfectly Hides Passwords from Itself Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena
2018/694 (PDF ) Faster Privacy-Preserving Location Proximity Schemes Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
2018/693 (PDF ) Efficient Side-Channel Protections of ARX Ciphers Bernhard Jungk, Richard Petri, Marc Stöttinger
2018/692 (PDF ) New Configurations of Grain Ciphers: Security Against Slide Attacks Diana Maimut, George Teseleanu
2018/691 (PDF ) DIZK: A Distributed Zero Knowledge Proof System Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
2018/690 (PDF ) Efficient KEA-Style Lattice-Based Authenticated Key Exchange Zilong Wang, Honggang Hu
2018/689 (PDF ) Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis Ralph Ankele, Stefan Kölbl
2018/688 (PDF ) Finding Integral Distinguishers with Ease Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, Tyge Tiessen
2018/687 (PDF ) Assessing the Feasibility of Single Trace Power Analysis of Frodo Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
2018/686 (PDF ) Standard Lattice-Based Key Encapsulation on Embedded Devices James Howe, Tobias Oder, Markus Krausz, Tim Güneysu
2018/685 (PDF ) On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson
2018/684 (PDF ) PIEs: Public Incompressible Encodings for Decentralized Storage Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels
2018/683 (PDF ) Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability Oksana Kulyk, Melanie Volkamer
2018/682 (PDF ) Saber on ARM CCA-secure module lattice-based key encapsulation on ARM Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede
2018/681 (PDF ) A Reusable Fuzzy Extractor with Practical Storage Size Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
2018/680 (PDF ) Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256 Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2018/679 (PDF ) DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang, Weiqi Luo
2018/678 (PDF ) PoReps: Proofs of Space on Useful Data Ben Fisch
2018/677 (PDF ) Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems François Gérard
2018/676 (PDF ) Static Power Side-Channel Analysis - An Investigation of Measurement Factors Thorben Moos, Amir Moradi, Bastian Richter
2018/675 (PDF ) A signature scheme from the finite field isomorphism problem Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2018/674 (PDF ) Practical Fault Injection Attacks on SPHINCS Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan
2018/673 (PDF ) Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
2018/672 (PDF ) Cold Boot Attacks on Ring and Module LWE Keys Under the NTT Martin R. Albrecht, Amit Deo, Kenneth G. Paterson
2018/671 (PDF ) A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES Joey Green, Elisabeth Oswald, Arnab Roy
2018/670 (PDF ) Public Key Compression for Constrained Linear Signature Schemes Ward Beullens, Bart Preneel, Alan Szepieniec
2018/669 (PDF ) Faster cofactorization with ECM using mixed representations Cyril Bouvier, Laurent Imbert
2018/668 (PDF ) Breaking Message Integrity of an End-to-End Encryption Scheme of LINE Takanori Isobe, Kazuhiko Minematsu
2018/667 (PDF ) On Hardware Implementation of Tang-Maitra Boolean Functions Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra
2018/666 (PDF ) Reproducible Families of Codes and Cryptographic Applications Paolo Santini, Edoardo Persichetti, Marco Baldi
2018/665 (PDF ) Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry
2018/664 (PDF ) Public Accountability vs. Secret Laws: Can They Coexist? Shafi Goldwasser, Sunoo Park
2018/663 (PDF ) Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda
2018/662 (PDF ) Efficient Logistic Regression on Large Encrypted Data Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park
2018/661 (PDF ) Exploring Deployment Strategies for the Tor Network Christoph Döpmann, Sebastian Rust, Florian Tschorsch
2018/660 (PDF ) A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity Xun Yi, Kwok-Yan Lam, Dieter Gollmann
2018/659 (PDF ) On the Menezes-Teske-Weng’s conjecture Sihem Mesnager, Kwang Ho Kim, Junyop Choe, Chunming Tang
2018/658 (PDF ) Blockchained Post-Quantum Signatures Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter
2018/657 (PDF ) Platform-independent Secure Blockchain-Based Voting System Bin Yu, Joseph Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au
2018/656 (PDF ) FPGA Cluster based high performance Cryptanalysis framework Abhishek Bajpai, S V Kulgod
2018/655 (PDF ) Loamit: A Blockchain-based Residual Loanable-limit Query System Lijing Zhou, Licheng Wang, Yiru Sun, Pin Lv
2018/654 (PDF ) Proofs of Replicated Storage Without Timing Assumptions Ivan Damgård, Chaya Ganesh, Claudio Orlandi
2018/653 (PDF ) Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner
2018/652 (PDF ) Efficient Collision Attack Frameworks for RIPEMD-160 Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
2018/651 (PDF ) Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Brumley
2018/650 (PDF ) Designing Efficient Dyadic Operations for Cryptographic Applications Gustavo Banegas, Paulo S. L. M. Barreto, Edoardo Persichetti, Paolo Santini
2018/649 (PDF ) No-signaling Linear PCPs Susumu Kiyoshima
2018/648 (PDF ) Semi-Commutative Masking: A Framework for Isogeny-based Protocols, with an Application to Fully Secure Two-Round Isogeny-based OT Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart
2018/647 (PDF ) A new perspective on the powers of two descent for discrete logarithms in finite fields Thorsten Kleinjung, Benjamin Wesolowski
2018/646 (PDF ) Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation Huijia Lin, Christian Matt
2018/645 (PDF ) Mitigating the One-Use Restriction in Attribute-Based Encryption Lucas Kowalczyk, Jiahui Liu, Kailash Meiyappan, Tal Malkin
2018/644 (PDF ) Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy
2018/643 (PDF ) XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, William J. Knottenbelt
2018/642 (PDF ) Commit-Chains: Secure, Scalable Off-Chain Payments Rami Khalil, Alexei Zamyatin, Guillaume Felley, Pedro Moreno-Sanchez, Arthur Gervais
2018/641 (PDF ) Membership Privacy for Fully Dynamic Group Signatures Michael Backes, Lucjan Hanzlik, Jonas Schneider
2018/640 (PDF ) Lower Bounds on Structure-Preserving Signatures for Bilateral Messages Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi
2018/639 (PDF ) Function-Dependent Commitments for Verifiable Multi-Party Computation Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann
2018/638 (PDF ) BurnBox: Self-Revocable Encryption in a World of Compelled Access Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers
2018/637 (PDF ) Efficient Fully Homomorphic Encryption Scheme Shuhong Gao
2018/636 (PDF ) Lattice-Based Dual Receiver Encryption and More Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
2018/635 (PDF ) On linear hulls in one round of DES Tomer Ashur, Raluca Posteuca
2018/634 (PDF ) Partially Specified Channels: The TLS 1.3 Record Layer without Elision Christopher Patton, Thomas Shrimpton
2018/633 (PDF ) New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation Shweta Agrawal
2018/632 (PDF ) CHARIOT: Cloud-Assisted Access Control for the Internet of Things Clementine Gritti, Melek Onen, Refik Molva
2018/631 (PDF ) Efficient Construction of the Boomerang Connection Table Orr Dunkelman
2018/630 (PDF ) Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger, Barak Shani
2018/629 (PDF ) Context Hiding Multi-Key Linearly Homomorphic Authenticators Lucas Schabhüser, Denis Butin, Johannes Buchmann
2018/627 (PDF ) Simple Verifiable Delay Functions Krzysztof Pietrzak
2018/626 (PDF ) Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes Sergiu Carpov, Oana Stan
2018/625 (PDF ) Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions Mihir Bellare, Joseph Jaeger, Julia Len
2018/624 (PDF ) Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker Gergei Bana, Rohit Chadha, Ajay Kumar Eeralla
2018/623 (PDF ) Efficient verifiable delay functions Benjamin Wesolowski
2018/622 (PDF ) New techniques for Multi-value input Homomorphic Evaluation and Applications Sergiu Carpov, Malika Izabachène, Victor Mollimard
2018/621 (PDF ) Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis Ben Lapid, Avishai Wool
2018/620 (PDF ) STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen
2018/619 (PDF ) Is there an Oblivious RAM Lower Bound for Online Reads? Mor Weiss, Daniel Wichs
2018/618 (PDF ) On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks Reynier Antonio de la Cruz Jiménez
2018/617 (PDF ) Two Notions of Differential Equivalence on Sboxes Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
2018/616 (PDF ) Matrioska: A Compiler for Multi-Key Homomorphic Signatures Dario Fiore, Elena Pagnin
2018/615 (PDF ) Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness Prabhanjan Ananth, Aayush Jain, Amit Sahai
2018/614 (PDF ) A Note on Key Rank Daniel P. Martin, Marco Martinoli
2018/613 (PDF ) One-Message Zero Knowledge and Non-Malleable Commitments Nir Bitansky, Huijia Lin
2018/612 (PDF ) Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol Tim Ruffing, Sri Aravinda Thyagarajan, Viktoria Ronge, Dominique Schröder
2018/611 (PDF ) Is Java Card ready for hash-based signatures? Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren
2018/610 (PDF ) Hierarchical Attribute-based Signatures Constantin-Catalin Dragan, Daniel Gardham, Mark Manulis
2018/609 (PDF ) Improved Results on Factoring General RSA Moduli with Known Bits Mengce Zheng
2018/608 (PDF ) Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols Hamid Nejatollahi, Nikil Dutt, Indranil Banerjee, Rosario Cammarota
2018/607 (PDF ) SEEMless: Secure End-to-End Encrypted Messaging with less trust Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai
2018/606 (PDF ) Continuously Non-Malleable Codes with Split-State Refresh Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
2018/605 (PDF ) N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi
2018/604 (PDF ) Attack on Kayawood Protocol: Uncloaking Private Keys Matvei Kotov, Anton Menshov, Alexander Ushakov
2018/603 (PDF ) Actively Secure OT-Extension from q-ary Linear Codes Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen
2018/602 (PDF ) On the Universally Composable Security of OpenStack Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang
2018/601 (PDF ) Verifiable Delay Functions Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch
2018/600 (PDF ) GRANULE: An Ultra lightweight cipher design for embedded security Gaurav Bansod, Abhijit Patil, Narayan Pisharoty
2018/599 (PDF ) CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case Lucas Schabhüser, Denis Butin, Johannes Buchmann
2018/598 (PDF ) Trends in design of ransomware viruses Vlad Constantin Craciun, Andrei Mogage, Emil Simion
2018/597 (PDF ) Consolidating Security Notions in Hardware Masking Lauren De Meyer, Begül Bilgin, Oscar Reparaz
2018/596 (PDF ) Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi
2018/594 (PDF ) Cryptanalysis of SFN Block Cipher Sadegh Sadeghi, Nasour Bagheri
2018/593 (PDF ) Ramanujan graphs in cryptography Anamaria Costache, Brooke Feigon, Kristin Lauter, Maike Massierer, Anna Puskas
2018/592 (PDF ) XS-circuits in Block Ciphers Sergey Agievich
2018/591 (PDF ) 4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis. Sankhanil Dey, Ranjan Ghosh
2018/590 (PDF ) The Twin Conjugacy Search Problem and Applications Xiaoming Chen, Weiqing You
2018/589 (PDF ) Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff
2018/588 (PDF ) BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage Guilherme Borges, Henrique Domingos, Bernardo Ferreira, João Leitão, Tiago Oliveira, Bernardo Portela
2018/587 (PDF ) Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model Tapas Pal, Ratna Dutta
2018/586 (PDF ) Lower Bounds on Lattice Enumeration with Extreme Pruning Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata
2018/585 (PDF ) Polynomial Functional Encryption Scheme with Linear Ciphertext Size Jung Hee Cheon, Seungwan Hong, Changmin Lee, Yongha Son
2018/584 (PDF ) Bounded Fully Homomorphic Encryption from Monoid Algebras Mugurel Barcau, Vicentiu Pasol
2018/583 (PDF ) Ring Homomorphic Encryption Schemes Mugurel Barcau, Vicentiu Pasol
2018/582 (PDF ) Pisa: Arbitration Outsourcing for State Channels Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, Sarah Meiklejohn
2018/581 (PDF ) Smart contracts for bribing miners Patrick McCorry, Alexander Hicks, Sarah Meiklejohn
2018/580 (PDF ) Secure MPC: Laziness Leads to GOD Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
2018/579 (PDF ) PIR-PSI: Scaling Private Contact Discovery Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu
2018/578 (PDF ) Optimizing Authenticated Garbling for Faster Secure Two-Party Computation Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang
2018/577 (PDF ) Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas
2018/576 (PDF ) Simpler Constructions of Asymmetric Primitives from Obfuscation Pooya Farshim, Georg Fuchsbauer, Alain Passelègue
2018/575 (PDF ) An Algorithmic Framework for the Generalized Birthday Problem Itai Dinur
2018/574 (PDF ) Correctness and Fairness of Tendermint-core Blockchains Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/573 (PDF ) Improved Lightweight Implementations of CAESAR Authenticated Ciphers Farnoud Farahmand, William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2018/572 (PDF ) Round-Optimal Secure Multiparty Computation with Honest Majority Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2018/571 (PDF ) Limits of Practical Sublinear Secure Computation Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
2018/570 (PDF ) Fast Large-Scale Honest-Majority MPC for Malicious Adversaries Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof
2018/569 (PDF ) Dissection-BKW Andre Esser, Felix Heuer, Robert Kübler, Alexander May, Christian Sohler
2018/568 (PDF ) Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen
2018/567 (PDF ) On the Security Properties of e-Voting Bulletin Boards Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias
2018/566 (PDF ) Private Circuits: A Modular Approach Prabhanjan Ananth, Yuval Ishai, Amit Sahai
2018/564 (PDF ) Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/563 (PDF ) Multi-client Predicate-only Encryption for Conjunctive Equality Tests Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker
2018/562 (PDF ) maskVerif: automated analysis of software and hardware higher-order masked implementations Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert
2018/561 (PDF ) Blockchain Abstract Data Type Emmanuelle Anceaume, Antonella Del Pozzo, Romaric Ludinard, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/560 (PDF ) Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
2018/559 (PDF ) Proofs of Work from Worst-Case Assumptions Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2018/558 (PDF ) Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE Phillip Rogaway, Yusi Zhang
2018/557 (PDF ) Non-Interactive Zero-Knowledge Proofs for Composite Statements Shashank Agrawal, Chaya Ganesh, Payman Mohassel
2018/556 (PDF ) The Curse of Small Domains: New Attacks on Format-Preserving Encryption Viet Tung Hoang, Stefano Tessaro, Ni Trieu
2018/555 (PDF ) Limits on the Power of Garbling Techniques for Public-Key Encryption Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ameer Mohammed
2018/554 (PDF ) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas, Ricardo Custodio, Daniel Panario
2018/553 (PDF ) Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging Joseph Jaeger, Igors Stepanovs
2018/552 (PDF ) On the Complexity of Compressing Obfuscation Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
2018/551 (PDF ) Structured Encryption and Leakage Suppression Seny Kamara, Tarik Moataz, Olga Ohrimenko
2018/550 (PDF ) PRank: Fast Analytical Rank Estimation via Pareto Distributions Liron David, Avishai Wool
2018/549 (PDF ) Adaptive Garbled RAM from Laconic Oblivious Transfer Sanjam Garg, Rafail Ostrovsky, Akshayaram Srinivasan
2018/548 (PDF ) From Laconic Zero-Knowledge to Public-Key Cryptography Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
2018/547 (PDF ) Indifferentiable Authenticated Encryption Manuel Barbosa, Pooya Farshim
2018/546 (PDF ) Quantum Lattice Enumeration and Tweaking Discrete Pruning Yoshinori Aono, Phong Q. Nguyen, Yixin Shen
2018/545 (PDF ) Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu
2018/544 (PDF ) Pseudorandom Quantum States Zhengfeng Ji, Yi-Kai Liu, Fang Song
2018/543 (PDF ) Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange Kristian Gjøsteen, Tibor Jager
2018/542 (PDF ) Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti
2018/541 (PDF ) Generic Attacks against Beyond-Birthday-Bound MACs Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras
2018/540 (PDF ) Must the Communication Graph of MPC Protocols be an Expander? Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubacek
2018/539 (PDF ) Extracting Linearization Equations from Noisy Sources Daniel Smith-Tone
2018/538 (PDF ) Non-Malleable Codes for Partial Functions with Manipulation Detection Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2018/537 (PDF ) Quantum Security Analysis of CSIDH Xavier Bonnetain, André Schrottenloher
2018/536 (PDF ) On the Hardness of the Computational Ring-LWR Problem and its Applications Long Chen, Zhenfeng Zhang, Zhenfei Zhang
2018/535 (PDF ) Monero - Privacy in the Blockchain Kurt M. Alonso, Jordi Herrera Joancomartí
2018/534 (PDF ) Cryptographic Constructions Supporting Implicit Data Integrity Michael Kounavis, David Durham, Sergej Deutsch
2018/533 (PDF ) Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model Alice Pellet-Mary
2018/532 (PDF ) Ring packing and amortized FHEW bootstrapping Daniele Micciancio, Jessica Sorrell
2018/531 (PDF ) Polynomial direct sum masking to protect against both SCA and FIA Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
2018/530 (PDF ) Two-Message Statistically Sender-Private OT from LWE Zvika Brakerski, Nico Döttling
2018/529 (PDF ) Trapdoor Functions from the Computational Diffie-Hellman Assumption Sanjam Garg, Mohammad Hajiabadi
2018/528 (PDF ) Recovering short secret keys of RLCE in polynomial time Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich
2018/527 (PDF ) Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2018/526 (PDF ) Towards KEM Unification Daniel J. Bernstein, Edoardo Persichetti
2018/525 (PDF ) Location-Proof System based on Secure Multi-Party Computations Aurélien Dupin, Jean-Marc Robert, Christophe Bidan
2018/524 (PDF ) New Smooth Projective Hashing For Oblivious Transfer Bing Zeng
2018/523 (PDF ) Reducing Complexity of Pairing Comparisons using Polynomial Evaluation Adam Bobowski, Marcin Słowik
2018/522 (PDF ) Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1 Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang
2018/521 (PDF ) Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound Gil Segev, Ido Shahaf
2018/520 (PDF ) Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries Mridul Nandi
2018/519 (PDF ) Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules Brandon Broadnax, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel
2018/518 (PDF ) Secure and Reliable Key Agreement with Physical Unclonable Functions Onur Gunlu, Tasnad Kernetzky, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer
2018/517 (PDF ) Upper and Lower Bounds for Continuous Non-Malleable Codes Dana Dachman-Soled, Mukul Kulkarni
2018/516 (PDF ) Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound Atsushi Takayasu, Noboru Kunihiro
2018/515 (PDF ) Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
2018/514 (PDF ) Weak Compression and (In)security of Rational Proofs of Storage Ben Fisch, Shashwat Silas
2018/513 (PDF ) Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart
2018/512 (PDF ) Provably Secure Integration Cryptosystem on Non-Commutative Group Weiqing You, Xiaoming Chen
2018/511 (PDF ) Return of GGH15: Provable Security Against Zeroizing Attacks James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry
2018/510 (PDF ) Key-Secrecy of PACE with OTS/CafeOBJ Dominik Klein
2018/508 (PDF ) Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors Mriganka Mandal, Ratna Dutta
2018/507 (PDF ) Tight Tradeoffs in Searchable Symmetric Encryption Gilad Asharov, Gil Segev, Ido Shahaf
2018/506 (PDF ) Secure Two-Party Computation over Unreliable Channels Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas
2018/505 (PDF ) Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
2018/504 (PDF ) Quantum Attacks on Some Feistel Block Ciphers Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang
2018/503 (PDF ) Finger Printing Data Gideon Samid
2018/502 (PDF ) Computer-aided proofs for multiparty computation with active security Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
2018/500 (PDF ) Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda
2018/499 (PDF ) Secure Two-party Threshold ECDSA from ECDSA Assumptions Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2018/498 (PDF ) Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain
2018/497 (PDF ) Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
2018/496 (PDF ) Efficient Delegated Private Set Intersection on Outsourced Private Datasets Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong
2018/495 (PDF ) Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity Changyu Dong, Grigorios Loukides
2018/494 (PDF ) Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
2018/493 (PDF ) Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal Lior Rotem, Gil Segev
2018/492 (PDF ) New Instantiations of the CRYPTO 2017 Masking Schemes Pierre Karpman, Daniel S. Roche
2018/491 (PDF ) Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol Matvei Kotov, Anton Menshov, Alexey Myasnikov, Dmitry Panteleev, Alexander Ushakov
2018/490 (PDF ) Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert
2018/489 (PDF ) Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
2018/488 (PDF ) Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound Benoît Cogliati, Jooyoung Lee
2018/487 (PDF ) Unbounded Inner-Product Functional Encryption, with Succinct Keys Edouard Dufour-Sans, David Pointcheval
2018/486 (PDF ) Pushing the Communication Barrier in Secure Computation using Lookup Tables Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner
2018/485 (PDF ) Towards practical key exchange from ordinary isogeny graphs Luca De Feo, Jean Kieffer, Benjamin Smith
2018/484 (PDF ) Authenticated Encryption with Nonce Misuse and Physical Leakages: Definitions, Separation Results, and Leveled Constructions Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2018/483 (PDF ) Compact Multi-Signatures for Smaller Blockchains Dan Boneh, Manu Drijvers, Gregory Neven
2018/482 (PDF ) SPDZ2k: Efficient MPC mod 2^k for Dishonest Majority Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing
2018/481 (PDF ) On the Exact Round Complexity of Secure Three-Party Computation Arpita Patra, Divya Ravi
2018/480 (PDF ) On Distributional Collision Resistant Hashing Ilan Komargodski, Eylon Yogev
2018/479 (PDF ) On the security of Jhanwar-Barua Identity-Based Encryption Scheme Adrian G. Schipor
2018/478 (PDF ) On Non-Monotonicity of the Success Probability in Linear Cryptanalysis Ali Aydin Selcuk
2018/477 (PDF ) CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
2018/476 (PDF ) The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni
2018/475 (PDF ) Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures Jonathan Katz, Vladimir Kolesnikov, Xiao Wang
2018/474 (PDF ) Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification Peter Sebastian Nordholt, Meilof Veeningen
2018/473 (PDF ) A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement Daniele Friolo, Daniel Masny, Daniele Venturi
2018/472 (PDF ) Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei
2018/471 (PDF ) Efficient Range ORAM with $\mathbb{O}(\log^{2}{N})$ Locality Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion
2018/470 (PDF ) The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
2018/469 (PDF ) An Abstract Model of UTxO-based Cryptocurrencies with Scripts Joachim Zahnentferner
2018/468 (PDF ) On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs Yaobin Shen, Lei Wang
2018/467 (PDF ) Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation Nigel P. Smart, Tim Wood
2018/466 (PDF ) A secure end-to-end verifiable e-voting system using zero knowledge based blockchain Somnath Panja, Bimal Kumar Roy
2018/465 (PDF ) A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model Geoffroy Couteau
2018/464 (PDF ) Cryptanalysis of MORUS Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier
2018/463 (PDF ) Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2018/462 (PDF ) Logistic regression over encrypted data from fully homomorphic encryption Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin Lauter
2018/461 (PDF ) Continuous-Source Fuzzy Extractors: Source uncertainty and security Benjamin Fuller, Lowen Peng
2018/460 (PDF ) RapidChain: Scaling Blockchain via Full Sharding Mahdi Zamani, Mahnush Movahedi, Mariana Raykova
2018/459 (PDF ) Revisiting SIOT protocol with new security assumptions Paulo Barreto, Glaucio Oliveira, Waldyr Benits
2018/458 (PDF ) Characterizing Collision and Second-Preimage Resistance in Linicrypt Ian McQuoid, Trevor Swope, Mike Rosulek
2018/457 (PDF ) From FE Combiners to Secure MPC and Back Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
2018/456 (PDF ) An efficient structural attack on NIST submission DAGS Elise Barelli, Alain Couvreur
2018/455 (PDF ) On Renyi Entropies and their Applications to Guessing Attacks in Cryptography Serdar Boztas
2018/454 (PDF ) R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
2018/453 (PDF ) Floppy-Sized Group Signatures from Lattices Cecilia Boschini, Jan Camenisch, Gregory Neven
2018/452 (PDF ) Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2 Panjin Kim, Daewan Han, Kyung Chul Jeong
2018/451 (PDF ) Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model Shuichi Katsumata, Shota Yamada, Takashi Yamakawa
2018/450 (PDF ) From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation David W. Archer, Dan Bogdanov, Liina Kamm, Y. Lindell, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright
2018/449 (PDF ) Key Prediction Security of Keyed Sponges Bart Mennink
2018/448 (PDF ) Non-adaptive Group-Testing Aggregate MAC Scheme Shoichi Hirose, Junji Shikata
2018/447 (PDF ) Improved Distinguisher Search Techniques Based on Parity Sets Xiaofeng Xie, Tian Tian
2018/446 (PDF ) A voting scheme with post-quantum security based on physical laws Hua Dong, Li Yang
2018/445 (PDF ) CRPSF and NTRU Signatures over cyclotomic fields Yang Wang, Mingqiang Wang
2018/444 (PDF ) Founding Cryptography on Smooth Projective Hashing Bing Zeng
2018/443 (PDF ) Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits Rishab Goyal
2018/442 (PDF ) SecureNN: Efficient and Private Neural Network Training Sameer Wagh, Divya Gupta, Nishanth Chandran
2018/441 (PDF ) Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols Amos Beimel, Naty Peter
2018/440 (PDF ) Formal Analysis of Distance Bounding with Secure Hardware Handan Kılınç, Serge Vaudenay
2018/439 (PDF ) Tight Private Circuits: Achieving Probing Security with the Least Refreshing Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain
2018/438 (PDF ) Trivially and Efficiently Composing Masked Gadgets with Probe Isolating Non-Interference Gaëtan Cassiers, François-Xavier Standaert
2018/437 (PDF ) Zero-Knowledge Protocols for Search Problems Ben Berger, Zvika Brakerski
2018/436 (PDF ) Crash-tolerant Consensus in Directed Graph Revisited Ashish Choudhury, Gayathri Garimella, Arpita Patra, Divya Ravi, Pratik Sarkar
2018/435 (PDF ) A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence Bingsheng Zhang, Roman Oliynykov, Hamed Balogun
2018/434 (PDF ) Towards Tight Security of Cascaded LRW2 Bart Mennink
2018/433 (PDF ) Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data Guowen Xu, Hongwei Li
2018/432 (PDF ) Hidden Shift Quantum Cryptanalysis and Implications Xavier Bonnetain, María Naya-Plasencia
2018/430 (PDF ) A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms Faruk Göloğlu, Antoine Joux
2018/429 (PDF ) Amortized Complexity of Information-Theoretically Secure MPC Revisited Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan
2018/428 (PDF ) Differential Fault Analysis of Rectangle-80 Shobhit Sinha, Sandip Karmakar
2018/427 (PDF ) Secure Boot and Remote Attestation in the Sanctum Processor Ilia Lebedev, Kyle Hogan, Srinivas Devadas
2018/426 (PDF ) Adaptively Secure Proxy Re-encryption Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2018/425 (PDF ) Implementing RLWE-based Schemes Using an RSA Co-Processor Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner
2018/424 (PDF ) Circumventing Cryptographic Deniability with Remote Attestation Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan
2018/423 (PDF ) Yes, There is an Oblivious RAM Lower Bound! Kasper Green Larsen, Jesper Buus Nielsen
2018/422 (PDF ) Message-locked Encryption with File Update Suyash Kandele, Souradyuti Paul
2018/421 (PDF ) TFHE: Fast Fully Homomorphic Encryption over the Torus Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2018/420 (PDF ) Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu
2018/419 (PDF ) Homomorphic Secret Sharing: Optimizations and Applications Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù
2018/418 (PDF ) DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, Joel Emer
2018/417 (PDF ) On the Security of Two-Round Multi-Signatures Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs
2018/416 (PDF ) Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers Nadim Kobeissi, Natalia Kulatova
2018/415 (PDF ) Flux: Revisiting Near Blocks for Proof-of-Work Blockchains Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
2018/414 (PDF ) Aggregation of Gamma-Signatures and Applications to Bitcoin Yunlei Zhao
2018/413 (PDF ) Scaling Backend Authentication at Facebook Kevin Lewi, Callen Rain, Stephen Weis, Yueting Lee, Haozhi Xiong, Benjamin Yang
2018/412 (PDF ) PRCash: Fast, Private and Regulated Transactions for Digital Currencies Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun
2018/411 (PDF ) Unsupervised Machine Learning on Encrypted Data Angela Jäschke, Frederik Armknecht
2018/410 (PDF ) Violating Clauser-Horne-Shimony-Holt Inequality Represents Nothing Zhengjun Cao, Zhenfu Cao, Lihua Liu
2018/409 (PDF ) Laconic Function Evaluation and Applications Willy Quach, Hoeteck Wee, Daniel Wichs
2018/408 (PDF ) Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
2018/407 (PDF ) Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu
2018/406 (PDF ) “Larger Keys, Less Complexity” A Strategic Proposition Gideon Samid
2018/405 (PDF ) A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes. Sankhanil Dey, Ranjan Ghosh
2018/404 (PDF ) Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela
2018/403 (PDF ) ABY3: A Mixed Protocol Framework for Machine Learning Payman Mohassel, Peter Rindal
2018/402 (PDF ) Another Look at Relay and Distance-based Attacks in Contactless Payments Ioana Boureanu, Anda Anda
2018/401 (PDF ) Lattice-based Direct Anonymous Attestation (LDAA) Nada EL Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
2018/400 (PDF ) Agreement with Satoshi – On the Formalization of Nakamoto Consensus Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar Weippl
2018/399 (PDF ) On the Feasibility of an ECDLP Algorithm Sergey Grebnev
2018/398 (PDF ) Fun with Bitcoin smart contracts Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino
2018/397 (PDF ) Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
2018/396 (PDF ) New Bleichenbacher Records: Fault Attacks on qDSA Signatures Akira Takahashi, Mehdi Tibouchi, Masayuki Abe
2018/395 (PDF ) Secure Computation with Constant Communication Overhead using Multiplication Embeddings Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen
2018/394 (PDF ) Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited Laasya Bangalore, Ashish Choudhury, Arpita Patra
2018/393 (PDF ) AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM Matvei Kotov, Anton Menshov, Alexander Ushakov
2018/392 (PDF ) Making AES great again: the forthcoming vectorized AES instruction Nir Drucker, Shay Gueron, Vlad Krasnov
2018/391 (PDF ) Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys Romain Gay, Lucas Kowalczyk, Hoeteck Wee
2018/390 (PDF ) MILP-based Differential Attack on Round-reduced GIFT Baoyu Zhu, Xiaoyang Dong, Hongbo Yu
2018/389 (PDF ) Distributed SSH Key Management with Proactive RSA Threshold Signatures Yotam Harchol, Ittai Abraham, Benny Pinkas
2018/388 (PDF ) Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT Seyed Farhad Aghili, Hamid Mala
2018/387 (PDF ) Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida
2018/386 (PDF ) Certificateless Public Key Signature Schemes from Standard Algorithms Zhaohui Cheng, Liqun Chen
2018/385 (PDF ) Cryptographic Hashing From Strong One-Way Functions Justin Holmgren, Alex Lombardi
2018/383 (PDF ) CSIDH: An Efficient Post-Quantum Commutative Group Action Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
2018/382 (PDF ) Revocable Identity-based Encryption from Codes with Rank Metric Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya
2018/381 (PDF ) Masking the GLP Lattice-Based Signature Scheme at Any Order Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi
2018/380 (PDF ) Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution Jonathan Bootle, Andrea Cerulli, Jens Groth, Sune Jakobsen, Mary Maller
2018/379 (PDF ) Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0) Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng
2018/378 (PDF ) Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2018/377 (PDF ) ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement Jing Chen, Sergey Gorbunov, Silvio Micali, Georgios Vlachos
2018/376 (PDF ) Arithmetic Considerations for Isogeny Based Cryptography Joppe W. Bos, Simon Friedberger
2018/375 (PDF ) Witness Indistinguishability for any Single-Round Argument with Applications to Access Control Zvika Brakerski, Yael Tauman Kalai
2018/374 (PDF ) Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions Zhenzhen Bao, Jian Guo, Lei Wang
2018/373 (PDF ) PanORAMa: Oblivious RAM with Logarithmic Overhead Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo
2018/372 (PDF ) Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions) Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen
2018/371 (PDF ) Supersingular isogeny graphs and endomorphism rings: reductions and solutions Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter, Travis Morrison, Christophe Petit
2018/370 (PDF ) Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters A. V. Menyachikhin
2018/369 (PDF ) Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017 Hyung Tae Lee, Huaxiong Wang, Kai Zhang
2018/367 (PDF ) Cache-Timing Attacks on RSA Key Generation Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley
2018/366 (PDF ) Directional Distance-Bounding Identification Protocols Ahmad Ahmadi, Reihaneh Safavi-Naini
2018/365 (PDF ) Anonymous Distance-Bounding Identification Ahmad Ahmadi, Reihaneh Safavi-Naini, Mamunur Akand
2018/364 (PDF ) Perfectly Secure Oblivious Parallel RAM T-H. Hubert Chan, Kartik Nayak, Elaine Shi
2018/363 (PDF ) Private Anonymous Data Access Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs
2018/362 (PDF ) Backdoored Hash Functions: Immunizing HMAC and HKDF Marc Fischlin, Christian Janson, Sogol Mazaheri
2018/361 (PDF ) Two-message Key Exchange with Strong Security from Ideal Lattices Zheng Yang, Yu Chen, Song Luo
2018/360 (PDF ) GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee
2018/358 (PDF ) Efficient Erasable PUFs from Programmable Logic and Memristors Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne Burleson, Omid Kavehei, Marten van Dijk, Damith C. Ranasinghe, Ulrich Rührmair
2018/357 (PDF ) Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas
2018/356 (PDF ) In Praise of Twisted Embeddings Jheyne N. Ortiz, Robson R. de Araujo, Diego F. Aranha, Sueli I. R. Costa, Ricardo Dahab
2018/355 (PDF ) Differential Fault Attacks on Deterministic Lattice Signatures Leon Groot Bruinderink, Peter Pessl
2018/354 (PDF ) Start your ENGINEs: dynamically loadable contemporary crypto Nicola Tuveri, Billy B. Brumley
2018/353 (PDF ) Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions Xin Li
2018/352 (PDF ) Cryptography with Disposable Backdoors Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas
2018/351 (PDF ) A Chosen Plaintext Attack on Offset Public Permutation Mode Miloslav Homer
2018/350 (PDF ) The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk
2018/349 (PDF ) An Analysis of the NIST SP 800-90A Standard Joanne Woodage, Dan Shumow
2018/348 (PDF ) Monero Ring Attack: Recreating Zero Mixin Transaction Effect Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu
2018/347 (PDF ) 3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval Stanislaw Jarecki, Boyang Wei
2018/346 (PDF ) Collusion Resistant Traitor Tracing from Learning with Errors Rishab Goyal, Venkata Koppula, Brent Waters
2018/345 (PDF ) In-region Authentication Mamunur Rashid Akand, Reihaneh Safavi-Naini
2018/344 (PDF ) Nothing Refreshes Like a RePSI: Reactive Private Set Intersection Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
2018/343 (PDF ) Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments Duc Viet Le, Mahimna Kelkar, Aniket Kate
2018/342 (PDF ) MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth Ralph Ankele, Florian Böhl, Simon Friedberger
2018/341 (PDF ) Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj
2018/340 (PDF ) Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures Johannes Blömer, Jan Bobolz
2018/339 (PDF ) Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme Thomas Debris-Alazard, Jean-Pierre Tillich
2018/338 (PDF ) Quantum FHE (Almost) As Secure As Classical Zvika Brakerski
2018/337 (PDF ) Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent Marc Fischlin, Patrick Harasser
2018/336 (PDF ) SoK: The Problem Landscape of SIDH David Urbanik, David Jao
2018/335 (PDF ) Fast modular squaring with AVX512IFMA Nir Drucker, Shay Gueron
2018/334 (PDF ) Impossible Differential Attack on QARMA Family of Block Ciphers Dong Yang, Wen-feng Qi, Hua-jin Chen
2018/333 (PDF ) Breaking the Circuit-Size Barrier in Secret Sharing Tianren Liu, Vinod Vaikuntanathan
2018/332 (PDF ) Differential Cryptanalysis of Round-Reduced Sparx-64/128 Ralph Ankele, Eik List
2018/331 (PDF ) Estimate all the {LWE, NTRU} schemes! Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer
2018/330 (PDF ) Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang
2018/329 (PDF ) Symbolic Side-Channel Analysis for Probabilistic Programs Pasquale Malacaria, MHR. Khouzani, Corina S. Păsăreanu, Quoc-Sang Phan, Kasper Luckow
2018/328 (PDF ) Improved High-Order Conversion From Boolean to Arithmetic Masking Luk Bettale, Jean-Sebastien Coron, Rina Zeitoun
2018/327 (PDF ) A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System Zhengjun Cao, Lihua Liu
2018/325 (PDF ) Multi-power Post-quantum RSA John M. Schanck
2018/324 (PDF ) ACPC: Efficient revocation of pseudonym certificates using activation codes Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
2018/323 (PDF ) PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2018/322 (PDF ) DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
2018/321 (PDF ) Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2018/320 (PDF ) General State Channel Networks Stefan Dziembowski, Sebastian Faust, Kristina Hostáková
2018/319 (PDF ) HydRand: Practical Continuous Distributed Randomness Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
2018/318 (PDF ) Practical attacks against the Walnut digital signature scheme Ward Beullens, Simon R. Blackburn
2018/317 (PDF ) Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock Dor Fledel, Avishai Wool
2018/316 (PDF ) Non-Malleable Secret Sharing Vipul Goyal, Ashutosh Kumar
2018/315 (PDF ) Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, François-Xavier Standaert
2018/314 (PDF ) Secure top most significant genome variants search: iDASH 2017 competition Sergiu Carpov, Thibaud Tortech
2018/313 (PDF ) On the cost of computing isogenies between supersingular elliptic curves Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez
2018/312 (PDF ) Multilinear maps via secret ring Chunsheng Gu
2018/311 (PDF ) DeepSigns: A Generic Watermarking Framework for Protecting the Ownership of Deep Learning Models Bita Darvish Rouhani, Huili Chen, farinaz Koushanfar
2018/310 (PDF ) Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017 Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi
2018/308 (PDF ) On perfectly secure 2PC in the OT-hybrid model Bar Alon, Anat Paskin-Cherniavsky
2018/307 (PDF ) Isolated Curves and the MOV Attack Travis Scholl
2018/306 (PDF ) State Separation for Code-Based Game-Playing Proofs Chris Brzuska, Antoine Delignat-Lavaud, Cedric Fournet, Konrad Kohbrok, Markulf Kohlweiss
2018/305 (PDF ) Efficient four-dimensional GLV curve with high security Olivier Bernard, Renaud Dubois, Simon Masson
2018/304 (PDF ) Geosocial Query with User-Controlled Privacy Peizhao Hu, Sherman S. M. Chow, Asma Aloufi
2018/303 (PDF ) 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State Bernardo David, Rafael Dowsley, Mario Larangeira
2018/302 (PDF ) Rethinking Large-Scale Consensus Rafael Pass, Elaine Shi
2018/301 (PDF ) On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
2018/300 (PDF ) Outsourcing Modular Exponentiation in Cryptographic Web Applications Pascal Mainini, Rolf Haenni
2018/299 (PDF ) Clusters of Re-used Keys Stephen Farrell
2018/298 (PDF ) In search of CurveSwap: Measuring elliptic curve implementations in the wild Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger
2018/297 (PDF ) Fine-Grained Secure Computation Matteo Campanelli, Rosario Gennaro
2018/296 (PDF ) Asynchronous ratcheted key exchange Bertram Poettering, Paul Rösler
2018/295 (PDF ) ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers (Revised Version) Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta
2018/294 (PDF ) Learning strikes again: the case of the DRS signature scheme Léo Ducas, Yang Yu
2018/293 (PDF ) Privacy Amplification from Non-malleable Codes Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2018/292 (PDF ) Linear Biases in AEGIS Keystream Brice Minaud
2018/291 (PDF ) Simulations of Optical Emissions for Attacking AES and Masked AES Guido Marco Bertoni, Lorenzo Grassi, Filippo Melzani
2018/290 (PDF ) Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min (Jerry) Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati
2018/289 (PDF ) Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue Phillipp Schoppmann, Lennart Vogelsang, Adrià Gascón, Borja Balle
2018/288 (PDF ) Constant Size Traceable Ring Signature Scheme without Random Oracles Ke Gu, Na Wu
2018/287 (PDF ) Secure Cloud Storage Scheme Based On Hybrid Cryptosystem Atanu Basu, Indranil Sengupta
2018/286 (PDF ) AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT Björn Haase, Benoît Labrique
2018/285 (PDF ) Collateral Damage of Facebook Applications: a Comprehensive Study Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel
2018/284 (PDF ) Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang
2018/283 (PDF ) Homomorphic Rank Sort Using Surrogate Polynomials Gizem S. Çetin, Berk Sunar
2018/282 (PDF ) Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol Jason LeGrow, David Jao, Reza Azarderakhsh
2018/281 (PDF ) Upgrading to Functional Encryption Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters
2018/280 (PDF ) Updatable and Universal Common Reference Strings with Applications to zk-SNARKs Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers
2018/279 (PDF ) Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs
2018/278 (PDF ) Mixed-radix Naccache-Stern encryption Rémi Géraud, David Naccache
2018/277 (PDF ) Approximate and Probabilistic Differential Privacy Definitions Sebastian Meiser
2018/276 (PDF ) How to Record Quantum Queries, and Applications to Quantum Indifferentiability Mark Zhandry
2018/275 (PDF ) Lattice-Based zk-SNARKs from Square Span Programs Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
2018/274 (PDF ) G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions Rachid El Bansarkhani, Rafael Misoczki
2018/273 (PDF ) Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More Prabhanjan Ananth, Xiong Fan, Elaine Shi
2018/272 (PDF ) Multi-Theorem Preprocessing NIZKs from Lattices Sam Kim, David J. Wu
2018/271 (PDF ) MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public Borching Su
2018/270 (PDF ) A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later Douglas R. Stinson
2018/269 (PDF ) Vault: Fast Bootstrapping for the Algorand Cryptocurrency Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich
2018/268 (PDF ) Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead Michael Raskin, Mark Simkin
2018/267 (PDF ) A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies Patrick Longa
2018/266 (PDF ) Authenticated key exchange for SIDH Steven D. Galbraith
2018/265 (PDF ) Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Maire O’Neill
2018/264 (PDF ) Security proof for Quantum Key Recycling with noise Daan Leermakers, Boris Skoric
2018/262 (PDF ) Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies Joachim Zahnentferner
2018/261 (PDF ) Post-Quantum EPID Signatures from Symmetric Primitives Dan Boneh, Saba Eskandarian, Ben Fisch
2018/260 (PDF ) MDS Matrices with Lightweight Circuits Sébastien Duval, Gaëtan Leurent
2018/259 (PDF ) The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption Zheng Yang, Kimmo Järvinen
2018/258 (PDF ) Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
2018/257 (PDF ) On Quantum Indifferentiability Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, Dominique Unruh
2018/256 (PDF ) QC-MDPC: A Timing Attack and a CCA2 KEM Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
2018/255 (PDF ) Topology-Hiding Computation Beyond Semi-Honest Adversaries Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
2018/254 (PDF ) Logistic Regression Model Training based on the Approximate Homomorphic Encryption Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon
2018/253 (PDF ) Capsule: A Protocol for Secure Collaborative Document Editing Nadim Kobeissi
2018/252 (PDF ) The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract Yongge Wang, Qutaibah m. Malluhi
2018/251 (PDF ) VeritasDB: High Throughput Key-Value Store with Integrity Rohit Sinha, Mihai Christodorescu
2018/250 (PDF ) Making Public Key Functional Encryption Function Private, Distributively Xiong Fan, Qiang Tang
2018/249 (PDF ) Analysis of Deutsch-Jozsa Quantum Algorithm Zhengjun Cao, Lihua Liu
2018/248 (PDF ) Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži, Aggelos Kiayias, Alexander Russell
2018/247 (PDF ) Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz
2018/246 (PDF ) Universally Verifiable MPC with Applications to IRV Ballot Counting Chris Culnane, Olivier Pereira, Kim Ramchen, Vanessa Teague
2018/245 (PDF ) Secure Search via Multi-Ring Fully Homomorphic Encryption Adi Akavia, Dan Feldman, Hayim Shaul
2018/244 (PDF ) Faster Homomorphic Linear Transformations in HElib Shai Halevi, Victor Shoup
2018/243 (PDF ) A New Approach to Deanonymization of Unreachable Bitcoin Nodes Indra Deep Mastan, Souradyuti Paul
2018/242 (PDF ) A New Constant-size Accountable Ring Signature Scheme Without Random Oracles Sudhakar Kumawat, Souradyuti Paul
2018/241 (PDF ) zkLedger: Privacy-Preserving Auditing for Distributed Ledgers Neha Narula, Willy Vasquez, Madars Virza
2018/240 (PDF ) Towards Non-Interactive Zero-Knowledge for NP from LWE Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki
2018/239 (PDF ) RepuCoin: Your Reputation is Your Power Jiangshan Yu, David Kozhaya, Jeremie Decouchant, Paulo Esteves-Verissimo
2018/238 (PDF ) Private Set Intersection with Linear Communication from General Assumptions Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2018/237 (PDF ) On Tightly Secure Non-Interactive Key Exchange Julia Hesse, Dennis Hofheinz, Lisa Kohl
2018/236 (PDF ) Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network Yuval Marcus, Ethan Heilman, Sharon Goldberg
2018/235 (PDF ) Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds Julian Loss, Tal Moran
2018/234 (PDF ) P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations Hagen Sparka, Florian Tschorsch, Björn Scheuermann
2018/233 (PDF ) Privacy-Preserving Logistic Regression Training Charlotte Bonte, Frederik Vercauteren
2018/232 (PDF ) Improved fully homomorphic public-key encryption with small ciphertext size Masahiro Yagisawa
2018/231 (PDF ) The Violation of Bell's Inequality Represents Nothing Zhengjun Cao, Lihua Liu
2018/230 (PDF ) Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM Jan-Pieter D’Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren
2018/229 (PDF ) Optimizing polynomial convolution for NTRUEncrypt Wei Dai, William Whyte, Zhenfei Zhang
2018/228 (PDF ) Non-interactive zaps of knowledge Georg Fuchsbauer, Michele Orrù
2018/227 (PDF ) Can We Overcome the $n \log n$ Barrier for Oblivious Sorting? Wei-Kai Lin, Elaine Shi, Tiancheng Xie
2018/226 (PDF ) Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models Sandro Coretti, Yevgeniy Dodis, Siyao Guo
2018/225 (PDF ) A foundation for secret, verifiable elections Ben Smyth
2018/224 (PDF ) Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin
2018/223 (PDF ) Shorter double-authentication preventing signatures for small address spaces Bertram Poettering
2018/222 (PDF ) Authentication with weaker trust assumptions for voting systems Elizabeth A. Quaglia, Ben Smyth
2018/221 (PDF ) Bandwidth-Hard Functions: Reductions and Lower Bounds Jeremiah Blocki, Peiyuan Liu, Ling Ren, Samson Zhou
2018/220 (PDF ) PRO-ORAM: Constant Latency Read-Only Oblivious RAM Shruti Tople, Yaoqi Jia, Prateek Saxena
2018/219 (PDF ) On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin
2018/218 (PDF ) On Evaluating Fault Resilient Encoding Schemes in Software Jakub Breier, Xiaolu Hou, Yang Liu
2018/217 (PDF ) Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction Mihir Bellare, Wei Dai
2018/216 (PDF ) Secure Computation with Low Communication from Cross-checking S. Dov Gordon, Samuel Ranellucci, Xiao Wang
2018/215 (PDF ) Towards everlasting privacy and efficient coercion resistance in remote electronic voting Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang
2018/214 (PDF ) RMAC -- A Lightweight Authentication Protocol for Highly Constrained IoT Devices Ahmad Khoureich Ka
2018/213 (PDF ) Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack I. Stewart, D. Ilie, A. Zamyatin, S. Werner, M. F. Torshizi, W. J. Knottenbelt
2018/212 (PDF ) How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan
2018/211 (PDF ) Number "Not Used" Once - Practical fault attack on pqm4 implementations of NIST candidates Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2018/210 (PDF ) A Simple Obfuscation Scheme for Pattern-Matching with Wildcards Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
2018/209 (PDF ) CALYPSO: Private Data Management for Decentralized Ledgers Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Linus Gasser, Philipp Jovanovic, Ewa Syta, Bryan Ford
2018/208 (PDF ) TinyKeys: A New Approach to Efficient Multi-Party Computation Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2018/207 (PDF ) Non-Malleable Codes for Small-Depth Circuits Marshall Ball, Dana Dachman-Soled, Siyao Guo, Tal Malkin, Li-Yang Tan
2018/206 (PDF ) Reading in the Dark: Classifying Encrypted Digits with Functional Encryption Edouard Dufour-Sans, Romain Gay, David Pointcheval
2018/205 (PDF ) Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time Thaddeus Dryja, Quanquan C. Liu, Sunoo Park
2018/204 (PDF ) Short Non-Malleable Codes from Related-Key Secure Block Ciphers Serge Fehr, Pierre Karpman, Bart Mennink
2018/203 (PDF ) Impeccable Circuits Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider
2018/202 (PDF ) Doing Real Work with FHE: The Case of Logistic Regression Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup
2018/201 (PDF ) Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers Jim Basilakis, Bahman Javadi
2018/200 (PDF ) Hermes. A framework for cryptographically assured access control and data security Eugene Pilyankevich, Ignat Korchagin, Andrey Mnatsakanov
2018/199 (PDF ) Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
2018/198 (PDF ) A Key-recovery Attack on 855-round Trivium Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
2018/197 (PDF ) Green Mining: toward a less energetic impact of cryptocurrencies Philippe Jacquet, Bernard Mans
2018/196 (PDF ) Non-Profiled Deep Learning-Based Side-Channel Attacks Benjamin Timon
2018/195 (PDF ) Breach-Resistant Structured Encryption Ghous Amjad, Seny Kamara, Tarik Moataz
2018/194 (PDF ) Proofs of Catalytic Space Krzysztof Pietrzak
2018/193 (PDF ) A New Family of Pairing-Friendly elliptic curves Michael Scott, Aurore Guillevic
2018/192 (PDF ) SoK: unraveling Bitcoin smart contracts Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino
2018/191 (PDF ) Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
2018/190 (PDF ) New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption Sikhar Patranabis, Debdeep Mukhopadhyay
2018/189 (PDF ) Threshold Implementation in Software - Case Study of PRESENT Pascal Sasdrich, René Bock, Amir Moradi
2018/188 (PDF ) Kissing numbers and transference theorems from generalized tail bounds Stephen D. Miller, Noah Stephens-Davidowitz
2018/187 (PDF ) Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model Sean Bowe, Ariel Gabizon
2018/186 (PDF ) RKHD ElGamal signing and 1-way sums Daniel R. L. Brown
2018/185 (PDF ) A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
2018/184 (PDF ) Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI Yongjun Zhao, Sherman S. M. Chow
2018/183 (PDF ) Simple Proofs of Sequential Work Bram Cohen, Krzysztof Pietrzak
2018/182 (PDF ) Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES Lorenzo Grassi, Christian Rechberger
2018/181 (PDF ) Rasta: A cipher with low ANDdepth and few ANDs per bit Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger
2018/180 (PDF ) Two-Round Multiparty Secure Computation Minimizing Public Key Operations Sanjam Garg, Peihan Miao, Akshayaram Srinivasan
2018/179 (PDF ) Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations Ken Goss, Wei Jiang
2018/177 (PDF ) On the Use of Independent Component Analysis to Denoise Side-Channel Measurements Houssem Maghrebi, Emmanuel Prouff
2018/176 (PDF ) Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability Kamil Kluczniak, Man Ho Au
2018/175 (PDF ) Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys Vincent Grosso
2018/174 (PDF ) A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers Chen-Dong Ye, Tian Tian
2018/173 (PDF ) Vectorizing Higher-Order Masking Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, Ko Stoffelen
2018/172 (PDF ) A First-Order SCA Resistant AES without Fresh Randomness Felix Wegener, Amir Moradi
2018/171 (PDF ) On the Complexity of Simulating Auxiliary Input Yi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao
2018/170 (PDF ) On the Ring-LWE and Polynomial-LWE problems Miruna Rosca, Damien Stehlé, Alexandre Wallet
2018/169 (PDF ) Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method Srimanta Bhattacharya, Mridul Nandi
2018/168 (PDF ) Statistical Witness Indistinguishability (and more) in Two Messages Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
2018/167 (PDF ) On the Existence of Three Round Zero-Knowledge Proofs Nils Fleischhacker, Vipul Goyal, Abhishek Jain
2018/166 (PDF ) Optimal Forgeries Against Polynomial-Based MACs and GCM Atul Luykx, Bart Preneel
2018/165 (PDF ) The Wonderful World of Global Random Oracles Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven
2018/164 (PDF ) An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge Pavel Hubáček, Alon Rosen, Margarita Vald
2018/163 (PDF ) OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
2018/162 (PDF ) Untagging Tor: A Formal Treatment of Onion Encryption Jean Paul Degabriele, Martijn Stam
2018/161 (PDF ) Boomerang Connectivity Table: A New Cryptanalysis Tool Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2018/160 (PDF ) DelegaTEE: Brokered Delegation Using Trusted Execution Environments Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
2018/159 (PDF ) The Missing Difference Problem, and its Applications to Counter Mode Encryption Gaëtan Leurent, Ferdinand Sibleyras
2018/158 (PDF ) Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin
2018/157 (PDF ) ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement Bernardo David, Rafael Dowsley, Mario Larangeira
2018/156 (PDF ) A New Approach to Black-Box Concurrent Secure Computation Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
2018/155 (PDF ) Memory Lower Bounds of Reductions Revisited Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/154 (PDF ) Constrained PRFs for NC1 in Traditional Groups Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2018/153 (PDF ) Bootstrapping for Approximate Homomorphic Encryption Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
2018/152 (PDF ) A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim
2018/151 (PDF ) Adaptively Secure Garbling with Near Optimal Online Complexity Sanjam Garg, Akshayaram Srinivasan
2018/150 (PDF ) Analysis of Error-Correcting Codes for Lattice-Based Key Exchange Tim Fritzmann, Thomas Pöppelmann, Johanna Sepulveda
2018/149 (PDF ) Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation Ilan Komargodski, Eylon Yogev
2018/148 (PDF ) The Complexity of Multiparty PSM Protocols and Related Models Amos Beimel, Eyal Kushilevitz, Pnina Nissim
2018/147 (PDF ) Sustained Space Complexity Joel Alwen, Jeremiah Blocki, Krzysztof Pietrzak
2018/146 (PDF ) Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices Léo Ducas, Cécile Pierrot
2018/145 (PDF ) Fast Near Collision Attack on the Grain v1 Stream Cipher Bin Zhang, Chao Xu, Willi Meier
2018/144 (PDF ) The Communication Complexity of Private Simultaneous Messages, Revisited Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz
2018/143 (PDF ) Conjecturally Superpolynomial Lower Bound for Share Size Shahram Khazaei
2018/142 (PDF ) MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC Rui Zong, Xiaoyang Dong
2018/141 (PDF ) Symbolic security of garbled circuits Baiyu Li, Daniele Micciancio
2018/140 (PDF ) A Reaction Attack on LEDApkc Tomas Fabsic, Viliam Hromada, Pavol Zajac
2018/138 (PDF ) But Why does it Work? A Rational Protocol Design Treatment of Bitcoin Christian Badertscher, Juan Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2018/137 (PDF ) Naor-Reingold Goes Public: The Complexity of Known-key Security Pratik Soni, Stefano Tessaro
2018/136 (PDF ) Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds Priyanka Bose, Viet Tung Hoang, Stefano Tessaro
2018/135 (PDF ) A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT Daniel Jost, Christian Badertscher, Fabio Banfi
2018/134 (PDF ) A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem Ayan Mahalanobis, Vivek Mallick
2018/133 (PDF ) Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
2018/132 (PDF ) On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields Gora Adj, Omran Ahmadi, Alfred Menezes
2018/131 (PDF ) Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum
2018/130 (PDF ) SMT-based Cube Attack on Simeck32/64 Mojtaba Zaheri, Babak Sadeghiyan
2018/129 (PDF ) Multi-mode Cryptocurrency Systems Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou
2018/128 (PDF ) Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation Charanjit S. Jutla
2018/127 (PDF ) Accountability in Security Protocols Robert Künnemann, Deepak Garg, Michael Backes
2018/126 (PDF ) Onion-AE: Foundations of Nested Encryption Phillip Rogaway, Yusi Zhang
2018/125 (PDF ) Challenges in cyber security - Ransomware Phenomenon Pasca Vlad-Raul, Simion Emil
2018/124 (PDF ) Evaluating the indistinguishability of the XTS mode in the proposed security model Nguyen Tuan Anh, Nguyen Bui Cuong
2018/123 (PDF ) Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode) Howard M. Heys
2018/122 (PDF ) BitML: A Calculus for Bitcoin Smart Contracts Massimo Bartoletti, Roberto Zunino
2018/121 (PDF ) ECC mod 8^91+5 Daniel R. L. Brown
2018/120 (PDF ) Efficient Circuit-based PSI via Cuckoo Hashing Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder
2018/119 (PDF ) Drive-by Key-Extraction Cache Attacks from Portable Code Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
2018/118 (PDF ) Updatable Encryption with Post-Compromise Security Anja Lehmann, Bjoern Tackmann
2018/117 (PDF ) An Improved RNS Variant of the BFV Homomorphic Encryption Scheme Shai Halevi, Yuriy Polyakov, Victor Shoup
2018/116 (PDF ) Unbounded ABE via Bilinear Entropy Expansion, Revisited Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee
2018/115 (PDF ) An Improved Affine Equivalence Algorithm for Random Permutations Itai Dinur
2018/114 (PDF ) Offline Assisted Group Key Exchange Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
2018/113 (PDF ) Classification of Balanced Quadratic Functions Lauren De Meyer, Begül Bilgin
2018/112 (PDF ) Just in Time Hashing Benjamin Harsha, Jeremiah Blocki
2018/111 (PDF ) MRHS Solver Based on Linear Algebra and Exhaustive Search Håvard Raddum, Pavol Zajac
2018/110 (PDF ) Rank Analysis of Cubic Multivariate Cryptosystems John Baena, Daniel Cabarcas, Daniel Escudero, Karan Khathuria, Javier Verbel
2018/109 (PDF ) NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck
2018/108 (PDF ) Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains F. Betül Durak, Serge Vaudenay
2018/107 (PDF ) Towards Practical Lattice-Based One-Time Linkable Ring Signatures Carsten Baum, Huang Lin, Sabine Oechsner
2018/106 (PDF ) On the Gold Standard for Security of Universal Steganography Sebastian Berndt, Maciej Liśkiewicz
2018/105 (PDF ) Combining Private Set-Intersection with Secure Two-Party Computation Michele Ciampi, Claudio Orlandi
2018/104 (PDF ) PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus Yonatan Sompolinsky, Shai Wyborski, Aviv Zohar
2018/103 (PDF ) Decomposition of Permutations in a Finite Field Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/102 (PDF ) Grafting Trees: a Fault Attack against the SPHINCS framework Laurent Castelnovi, Ange Martinelli, Thomas Prest
2018/101 (PDF ) A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin
2018/100 (PDF ) A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples Hart Montgomery
2018/099 (PDF ) Improved Bounds on the Threshold Gap in Ramp Secret Sharing Ignacio Cascudo, Jaron Skovsted Gundersen, Diego Ruano
2018/098 (PDF ) How to Reveal the Secrets of an Obscure White-Box Implementation Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang
2018/097 (PDF ) Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2 Andrea Visconti, Federico Gorla
2018/096 (PDF ) Paralysis Proofs: Secure Access-Structure Updates for Cryptocurrencies and More Fan Zhang, Philip Daian, Gabriel Kaptchuk, Iddo Bentov, Ian Miers, Ari Juels
2018/095 (PDF ) Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage Cees-Bart Breunesse, Ilya Kizhvatov, Ruben Muijrers, Albert Spruyt
2018/094 (PDF ) Parameterization of Edwards curves on the rational field Q with given torsion subgroups Linh Tung Vo
2018/093 (PDF ) Statistical Attacks on Cookie Masking for RC4 Kenneth G. Paterson, Jacob C. N. Schuldt
2018/092 (PDF ) Constructions of S-boxes with uniform sharing Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/091 (PDF ) Polynomial multiplication over binary finite fields: new upper bounds Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo
2018/090 (PDF ) Secure and Scalable Multi-User Searchable Encryption Cédric Van Rompay, Refik Molva, Melek Önen
2018/089 (PDF ) The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
2018/088 (PDF ) Fully homomorphic public-key encryption with small ciphertext size Masahiro Yagisawa
2018/087 (PDF ) (Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
2018/086 (PDF ) Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform Claude Carlet, Xi Chen
2018/085 (PDF ) Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version) Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin
2018/084 (PDF ) Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher Gideon Samid
2018/083 (PDF ) Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017 Maki Yoshida, Satoshi Obana
2018/082 (PDF ) Synchronized Aggregate Signatures from the RSA Assumption Susan Hohenberger, Brent Waters
2018/081 (PDF ) How to validate the secret of a Ring Learning with Errors (RLWE) key Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough
2018/080 (PDF ) A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling, Kenneth G. Paterson
2018/079 (PDF ) Progressive lattice sieving Thijs Laarhoven, Artur Mariano
2018/078 (PDF ) A Systematic Approach To Cryptocurrency Fees Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
2018/077 (PDF ) On the Bit Security of Cryptographic Primitives Daniele Micciancio, Michael Walter
2018/076 (PDF ) EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread Daniel Dinu, Ilya Kizhvatov
2018/075 (PDF ) MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang
2018/074 (PDF ) Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang
2018/073 (PDF ) GAZELLE: A Low Latency Framework for Secure Neural Network Inference Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
2018/072 (PDF ) Template-based Fault Injection Analysis of Block Ciphers Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay
2018/071 (PDF ) SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas
2018/070 (PDF ) A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures Craig Gentry, Adam O'Neill, Leonid Reyzin
2018/069 (PDF ) Reusing Nonces in Schnorr Signatures Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud
2018/068 (PDF ) Simple Schnorr Multi-Signatures with Applications to Bitcoin Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille
2018/067 (PDF ) Homomorphic Lower Digits Removal and Improved FHE Bootstrapping Hao Chen, Kyoohyung Han
2018/066 (PDF ) Tweaking Generic OTR to Avoid Forgery Attacks Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
2018/065 (PDF ) Non-Locality in Interactive Proofs Claude Crépeau, Nan Yang
2018/064 (PDF ) Systematization Of A 256-Bit Lightweight Block Cipher Marvin Sukanya Saha, Krishnendu Rarhi, Abhishek Bhattacharya
2018/063 (PDF ) The Viability of Post-quantum X.509 Certificates Panos Kampanakis, Peter Panburana, Ellie Daw, Daniel Van Geest
2018/062 (PDF ) Countermeasures against a side-channel attack in a kernel memory Na-Young Ahn, Dong Hoon Lee
2018/061 (PDF ) Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption Pratish Datta, Tatsuaki Okamoto, Junichi Tomida
2018/060 (PDF ) A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks Abhinav Aggarwal, Yue Guo
2018/059 (PDF ) New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC Chen-Dong Ye, Tian Tian
2018/058 (PDF ) Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
2018/057 (PDF ) Efficient Noninteractive Certification of RSA Moduli and Beyond Sharon Goldberg, Leonid Reyzin, Omar Sagga, Foteini Baldimtsi
2018/056 (PDF ) SETLA: Signature and Encryption from Lattices François Gérard, Keno Merckx
2018/055 (PDF ) High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl
2018/054 (PDF ) More Efficient (Almost) Tightly Secure Structure-Preserving Signatures Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan
2018/053 (PDF ) Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database Emmanuel Prouff, Remi Strullu, Ryad Benadjila, Eleonora Cagli, Cecile Dumas
2018/052 (PDF ) Optimizing Trees for Static Searchable Encryption Mohammad Etemad, Mohammad Mahmoody, David Evans
2018/051 (PDF ) Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis, John C. Mitchell
2018/050 (PDF ) A Constructive Perspective on Signcryption Security Christian Badertscher, Fabio Banfi, Ueli Maurer
2018/049 (PDF ) Attacks and Countermeasures for White-box Designs Alex Biryukov, Aleksei Udovenko
2018/048 (PDF ) Impossible Differential Cryptanalysis on Deoxys-BC-256 Alireza mehrdad, Farokhlagha Moazami, Hadi Soleimany
2018/047 (PDF ) The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA Boris Ryabko, Aleksandr Soskov
2018/046 (PDF ) Scalable, transparent, and post-quantum secure computational integrity Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, Michael Riabzev
2018/045 (PDF ) Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials Jonathan Bootle, Jens Groth
2018/044 (PDF ) Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka
2018/043 (PDF ) Efficient Adaptively Secure Zero-knowledge from Garbled Circuits Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar
2018/042 (PDF ) Improved (Almost) Tightly-Secure Structure-Preserving Signatures Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
2018/041 (PDF ) Related Randomness Security for Public Key Encryption, Revisited Takahiro Matsuda, Jacob C. N. Schuldt
2018/040 (PDF ) An Analysis of Acceptance Policies For Blockchain Transactions Seb Neumayer, Mayank Varia, Ittay Eyal
2018/039 (PDF ) Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography Gregor Seiler
2018/038 (PDF ) On the Message Complexity of Secure Multiparty Computation Yuval Ishai, Manika Mittal, Rafail Ostrovsky
2018/037 (PDF ) Weakly Secure Equivalence-Class Signatures from Standard Assumptions Georg Fuchsbauer, Romain Gay
2018/036 (PDF ) Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs Peter Scholl
2018/035 (PDF ) A Linearly Homomorphic Signature Scheme From Weaker Assumptions Lucas Schabhüser, Johannes Buchmann, Patrick Struck
2018/034 (PDF ) Constant-size Group Signatures from Lattices San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2018/033 (PDF ) Two-Factor Password-Authenticated Key Exchange with End-to-End Password Security Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2018/031 (PDF ) Secure Remote Attestation Markus Jakobsson
2018/030 (PDF ) Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu
2018/029 (PDF ) Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018/028 (PDF ) Compact Energy and Delay-Aware Authentication Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
2018/027 (PDF ) A verifiable shuffle for the GSW cryptosystem Martin Strand
2018/026 (PDF ) Zero-Knowledge Proof of Decryption for FHE Ciphertexts Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand
2018/025 (PDF ) Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
2018/024 (PDF ) KEM Combiners Federico Giacon, Felix Heuer, Bertram Poettering
2018/023 (PDF ) Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups Benedikt Auerbach, Mihir Bellare, Eike Kiltz
2018/022 (PDF ) Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices Ali El Kaafarani, Shuichi Katsumata
2018/021 (PDF ) Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography Yu Chen, Baodong Qin, Haiyang Xue
2018/020 (PDF ) Ciphertext-Only Attacks against Compact-LWE Submitted to NIST PQC Project Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
2018/019 (PDF ) Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. Daniel P. Martin, Luke Mather, Elisabeth Oswald
2018/018 (PDF ) Multi-Key Searchable Encryption, Revisited Ariel Hamlin, abhi shelat, Mor Weiss, Daniel Wichs
2018/017 (PDF ) Verifiability of Helios Mixnet Ben Smyth
2018/016 (PDF ) New Techniques for Public Key Encryption with Sender Recovery Murali Godi, Roopa Vishwanathan
2018/015 (PDF ) On Composable Security for Digital Signatures Christian Badertscher, Ueli Maurer, Björn Tackmann
2018/014 (PDF ) Ubiquitous Weak-key Classes of BRW-polynomial Function Kaiyan Zheng, Peng Wang, Dingfeng Ye
2018/013 (PDF ) Hashing solutions instead of generating problems: On the interactive certification of RSA moduli Benedikt Auerbach, Bertram Poettering
2018/012 (PDF ) An Inside Job: Remote Power Analysis Attacks on FPGAs Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
2018/011 (PDF ) Graded Encoding Schemes from Obfuscation Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
2018/010 (PDF ) Interactively Secure Groups from Obfuscation Thomas Agrikola, Dennis Hofheinz
2018/009 (PDF ) Evaluation of Resilience of randomized RNS implementation Jérôme Courtois, Lokman Abbas-Turki, Jean-Claude Bajard
2018/008 (PDF ) Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems Yu-Ao Chen, Xiao-Shan Gao
2018/007 (PDF ) An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks Qiong Huang, Hongbo Li
2018/006 (PDF ) Higher Order Side-Channel Attacks Resilient S-boxes Liran Lerman, Stjepan Picek, Nikita Veshchikov, Olivier Markowitch
2018/005 (PDF ) Simple and Efficient Two-Server ORAM S. Dov Gordon, Jonathan Katz, Xiao Wang
2018/004 (PDF ) On the Performance of Convolutional Neural Networks for Side-channel Analysis Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay
2018/003 (PDF ) How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior Moni Naor, Benny Pinkas, Eyal Ronen
2018/002 (PDF ) The Multiplicative Complexity of 6-variable Boolean Functions Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
2018/001 (PDF ) On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate Benny Applebaum, Barak Arkis
2017/1262 (PDF ) A New Index Calculus Algorithm for the Elliptic Curve Discrete Logarithm Problem and Summation Polynomial Evaluation Gary McGuire, Daniela Mueller
2017/1261 (PDF ) A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates Sachin Kumar, Jawad Haj-Yahya, Mustafa Khairallah, Mahmoud A. Elmohr, Anupam Chattopadhyay
2017/1260 (PDF ) Collision Resistant Hashing from Sub-exponential Learning Parity with Noise Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li
2017/1259 (PDF ) Cryptanalysis of HK17 Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
2017/1258 (PDF ) Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project Yongge Wang, Qutaibah m. Malluhi
2017/1257 (PDF ) A first-order chosen-plaintext DPA attack on the third round of DES Oscar Reparaz, Benedikt Gierlichs
2017/1256 (PDF ) A Universally Composable Treatment of Network Time Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia
2017/1255 (PDF ) On the Strategy and Behavior of Bitcoin Mining with N-attackers Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia
2017/1254 (PDF ) Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savaş
2017/1253 (PDF ) Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors Yann Le Corre, Johann Großschädl, Daniel Dinu
2017/1252 (PDF ) Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids Jacqueline Brendel, Marc Fischlin, Felix Günther
2017/1251 (PDF ) A toolbox for software optimization of QC-MDPC code-based cryptosystems Nir Drucker, Shay Gueron
2017/1250 (PDF ) Non-Interactive Delegation for Low-Space Non-Deterministic Computation Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs
2017/1249 (PDF ) Quantum cryptanalysis on some Generalized Feistel Schemes Xiaoyang Dong, Zheng Li, Xiaoyun Wang
2017/1248 (PDF ) Foundations of Homomorphic Secret Sharing Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, Stefano Tessaro
2017/1247 (PDF ) Block encryption of quantum messages Min Liang, Li Yang
2017/1246 (PDF ) Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus Alessandro Cilardo, Andrea Primativo
2017/1245 (PDF ) IntegriKey: End-to-End Integrity Protection of User Input Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun
2017/1244 (PDF ) Corrections to ''Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity'' Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng
2017/1243 (PDF ) Augmented Black-Box Simulation and Zero Knowledge Argument for NP Li Hongda, Pan Dongxue, Ni Peifang
2017/1242 (PDF ) Designing Proof of Transaction Puzzles for Cryptocurrency Taotao Li, Parhat Abla, Mingsheng Wang, Qianwen Wei
2017/1241 (PDF ) A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus) Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu
2017/1240 (PDF ) UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks Mridula Singh, Patrick Leu, Srdjan Capkun
2017/1239 (PDF ) An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie
2017/1238 (PDF ) Efficient Oblivious Data Structures for Database Services on the Cloud Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, Attila A. Yavuz
2017/1237 (PDF ) A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services Thang Hoang, Attila A. Yavuz, Jorge Guajardo
2017/1236 (PDF ) Fast Quantum Algorithm for Solving Multivariate Quadratic Equations Jean-Charles Faugère, Kelsey Horan, Delaram Kahrobaei, Marc Kaplan, Elham Kashefi, Ludovic Perret
2017/1235 (PDF ) Practical Quantum-Safe Voting from Lattices Rafaël del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
2017/1234 (PDF ) High-Precision Privacy-Preserving Real-Valued Function Evaluation Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric
2017/1233 (PDF ) Provably secure compilation of side-channel countermeasures Gilles Barthe, Benjamin Grégoire, Vincent Laporte
2017/1232 (PDF ) Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants Motahhareh Gharahi, Shahram Khazaei
2017/1231 (PDF ) Integer Reconstruction Public-Key Encryption Houda Ferradi, David Naccache
2017/1230 (PDF ) Overdrive: Making SPDZ Great Again Marcel Keller, Valerio Pastro, Dragos Rotaru
2017/1229 (PDF ) Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions Akinori Hosoyamada, Yu Sasaki
2017/1228 (PDF ) Speed-ups and time-memory trade-offs for tuple lattice sieving Gottfried Herold, Elena Kirshanova, Thijs Laarhoven
2017/1227 (PDF ) VerMI: Verification Tool for Masked Implementations Victor Arribas, Svetla Nikova, Vincent Rijmen
2017/1226 (PDF ) New (and Old) Proof Systems for Lattice Problems Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz
2017/1225 (PDF ) Fast Garbling of Circuits over 3-Valued Logic Yehuda Lindell, Avishay Yanai
2017/1224 (PDF ) Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017 Keita Xagawa
2017/1223 (PDF ) Generic Low-Latency Masking in Hardware Hannes Gross, Rinat Iusupov, Roderick Bloem
2017/1222 (PDF ) Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search Muslum Ozgur Ozmen, Thang Hoang, Attila A. Yavuz
2017/1221 (PDF ) Weak-Unforgeable Tags for Secure Supply Chain Management Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr
2017/1220 (PDF ) Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change Lynn Batten, Xun Yi
2017/1219 (PDF ) Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations Subhabrata Samajder, Palash Sarkar
2017/1218 (PDF ) TERMinator Suite: Benchmarking Privacy-Preserving Architectures Dimitris Mouris, Nektarios Georgios Tsoutsos, Michail Maniatakos
2017/1217 (PDF ) Linear Regression Side Channel Attack Applied on Constant XOR Shan Fu, Zongyue Wang, Fanxing Wei, Guoai Xu, An Wang
2017/1216 (PDF ) Probabilistic and Considerate Attestation of IoT Devices against Roving Malware Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik
2017/1215 (PDF ) Lattice-Based Public Key Searchable Encryption from Experimental Perspectives Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz
2017/1214 (PDF ) HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
2017/1213 (PDF ) On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic Michael Meyer, Steffen Reith, Fabio Campos
2017/1212 (PDF ) A New Crypto-Classifier Service for Energy Efficiency in Smart Cities Oana Stan, Mohamed-Haykel Zayani, Renaud Sirdey, Amira Ben Hamida, Alessandro Ferreira Leite, Mallek Mziou-Sallami
2017/1211 (PDF ) Zero-Sum Partitions of PHOTON Permutations Qingju Wang, Lorenzo Grassi, Christian Rechberger
2017/1210 (PDF ) Two-Face: New Public Key Multivariate Schemes Gilles Macario-Rat, Jacques Patarin
2017/1209 (PDF ) Improvements for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo, Xuejia Lai
2017/1208 (PDF ) Security notions for cloud storage and deduplication Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum
2017/1207 (PDF ) Unconditionally secure multi-party quantum commitment scheme Mingqiang Wang, Xue Wang, Tao Zhan
2017/1206 (PDF ) Asymptotically faster quantum algorithms to solve multivariate quadratic equations Daniel J. Bernstein, Bo-Yin Yang
2017/1205 (PDF ) Connecting Legendre with Kummer and Edwards Sabyasachi Karati, Palash Sarkar
2017/1204 (PDF ) Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version) Erick Nascimento, Lukasz Chmielewski
2017/1203 (PDF ) Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More David Derler, Sebastian Ramacher, Daniel Slamanig
2017/1202 (PDF ) Faster Cryptographic Hash Function From Supersingular Isogeny Graphs Javad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
2017/1201 (PDF ) Collusion Resistant Watermarking Schemes for Cryptographic Functionalities Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
2017/1200 (PDF ) MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box Lorenzo Grassi
2017/1199 (PDF ) Quantum Key-recovery Attack on Feistel Structures Xiaoyang Dong, Xiaoyun Wang
2017/1198 (PDF ) Computing isogenies between Montgomery curves using the action of (0,0) Joost Renes
2017/1197 (PDF ) Reassessing Security of Randomizable Signatures David Pointcheval, Olivier Sanders
2017/1196 (PDF ) Post-Quantum Secure Remote Password Protocol from RLWE Problem Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
2017/1195 (PDF ) CAPA: The Spirit of Beaver against Physical Attacks Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
2017/1194 (PDF ) Improved Differential Cryptanalysis on Generalized Feistel Schemes Ivan Tjuawinata, Tao Huang, Hongjun Wu
2017/1193 (PDF ) Rhythmic Keccak: SCA Security and Low Latency in HW Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen
2017/1192 (PDF ) Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu
2017/1191 (PDF ) Data Is a Stream: Security of Stream-Based Channels Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson
2017/1190 (PDF ) EPIC: Efficient Private Image Classification (or: Learning from the Masters) Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren
2017/1189 (PDF ) Return Of Bleichenbacher's Oracle Threat (ROBOT) Hanno Böck, Juraj Somorovsky, Craig Young
2017/1188 (PDF ) Signature Schemes with a Fuzzy Private Key Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
2017/1187 (PDF ) On the Round Complexity of OT Extension Sanjam Garg, Mohammad Mahmoody, Daniel Masny, Izaak Meckler
2017/1186 (PDF ) On Multiparty Garbling of Arithmetic Circuits Aner Ben-Efraim
2017/1185 (PDF ) Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage Jintai Ding, Scott Fluhrer, Saraswathy RV
2017/1184 (PDF ) EFLASH: A New Multivariate Encryption Scheme Ryann Cartor, Daniel Smith-Tone
2017/1183 (PDF ) Round2: KEM and PKE based on GLWR Hayo Baan, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Zhenfei Zhang
2017/1182 (PDF ) Distributed Algorithms Made Secure: A Graph Theoretic Approach Merav Parter, Eylon Yogev
2017/1181 (PDF ) Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang
2017/1180 (PDF ) FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang, Jakub Szefer, Ruben Niederhagen
2017/1179 (PDF ) On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials Claude Carlet, Stjepan Picek
2017/1178 (PDF ) Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu
2017/1177 (PDF ) Reusable Authentication from the Iris Benjamin Fuller, Sailesh Simhadri, James Steel
2017/1176 (PDF ) Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks Amin Rezaei, Yuanqi Shen, Shuyu Kong, Jie Gu, Hai Zhou
2017/1175 (PDF ) Short Solutions to Nonlinear Systems of Equations Alan Szepieniec, Bart Preneel
2017/1174 (PDF ) Efficient Optimal Ate Pairing at 128-bit Security Level Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera
2017/1173 (PDF ) Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction Osmanbey Uzunkol, Öznur Kalkar, İsa Sertkaya
2017/1172 (PDF ) A Note on Stream Ciphers that Continuously Use the IV Matthias Hamann, Matthias Krause, Willi Meier
2017/1171 (PDF ) Attacks on the AJPS Mersenne-based cryptosystem Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf
2017/1170 (PDF ) SAT-based Bit-flipping Attack on Logic Encryptions Yuanqi Shen, Amin Rezaei, Hai Zhou
2017/1169 (PDF ) There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting David Berend, Bernhard Jungk, Shivam Bhasin
2017/1168 (PDF ) Itsuku: a Memory-Hardened Proof-of-Work Scheme Fabien Coelho, Arnaud Larroche, Baptiste Colin
2017/1167 (PDF ) Cryptocurrency Voting Games Sanjay Bhattacherjee, Palash Sarkar
2017/1166 (PDF ) SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers Jakub Breier, Dirmanto Jap, Shivam Bhasin
2017/1165 (PDF ) Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security Megha Byali, Arpita Patra, Divya Ravi, Pratik Sarkar
2017/1164 (PDF ) Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
2017/1163 (PDF ) MILP-aided Cryptanalysis of Round Reduced ChaCha Najwa Aaraj, Florian Caullery, Marc Manzano
2017/1162 (PDF ) Kayawood, a Key Agreement Protocol Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2017/1161 (PDF ) A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes. Sankhanil Dey, Ranjan Ghosh
2017/1160 (PDF ) A Practical Cryptanalysis of WalnutDSA Daniel Hart, DoHoon Kim, Giacomo Micheli, Guillermo Pascual Perez, Christophe Petit, Yuxuan Quek
2017/1159 (PDF ) Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals Gu Chunsheng
2017/1158 (PDF ) Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM Thang Hoang, Attila A. Yavuz, Betul F. Durak, Jorge Guajardo
2017/1157 (PDF ) ARM2GC: Succinct Garbled Processor for Secure Computation Ebrahim M Songhori, M Sadegh Riazi, Siam U Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
2017/1156 (PDF ) Two-Round Multiparty Secure Computation from Minimal Assumptions Sanjam Garg, Akshayaram Srinivasan
2017/1155 (PDF ) A Survey and Refinement of Repairable Threshold Schemes Thalia M. Laing, Douglas R. Stinson
2017/1154 (PDF ) Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives David Derler, Sebastian Ramacher, Daniel Slamanig
2017/1153 (PDF ) Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, Ari Juels
2017/1152 (PDF ) Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption Catherine Meadows
2017/1151 (PDF ) Shorter Linear Straight-Line Programs for MDS Matrices Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer
2017/1150 (PDF ) SWiM: Secure Wildcard Pattern Matching From OT Extension Vladimir Kolesnikov, Mike Rosulek, Ni Trieu
2017/1149 (PDF ) Improved Cryptanalysis of HFEv- via Projection Jintai Ding, Ray Perlner, Albrecht Petzoldt, Daniel Smith-Tone
2017/1148 (PDF ) Improvements to the Linear Operations of LowMC: A Faster Picnic Daniel Kales, Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
2017/1147 (PDF ) Under Pressure: Security of Caesar Candidates beyond their Guarantees Serge Vaudenay, Damian Vizár
2017/1146 (PDF ) A Zero-Knowledge Version of vSQL Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/1145 (PDF ) vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/1144 (PDF ) How Far Can We Reach? Breaking Masked AES Smartcard Implementation Using One Trace Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage
2017/1143 (PDF ) Faster key compression for isogeny-based cryptosystems Gustavo H. M. Zanon, Marcos A. Simplicio Jr, Geovandro C. C. F. Pereira, Javad Doliskani, Paulo S. L. M. Barreto
2017/1142 (PDF ) PIR with compressed queries and amortized query processing Sebastian Angel, Hao Chen, Kim Laine, Srinath Setty
2017/1141 (PDF ) Cryptanalysis of Bivium using a Boolean all solution solver Virendra Sule, Anmol Yadav
2017/1140 (PDF ) Lattice Klepto: Turning Post-Quantum Crypto Against Itself Robin Kwant, Tanja Lange, Kimberley Thissen
2017/1139 (PDF ) Decoding Linear Codes with High Error Rate and its Impact for LPN Security Leif Both, Alexander May
2017/1138 (PDF ) The Parallel Repetition of Non-Signaling Games: Counterexamples and Dichotomy Justin Holmgren, Lisa Yang
2017/1137 (PDF ) Note on the Robustness of CAESAR Candidates Daniel Kales, Maria Eichlseder, Florian Mendel
2017/1136 (PDF ) Clustering Related-Tweak Characteristics: Application to MANTIS-6 Maria Eichlseder, Daniel Kales
2017/1135 (PDF ) On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt
2017/1134 (PDF ) Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs Jeroen Delvaux
2017/1133 (PDF ) Sentiment Protocol: A Decentralized Protocol Leveraging Crowd Sourced Wisdom Anton Muehlemann
2017/1132 (PDF ) Doubly-efficient zkSNARKs without trusted setup Riad S. Wahby, Ioanna Tzialla, abhi shelat, Justin Thaler, Michael Walfish
2017/1131 (PDF ) A Certain Family of Subgroups of $\mathbb Z_n^\star$ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption Mikhail Anokhin
2017/1130 (PDF ) Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio Daniel Jost, Ueli Maurer, Joao L. Ribeiro
2017/1129 (PDF ) Probabilistic solution of Yao's millionaires' problem Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
2017/1128 (PDF ) Forward Secure Efficient Group Signature in Dynamic Setting using Lattices Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
2017/1127 (PDF ) On the Leakage Resilience of Ring-LWE Based Public Key Encryption Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
2017/1126 (PDF ) Privacy Games for Syntactic Privacy Notions Robin Ankele, Andrew Simpson
2017/1125 (PDF ) k-Round MPC from k-Round OT via Garbled Interactive Circuits Fabrice Benhamouda, Huijia Lin
2017/1124 (PDF ) A formal model of Bitcoin transactions Nicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino
2017/1123 (PDF ) Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs Cecilia Boschini, Jan Camenisch, Gregory Neven
2017/1122 (PDF ) On post-processing in the quantum algorithm for computing short discrete logarithms Martin Ekerå
2017/1121 (PDF ) Differential Attacks on LILLIPUT Cipher Valérie Nachef, Nicolas Marrière, Emmanuel Volte
2017/1120 (PDF ) A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage David Cash, Cong Zhang
2017/1119 (PDF ) Detection of cryptographic algorithms with grap Léonard Benedetti, Aurélien Thierry, Julien Francq
2017/1118 (PDF ) Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman
2017/1117 (PDF ) Risky Traitor Tracing and New Differential Privacy Negative Results Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters
2017/1116 (PDF ) A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
2017/1115 (PDF ) Hardware Aspects of Montgomery Modular Multiplication Colin D. Walter
2017/1114 (PDF ) Fast Homomorphic Evaluation of Deep Discretized Neural Networks Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
2017/1113 (PDF ) The Discrete-Logarithm Problem with Preprocessing Henry Corrigan-Gibbs, Dmitry Kogan
2017/1112 (PDF ) Manifold Learning Towards Masking Implementations: A First Study Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng
2017/1111 (PDF ) Fuzzy Password-Authenticated Key Exchange Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov
2017/1110 (PDF ) A Systematic Evaluation of Profiling Through Focused Feature Selection Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina
2017/1109 (PDF ) EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation for Machine Learning Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi
2017/1108 (PDF ) Cryptographic Pairings Kristin Lauter, Michael Naehrig
2017/1107 (PDF ) Hardness of Non-Interactive Differential Privacy from One-Way Functions Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Daniel Wichs
2017/1106 (PDF ) Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version) Weijin Wang, Yu Qin, Jingbin Liu, Dengguo Feng
2017/1105 (PDF ) FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang
2017/1104 (PDF ) Efficient provable-secure NTRUEncrypt over any cyclotomic field Yang Wang, Mingqiang Wang
2017/1103 (PDF ) A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a Vahid Amin Ghafari, Honggang Hu
2017/1102 (PDF ) ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
2017/1101 (PDF ) HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
2017/1100 (PDF ) IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang
2017/1099 (PDF ) Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method Sadegh Jamshidpour, Zahra Ahmadian
2017/1098 (PDF ) The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage David Pouliot, Scott Griffy, Charles V. Wright
2017/1097 (PDF ) Non-malleable Randomness Encoders and their Applications Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2017/1096 (PDF ) IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
2017/1095 (PDF ) Analysis of the Bitcoin UTXO set Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
2017/1094 (PDF ) Privately Constraining and Programming PRFs, the LWE Way Chris Peikert, Sina Shiehian
2017/1093 (PDF ) Proposal for Protocol on a Quorum Blockchain with Zero Knowledge Thomas Espel, Laurent Katz, Guillaume Robin
2017/1092 (PDF ) Universally Composable Secure Computation with Corrupted Tokens Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
2017/1091 (PDF ) Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers
2017/1090 (PDF ) Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels
2017/1089 (PDF ) Secure Deduplication of Encrypted Data: Refined Model and New Constructions Jian Liu, Li Duan, Yong Li, N. Asokan
2017/1088 (PDF ) Promise Zero Knowledge and its Applications to Round Optimal MPC Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
2017/1087 (PDF ) General purpose integer factoring Arjen K. Lenstra
2017/1086 (PDF ) Order-Revealing Encryption: File-Injection Attack and Forward Security Xingchen Wang, Yunlei Zhao
2017/1085 (PDF ) Improving Side-channel Analysis through Semi-supervised Learning Stjepan Picek, Annelie Heuser, Alan Jovic, Karlo Knezevic, Tania Richmond
2017/1084 (PDF ) Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version) Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim
2017/1083 (PDF ) CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization Zhi Chen, Junjie Shen, Alex Nicolau, Alex Veidenbaum, Nahid Farhady Ghalaty, Rosario Cammarota
2017/1082 (PDF ) Instruction Duplication: Leaky and Not Too Fault-Tolerant! Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers
2017/1081 (PDF ) The Montgomery and Joye Powering Ladders are Dual Colin D. Walter
2017/1080 (PDF ) Quantum Lightning Never Strikes the Same State Twice Mark Zhandry
2017/1079 (PDF ) Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack Andreas Wiemers, Dominik Klein
2017/1078 (PDF ) The Tao of Inference in Privacy-Protected Databases Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov
2017/1077 (PDF ) A New Generalization of the KMOV Cryptosystem Maher Boudabra, Abderrahmane Nitaj
2017/1076 (PDF ) A generalized attack on RSA type cryptosystems Martin Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2017/1075 (PDF ) XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi
2017/1074 (PDF ) A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20 S V Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi
2017/1073 (PDF ) One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin
2017/1072 (PDF ) Settling the mystery of $Z_r=r$ in RC4 Sabyasachi Dey, Santanu Sarkar
2017/1071 (PDF ) Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks Le Dong, Yongxia Mao
2017/1070 (PDF ) The Transaction Graph for Modeling Blockchain Semantics Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolić
2017/1069 (PDF ) Non-Malleability vs. CCA-Security: The Case of Commitments Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp
2017/1068 (PDF ) Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data Marie-Sarah Lacharité, Kenneth G. Paterson
2017/1067 (PDF ) Regulating Storage Overhead in Existing PoW-based Blockchains Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li
2017/1066 (PDF ) Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell
2017/1064 (PDF ) An Algebraic Approach to Maliciously Secure Private Set Intersection Satrajit Ghosh, Tobias Nilges
2017/1063 (PDF ) Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (Full Version) Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
2017/1062 (PDF ) Towards Breaking the Exponential Barrier for General Secret Sharing Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
2017/1061 (PDF ) Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2017/1060 (PDF ) Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding Raphael Bost, Pierre-Alain Fouque
2017/1059 (PDF ) CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite Lijing Zhou, Licheng Wang, Yiru Sun
2017/1058 (PDF ) Optimal Key Consensus in Presence of Noise Zhengzhong Jin, Yunlei Zhao
2017/1057 (PDF ) Montgomery Arithmetic from a Software Perspective Joppe W. Bos, Peter L. Montgomery
2017/1056 (PDF ) Round-Optimal Secure Multi-Party Computation Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2017/1055 (PDF ) Cellular Automata Based S-boxes Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic
2017/1054 (PDF ) On the security of another CRC based ultralightweight RFID authentication protocol Seyed Farhad Aghili, Hamid Mala
2017/1053 (PDF ) A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity' Gilles Barthe, François Dupressoir, Benjamin Grégoire
2017/1052 (PDF ) Early Detection and Analysis of Leakage Abuse Vulnerabilities Charles V. Wright, David Pouliot
2017/1051 (PDF ) A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
2017/1050 (PDF ) Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model Sean Bowe, Ariel Gabizon, Ian Miers
2017/1049 (PDF ) A Practical Implementation of Identity-Based Encryption over NTRU Lattices Sarah McCarthy, Neil Smyth, Elizabeth O’Sullivan
2017/1048 (PDF ) Non-malleable Codes against Lookahead Tampering Divya Gupta, Hemanta K. Maji, Mingyuan Wang
2017/1047 (PDF ) Consolidating Inner Product Masking Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
2017/1046 (PDF ) Approximate Thumbnail Preserving Encryption Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, Rakesh B. Bobba
2017/1045 (PDF ) Tightly-Secure PAK(E) José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Šala, Marjan Škrobot
2017/1044 (PDF ) Strain: A Secure Auction for Blockchains Erik-Oliver Blass, Florian Kerschbaum
2017/1043 (PDF ) An E-voting Protocol Based on Blockchain Yi Liu, Qi Wang
2017/1042 (PDF ) On one-round reliable message transmission René Bødker Christensen
2017/1041 (PDF ) Compact Zero-Knowledge Proofs of Small Hamming Weight Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin
2017/1039 (PDF ) Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones Muslum Ozgur Ozmen, Attila A. Yavuz
2017/1038 (PDF ) Embedded Proofs for Verifiable Neural Networks Hervé Chabanne, Julien Keuffer, Refik Molva
2017/1037 (PDF ) DAGS: Key Encapsulation using Dyadic GS Codes Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
2017/1036 (PDF ) Rotational-XOR Cryptanalysis of Reduced-round SPECK Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur
2017/1035 (PDF ) Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications Tassos Dimitriou
2017/1034 (PDF ) Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy Sebastian Meiser, Esfandiar Mohammadi
2017/1033 (PDF ) Foundations of Differentially Oblivious Algorithms T-H. Hubert Chan, Kai-Min Chung, Bruce Maggs, Elaine Shi
2017/1032 (PDF ) Performing Computations on Hierarchically Shared Secrets Giulia Traverso, Denise Demirel, Johannes Buchmann
2017/1031 (PDF ) Lightweight Design Choices for LED-like Block Ciphers Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay
2017/1030 (PDF ) New MILP Modeling: Improved Conditional Cube Attacks on Keccak-based Constructions Ling Song, Jian Guo, Danping Shi, San Ling
2017/1029 (PDF ) Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge Pyrros Chaidos, Geoffroy Couteau
2017/1028 (PDF ) Cryptanalysis of 1-Round KECCAK Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda AlKhzaimi
2017/1027 (PDF ) Eliminating Variables in Boolean Equation Systems Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus
2017/1025 (PDF ) Rounded Gaussians -- Fast and Secure Constant-Time Sampling for Lattice-Based Crypto Andreas Hülsing, Tanja Lange, Kit Smeets
2017/1024 (PDF ) Revisiting a Masked Lookup-Table Compression Scheme Srinivas Vivek
2017/1023 (PDF ) Several Masked Implementations of the Boyar-Peralta AES S-Box Ashrujit Ghoshal, Thomas De Cnudde
2017/1022 (PDF ) Direct Anonymous Attestation from Lattices Rachid El Bansarkhani, Ali El Kaafarani
2017/1021 (PDF ) Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
2017/1020 (PDF ) A Novel Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li
2017/1019 (PDF ) Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin
2017/1018 (PDF ) A Fair Protocol for Data Trading Based on Bitcoin Transactions Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart\'ı
2017/1017 (PDF ) Differential Cryptanalysis of 18-Round PRIDE Virginie Lallemand, Shahram Rasoolzadeh
2017/1016 (PDF ) Differentially Private Access Patterns in Secure Computation Sahar Mazloom, S. Dov Gordon
2017/1015 (PDF ) A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol Armando Faz-Hernández, Julio López, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2017/1014 (PDF ) Attacking Deterministic Signature Schemes using Fault Attacks Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler
2017/1013 (PDF ) Homomorphic SIM$^2$D Operations: Single Instruction Much More Data Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2017/1012 (PDF ) Conditional Cube Attack on Round-Reduced River Keyak Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang
2017/1011 (PDF ) Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption Eduard Hauck, Julian Loss
2017/1009 (PDF ) Architecture level Optimizations for Kummer based HECC on FPGAs Gabriel Gallin, Turku Ozlum Celik, Arnaud Tisserand
2017/1008 (PDF ) Automatic Characterization of Exploitable Faults: A Machine Learning Approach Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta
2017/1007 (PDF ) Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys Herman Galteland, Kristian Gjøsteen
2017/1006 (PDF ) Round and Communication Efficient Unconditionally-secure MPC with $t < n/3$ in Partially Synchronous Network Ashish Choudhury, Arpita Patra, Divya Ravi
2017/1005 (PDF ) Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa
2017/1004 (PDF ) Garbled Protocols and Two-Round MPC from Bilinear Maps Sanjam Garg, Akshayaram Srinivasan
2017/1003 (PDF ) Secure Multi-Party Computation in Large Networks Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia, Mahdi Zamani
2017/1002 (PDF ) On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo
2017/1001 (PDF ) Impossibility of Order-Revealing Encryption in Idealized Models Mark Zhandry, Cong Zhang
2017/1000 (PDF ) No right to remain silent: Isolating Malicious Mixes Hemi Leibowitz, Ania Piotrowska, George Danezis, Amir Herzberg
2017/999 (PDF ) Shortest Vector from Lattice Sieving: a Few Dimensions for Free Léo Ducas
2017/998 (PDF ) A Comparative Investigation of Approximate Attacks on Logic Encryptions Yuanqi Shen, Amin Rezaei, Hai Zhou
2017/997 (PDF ) Hash Proof Systems over Lattices Revisited Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach
2017/996 (PDF ) Large FHE gates from Tensored Homomorphic Accumulator Guillaume Bonnoron, Léo Ducas, Max Fillinger
2017/995 (PDF ) A signature scheme from Learning with Truncation Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
2017/994 (PDF ) Separable Statistics and Multidimensional Linear Cryptanalysis S. Fauskanger, I. Semaev
2017/993 (PDF ) A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
2017/992 (PDF ) Leakage Bounds for Gaussian Side Channels Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank Gürkaynak, Michael Muehlberghuber
2017/991 (PDF ) Secure Code Updates for Smart Embedded Devices based on PUFs Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, Xiaobo Chu, Dengguo Feng
2017/990 (PDF ) Bounds on Differential and Linear Branch Number of Permutations Sumanta Sarkar, Habeeb Syed
2017/989 (PDF ) Decentralized Multi-Client Functional Encryption for Inner Product Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2017/988 (PDF ) On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers Yusong Du, Baodian Wei
2017/987 (PDF ) Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption Fuyuki Kitagawa, Keisuke Tanaka
2017/986 (PDF ) On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves Kirsten Eisentraeger, Sean Hallgren, Travis Morrison
2017/985 (PDF ) Breaking Ed25519 in WolfSSL Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella
2017/984 (PDF ) Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks Marc Fischlin, Sogol Mazaheri
2017/983 (PDF ) Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee
2017/982 (PDF ) Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet Katriel Cohn-Gordon, Cas Cremers
2017/981 (PDF ) Efficient Maliciously Secure Multiparty Computation for RAM Marcel Keller, Avishay Yanai
2017/980 (PDF ) Yoyo Tricks with AES Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth
2017/979 (PDF ) Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
2017/978 (PDF ) New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny
2017/977 (PDF ) Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations Akinori Hosoyamada, Yu Sasaki
2017/976 (PDF ) Improvements for Gate-Hiding Garbled Circuits Mike Rosulek
2017/975 (PDF ) Differential Attacks on Deterministic Signatures Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray
2017/974 (PDF ) Obscuro: A Bitcoin Mixer using Trusted Execution Environments Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena
2017/973 (PDF ) Symmetric Searchable Encryption with Sharing and Unsharing Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2017/972 (PDF ) Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
2017/971 (PDF ) A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation Abdelrahaman Aly, Sara Cleemput
2017/970 (PDF ) A New Functional Encryption for Multidimensional Range Query Jia Xu, Ee-Chien Chang, Jianying Zhou
2017/969 (PDF ) Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation Bei Liang, Aikaterini Mitrokotsa
2017/968 (PDF ) Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls Sarani Bhattacharya, Clementine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay
2017/967 (PDF ) Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan
2017/966 (PDF ) Optimal Parameters for XMSS^MT Andreas Hülsing, Lea Rausch, Johannes Buchmann
2017/965 (PDF ) WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes Andreas Hülsing
2017/964 (PDF ) Recursive ORAMs with Practical Constructions Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2017/963 (PDF ) Non-Interactive Proofs of Proof-of-Work Aggelos Kiayias, Andrew Miller, Dionysis Zindros
2017/962 (PDF ) Hard and Easy Problems for Supersingular Isogeny Graphs Christophe Petit, Kristin Lauter
2017/961 (PDF ) An Offline Dictionary Attack against zkPAKE Protocol Jose Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot
2017/960 (PDF ) Unforgeable Quantum Encryption Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2017/959 (PDF ) Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
2017/958 (PDF ) Two-Message, Oblivious Evaluation of Cryptographic Functionalities Nico Döttling, Nils Fleischhacker, Johannes Krupp, Dominique Schröder
2017/957 (PDF ) From Selective IBE to Full IBE and Selective HIBE Nico Döttling, Sanjam Garg
2017/956 (PDF ) Threshold Cryptosystems From Threshold Fully Homomorphic Encryption Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai
2017/955 (PDF ) Towards Practical Privacy-Preserving Genome-Wide Association Study Charlotte Bonte, Eleftheria Makri, Amin Ardeshirdavani, Jaak Simm, Yves Moreau, Frederik Vercauteren
2017/954 (PDF ) Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency---Choose Two Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
2017/953 (PDF ) Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures George Teseleanu
2017/952 (PDF ) Secure Two-Party Computation with Fairness -- A Necessary Design Principle Yehuda Lindell, Tal Rabin
2017/951 (PDF ) Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber
2017/950 (PDF ) Blockwise $p$-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners Saeed Mahloujifar, Mohammad Mahmoody
2017/949 (PDF ) Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann
2017/948 (PDF ) Evolving Secret Sharing: Dynamic Thresholds and Robustness Ilan Komargodski, Anat Paskin-Cherniavsky
2017/947 (PDF ) Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2017/946 (PDF ) The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks Fermi Ma, Mark Zhandry
2017/945 (PDF ) Moderately Hard Functions: Definition, Instantiations, and Applications Joël Alwen, Björn Tackmann
2017/944 (PDF ) A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models Susumu Kiyoshima, Huijia Lin, Muthuramakrishnan Venkitasubramaniam
2017/943 (PDF ) When does Functional Encryption Imply Obfuscation? Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
2017/942 (PDF ) On Secure Two-Party Computation in Three Rounds Prabhanjan Ananth, Abhishek Jain
2017/940 (PDF ) Linear Secret-Sharing Schemes for Forbidden Graph Access Structures Amos Beimel, Oriol Farràs, Yuval Mintz, Naty Peter
2017/939 (PDF ) Towards Optimal Pre-processing in Leakage Detection Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
2017/938 (PDF ) On the security of the WOTS-PRF signature scheme Philip Lafrance, Alfred Menezes
2017/937 (PDF ) Random Oracles and Non-Uniformity Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John Steinberger
2017/936 (PDF ) A tight security reduction in the quantum random oracle model for code-based signature schemes André Chailloux, Thomas Debris-Alazard
2017/935 (PDF ) Overcoming Cryptographic Impossibility Results using Blockchains Rishab Goyal, Vipul Goyal
2017/934 (PDF ) Adaptively Indistinguishable Garbled Circuits Zahra Jafargholi, Alessandra Scafuro, Daniel Wichs
2017/933 (PDF ) Improving Stateless Hash-Based Signatures Jean-Philippe Aumasson, Guillaume Endignoux
2017/932 (PDF ) Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin
2017/931 (PDF ) Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2017/930 (PDF ) Four-state Non-malleable Codes with Explicit Constant Rate Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2017/929 (PDF ) How to Securely Compute with Noisy Leakage in Quasilinear Complexity Dahmun Goudarzi, Antoine Joux, Matthieu Rivain
2017/928 (PDF ) Environmental Authentication in Malware Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bulent Yener
2017/927 (PDF ) Near-Optimal Secret Sharing and Error Correcting Codes in AC0 Kuan Cheng, Yuval Ishai, Xin Li
2017/926 (PDF ) How to Construct a Leakage-Resilient (Stateless) Trusted Party Daniel Genkin, Yual Ishai, Mor Weiss
2017/925 (PDF ) Resettably-Sound Resettable Zero Knowledge in Constant Rounds Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
2017/924 (PDF ) Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
2017/923 (PDF ) Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension Long Chen, Zhenfeng Zhang, Xueqing Wang
2017/922 (PDF ) On the impossibility of entropy reversal, and its application to zero-knowledge proofs Shachar Lovett, Jiapeng Zhang
2017/921 (PDF ) RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero Shi-Feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu
2017/920 (PDF ) Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2017/919 (PDF ) Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing Oriol Farràs, Tarik Kaced, Sebastià Martín, Carles Padró
2017/918 (PDF ) Linear Repairing Codes and Side-Channel Attacks Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff
2017/917 (PDF ) A practical, perfectly secure password scheme in the bounded retrieval model Moses Liskov
2017/916 (PDF ) A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
2017/915 (PDF ) Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work Lisa Eckey, Sebastian Faust, Julian Loss
2017/914 (PDF ) Cache-Oblivious and Data-Oblivious Sorting and Applications T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
2017/913 (PDF ) Thunderella: Blockchains with Optimistic Instant Confirmation Rafael Pass, Elaine Shi
2017/912 (PDF ) On Two Round Rerunnable MPC Protocols Paul Laird
2017/911 (PDF ) Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs Vincent Immler, Matthias Hiller, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh
2017/910 (PDF ) Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC) Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey
2017/909 (PDF ) Clarifying the subset-resilience problem Jean-Philippe Aumasson, Guillaume Endignoux
2017/908 (PDF ) Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings Ivan Damgård, Claudio Orlandi, Mark Simkin
2017/907 (PDF ) On the differential equivalence of APN functions Anastasiya Gorodilova
2017/906 (PDF ) Notes On GGH13 Without The Presence Of Ideals Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet--Mary
2017/905 (PDF ) Shorter Ring Signatures from Standard Assumptions Alonso González
2017/904 (PDF ) On Iterative Collision Search for LPN and Subset Sum Srinivas Devadas, Ling Ren, Hanshen Xiao
2017/903 (PDF ) On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments Omer Paneth, Guy N. Rothblum
2017/902 (PDF ) How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors Essam Ghadafi
2017/901 (PDF ) Stateful Multi-Client Verifiable Computation Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
2017/900 (PDF ) Proof of a shuffle for lattice-based cryptography (Full version) Núria Costa, Ramiro Martínez, Paz Morillo
2017/899 (PDF ) Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement Bernardo David, Rafael Dowsley, Mario Larangeira
2017/898 (PDF ) Putting Wings on SPHINCS Stefan Kölbl
2017/897 (PDF ) Formal Verification of Masked Hardware Implementations in the Presence of Glitches Roderick Bloem, Hannes Gross, Rinat Iusupov, Bettina Könighofer, Stefan Mangard, Johannes Winter
2017/896 (PDF ) Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks Ashokkumar C, M. Bhargav Sri Venkatesh, Ravi Prakash Giri, Bernard Menezes
2017/895 (PDF ) Linear Cryptanalysis of DES with Asymmetries Andrey Bogdanov, Philip S. Vejre
2017/894 (PDF ) An Efficient Pairing-Based Shuffle Argument Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac
2017/893 (PDF ) Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin
2017/892 (PDF ) The Iterated Random Function Problem Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi
2017/891 (PDF ) Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D. Richard Kuhn, Raghu Kacker
2017/890 (PDF ) On the One-Per-Message Unforgeability of (EC)DSA and its Variants Manuel Fersch, Eike Kiltz, Bertram Poettering
2017/889 (PDF ) On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2) Alexander Maximov, Helena Sjoberg
2017/888 (PDF ) Asynchronous provably-secure hidden services Philippe Camacho, Fernando Krell
2017/887 (PDF ) Succinct Spooky Free Compilers Are Not Black Box Sound Zvika Brakerski, Yael Tauman Kalai, Renen Perlman
2017/886 (PDF ) Compression for trace zero points on twisted Edwards curves Giulia Bianco, Elisa Gorla
2017/885 (PDF ) PermuteRam: Optimizing Oblivious Computation for Efficiency Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang
2017/884 (PDF ) Scalar multiplication in compressed coordinates in the trace-zero subgroup Giulia Bianco, Elisa Gorla
2017/883 (PDF ) Strengthening the Security of Encrypted Databases: Non-Transitive JOINs Ilya Mironov, Gil Segev, Ido Shahaf
2017/882 (PDF ) Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms Baptiste Olivier, Tony Quertier
2017/881 (PDF ) Möbius: Trustless Tumbling for Transaction Privacy Sarah Meiklejohn, Rebekah Mercer
2017/880 (PDF ) Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version) Danielle Morgan, Arnis Parsovs
2017/879 (PDF ) Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations Jean-Sebastien Coron
2017/878 (PDF ) Raziel: Private and Verifiable Smart Contracts on Blockchains David Cerezo Sánchez
2017/877 (PDF ) Identity-Based Format-Preserving Encryption Mihir Bellare, Viet Tung Hoang
2017/876 (PDF ) All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE Benoit Libert, Amin Sakzad, Damien Stehle, Ron Steinfeld
2017/875 (PDF ) Instantaneous Decentralized Poker Iddo Bentov, Ranjit Kumaresan, Andrew Miller
2017/874 (PDF ) Non-Trivial Witness Encryption and Null-iO from Standard Assumptions Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelegue, Daniel Wichs
2017/873 (PDF ) Cycle Slicer: An Algorithm for Building Permutations on Special Domains Sarah Miracle, Scott Yilek
2017/872 (PDF ) Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability Jonathan Bootle, Andrea Cerulli, Essam Ghadafi, Jens Groth, Mohammad Hajiabadi, Sune K. Jakobsen
2017/871 (PDF ) Non-Interactive Multiparty Computation without Correlated Randomness Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev
2017/870 (PDF ) Tightly-Secure Signatures from Five-Move Identification Protocols Eike Kiltz, Julian Loss, Jiaxin Pan
2017/869 (PDF ) Amortizing Randomness Complexity in Private Circuits Sebastian Faust, Clara Paglialonga, Tobias Schneider
2017/868 (PDF ) New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers Takanori Isobe, Kyoji Shibutani
2017/867 (PDF ) On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2017/866 (PDF ) Enhanced Modelling of Authenticated Key Exchange Security Papa B. Seye, Augustin P. Sarr
2017/865 (PDF ) The First Thorough Side-Channel Hardware Trojan Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
2017/864 (PDF ) Quantum Multicollision-Finding Algorithm Akinori Hosoyamada, Yu Sasaki, Keita Xagawa
2017/863 (PDF ) The Minimum Number of Cards in Practical Card-based Protocols Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
2017/862 (PDF ) Efficient Scalable Constant-Round MPC via Garbled Circuits Aner Ben-Efraim, Yehuda Lindell, Eran Omri
2017/861 (PDF ) On the Depth of Oblivious Parallel RAM T-H. Hubert Chan, Kai-Min Chung, Elaine Shi
2017/860 (PDF ) Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property Ling Sun, Wei Wang, Meiqin Wang
2017/859 (PDF ) ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups Jie Chen, Junqing Gong
2017/858 (PDF ) Differential Fault Analysis of SHA-3 under Relaxed Fault Models Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2017/857 (PDF ) Image Classification using non-linear Support Vector Machines on Encrypted Data Anthony Barnett, Jay Santokhi, Michael Simpson, Nigel P. Smart, Charlie Stainton-Bygrave, Srnivas Vivek, Adrian Waller
2017/856 (PDF ) Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
2017/855 (PDF ) Fault Attack on ACORN v3 Xiaojuan Zhang, Xiutao Feng, Dongdai Lin
2017/854 (PDF ) Zero-Knowledge Password Policy Check from Lattices Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
2017/853 (PDF ) Generic Forward-Secure Key Agreement Without Signatures Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
2017/852 (PDF ) Blockcipher-based MACs: Beyond the Birthday Bound without Message Length Yusuke Naito
2017/851 (PDF ) How to Use Metaheuristics for Design of Symmetric-Key Primitives Ivica Nikolić
2017/850 (PDF ) Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs Evgenios M. Kornaropoulos, Petros Efstathopoulos
2017/849 (PDF ) FAST: Disk Encryption and Beyond Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, Palash Sarkar
2017/848 (PDF ) Single Key Variant of PMAC_Plus Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang
2017/847 (PDF ) An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography André Chailloux, María Naya-Plasencia, André Schrottenloher
2017/846 (PDF ) How to Prove Megabytes (Per Second) Yaron Gvili
2017/845 (PDF ) Improved Security for OCB3 Ritam Bhaumik, Mridul Nandi
2017/844 (PDF ) Implementing Conjunction Obfuscation under Entropic Ring LWE David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
2017/843 (PDF ) Hybrid Encryption in a Multi-User Setting, Revisited Federico Giacon, Eike Kiltz, Bertram Poettering
2017/842 (PDF ) Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators Darren Hurley-Smith, Julio Hernandez-Castro
2017/841 (PDF ) Efficient Length Doubling From Tweakable Block Ciphers Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel
2017/840 (PDF ) Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas Saud Al Musa, Guangwu Xu
2017/839 (PDF ) Noiseless Fully Homomorphic Encryption Jing Li, Licheng Wang
2017/838 (PDF ) Two-Round PAKE from Approximate SPH and Instantiations from Lattices Jiang Zhang, Yu Yu
2017/837 (PDF ) Tight Security Analysis of EHtM MAC Avijit Dutta, Ashwin Jha, Mridul Nandi
2017/836 (PDF ) Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials Yin Li, Xingpo Ma, Qin Chen, Chuanda Qi
2017/835 (PDF ) Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan
2017/834 (PDF ) Authentication from Weak PRFs with Hidden Auxiliary Input Daniel Masny
2017/833 (PDF ) Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation Steven Myers, Adam Shull
2017/832 (PDF ) Mixture Differential Cryptanalysis and Structural Truncated Differential Attacks on round-reduced AES Lorenzo Grassi
2017/831 (PDF ) Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases Geng Wang, Haiyang Zhang, Fengmei Liu
2017/830 (PDF ) Security proof for Round Robin Differential Phase Shift QKD Daan Leermakers, Boris Skoric
2017/829 (PDF ) Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code Jakub Breier, Xiaolu Hou, Yang Liu
2017/827 (PDF ) Scaling ORAM for Secure Computation Jack Doerner, abhi shelat
2017/826 (PDF ) 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits Brent Carmer, Alex J. Malozemoff, Mariana Raykova
2017/825 (PDF ) Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR Syed Mahbub Hafiz, Ryan Henry
2017/824 (PDF ) Improved Security Notions for Proxy Re-Encryption to Enforce Access Control Ela Lee
2017/823 (PDF ) Revive: Rebalancing Off-Blockchain Payment Networks Rami Khalil, Arthur Gervais
2017/822 (PDF ) On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit
2017/821 (PDF ) A Fast and Verified Software Stack for Secure Function Evaluation José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
2017/820 (PDF ) Concurrency and Privacy with Payment-Channel Networks Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi
2017/819 (PDF ) S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen
2017/818 (PDF ) No-Match Attacks and Robust Partnering Definitions – Defining Trivial Attacks for Security Protocols is Not Trivial Yong Li, Sven Schäge
2017/816 (PDF ) A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority Yehuda Lindell, Ariel Nof
2017/815 (PDF ) Revisiting the Expected Cost of Solving uSVP and Applications to LWE Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
2017/814 (PDF ) Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl
2017/813 (PDF ) Industrial Feasibility of Private Information Retrieval Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad
2017/812 (PDF ) Optimal PRFs from Blockcipher Designs Bart Mennink, Samuel Neves
2017/811 (PDF ) Reassessing Grover's Algorithm Scott Fluhrer
2017/810 (PDF ) The TypTop System: Personalized Typo-Tolerant Password Checking Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart
2017/809 (PDF ) High-Precision Arithmetic in Homomorphic Encryption Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
2017/808 (PDF ) On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications Shuichi Katsumata
2017/807 (PDF ) FAME: Fast Attribute-based Message Encryption Shashank Agrawal, Melissa Chase
2017/806 (PDF ) May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin, Luke Valenta, Yuval Yarom
2017/805 (PDF ) Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives Raphael Bost, Brice Minaud, Olga Ohrimenko
2017/804 (PDF ) Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang
2017/803 (PDF ) Role-Based Ecosystem for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications Andrei Lapets, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen
2017/802 (PDF ) New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs Gottfried Herold, Max Hoffmann, Michael Kloo\ss, Carla Ràfols, Andy Rupp
2017/801 (PDF ) Short Attribute-Based Signatures for Arbitrary Turing Machines from Standard Assumptions Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2017/800 (PDF ) Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 Fukang Liu, Florian Mendel, Gaoli Wang
2017/799 (PDF ) Practical Multi-party Private Set Intersection from Symmetric-Key Techniques Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu
2017/798 (PDF ) More Efficient Universal Circuit Constructions Daniel Günther, Ágnes Kiss, Thomas Schneider
2017/796 (PDF ) Lightweight Symmetric-Key Hidden Vector Encryption without Pairings Sikhar Patranabis, Debdeep Mukhopadhyay
2017/795 (PDF ) Private Constrained PRFs (and More) from LWE Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee
2017/794 (PDF ) Anonymous Single-Round Server-Aided Verification Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka
2017/793 (PDF ) McBits Revisited Tung Chou
2017/792 (PDF ) Gimli, Lord of the Glittering TRS-80 Jean-Marie Chauvet
2017/791 (PDF ) Merged Mining: Curse of Cure? Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar Weippl
2017/790 (PDF ) TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti
2017/789 (PDF ) Low-communication parallel quantum multi-target preimage search Gustavo Banegas, Daniel J. Bernstein
2017/788 (PDF ) Attack on AES Implementation Exploiting Publicly-visible Partial Result William Diehl
2017/787 (PDF ) When Are Opaque Predicates Useful? Lukas Zobernig, Steven D. Galbraith, Giovanni Russello
2017/786 (PDF ) A Cryptographic Look at Multi-Party Channels Patrick Eugster, Giorgia Azzurra Marson, Bertram Poettering
2017/785 (PDF ) What about Bob? The Inadequacy of CPA Security for Proxy Reencryption Aloni Cohen
2017/784 (PDF ) Secure Channels and Termination: The Last Word on TLS Colin Boyd, Britta Hale
2017/783 (PDF ) HAL — The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
2017/782 (PDF ) Efficient Attribute-Based Secure Keyword Search on the Cloud Storage Wanfen Guo, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2017/781 (PDF ) Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
2017/780 (PDF ) New Algorithms for Solving LPN Bin Zhang, Xinxin Gong
2017/779 (PDF ) Efficient Random Grid Visual Cryptographic Schemes having Essential Members Bibhas Chandra Das, Md Kutubuddin Sardar, Avishek Adhikari
2017/778 (PDF ) MCMix: Anonymous Messaging via Secure Multiparty Computation Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
2017/777 (PDF ) Encrypting Messages for Incomplete Chains of Certificates Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald
2017/776 (PDF ) Field lifting for smaller UOV public keys Ward Beullens, Bart Preneel
2017/775 (PDF ) Consensus from Signatures of Work Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
2017/774 (PDF ) Computational problems in supersingular elliptic curve isogenies Steven D. Galbraith, Frederik Vercauteren
2017/773 (PDF ) A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade
2017/772 (PDF ) Locality-Preserving Oblivious RAM Gilad Asharov, T-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi
2017/771 (PDF ) Post-quantum security of the sponge construction Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh
2017/770 (PDF ) PAPEETE: Private, Authorized, and Fast Personal Genomic Testing Angelo Massimo Perillo, Emiliano De Cristofaro
2017/769 (PDF ) Malicious-Secure Private Set Intersection via Dual Execution Peter Rindal, Mike Rosulek
2017/768 (PDF ) An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
2017/767 (PDF ) Quantum Key-Recovery on full AEZ Xavier Bonnetain
2017/766 (PDF ) GLYPH: A New Instantiation of the GLP Digital Signature Scheme Arjun Chopra
2017/765 (PDF ) Necessary conditions for designing secure stream ciphers with the minimal internal states Vahid Amin Ghafari, Honggang Hu, Mohammadsadegh alizadeh
2017/764 (PDF ) Categorising and Comparing Cluster-Based DPA Distinguishers Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
2017/763 (PDF ) Improved Fully Homomorphic Encryption without Bootstrapping Masahiro Yagisawa
2017/762 (PDF ) Private Collaborative Neural Network Learning Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal
2017/761 (PDF ) Anti-SAT: Mitigating SAT Attack on Logic Locking Yang Xie, Ankur Srivastava
2017/759 (PDF ) Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings Carsten Baum, Vadim Lyubashevsky
2017/758 (PDF ) On Improving Integer Factorization and Discrete Logarithm Computation using Partial Triangulation Fabrice Boudot
2017/757 (PDF ) CAKE: Code-based Algorithm for Key Encapsulation Paulo S. L. M. Barreto, Shay Gueron, Tim Gueneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich
2017/756 (PDF ) Verifiable Private Polynomial Evaluation Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade
2017/755 (PDF ) Efficient, Reusable Fuzzy Extractors from LWE Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz
2017/754 (PDF ) Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions Ahto Buldas, Matthias Geihs, Johannes Buchmann
2017/753 (PDF ) CryptHOL: Game-based Proofs in Higher-order Logic David A. Basin, Andreas Lochbihler, S. Reza Sefidgar
2017/752 (PDF ) A Note on Attribute-Based Group Homomorphic Encryption Michael Clear, Ciaran McGoldrick
2017/751 (PDF ) Twisting Lattice and Graph Techniques to Compress Transactional Ledgers Rémi Géraud, David Naccache, Răzvan Roşie
2017/750 (PDF ) Adaptive-Secure VRFs with Shorter Keys from Static Assumptions Răzvan Roşie
2017/749 (PDF ) Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/748 (PDF ) Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Paulo Martins, Leonel Sousa, Vincent Zucca
2017/747 (PDF ) sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong
2017/746 (PDF ) On the Tightness of Forward-Secure Signature Reductions Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2017/745 (PDF ) A Quantum ``Magic Box'' for the Discrete Logarithm Problem Burton S. Kaliski Jr.
2017/744 (PDF ) Binary Hash Tree based Certificate Access Management Virendra Kumar, Jonathan Petit, William Whyte
2017/743 (PDF ) Cryptanalysis of 22 1/2 rounds of Gimli Mike Hamburg
2017/742 (PDF ) Cryptanalysis of Compact-LWE Jonathan Bootle, Mehdi Tibouchi
2017/740 (PDF ) Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures -- Profiling Attacks without Pre-Processing -- Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
2017/738 (PDF ) Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions Mihaela Ion, Ben Kreuter, Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
2017/737 (PDF ) SecReach: Secure Reachability Computation on Encrypted Location Check-in Data Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
2017/736 (PDF ) SGX Remote Attestation is not Sufficient Yogesh Swami
2017/735 (PDF ) Faster Bootstrapping with Multiple Addends TanPing ZHOU, XiaoYuan YANG, LongFei LIU, Wei ZHANG, YiTao DING
2017/734 (PDF ) Round Optimal Concurrent Non-Malleability from Polynomial Hardness Dakshita Khurana
2017/733 (PDF ) Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme Yongge Wang
2017/732 (PDF ) Privacy-Preserving Ridge Regression Without Garbled Circuits Marc Joye
2017/731 (PDF ) Revisiting Difficulty Control for Blockchain Systems Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen
2017/730 (PDF ) Second Order Statistical Behavior of LLL and BKZ Yang Yu, Léo Ducas
2017/729 (PDF ) Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses Subhabrata Samajder, Palash Sarkar
2017/728 (PDF ) Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2017/727 (PDF ) A note on the implementation of the Number Theoretic Transform Michael Scott
2017/726 (PDF ) Proposal of primitive polynomials for Linux kernel PRNG David FONTAINE, Olivier VIVOLO
2017/725 (PDF ) AS$^3$: Adaptive Social Secret Sharing for Distributed Storage Systems Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2017/724 (PDF ) Dynamic and Verifiable Hierarchical Secret Sharing Giulia Traverso, Denise Demirel, Johannes Buchmann
2017/723 (PDF ) An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both Rotem Tsabary
2017/722 (PDF ) A Simpler Rate-Optimal CPIR Protocol Helger Lipmaa, Kateryna Pavlyk
2017/721 (PDF ) On Making U2F Protocol Leakage-Resilient via Re-keying Donghoon Chang, Sweta Mishra, Somitra Kumar Sanadhya, Ajit Pratap Singh
2017/720 (PDF ) Computing Low-Weight Discrete Logarithms Bailey Kacsmar, Sarah Plosker, Ryan Henry
2017/719 (PDF ) Efficient Proactive Secret Sharing Jacqueline Brendel, Denise Demirel
2017/718 (PDF ) Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper) Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2017/717 (PDF ) Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
2017/716 (PDF ) Anonymous Post-Quantum Cryptocash Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au
2017/715 (PDF ) Privacy-Preserving Deep Learning via Additively Homomorphic Encryption Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
2017/714 (PDF ) The Edited Truth Shafi Goldwasser, Saleet Klein, Daniel Wichs
2017/713 (PDF ) More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema Paul Rösler, Christian Mainka, Jörg Schwenk
2017/712 (PDF ) On desynchronised El Gamal algorithm Vasyl Ustimenko
2017/711 (PDF ) Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert
2017/710 (PDF ) Distributed Computing with Channel Noise Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia
2017/709 (PDF ) spKEX: An optimized lattice-based key exchange Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen
2017/708 (PDF ) Reconsidering the Security Bound of AES-GCM-SIV Tetsu Iwata, Yannick Seurin
2017/707 (PDF ) Privacy-Preserving Ridge Regression on Distributed Data Irene Giacomelli, Somesh Jha, C. David Page, Kyonghwan Yoon
2017/706 (PDF ) SCATTER : A New Dimension in Side-Channel Hugues Thiebeauld, Georges Gagnerot, Antoine Wurcker, Christophe Clavier
2017/705 (PDF ) Multi-Hop Distance Estimation: How Far are You? Aikaterini Mitrokotsa, Cristina Onete, Elena Pagnin, Mahesh Perera
2017/704 (PDF ) A Key Backup Scheme Based on Bitcoin Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang
2017/703 (PDF ) Optimally Sound Sigma Protocols Under DCRA Helger Lipmaa
2017/702 (PDF ) Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation Shay Gueron, Yehuda Lindell
2017/701 (PDF ) Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2017/700 (PDF ) Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability Johannes Buchmann, Denise Demirel, Lucas Schabhüser, Patrick Struck
2017/699 (PDF ) Runtime Code Polymorphism as a Protection Against Side Channel Attacks Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
2017/698 (PDF ) δ-subgaussian Random Variables in Cryptography Sean Murphy, Rachel Player
2017/697 (PDF ) On Internal Re-keying Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev
2017/696 (PDF ) A Humble Theory and Application for Logic Encryption Hai Zhou
2017/695 (PDF ) Updatable Tokenization: Formal Definitions and Provably Secure Constructions Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann
2017/694 (PDF ) Atomically Trading with Roger: Gambling on the success of a hardfork Patrick McCorry, Ethan Heilman, Andrew Miller
2017/693 (PDF ) Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2017/692 (PDF ) Towards Characterizing Securely Computable Two-Party Randomized Functions Deepesh Data, Manoj Prabhakaran
2017/691 (PDF ) Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak Fanbao Liu, Fengmei Liu
2017/690 (PDF ) High Performance Post-Quantum Key Exchange on FPGAs Po-Chun Kuo, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang
2017/689 (PDF ) On the security of HMFEv Yasufumi Hashimoto
2017/688 (PDF ) Quantum Collision-Finding in Non-Uniform Random Functions Marko Balogh, Edward Eaton, Fang Song
2017/686 (PDF ) On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol Ren Zhang, Bart Preneel
2017/685 (PDF ) Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal
2017/684 (PDF ) Z-Channel: Scalable and Efficient Scheme in Zerocash Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu
2017/683 (PDF ) Efficient Privacy-Preserving General Edit Distance and Beyond Ruiyu Zhu, Yan Huang
2017/682 (PDF ) Conditional Blind Signatures Alexandros Zacharakis, Panagiotis Grontas, Aris Pagourtzis
2017/681 (PDF ) Logical loophole in random 3-bit sequence generator Alexandre de Castro
2017/680 (PDF ) SOFIA: MQ-based signatures in the QROM Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
2017/679 (PDF ) Searchable Encryption with Access Control Nils Löken
2017/678 (PDF ) Differential Fault Attack on Grain v1, ACORN v3 and Lizard Akhilesh Anilkumar Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay
2017/677 (PDF ) Faster Unbalanced Private Set Intersection Amanda Cristina Davi Resende, Diego de Freitas Aranha
2017/676 (PDF ) Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya
2017/675 (PDF ) Memory-Tight Reductions Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz
2017/674 (PDF ) Transparent Memory Encryption and Authentication Mario Werner, Thomas Unterluggauer, Robert Schilling, David Schaffenrath, Stefan Mangard
2017/673 (PDF ) Differential Fault Analysis Automation Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta
2017/672 (PDF ) Coding for interactive communication beyond threshold adversaries Anat Paskin-Cherniavsky, Slava Radune
2017/671 (PDF ) Guru: Universal Reputation Module for Distributed Consensus Protocols Alex Biryukov, Daniel Feher, Dmitry Khovratovich
2017/670 (PDF ) Private Set Intersection for Unequal Set Sizes with Mobile Applications Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas
2017/669 (PDF ) Speeding up Elliptic Curve Scalar Multiplication without Precomputation Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong
2017/668 (PDF ) Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs Sikhar Patranabis, Debdeep Mukhopadhyay
2017/667 (PDF ) High-speed key encapsulation from NTRU Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe
2017/666 (PDF ) On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner
2017/665 (PDF ) Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing Michael Raskin
2017/664 (PDF ) Message Franking via Committing Authenticated Encryption Paul Grubbs, Jiahui Lu, Thomas Ristenpart
2017/663 (PDF ) Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives Thomas Unterluggauer, Mario Werner, Stefan Mangard
2017/662 (PDF ) The problem with the SURF scheme Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2017/661 (PDF ) MuSE: Multimodal Searchable Encryption for Cloud Applications Bernardo Ferreira, João Leitão, Henrique Domingos
2017/660 (PDF ) Profiling Good Leakage Models For Masked Implementations Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou
2017/659 (PDF ) Forward-Secure Searchable Encryption on Labeled Bipartite Graphs Russell W. F. Lai, Sherman S. M. Chow
2017/658 (PDF ) Privacy for Targeted Advertising Avradip Mandal, John Mitchell, Hart Montgomery, Arnab Roy
2017/657 (PDF ) CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient Sanjit Chatterjee, Sayantan Mukherjee, Tapas Pandit
2017/656 (PDF ) A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake) Lei Fan, Hong-Sheng Zhou
2017/655 (PDF ) A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones Jiao Hu, Ruilin Li, Chaojing Tang
2017/654 (PDF ) A Secure and Private Billing Protocol for Smart Metering Tom Eccles, Basel Halak
2017/653 (PDF ) Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions Fanbao Liu, Fengmei Liu
2017/652 (PDF ) Pseudorandom Functions: Three Decades Later Andrej Bogdanov, Alon Rosen
2017/650 (PDF ) Efficient Public Trace and Revoke from Standard Assumptions Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada
2017/649 (PDF ) Blockcipher-based Authenticated Encryption: How Small Can We Go? Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi
2017/648 (PDF ) CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford
2017/647 (PDF ) A TMDTO Attack Against Lizard Subhamoy Maitra, Nishant Sinha, Akhilesh Siddhanti, Ravi Anand, Sugata Gangopadhyay
2017/646 (PDF ) Rational Trust Modeling Mehrdad Nojoumian
2017/645 (PDF ) SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security Shay Gueron, Nicky Mouha
2017/643 (PDF ) Private Data Aggregation on a Budget Morten Dahl, Valerio Pastro, Mathieu Poumeyrol
2017/642 (PDF ) Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
2017/641 (PDF ) Integer Version of Ring-LWE and its Applications Gu Chunsheng
2017/640 (PDF ) Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache
2017/639 (PDF ) One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
2017/638 (PDF ) From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/637 (PDF ) Very High Order Masking: Efficient Implementation and Security Evaluation Anthony Journault, François-Xavier Standaert
2017/636 (PDF ) Implementing 128-bit Secure MPKC Signatures Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng
2017/635 (PDF ) Perun: Virtual Payment Hubs over Cryptocurrencies Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
2017/634 (PDF ) CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé
2017/633 (PDF ) CRYSTALS -- Dilithium: Digital Signatures from Module Lattices Leo Ducas, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehle
2017/632 (PDF ) Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek
2017/631 (PDF ) Certifying Trapdoor Permutations, Revisited Ran Canetti, Amit Lichtenberg
2017/630 (PDF ) Gimli: a cross-platform permutation Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
2017/629 (PDF ) A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
2017/628 (PDF ) Middle-Product Learning With Errors Miruna Rosca, Amin Sakzad, Ron Steinfeld, Damien Stehle
2017/627 (PDF ) Sliding right into disaster: Left-to-right sliding windows leak Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom
2017/626 (PDF ) CycSAT: SAT-Based Attack on Cyclic Logic Encryptions Hai Zhou, Ruifeng Jiang, Shuyu Kong
2017/625 (PDF ) How to Break Secure Boot on FPGA SoCs through Malicious Hardware Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl
2017/624 (PDF ) Fast Leakage Assessment Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
2017/623 (PDF ) Back to Massey: Impressively fast, scalable and tight security evaluation tools Marios O. Choudary, P. G. Popescu
2017/622 (PDF ) GIFT: A Small Present Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
2017/621 (PDF ) Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte
2017/620 (PDF ) The Algebraic Group Model and its Applications Georg Fuchsbauer, Eike Kiltz, Julian Loss
2017/619 (PDF ) Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting Qiong Huang, Jianye Huang
2017/618 (PDF ) CacheZoom: How SGX Amplifies The Power of Cache Attacks Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
2017/617 (PDF ) Secure Arithmetic Computation with Constant Computational Overhead Benny Applebaum, Ivan Damgård, Yuval Ishai, Michael Nielsen, Lior Zichron
2017/616 (PDF ) Statement Voting Bingsheng Zhang, Hong-Sheng Zhou
2017/615 (PDF ) A Framework to Select Parameters for Lattice-Based Cryptography Nabil Alkeilani Alkadri, Johannes Buchmann, Rachid El Bansarkhani, Juliane Krämer
2017/614 (PDF ) Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card Mathias Wagner, Stefan Heyse, Charles Guillemet
2017/613 (PDF ) Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim
2017/612 (PDF ) Large Modulus Ring-LWE $\geq$ Module-LWE Martin R. Albrecht, Amit Deo
2017/611 (PDF ) Multi-Rate Threshold FlipThem David Leslie, Chris Sherfield, Nigel P. Smart
2017/610 (PDF ) Differential Attacks: Using Alternative Operations Céline Blondeau, Roberto Civino, Massimiliano Sala
2017/609 (PDF ) On the discrete logarithm problem for prime-field elliptic curves Alessandro Amadori, Federico Pintore, Massimiliano Sala
2017/608 (PDF ) Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs Vincent Immler, Robert Specht, Florian Unterstein
2017/607 (PDF ) Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model Edward Eaton
2017/606 (PDF ) Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter
2017/605 (PDF ) Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures Xavier Bultel, Pascal Lafourcade
2017/604 (PDF ) A Modular Analysis of the Fujisaki-Okamoto Transformation Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
2017/603 (PDF ) Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2017/602 (PDF ) A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK Sean Bowe, Ariel Gabizon, Matthew D. Green
2017/601 (PDF ) Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme Wei Dai, Yarkın Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savaş, Berk Sunar
2017/600 (PDF ) Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY Jeremy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
2017/599 (PDF ) A Subversion-Resistant SNARK Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michal Zajac
2017/598 (PDF ) Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin Lauter
2017/597 (PDF ) Round Optimal Concurrent MPC via Strong Simulation Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai
2017/596 (PDF ) A Side-Channel Assisted Cryptanalytic Attack Against QcBits Mélissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson
2017/595 (PDF ) FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang, Jakub Szefer, Ruben Niederhagen
2017/594 (PDF ) Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption Robert Primas, Peter Pessl, Stefan Mangard
2017/593 (PDF ) Solving multivariate polynomial systems and an invariant from commutative algebra Alessio Caminata, Elisa Gorla
2017/592 (PDF ) Speeding up lattice sieve with Xeon Phi coprocessor Anja Becker, Dusan Kostic
2017/591 (PDF ) On the Security of Carrier Phase-based Ranging Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
2017/590 (PDF ) Constant bandwidth ORAM with small block size using PIR operations Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu
2017/589 (PDF ) An Attempt to Cryptanalyze A Partially Known Cipher Algorithm Juay Guan Hee
2017/588 (PDF ) Renyi Entropy Estimation Revisited Maciej Obremski, Maciej Skorski
2017/587 (PDF ) Subversion-zero-knowledge SNARKs Georg Fuchsbauer
2017/586 (PDF ) Deterministic, Stash-Free Write-Only ORAM Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
2017/585 (PDF ) Internet Voting Using Zcash Pavel Tarasov, Hitesh Tewari
2017/584 (PDF ) Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
2017/582 (PDF ) (Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation Angela Jäschke, Frederik Armknecht
2017/581 (PDF ) Time-Memory Trade-offs for Parallel Collision Search Algorithms Monika Trimoska, Sorina Ionica, Gilles Dequen
2017/580 (PDF ) Analysing Relations involving small number of Monomials in AES S- Box Riddhi Ghosal
2017/579 (PDF ) Birthday Attack on Dual EWCDM Mridul Nandi
2017/578 (PDF ) TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun
2017/577 (PDF ) Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser
2017/576 (PDF ) The Security of SIMON-like Ciphers Against Linear Cryptanalysis Zhengbin Liu, Yongqiang Li, Mingsheng Wang
2017/575 (PDF ) Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds Ehsan Ebrahimi, Dominique Unruh
2017/573 (PDF ) Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol Bernardo David, Peter Gaži, Aggelos Kiayias, Alexander Russell
2017/572 (PDF ) MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk
2017/571 (PDF ) Faster Algorithms for Isogeny Problems using Torsion Point Images Christophe Petit
2017/570 (PDF ) Can You Trust Your Encrypted Cloud? An Assessment of SpiderOakONE’s Security Anders P. K. Dalskov, Claudio Orlandi
2017/569 (PDF ) Enforcing Input Correctness via Certification in Garbled Circuit Evaluation Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani
2017/568 (PDF ) Towards Doubly Efficient Private Information Retrieval Ran Canetti, Justin Holmgren, Silas Richelson
2017/567 (PDF ) Can We Access a Database Both Locally and Privately? Elette Boyle, Yuval Ishai, Rafael Pass, Mary Wootters
2017/566 (PDF ) Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo
2017/565 (PDF ) A Formal Foundation for Secure Remote Execution of Enclaves Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia
2017/564 (PDF ) Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya
2017/563 (PDF ) Weak is Better: Tightly Secure Short Signatures from Weak PRFs Jacob Alperin-Sheriff, Daniel Apon
2017/562 (PDF ) Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices Björn Haase, Benoît Labrique
2017/561 (PDF ) Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic Yashvanth Kondi, Arpita Patra
2017/560 (PDF ) Notes on the design and analysis of SIMON and SPECK Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2017/559 (PDF ) Human Computing for Handling Strong Corruptions in Authenticated Key Exchange Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval
2017/557 (PDF ) Watermarking Public-key Cryptographic Functionalities and Implementations Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
2017/556 (PDF ) Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$). Sankhanil Dey, Ranjan Ghosh
2017/555 (PDF ) Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin
2017/554 (PDF ) Trapping ECC with Invalid Curve Bug Attacks Renaud Dubois
2017/553 (PDF ) Further Analysis of a Proposed Hash-Based Signature Standard Scott Fluhrer
2017/552 (PDF ) Fast Secure Two-Party ECDSA Signing Yehuda Lindell
2017/551 (PDF ) A Fourier Analysis Based Attack against Physically Unclonable Functions Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
2017/550 (PDF ) Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai
2017/549 (PDF ) ZeroTrace : Oblivious Memory Primitives from Intel SGX Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher
2017/548 (PDF ) Fully Homomorphic Encryption from the Finite Field Isomorphism Problem Yarkın Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang
2017/547 (PDF ) Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce Seyed Farhad Aghili, Hamid Mala
2017/546 (PDF ) X509CLOUD - FRAMEWORK FOR A UBIQUITOUS PKI Hitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry
2017/545 (PDF ) Resource-efficient OT combiners with active security Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
2017/544 (PDF ) Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
2017/543 (PDF ) Identity-Based Encryption from the Diffie-Hellman Assumption Nico Döttling, Sanjam Garg
2017/542 (PDF ) A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart
2017/541 (PDF ) Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
2017/540 (PDF ) Snarky Signatures: \\ Minimal Signatures of Knowledge from Simulation-Extractable SNARKs Jens Groth, Mary Maller
2017/539 (PDF ) Public-Seed Pseudorandom Permutations Pratik Soni, Stefano Tessaro
2017/538 (PDF ) New security notions and feasibility results for authentication of quantum data Sumegha Garg, Henry Yuen, Mark Zhandry
2017/537 (PDF ) Information-theoretic Indistinguishability via the Chi-squared Method Wei Dai, Viet Tung Hoang, Stefano Tessaro
2017/536 (PDF ) HACL*: A Verified Modern Cryptographic Library Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
2017/535 (PDF ) ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin
2017/534 (PDF ) Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu
2017/533 (PDF ) Quantum non-malleability and authentication Gorjan Alagic, Christian Majenz
2017/532 (PDF ) All-But-Many Lossy Trapdoor Functions from Lattices and Applications Xavier Boyen, Qinyi Li
2017/531 (PDF ) Template Attack vs Bayes Classifier Stjepan Picek, Annelie Heuser, Sylvain Guilley
2017/530 (PDF ) Non-Malleable Codes for Space-Bounded Tampering Sebastian Faust, Kristina Hostakova, Pratyay Mukherjee, Daniele Venturi
2017/529 (PDF ) Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak Ling Song, Guohong Liao, Jian Guo
2017/528 (PDF ) Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets Claude Carlet
2017/527 (PDF ) Key Rotation for Authenticated Encryption Adam Everspaugh, Kenneth Paterson, Thomas Ristenpart, Sam Scott
2017/526 (PDF ) Evaluating web PKIs - A Survey Jiangshan Yu, Mark Ryan
2017/525 (PDF ) Kurosawa-Desmedt Meets Tight Security Romain Gay, Dennis Hofheinz, Lisa Kohl
2017/524 (PDF ) Compact Structure-preserving Signatures with Almost Tight Security Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan
2017/523 (PDF ) Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs Vadim Lyubashevsky, Gregor Seiler
2017/522 (PDF ) On the Hardness of the Mersenne Low Hamming Ratio Assumption Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache
2017/521 (PDF ) Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains F. Betül Durak, Serge Vaudenay
2017/520 (PDF ) The Price of Low Communication in Secure Multi-Party Computation Juan Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
2017/519 (PDF ) Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala
2017/518 (PDF ) qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs Joost Renes, Benjamin Smith
2017/517 (PDF ) PRF-ODH: Relations, Instantiations, and Impossibility Results Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson
2017/516 (PDF ) Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet
2017/515 (PDF ) Be Adaptive, Avoid Overcommitting Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
2017/514 (PDF ) Identity-based Encryption from Codes with Rank Metric Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich
2017/513 (PDF ) Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$ Patrick Holzer, Thomas Wunderer
2017/511 (PDF ) State of the Art in Lightweight Symmetric Cryptography Alex Biryukov, Leo Perrin
2017/510 (PDF ) Hedging Public-Key Encryption in the Real World Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton
2017/509 (PDF ) Quantum Security of NMAC and Related Constructions Fang Song, Aaram Yun
2017/508 (PDF ) Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations Victor Cauchois, Clément Gomez, Reynald Lercier
2017/507 (PDF ) Inverted Leftover Hash Lemma Maciej Obremski, Maciej Skórski
2017/505 (PDF ) Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
2017/504 (PDF ) A simple and compact algorithm for SIDH with arbitrary degree isogenies Craig Costello, Huseyin Hisil
2017/503 (PDF ) Encryption Switching Protocols Revisited: Switching modulo $p$ Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie
2017/502 (PDF ) DeepSecure: Scalable Provably-Secure Deep Learning Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar
2017/501 (PDF ) A Formal Treatment of Multi-key Channels Felix Günther, Sogol Mazaheri
2017/500 (PDF ) Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2017/499 (PDF ) Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu
2017/498 (PDF ) Full-State Keyed Duplex With Built-In Multi-User Support Joan Daemen, Bart Mennink, Gilles Van Assche
2017/497 (PDF ) Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme Itai Dinur, Niv Nadler
2017/496 (PDF ) Modes of Operation Suitable for Computing on Encrypted Data Dragos Rotaru, Nigel P. Smart, Martijn Stam
2017/495 (PDF ) Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
2017/494 (PDF ) A Reaction Attack on the QC-LDPC McEliece Cryptosystem Tomas Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson
2017/493 (PDF ) Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice Georg T. Becker
2017/492 (PDF ) Reducing Communication Channels in MPC Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
2017/491 (PDF ) Laconic Oblivious Transfer and its Applications Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou
2017/490 (PDF ) To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures Peter Pessl, Leon Groot Bruinderink, Yuval Yarom
2017/489 (PDF ) Multi Collision Resistant Hash Functions and their Applications Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
2017/488 (PDF ) Multi-Collision Resistance: A Paradigm for Keyless Hash Functions Nir Bitansky, Yael Tauman Kalai, Omer Paneth
2017/487 (PDF ) New Linear Attacks on Block Cipher GOST Yi LU
2017/486 (PDF ) Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions Ilan Komargodski, Moni Naor, Eylon Yogev
2017/485 (PDF ) Authenticating compromisable storage systems Jiangshan Yu, Mark Ryan, Liqun Chen
2017/484 (PDF ) Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial Jung Hee Cheon, Minki Hhan, Changmin Lee
2017/483 (PDF ) A multi-start heuristic for multiplicative depth minimization of boolean circuits Sergiu Carpov, Pascal Aubry, Renaud Sirdey
2017/482 (PDF ) On the Statistical Leak of the GGH13 Multilinear Map and some Variants Léo Ducas, Alice Pellet--Mary
2017/481 (PDF ) A New Public-Key Cryptosystem via Mersenne Numbers Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha
2017/480 (PDF ) Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence Thomas Prest
2017/479 (PDF ) Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions Keita Emura
2017/478 (PDF ) Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens
2017/477 (PDF ) Constrained Keys for Invertible Pseudorandom Functions Dan Boneh, Sam Kim, David J. Wu
2017/476 (PDF ) Forward-Security under Continual Leakage Mihir Bellare, Adam O'Neill, Igors Stepanovs
2017/475 (PDF ) Security of Even--Mansour Ciphers under Key-Dependent Messages Pooya Farshim, Louiza Khati, Damien Vergnaud
2017/474 (PDF ) Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security Bart Mennink
2017/473 (PDF ) Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory Bart Mennink, Samuel Neves
2017/472 (PDF ) A Unified Framework for Secure Search Over Encrypted Cloud Data Cengiz Orencik, Erkay Savas, Mahmoud Alewiwi
2017/471 (PDF ) Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith Tone
2017/470 (PDF ) On the Relation Between SIM and IND-RoR Security Models for PAKEs José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot
2017/469 (PDF ) Short CCA-Secure Attribute-Based Encryption Hiroaki Anada, Seiko Arita
2017/468 (PDF ) Why Your Encrypted Database Is Not Secure Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov
2017/467 (PDF ) Access Control Encryption for General Policies from Standard Assumptions Sam Kim, David J. Wu
2017/466 (PDF ) Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security Yusuke Naito
2017/465 (PDF ) Lelantos: A Blockchain-based Anonymous Physical Delivery System Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong
2017/464 (PDF ) On the Structure of Unconditional UC Hybrid Protocols Mike Rosulek, Morgan Shirley
2017/463 (PDF ) Proving Resistance against Invariant Attacks: How to Choose the Round Constants Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella
2017/462 (PDF ) Leakage-Resilient Tweakable Encryption from One-Way Functions Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan
2017/461 (PDF ) Security Definitions For Hash Functions: Combining UCE and Indifferentiability Daniel Jost, Ueli Maurer
2017/460 (PDF ) Transitioning to a Quantum-Resistant Public Key Infrastructure Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
2017/459 (PDF ) Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2017/457 (PDF ) Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority Masahito Hayashi, Takeshi Koshiba
2017/456 (PDF ) Proxy Re-Encryption and Re-Signatures from Lattices Xiong Fan, Feng-Hao Liu
2017/455 (PDF ) Vector Encoding over Lattices and Its Applications Daniel Apon, Xiong Fan, Feng-Hao Liu
2017/454 (PDF ) Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich
2017/453 (PDF ) Subtleties in Security Definitions for Predicate Encryption with Public Index Johannes Blömer, Gennadij Liske
2017/452 (PDF ) Oblivious Neural Network Predictions via MiniONN transformations Jian Liu, Mika Juuti, Yao Lu, N. Asokan
2017/451 (PDF ) Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
2017/450 (PDF ) Privacy-preserving biometric authentication: challenges and directions Elena Pagnin, Aikaterini Mitrokotsa
2017/449 (PDF ) Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies Shihui Fu, Xiutao Feng, Baofeng Wu
2017/447 (PDF ) Block Chain based Searchable Symmetric Encryption Huige Li, Haibo Tian, Fangguo Zhang
2017/446 (PDF ) Secretly Embedding Trapdoors into Contract Signing Protocols Diana Maimut, George Teseleanu
2017/445 (PDF ) Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2017/444 (PDF ) CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng
2017/443 (PDF ) Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions Joel Alwen, Jeremiah Blocki, Ben Harsha
2017/442 (PDF ) On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i Jeremiah Blocki, Samson Zhou
2017/441 (PDF ) New Approach to Practical Leakage-Resilient Public-Key Cryptography Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan
2017/440 (PDF ) Cryptographic Security Analysis of T-310 Nicolas T. Courtois, Klaus Schmeh, Jörg Drobick, Jacques Patarin, Maria-Bristena Oprisanu, Matteo Scarlata, Om Bhallamudi
2017/439 (PDF ) Practically Efficient Secure Single-Commodity Multi-Market Auctions Abdelrahaman Aly, Mathieu Van Vyve
2017/438 (PDF ) GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography James Howe, Máire O'Neill
2017/437 (PDF ) Slothful reduction Michael Scott
2017/436 (PDF ) A Uniform Class of Weak Keys for Universal Hash Functions Kaiyan Zheng, Peng Wang
2017/435 (PDF ) Analyzing Multi-Key Security Degradation Atul Luykx, Bart Mennink, Kenneth G. Paterson
2017/434 (PDF ) FourQ on embedded devices with strong countermeasures against side-channel attacks Zhe Liu, Patrick Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo
2017/433 (PDF ) Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia
2017/432 (PDF ) Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg
2017/431 (PDF ) Understanding RUP Integrity of COLM Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
2017/430 (PDF ) Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2017/429 (PDF ) Strengthening Access Control Encryption Christian Badertscher, Christian Matt, Ueli Maurer
2017/428 (PDF ) Optimal Ramp Schemes and Related Combinatorial Objects Douglas R. Stinson
2017/427 (PDF ) Grover Meets Simon - Quantumly Attacking the FX-construction Gregor Leander, Alexander May
2017/426 (PDF ) FHPKE based on multivariate discrete logarithm problem Masahiro Yagisawa
2017/425 (PDF ) Card-Based Protocols Using Unequal Division Shuffles Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
2017/424 (PDF ) HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption Markku-Juhani O. Saarinen
2017/423 (PDF ) Foundations for Actively Secure Card-based Cryptography Alexander Koch, Stefan Walzer
2017/422 (PDF ) PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh Prabhu
2017/421 (PDF ) Exploring Naccache-Stern Knapsack Encryption Éric Brier, Rémi Géraud, David Naccache
2017/420 (PDF ) Construction and Filtration of Lightweight Formalized MDS Matrices Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang
2017/419 (PDF ) Efficient hash maps to \mathbb{G}_2 on BLS curves Alessandro Budroni, Federico Pintore
2017/418 (PDF ) Strong Authenticated Key Exchange with Auxiliary Inputs Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2017/417 (PDF ) A Proof-of-Stake protocol for consensus on Bitcoin subchains Massimo Bartoletti, Stefano Lande, Alessandro Sebastian Podda
2017/416 (PDF ) Breaking and Fixing the HB+DB protocol Ioana Boureanu, David Gerault, Pascal Lafourcade, Cristina Onete
2017/415 (PDF ) Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
2017/414 (PDF ) Symmetrically and Asymmetrically Hard Cryptography (Full Version) Alex Biryukov, Leo Perrin
2017/413 (PDF ) Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
2017/412 (PDF ) Improved Attack on Full-round Grain-128 Ximing Fu, Xiaoyun Wang, Jiazhe Chen, Marc Stevens, Xiaoyang Dong
2017/411 (PDF ) A New Algorithm for Inversion mod $p^k$ Çetin Kaya Koç
2017/410 (PDF ) Fast Proxy Re-Encryption for Publish/Subscribe Systems Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanthan
2017/409 (PDF ) Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges
2017/408 (PDF ) Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast Jihye Kim, Jiwon Lee, Seunghwa Lee, Hyunok Oh
2017/407 (PDF ) SplitCommit: Implementing and Analyzing Homomorphic UC Commitments Peter Rindal, Roberto Trifiletti
2017/406 (PDF ) OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford
2017/405 (PDF ) Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare'' Jingjing Wang, Xiaoyu Zhang, Jingjing guo, Jianfeng Wang
2017/404 (PDF ) Short generators without quantum computers: the case of multiquadratics Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
2017/403 (PDF ) Condition on composite numbers easily factored with elliptic curve method Masaaki Shirase
2017/402 (PDF ) A New Approach to Round-Optimal Secure Multiparty Computation Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain
2017/401 (PDF ) Synthesis of Adaptive Side-Channel Attacks Quoc-Sang Phan, Lucas Bang, Corina S. Păsăreanu, Pasquale Malacaria, Tevfik Bultan
2017/400 (PDF ) A Leakage-Abuse Attack Against Multi-User Searchable Encryption Cédric Van Rompay, Refik Molva, Melek Önen
2017/399 (PDF ) Practical Evaluation of Masking Software Countermeasures on an IoT processor David McCann, Elisabeth Oswald
2017/398 (PDF ) Post-Quantum Security of Fiat-Shamir Dominique Unruh
2017/397 (PDF ) Efficient One-Time Signatures from Quasi-Cyclic Codes: a Full Treatment Edoardo Persichetti
2017/396 (PDF ) SecureML: A System for Scalable Privacy-Preserving Machine Learning Payman Mohassel, Yupeng Zhang
2017/395 (PDF ) Higher-Order Side-Channel Protected Implementations of Keccak Hannes Gross, David Schaffenrath, Stefan Mangard
2017/394 (PDF ) Double-spending Prevention for Bitcoin zero-confirmation transactions Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartı́
2017/393 (PDF ) Privacy-Preserving Interdomain Routing at Internet Scale Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
2017/392 (PDF ) Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey
2017/391 (PDF ) Another Look at Success Probability in Linear Cryptanalysis Subhabrata Samajder, Palash Sarkar
2017/390 (PDF ) On the Security of Classic Protocols for Unique Witness Relations Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen
2017/389 (PDF ) Decentralized Blacklistable Anonymous Credentials with Reputation Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu
2017/388 (PDF ) Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple Silvan Streit, Fabrizio De Santis
2017/387 (PDF ) Homomorphically Encrypted Arithmetic Operations over the Integer Ring Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng
2017/386 (PDF ) Four Round Secure Computation without Setup Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou
2017/385 (PDF ) Garbled Circuits as Randomized Encodings of Functions: a Primer Benny Applebaum
2017/384 (PDF ) Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang
2017/383 (PDF ) Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography Travis Scholl
2017/382 (PDF ) A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK Steven Cavanaugh
2017/381 (PDF ) Quantum one-way permutation over the finite field of two elements Alexandre de Castro
2017/380 (PDF ) Watermarking Cryptographic Functionalities from Standard Lattice Assumptions Sam Kim, David J. Wu
2017/379 (PDF ) Fault attack on Supersingular Isogeny Cryptosystems Yan Bo Ti
2017/378 (PDF ) Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
2017/377 (PDF ) Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries Stefan Wüller, Ulrike Meyer, Susanne Wetzel
2017/375 (PDF ) Do you need a Blockchain? Karl Wüst, Arthur Gervais
2017/374 (PDF ) Loop-abort faults on supersingular isogeny cryptosystems Alexandre Gélin, Benjamin Wesolowski
2017/373 (PDF ) Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption Ryo Hiromasa, Yutaka Kawai
2017/372 (PDF ) A crossbred algorithm for solving Boolean polynomial systems Antoine Joux, Vanessa Vitse
2017/371 (PDF ) On the Construction of Lightweight Orthogonal MDS Matrices Lijing Zhou, Licheng Wang, Yiru Sun
2017/370 (PDF ) "The Simplest Protocol for Oblivious Transfer'' Revisited Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial
2017/368 (PDF ) Analysis of Toeplitz MDS Matrices Sumanta Sarkar, Habeeb Syed
2017/367 (PDF ) Fork-Free Hybrid Consensus with Flexible Proof-of-Activity Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long
2017/366 (PDF ) BitFlip: A Randomness-Rich Cipher Gideon Samid, Serguei Popov
2017/365 (PDF ) The Complexity of Public-Key Cryptography Boaz Barak
2017/364 (PDF ) Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
2017/363 (PDF ) TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
2017/362 (PDF ) Universally Composable Zero-Knowledge Proof of Membership Jesper Buus Nielsen
2017/361 (PDF ) Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/360 (PDF ) Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
2017/359 (PDF ) Conditional Disclosure of Secrets via Non-Linear Reconstruction Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
2017/358 (PDF ) Almost Optimal Oblivious Transfer from QA-NIZK Olivier Blazy, Céline Chevalier, Paul Germouty
2017/357 (PDF ) Continuous Non-Malleable Codes in the 8-Split-State Model Divesh Aggarwal, Nico Dottling, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto
2017/356 (PDF ) XOR of PRPs in a Quantum World Bart Mennink, Alan Szepieniec
2017/355 (PDF ) White-Box Cryptography: Don't Forget About Grey Box Attacks Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
2017/354 (PDF ) Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart
2017/353 (PDF ) Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2017/352 (PDF ) A low-resource quantum factoring algorithm Daniel J. Bernstein, Jean-François Biasse, Michele Mosca
2017/351 (PDF ) Post-quantum RSA Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta
2017/350 (PDF ) The Montgomery ladder on binary elliptic curves Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez
2017/349 (PDF ) LMS vs XMSS: Comparion of two Hash-Based Signature Standards Panos Kampanakis, Scott Fluhrer
2017/348 (PDF ) Removal Attacks on Logic Locking and Camouflaging Techniques Muhammad Yasin, Bodhisatwa Mazumdar, Ozugr Sinanoglu, Jeyavijayan Rajendran
2017/347 (PDF ) Predictive Aging of Reliability of two Delay PUFs Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'h, Sylvain Guilley
2017/346 (PDF ) Some cryptanalytic results on Lizard Subhadeep Banik, Takanori Isobe
2017/345 (PDF ) Mind the Gap: Towards Secure 1st-order Masking in Software Kostas Papagiannopoulos, Nikita Veshchikov
2017/344 (PDF ) DUPLO: Unifying Cut-and-Choose for Garbled Circuits Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
2017/343 (PDF ) Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups Essam Ghadafi, Jens Groth
2017/342 (PDF ) Multilinear Maps Using a Variant of Ring-LWE Gu Chunsheng
2017/341 (PDF ) Steganography techniques Dragoş Dumitrescu, Ioan-Mihail Stan, Emil Simion
2017/339 (PDF ) ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication Alan Kaminsky
2017/338 (PDF ) A Traceability Analysis of Monero's Blockchain Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena
2017/337 (PDF ) Authentication of Outsourced Linear Function Query with Efficient Updates Gang Sheng, Chunming Tang, Wei Gao, Yunlu Cai, Xing Hu
2017/336 (PDF ) NIST RANDOMNESS TESTS (IN)DEPENDENCE Carmina GEORGESCU, Alina PETRESCU-NITA, Emil SIMION, Antonela TOMA
2017/334 (PDF ) Updating key size estimations for pairings Razvan Barbulescu, Sylvain Duquesne
2017/333 (PDF ) Faster Homomorphic Function Evaluation using Non-Integral Base Encoding Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2017/332 (PDF ) Reforgeability of Authenticated Encryption Schemes Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2017/331 (PDF ) Optimal attacks on qubit-based Quantum Key Recycling Daan Leermakers, Boris Skoric
2017/330 (PDF ) Distinguisher-Dependent Simulation in Two Rounds and its Applications Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum
2017/329 (PDF ) Maliciously Secure Multi-Client ORAM Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2017/328 (PDF ) Evaluating Bernstein-Rabin-Winograd Polynomials Sebati Ghosh, Palash Sarkar
2017/327 (PDF ) MQ Signatures for PKI Alan Szepieniec, Ward Beullens, Bart Preneel
2017/326 (PDF ) Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data Manuel Barbosa, Dario Catalano, Dario Fiore
2017/325 (PDF ) CHVote Protocol Specification Rolf Haenni, Reto E. Koenig, Philipp Locher, Eric Dubuis
2017/324 (PDF ) Family of PRGs based on Collections of Arithmetic Progressions Ch. Srikanth, C. E. Veni Madhavan
2017/323 (PDF ) Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance: Lattice-based Construction and More Atsushi Takayasu, Yohei Watanabe
2017/321 (PDF ) How Fast Can We Obfuscate Using Ideal Graded Encoding Schemes Dingfeng Ye, Peng Liu, Jun Xu
2017/320 (PDF ) Speeding up Huff Form of Elliptic Curves Neriman Gamze Orhon, Huseyin Hisil
2017/319 (PDF ) Embed-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting Sikhar Patranabis, Debdeep Mukhopadhyay
2017/317 (PDF ) Solidus: Confidential Distributed Ledger Transactions via PVORM Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi
2017/316 (PDF ) Exploring Potential 6LoWPAN Traffic Side Channels Yan Yan, Elisabeth Oswald, Theo Tryfonas
2017/315 (PDF ) Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version) Bernardo Ferreira, Joaão Leitão, Henrique Domingos
2017/314 (PDF ) Post-quantum cryptography---dealing with the fallout of physics success Daniel J. Bernstein, Tanja Lange
2017/312 (PDF ) Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation) Boaz Barak, Zvika Brakerski, Ilan Komargodski, Pravesh K. Kothari
2017/311 (PDF ) Constructing Multidimensional Differential Addition Chains and their Applications Aaron Hutchinson, Koray Karabina
2017/310 (PDF ) KDM-Secure Public-Key Encryption from Constant-Noise LPN Shuai Han, Shengli Liu
2017/309 (PDF ) Perfectly Secure Message Transmission Scheme against Rational Adversaries Maiki Fujita, Takeshi Koshiba
2017/308 (PDF ) Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus Nicholas Genise, Daniele Micciancio
2017/307 (PDF ) Efficient Synchronous Byzantine Consensus Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
2017/306 (PDF ) Cube Attacks on Non-Blackbox Polynomials Based on Division Property (Full Version) Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
2017/305 (PDF ) A Zero Knowledge Sumcheck and its Applications Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner
2017/304 (PDF ) Provably Secure NTRUEncrypt over More General Cyclotomic Rings Yang Yu, Guangwu Xu, Xiaoyun Wang
2017/303 (PDF ) Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/301 (PDF ) Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation Alex Lombardi, Vinod Vaikuntanathan
2017/300 (PDF ) Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies Iddo Bentov, Pavel Hubáček, Tal Moran, Asaf Nadler
2017/299 (PDF ) Fast Private Set Intersection from Homomorphic Encryption Hao Chen, Kim Laine, Peter Rindal
2017/298 (PDF ) An Investigation of Sources of Randomness Within Discrete Gaussian Sampling Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O’Sullivan, Tim Güneysu, Francesco Regazzoni
2017/297 (PDF ) A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert
2017/296 (PDF ) Topology-Hiding Computation on all Graphs Adi Akavia, Rio LaVigne, Tal Moran
2017/295 (PDF ) Improved key-reconciliation method Ludo Tolhuizen, Ronald Rietman, Oscar Garcia-Morchon
2017/294 (PDF ) Secure searching of biomarkers through hybrid homomorphic encryption scheme Miran Kim, Yongsoo Song, Jung Hee Cheon
2017/293 (PDF ) Montgomery curves and the Montgomery ladder Daniel J. Bernstein, Tanja Lange
2017/292 (PDF ) Involutory Differentially 4-Uniform Permutations from Known Constructions Shihui Fu, Xiutao Feng
2017/291 (PDF ) How to Achieve Non-Malleability in One or Two Rounds Dakshita Khurana, Amit Sahai
2017/290 (PDF ) Double DIP: Re-Evaluating Security of Logic Encryption Algorithms Yuanqi Shen, Hai Zhou
2017/289 (PDF ) On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks Matthias Krause
2017/288 (PDF ) Security of Symmetric Primitives under Incorrect Usage of Keys Pooya Farshim, Claudio Orlandi, Răzvan Roşie
2017/287 (PDF ) Towards Sound and Optimal Leakage Detection Procedure Liwei Zhang, A. Adam Ding, Francois Durvaux, Francois-Xavier Standaert, Yunsi Fei
2017/285 (PDF ) Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
2017/284 (PDF ) SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA Maik Ender, Alexander Wild, Amir Moradi
2017/283 (PDF ) On the Easiness of Turning Higher-Order Leakages into First-Order Thorben Moos, Amir Moradi
2017/282 (PDF ) Collapsing sponges: Post-quantum security of the sponge construction Dominique Unruh
2017/281 (PDF ) Practical Secure Aggregation for Privacy Preserving Machine Learning Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth
2017/280 (PDF ) Amortization with Fewer Equations for Proving Knowledge of Small Secrets Rafael del Pino, Vadim Lyubashevsky
2017/279 (PDF ) Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
2017/278 (PDF ) New Observations on Invariant Subspace Attack Yunwen Liu, Vincent Rijmen
2017/277 (PDF ) Minimizing the Complexity of Goldreich's Pseudorandom Generator Alex Lombardi, Vinod Vaikuntanathan
2017/276 (PDF ) Obfuscating Compute-and-Compare Programs under LWE Daniel Wichs, Giorgos Zirdelis
2017/275 (PDF ) Simple and Generic Constructions of Succinct Functional Encryption Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/274 (PDF ) Lockable Obfuscation Rishab Goyal, Venkata Koppula, Brent Waters
2017/273 (PDF ) Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles Huijia Lin, Rafael Pass, Pratik Soni
2017/272 (PDF ) Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht
2017/271 (PDF ) High Order Masking of Look-up Tables with Common Shares Jean-Sebastien Coron, Franck Rondepierre, Rina Zeitoun
2017/270 (PDF ) Rational Proofs against Rational Verifiers Keita Inasawa, Kenji Yasunaga
2017/269 (PDF ) Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks Okan Seker, Thomas Eisenbarth, Rainer Steinwandt
2017/268 (PDF ) Efficient Sanitizable Signatures without Random Oracles Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder
2017/267 (PDF ) A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis Seungkwang Lee
2017/266 (PDF ) From Higher-Order Differentials to Polytopic Cryptanalysis Tyge Tiessen
2017/265 (PDF ) Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation Kamalesh Acharya, Ratna Dutta
2017/264 (PDF ) A note on how to (pre-)compute a ladder Thomaz Oliveira, Julio López, Hüseyin Hışıl, Armando Faz-Hernández, Francisco Rodrıíguez-Henrıíquez
2017/263 (PDF ) Bivariate attacks and confusion coefficients Sylvain Guilley, Liran Lerman
2017/262 (PDF ) When It’s All Just Too Much: Outsourcing MPC-Preprocessing Peter Scholl, Nigel P. Smart, Tim Wood
2017/261 (PDF ) Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
2017/260 (PDF ) Message-Recovery MACs and Verification-Unskippable AE Shoichi Hirose, Yu Sasaki, Kan Yasuda
2017/259 (PDF ) Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time Daniele Micciancio, Michael Walter
2017/258 (PDF ) Pseudorandomness of Ring-LWE for Any Ring and Modulus Chris Peikert, Oded Regev, Noah Stephens-Davidowitz
2017/257 (PDF ) Threshold Fully Homomorphic Encryption Aayush Jain, Peter M. R. Rasmussen, Amit Sahai
2017/256 (PDF ) A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf Kuesters, Daniel Rausch
2017/255 (PDF ) New and Old Limits for AES Known-Key Distinguishers Lorenzo Grassi, Christian Rechberger
2017/254 (PDF ) Towards Easy Key Enumeration Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
2017/253 (PDF ) A Modular Security Analysis of EAP and IEEE 802.11 Chris Brzuska, Håkon Jacobsen
2017/252 (PDF ) High-Order Conversion From Boolean to Arithmetic Masking Jean-Sebastien Coron
2017/251 (PDF ) A Lattice-Based Universal Thresholdizer for Cryptographic Systems Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim
2017/250 (PDF ) Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs Huijia Lin, Stefano Tessaro
2017/249 (PDF ) Proof of Luck: an Efficient Blockchain Consensus Protocol Mitar Milutinovic, Warren He, Howard Wu, Maxinder Kanwal
2017/248 (PDF ) IPcore implementation susceptibility: A case study of Low latency ciphers Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai
2017/247 (PDF ) Efficient Multivariate Ring Signature Schemes Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2017/246 (PDF ) An Analysis of FV Parameters Impact Towards its Hardware Acceleration Joël Cathébras, Alexandre Carbon, Renaud Sirdey, Nicolas Ventroux
2017/245 (PDF ) Cache-Base Application Detection in the Cloud Using Machine Learning Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
2017/244 (PDF ) Model-counting Approaches For Nonlinear Numerical Constraints Mateus Borges, Quoc-Sang Phan, Antonio Filieri, Corina S. Păsăreanu
2017/243 (PDF ) Key Recovery: Inert and Public Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines
2017/242 (PDF ) Full accounting for verifiable outsourcing Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies
2017/241 (PDF ) Linear Consistency for Proof-of-Stake Blockchains Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
2017/240 (PDF ) Lattice-Based SNARGs and Their Application to More Efficient Obfuscation Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
2017/239 (PDF ) Boosting Authenticated Encryption Robustness With Minimal Modifications Tomer Ashur, Orr Dunkelman, Atul Luykx
2017/238 (PDF ) Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin Tim Ruffing, Pedro Moreno-Sanchez
2017/237 (PDF ) Switch Commitments: A Safety Switch for Confidential Transactions Tim Ruffing, Giulio Malavolta
2017/236 (PDF ) A new rank metric codes based encryption scheme Pierre Loidreau
2017/235 (PDF ) Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption Isheeta Nargis
2017/234 (PDF ) Automatically Detecting Compromised Secrets: Foundations, Design Principles, and Applications Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan
2017/233 (PDF ) Simplifying Design and Analysis of Complex Predicate Encryption Schemes Shashank Agrawal, Melissa Chase
2017/232 (PDF ) TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake Alexander Chepurnoy, Tuyet Duong, Lei Fan, Hong-Sheng Zhou
2017/231 (PDF ) EHE: nonce misuse-resistant message authentication Sergey Agievich
2017/230 (PDF ) Smart Contracts Make Bitcoin Mining Pools Vulnerable Yaron Velner, Jason Teutsch, Loi Luu
2017/229 (PDF ) Multi-Prover Interactive Proofs: Unsound Foundations Claude Crépeau, Nan Yang
2017/228 (PDF ) Efficient and Secure Outsourcing of Genomic Data Storage João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar, Marc-Olivier Killijian, Jean-Pierre Hubaux
2017/227 (PDF ) Towards Shared Ownership in the Cloud Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
2017/226 (PDF ) JIMU: Faster LEGO-based Secure Computation using Additive Homomorphic Hashes Ruiyu Zhu, Yan Huang
2017/225 (PDF ) Bandwidth Hard Functions for ASIC Resistance Ling Ren, Srinivas Devadas
2017/224 (PDF ) Simple Encrypted Arithmetic Library - SEAL v2.1 Hao Chen, Kim Laine, Rachel Player
2017/223 (PDF ) 0-RTT Key Exchange with Full Forward Secrecy Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
2017/221 (PDF ) A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
2017/220 (PDF ) Cryptanalysis of PMACx, PMAC2x, and SIVx Kazuhiko Minematsu, Tetsu Iwata
2017/219 (PDF ) Attribute-Based Encryption from Identity-Based Encryption Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin
2017/218 (PDF ) Repeated Games for Generating Randomness in Encryption Kenji Yasunaga, Kosuke Yuzawa
2017/217 (PDF ) Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings Kuo-Hui Yeh
2017/216 (PDF ) SCRAPE: Scalable Randomness Attested by Public Entities Ignacio Cascudo, Bernardo David
2017/214 (PDF ) Low Cost Constant Round MPC Combining BMR and Oblivious Transfer Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
2017/213 (PDF ) Quantum Information Set Decoding Algorithms Ghazal Kachigar, Jean-Pierre Tillich
2017/212 (PDF ) Montgomery curves and their arithmetic: The case of large characteristic fields Craig Costello, Benjamin Smith
2017/211 (PDF ) Multi-level Access in Searchable Symmetric Encryption James Alderman, Keith M. Martin, Sarah Louise Renwick
2017/210 (PDF ) Public Key Cryptosystems with Noisy Secret Keys Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas
2017/209 (PDF ) Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness Qipeng Liu, Mark Zhandry
2017/208 (PDF ) SoK: Security Models for Pseudo-Random Number Generators Sylvain Ruhault
2017/207 (PDF ) Private Queries on Encrypted Genomic Data Gizem S Cetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal, Yuhou Xia
2017/206 (PDF ) Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes Yongge Wang
2017/205 (PDF ) ZETA: Towards Tagless Authenticated Encryption Anindya Shankar Bhandari, Dipanwita Roy Chowdhury
2017/204 (PDF ) Linear Cryptanalysis Using Low-bias Linear Approximations Tomer Ashur, Daniël Bodden, Orr Dunkelman
2017/203 (PDF ) Proofs of Useful Work Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2017/202 (PDF ) Average-Case Fine-Grained Hardness Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2017/201 (PDF ) Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers Gabriel Kaptchuk, Ian Miers, Matthew Green
2017/200 (PDF ) Anonymous Attestation with Subverted TPMs Jan Camenisch, Manu Drijvers, Anja Lehmann
2017/199 (PDF ) Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme Dustin Moody, Ray Perlner, Daniel Smith-Tone
2017/198 (PDF ) FHE with Recursive Ciphertext Masahiro Yagisawa
2017/197 (PDF ) A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group Wenying Zhang, Zhaohui Xing, Keqin Feng
2017/196 (PDF ) Attribute-based concurrent signatures BaoHong Li, Guoqing Xu, Yinliang Zhao
2017/195 (PDF ) Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices Chaoyun Li, Qingju Wang
2017/194 (PDF ) Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2) Andrea Visconti, Chiara Valentina Schiavo, René Peralta
2017/193 (PDF ) SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures Shuwen Deng, Doğuhan Gümüşoğlu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer
2017/191 (PDF ) CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun
2017/190 (PDF ) The first collision for full SHA-1 Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov
2017/189 (PDF ) Global-Scale Secure Multiparty Computation Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017/188 (PDF ) Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer Wenying Zhang, Vincent Rijmen
2017/187 (PDF ) The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives H. Gopalakrishna Gadiyar, R. Padma
2017/186 (PDF ) A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
2017/185 (PDF ) A Virtual Wiretap Channel for Secure MessageTransmission Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
2017/184 (PDF ) Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models Guillaume Endignoux, Damian Vizár
2017/183 (PDF ) Analysis of Software Countermeasures for Whitebox Encryption Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen
2017/182 (PDF ) The Approximate $k$-List Problem Leif Both, Alexander May
2017/181 (PDF ) New techniques for trail bounds and application to differential trails in Keccak Silvia Mella, Joan Daemen, Gilles Van Assche
2017/180 (PDF ) Robust P2P Primitives Using SGX Enclaves Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
2017/179 (PDF ) REM: Resource-Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse
2017/178 (PDF ) Optimal Differential Trails in SIMON-like Ciphers Zhengbin Liu, Yongqiang Li, Mingsheng Wang
2017/177 (PDF ) Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg, D. R. Stinson
2017/176 (PDF ) Probabilistically Checkable Proofs of Proximity with Zero-Knowledge Yuval Ishai, Mor Weiss
2017/175 (PDF ) Analysis of Burn-in period for RC4 State Transition Goutam Paul, Souvik Ray
2017/174 (PDF ) Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes Ruiyu Zhu, Yan Huang
2017/173 (PDF ) Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions Marc Stevens, Dan Shumow
2017/172 (PDF ) On The Exact Security of Message Authentication Using Pseudorandom Functions Ashwin Jha, Avradip Mandal, Mridul Nandi
2017/171 (PDF ) Quantum Key Search with Side Channel Advice Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan Shepherd
2017/170 (PDF ) Error-free protection of EC point multiplication by modular extension Martin Seysen
2017/169 (PDF ) UFace: Your Universal Password That No One Can See Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
2017/168 (PDF ) AES-GCM-SIV: Specification and Analysis Shay Gueron, Adam Langley, Yehuda Lindell
2017/167 (PDF ) Cloud Storage File Recoverability Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid
2017/166 (PDF ) A roadmap to fully homomorphic elections: Stronger security, better verifiability Kristian Gjøsteen, Martin Strand
2017/165 (PDF ) SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3 Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
2017/164 (PDF ) Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations Benny Applebaum, Barak Arkis, Pavel Raykov, Prashant Nalini Vasudevan
2017/163 (PDF ) Homomorphic Encryption without Gaussian Noise Anamaria Costache, Nigel P. Smart
2017/162 (PDF ) Analysis of AES, SKINNY, and Others with Constraint Programming Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
2017/161 (PDF ) Security Notions for Bidirectional Channels Giorgia Azzurra Marson, Bertram Poettering
2017/160 (PDF ) Conditional Cube Attack on Round-Reduced ASCON Zheng Li, Xiaoyang Dong, Xiaoyun Wang
2017/159 (PDF ) Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin
2017/158 (PDF ) Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy Martin Potthast, Christian Forler, Eik List, Stefan Lucks
2017/157 (PDF ) Detecting General Algebraic Manipulation Attacks Kim Ramchen
2017/156 (PDF ) Trust Is Risk: A Decentralized Financial Trust Platform Orfeas Stefanos Thyfronitis Litos, Dionysis Zindros
2017/155 (PDF ) Random Sampling Revisited: Lattice Enumeration with Discrete Pruning Yoshinori Aono, Phong Q. Nguyen
2017/154 (PDF ) Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers Thorsten Kranz, Friedrich Wiemer, Gregor Leander
2017/153 (PDF ) Storage Efficient Substring Searchable Symmetric Encryption Iraklis Leontiadis, Ming Li
2017/152 (PDF ) Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption Fermi Ma, Mark Zhandry
2017/151 (PDF ) Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay
2017/150 (PDF ) Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation Elette Boyle, Niv Gilboa, Yuval Ishai
2017/149 (PDF ) Bitcoin as a Transaction Ledger: A Composable Treatment Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2017/148 (PDF ) Pattern Matching on Encrypted Streams Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders
2017/147 (PDF ) Ad Hoc PSM Protocols: Secure Computation Without Coordination Amos Beimel, Yuval Ishai, Eyal Kushilevitz
2017/146 (PDF ) Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions Mohammad Hajiabadi, Bruce M. Kapron
2017/145 (PDF ) The Multi-User Security of Double Encryption Viet Tung Hoang, Stefano Tessaro
2017/144 (PDF ) Privacy-Preserving Search of Similar Patients in Genomic Data Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin
2017/143 (PDF ) Constraint-hiding Constrained PRFs for NC1 from LWE Ran Canetti, Yilei Chen
2017/142 (PDF ) Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
2017/141 (PDF ) Partitioned Group Password-Based Authenticated Key Exchange Dario Fiore, Maria Isabel Gonzalez Vasco, Claudio Soriente
2017/140 (PDF ) Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples Nina Bindel, Johannes Buchmann, Florian Göpfert, Markus Schmidt
2017/139 (PDF ) Revisiting AES Related-Key Differential Attacks with Constraint Programming David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon
2017/138 (PDF ) How (not) to Use Welch's T-test in Side-Channel Security Evaluations François-Xavier Standaert
2017/137 (PDF ) Modifying an Enciphering Scheme after Deployment Paul Grubbs, Thomas Ristenpart, Yuval Yarom
2017/136 (PDF ) Dispersed Cryptography and the Quotient Ring Transform Anna Johnston
2017/135 (PDF ) Hashing Garbled Circuits for Free Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov
2017/134 (PDF ) A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes Ryan Stanley-Oakes
2017/133 (PDF ) Composable and Robust Outsourced Storage Christian Badertscher, Ueli Maurer
2017/132 (PDF ) Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol Roel Peeters, Jens Hermans, Aysajan Abidin
2017/131 (PDF ) A Practical Multivariate Blind Signature Scheme Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed
2017/130 (PDF ) Topology-Hiding Computation Beyond Logarithmic Diameter Adi Akavia, Tal Moran
2017/129 (PDF ) Sublinear Zero-Knowledge Arguments for RAM Programs Payman Mohassel, Mike Rosulek, Alessandra Scafuro
2017/128 (PDF ) New Collision Attacks on Round-Reduced Keccak Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo
2017/127 (PDF ) Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption Prabhanjan Ananth, Aayush Jain, Amit Sahai
2017/126 (PDF ) Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity Seny Kamara, Tarik Moataz
2017/125 (PDF ) Non-Interactive Secure 2PC in the Offline/Online and Batch Settings Payman Mohassel, Mike Rosulek
2017/124 (PDF ) On the Exact Round Complexity of Self-Composable Two-Party Computation Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
2017/123 (PDF ) Separating IND-CPA and Circular Security for Unbounded Length Key Cycles Rishab Goyal, Venkata Koppula, Brent Waters
2017/122 (PDF ) One-Shot Verifiable Encryption from Lattices Vadim Lyubashevsky, Gregory Neven
2017/121 (PDF ) Twisted $\mu_4$-normal form for elliptic curves David Kohel
2017/120 (PDF ) Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption Rishab Goyal, Venkata Koppula, Brent Waters
2017/119 (PDF ) Quantum Authentication with Key Recycling Christopher Portmann
2017/118 (PDF ) A New Structural-Differential Property of 5-Round AES Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2017/117 (PDF ) The SM9 Cryptographic Schemes Zhaohui Cheng
2017/116 (PDF ) Masking Proofs are Tight (and How to Exploit it in Security Evaluations) Vincent Grosso, François-Xavier Standaert
2017/115 (PDF ) An efficient self-blindable attribute-based credential scheme Sietse Ringers, Eric Verheul, Jaap-Henk Hoepman
2017/114 (PDF ) Zero-Knowledge Proofs of Proximity Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan
2017/113 (PDF ) Algebraic Fault Analysis of SHA-3 Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl
2017/112 (PDF ) Zero-Knowledge Proxy Re-Identification Revisited Xavier Bultel, Pascal Lafourcade
2017/111 (PDF ) EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves Jonathan Burns, Daniel Moore, Katrina Ray, Ryan Speers, Brian Vohaska
2017/110 (PDF ) A Smart Contract for Boardroom Voting with Maximum Voter Privacy Patrick McCorry, Siamak F. Shahandashti, Feng Hao
2017/109 (PDF ) Unilaterally-Authenticated Key Exchange Yevgeniy Dodis, Dario Fiore
2017/108 (PDF ) Photonic Side Channel Attacks Against RSA Elad Carmon, Jean-Pierre Seifert, Avishai Wool
2017/107 (PDF ) Secure Logging with Crash Tolerance Erik-Oliver Blass, Guevara Noubir
2017/106 (PDF ) $\mu$chain: How to Forget without Hard Forks Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
2017/105 (PDF ) A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem Ling Yang, Fuyang Fang, Xianhui Lu, Wen-Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan
2017/104 (PDF ) Implementing BP-Obfuscation Using Graph-Induced Encoding Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz
2017/103 (PDF ) Reconciling d+1 Masking in Hardware and Software Hannes Gross, Stefan Mangard
2017/102 (PDF ) Quantum Authentication and Encryption with Key Recycling Serge Fehr, Louis Salvail
2017/101 (PDF ) Optimizing Implementations of Lightweight Building Blocks Jeremy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux
2017/100 (PDF ) Private Puncturable PRFs From Standard Lattice Assumptions Dan Boneh, Sam Kim, Hart Montgomery
2017/099 (PDF ) Making NSEC5 Practical for DNSSEC Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Včelák, Leonid Reyzin, Sharon Goldberg
2017/098 (PDF ) Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions Vanesa Daza, Nikolaos Makriyannis
2017/097 (PDF ) Boolean functions with restricted input and their robustness; application to the FLIP cipher Claude Carlet, Pierrick Méaux, Yann Rotella
2017/096 (PDF ) Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques Shota Yamada
2017/095 (PDF ) Attacks on Secure Logging Schemes Gunnar Hartung
2017/094 (PDF ) Quantum Tokens for Digital Signatures Shalev Ben-David, Or Sattath
2017/093 (PDF ) On new multivariate cryptosystems based on hidden Eulerian equations over finite fields Vasyl Ustimenko
2017/092 (PDF ) Small CRT-Exponent RSA Revisited Atsushi Takayasu, Yao Lu, Liqiang Peng
2017/091 (PDF ) Design and Implementation of Low Depth Pairing-based Homomorphic Encryption Scheme Vincent Herbert, Bhaskar Biswas, Caroline Fontaine
2017/090 (PDF ) Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud Saiyu Qi, Yuanqing Zheng
2017/089 (PDF ) On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes Yuri Borissov, Peter Boyvalenkov, Robert Tsenkov
2017/088 (PDF ) A Differential Fault Attack on Plantlet Subhamoy Maitra, Akhilesh Siddhanti
2017/087 (PDF ) Cryptanalysis of full round Fruit Sabyasachi Dey, Santanu Sarkar
2017/086 (PDF ) Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation David Derler, Sebastian Ramacher, Daniel Slamanig
2017/085 (PDF ) Information Security Applications of Bit-Mixers Laszlo Hars
2017/084 (PDF ) Hardware Bit-Mixers Laszlo Hars
2017/083 (PDF ) Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders Anna Johnston
2017/082 (PDF ) Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates Marc Fischlin, Felix Günther
2017/081 (PDF ) Estonian Voting Verification Mechanism Revisited Again Ivo Kubjas, Tiit Pikma, Jan Willemson
2017/080 (PDF ) From Minicrypt to Obfustopia via Private-Key Functional Encryption Ilan Komargodski, Gil Segev
2017/079 (PDF ) Faster Bootstrapping of FHE over the Integers Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim
2017/078 (PDF ) LPN Decoded Andre Esser, Robert Kübler, Alexander May
2017/077 (PDF ) Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad
2017/076 (PDF ) DFA on LS-Designs with a Practical Implementation on SCREAM (extended version) Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey
2017/075 (PDF ) A First DFA on PRIDE: from Theory to Practice (extended version) Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey
2017/074 (PDF ) Honey Chatting: A novel instant messaging system robust to eavesdropping over communication Joo-Im Kim, Ji Won Yoon
2017/073 (PDF ) Visual Honey Encryption: Application to Steganography Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee
2017/072 (PDF ) How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki
2017/071 (PDF ) Efficient Differential Trail Searching Algorithm for ARX Block Ciphers Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2017/070 (PDF ) Symbolic Models for Isolated Execution Environments Charlie Jacomme, Steve Kremer, Guillaume Scerri
2017/069 (PDF ) The Exact Security of PMAC Peter Gaži, Krzysztof Pietrzak, Michal Rybár
2017/068 (PDF ) Authenticated Encryption in the Face of Protocol and Side Channel Leakage Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam
2017/067 (PDF ) Computation of a 768-bit prime field discrete logarithm Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke
2017/066 (PDF ) Subring Homomorphic Encryption Seiko Arita, Sari Handa
2017/065 (PDF ) FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint
2017/064 (PDF ) Fast Montgomery-like Square Root Computation over $GF(2^m)$ for All Trinomials Yin Li, Yu Zhang
2017/063 (PDF ) Optimal Extension Protocols for Byzantine Broadcast and Agreement Chaya Ganesh, Arpita Patra
2017/062 (PDF ) Efficient Maliciously Secure Two Party Computation for Mixed Programs Arash Afshar, Payman Mohassel, Mike Rosulek
2017/061 (PDF ) Short Digital Signatures and ID-KEMs via Truncation Collision Resistance Tibor Jager, Rafael Kurek
2017/060 (PDF ) Zero Round-Trip Time for the Extended Access Control Protocol Jacqueline Brendel, Marc Fischlin
2017/059 (PDF ) Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext Kamalesh Acharya, Ratna Dutta
2017/058 (PDF ) WalnutDSA(TM): A Quantum-Resistant Digital Signature Algorithm Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2017/057 (PDF ) Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card Mathias Wagner, Stefan Heyse
2017/056 (PDF ) Verifiable Classroom Voting in Practice Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti
2017/055 (PDF ) A Probabilistic Baby-Step Giant-Step Algorithm Prabhat Kushwaha, Ayan Mahalanobis
2017/054 (PDF ) Attribute-Based Encryption Implies Identity-Based Encryption Javier Herranz
2017/053 (PDF ) Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem Dimitar Jetchev, Benjamin Wesolowski
2017/052 (PDF ) A short note on the security of Round-Robin Differential Phase-Shift QKD Boris Skoric
2017/051 (PDF ) A note on VRFs from Verifiable Functional Encryption Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
2017/050 (PDF ) An Obfuscating Compiler Peter T. Breuer
2017/049 (PDF ) LARA - A Design Concept for Lattice-based Encryption El Bansarkhani Rachid
2017/048 (PDF ) ROTE: Rollback Protection for Trusted Execution Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
2017/047 (PDF ) On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL Martin R. Albrecht
2017/046 (PDF ) Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade
2017/045 (PDF ) Efficient Round-Optimal Blind Signatures in the Standard Model Essam Ghadafi
2017/044 (PDF ) Anonymous contribution of data Matthew McKague, David Eyers
2017/043 (PDF ) Accumulators with Applications to Anonymity-Preserving Revocation Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov
2017/042 (PDF ) Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient Yuanxi Dai, Yannick Seurin, John Steinberger, Aishwarya Thiruvengadam
2017/041 (PDF ) Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy Yongge Wang, Qutaibah m. Malluhi
2017/040 (PDF ) Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2017/039 (PDF ) SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version) Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
2017/038 (PDF ) CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
2017/037 (PDF ) Double-base scalar multiplication revisited Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
2017/036 (PDF ) Low-Complexity Cryptographic Hash Functions Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan
2017/035 (PDF ) Privacy-Preserving Classification on Deep Neural Network Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff
2017/034 (PDF ) Analysis of the NORX Core Permutation Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov
2017/033 (PDF ) Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures Peter Pessl
2017/032 (PDF ) Cryptanalysis of GlobalPlatform Secure Channel Protocols Mohamed Sabt, Jacques Traoré
2017/031 (PDF ) Honey Encryption for Language Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache
2017/030 (PDF ) Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017/029 (PDF ) Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich
2017/027 (PDF ) Scalable Multi-Party Private Set-Intersection Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2017/026 (PDF ) Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2017/025 (PDF ) Improved Structure Preserving Signatures under Standard Bilinear Assumptions Charanjit S. Jutla, Arnab Roy
2017/024 (PDF ) Searchable Encrypted Relational Databases: Risks and Countermeasures Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
2017/023 (PDF ) Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits Nuttapong Attrapadung
2017/022 (PDF ) Privacy for Distributed Databases via (Un)linkable Pseudonyms Jan Camenisch, Anja Lehmann
2017/021 (PDF ) A Generic Approach to Constructing and Proving Verifiable Random Functions Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters
2017/020 (PDF ) concerto: A Methodology Towards Reproducible Analyses of TLS Datasets Olivier Levillain, Maxence Tury, Nicolas Vivet
2017/019 (PDF ) SmartPool: Practical Decentralized Pooled Mining Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena
2017/018 (PDF ) Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs Nir Bitansky
2017/017 (PDF ) Improved Algorithms for the Approximate k-List Problem in Euclidean Norm Gottfried Herold, Elena Kirshanova
2017/016 (PDF ) Provable Security of Substitution-Permutation Networks Yevgeniy Dodis, Jonathan Katz, John Steinberger, Aishwarya Thiruvengadam, Zhe Zhang
2017/015 (PDF ) Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/014 (PDF ) ORAMs in a Quantum World Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser
2017/013 (PDF ) Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation Meilof Veeningen
2017/012 (PDF ) Universal Samplers with Fast Verification Venkata Koppula, Andrew Poelstra, Brent Waters
2017/011 (PDF ) Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2017/010 (PDF ) Circuit-Private Multi-Key FHE Wutichai Chongchitmate, Rafail Ostrovsky
2017/009 (PDF ) Access Control Encryption for Equality, Comparison, and More Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
2017/008 (PDF ) Externally Verifiable Oblivious RAM Joshua Gancher, Adam Groce, Alex Ledger
2017/007 (PDF ) Algebraic Attack Efficiency versus S-box Representation Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk
2017/006 (PDF ) Reduced Mumford divisors of a genus 2 curve through its jacobian function field Eduardo Ruiz Duarte
2017/004 (PDF ) A New Approach for Practical Function-Private Inner Product Encryption Sungwook Kim, Jinsu Kim, Jae Hong Seo
2017/003 (PDF ) The STROBE protocol framework Mike Hamburg
2017/001 (PDF ) Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems Jorge Luis Villar
2016/1196 (PDF ) MASCAT: Stopping Microarchitectural Attacks Before Execution Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2016/1195 (PDF ) Constant-Time Callees with Variable-Time Callers Cesar Pereida Garcïa, Billy Bob Brumley
2016/1194 (PDF ) Efficient Encryption from Random Quasi-Cyclic Codes Carlos Aguilar, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor
2016/1193 (PDF ) The Secret Processor Will Go to The Ball: Benchmark Insider-Proof Encrypted Computing P. T. Breuer, J. P. Bowen, E. Palomar, Z. Liu
2016/1192 (PDF ) Non-Malleable Codes with Split-State Refresh Antonio Faonio, Jesper Buus Nielsen
2016/1191 (PDF ) On the Security of Practical and Complete Homomorphic Encrypted Computation P. T. Breuer, J. P. Bowen
2016/1190 (PDF ) Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
2016/1189 (PDF ) On the Bit Security of Elliptic Curve Diffie--Hellman Barak Shani
2016/1188 (PDF ) Farfalle: parallel permutation-based cryptography Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2016/1187 (PDF ) Computing Optimal Ate Pairings on Elliptic Curves with Embedding Degree $9,15$ and $27$ Emmanuel Fouotsa, Nadia El Mrabet, Aminatou Pecha
2016/1186 (PDF ) On the Complexity of Breaking Pseudoentropy Maciej Skorski
2016/1184 (PDF ) Bitcoin Private Key Locked Transactions Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas
2016/1183 (PDF ) Some Results on the Known Classes of Quadratic APN Functions Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun
2016/1182 (PDF ) Public Key Encryption with Equality Test in the Standard Model Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn
2016/1181 (PDF ) New Impossible Differential Search Tool from Design and Cryptanalysis Aspects Yu Sasaki, Yosuke Todo
2016/1179 (PDF ) Updatable Functional Encryption Afonso Arriaga, Vincenzo Iovino, Qiang Tang
2016/1178 (PDF ) Implementing and Proving the TLS 1.3 Record Layer Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Jianyang Pan, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Béguelin, Jean Karim Zinzindohoué
2016/1177 (PDF ) Efficient Slide Attacks Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller
2016/1176 (PDF ) Leakage of Signal function with reused keys in RLWE key exchange Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott Fluhrer, Xiaodong Lin
2016/1175 (PDF ) On the Security Notions for Homomorphic Signatures Dario Catalano, Dario Fiore, Luca Nizzardo
2016/1174 (PDF ) Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption Eik List, Mridul Nandi
2016/1173 (PDF ) Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring Lijing Zhou, Licheng Wang, Yiru Sun
2016/1172 (PDF ) On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks Ping Zhang, Honggang Hu
2016/1171 (PDF ) A Salad of Block Ciphers Roberto Avanzi
2016/1170 (PDF ) Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC Christoph Dobraunig, Eik List
2016/1169 (PDF ) LWE from Non-commutative Group Rings Qi Cheng, Jun Zhang, Jincheng Zhuang
2016/1167 (PDF ) Mobile Commerce: Secure Multi-party Computation & Financial Cryptography Sumit Chakraborty
2016/1166 (PDF ) Group key exchange protocols withstanding ephemeral-key reveals Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Adriana Suarez Corona
2016/1165 (PDF ) Efficient Transparent Redactable Signatures with a Single Signature Invocation Stuart Haber, William Horne, Miaomiao Zhang
2016/1164 (PDF ) Attacking FHE-based applications by software fault injections Ilaria Chillotti, Nicolas Gama, Louis Goubin
2016/1163 (PDF ) Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data Wen-jie Lu, Shohei Kawasaki, Jun Sakuma
2016/1162 (PDF ) Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
2016/1161 (PDF ) Impossible Differential Attack on Simpira v2 Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2016/1160 (PDF ) Meet-in-the-Middle Attack on QARMA Block Cipher Rui Zong, Xiaoyang Dong
2016/1159 (PDF ) SPECTRE: A Fast and Scalable Cryptocurrency Protocol Yonatan Sompolinsky, Yoad Lewenberg, Aviv Zohar
2016/1158 (PDF ) Activate Later Certificates for V2X -- Combining ITS efficiency with privacy Eric R. Verheul
2016/1157 (PDF ) NewHope without reconciliation Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
2016/1156 (PDF ) Scripting smart contracts for distributed ledger technology Pablo Lamela Seijas, Simon Thompson, Darryl McAdams
2016/1155 (PDF ) Comparative Study of Various Approximations to the Covariance Matrix in Template Attacks Mathias Wagner, Yongbo Hu, Chen Zhang, Yeyang Zheng
2016/1154 (PDF ) Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems Steven D. Galbraith, Christophe Petit, Javier Silva
2016/1153 (PDF ) Attacks against search Poly-LWE Momonari Kudo
2016/1152 (PDF ) Leak Me If You Can: Does TVLA Reveal Success Rate? Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay
2016/1151 (PDF ) A Novel Multi-factor ID-based Designated Verifier Signature scheme Mike Scott
2016/1150 (PDF ) Simple Homomorphisms of Cocks IBE and Applications Rio LaVigne
2016/1149 (PDF ) Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2016/1148 (PDF ) Splinter: Practical Private Queries on Public Data Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia
2016/1147 (PDF ) Cryptanalysis of a certificateless aggregate signature scheme Nasrollah Pakniat, Mahnaz Noroozi
2016/1146 (PDF ) Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme Zengpeng Li, Steven D. Galbraith, Chunguang Ma
2016/1145 (PDF ) Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility Merrielle Spain, Mayank Varia
2016/1144 (PDF ) Private Projections & Variants Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik
2016/1143 (PDF ) Ciphertext and Plaintext Leakage Reveals the Entire TDES Key Yongbo Hu, Chen Zhang, Yeyang Zheng, Mathias Wagner
2016/1142 (PDF ) New construction of single-cycle T-function families Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
2016/1141 (PDF ) An Oblivious Parallel RAM with $O(\log^2 N)$ Parallel Runtime Blowup Kartik Nayak, Jonathan Katz
2016/1140 (PDF ) Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong
2016/1138 (PDF ) Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups Takeshi Koshiba, Katsuyuki Takashima
2016/1137 (PDF ) New Impossible Differential Characteristic of SPECK64 using MILP HoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2016/1136 (PDF ) Cryptography During the French and American Wars in Vietnam Phan Duong Hieu, Neal Koblitz
2016/1135 (PDF ) Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip Thorben Moos, Amir Moradi, Bastian Richter
2016/1134 (PDF ) Privacy-preserving Hybrid Recommender System Qiang Tang, Husen Wang
2016/1133 (PDF ) Implementing Complete Formulas on Weierstrass Curves in Hardware Pedro Maat C. Massolino, Joost Renes, Lejla Batina
2016/1132 (PDF ) Some results on ACORN Dibyendu Roy, Sourav Mukhopadhyay
2016/1131 (PDF ) New construction of single cycle T-function families Shiyi ZHANG, Yongjuan WANG, Guangpu GAO
2016/1130 (PDF ) Are RNGs Achilles’ heel of RFID Security and Privacy Protocols ? Atakan Arslan, Suleyman Kardas, Sultan Aldirmaz, Sarp Erturk
2016/1128 (PDF ) Modifying Shor’s algorithm to compute short discrete logarithms Martin Ekerå
2016/1127 (PDF ) Related-Key Impossible-Differential Attack on Reduced-Round SKINNY Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
2016/1126 (PDF ) Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song
2016/1124 (PDF ) Integrity Analysis of Authenticated Encryption Based on Stream Ciphers Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata
2016/1123 (PDF ) Dude, is my code constant time? Oscar Reparaz, Josep Balasch, Ingrid Verbauwhede
2016/1122 (PDF ) Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought) B. Skoric, M. de Vries
2016/1121 (PDF ) Insecurity of RCB: Leakage-Resilient Authenticated Encryption Farzaneh abed, Francesco Berti, Stefan Lucks
2016/1120 (PDF ) Cryptanalysis of Reduced round SKINNY Block Cipher Sadegh Sadeghi, Tahere Mohammadi, Nasour Bagheri
2016/1119 (PDF ) A Code-Based Group Signature Scheme Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit
2016/1118 (PDF ) Designing Optimal Implementations of Linear Layers (Full Version) Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang
2016/1117 (PDF ) Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2016/1116 (PDF ) Evaluating Entropy for TRNGs: Efficient, Robust and Provably Secure Maciej Skorski
2016/1115 (PDF ) Impossible Differential Cryptanalysis of Reduced-Round SKINNY Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
2016/1114 (PDF ) Full Disk Encryption: Bridging Theory and Practice Louiza Khati, Nicky Mouha, Damien Vergnaud
2016/1113 (PDF ) Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari
2016/1112 (PDF ) Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes Victor Cauchois, Pierre Loidreau, Nabil Merkiche
2016/1111 (PDF ) Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware Pascal Sasdrich, Amir Moradi, Tim Güneysu
2016/1110 (PDF ) Efficient Post-Quantum Zero-Knowledge and Signatures Steven Goldfeder, Melissa Chase, Greg Zaverucha
2016/1109 (PDF ) Practical CCA2-Secure and Masked Ring-LWE Implementation Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
2016/1108 (PDF ) Security Analysis of SKINNY under Related-Tweakey Settings Guozhen Liu, Mohona Ghosh, Ling Song
2016/1107 (PDF ) Magic Adversaries Versus Individual Reduction: Science Wins Either Way Yi Deng
2016/1106 (PDF ) Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption Romain Gay
2016/1105 (PDF ) Generic Transformations of Predicate Encodings: Constructions and Applications Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
2016/1104 (PDF ) Practical Functional Encryption for Bilinear Forms Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore
2016/1103 (PDF ) A Fast Single-Key Two-Level Universal Hash Function Debrup Chakraborty, Sebati Ghosh, Palash Sarkar
2016/1102 (PDF ) Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes, Palash Sarkar, Shashank Singh
2016/1101 (PDF ) MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher Ling Sun, Wei Wang, Ru Liu, Meiqin Wang
2016/1100 (PDF ) Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri
2016/1099 (PDF ) Improved Parameters for the Ring-TESLA Digital Signature Scheme Arjun Chopra
2016/1098 (PDF ) Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
2016/1097 (PDF ) Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps Prabhanjan Ananth, Amit Sahai
2016/1096 (PDF ) Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs Huijia Lin
2016/1095 (PDF ) Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise Noboru Kunihiro, Yuki Takahashi
2016/1094 (PDF ) New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters Yohei Watanabe, Keita Emura, Jae Hong Seo
2016/1093 (PDF ) Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing Siva Nishok Dhanuskodi, Daniel Holcomb
2016/1092 (PDF ) Parametrizations for Families of ECM-friendly curves Alexandre Gélin, Thorsten Kleinjung, Arjen K. Lenstra
2016/1091 (PDF ) On the Entropy of Oscillator-Based True Random Number Generators Yuan Ma, Jingqiang Lin, Jiwu Jing
2016/1090 (PDF ) OleF: An Inverse-Free Online Cipher Ritam Bhaumik, Mridul Nandi
2016/1089 (PDF ) Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms Jérémy Chotard, Duong Hieu Phan, David Pointcheval
2016/1088 (PDF ) How to infinitely share a secret more efficiently Anat Paskin-Cherniavsky
2016/1087 (PDF ) CENC is Optimally Secure Tetsu Iwata, Bart Mennink, Damian Vizár
2016/1086 (PDF ) An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model Reyhaneh Rabaninejad, Mohammad Hassan Ameri, Mahshid Delavar, Javad Mohajeri
2016/1085 (PDF ) Digital Signatures from Symmetric-Key Primitives David Derler, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig
2016/1084 (PDF ) Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs T-H. Hubert Chan, Elaine Shi
2016/1083 (PDF ) Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks Dingding Jia, Xianhui Lu, Bao Li
2016/1082 (PDF ) My traces learn what you did in the dark: recovering secret signals without key guesses Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma
2016/1081 (PDF ) Attacks to a proxy-mediated key agreement protocol based on symmetric encryption David Nuñez, Isaac Agudo, Javier Lopez
2016/1080 (PDF ) Does Coupling Affect the Security of Masked Implementations? Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen
2016/1079 (PDF ) Revisiting the Cubic UOV Signature Scheme Dung Hoang Duong, Takanori Yasuda, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi
2016/1078 (PDF ) Construction of $n$-variable ($n\equiv 2 \bmod 4$) balanced Boolean functions with maximum absolute value in autocorrelation spectra $< 2^{\frac n2}$ Deng Tang, Subhamoy Maitra
2016/1077 (PDF ) Blurry-ORAM: A Multi-Client Oblivious Storage Architecture N. P. Karvelas, Andreas Peter, Stefan Katzenbeisser
2016/1076 (PDF ) A Note on Quantum-Secure PRPs Mark Zhandry
2016/1075 (PDF ) Cryptanalysis of Simple Matrix Scheme for Encryption Gu Chunsheng
2016/1074 (PDF ) Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption Thomas Unterluggauer, Mario Werner, Stefan Mangard
2016/1073 (PDF ) Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
2016/1072 (PDF ) Game-Theoretic Security for Two-Party Protocols Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
2016/1071 (PDF ) Iron: Functional Encryption using Intel SGX Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
2016/1070 (PDF ) Preventing CLT Attacks on Obfuscation with Linear Overhead Rex Fernando, Peter M. R. Rasmussen, Amit Sahai
2016/1069 (PDF ) Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO Jesper Buus Nielsen, Thomas Schneider, Roberto Trifiletti
2016/1068 (PDF ) On Finding Short Cycles in Cryptographic Algorithms Elena Dubrova, Maxim Teslenko
2016/1067 (PDF ) Scalable Bias-Resistant Distributed Randomness Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, Bryan Ford
2016/1066 (PDF ) Optimizing Semi-Honest Secure Multiparty Computation for the Internet Aner Ben-Efraim, Yehuda Lindell, Eran Omri
2016/1065 (PDF ) Revisiting the Efficient Key Generation of ZHFE Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi
2016/1064 (PDF ) Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing David Derler, Stephan Krenn, Daniel Slamanig
2016/1063 (PDF ) Authenticated LSM Trees with Minimal Trust Yuzhe (Richard) Tang, Ju Chen, Kai Li
2016/1062 (PDF ) Catena: Efficient Non-equivocation via Bitcoin Alin Tomescu, Srinivas Devadas
2016/1061 (PDF ) Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing Joan Daemen
2016/1060 (PDF ) On Analyzing Program Behavior Under Fault Injection Attacks Jakub Breier
2016/1059 (PDF ) The INT-RUP Security of OCB with Intermediate (Parity) Checksum Ping Zhang, Peng Wang, Honggang Hu
2016/1058 (PDF ) Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography Markku-Juhani O. Saarinen
2016/1057 (PDF ) Secure Multiparty Computation from SGX Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi
2016/1056 (PDF ) A Tool Kit for Partial Key Exposure Attacks on RSA Atsushi Takayasu, Noboru Kunihiro
2016/1055 (PDF ) A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE Jung Hee Cheon, Kyoo Hyung Han, Jinsu Kim, Changmin Lee, Yongha Son
2016/1054 (PDF ) SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2016/1053 (PDF ) SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition Ashutosh Dhar Dwivedi, Miloš Klouček, Pawel Morawiecki, Ivica Nikolic̈, Josef Pieprzyk, Sebastian Wöjtowicz
2016/1052 (PDF ) Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2016/1051 (PDF ) Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System Shuai Han, Shengli Liu, Lin Lyu
2016/1050 (PDF ) Cryptographic decoding of the Leech lattice Alex van Poppelen
2016/1049 (PDF ) Randomized stopping times and provably secure pseudorandom permutation generators Michal Kulis, Pawel Lorek, Filip Zagorski
2016/1048 (PDF ) The Bitcoin Backbone Protocol with Chains of Variable Difficulty Juan A. Garay, Aggelos Kiayias, Nikos Leonardos
2016/1047 (PDF ) IoT Goes Nuclear: Creating a ZigBee Chain Reaction Eyal Ronen, Colin O’Flynn, Adi Shamir, Achi-Or Weingarten
2016/1046 (PDF ) Efficient Finite field multiplication for isogeny based post quantum cryptography Angshuman karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2016/1045 (PDF ) On Fast Calculation of Addition Chains for Isogeny-Based Cryptography Brian Koziel, Reza Azarderakhsh, David Jao, Mehran Mozaffari-Kermani
2016/1044 (PDF ) Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani
2016/1043 (PDF ) Concurrently Composable Security With Shielded Super-polynomial Simulators Brandon Broadnax, Nico Döttling, Gunnar Hartung, Jörn Müller-Quade, Matthias Nagel
2016/1042 (PDF ) "Oops, I did it again" -- Security of One-Time Signatures under Two-Message Attacks Leon Groot Bruinderink, Andreas Hülsing
2016/1041 (PDF ) XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data Chia-Mu Yu
2016/1039 (PDF ) A Fiat-Shamir Implementation Note Simon Cogliani, Rémi Géraud, David Naccache
2016/1038 (PDF ) An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen
2016/1037 (PDF ) Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation Dawid Gawel, Maciej Kosarzecki, Poorvi L. Vora, Hua Wu, Filip Zagorski
2016/1036 (PDF ) Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers Zhiyuan Guo, Renzhang Liu, Wenling Wu, Dongdai Lin
2016/1035 (PDF ) Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection Maciej Skorski
2016/1034 (PDF ) Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha Arka Rai Choudhuri, Subhamoy Maitra
2016/1033 (PDF ) Decentralized Anonymous Micropayments Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra
2016/1032 (PDF ) Efficient Covert Two-Party Computation Stanislaw Jarecki
2016/1031 (PDF ) A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen
2016/1030 (PDF ) Novel Inner Product Encryption Resistant to Partial Collusion Attacks Yuqiao Deng, Ge Song
2016/1029 (PDF ) Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family Yuqiao Deng, Ge Song
2016/1028 (PDF ) Ratcheted Encryption and Key Exchange: The Security of Messaging Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs
2016/1027 (PDF ) Formal Abstractions for Attested Execution Secure Processors Rafael Pass, Elaine Shi, Florian Tramer
2016/1026 (PDF ) Sharper Ring-LWE Signatures Paulo S. L. M. Barreto, Patrick Longa, Michael Naehrig, Jefferson E. Ricardini, Gustavo Zanon
2016/1025 (PDF ) An Algorithm for Counting the Number of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu
2016/1024 (PDF ) LDA-Based Clustering as a Side-Channel Distinguisher Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan
2016/1023 (PDF ) Constant-Time Higher-Order Boolean-to-Arithmetic Masking Michael Hutter, Michael Tunstall
2016/1022 (PDF ) Randomized Mixed-Radix Scalar Multiplication Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
2016/1021 (PDF ) Cryptographic Randomness on a CC2538: a Case Study Yan Yan, Elisabeth Oswald, Theo Tryfonas
2016/1020 (PDF ) KDM Security for Identity-Based Encryption: Constructions and Separations Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang
2016/1019 (PDF ) Faster Homomorphic Evaluation of Discrete Fourier Transforms Anamaria Costache, Nigel P. Smart, Srinivas Vivek
2016/1018 (PDF ) IKP: Turning a PKI Around with Blockchains Stephanos Matsumoto, Raphael M. Reischuk
2016/1017 (PDF ) Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project Douglas Stebila, Michele Mosca
2016/1016 (PDF ) Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures Mihir Bellare, Bertram Poettering, Douglas Stebila
2016/1015 (PDF ) MaxLength Considered Harmful to the RPKI Yossi Gilad, Omar Sagga, Sharon Goldberg
2016/1014 (PDF ) Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme Liqun Chen, Thalia M. Laing, Keith M. Martin
2016/1013 (PDF ) A Formal Security Analysis of the Signal Messaging Protocol Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila
2016/1012 (PDF ) Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016) Damien Vergnaud
2016/1011 (PDF ) Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
2016/1010 (PDF ) Are We There Yet? On RPKI's Deployment and Security Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Shulman
2016/1009 (PDF ) Efficient Resettably Secure Two-Party Computation Tobias Nilges
2016/1008 (PDF ) KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols Jorge Munilla
2016/1007 (PDF ) A survey of attacks on Ethereum smart contracts Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli
2016/1006 (PDF ) The Security of NTP’s Datagram Protocol Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg
2016/1005 (PDF ) Atomic-AES v2.0 Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2016/1004 (PDF ) Private Circuits III: Hardware Trojan-Resilience via Testing Amplification Stefan Dziembowski, Sebastian Faust, Francois-Xavier Standaert
2016/1003 (PDF ) Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 Daniel Apon, Nico Döttling, Sanjam Garg, Pratyay Mukherjee
2016/1002 (PDF ) Decryption phase in Norwegian electronic voting Anders Smedstuen Lund, Martin Strand
2016/1001 (PDF ) Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs Amit Jana, Goutam Paul
2016/999 (PDF ) Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex
2016/998 (PDF ) Cryptanalyses of Candidate Branching Program Obfuscators Yilei Chen, Craig Gentry, Shai Halevi
2016/997 (PDF ) More Efficient Commitments from Structured Lattice Assumptions Carsten Baum, Ivan Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
2016/996 (PDF ) Leakage-Resilient and Misuse-Resistant Authenticated Encryption Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2016/995 (PDF ) Measuring small subgroup attacks against Diffie-Hellman Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger
2016/994 (PDF ) Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov
2016/993 (PDF ) Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks Liran Lerman, Olivier Markowitch, Nikita Veshchikov
2016/992 (PDF ) Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3 Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John Schanck
2016/991 (PDF ) Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos
2016/990 (PDF ) Revisiting the Wrong-Key-Randomization Hypothesis Tomer Ashur, Tim Beyne, Vincent Rijmen
2016/989 (PDF ) Scrypt is Maximally Memory-Hard Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, Stefano Tessaro
2016/988 (PDF ) Zero Knowledge Protocols from Succinct Constraint Detection Eli Ben-Sasson, Alessandro Chiesa, Michael A. Forbes, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
2016/987 (PDF ) A Key to Success -- Success Exponents for Side-Channel Distinguishers Sylvain Guilley, Annelie Heuser, Olivier Rioul
2016/986 (PDF ) Fast Arithmetic Modulo $2^xp^y\pm 1$ Joppe W. Bos, Simon Friedberger
2016/985 (PDF ) Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno
2016/984 (PDF ) Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version) Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov
2016/983 (PDF ) Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions Avijit Dutta, Ashwin Jha, Mridul Nandi
2016/982 (PDF ) Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu
2016/981 (PDF ) Efficient No-dictionary Verifiable SSE Wakaha Ogata, Kaoru Kurosawa
2016/980 (PDF ) TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou
2016/979 (PDF ) The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented Zhengjun Cao, Lihua Liu
2016/978 (PDF ) Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging Muhammad Yasin, Ozgur Sinanoglu, Jeyavijayan Rajendran
2016/977 (PDF ) Side channels in deduplication: trade-offs between leakage and efficiency Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani
2016/976 (PDF ) On Adaptively Secure Multiparty Computation with a Short CRS Ran Cohen, Chris Peikert
2016/975 (PDF ) (Universal) Unconditional Verifiability in E-Voting without Trusted Parties Gina Gallegos-Garcia, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan
2016/974 (PDF ) Server-Aided Revocable Identity-Based Encryption from Lattices Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
2016/973 (PDF ) Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
2016/972 (PDF ) Revealing Encryption for Partial Ordering Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song
2016/971 (PDF ) Authenticated communication from Quantum Readout of PUFs B. Skoric, P. W. H. Pinkse, A. P. Mosk
2016/970 (PDF ) Statistical Analysis for Access-Driven Cache Attacks Against AES Liwei Zhang, A. Adam Ding, Yunsi Fei, Zhen Hang Jiang
2016/969 (PDF ) Garbling Gadgets for Boolean and Arithmetic Circuits Marshall Ball, Tal Malkin, Mike Rosulek
2016/968 (PDF ) System Clock and Power Supply Cross-Checking for Glitch Detection Pei Luo, Chao Luo, Yunsi Fei
2016/967 (PDF ) Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack Pei Luo, Yunsi Fei
2016/966 (PDF ) High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2m) Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2016/965 (PDF ) A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds Maciej Skorski
2016/964 (PDF ) Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE Lorenzo Grassi, Christian Rechberger
2016/963 (PDF ) Efficient compression of SIDH public keys Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik
2016/962 (PDF ) On Removing Graded Encodings from Functional Encryption Nir Bitansky, Huijia Lin, Omer Paneth
2016/961 (PDF ) A kilobit hidden SNFS discrete logarithm computation Joshua Fried, Pierrick Gaudry, Nadia Heninger, Emmanuel Thomé
2016/960 (PDF ) Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts Gorjan Alagic, Alexander Russell
2016/959 (PDF ) Impossibility of Simulation Secure Functional Encryption Even with Random Oracles Shashank Agrawal, Venkata Koppula, Brent Waters
2016/958 (PDF ) SafeDeflate: compression without leaking secrets Michał Zieliński
2016/957 (PDF ) Computing generator in cyclotomic integer rings Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
2016/956 (PDF ) Two Simple Composition Theorems with H-coefficients Jacques Patarin
2016/955 (PDF ) Constant-deposit multiparty lotteries on Bitcoin Massimo Bartoletti, Roberto Zunino
2016/954 (PDF ) Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria WeiGuo Zhang, Enes Pasalic
2016/953 (PDF ) Collusion-Resistant Broadcast Encryption with Tight Reductions and Beyond Linfeng Zhou
2016/952 (PDF ) ISAP -- Towards Side-Channel Secure Authenticated Encryption Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
2016/951 (PDF ) Revisiting Covert Multiparty Computation Geoffroy Couteau
2016/950 (PDF ) Orthogonalized Lattice Enumeration for Solving SVP Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu
2016/949 (PDF ) Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
2016/948 (PDF ) Secure Computation in Online Social Networks Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos
2016/947 (PDF ) Isogeny graphs of ordinary abelian varieties Ernest Hunter Brooks, Dimitar Jetchev, Benjamin Wesolowski
2016/946 (PDF ) Bitsliced Masking and ARM: Friends or Foes? Wouter de Groot, Kostas Papagiannopoulos, Antonio de La Piedra, Erik Schneider, Lejla Batina
2016/945 (PDF ) High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers Kostas Papapagiannopoulos
2016/944 (PDF ) High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority Jun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein
2016/943 (PDF ) Stadium: A Distributed Metadata-Private Messaging System Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich
2016/942 (PDF ) Optimizing Secure Computation Programs with Private Conditionals Peeter Laud, Alisa Pankova
2016/941 (PDF ) A New Class of Differentially 4-uniform Permutations from the Inverse Function Jian Bai, Dingkang Wang
2016/940 (PDF ) Fast Actively Secure OT Extension for Short Secrets Arpita Patra, Pratik Sarkar, Ajith Suresh
2016/939 (PDF ) Key Reconciliation Protocols for Error Correction of Silicon PUF Responses Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer
2016/938 (PDF ) Kummer for Genus One over Prime Order Fields Sabyasachi Karati, Palash Sarkar
2016/937 (PDF ) A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences Nur Azman Abu, Shekh Faisal Abdul-Latip, Muhammad Rezal Kamel Ariffin
2016/936 (PDF ) Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring Vadim N. Tsypyschev
2016/935 (PDF ) Concealing Secrets in Embedded Processors Designs Hannes Gross, Manuel Jelinek, Stefan Mangard, Thomas Unterluggauer, Mario Werner
2016/934 (PDF ) Cryptography with Updates Prabhanjan Ananth, Aloni Cohen, Abhishek Jain
2016/933 (PDF ) Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection Michele Orrù, Emmanuela Orsini, Peter Scholl
2016/932 (PDF ) Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks Jakub Breier, Dirmanto Jap, Shivam Bhasin
2016/931 (PDF ) Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (Extended Version) Jakub Breier, Xiaolu Hou
2016/930 (PDF ) Scalable Private Set Intersection Based on OT Extension Benny Pinkas, Thomas Schneider, Michael Zohner
2016/929 (PDF ) A Generalized Ideal Secret Sharing Scheme Tanujay Sha
2016/928 (PDF ) The complexity of the connected graph access structure on seven participants Massoud Hadian Dehkordi, Ali Safi
2016/927 (PDF ) Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2016/926 (PDF ) LIZARD - A Lightweight Stream Cipher for Power-constrained Devices Matthias Hamann, Matthias Krause, Willi Meier
2016/925 (PDF ) Secure Channel Injection and Anonymous Proofs of Account Ownership Liang Wang, Rafael Pass, abhi shelat, Thomas Ristenpart
2016/924 (PDF ) Bit Coincidence Mining Algorithm II Koh-ichi Nagao
2016/923 (PDF ) Attacking embedded ECC implementations through cmov side channels Erick Nascimento, Lukasz Chmielewski, David Oswald, Peter Schwabe
2016/921 (PDF ) Breaking Cryptographic Implementations Using Deep Learning Techniques Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff
2016/920 (PDF ) Breaking Web Applications Built On Top of Encrypted Data Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov
2016/919 (PDF ) Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake Phil Daian, Rafael Pass, Elaine Shi
2016/918 (PDF ) The Sleepy Model of Consensus Rafael Pass, Elaine Shi
2016/917 (PDF ) Hybrid Consensus: Efficient Consensus in the Permissionless Model Rafael Pass, Elaine Shi
2016/916 (PDF ) FruitChains: A Fair Blockchain Rafael Pass, Elaine Shi
2016/915 (PDF ) Transparency Overlays and Applications Melissa Chase, Sarah Meiklejohn
2016/914 (PDF ) Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields Gora Adj, Isaac Canales-Martínez, Nareli Cruz-Cortés, Alfred Menezes, Thomaz Oliveira, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez
2016/913 (PDF ) Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15 Boru Gong, Yunlei Zhao
2016/912 (PDF ) Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model Gilles Barthe, François Dupressoir, Sebastian Faust, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
2016/911 (PDF ) The Shortest Signatures Ever Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2016/910 (PDF ) The closest vector problem in tensored root lattices of type A and in their duals Léo Ducas, Wessel P. J. van Woerden
2016/909 (PDF ) Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang
2016/908 (PDF ) Secure Error-Tolerant Graph Matching Protocols Kalikinkar Mandal, Basel Alomair, Radha Poovendran
2016/907 (PDF ) Cut-and-Choose for Garbled RAM Peihan Miao
2016/906 (PDF ) On Basing Search SIVP on NP-Hardness Tianren Liu
2016/905 (PDF ) Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI$^+$ protocols Masoumeh Safkhani, Nasour Bagheri
2016/904 (PDF ) Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2016/903 (PDF ) From Indifferentiability to Constructive Cryptography (and Back) Ueli Maurer, Renato Renner
2016/902 (PDF ) Universally Composable Cryptographic Role-Based Access Control Bin Liu, Bogdan Warinschi
2016/901 (PDF ) Distance Bounding based on PUF Mathilde Igier, Serge Vaudenay
2016/900 (PDF ) Quantifying Web Adblocker Privacy Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
2016/899 (PDF ) Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains Kittiphop Phalakarn, Kittiphon Phalakarn, Vorapong Suppakitpaisarn
2016/898 (PDF ) Physical Unclonable Functions based on Temperature Compensated Ring Oscillators Sha Tao, Elena Dubrova
2016/897 (PDF ) An efficient somewhat homomorphic encryption scheme based on factorization Gérald Gavin
2016/896 (PDF ) Security Analysis of Anti-SAT Muhammad Yasin, Bodhisatwa Mazumdar, Ozgur Sinanoglu, Jeyavijayan Rajendran
2016/895 (PDF ) Leakage-Abuse Attacks against Order-Revealing Encryption Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, Thomas Ristenpart
2016/894 (PDF ) Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation Chun Guo, Dongdai Lin
2016/893 (PDF ) Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan
2016/892 (PDF ) Privacy-Preserving Distributed Linear Regression on High-Dimensional Data Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans
2016/891 (PDF ) Tightly Secure IBE under Constant-size Master Public Key Jie Chen, Junqing Gong, Jian Weng
2016/890 (PDF ) A Parallel Variant of LDSieve for the SVP on Lattices Artur Mariano, Thijs Laarhoven, Christian Bischof
2016/889 (PDF ) Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov
2016/888 (PDF ) Finding closest lattice vectors using approximate Voronoi cells Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger
2016/887 (PDF ) A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size $2^{4k+2}$ Anne Canteaut, Sébastien Duval, Léo Perrin
2016/886 (PDF ) A Robust and Sponge-Like PRNG with Improved Efficiency Daniel Hutchinson
2016/885 (PDF ) Short Stickelberger Class Relations and application to Ideal-SVP Ronald Cramer, Léo Ducas, Benjamin Wesolowski
2016/884 (PDF ) Robust, low-cost, auditable random number generation for embedded system security Ben Lampert, Riad S. Wahby, Shane Leonard, Philip Levis
2016/883 (PDF ) DEMO: Integrating MPC in Big Data Workflows Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros
2016/882 (PDF ) MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
2016/881 (PDF ) Near Collisions in the RC4 Stream Cipher Anindya Shankar Bhandari
2016/880 (PDF ) Naor-Yung Paradigm with Shared Randomness and Applications Silvio Biagioni, Daniel Masny, Daniele Venturi
2016/879 (PDF ) Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
2016/878 (PDF ) Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak Jian Guo, Meicheng Liu, Ling Song
2016/877 (PDF ) How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2016/876 (PDF ) How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu
2016/875 (PDF ) Depth-Robust Graphs and Their Cumulative Memory Complexity Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak
2016/873 (PDF ) Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang
2016/872 (PDF ) Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang
2016/871 (PDF ) Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions Xavier Boyen, Christopher Carr, Thomas Haines
2016/870 (PDF ) Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2016/869 (PDF ) Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr
2016/868 (PDF ) Selective-Opening Security in the Presence of Randomness Failures Viet Tung Hoang, Jonathan Katz, Adam O’Neill, Mohammad Zaheri
2016/867 (PDF ) A survey on physiological-signal-based security for medical devices Eduard Marin, Enrique Argones Rúa, Dave Singelée, Bart Preneel
2016/866 (PDF ) A Shuffle Argument Secure in the Generic Model Prastudy Fauzi, Helger Lipmaa, Michał Zając
2016/865 (PDF ) Reverse Cycle Walking and Its Applications Sarah Miracle, Scott Yilek
2016/864 (PDF ) Salvaging Weak Security Bounds for Blockcipher-Based Constructions Thomas Shrimpton, R. Seth Terashima
2016/863 (PDF ) More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22 Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing
2016/861 (PDF ) Secure Stable Matching at Scale Jack Doerner, David Evans, abhi shelat
2016/860 (PDF ) Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao
2016/859 (PDF ) On the Security of Supersingular Isogeny Cryptosystems Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti
2016/858 (PDF ) A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors Qian Guo, Thomas Johansson, Paul Stankovski
2016/857 (PDF ) Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin
2016/856 (PDF ) Spritz---a spongy RC4-like stream cipher and hash function. Ronald L. Rivest, Jacob C. N. Schuldt
2016/855 (PDF ) Combinatorial Repairability for Threshold Schemes Douglas R. Stinson, Ruizhong Wei
2016/854 (PDF ) Algebraic Security Analysis of Key Generation with Physical Unclonable Functions Matthias Hiller, Michael Pehl, Gerhard Kramer, Georg Sigl
2016/853 (PDF ) Stronger Security Variants of GCM-SIV Tetsu Iwata, Kazuhiko Minematsu
2016/852 (PDF ) Faster LLL-type Reduction of Lattice Bases Arnold Neumaier, Damien Stehle
2016/851 (PDF ) A New Algorithm for the Unbalanced Meet-in-the-Middle Problem Ivica Nikolic, Yu Sasaki
2016/850 (PDF ) Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, Patrick Schaumont
2016/849 (PDF ) Asymptotically Tight Bounds for Composing ORAM with PIR Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren
2016/848 (PDF ) From Weakly Selective to Selective Security in Compact Functional Encryption, Revisited Linfeng Zhou
2016/847 (PDF ) On the smallest ratio problem of lattice bases Jianwei Li
2016/846 (PDF ) Survey of Approaches and Techniques for Security Verification of Computer Systems Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, Jakub Szefer
2016/845 (PDF ) Selective Opening Security from Simulatable Data Encapsulation Felix Heuer, Bertram Poettering
2016/844 (PDF ) Secure and Efficient Construction of Broadcast Encryption with Dealership Kamalesh Acharya, Ratna Dutta
2016/843 (PDF ) Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps Shuichi Katsumata, Shota Yamada
2016/842 (PDF ) Improved, Black-Box, Non-Malleable Encryption from Semantic Security Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
2016/841 (PDF ) A Methodology for the Characterisation of Leakages in Combinatorial Logic Guido Bertoni, Marco Martinoli
2016/840 (PDF ) Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions Melissa Chase, Mary Maller, Sarah Meiklejohn
2016/839 (PDF ) On the Division Property of SIMON48 and SIMON64 Zejun Xiang, Wentao Zhang, Dongdai Lin
2016/838 (PDF ) Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things Masoumeh Safkhani, Nasour Bagheri
2016/837 (PDF ) Fully Homomorphic Encryption over the Integers Revisited Jung Hee Cheon, Damien Stehle
2016/836 (PDF ) The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem H. Gopalakrishna Gadiyar, R. Padma
2016/835 (PDF ) Lightweight Diffusion Layer: Importance of Toeplitz Matrices Sumanta Sarkar, Habeeb Syed
2016/834 (PDF ) Multi-Key Homomorphic Signatures Unforgeable under Insider Corruption Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow
2016/833 (PDF ) Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto
2016/832 (PDF ) Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks? Colin Chaigneau, Henri Gilbert
2016/831 (PDF ) Reducing the Number of Non-linear Multiplications in Masking Schemes Jürgen Pulkus, Srinivas Vivek
2016/830 (PDF ) IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality Ian Miers, Payman Mohassel
2016/829 (PDF ) Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions Shuai Han, Shengli Liu, Lin Lyu
2016/828 (PDF ) Faster Key Recovery Attack on Round-Reduced PRINCE Shahram Rasoolzadeh, Håvard Raddum
2016/827 (PDF ) Security Analysis of BLAKE2's Modes of Operation Atul Luykx, Bart Mennink, Samuel Neves
2016/826 (PDF ) Rotational Cryptanalysis in the Presence of Constants Tomer Ashur, Yunwen Liu
2016/825 (PDF ) Revisiting Cascade Ciphers in Indifferentiability Setting Chun Guo, Dongdai Lin, Meicheng Liu
2016/824 (PDF ) P2P Mixing and Unlinkable Bitcoin Transactions Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate
2016/823 (PDF ) Post-Quantum Attribute-Based Signatures from Lattice Assumptions Rachid El Bansarkhani, Ali El Kaafarani
2016/822 (PDF ) A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo, Akbar Majidi
2016/821 (PDF ) Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials Duggirala Meher Krishna, Duggirala Ravi
2016/820 (PDF ) Separating Computational and Statistical Differential Privacy in the Client-Server Model Mark Bun, Yi-Hsiu Chen, Salil Vadhan
2016/819 (PDF ) Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu
2016/818 (PDF ) Composable Adaptive Secure Protocols without Setup under Polytime Assumptions Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2016/817 (PDF ) Secure Obfuscation in a Weak Multilinear Map Model Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
2016/816 (PDF ) Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds Mark Bun, Thomas Steinke
2016/815 (PDF ) Secure Multiparty RAM Computation in Constant Rounds Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey
2016/814 (PDF ) Adaptive Security of Yao's Garbled Circuits Zahra Jafargholi, Daniel Wichs
2016/813 (PDF ) Fast Pseudorandom Functions Based on Expander Graphs Benny Applebaum, Pavel Raykov
2016/812 (PDF ) Towards Non-Black-Box Separations of Public Key Encryption and One Way Function Dana Dachman-Soled
2016/811 (PDF ) MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers Ling Sun, Wei Wang, Meiqin Wang
2016/810 (PDF ) Fault Injection using Crowbars on Embedded Systems Colin O'Flynn
2016/809 (PDF ) Binary AMD Circuits from Secure Multiparty Computation Daniel Genkin, Yuval Ishai, Mor Weiss
2016/808 (PDF ) Simulating Auxiliary Inputs, Revisited Maciej Skorski
2016/807 (PDF ) Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016 Hyunjin Ahn, Dong-Guk Han
2016/806 (PDF ) Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack Mohammad Hadi Valizadeh
2016/805 (PDF ) Constant-Round Maliciously Secure Two-Party Computation in the RAM Model Carmit Hazay, Avishay Yanai
2016/804 (PDF ) Multi-Key Homomorphic Authenticators Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin
2016/803 (PDF ) Biometric Based Network Security Using MIPS Cryptography Processor Kirat Pal Singh
2016/801 (PDF ) Blind Web Search: How far are we from a privacy preserving search engine? Gizem S. Çetin, Wei Dai, Yarkın Doröz, William J. Martin, Berk Sunar
2016/800 (PDF ) Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious Bar Alon, Eran Omri
2016/799 (PDF ) Efficient Batched Oblivious PRF with Applications to Private Set Intersection Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu
2016/798 (PDF ) On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan, Gaëtan Leurent
2016/797 (PDF ) An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa
2016/796 (PDF ) Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings Vadim Lyubashevsky
2016/795 (PDF ) Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings Huijia Lin, Vinod Vaikuntanathan
2016/794 (PDF ) Message-recovery attacks on Feistel-based Format Preserving Encryption Mihir Bellare, Viet Tung Hoang, Stefano Tessaro
2016/793 (PDF ) Side-Channel Analysis of Keymill Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel
2016/792 (PDF ) Key-Homomorphic Signatures: Definitions and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge David Derler, Daniel Slamanig
2016/791 (PDF ) Leakage Resilient One-Way Functions: The Auxiliary-Input Setting Ilan Komargodski
2016/790 (PDF ) Conditional Cube Attack on Reduced-Round Keccak Sponge Function Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao
2016/789 (PDF ) An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm Kirat Pal Singh, Shiwani Dod
2016/788 (PDF ) On the security of Cubic UOV and its variants Yasufumi Hashimoto
2016/787 (PDF ) On the security of new vinegar-like variant of multivariate signature scheme Yasufumi Hashimoto
2016/786 (PDF ) What Else is Revealed by Order-Revealing Encryption? F. Betül Durak, Thomas M. DuBuisson, David Cash
2016/785 (PDF ) Optimization of Bootstrapping in Circuits Fabrice Benhamouda, Tancrède Lepoint, Claire Mathieu, Hang Zhou
2016/784 (PDF ) Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2016/783 (PDF ) On the Memory-Hardness of Data-Independent Password-Hashing Functions Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
2016/782 (PDF ) Challenges for Ring-LWE Eric Crockett, Chris Peikert
2016/781 (PDF ) Privately Matching $k$-mers Justin Bed{ő}, Thomas Conway, Kim Ramchen, Vanessa Teague
2016/780 (PDF ) Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle Mohammmad Hassan Ameri, Javad Mohajeri, Mahmoud Salmasizadeh
2016/779 (PDF ) Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction Maryam Rajabzadeh Asaar
2016/778 (PDF ) Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning Sumit Chakraborty
2016/777 (PDF ) Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers Ping Ngai Chung, Craig Costello, Benjamin Smith
2016/776 (PDF ) Homomorphic Tallying for the Estonian Internet Voting System Arnis Parsovs
2016/775 (PDF ) Cryptanalysis of a Homomorphic Encryption Scheme Sonia Bogos, John Gaspoz, Serge Vaudenay
2016/774 (PDF ) TV-PUF : A Fast Lightweight Aging-Resistant Threshold Voltage PUF Tanujay Saha, Vikash Sehwag
2016/773 (PDF ) Alternative Implementations of Secure Real Numbers Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson
2016/772 (PDF ) Time-Frequency Analysis for Second-Order Attacks Pierre BELGARRIC, Shivam BHASIN, Nicolas BRUNEAU, Jean-Luc DANGER, Nicolas DEBANDE, Sylvain GUILLEY, Annelie HEUSER, Zakaria NAJM, Olivier RIOUL
2016/771 (PDF ) How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios David Bernhard, Olivier Pereira, Bogdan Warinschi
2016/770 (PDF ) KangarooTwelve: fast hashing based on Keccak-p Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier
2016/769 (PDF ) Low-temperature data remanence attacks against intrinsic SRAM PUFs Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Tolga Arul
2016/768 (PDF ) High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara
2016/767 (PDF ) A conjecture about Gauss sums and bentness of binomial Boolean functions Jean-Pierre Flori
2016/766 (PDF ) Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions Benoît Libert, Somindu C. Ramanna, Moti Yung
2016/765 (PDF ) Cryptographic Voting — A Gentle Introduction David Bernhard, Bogdan Warinschi
2016/764 (PDF ) ANOTEL: Cellular Networks with Location Privacy (Extended Version) Tim Dittler, Florian Tschorsch, Stefan Dietzel, Björn Scheuermann
2016/763 (PDF ) Human Public-Key Encryption Houda Ferradi, Rémi Géraud, David Naccache
2016/762 (PDF ) Faster Secure Two-Party Computation in the Single-Execution Setting Xiao Wang, Alex J. Malozemoff, Jonathan Katz
2016/761 (PDF ) Two-party authenticated key exchange protocol using lattice-based cryptography Xiaopeng Yang, Wenping Ma
2016/760 (PDF ) Simultaneous Secrecy and Reliability Amplification for a General Channel Model Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, Bruce M. Kapron, Valerie King, Stefano Tessaro
2016/759 (PDF ) Towards Practical Attacks on Argon2i and Balloon Hashing Joël Alwen, Jeremiah Blocki
2016/758 (PDF ) NewHope on ARM Cortex-M Erdem Alkim, Philipp Jakubeit, Peter Schwabe
2016/757 (PDF ) Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton Andrade
2016/756 (PDF ) Adapting Helios for provable ballot privacy David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
2016/755 (PDF ) Auditable Data Structures Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
2016/754 (PDF ) Practical Key Recovery Attack on MANTIS-5 Christoph Dobraunig, Maria Eichlseder, Daniel Kales, Florian Mendel
2016/753 (PDF ) Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices Shi Bai, Damien Stehle, Weiqiang Wen
2016/752 (PDF ) ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security Adnan Baysal, Ünal Kocabaş
2016/751 (PDF ) Feistel Like Construction of Involutory Binary Matrices With High Branch Number Adnan Baysal, Mustafa Çoban, Mehmet Özen
2016/750 (PDF ) Public-Key Based Lightweight Swarm Authentication Simon Cogliani, Bao Feng, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang
2016/749 (PDF ) Revocable Hierarchical Identity-Based Encryption with Adaptive Security Kwangsu Lee
2016/748 (PDF ) A Generic Dynamic Provable Data Possession Framework Mohammad Etemad, Alptekin Küpçü
2016/747 (PDF ) Beyond Bitcoin -- Part II: Blockchain-based systems without mining Pasquale Forte, Diego Romano, Giovanni Schmid
2016/746 (PDF ) Improved Private Set Intersection against Malicious Adversaries Peter Rindal, Mike Rosulek
2016/745 (PDF ) Novel differentially private mechanisms for graphs Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier
2016/744 (PDF ) A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity Xi Chen, Longjiang Qu, Chao Li, Jiao Du
2016/743 (PDF ) Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong
2016/742 (PDF ) LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper) Johannes Braun, Johannes Buchmann, Denise Demirel, Mikio Fujiwara, Matthias Geihs, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
2016/741 (PDF ) MARKOV MODELING OF MOVING TARGET DEFENSE GAMES Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, Marten van Dijk
2016/740 (PDF ) Software Benchmarking of the 2$^{\text{nd}}$ round CAESAR Candidates Ralph Ankele, Robin Ankele
2016/739 (PDF ) Unconditionally Secure Signatures Ryan Amiri, Aysajan Abidin, Petros Wallden, Erika Andersson
2016/738 (PDF ) FHPKE with Zero Norm Noises based on DLA&CDH Masahiro Yagisawa
2016/736 (PDF ) Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation Martine De Cock, Rafael Dowsley, Caleb Horst, Raj Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon
2016/735 (PDF ) Efficient Robust Secret Sharing from Expander Graphs Brett Hemenway, Rafail Ostrovsky
2016/734 (PDF ) Efficient Oblivious Transfer Protocols based on White-Box Cryptography Aram Jivanyan, Gurgen Khachatryan, Andriy Oliynyk, Mykola Raievskyi
2016/733 (PDF ) Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates Thomas Wunderer
2016/732 (PDF ) Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64 Yosuke Todo, Gregor Leander, Yu Sasaki
2016/731 (PDF ) SRMAP and ISLAP Authentication Protocols: Attacks and Improvements Mohammad Mardani Shahrbabak, Shahab Abdolmaleky
2016/730 (PDF ) Leakage-Resilient Public-Key Encryption from Obfuscation Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O’Neill, Hong-Sheng Zhou
2016/729 (PDF ) Attacks on cMix - Some Small Overlooked Details Herman Galteland, Stig F. Mjølsnes, Ruxandra F. Olimid
2016/728 (PDF ) Sophos - Forward Secure Searchable Encryption Raphael Bost
2016/727 (PDF ) Improvements on the Individual Logarithm Step in Extended Tower Number Field Sieve Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin
2016/726 (PDF ) Local Bounds for the Optimal Information Ratio of Secret Sharing Schemes Oriol Farràs, Jordi Ribes-González, Sara Ricci
2016/725 (PDF ) Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA Mustafa Khairallah, Maged Ghoneima
2016/724 (PDF ) SPORT: Sharing Proofs of Retrievability across Tenants Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan O. Karame
2016/723 (PDF ) Robust Multi-Property Combiners for Hash Functions Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
2016/722 (PDF ) Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512 Li Lin, Wenling Wu
2016/721 (PDF ) Strong Hardness of Privacy from Weak Traitor Tracing Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Mark Zhandry
2016/720 (PDF ) A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
2016/719 (PDF ) Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu
2016/718 (PDF ) Leakage-Abuse Attacks Against Searchable Encryption David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart
2016/717 (PDF ) Comparison between Subfield and Straightforward Attacks on NTRU Paul Kirchner, Pierre-Alain Fouque
2016/716 (PDF ) 2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely Tuyet Duong, Lei Fan, Hong-Sheng Zhou
2016/715 (PDF ) Uniform First-Order Threshold Implementations Tim Beyne, Begül Bilgin
2016/714 (PDF ) All the AES You Need on Cortex-M3 and M4 Peter Schwabe, Ko Stoffelen
2016/713 (PDF ) Tuple lattice sieving Shi Bai, Thijs Laarhoven, Damien Stehle
2016/712 (PDF ) A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems Basel Halak, Said Subhan Waizi, Asad Islam
2016/711 (PDF ) A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3) Hugo Krawczyk
2016/710 (PDF ) Keymill: Side-Channel Resilient Key Generator Mostafa Taha, Arash Reyhani-Masoleh, Patrick Schaumont
2016/709 (PDF ) Differential Fault Analysis of SHA3-224 and SHA3-256 Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2016/708 (PDF ) From 5-pass MQ-based identification to MQ-based signatures Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
2016/707 (PDF ) Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher Dana Dachman-Soled, Angela Park, Ben San Nicolas
2016/706 (PDF ) Memory Erasability Amplification Jan Camenisch, Robert R. Enderlein, Ueli Maurer
2016/704 (PDF ) High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem Nicolas T. Courtois
2016/703 (PDF ) (In-)Secure messaging with the Silent Circle instant messaging protocol Sebastian R. Verschoor, Tanja Lange
2016/702 (PDF ) Mirror Theory and Cryptography Jacques Patarin
2016/701 (PDF ) Bolt: Anonymous Payment Channels for Decentralized Currencies Matthew Green, Ian Miers
2016/700 (PDF ) Side-Channel Protections for Cryptographic Instruction Set Extensions Sami Saab, Pankaj Rohatgi, Craig Hampel
2016/699 (PDF ) A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Zhengjun Cao, Lihua Liu
2016/698 (PDF ) A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Zhengjun Cao, Lihua Liu
2016/697 (PDF ) Ciphertext Forgery on HANUMAN Damian Vizár
2016/696 (PDF ) Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing Süleyman Kardaş, Mehmet Sabır Kiraz
2016/695 (PDF ) Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation Ivan Damgård, Jesper Buus Nielsen, Michael Nielsen, Samuel Ranellucci
2016/694 (PDF ) Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi
2016/693 (PDF ) Identity-Based Key Aggregate Cryptosystem from Multilinear Maps Sikhar Patranabis, Debdeep Mukhopadhyay
2016/692 (PDF ) Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks Jiguo Li, Hong Yuan, Yichen Zhang
2016/691 (PDF ) Targeted Homomorphic Attribute Based Encryption Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee
2016/690 (PDF ) When Are Three Voters Enough for Privacy Properties? Myrto Arapinis, Véronique Cortier, Steve Kremer
2016/689 (PDF ) New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations Tingting Cui, Shiyao Chen, Keting Jia, Kai Fu, Meiqin Wang
2016/688 (PDF ) Bounded KDM Security from iO and OWF Antonio Marcedone, Rafael Pass, abhi shelat
2016/687 (PDF ) Ciphers for MPC and FHE Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner
2016/686 (PDF ) The Lightest 4x4 MDS Matrices over $GL(4,\mathbb{F}_2)$ Jian Bai, Ting Li, Yao Sun, Dingkang Wang, Dongdai Lin
2016/685 (PDF ) Overlaying Circuit Clauses for Secure Computation W. Sean Kennedy, Vladimir Kolesnikov, Gordon Wilfong
2016/684 (PDF ) Faster individual discrete logarithms in finite fields of composite extension degree Aurore Guillevic
2016/683 (PDF ) Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs Rasmus Dahlberg, Tobias Pulls, Roel Peeters
2016/682 (PDF ) Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations Steven D. Galbraith, Joel Laity, Barak Shani
2016/681 (PDF ) Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack Ronald Cramer, Ivan Damgard, Chaoping Xing, Chen Yuan
2016/680 (PDF ) Fair Client Puzzles from the Bitcoin Blockchain Colin Boyd, Christopher Carr
2016/679 (PDF ) Hybrid WBC: Secure and Efficient White-Box Encryption Schemes Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg
2016/678 (PDF ) Anonymous RAM Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov
2016/677 (PDF ) Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore Mohamed Sabt, Jacques Traoré
2016/676 (PDF ) Cryptanalysis of Reduced-Round Midori64 Block Cipher Xiaoyang Dong, Yanzhao Shen
2016/675 (PDF ) Accelerating Homomorphic Computations on Rational Numbers Angela Jäschke, Frederik Armknecht
2016/674 (PDF ) A PUF-based Secure Communication Protocol for IoT URBI CHATTERJEE, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYAY
2016/673 (PDF ) Dirichlet Product for Boolean Functions Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2016/671 (PDF ) Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large $n$ Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Samir Hod\v zić
2016/670 (PDF ) DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities Siamak F. Shahandashti, Feng Hao
2016/669 (PDF ) NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on ARM Brian Koziel, Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
2016/667 (PDF ) Multivariate Profiling of Hulls for Linear Cryptanalysis Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre
2016/666 (PDF ) Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity WeiGuo Zhang, LuYang Li, Enes Pasalic
2016/665 (PDF ) Breaking and Fixing Private Set Intersection Protocols Mikkel Lambæk
2016/664 (PDF ) Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices Yoo-Seung Won, Dong-Guk Han
2016/663 (PDF ) Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited Jan Camenisch, Manu Drijvers, Anja Lehmann
2016/662 (PDF ) Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
2016/661 (PDF ) Reducing the Leakage in Practical Order-Revealing Encryption David Cash, Feng-Hao Liu, Adam O'Neill, Cong Zhang
2016/660 (PDF ) The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2016/659 (PDF ) Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
2016/658 (PDF ) Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3 Kevin Atighehchi, Alexis Bonnecaze
2016/657 (PDF ) Bounded Size-Hiding Private Set Intersection Tatiana Bradley, Sky Faber, Gene Tsudik
2016/656 (PDF ) Improving Practical UC-Secure Commitments based on the DDH Assumption Eiichiro Fujisaki
2016/655 (PDF ) A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
2016/654 (PDF ) Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks Shweta Agrawal
2016/653 (PDF ) Fully Homomorphic Encryption with Zero Norm Cipher Text Masahiro Yagisawa
2016/652 (PDF ) Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network Arnaud BANNIER, Nicolas BODIN, Eric FILIOL
2016/651 (PDF ) Pen and Paper Arguments for SIMON and SIMON-like Designs Christof Beierle
2016/650 (PDF ) Securing Multiparty Protocols against the Exposure of Data to Honest Parties Peeter Laud, Alisa Pankova
2016/649 (PDF ) Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref
2016/648 (PDF ) ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks Tobias Schneider, Amir Moradi, Tim Güneysu
2016/647 (PDF ) Strong 8-bit Sboxes with Efficient Masking in Hardware Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
2016/646 (PDF ) Computational integrity with a public random string from quasi-linear PCPs Eli Ben-Sasson, Iddo Ben-Tov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza
2016/645 (PDF ) FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors Patrick Longa
2016/644 (PDF ) How to Backdoor Diffie-Hellman David Wong
2016/643 (PDF ) On the Computational Overhead of MPC with Dishonest Majority Jesper Buus Nielsen, Samuel Ranellucci
2016/642 (PDF ) Efficient and Provable White-Box Primitives Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud
2016/641 (PDF ) Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar
2016/640 (PDF ) Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm Asli Bay, Oguzhan Ersoy, Ferhat Karakoç
2016/639 (PDF ) Game-Theoretic Framework for Integrity Verification in Computation Outsourcing Qiang Tang, Balazs Pejo
2016/638 (PDF ) A Tweak for a PRF Mode of a Compression Function and Its Applications Shoichi Hirose, Atsushi Yabumoto
2016/637 (PDF ) On the Security and Key Generation of the ZHFE Encryption Scheme Wenbin Zhang, Chik How Tan
2016/636 (PDF ) Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, Ivan Visconti
2016/635 (PDF ) Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi
2016/634 (PDF ) Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi
2016/633 (PDF ) Making Smart Contracts Smarter Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor
2016/632 (PDF ) Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution Peter Rindal, Mike Rosulek
2016/631 (PDF ) Masking AES with d+1 Shares in Hardware Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2016/630 (PDF ) Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy
2016/629 (PDF ) Verifiable Functional Encryption Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
2016/628 (PDF ) On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev, Lolita A. Sonina
2016/627 (PDF ) Cyber Passport: Preventing Massive Identity Theft Gideon Samid
2016/626 (PDF ) CAESAR Hardware API Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Panasayya Yalla, Jens-Peter Kaps, Kris Gaj
2016/625 (PDF ) On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants Kota Kondo, Yu Sasaki, Tetsu Iwata
2016/624 (PDF ) Equational Security Proofs of Oblivious Transfer Protocols Baiyu Li, Daniele Micciancio
2016/623 (PDF ) EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ Dhiman Saha, Dipanwita Roy Chowdhury
2016/622 (PDF ) Function-Revealing Encryption Marc Joye, Alain Passelègue
2016/621 (PDF ) 4-Round Concurrent Non-Malleable Commitments from One-Way Functions Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2016/620 (PDF ) Secure Data Exchange: A Marketplace in the Cloud Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal, Mike Rosulek
2016/619 (PDF ) 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova
2016/618 (PDF ) Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis Sarani Bhattacharya, Debdeep Mukhopadhyay
2016/617 (PDF ) On the Impossibility of Merkle Merge Homomorphism Yuzhe Tang
2016/616 (PDF ) Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel
2016/615 (PDF ) Reusing Tamper-Proof Hardware in UC-Secure Protocols Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges
2016/614 (PDF ) Better Two-Round Adaptive Multi-Party Computation Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
2016/613 (PDF ) A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware Qian Ge, Yuval Yarom, David Cock, Gernot Heiser
2016/612 (PDF ) Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds Kevin Lewi, David J. Wu
2016/611 (PDF ) Catching MPC Cheaters: Identification and Openability Robert Cunningham, Benjamin Fuller, Sophia Yakoubov
2016/610 (PDF ) The GGM Function Family is Weakly One-Way Aloni Cohen, Saleet Klein
2016/609 (PDF ) How low can you go? Using side-channel data to enhance brute-force key recovery Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam
2016/608 (PDF ) LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses Hoda Maleki, Reza Rahaeimehr, Marten van Dijk
2016/607 (PDF ) Protocols for Authenticated Oblivious Transfer Mehrad Jaberi, Hamid Mala
2016/606 (PDF ) Strong Machine Learning Attack against PUFs with No Mathematical Model Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert
2016/605 (PDF ) Improving NFS for the discrete logarithm problem in non-prime finite fields Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain
2016/604 (PDF ) FMNV Continuous Non-malleable Encoding Scheme is More Efficient Than Believed Amir S. Mortazavia, Mahmoud Salmasizadeh, Amir Daneshgar
2016/603 (PDF ) Koblitz curves over quadratic fields Thomaz Oliveira, Julio López, Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
2016/602 (PDF ) More Efficient Oblivious Transfer Extensions Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2016/601 (PDF ) Physical Layer Group Key Agreement for Automotive Controller Area Networks Shalabh Jain, Jorge Guajardo
2016/600 (PDF ) A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
2016/599 (PDF ) Obfuscation from Low Noise Multilinear Maps Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Pratyay Mukherjee
2016/598 (PDF ) Polynomial Batch Codes for Efficient IT-PIR Ryan Henry
2016/597 (PDF ) Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul
2016/596 (PDF ) Cache Attacks Enable Bulk Key Recovery on the Cloud Mehmet S. Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2016/595 (PDF ) A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki
2016/594 (PDF ) "Make Sure DSA Signing Exponentiations Really are Constant-Time'' Cesar Pereida García, Billy Bob Brumley, Yuval Yarom
2016/593 (PDF ) No Place to Hide: Contactless Probing of Secret Data on FPGAs Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert
2016/592 (PDF ) Subspace Trail Cryptanalysis and its Applications to AES Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2016/591 (PDF ) Arx: An Encrypted Database using Semantically Secure Encryption Rishabh Poddar, Tobias Boelter, Raluca Ada Popa
2016/590 (PDF ) Mitigating SAT Attack on Logic Locking Yang Xie, Ankur Srivastava
2016/589 (PDF ) Dimension-Preserving Reductions from LWE to LWR Jacob Alperin-Sheriff, Daniel Apon
2016/588 (PDF ) Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks Eric Miles, Amit Sahai, Mark Zhandry
2016/587 (PDF ) Bash-f: another LRX sponge function Sergey Agievich, Vadim Marchuk, Alexander Maslau, Vlad Semenov
2016/586 (PDF ) A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case Thomas Shrimpton, Martijn Stam, Bogdan Warinschi
2016/585 (PDF ) Breaking the Circuit Size Barrier for Secure Computation Under DDH Elette Boyle, Niv Gilboa, Yuval Ishai
2016/584 (PDF ) Network Oblivious Transfer Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon
2016/583 (PDF ) Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials Melissa Chase, Chaya Ganesh, Payman Mohassel
2016/582 (PDF ) TV-PUF : A Fast Lightweight Analog Physically Unclonable Function Tanujay Saha
2016/581 (PDF ) UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens Jan Camenisch, Maria Dubovitskaya, Alfredo Rial
2016/580 (PDF ) Fine-grained Cryptography Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2016/579 (PDF ) Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks Patrick Derbez, Pierre-Alain Fouque
2016/578 (PDF ) Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security Viet Tung Hoang, Stefano Tessaro
2016/577 (PDF ) Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage
2016/575 (PDF ) TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg
2016/574 (PDF ) Structure vs Hardness through the Obfuscation Lens Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan
2016/573 (PDF ) Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems Stefan Dziembowski, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, Francois-Xavier Standaert
2016/572 (PDF ) Faster Evaluation of SBoxes via Common Shares Jean-Sebastien Coron, Aurelien Greuet, Emmanuel Prouff, Rina Zeitoun
2016/571 (PDF ) Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach Romain poussier, François-Xavier Standaert, Vincent Grosso
2016/570 (PDF ) Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo
2016/569 (PDF ) FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa
2016/568 (PDF ) A Secure One-Roundtrip Index for Range Queries Tobias Boelter, Rishabh Poddar, Raluca Ada Popa
2016/567 (PDF ) Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2016/566 (PDF ) Concurrent Non-Malleable Commitments (and More) in 3 Rounds Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2016/565 (PDF ) Bounded Indistinguishability and the Complexity of Recovering Secrets Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson
2016/564 (PDF ) The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3 Mihir Bellare, Bjoern Tackmann
2016/563 (PDF ) Garbling Scheme for Formulas with Constant Size of Garbled Gates Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki
2016/562 (PDF ) Deniable Attribute Based Encryption for Branching Programs from LWE Daniel Apon, Xiong Fan, Feng-Hao Liu
2016/561 (PDF ) Compactness vs Collusion Resistance in Functional Encryption Baiyu Li, Daniele Micciancio
2016/560 (PDF ) Memory-Efficient Algorithms for Finding Needles in Haystacks Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2016/559 (PDF ) Quantum homomorphic encryption for polynomial-sized circuits Yfke Dulek, Christian Schaffner, Florian Speelman
2016/558 (PDF ) From Cryptomania to Obfustopia through Secret-Key Functional Encryption Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs
2016/557 (PDF ) On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking Dahmun Goudarzi, Matthieu Rivain
2016/556 (PDF ) Network-Hiding Communication and Applications to Multi-Party Protocols Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2016/555 (PDF ) On the Security and Performance of Proof of Work Blockchains Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
2016/554 (PDF ) Another view of the division property Christina Boura, Anne Canteaut
2016/552 (PDF ) Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook
2016/551 (PDF ) Improved Factorization of $N=p^rq^s$ Jean-Sebastien Coron, Rina Zeitoun
2016/550 (PDF ) Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture Andrew D. Zonenberg, Bulent Yener
2016/549 (PDF ) Short and Adjustable Signatures Xiong Fan, Juan Garay, Payman Mohassel
2016/548 (PDF ) Linicrypt: A Model for Practical Cryptography Brent Carmer, Mike Rosulek
2016/547 (PDF ) Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner
2016/546 (PDF ) An Unconditionally Hiding Auditing Procedure for Multi-Party Computations Lucas Schabhüser, Denise Demirel, Johannes Buchmann
2016/545 (PDF ) On Trees, Chains and Fast Transactions in the Blockchain Aggelos Kiayias, Giorgos Panagiotakos
2016/544 (PDF ) New Protocols for Secure Equality Test and Comparison Geoffroy Couteau
2016/543 (PDF ) ObliviSync: Practical Oblivious File Backup and Synchronization Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche
2016/542 (PDF ) MPC-Friendly Symmetric Key Primitives Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart
2016/541 (PDF ) Big-Key Symmetric Encryption: Resisting Key Exfiltration Mihir Bellare, Daniel Kane, Phillip Rogaway
2016/540 (PDF ) Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme Alberto Battistello, Jean-Sebastien Coron, Emmanuel Prouff, Rina Zeitoun
2016/539 (PDF ) Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version) Léo Perrin, Aleksei Udovenko, Alex Biryukov
2016/538 (PDF ) How to prove knowledge of small secrets Carsten Baum, Ivan Damgård, Kasper Larsen, Michael Nielsen
2016/537 (PDF ) A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm Palash Sarkar, Shashank Singh
2016/536 (PDF ) Position-Based Cryptography and Multiparty Communication Complexity Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
2016/534 (PDF ) Damaging, Simplifying, and Salvaging p-OMD Tomer Ashur, Bart Mennink
2016/533 (PDF ) New Insights on AES-like SPN Ciphers Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen
2016/532 (PDF ) Cryptanalysis of GOST2 Tomer Ashur, Achiya Bar-On, Orr Dunkelman
2016/531 (PDF ) Reducing number field defining polynomials: An application to class group computations Alexandre Gélin, Antoine Joux
2016/530 (PDF ) Generic Semantic Security against a Kleptographic Adversary Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
2016/529 (PDF ) Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience Antonio Faonio, Daniele Venturi
2016/528 (PDF ) Certified lattice reduction Thomas Espitau, Antoine Joux
2016/527 (PDF ) Secure Outsourcing of Circuit Manufacturing Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi
2016/526 (PDF ) Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree Taechan Kim, Jinhyuck Jeong
2016/525 (PDF ) EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC Benoît Cogliati, Yannick Seurin
2016/524 (PDF ) Single-Key to Multi-Key Functional Encryption with Polynomial Loss Sanjam Garg, Akshayaram Srinivasan
2016/523 (PDF ) Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes Jiang Zhang, Yu Chen, Zhenfeng Zhang
2016/522 (PDF ) A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version) Daisuke Fujimoto, Shivam Bhasin, Makoto Nagata, Jean-Luc Danger
2016/521 (PDF ) SAT-based cryptanalysis of ACORN Frédéric Lafitte, Liran Lerman, Olivier Markowitch, Dirk Van Heule
2016/520 (PDF ) Universally Composable Two-Server PAKE Franziskus Kiefer, Mark Manulis
2016/519 (PDF ) On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings Benny Applebaum, Pavel Raykov
2016/518 (PDF ) Attribute-based Key Exchange with General Policies Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin
2016/517 (PDF ) Towards Practical Tools for Side Channel Aware Software Engineering: `Grey Box' Modelling for Instruction Leakages David McCann, Elisabeth Oswald, Carolyn Whitnall
2016/516 (PDF ) Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited George Teseleanu, Ferucio Laurentiu Tiplea, Sorin Iftene, Anca-Maria Nica
2016/515 (PDF ) RSA Weak Public Keys available on the Internet Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion
2016/514 (PDF ) Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN Yu Yu, Jiang Zhang
2016/513 (PDF ) Applying TVLA to Public Key Cryptographic Algorithms Michael Tunstall, Gilbert Goodwill
2016/512 (PDF ) Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups" Lucjan Hanzlik, Kamil Kluczniak
2016/511 (PDF ) Optimal-Rate Non-Committing Encryption in a CRS Model Ran Canetti, Oxana Poburinnaya, Mariana Raykova
2016/510 (PDF ) A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Vincent Zucca
2016/509 (PDF ) Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong, Xiaoyun Wang
2016/508 (PDF ) Collapse-binding quantum commitments without random oracles Dominique Unruh
2016/507 (PDF ) Solving discrete logarithms on a 170-bit MNT curve by pairing reduction Aurore Guillevic, François Morain, Emmanuel Thomé
2016/506 (PDF ) TOR - Didactic pluggable transport Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion
2016/505 (PDF ) MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer Marcel Keller, Emmanuela Orsini, Peter Scholl
2016/504 (PDF ) Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography Patrick Longa, Michael Naehrig
2016/503 (PDF ) MQSAS - A Multivariate Sequential Aggregate Signature Scheme Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2016/502 (PDF ) Key Recovery Attack against 2.5-round pi-Cipher Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder
2016/501 (PDF ) Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin
2016/500 (PDF ) Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee
2016/499 (PDF ) Drone Targeted Cryptography Gideon Samid
2016/498 (PDF ) Towards Tightly Secure Short Signature and IBE Xavier Boyen, Qinyi Li
2016/497 (PDF ) Secure Computation from Elastic Noisy Channels Dakshita Khurana, Hemanta K. Maji, Amit Sahai
2016/496 (PDF ) All Complete Functionalities are Reversible Daniel Kraschewski, Dakshita Khurana, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
2016/495 (PDF ) Cross&Clean: Amortized Garbled Circuits with Constant Overhead Jesper Buus Nielsen, Claudio Orlandi
2016/494 (PDF ) AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version) Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng
2016/493 (PDF ) Partition-Based Trapdoor Ciphers Arnaud Bannier, Nicolas Bodin, Eric Filiol
2016/492 (PDF ) MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen
2016/491 (PDF ) Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam
2016/490 (PDF ) Truncated, Impossible, and Improbable Differential Analysis of Ascon Cihangir Tezcan
2016/489 (PDF ) Two Cents for Strong Anonymity: The Anonymous Post-office Protocol Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz
2016/488 (PDF ) Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE Husen Wang, Qiang Tang
2016/487 (PDF ) A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Amine MRABET, Nadia EL-MRABET, Ronan LASHERMES, Jean Baptiste RIGAUD, Belgacem BOUALLEGUE, Sihem MESNAGER, Mohsen MACHHOUT
2016/486 (PDF ) Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order Hannes Gross, Stefan Mangard, Thomas Korak
2016/485 (PDF ) A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm Palash Sarkar, Shashank Singh
2016/484 (PDF ) Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations Jung Hee Cheon, HeeWon Chung, Myungsun Kim, Kang-Won Lee
2016/483 (PDF ) Proofs of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures Hiroaki Anada, Seiko Arita, Kouichi Sakurai
2016/482 (PDF ) Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions Shashank Agrawal, David J. Wu
2016/481 (PDF ) Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori Amir Moradi, Tobias Schneider
2016/480 (PDF ) Achieving Better Privacy for the 3GPP AKA Protocol Pierre-Alain Fouque, Cristina Onete, Benjamin Richard
2016/479 (PDF ) Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses Jakub Szefer
2016/478 (PDF ) Cryptographic Solutions for Credibility and Liability Issues of Genomic Data Erman Ayday, Qiang Tang, Arif Yilmaz
2016/477 (PDF ) Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai
2016/476 (PDF ) Groth-Sahai Proofs Revisited Again: A Bug in ``Optimized'' Randomization Keita Xagawa
2016/475 (PDF ) Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic
2016/474 (PDF ) T-Proof: Secure Communication via Non-Algorithmic Randomization Gideon Samid
2016/473 (PDF ) Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption Thomas Unterluggauer, Stefan Mangard
2016/472 (PDF ) Adequate Elliptic Curve for Computing the Product of n Pairings Loubna Ghammam, Emmanuel Fouotsa
2016/471 (PDF ) NTRU Modular Lattice Signature Scheme on CUDA GPUs Wei Dai, John Schanck, Berk Sunar, William Whyte, Zhenfei Zhang
2016/470 (PDF ) Better Security for Queries on Encrypted Databases Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang
2016/469 (PDF ) Identity Chains Andrew Egbert, Brad Chun, Thomas Otte
2016/468 (PDF ) Chaos Machine: Different Approach to the Application and Significance of Numbers Maciej A. Czyzewski
2016/467 (PDF ) Speeding up R-LWE post-quantum key exchange Shay Gueron, Fabian Schlieker
2016/466 (PDF ) AnNotify: A Private Notification Service Ania Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg
2016/465 (PDF ) Can Large Deviation Theory be Used for Estimating Data Complexity? Subhabrata Samajder, Palash Sarkar
2016/464 (PDF ) Beaver: A Decentralized Anonymous Marketplace with Secure Reputation Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas
2016/463 (PDF ) Authenticated Encryption with Variable Stretch Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2016/462 (PDF ) Fully Homomorphic Encryption with Isotropic Elements Masahiro Yagisawa
2016/461 (PDF ) NTRU Prime: reducing attack surface at low cost Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal
2016/460 (PDF ) Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys Kwangsu Lee, Seunghwan Park
2016/459 (PDF ) Non-Interactive RAM and Batch NP Delegation from any PIR Zvika Brakerski, Justin Holmgren, Yael Kalai
2016/458 (PDF ) CompGC: Efficient Offline/Online Semi-honest Two-party Computation Adam Groce, Alex Ledger, Alex J. Malozemoff, Arkady Yerukhimovich
2016/457 (PDF ) --Withdrawn-- Wei Yuan
2016/456 (PDF ) Secure Protocol Transformations Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu
2016/455 (PDF ) Extracting the RC4 secret key of the Open Smart Grid Protocol Linus Feiten, Matthias Sauer
2016/454 (PDF ) Analysis of the Blockchain Protocol in Asynchronous Networks Rafael Pass, Lior Seeman, abhi shelat
2016/453 (PDF ) SQL on Structurally-Encrypted Databases Seny Kamara, Tarik Moataz
2016/452 (PDF ) Secure Logging Schemes and Certificate Transparency Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila
2016/451 (PDF ) Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts Wacław Banasik, Stefan Dziembowski, Daniel Malinowski
2016/450 (PDF ) A Provably Secure Code-based Concurrent Signature Scheme Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2016/449 (PDF ) Loop-Abort Faults on Lattice-Based Fiat–Shamir and Hash-and-Sign Signatures Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi
2016/448 (PDF ) A Note on ``Outsourcing Large Matrix Inversion Computation to a Public Cloud" Zhengjun Cao, Lihua Liu
2016/447 (PDF ) Theoretical Attacks on E2E Voting Systems Peter Hyun-Jeen Lee, Siamak F. Shahandashti
2016/445 (PDF ) SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme Alhassan Khedr, Glenn Gulak
2016/444 (PDF ) The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes Roberto Avanzi
2016/443 (PDF ) Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache
2016/442 (PDF ) Blind Password Registration for Verifier-based PAKE Franziskus Kiefer, Mark Manulis
2016/441 (PDF ) Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2016/440 (PDF ) Function-Hiding Inner Product Encryption is Practical Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu
2016/439 (PDF ) A Measure Version of Gaussian Heuristic Hao Chen
2016/438 (PDF ) sElect: A Lightweight Verifiable Remote Voting System Ralf Kuesters, Johannes Mueller, Enrico Scapin, Tomasz Truderung
2016/437 (PDF ) Observations on the LPN Solving Algorithm from Eurocrypt'16 Sonia Bogos, Serge Vaudenay
2016/436 (PDF ) Cryptanalysis of Reduced NORX Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki
2016/435 (PDF ) The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
2016/434 (PDF ) A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not Cong Chen, Mohammad Farmani, Thomas Eisenbarth
2016/433 (PDF ) Analysis of Key Wrapping APIs: Generic Policies, Computational Security Guillaume Scerri, Ryan Stanley-Oakes
2016/432 (PDF ) Two-Input Functional Encryption for Inner Products from Bilinear Maps Kwangsu Lee, Dong Hoon Lee
2016/431 (PDF ) Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme David Bernhard, Oksana Kulyk, Melanie Volkamer
2016/430 (PDF ) Partially homomorphic encryption schemes over finite fields Jian Liu, Lusheng Chen, Sihem Mesnager
2016/429 (PDF ) Information-Theoretical Analysis of Two Shannon's Ciphers Boris Ryabko
2016/428 (PDF ) An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function Phuong Ha Nguyen, Durga Prasad Sahoo
2016/427 (PDF ) Privacy Preserving Network Analysis of Distributed Social Networks Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
2016/426 (PDF ) A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data Fahad Shaon, Murat Kantarcioglu
2016/425 (PDF ) Multi-Input Inner-Product Functional Encryption from Pairings Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee
2016/424 (PDF ) Computational Security of Quantum Encryption Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules
2016/423 (PDF ) Modeling Random Oracles under Unpredictable Queries Pooya Farshim, Arno Mittelbach
2016/422 (PDF ) A deeper understanding of the XOR count distribution in the context of lightweight cryptography Sumanta Sarkar, Siang Meng Sim
2016/421 (PDF ) Homomorphic Encryption for Arithmetic of Approximate Numbers Jung Hee Cheon, Andrey Kim, Miran Kim, Yongsoo Song
2016/420 (PDF ) A note on the security of threshold implementations with $d+1$ input shares Santos Merino Del Pozo, François-Xavier Standaert
2016/419 (PDF ) Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing Yi LU, Yvo DESMEDT
2016/418 (PDF ) Shorter Circuit Obfuscation in Challenging Security Models Zvika Brakerski, Or Dagmi
2016/417 (PDF ) New Tools for Multi-Party Computation Lisa Kohl
2016/416 (PDF ) A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie
2016/415 (PDF ) Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks Nina Bindel, Johannes Buchmann, Juliane Krämer
2016/414 (PDF ) Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version) Li Lin, Wenling Wu, Yafei Zheng
2016/413 (PDF ) Efficient algorithms for supersingular isogeny Diffie-Hellman Craig Costello, Patrick Longa, Michael Naehrig
2016/412 (PDF ) Solving Quadratic Equations with XL on Parallel Architectures - extended version Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
2016/411 (PDF ) Polymorphic Encryption and Pseudonymisation for Personalised Healthcare Eric Verheul, Bart Jacobs, Carlo Meijer, Mireille Hildebrandt, Joeri de Ruiter
2016/410 (PDF ) Efficient Quantum-Resistant Trust Infrastructure based on HIMMO Oscar Garcia-Morchon, Sauvik Bhattacharya, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Maarten Bodlaender
2016/409 (PDF ) Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck} Alex Biryukov, Vesselin Velichkov, Yann Le Corre
2016/408 (PDF ) Towards Bitcoin Payment Networks Patrick McCorry, Malte Möser, Siamak F. Shahandashti, Feng Hao
2016/407 (PDF ) MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu
2016/406 (PDF ) On the Construction of Lightweight Circulant Involutory MDS Matrices Yongqiang Li, Mingsheng Wang
2016/405 (PDF ) Multiple Differential Cryptanalysis: A Rigorous Analysis Subhabrata Samajder, Palash Sarkar
2016/404 (PDF ) A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations Subhabrata Samajder, Palash Sarkar
2016/403 (PDF ) On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One Sanjit Chatterjee, Alfred Menezes, Francisco Rodriguez-Henriquez
2016/402 (PDF ) Fully Homomorphic Encryption for Point Numbers Seiko Arita, Shota Nakasato
2016/401 (PDF ) Tower Number Field Sieve Variant of a Recent Polynomial Selection Method Palash Sarkar, Shashank Singh
2016/400 (PDF ) Towards Secure Quadratic Voting Sunoo Park, Ronald L. Rivest
2016/399 (PDF ) Slow Motion Zero Knowledge Identifying With Colliding Commitments Houda Ferradi, Rémi Géraud, David Naccache
2016/398 (PDF ) Algebraic Insights into the Secret Feistel Network (Full version) Léo Perrin, Aleksei Udovenko
2016/397 (PDF ) Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing
2016/396 (PDF ) Cryptanalysis of Haraka Jérémy Jean
2016/395 (PDF ) Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2016/394 (PDF ) Strengthening the Known-Key Security Notion for Block Ciphers Benoît Cogliati, Yannick Seurin
2016/393 (PDF ) De Bruijn Sequences, Adjacency Graphs and Cyclotomy Ming Li, Dongdai Lin
2016/391 (PDF ) A Digital Signature Scheme Based on Random Split of St-Gen Codes Danilo Gligoroski, Simona Samardjiska
2016/390 (PDF ) Obfuscation without the Vulnerabilities of Multilinear Maps Sanjam Garg, Pratyay Mukherjee, Akshayaram Srinivasan
2016/389 (PDF ) A Quasipolynomial Reduction for Generalized Selective Decryption on Trees Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak
2016/388 (PDF ) Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang
2016/387 (PDF ) Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags K. Baghery, B. Abdolmaleki, M. J. Emadi
2016/386 (PDF ) Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators Vladimir Rožić, Bohan Yang, Nele Mentens, Ingrid Verbauwhede
2016/385 (PDF ) A note on Ring-LWE security in the case of Fully Homomorphic Encryption Guillaume Bonnoron, Caroline Fontaine
2016/384 (PDF ) Attacks against Filter Generators Exploiting Monomial Mappings Anne Canteaut, Yann Rotella
2016/383 (PDF ) Reducing the Key Size of the SRP Encryption Scheme - Extended version Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi
2016/382 (PDF ) Faster elliptic-curve discrete logarithms on FPGAs Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann
2016/381 (PDF ) FHE Circuit Privacy Almost For Free Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
2016/380 (PDF ) Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer
2016/379 (PDF ) Two More Efficient Variants of the J-PAKE Protocol Jean Lancrenon, Marjan Škrobot, Qiang Tang
2016/378 (PDF ) Using semidirect product of (semi)groups in public key cryptography Delaram Kahrobaei, Vladimir Shpilrain
2016/377 (PDF ) Differential Cryptanalysis of Salsa and ChaCha -- An Evaluation with a Hybrid Model Arka Rai Choudhuri, Subhamoy Maitra
2016/376 (PDF ) A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann
2016/375 (PDF ) Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Alon Rosen, Gil Segev, Ido Shahaf
2016/374 (PDF ) Analysis of SHA-512/224 and SHA-512/256 Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2016/373 (PDF ) Adaptive partitioning Dennis Hofheinz
2016/372 (PDF ) NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion Mihir Bellare, Georg Fuchsbauer, Alessandra Scafuro
2016/371 (PDF ) A Cryptographic Analysis of UMTS/LTE AKA Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
2016/370 (PDF ) Malleability of the blockchain’s entropy Cecile Pierrot, Benjamin Wesolowski
2016/369 (PDF ) Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex Ronald Cramer, Chaoping Xing, Chen Yuan
2016/368 (PDF ) Foundations of Fully Dynamic Group Signatures Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth
2016/367 (PDF ) An Analysis of OpenSSL's Random Number Generator Falko Strenzke
2016/366 (PDF ) \(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina
2016/365 (PDF ) Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM Masahiro Ishii, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa
2016/363 (PDF ) Legally Fair Contract Signing Without Keystones Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval
2016/362 (PDF ) An Empirical Study towards Refining the AKS Primality Testing Algorithm Lalitha Kiran Nemana, V. Ch. Venkaiah
2016/361 (PDF ) Functional Encryption for Bounded Collusions, Revisited Shweta Agrawal, Alon Rosen
2016/360 (PDF ) Another Look at Tightness II: Practical Issues in Cryptography Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
2016/359 (PDF ) Less is More - Dimensionality Reduction from a Theoretical Perspective Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul
2016/358 (PDF ) The Ring of Gyges: Investigating the Future of Criminal Smart Contracts Ari Juels, Ahmed Kosba, Elaine Shi
2016/357 (PDF ) State Management for Hash-Based Signatures David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann
2016/356 (PDF ) More Efficient Constructions for Inner-Product Encryption Somindu C. Ramanna
2016/355 (PDF ) Fruit-v2: Ultra-Lightweight Stream Cipher with Shorter Internal State Vahid Amin Ghafari, Honggang Hu, Ying Chen
2016/354 (PDF ) A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan
2016/353 (PDF ) General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA Atsushi Takayasu, Noboru Kunihiro
2016/352 (PDF ) Closing the Gap in RFC 7748: Implementing Curve448 in Hardware Pascal Sasdrich, Tim Güneysu
2016/351 (PDF ) How (Not) to Instantiate Ring-LWE Chris Peikert
2016/350 (PDF ) Probabilistic Termination and Composability of Cryptographic Protocols Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
2016/349 (PDF ) Note on Impossible Differential Attacks Patrick Derbez
2016/348 (PDF ) A Note on Non-Perfect Secret Sharing Oriol Farràs, Sebastià Martín, Carles Padró
2016/347 (PDF ) Cryptanalysis of Searchable Anonymous Attribute Based Encryption Payal Chaudhari, Manik Lal Das
2016/345 (PDF ) Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura
2016/344 (PDF ) Encoding Rational Numbers for FHE-based Applications HeeWon Chung, Myungsun Kim
2016/343 (PDF ) On the complexity of constructing pseudorandom functions (especially when they don't exist) Eric Miles, Emanuele Viola
2016/342 (PDF ) On the Selective Opening Security of Practical Public-Key Encryption Schemes Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
2016/341 (PDF ) Semantically Secure Anonymity: Foundations of Re-encryption Adam L. Young, Moti Yung
2016/340 (PDF ) Non-Malleable Extractors and Codes, with their Many Tampered Extensions Eshan Chattopadhyay, Vipul Goyal, Xin Li
2016/339 (PDF ) Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts Zvika Brakerski, Renen Perlman
2016/338 (PDF ) Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu
2016/337 (PDF ) State recovery of RC4 and Spritz Revisited Martin Gábriš, Martin Stanek
2016/336 (PDF ) No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA Margarita Osadchy, Julio Hernandez-Castro, Stuart Gibson, Orr Dunkelman, Daniel Pérez-Cabo
2016/335 (PDF ) Complete characterization of generalized bent and 2^k-bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng
2016/334 (PDF ) Probability that the k-gcd of products of positive integers is B-friable Jung Hee Cheon, Duhyeong Kim
2016/333 (PDF ) Proof of Space from Stacked Expanders Ling Ren, Srinivas Devadas
2016/332 (PDF ) Micropayments for Decentralized Currencies Rafael Pass, abhi shelat
2016/331 (PDF ) TRVote: A New, Trustworthy and Robust Electronic Voting System Fatih Tiryakioglu, Mehmet Sabir Kiraz, Fatih Birinci
2016/330 (PDF ) NaCl's Crypto_Box in Hardware Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser
2016/329 (PDF ) A modified block Lanczos algorithm with fewer vectors Emmanuel Thomé
2016/328 (PDF ) Constructing genus 3 hyperelliptic Jacobians with CM Jennifer Balakrishnan, Sorina Ionica, Kristin Lauter, Christelle Vincent
2016/327 (PDF ) Proxy Re-Encryption Schemes with Key Privacy from LWE Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen
2016/326 (PDF ) Square Attack on 7-Round Kiasu-BC Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2016/325 (PDF ) Optimized quantization in Zero Leakage Helper Data Systems Taras Stanko, Fitria Nur Andini, Boris Skoric
2016/324 (PDF ) Interactive Oracle Proofs with Constant Rate and Query Complexity Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Michael Riabzev, Nicholas Spooner
2016/323 (PDF ) A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems Chaohui Du, Guoqiang Bai
2016/322 (PDF ) On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks Ulrich Rührmair
2016/321 (PDF ) Algebraic Decomposition for Probing Security Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2016/320 (PDF ) On Metrics to Quantify the Inter-Device Uniqueness of PUFs Linus Feiten, Matthias Sauer, Bernd Becker
2016/319 (PDF ) High-precision Secure Computation of Satellite Collision Probabilities Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV
2016/318 (PDF ) Generic Construction of Certificateless Signcryption Scheme Jayaprakash Kar, Sagar Naik
2016/317 (PDF ) Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy Rishab Goyal, Venkata Koppula, Brent Waters
2016/316 (PDF ) A Note on Black-Box Separations for Indistinguishability Obfuscation Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
2016/315 (PDF ) Flattening NTRU for Evaluation Key Free Homomorphic Encryption Yarkın Doröz, Berk Sunar
2016/314 (PDF ) Blind Source Separation from Single Measurements using Singular Spectrum Analysis Santos Merino Del Pozo, François-Xavier Standaert
2016/313 (PDF ) Fiat-Shamir for Highly Sound Protocols is Instantiable Arno Mittelbach, Daniele Venturi
2016/312 (PDF ) Refinements of the k-tree Algorithm for the Generalized Birthday Problem Ivica Nikolic, Yu Sasaki
2016/311 (PDF ) Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0 Bin Zhang, Chao Xu, Willi Meier
2016/310 (PDF ) Coded-BKW: Solving LWE Using Lattice Codes Qian Guo, Thomas Johansson, Paul Stankovski
2016/309 (PDF ) Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions Celine Chevalier, Fabien Laguillaumie, Damien Vergnaud
2016/308 (PDF ) Strongly Leakage-Resilient Authenticated Key Exchange Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2016/307 (PDF ) Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2016/306 (PDF ) A Formal Treatment of Backdoored Pseudorandom Generators Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart
2016/305 (PDF ) Certicateless Aggregate Short Signature Scheme Jayaprakash Kar
2016/304 (PDF ) A Fast Attribute Based Encryption Yacov Yacobi
2016/303 (PDF ) From Obfuscation to the Security of Fiat-Shamir for Proofs Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum
2016/302 (PDF ) A Polynomial-Time Attack on the BBCRS Scheme Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umana
2016/301 (PDF ) Constrained Pseudorandom Functions for Unconstrained Inputs Apoorvaa Deshpande, Venkata Koppula, Brent Waters
2016/300 (PDF ) Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom
2016/299 (PDF ) Efficient Design Strategies Based on the AES Round Function Jérémy Jean, Ivica Nikolic
2016/298 (PDF ) Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware Max Fillinger, Marc Stevens
2016/297 (PDF ) A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo
2016/296 (PDF ) How to Sequentialize Independent Parallel Attacks? Sonia Bogos, Serge Vaudenay
2016/295 (PDF ) Collision Attack on GRINDAHL Thomas Peyrin
2016/294 (PDF ) Evaluation and Improvement of Generic-Emulating DPA Attacks Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu
2016/293 (PDF ) A Parametric Family of Attack Models for Proxy Re-Encryption David Nuñez, Isaac Agudo, Javier Lopez
2016/292 (PDF ) New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length Yusuke Naito, Kan Yasuda
2016/291 (PDF ) Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems Cynthia Dwork, Moni Naor, Guy N. Rothblum
2016/290 (PDF ) Nonce-Based Cryptography: Retaining Security when Randomness Fails Mihir Bellare, Björn Tackmann
2016/289 (PDF ) Obfuscation Combiners Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman
2016/288 (PDF ) Optimization of LPN Solving Algorithms Sonia Bogos, Serge Vaudenay
2016/287 (PDF ) Verifiability Notions for E-Voting Protocols Veronique Cortier, David Galindo, Ralf Kuesters, Johannes Mueller, Tomasz Truderung
2016/286 (PDF ) On a remarkable property of APN Gold functions Anastasiya Gorodilova
2016/285 (PDF ) Bit-Based Division Property and Application to Simon Family Yosuke Todo, Masakatu Morii
2016/284 (PDF ) Co-location detection on the Cloud Mehmet Sinan Inci, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
2016/283 (PDF ) Secure Audit Logs with Verifiable Excerpts Gunnar Hartung
2016/282 (PDF ) Detecting flawed masking schemes with leakage detection tests Oscar Reparaz
2016/281 (PDF ) Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev
2016/280 (PDF ) Low Power Montgomery Modular Multiplication on Reconfigurable Systems Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens
2016/279 (PDF ) Constrained PRFs for Unbounded Inputs with Short Keys Hamza Abusalah, Georg Fuchsbauer
2016/278 (PDF ) Various Proxy Re-Encryption Schemes from Lattices Xiong Fan, Feng-Hao Liu
2016/277 (PDF ) Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
2016/276 (PDF ) Arithmetic coding and blinding countermeasures for lattice signatures Markku-Juhani O. Saarinen
2016/275 (PDF ) Faster Algorithms for Solving LPN Bin Zhang, Lin Jiao, Mingsheng Wang
2016/274 (PDF ) What users should know about Full Disk Encryption based on LUKS Simone Bossi, Andrea Visconti
2016/273 (PDF ) On the weaknesses of PBKDF2 Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò
2016/272 (PDF ) Spooky Encryption and its Applications Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs
2016/271 (PDF ) Cryptanalysis of the FLIP Family of Stream Ciphers Sébastien Duval, Virginie Lallemand, Yann Rotella
2016/270 (PDF ) Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model Miguel Ambrona, Gilles Barthe, Benedikt Schmidt
2016/269 (PDF ) The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials Ming Li, Dongdai Lin
2016/268 (PDF ) Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach Ahmad Boorghany, Siavash Bayat-Sarmadi, Rasool Jalili
2016/267 (PDF ) Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256 Yonglin Hao
2016/266 (PDF ) Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic Shinichi Kawamura, Tomoko Yonemura, Yuichi Komano, Hideo Shimizu
2016/265 (PDF ) Multi-prover Proof-of-Retrievability Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
2016/264 (PDF ) How Fast Can Higher-Order Masking Be in Software? Dahmun Goudarzi, Matthieu Rivain
2016/263 (PDF ) Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit
2016/262 (PDF ) Collaborative Multi-Authority Key-Policy Attribute-Based Encryption for Shorter Keys and Parameters Riccardo Longo, Chiara Marcolla, Massimiliano Sala
2016/261 (PDF ) MEMS-based Gyroscopes as Physical Unclonable Functions Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel
2016/260 (PDF ) On the Size of Pairing-based Non-interactive Arguments Jens Groth
2016/259 (PDF ) Adaptive Oblivious Transfer and Generalizations Olivier Blazy, Céline Chevalier, Paul Germouty
2016/258 (PDF ) Structure-Preserving Smooth Projective Hashing Olivier Blazy, Céline Chevalier
2016/257 (PDF ) Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes Huijia Lin
2016/256 (PDF ) SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage Qiumao Ma, Jinsheng Zhang, Wensheng Zhang, Daji Qiao
2016/255 (PDF ) More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds Essam Ghadafi
2016/254 (PDF ) Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts Pierrick Méaux, Anthony Journault, François-Xavier Standaert, Claude Carlet
2016/253 (PDF ) Run-time Accessible DRAM PUFs in Commodity Devices Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
2016/252 (PDF ) The Exact Round Complexity of Secure Computation Sanjam Garg, Pratyay Mukherjee, Omkant Pandey, Antigoni Polychroniadou
2016/251 (PDF ) Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf
2016/250 (PDF ) Fixed Point Arithmetic in SHE Scheme A. Costache, N. P. Smart, S. Vivek, A. Waller
2016/249 (PDF ) Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series Amir Moradi, Tobias Schneider
2016/248 (PDF ) Invariant subspaces in Simpira Sondre Rønjom
2016/246 (PDF ) LINGUISTIC CRACKING OF PASSPHRASES USING MARKOV CHAINS Peder Sparell, Mikael Simovits
2016/245 (PDF ) DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors Peter Linder
2016/244 (PDF ) Cryptanalysis of Simpira v1 Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2016/243 (PDF ) On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2016/242 (PDF ) Attribute-Based Signatures for Circuits from Bilinear Map Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka
2016/241 (PDF ) A trivial debiasing scheme for Helper Data Systems Boris Skoric
2016/240 (PDF ) On Error Distributions in Ring-based LWE Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2016/239 (PDF ) Provably Weak Instances of Ring-LWE Revisited Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2016/238 (PDF ) Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert
2016/237 (PDF ) May-Ozerov Algorithm for Nearest-Neighbor Problem over $\mathbb{F}_{q}$ and Its Application to Information Set Decoding Shoichi Hirose
2016/236 (PDF ) A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT Guoyan Zhang, Meicheng Liu
2016/235 (PDF ) Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security Takahiro Matsuda, Goichiro Hanaoka
2016/234 (PDF ) Trick or Tweak: On the (In)security of OTR’s Tweaks Raphael Bost, Olivier Sanders
2016/233 (PDF ) Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE and Threshold-IBE Charanjit S. Jutla, Arnab Roy
2016/232 (PDF ) Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin
2016/231 (PDF ) Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi
2016/230 (PDF ) ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom
2016/229 (PDF ) Key Compression for Isogeny-Based Cryptosystems Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, Christopher Leonardi
2016/228 (PDF ) On a decentralized trustless pseudo-random number generation algorithm Serguei Popov
2016/227 (PDF ) Process Table Covert Channels: Exploitation and Countermeasures Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache
2016/226 (PDF ) On Statistically Secure Obfuscation with Approximate Correctness Zvika Brakerski, Chris Brzuska, Nils Fleischhacker
2016/225 (PDF ) A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure Qian Guo, Thomas Johansson
2016/224 (PDF ) CacheBleed: A Timing Attack on OpenSSL Constant Time RSA Yuval Yarom, Daniel Genkin, Nadia Heninger
2016/223 (PDF ) Still Wrong Use of Pairings in Cryptography Mehmet Sabır Kiraz, Osmanbey Uzunkol
2016/222 (PDF ) Time-Memory Trade-Off for Lattice Enumeration in a Ball Paul Kirchner, Pierre-Alain Fouque
2016/221 (PDF ) Post-Compromise Security Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
2016/220 (PDF ) Algorithms on Ideal over Complex Multiplication order Paul Kirchner
2016/219 (PDF ) Nonce-based Kerberos is a Secure Delegated AKE Protocol Jörg Schwenk
2016/218 (PDF ) Semantic Security and Key-Privacy With Random Split of St-Gen Codes Danilo Gligoroski, Simona Samardjiska
2016/217 (PDF ) Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove Eric R. Verheul
2016/216 (PDF ) Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary Sumit Kumar Debnath, Ratna Dutta
2016/215 (PDF ) Algorithms for the Approximate Common Divisor Problem Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy
2016/214 (PDF ) An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
2016/213 (PDF ) 3-Message Zero Knowledge Against Human Ignorance Nir Bitansky, Zvika Brakerski, Yael Kalai, Omer Paneth, Vinod Vaikuntanathan
2016/212 (PDF ) Low Linear Complexity Estimates for Coordinate Sequences of Linear Recurrences of Maximal Period over Galois Ring Vadim N. Tsypyschev
2016/211 (PDF ) Randomness Complexity of Private Circuits for Multiplication Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
2016/210 (PDF ) Hopes, Fears and Software Obfuscation: A Survey Boaz Barak
2016/209 (PDF ) Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA Ling Song, Zhangjie Huang, Qianqian Yang
2016/208 (PDF ) Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions Sandro Coretti, Juan Garay, Martin Hirt, Vassilis Zikas
2016/207 (PDF ) Fault analysis and weak key-IV attack on Sprout Dibyendu Roy, Sourav Mukhopadhyay
2016/206 (PDF ) Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes Johannes Blömer, Gennadij Liske
2016/205 (PDF ) Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol Derek Atkins, Dorian Goldfeld
2016/204 (PDF ) A Memory Encryption Engine Suitable for General Purpose Processors Shay Gueron
2016/203 (PDF ) White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels Pascal Sasdrich, Amir Moradi, Tim Güneysu
2016/202 (PDF ) An Encryption Scheme based on Random Split of St-Gen Codes Simona Samardjiska, Danilo Gligoroski
2016/201 (PDF ) From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions Nico Doettling, Daniel Kraschewski, Joern Mueller-Quade, Tobias Nilges
2016/200 (PDF ) An Alternative View of the Graph-Induced Multilinear Maps Yilei Chen
2016/199 (PDF ) The Honey Badger of BFT Protocols Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song
2016/198 (PDF ) Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen
2016/197 (PDF ) Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation Mayuresh Vivekanand Anand, Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
2016/196 (PDF ) Multi-Key FHE from LWE, Revisited Chris Peikert, Sina Shiehian
2016/195 (PDF ) How to Generalize RSA Cryptanalyses Atsushi Takayasu, Noboru Kunihiro
2016/194 (PDF ) How to Share a Secret, Infinitely Ilan Komargodski, Moni Naor, Eylon Yogev
2016/193 (PDF ) Security considerations for Galois non-dual RLWE families Hao Chen, Kristin Lauter, Katherine E. Stange
2016/192 (PDF ) On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography Douglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam
2016/191 (PDF ) Optimal Security Proofs for Signatures from Identification Schemes Eike Kiltz, Daniel Masny, Jiaxin Pan
2016/190 (PDF ) A MAC Mode for Lightweight Block Ciphers Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
2016/189 (PDF ) Yao's millionaires' problem and public-key encryption without computational assumptions Dima Grigoriev, Laszlo B. Kish, Vladimir Shpilrain
2016/188 (PDF ) On the division property of S-boxes Faruk Göloğlu, Vincent Rijmen, Qingju Wang
2016/187 (PDF ) Efficient Secure Multiparty Computation with Identifiable Abort Carsten Baum, Emmanuela Orsini, Peter Scholl
2016/186 (PDF ) Lightweight MDS Generalized Circulant Matrices (Full Version) Meicheng Liu, Siang Meng Sim
2016/185 (PDF ) On the Influence of Message Length in PMAC's Security Bounds Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda
2016/184 (PDF ) Efficiently Enforcing Input Validity in Secure Two-party Computation Jonathan Katz, Alex J. Malozemoff, Xiao Wang
2016/183 (PDF ) There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks -- Extended Version -- Houssem Maghrebi, Victor Servant, Julien Bringer
2016/182 (PDF ) Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2016/181 (PDF ) Cryptographic Properties of Addition Modulo $2^n$ S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2016/180 (PDF ) Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts Dennis Hofheinz, Tibor Jager, Andy Rupp
2016/179 (PDF ) Computing theta functions in quasi-linear time in genus 2 and above Hugo Labrande, Emmanuel Thomé
2016/178 (PDF ) Integrals go Statistical: Cryptanalysis of Full Skipjack Variants Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov
2016/177 (PDF ) Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal
2016/175 (PDF ) Online/Offline OR Composition of Sigma Protocols Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2016/174 (PDF ) Honey Encryption Beyond Message Recovery Security Joseph Jaeger, Thomas Ristenpart, Qiang Tang
2016/173 (PDF ) Circuit Compilers with O(1/ log(n)) Leakage Rate Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust
2016/172 (PDF ) All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou
2016/171 (PDF ) Commutativity, Associativity, and Public Key Cryptography Jacques Patarin, Valérie Nachef
2016/170 (PDF ) Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning Ran Raz
2016/169 (PDF ) Provably Robust Sponge-Based PRNGs and KDFs Peter Gaži, Stefano Tessaro
2016/168 (PDF ) Town Crier: An Authenticated Data Feed for Smart Contracts Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi
2016/167 (PDF ) On Bitcoin Security in the Presence of Broken Crypto Primitives Ilias Giechaskiel, Cas Cremers, Kasper Rasmussen
2016/166 (PDF ) Per-Session Security: Password-Based Cryptography Revisited Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2016/164 (PDF ) Sanitization of FHE Ciphertexts Léo Ducas, Damien Stehlé
2016/163 (PDF ) ZKBoo: Faster Zero-Knowledge for Boolean Circuits Irene Giacomelli, Jesper Madsen, Claudio Orlandi
2016/162 (PDF ) New Negative Results on Differing-Inputs Obfuscation Mihir Bellare, Igors Stepanovs, Brent Waters
2016/161 (PDF ) Revisiting Structure Graphs: Applications to CBC-MAC and EMAC Ashwin Jha, Mridul Nandi
2016/160 (PDF ) Polytopic Cryptanalysis Tyge Tiessen
2016/159 (PDF ) Pseudoentropy: Lower-bounds for Chain rules and Transformations Krzysztof Pietrzak, Maciej Skorski
2016/158 (PDF ) A Subgradient Algorithm For Computational Distances and Applications to Cryptography Maciej Skórski
2016/157 (PDF ) Key Derivation for Squared-Friendly Applications: Lower Bounds Maciej Skorski
2016/156 (PDF ) More Efficient Constant-Round Multi-Party Computation from BMR and SHE Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
2016/155 (PDF ) Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng
2016/154 (PDF ) Highly-Efficient Fully-Anonymous Dynamic Group Signatures David Derler, Daniel Slamanig
2016/153 (PDF ) Differentially Private Password Frequency Lists Jeremiah Blocki, Anupam Datta, Joseph Bonneau
2016/152 (PDF ) Attacks and parameter choices in HIMMO Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Moon Sung Lee, Domingo Gomez-Perez, Jaime Gutierrez, Berry Schoenmakers
2016/151 (PDF ) Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN Yu Yu, John Steinberger
2016/150 (PDF ) On Garbling Schemes with and without Privacy Carsten Baum
2016/149 (PDF ) Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher Wentan Yi, Shaozhen Chen
2016/148 (PDF ) Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme Srinath M. S., V. Chandrasekaran
2016/147 (PDF ) Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 Eric Miles, Amit Sahai, Mark Zhandry
2016/146 (PDF ) Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi
2016/145 (PDF ) Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond Jeremiah Blocki, Hong-Sheng Zhou
2016/144 (PDF ) Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
2016/143 (PDF ) On upper bounds for algebraic degrees of APN functions Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun
2016/142 (PDF ) Hash-Function based PRFs: AMAC and its Multi-User Security Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro
2016/141 (PDF ) On low degree polynomials in 2-round AES Igor Semaev
2016/140 (PDF ) Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters Shota Yamada
2016/139 (PDF ) An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without a Low Level Encoding of Zero Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee
2016/138 (PDF ) A new algorithm for residue multiplication modulo $2^{521}-1$ Shoukat Ali, Murat Cenk
2016/137 (PDF ) Rate-1, Linear Time and Additively Homomorphic UC Commitments Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen
2016/136 (PDF ) Automatic Expectation and Variance Computing for Attacks on Feistel Schemes Emmanuel Volte, Valérie Nachef, Nicolas Marrière
2016/135 (PDF ) Cryptanalysis of the New CLT Multilinear Map over the Integers Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu
2016/134 (PDF ) More Practical and Secure History-Independent Hash Tables Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
2016/133 (PDF ) On the nonlinearity of monotone Boolean functions Claude Carlet
2016/132 (PDF ) Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts Shahram Rasoolzadeh, Håvard Raddum
2016/131 (PDF ) New Attacks on the Concatenation and XOR Hash Combiners Itai Dinur
2016/130 (PDF ) On the Computation of the Optimal Ate Pairing at the 192-bit Security Level Loubna Ghammam, Emmanuel Fouotsa
2016/129 (PDF ) ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
2016/128 (PDF ) Removing the Strong RSA Assumption from Arguments over the Integers Geoffroy Couteau, Thomas Peters, David Pointcheval
2016/127 (PDF ) A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes Martin Albrecht, Shi Bai, Léo Ducas
2016/126 (PDF ) Server Notaries: A Complementary Approach to the Web PKI Trust Model Emre Yüce, Ali Aydın Selçuk
2016/125 (PDF ) Compact Identity Based Encryption from LWE Daniel Apon, Xiong Fan, Feng-Hao Liu
2016/124 (PDF ) Collecting relations for the Number Field Sieve in $GF(p^6)$ Pierrick Gaudry, Laurent Grémy, Marion Videau
2016/123 (PDF ) Robust Password-Protected Secret Sharing Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval
2016/122 (PDF ) Simpira v2: A Family of Efficient Permutations Using the AES Round Function Shay Gueron, Nicky Mouha
2016/120 (PDF ) Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci
2016/119 (PDF ) Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices Christof Beierle, Thorsten Kranz, Gregor Leander
2016/118 (PDF ) Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security Zvika Brakerski, Vinod Vaikuntanathan
2016/117 (PDF ) Circular Security Separations for Arbitrary Length Cycles from LWE Venkata Koppula, Brent Waters
2016/116 (PDF ) Interactive Oracle Proofs Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner
2016/115 (PDF ) Efficiently Computing Data-Independent Memory-Hard Functions Joel Alwen, Jeremiah Blocki
2016/114 (PDF ) The Magic of ELFs Mark Zhandry
2016/113 (PDF ) On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments Serge Fehr, Max Fillinger
2016/112 (PDF ) On the (In)security of SNARKs in the Presence of Oracles Dario Fiore, Anca Nitulescu
2016/111 (PDF ) Scalable and Secure Logistic Regression via Homomorphic Encryption Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
2016/110 (PDF ) Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE Navid Alamati, Chris Peikert
2016/109 (PDF ) Fast Multiparty Multiplications from shared bits Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias
2016/108 (PDF ) An Efficient Toolkit for Computing Private Set Operations Alex Davidson, Carlos Cid
2016/107 (PDF ) Fully Anonymous Transferable Ecash Hitesh Tewari, Arthur Hughes
2016/106 (PDF ) Access Control Encryption: Enforcing Information Flow with Cryptography Ivan Damgård, Helene Haagh, Claudio Orlandi
2016/105 (PDF ) Can there be efficient and natural FHE schemes? Kristian Gjøsteen, Martin Strand
2016/104 (PDF ) Open Sesame: The Password Hashing Competition and Argon2 Jos Wetzels
2016/103 (PDF ) Speed Optimizations in Bitcoin Key Recovery Attacks Nicolas Courtois, Guangyan Song, Ryan Castellucci
2016/102 (PDF ) Breaking the Sub-Exponential Barrier in Obfustopia Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan, Mark Zhandry
2016/101 (PDF ) Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang
2016/100 (PDF ) On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro
2016/099 (PDF ) Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs Michael Clear, Ciaran McGoldrick
2016/098 (PDF ) Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger
2016/097 (PDF ) A Maiorana-McFarland Construction of a GBF on Galois ring Shashi Kant Pandey, P. R. Mishra, B. K. Dass
2016/096 (PDF ) Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li
2016/095 (PDF ) Obfuscation without Multilinear Maps Dingfeng Ye, Peng Liu
2016/094 (PDF ) Tightly CCA-Secure Encryption without Pairings Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
2016/093 (PDF ) Valiant's Universal Circuit is Practical Ágnes Kiss, Thomas Schneider
2016/092 (PDF ) Cryptanalysis of the Full Spritz Stream Cipher Subhadeep Banik, Takanori Isobe
2016/091 (PDF ) On the Security of the Algebraic Eraser Tag Authentication Protocol Simon R. Blackburn, M. J. B. Robshaw
2016/090 (PDF ) Spectral characterization of iterating lossy mappings Joan Daemen
2016/089 (PDF ) On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
2016/088 (PDF ) On Linear Hulls and Trails Tomer Ashur, Vincent Rijmen
2016/087 (PDF ) Safely Exporting Keys from Secure Channels: On the Security of EAP-TLS and TLS Key Exporters Chris Brzuska, Håkon Jacobsen, Douglas Stebila
2016/086 (PDF ) Intel SGX Explained Victor Costan, Srinivas Devadas
2016/085 (PDF ) Cryptanalysis of ring-LWE based key exchange with key share reuse Scott Fluhrer
2016/084 (PDF ) Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
2016/083 (PDF ) NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin
2016/082 (PDF ) Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
2016/081 (PDF ) A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2016/080 (PDF ) Cryptanalysis of PRINCE with Minimal Data Shahram Rasoolzadeh, Håvard Raddum
2016/079 (PDF ) Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations Qiang Tang, Balazs Pejo, Husen Wang
2016/078 (PDF ) Non-Interactive Verifiable Secret Sharing For Monotone Circuits Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia
2016/077 (PDF ) Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN Shahram Rasoolzadeh, Håvard Raddum
2016/076 (PDF ) New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings Xi-Jun Lin, Haipeng Qu, Xiaoshuai Zhang
2016/075 (PDF ) Weaknesses in Hadamard Based Symmetric Key Encryption Schemes Gajraj Kuldeep, Devendra Kumar Yadav, A. K. Sharma
2016/074 (PDF ) On the Power of Secure Two-Party Computation Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2016/073 (PDF ) MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services Jinsheng Zhang, Wensheng Zhang, Daji Qiao
2016/072 (PDF ) Downgrade Resilience in Key-Exchange Protocols Karthikeyan Bhargavan, Chris Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella-Béguelin
2016/071 (PDF ) Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version) Alex Biryukov, Léo Perrin, Aleksei Udovenko
2016/070 (PDF ) Domain-Specific Pseudonymous Signatures Revisited Kamil Kluczniak
2016/069 (PDF ) Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability Gergei Bana, Rohit Chadha
2016/067 (PDF ) OPFE: Outsourcing Computation for Private Function Evaluation Henry Carter, Patrick Traynor
2016/066 (PDF ) Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques Lingyue Qin, Huaifeng Chen, Xiaoyun Wang
2016/065 (PDF ) A note on Tensor Simple Matrix Encryption Scheme Yasufumi Hashimoto
2016/064 (PDF ) Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness Yohei Watanabe, Goichiro Hanaoka, Junji Shikata
2016/063 (PDF ) Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe
2016/062 (PDF ) Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security Raphael Bost, Pierre-Alain Fouque, David Pointcheval
2016/061 (PDF ) Accountable Privacy for Decentralized Anonymous Payments Christina Garman, Matthew Green, Ian Miers
2016/060 (PDF ) Automated key setup and recovery from key exposure for power networks Amir Herzberg, Yehonatan Kfir
2016/059 (PDF ) Secure positioning and quantum non-local correlations Muhammad Nadeem
2016/058 (PDF ) New Lattice Attacks on DSA Schemes Dimitrios Poulakis
2016/057 (PDF ) On the Architectural Analysis of Arbiter Delay PUF Variants DURGA PRASAD SAHOO, PHUONG HA NGUYEN, RAJAT SUBHRA CHAKRABORTY, DEBDEEP MUKHOPADHYA
2016/056 (PDF ) Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg
2016/055 (PDF ) Attacking NTP's Authenticated Broadcast Mode Aanchal Malhotra, Sharon Goldberg
2016/054 (PDF ) Fully Homomorphic Public-Key Encryption with Two Ciphertexts based on Discrete Logarithm Problem Masahiro Yagisawa
2016/053 (PDF ) Speed and Area Optimized Parallel Higher-Radix Modular Multipliers khalid Javeed, Xiaojun Wang
2016/052 (PDF ) Fault-Tolerant Aggregate Signatures Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp
2016/051 (PDF ) Capacity and Data Complexity in Multidimensional Linear Attack Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg
2016/050 (PDF ) Improved Fully Homomorphic Encryption with Composite Number Modulus Masahiro Yagisawa
2016/049 (PDF ) Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields Christoph M. Mayer
2016/048 (PDF ) Better Preprocessing for Secure Multiparty Computation Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Zakarias
2016/047 (PDF ) Comb to Pipeline: Fast Software Encryption Revisited Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
2016/046 (PDF ) How To Simulate It - A Tutorial on the Simulation Proof Technique Yehuda Lindell
2016/045 (PDF ) New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations Xi-Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
2016/044 (PDF ) Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells
2016/043 (PDF ) Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar
2016/042 (PDF ) Neeva: A Lightweight Hash Function Khushboo Bussi, Dhananjoy Dey, Manoj Kumar, B. K. Dass
2016/041 (PDF ) A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS Preeti Kulshrestha, Arun Kumar
2016/039 (PDF ) Standard quantum bit commitment – an indefinite commitment time Muhammad Nadeem
2016/038 (PDF ) Collateral Damage in Online Social Networks: computing the significance of information collection Iraklis Symeonids, Bart Preneel
2016/037 (PDF ) A Framework for Outsourcing of Secure Computation Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi
2016/036 (PDF ) Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family wentan Yi, Shaozhen Chen
2016/035 (PDF ) Simple Proofs of Space-Time and Rational Proofs of Storage Tal Moran, Ilan Orlov
2016/034 (PDF ) Universal Composition with Responsive Environments Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Kuesters, Daniel Rausch
2016/033 (PDF ) Towards a Unified Security Model for Physically Unclonable Functions Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung
2016/032 (PDF ) On the Leakage-Resilient Key Exchange Janaka Alawatugoda
2016/031 (PDF ) Beyond the selective disclosure of ABCs on RAM-constrained devices Antonio de la Piedra
2016/030 (PDF ) An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson
2016/029 (PDF ) Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher Jos Wetzels, Wouter Bokslag
2016/028 (PDF ) Sponges and Engines: An introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag
2016/027 (PDF ) Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks Dan Boneh, Henry Corrigan-Gibbs, Stuart Schechter
2016/026 (PDF ) A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM Abhishek Chakraborty, Debdeep Mukhopadhyay
2016/025 (PDF ) Human-readable Proof of the Related-Key Security of AES-128 Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim
2016/024 (PDF ) Refund attacks on Bitcoin’s Payment Protocol Patrick McCorry, Siamak F. Shahandashti, Feng Hao
2016/023 (PDF ) Improved on an improved remote user authentication scheme with key agreement Yalin Chen, Jue-Sam Chou, I - Chiung Liao
2016/022 (PDF ) On derivatives of polynomials over finite fields through integration Enes Pasalic, Amela Muratovic-Ribic, Samir Hodzic, Sugata Gangopadhyay
2016/021 (PDF ) Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza
2016/020 (PDF ) Truncated Differential Based Known-Key Attacks on Round-Reduced Simon Yonglin Hao, Willi Meier
2016/019 (PDF ) Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption Hyung Tae Lee, San Ling, Huaxiong Wang
2016/018 (PDF ) Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation Afonso Arriaga, Manuel Barbosa, Pooya Farshim
2016/017 (PDF ) Valiant's Universal Circuit: Improvements, Implementation, and Applications Helger Lipmaa, Payman Mohassel, Saeed Sadeghian
2016/016 (PDF ) A trustless privacy-preserving reputation system Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie
2016/015 (PDF ) Quantum Collision-Resistance of Non-Uniformly Distributed Functions Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh
2016/014 (PDF ) Foundations of Hardware-Based Attested Computation and Application to SGX Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi
2016/013 (PDF ) Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
2016/012 (PDF ) Cryptography for Big Data Security Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich
2016/011 (PDF ) Better Security for Functional Encryption for Inner Product Evaluations Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
2016/010 (PDF ) Eliminating Decryption Failures from the Simple Matrix Encryption Scheme Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang
2016/009 (PDF ) PUF-BASED SOLUTIONS FOR SECURE COMMUNICATIONS IN ADVANCED METERING INFRASTRUCTURE (AMI) Mahshid Delavar, Sattar Mirzakuchaki, Mohammad Hassan Ameri, Javad Mohajeri
2016/008 (PDF ) cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman
2016/007 (PDF ) Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud
2016/006 (PDF ) Indistinguishability Obfuscation with Non-trivial Efficiency Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
2016/005 (PDF ) A Columnar Transposition cipher in a contemporary setting. John Jones
2016/004 (PDF ) Bounding basis reduction properties Arnold Neumaier
2016/003 (PDF ) On Splitting a Point with Summation Polynomials in Binary Elliptic Curves Nicolas T. Courtois
2016/002 (PDF ) Remote Cache-Timing Attack without Learning Phase Ali Can Atici, Cemal Yilmaz, Erkay Savas
2016/001 (PDF ) Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment Yalin Chen, Jue-Sam Chou, Hung-Sheng Wu
2015/1256 (PDF ) Mitigating Multi-Target Attacks in Hash-based Signatures Andreas Hülsing, Joost Rijneveld, Fang Song
2015/1255 (PDF ) Functional Encryption for Inner Product with Full Function Privacy Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/1254 (PDF ) Identity-based Hierarchical Key-insulated Encryption without Random Oracles Yohei Watanabe, Junji Shikata
2015/1253 (PDF ) Non-Malleable Functions and Their Applications Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
2015/1252 (PDF ) Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay
2015/1251 (PDF ) Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability Zhengjun Cao, Zhenfu Cao
2015/1250 (PDF ) Adaptively Secure Garbled Circuits from One-Way Functions Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs
2015/1249 (PDF ) Trap Me If You Can -- Million Dollar Curve Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain
2015/1248 (PDF ) Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model Janaka Alawatugoda
2015/1247 (PDF ) Missing a trick: Karatsuba variations Mike Scott
2015/1246 (PDF ) Universally Composable Direct Anonymous Attestation Jan Camenisch, Manu Drijvers, Anja Lehmann
2015/1245 (PDF ) Variation of GGH15 Multilinear Maps Gu Chunsheng
2015/1244 (PDF ) On values of vectorial Boolean functions and related problems in APN functions George Shushuev
2015/1243 (PDF ) Verifiable ASICs Riad S. Wahby, Max Howald, Siddharth Garg, abhi shelat, Michael Walfish
2015/1242 (PDF ) Quantum Cryptography Beyond Quantum Key Distribution Anne Broadbent, Christian Schaffner
2015/1241 (PDF ) Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
2015/1239 (PDF ) Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1238 (PDF ) Asynchronous Secure Multiparty Computation in Constant Time Ran Cohen
2015/1237 (PDF ) On the Security of One Password Authenticated Key Exchange Protocol Stanislav V. Smyshlyaev, Igor B. Oshkin, Evgeniy K. Alekseev, Liliya R. Ahmetzyanova
2015/1236 (PDF ) A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks Liron David, Avishai Wool
2015/1235 (PDF ) Constant-round Leakage-resilient Zero-knowledge from Collision Resistance Susumu Kiyoshima
2015/1234 (PDF ) On Cryptographic Anonimity and Unpredicatbility in Secret Sharing Ruxandra Olimid, Anat Paskin-Cherniavsky
2015/1233 (PDF ) Degenerate Curve Attacks Samuel Neves, Mehdi Tibouchi
2015/1232 (PDF ) Extend FHEW to General Case Zhou Tanping, Liu Longfei, Yang Xiaoyuan, Han Yiliang
2015/1231 (PDF ) When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack Hassan Jameel Asghar, Mohamed Ali Kaafar
2015/1230 (PDF ) Indistinguishable Proofs of Work or Knowledge Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/1229 (PDF ) Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao
2015/1228 (PDF ) Privacy protection in electronic education based on polymorphic pseudonymization Eric R. Verheul
2015/1227 (PDF ) Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512 Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
2015/1226 (PDF ) Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos
2015/1225 (PDF ) ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p) Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay
2015/1224 (PDF ) Twisted Polynomials and Forgery Attacks on GCM Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser
2015/1223 (PDF ) Chosen-Ciphertext Security from Subset Sum Sebastian Faust, Daniel Masny, Daniele Venturi
2015/1222 (PDF ) On the Asymptotic Complexity of Solving LWE Gottfried Herold, Elena Kirshanova, Alexander May
2015/1220 (PDF ) Two-Round Man-in-the-Middle Security from LPN David Cash, Eike Kiltz, Stefano Tessaro
2015/1219 (PDF ) Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud
2015/1217 (PDF ) Two-faced processes and existence of RNG with proven properties Boris Ryabko
2015/1216 (PDF ) Non-Transferable Proxy Re-Encryption Hui Guo, Zhenfeng Zhang, Jing Xu
2015/1215 (PDF ) Simpler, Faster, and More Robust T-test Based Leakage Detection A. Adam Ding, Cong Chen, Thomas Eisenbarth
2015/1214 (PDF ) Simple Security Definitions for and Constructions of 0-RTT Key Exchange Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
2015/1213 (PDF ) Footprint scheduling for Dining-Cryptographer networks Anna Krasnova, Moritz Neikes, Peter Schwabe
2015/1212 (PDF ) Choosing and generating parameters for low level pairing implementation on BN curves Sylvain Duquesne, Nadia El Mrabet, Safia Haloui, Franck Rondepierre
2015/1211 (PDF ) Log Analysis of Estonian Internet Voting 2013--2015 Sven Heiberg, Arnis Parsovs, Jan Willemson
2015/1210 (PDF ) Quantum Security of the Fujisaki-Okamoto and OAEP Transforms Ehsan Ebrahimi Targhi, Dominique Unruh
2015/1209 (PDF ) Fast Optimistically Fair Cut-and-Choose 2PC Alptekin Kupcu, Payman Mohassel
2015/1208 (PDF ) Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE Zheng Yuan, Zhen Peng, Haiwen Ou
2015/1207 (PDF ) Comment on Demonstrations of Shor's Algorithm in the Past Decades Zhengjun Cao, Zhenfu Cao, Lihua Liu
2015/1206 (PDF ) Simple Photonic Emission Attack with Reduced Data Complexity Elad Carmon, Jean-Pierre Seifert, Avishai Wool
2015/1205 (PDF ) Deniable Functional Encryption Angelo De Caro, Vincenzo Iovino, Adam O'Neill
2015/1204 (PDF ) Secret, verifiable auctions from elections Elizabeth A. Quaglia, Ben Smyth
2015/1203 (PDF ) The graph of minimal distances of bent functions and its properties Nikolay Kolomeec
2015/1202 (PDF ) CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung
2015/1201 (PDF ) A Star-based Independent Biclique Attack on Full Rounds SQUARE Zheng Yuan, Zhen Peng, Ming Mao
2015/1200 (PDF ) Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/1199 (PDF ) A compression method for homomorphic ciphertexts S. Carpov, R. Sirdey
2015/1198 (PDF ) Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption Mihir Bellare, Anna Lysyanskaya
2015/1197 (PDF ) On-the-fly Homomorphic Batching/Unbatching Yarkın Doröz, Berk Sunar, Gizem S. Çetin
2015/1196 (PDF ) Secure Distributed Computation on Private Inputs Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/1195 (PDF ) ARITHMETIC USING WORD-WISE HOMOMORPHIC ENCRYPTION Gizem S. Cetin, Yarkin Doroz, Berk Sunar, William J. Martin
2015/1194 (PDF ) HOMOMORPHIC AUTOCOMPLETE Gizem S. Çetin, Wei Dai, Yarkın Doröz, Berk Sunar
2015/1193 (PDF ) Collision Attacks against CAESAR Candidates -- Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr, Gaëtan Leurent, Valentin Suder
2015/1192 (PDF ) A Guide to Fully Homomorphic Encryption Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand
2015/1191 (PDF ) A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers Chester Rebeiro, Debdeep Mukhopadhyay
2015/1190 (PDF ) Private Large-Scale Databases with Distributed Searchable Symmetric Encryption Yuval Ishal, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
2015/1189 (PDF ) Invariant Subspace Attack Against Full Midori64 Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
2015/1188 (PDF ) Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/1187 (PDF ) On an almost-universal hash function family with applications to authentication and secrecy codes Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, László Tóth
2015/1186 (PDF ) Restricted linear congruences Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, Roberto Tauraso, László Tóth
2015/1185 (PDF ) Efficient Pseudorandom Functions via On-the-Fly Adaptation Nico Doettling, Dominique Schröder
2015/1184 (PDF ) Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems Alan Szepieniec, Jintai Ding, Bart Preneel
2015/1183 (PDF ) Authenticated Range \& Closest Point Queries in Zero-Knowledge Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
2015/1182 (PDF ) Chaskey: a MAC Algorithm for Microcontrollers -- Status Update and Proposal of Chaskey-12 -- Nicky Mouha
2015/1181 (PDF ) Construction of Transition Matrices for Binary FCSRs Zhiqiang Lin, Dingyi Pei, Dongdai Lin
2015/1180 (PDF ) Secure Comparator: a ZKP-Based Authentication System Ignat Korchagin, Eugene Pilyankevich
2015/1179 (PDF ) A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n} Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi
2015/1178 (PDF ) Textbook Non-Malleable Commitments Vipul Goyal, Omkant Pandey, Silas Richelson
2015/1177 (PDF ) On the CCA (in)security of MTProto Jakob Jakobsen, Claudio Orlandi
2015/1176 (PDF ) On the Efficiency of FHE-based Private Queries Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang
2015/1175 (PDF ) Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud Bhanu Prakash Gopularam, Nalini. N
2015/1174 (PDF ) On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers Goutam Paul, Souvik Ray
2015/1173 (PDF ) Secure Multiparty Computation with General Interaction Patterns Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin
2015/1170 (PDF ) Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security Takanori Yasuda, Xavier Dahan, Kouichi Sakurai
2015/1169 (PDF ) Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud Marc Green, Thomas Eisenbarth
2015/1167 (PDF ) Constraining Pseudorandom Functions Privately Dan Boneh, Kevin Lewi, David J. Wu
2015/1166 (PDF ) Ceremonies for End-to-End Verifiable Elections Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/1165 (PDF ) Meet-in-the-Middle Attacks on Reduced-Round Midori-64 Li Lin, Wenling Wu
2015/1164 (PDF ) Beyond Bitcoin - Part I: A critical look at blockchain-based systems Pasquale Forte, Diego Romano, Giovanni Schmid
2015/1163 (PDF ) A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher Mehmet Özen, Mustafa Çoban, Ferhat Karakoç
2015/1162 (PDF ) The Moral Character of Cryptographic Work Phillip Rogaway
2015/1161 (PDF ) Cyber and Physical Access Control in Legacy System Using Passwords Jia Xu, Jianying Zhou, Liming Lu
2015/1160 (PDF ) Cryptanalysis of multi-HFE Yasufumi Hashimoto
2015/1159 (PDF ) Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste
2015/1158 (PDF ) A note on the optimality of frequency analysis vs. $\ell_p$-optimization Marie-Sarah Lacharité, Kenneth G. Paterson
2015/1157 (PDF ) From Identification to Signatures, Tightly: A Framework and Generic Transforms Mihir Bellare, Bertram Poettering, Douglas Stebila
2015/1155 (PDF ) Cross Processor Cache Attacks Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/1154 (PDF ) NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
2015/1153 (PDF ) Obliv-C: A Language for Extensible Data-Oblivious Computation Samee Zahur, David Evans
2015/1152 (PDF ) Privacy-preserving Friendship-based Recommender Systems Qiang Tang, Jun Wang
2015/1151 (PDF ) Fully Leakage-Resilient Codes Antonio Faonio, Jesper Buus Nielsen
2015/1150 (PDF ) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila
2015/1149 (PDF ) An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption Takahiro Matsuda, Goichiro Hanaoka
2015/1148 (PDF ) An Inverse-free Single-Keyed Tweakable Enciphering Scheme Ritam Bhaumik, Mridul Nandi
2015/1146 (PDF ) libgroupsig: An extensible C library for group signatures Jesus Diaz, David Arroyo, Francisco B. Rodriguez
2015/1145 (PDF ) Lattice Attacks on the DGHV Homomorphic Encryption Scheme Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/1144 (PDF ) Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015/1142 (PDF ) Midori: A Block Cipher for Low Energy (Extended Version) Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni
2015/1141 (PDF ) Amplifying Side Channels Through Performance Degradation Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom
2015/1140 (PDF ) Modular Inversion Hidden Number Problem- A Lattice Approach Pranjal Dutta
2015/1139 (PDF ) Secret Sharing Schemes with General Access Structures (Full version) Jian Liu, Sihem Mesnager, Lusheng Chen
2015/1138 (PDF ) Lightweight CRC-based Authentication Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
2015/1137 (PDF ) Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference Mengce Zheng, Noboru Kunihiro, Honggang Hu
2015/1136 (PDF ) Multi-Input Functional Encryption for Unbounded Arity Functions Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai
2015/1135 (PDF ) On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
2015/1134 (PDF ) $\Lambda \circ \lambda$: Functional Lattice Cryptography Eric Crockett, Chris Peikert
2015/1133 (PDF ) Comment on ``Realization of a scalable Shor algorithm" Zhengjun Cao, Lihua Liu
2015/1132 (PDF ) Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders Katsuyuki Takashima, Atsushi Takayasu
2015/1131 (PDF ) On the Usability of Two-Factor Authentication Ding Wang, Ping Wang
2015/1130 (PDF ) A Note on Perfect Correctness by Derandomization Nir Bitansky, Vinod Vaikuntanathan
2015/1129 (PDF ) Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS Martin R. Albrecht, Kenneth G. Paterson
2015/1128 (PDF ) New directions in nearest neighbor searching with applications to lattice sieving Anja Becker, Léo Ducas, Nicolas Gama, Thijs Laarhoven
2015/1127 (PDF ) Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups Mikhail Anokhin
2015/1126 (PDF ) A Practical Oblivious Map Data Structure with Secure Deletion and History Independence Daniel S. Roche, Adam J. Aviv, Seung Geol Choi
2015/1125 (PDF ) Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
2015/1124 (PDF ) Secret Sharing Schemes Based on Resilient Boolean Maps Juan Carlos Ku-Cauich, Guillermo Morales-Luna
2015/1123 (PDF ) Practical, Predictable Lattice Basis Reduction Daniele Micciancio, Michael Walter
2015/1121 (PDF ) On the First Fall Degree of Summation Polynomials Stavros Kousidis, Andreas Wiemers
2015/1120 (PDF ) Even More Practical Key Exchanges for the Internet using Lattice Cryptography Vikram Singh, Arjun Chopra
2015/1119 (PDF ) On the Possibility of Non-Interactive E-Voting in the Public-key Setting Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne
2015/1118 (PDF ) Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers Zhenzhen Bao, Peng Luo, Dongdai Lin
2015/1117 (PDF ) Efficient implementation of AND, OR and NOT operators for ABCs Antonio de la Piedra
2015/1116 (PDF ) CHf-ORAM: A Constant Communication ORAM without Homomorphic Encryption Tarik Moataz, Erik-Oliver Blass, Travis Mayberry
2015/1115 (PDF ) Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
2015/1114 (PDF ) Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension Michał Wroński
2015/1113 (PDF ) Multi-Input Functional Encryption with Unbounded-Message Security Vipul Goyal, Aayush Jain, Adam O' Neill
2015/1112 (PDF ) Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles Prastudy Fauzi, Helger Lipmaa
2015/1110 (PDF ) Privacy-Aware Authentication in the Internet of Things Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
2015/1109 (PDF ) Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2015/1108 (PDF ) Recommender Systems and their Security Concerns Jun Wang, Qiang Tang
2015/1107 (PDF ) Concurrent Secure Computation via Non-Black Box Simulation Vipul Goyal, Divya Gupta, Amit Sahai
2015/1106 (PDF ) POPE: Partial Order Preserving Encoding Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich
2015/1105 (PDF ) Selene: Voting with Transparent Verifiability and Coercion-Mitigation Peter Y A Ryan, Peter B Roenne, Vincenzo Iovino
2015/1104 (PDF ) Computing Jacobi's \theta in quasi-linear time Hugo Labrande
2015/1103 (PDF ) Linear codes with few weights from weakly regular bent functions based on a generic construction Sihem Mesnager
2015/1102 (PDF ) A Practical Cryptanalysis of the Algebraic Eraser Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban
2015/1101 (PDF ) Virtual Smart Cards: How to Sign with a Password and a Server Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
2015/1100 (PDF ) Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves. Anissa Sghaier, Loubna Ghammam, Medyen Zeghid, Sylvain Duquesne, Mohsen Machhout
2015/1099 (PDF ) Device-Enhanced Password Protocols with Optimal Online-Offline Protection Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2015/1098 (PDF ) Ring Signature Confidential Transactions for Monero Shen Noether
2015/1097 (PDF ) On the Communication required for Unconditionally Secure Multiplication Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou, Michael Raskin
2015/1096 (PDF ) Watermarking Cryptographic Capabilities Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs
2015/1095 (PDF ) Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures Vipul Goyal, Aayush Jain, Dakshita Khurana
2015/1094 (PDF ) Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification Divesh Aggarwal, Kaave Hosseini, Shachar Lovett
2015/1093 (PDF ) C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs Ahmed Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, Hubert Chan, Charalampos Papamanthou, Rafael Pass, abhi shelat, Elaine Shi
2015/1092 (PDF ) Post-quantum key exchange - a new hope Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
2015/1090 (PDF ) Do Distributed Differentially-Private Protocols Require Oblivious Transfer? Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai
2015/1089 (PDF ) Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini
2015/1088 (PDF ) Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015 Eiichiro Fujisaki, Keita Xagawa
2015/1086 (PDF ) Chicken or the Egg - Computational Data Attacks or Physical Attacks Julien Allibert, Benoit Feix, Georges Gagnerot, Ismael Kane, Hugues Thiebeauld, Tiana Razafindralambo
2015/1085 (PDF ) Malicious Keccak Pawel Morawiecki
2015/1084 (PDF ) Patchable Indistinguishability Obfuscation: iO for Evolving Software Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/1083 (PDF ) Implementation Attacks on Post-Quantum Cryptographic Schemes Mostafa Taha, Thomas Eisenbarth
2015/1082 (PDF ) Delegating RAM Computations with Adaptive Soundness and Privacy Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin
2015/1081 (PDF ) NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim
2015/1080 (PDF ) Variations to the cryptographics algorithms AES and TWOFISH P. Freyre, N. Díaz, O. Cuellar
2015/1079 (PDF ) De Bruijn Sequences from Symmetric Shift Registers Ming Li, Mingxing Wang, Dongdai Lin
2015/1078 (PDF ) Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
2015/1077 (PDF ) Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn Dibyendu Roy, Sourav Mukhopadhyay
2015/1076 (PDF ) An appendix for a recent paper of Kim Razvan Barbulescu
2015/1075 (PDF ) Cybersecurity in an era with quantum computers: will we be ready? Michele Mosca
2015/1074 (PDF ) Succinct Adaptive Garbled RAM Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
2015/1073 (PDF ) Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs David Derler, Daniel Slamanig
2015/1071 (PDF ) Revisiting Secure Two-Party Computation with Rational Players Arpita Maitra, Goutam Paul, Asim K. Pal
2015/1070 (PDF ) Barriers to Black-Box Constructions of Traitor Tracing Systems Bo Tang, Jiapeng Zhang
2015/1069 (PDF ) Indifferentiability of 8-Round Feistel Networks Yuanxi Dai, John Steinberger
2015/1068 (PDF ) Black-Box Parallel Garbled RAM Steve Lu, Rafail Ostrovsky
2015/1067 (PDF ) Public Verifiability in the Covert Model (Almost) for Free Vladimir Kolesnikov, Alex J. Malozemoff
2015/1066 (PDF ) Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential Haipeng Qu, Peng Shang, Xi-Jun Lin, Lin Sun
2015/1065 (PDF ) Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM Christopher Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov
2015/1064 (PDF ) Déjà Q: Encore! Un Petit IBE Hoeteck Wee
2015/1063 (PDF ) Optimal Computational Split-state Non-malleable Codes Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2015/1062 (PDF ) Lower Bounds on Assumptions behind Indistinguishability Obfuscation Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
2015/1061 (PDF ) On Basing Private Information Retrieval on NP-Hardness Tianren Liu, Vinod Vaikuntanathan
2015/1060 (PDF ) Complete addition formulas for prime order elliptic curves Joost Renes, Craig Costello, Lejla Batina
2015/1059 (PDF ) A General Framework for Redactable Signatures and New Constructions David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2015/1058 (PDF ) Rational Sumchecks Siyao Guo, Pavel Hubacek, Alon Rosen, Margarita Vald
2015/1057 (PDF ) The Complexity of Computing the Optimal Composition of Differential Privacy Jack Murtagh, Salil Vadhan
2015/1056 (PDF ) Information-theoretic Local Non-malleable Codes and their Applications Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman
2015/1055 (PDF ) Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits Yuval Ishai, Mor Weiss, Guang Yang
2015/1054 (PDF ) Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS HUI ZHAO, Kouichi Sakurai
2015/1053 (PDF ) Oblivious Parallel RAM: Improved Efficiency and Generic Constructions Binyi Chen, Huijia Lin, Stefano Tessaro
2015/1052 (PDF ) PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management Chenglu Jin, Xiaolin Xu, Wayne Burleson, Ulrich Rührmair, Marten van Dijk
2015/1051 (PDF ) Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme Jayaprakash Kar
2015/1050 (PDF ) Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem Thuraya M. Qaradaghi, Newroz N. Abdulrazaq
2015/1049 (PDF ) Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers Thomas Peyrin, Yannick Seurin
2015/1048 (PDF ) Verifiable Random Functions from Standard Assumptions Dennis Hofheinz, Tibor Jager
2015/1047 (PDF ) Reconfigurable Cryptography: A flexible approach to long-term security Julia Hesse, Dennis Hofheinz, Andy Rupp
2015/1046 (PDF ) From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back Benny Applebaum, Pavel Raykov
2015/1045 (PDF ) Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs Gefei Li, Yuval Yarom, Damith C. Ranasinghe
2015/1044 (PDF ) Homomorphic evaluation requires depth Andrej Bogdanov, Chin Ho Lee
2015/1043 (PDF ) The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle Subhamoy Maitra
2015/1042 (PDF ) ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM Andreas Hülsing, Joost Rijneveld, Peter Schwabe
2015/1041 (PDF ) The Number of Boolean Functions with Multiplicative Complexity 2 Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sonmez Turan
2015/1040 (PDF ) Fully Homomorphic Encryption with Composite Number Modulus Masahiro Yagisawa
2015/1039 (PDF ) Maturity and Performance of Programmable Secure Computation David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen
2015/1038 (PDF ) Revisiting LEGOs: Optimizations, Analysis, and their Limit Yan Huang, Ruiyu Zhu
2015/1037 (PDF ) Cryptanalysis of GGH15 Multilinear Maps Jean-Sebastien Coron, Moon Sung Lee, Tancrede Lepoint, Mehdi Tibouchi
2015/1036 (PDF ) Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selcuk Kavut, Subhamoy Maitra
2015/1035 (PDF ) CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control Britta Hale, Christopher Carr, Danilo Gligoroski
2015/1034 (PDF ) Real time detection of cache-based side-channel attacks using Hardware Performance Counters Marco Chiappetta, Erkay Savas, Cemal Yilmaz
2015/1033 (PDF ) The Ultimate Transposition Cipher (UTC) Gideon Samid
2015/1032 (PDF ) Essentially Optimal Robust Secret Sharing with Maximal Corruptions Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs
2015/1031 (PDF ) Secure Dating with Four or Fewer Cards Antonio Marcedone, Zikai Wen, Elaine Shi
2015/1030 (PDF ) SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC Vadim N. Tsypyschev
2015/1029 (PDF ) The Energy Budget for Wireless Security: Extended Version Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
2015/1028 (PDF ) Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3 Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska
2015/1027 (PDF ) Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case Taechan Kim, Razvan Barbulescu
2015/1026 (PDF ) Hardness Estimation of LWE via Band Pruning Yoshinori Aono, Le Trieu Phong, Lihua Wang
2015/1025 (PDF ) PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers Dieter Schmidt
2015/1023 (PDF ) Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/1022 (PDF ) Recent progress on the elliptic curve discrete logarithm problem Steven D. Galbraith, Pierrick Gaudry
2015/1021 (PDF ) New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption Katsuyuki Takashima
2015/1020 (PDF ) Attacking the Network Time Protocol Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg
2015/1019 (PDF ) Speed-Security Tradeoffs in Blockchain Protocols Aggelos Kiayias, Giorgos Panagiotakos
2015/1018 (PDF ) A Riddle Wrapped in an Enigma Neal Koblitz, Alfred J. Menezes
2015/1017 (PDF ) Functional Encryption: Decentralised and Delegatable Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai
2015/1016 (PDF ) One-Key Compression Function Based MAC with Security beyond Birthday Bound Avijit Dutta, Mridul Nandi, Goutam Paul
2015/1015 (PDF ) On Bitcoin as a public randomness source Joseph Bonneau, Jeremy Clark, Steven Goldfeder
2015/1014 (PDF ) Fast Fourier Orthogonalization Léo Ducas, Thomas Prest
2015/1013 (PDF ) Inception Makes Non-malleable Codes Stronger Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
2015/1012 (PDF ) An Efficient Multiple PKG Compatible Identity Based Authenticated Key Agreement protocol Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan
2015/1011 (PDF ) Hierarchical Functional Encryption Zvika Brakerski, Gil Segev
2015/1010 (PDF ) TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption Sanjam Garg, Payman Mohassel, Charalampos Papamanthou
2015/1009 (PDF ) Applications of Key Recovery Cube-attack-like Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny
2015/1008 (PDF ) Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges Gaby G. Dagher, Benedikt Buenz, Joseph Bonneau, Jeremy Clark, Dan Boneh
2015/1007 (PDF ) How to Vote Privately Using Bitcoin Zhichao Zhao, T-H. Hubert Chan
2015/1006 (PDF ) Confidential Benchmarking based on Multiparty Computation Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft
2015/1005 (PDF ) Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces Wenbin Zhang, Chik How Tan
2015/1004 (PDF ) Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi
2015/1003 (PDF ) Results on polynomial interpolation with mixed modular operations and unknown moduli Oscar Garcia-Morchon, Ronald Rietman, Igor Shparlinski, Ludo Tolhuizen
2015/1002 (PDF ) got HW crypto? On the (in)security of a Self-Encrypting Drive series Gunnar Alendal, Christian Kison, modg
2015/1001 (PDF ) Dismantling real-world ECC with Horizontal and Vertical Template Attacks Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrege, Carine Therond
2015/1000 (PDF ) Factoring as a Service Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger
2015/999 (PDF ) Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
2015/998 (PDF ) All or Nothing at All Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson
2015/997 (PDF ) Incremental Program Obfuscation Sanjam Garg, Omkant Pandey
2015/996 (PDF ) Multi-user Schnorr security, revisited Daniel J. Bernstein
2015/995 (PDF ) Updates on Sorting of Fully Homomorphic Encrypted Data Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed
2015/993 (PDF ) Bi-Deniable Inner Product Encryption from LWE Daniel Apon, Xiong Fan, Feng-Hao Liu
2015/992 (PDF ) Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency Jinsu Kim, Sungwook Kim, Jae Hong Seo
2015/991 (PDF ) Ed3363 (HighFive) -- An alternative Elliptic Curve Mike Scott
2015/990 (PDF ) Encryption Switching Protocols Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/989 (PDF ) Fast Oblivious AES\\A dedicated application of the MiniMac protocol Ivan Damgård, Rasmus Winther Zakarias
2015/988 (PDF ) Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48 Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram
2015/987 (PDF ) Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries Yehuda Lindell, Ben Riva
2015/986 (PDF ) Bit Coincidence Mining Algorithm Koh-ichi Nagao
2015/985 (PDF ) Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system Koh-ichi Nagao
2015/984 (PDF ) Complexity of ECDLP under the First Fall Degree Assumption Koh-ichi Nagao
2015/983 (PDF ) Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes Ping Ngai Chung, Craig Costello, Benjamin Smith
2015/982 (PDF ) A note on constructions of bent functions from involutions Sihem Mesnager
2015/981 (PDF ) Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud Ayantika Chatterjee, Indranil Sengupta
2015/980 (PDF ) Analysis of an RFID Authentication Protocol in Accordance with EPC Standards Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
2015/979 (PDF ) Guidelines for Using the CryptDB System Securely Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan
2015/978 (PDF ) The OPTLS Protocol and TLS 1.3 Hugo Krawczyk, Hoeteck Wee
2015/977 (PDF ) Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³) Michał Wroński
2015/976 (PDF ) On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure Alex Biryukov, Léo Perrin
2015/975 (PDF ) Extended Functionality in Verifiable Searchable Encryption James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick
2015/974 (PDF ) The Conjoined Microprocessor Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin
2015/973 (PDF ) Some Cryptanalytic Results on Zipper Hash and Concatenated Hash Ashwin Jha, Mridul Nandi
2015/972 (PDF ) Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash David Pointcheval, Olivier Sanders, Jacques Traoré
2015/971 (PDF ) Attacks on the Search-RLWE problem with small error Hao Chen, Kristin E. Lauter, Katherine E. Stange
2015/969 (PDF ) Zero-Knowledge Interactive Proof Systems for New Lattice Problems Claude Crepéau, Raza Ali Kazmi
2015/968 (PDF ) Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Gaëtan Leurent
2015/967 (PDF ) Freestart collision for full SHA-1 Marc Stevens, Pierre Karpman, Thomas Peyrin
2015/966 (PDF ) Vulnerabilities of ``McEliece in the World of Escher" Dustin Moody, Ray Perlner
2015/965 (PDF ) Private Genome Analysis through Homomorphic Encryption Miran Kim, Kristin Lauter
2015/964 (PDF ) Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN Danping Shi, Lei Hu, Siwei Sun, Ling Song
2015/963 (PDF ) When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria
2015/962 (PDF ) SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
2015/961 (PDF ) Short Structure-Preserving Signatures Essam Ghadafi
2015/960 (PDF ) More Efficient Secure Outsourcing Methods for Bilinear Maps Öznur Arabacı, Mehmet Sabir Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/959 (PDF ) Cryptanalysis of the Round-Reduced Kupyna Hash Function Jian Zou, Le Dong
2015/957 (PDF ) Delegating RAM Computations Yael Tauman Kalai, Omer Paneth
2015/956 (PDF ) Analysis of the Kupyna-256 Hash Function Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/955 (PDF ) On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives Mridul Nandi, Tapas Pandit
2015/954 (PDF ) Online-Offline Homomorphic Signatures for Polynomial Functions Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2015/953 (PDF ) Gaussian Sampling Precision in Lattice Cryptography Markku-Juhani O. Saarinen
2015/952 (PDF ) Commitment and Oblivious Transfer in the Bounded Storage Model with Errors Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento
2015/951 (PDF ) Nearly Optimal Robust Secret Sharing Mahdi Cheraghchi
2015/950 (PDF ) A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer Shota Goto, Junji Shikata
2015/949 (PDF ) Private Processing of Outsourced Network Functions: Feasibility and Constructions Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar
2015/948 (PDF ) A Provably Secure Short Signature Scheme from Coding Theory Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/947 (PDF ) Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
2015/946 (PDF ) Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov, Dmitry Khovratovich
2015/945 (PDF ) Secure Set-based Policy Checking and Its Application to Password Registration Changyu Dong, Franziskus Kiefer
2015/944 (PDF ) New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields Palash Sarkar, Shashank Singh
2015/943 (PDF ) Sandy2x: New Curve25519 Speed Records Tung Chou
2015/942 (PDF ) Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios Ben Smyth
2015/941 (PDF ) Cryptanalysis of the New Multilinear Map over the Integers Brice Minaud, Pierre-Alain Fouque
2015/940 (PDF ) Secure Association for the Internet of Things Almog Benin, Sivan Toledo, Eran Tromer
2015/939 (PDF ) A Decade of Lattice Cryptography Chris Peikert
2015/938 (PDF ) Lattice Based Cryptography for Beginners Dong Pyo Chi, Jeong Woon Choi, Jeong San Kim, Taewan Kim
2015/937 (PDF ) End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung
2015/935 (PDF ) Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Céline Blondeau, Kaisa Nyberg
2015/934 (PDF ) Cryptanalysis of the New CLT Multilinear Maps Jung Hee Cheon, Changmin Lee, Hansol Ryu
2015/933 (PDF ) Cryptanalysis of Provably Secure Certicateless Short Signature Scheme Jayaprakash Kar
2015/932 (PDF ) Using Tweaks To Design Fault Resistant Ciphers Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/931 (PDF ) Fast and Secure Three-party Computation: The Garbled Circuit Approach Payman Mohassel, Mike Rosulek, Ye Zhang
2015/930 (PDF ) Nearly Sparse Linear Algebra and application to Discrete Logarithms Computations Antoine Joux, Cécile Pierrot
2015/929 (PDF ) Are you The One to Share? Secret Transfer with Access Structure Yongjun Zhao, Sherman S. M. Chow
2015/928 (PDF ) HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network Hassan Noura, Damien Couroussé
2015/927 (PDF ) Rich Queries on Encrypted Data: Beyond Exact Matches Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel Rosu, Michael Steiner
2015/926 (PDF ) CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC Vadim N. Tsypyschev, Julia S. Vinogradova
2015/925 (PDF ) Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/924 (PDF ) Masking Large Keys in Hardware: A Masked Implementation of McEliece Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2015/923 (PDF ) DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay
2015/922 (PDF ) Localised Multisecret Sharing Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2015/921 (PDF ) Identity-Based Revocation from Subset Difference Methods under Simple Assumptions Kwangsu Lee, Jong Hwan Park
2015/920 (PDF ) Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage Giuseppe Ateniese, Antonio Faonio, Seny Kamara
2015/918 (PDF ) Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk
2015/917 (PDF ) Private Proximity Testing on Steroids: An NTRU-based Protocol Constantinos Patsakis, Panayiotis Kotzanikolaou, M ́elanie Bouroche
2015/916 (PDF ) Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis Subhabrata Samajder, Palash Sarkar
2015/915 (PDF ) A Generic Construction for Verifiable Attribute-based Keyword Search Schemes Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
2015/914 (PDF ) A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2015/913 (PDF ) Functional Signcryption: Notion, Construction, and Applications Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/912 (PDF ) Extraction of intrinsic structure for Hardware Trojan detection Maxime Lecomte, Jacques Fournier, Philippe Maurine
2015/911 (PDF ) Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin
2015/910 (PDF ) QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions Alonso González, Alejandro Hevia, Carla Ràfols
2015/909 (PDF ) On the Impact of Known-Key Attacks on Hash Functions Bart Mennink, Bart Preneel
2015/908 (PDF ) Linear Distinguishers in the Key-less Setting: Application to PRESENT Martin M. Lauridsen, Christian Rechberger
2015/907 (PDF ) Cryptographic Assumptions: A Position Paper Shafi Goldwasser, Yael Tauman Kalai
2015/906 (PDF ) RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors Adnan Baysal, Suhap Sahin
2015/905 (PDF ) Mapping the Intel Last-Level Cache Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee, Gernot Heiser
2015/904 (PDF ) Almost-tight Identity Based Encryption against Selective Opening Attack Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen
2015/903 (PDF ) A Note on the Indifferentiability of the 10-Round Feistel Construction Yannick Seurin
2015/902 (PDF ) Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques Kexin Qiao, Lei Hu, Siwei Sun
2015/901 (PDF ) A Unified Approach to MPC with Preprocessing using OT Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl
2015/900 (PDF ) New Results on Identity-based Encryption from Quadratic Residuosity Ferucio Laurentiu Tiplea, Emil Simion
2015/899 (PDF ) Privacy-preserving Attribute Based Searchable Encryption Payal Chaudhari, Maniklal Das
2015/898 (PDF ) Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/897 (PDF ) Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography Prosanta Gope
2015/896 (PDF ) Improved Attacks on Reduced-Round Camellia-128/192/256 Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
2015/895 (PDF ) Rogue Decryption Failures: Reconciling AE Robustness Notions Guy Barwell, Dan Page, Martijn Stam
2015/894 (PDF ) Comparison of cube attacks over different vector spaces Richard Winter, Ana Salagean, Raphael C. -W. Phan
2015/893 (PDF ) Robust Authenticated Encryption and the Limits of Symmetric Cryptography Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015/892 (PDF ) Security Against Related Randomness Attacks via Reconstructive Extractors Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee
2015/891 (PDF ) Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy Sébastien Canard, Viet Cuong Trinh
2015/890 (PDF ) MI-T-HFE, a New Multivariate Signature Scheme Wenbin Zhang, Chik How Tan
2015/889 (PDF ) Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? Anamaria Costache, Nigel P. Smart
2015/888 (PDF ) Tweak-Length Extension for Tweakable Blockciphers Kazuhiko Minematsu, Tetsu Iwata
2015/887 (PDF ) Composable Security in the Tamper Proof Hardware Model under Minimal Complexity Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2015/886 (PDF ) Applying Cryptographic Acceleration Techniques to Error Correction Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion
2015/885 (PDF ) A New Standard of Ukraine: The Kupyna Hash Function Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov
2015/884 (PDF ) General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/882 (PDF ) Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy
2015/881 (PDF ) Generic Security of NMAC and HMAC with Input Whitening Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
2015/880 (PDF ) Generic Efficient Dynamic Proofs of Retrievability Mohammad Etemad, Alptekin Küpçü
2015/879 (PDF ) Computing information on domain parameters from public keys selected uniformly at random Martin Ekerå
2015/878 (PDF ) Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model Edward Eaton, Fang Song
2015/877 (PDF ) Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule Christophe Clavier, Julien Francq, Antoine Wurcker
2015/876 (PDF ) 10-Round Feistel is Indifferentiable from an Ideal Cipher Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam
2015/875 (PDF ) Bent and Semi-bent Functions via Linear Translators Neşe Koçak, Sihem Mesnager, Ferruh Özbudak
2015/874 (PDF ) Indifferentiability of 10-Round Feistel Networks Yuanxi Dai, John Steinberger
2015/873 (PDF ) On the Diffusion Property of Iterated Functions Jian Liu, Sihem Mesnager, Lusheng Chen
2015/872 (PDF ) Traceability Improvements of a New RFID Protocol Based On EPC C1G2 Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
2015/871 (PDF ) Photonic Side Channel Analysis of Arbiter PUFs Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers
2015/870 (PDF ) Gambling, Computational Information and Encryption Security Mohammad Hajiabadi, Bruce M. Kapron
2015/869 (PDF ) New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs
2015/868 (PDF ) Optimally Secure Block Ciphers from Ideal Primitives Stefano Tessaro
2015/867 (PDF ) Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2015/866 (PDF ) Graded Encoding, Variations on a Scheme Shai Halevi
2015/865 (PDF ) Card-based Cryptographic Protocols Using a Minimal Number of Cards Alexander Koch, Stefan Walzer, Kevin Härtel
2015/864 (PDF ) Encryption Performance Improvements of the Paillier Cryptosystem Christine Jost, Ha Lam, Alexander Maximov, Ben Smeets
2015/863 (PDF ) Is There an Oblivious RAM Lower Bound? Elette Boyle, Moni Naor
2015/862 (PDF ) Idealizing Identity-Based Encryption Dennis Hofheinz, Christian Matt, Ueli Maurer
2015/861 (PDF ) A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers Chun Guo, Dongdai Lin
2015/860 (PDF ) Selective Opening Security for Receivers Carmit Hazay, Arpita Patra, Bogdan Warinschi
2015/859 (PDF ) Factor Base Discrete Logarithms in Kummer Extensions Dianyan Xiao, Jincheng Zhuang, Qi Cheng
2015/858 (PDF ) Skipping the $q$ in Group Signatures Olivier Blazy, Saqib A. Kakvi
2015/857 (PDF ) Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy Benjamin Fuller, Ariel Hamlin
2015/856 (PDF ) MGR HASH FUNCTION Khushboo Bussi, Dhananjoy Dey, P. R. Mishra, B. K. Dass
2015/854 (PDF ) Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu
2015/853 (PDF ) Standard Security Does Imply Security Against Selective Opening for Markov Distributions Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak
2015/852 (PDF ) Analysis of a key exchange protocol based on tropical matrix algebra Matvei Kotov, Alexander Ushakov
2015/851 (PDF ) Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing Benoît Cogliati, Yannick Seurin
2015/850 (PDF ) Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable Zhen Liu, Duncan S. Wong
2015/849 (PDF ) Regulating the Pace of von Neumann Correctors Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, Amaury de Wargny
2015/848 (PDF ) The Multiplicative Complexity of Boolean Functions on Four and Five Variables Meltem Sonmez Turan, Rene Peralta
2015/847 (PDF ) Exploring Energy Efficiency of Lightweight Block Ciphers Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2015/846 (PDF ) Characterization of Secure Multiparty Computation Without Broadcast Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
2015/845 (PDF ) Cryptanalysis of the Quadratic Zero-Testing of GGH Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi
2015/844 (PDF ) DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2015/843 (PDF ) Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes David Derler, Daniel Slamanig
2015/842 (PDF ) On Linkability and Malleability in Self-blindable Credentials Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers
2015/841 (PDF ) An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
2015/840 (PDF ) Related-key Impossible Differential Analysis of Full Khudra Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
2015/839 (PDF ) Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really? David Wong
2015/838 (PDF ) Offline Witness Encryption Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2015/837 (PDF ) Multi-Variate High-Order Attacks of Shuffled Tables Recomputation Nicolas BRUNEAU, Sylvain GUILLEY, Zakaria NAJM, Yannick TEGLIA
2015/836 (PDF ) Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys Benjamin Wesolowski, Pascal Junod
2015/835 (PDF ) On near prime-order elliptic curves with small embedding degrees (Full version) Duc-Phong Le, Nadia El Mrabet, Chik How Tan
2015/833 (PDF ) Efficient Key Authentication Service for Secure End-to-end Communications Mohammad Etemad, Alptekin Küpçü
2015/832 (PDF ) Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices David McCann, Kerstin Eder, Elisabeth Oswald
2015/831 (PDF ) M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk
2015/830 (PDF ) Unique Signature with Short Output from CDH Assumption Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng
2015/829 (PDF ) Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1 Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
2015/828 (PDF ) State-recovery analysis of Spritz Ralph Ankele, Stefan Koelbl, Christian Rechberger
2015/827 (PDF ) Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
2015/826 (PDF ) Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys Dario Catalano, Dario Fiore, Luca Nizzardo
2015/825 (PDF ) The Emperor's New Password Creation Policies Ding Wang, Ping Wang
2015/824 (PDF ) Efficient Fully Structure-Preserving Signatures for Large Messages Jens Groth
2015/823 (PDF ) Efficient (ideal) lattice sieving using cross-polytope LSH Anja Becker, Thijs Laarhoven
2015/822 (PDF ) Efficiently Obfuscating Re-Encryption Program under DDH Assumption Akshayaram Srinivasan, C. Pandu Rangan
2015/821 (PDF ) A general framework for building noise-free homomorphic cryptosystems Gérald Gavin
2015/820 (PDF ) Extended Nested Dual System Groups, Revisited Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
2015/819 (PDF ) Improving the Big Mac Attack on Elliptic Curve Cryptography Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
2015/818 (PDF ) cuHE: A Homomorphic Encryption Accelerator Library Wei Dai, Berk Sunar
2015/817 (PDF ) Secure Multiparty Computation of a Social Network Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
2015/816 (PDF ) Analysis of Keyless Massive MIMO-based Cryptosystem Security Valery Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev
2015/815 (PDF ) On the Power of Hierarchical Identity-Based Encryption Mohammad Mahmoody, Ameer Mohammed
2015/814 (PDF ) CLKS: Certificateless Keyword Search on Encrypted Data Qingji Zheng, Xiangxue Li, Aytac Azgin
2015/813 (PDF ) Revisiting Turning Online Cipher Off Ritam Bhaumik, Mridul Nandi
2015/812 (PDF ) The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob Alex Biryukov, Léo Perrin, Aleksei Udovenko
2015/811 (PDF ) Key-recovery attacks against the MAC algorithm Chaskey Chrysanthi Mavromati
2015/810 (PDF ) Improved OR Composition of Sigma-Protocols Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2015/809 (PDF ) New Techniques for Electronic Voting Alan Szepieniec, Bart Preneel
2015/808 (PDF ) Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks Mihir Bellare, Joseph Jaeger, Daniel Kane
2015/807 (PDF ) Fair Distributed Computation of Reactive Functions Juan Garay, Björn Tackmann, Vassilis Zikas
2015/806 (PDF ) Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti
2015/805 (PDF ) A classification of elliptic curves with respect to the GHS attack in odd characteristic Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2015/804 (PDF ) SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE Sumit Chakraborty
2015/803 (PDF ) Statistical and Algebraic Properties of DES Stian Fauskanger, Igor Semaev
2015/802 (PDF ) Ciphertext-only attack on d*d Hill in O(d13^d) Shahram Khazaei, Siavash Ahmadi
2015/801 (PDF ) Scalar Blinding on Elliptic Curves based on Primes with Special Structure Scott Fluhrer
2015/799 (PDF ) Secure Binary Field Multiplication Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim
2015/797 (PDF ) What Security Can We Achieve within 4 Rounds? Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2015/796 (PDF ) Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi
2015/795 (PDF ) Fast and Memory-Efficient Key Recovery in Side-Channel Attacks Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman
2015/794 (PDF ) Safe-Errors on SPA Protected implementations with the Atomicity Technique Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache
2015/793 (PDF ) Algorithmic Information Theory for Obfuscation Security Rabih Mohsen, Alexandre Miranda Pinto
2015/792 (PDF ) Standard Security Does Not Imply Indistinguishability Under Selective Opening Dennis Hofheinz, Vanishree Rao, Daniel Wichs
2015/791 (PDF ) On the Equivalence of Obfuscation and Multilinear Maps Omer Paneth, Amit Sahai
2015/790 (PDF ) On weak and strong 2^k-bent Boolean functions Pantelimon Stanica
2015/789 (PDF ) Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator Gangqiang Yang, Mark D. Aagaard, Guang Gong
2015/788 (PDF ) Cracking-Resistant Password Vaults using Natural Language Encoders Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
2015/787 (PDF ) Backtracking-Assisted Multiplication Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou
2015/786 (PDF ) Buying AES Design Resistance with Speed and Energy Jean-Michel Cioranesco, Roman Korkikian, David Naccache, Rodrigo Portella do Canto
2015/785 (PDF ) Double-Speed Barrett Moduli Rémi Géraud, Diana Maimut, David Naccache
2015/784 (PDF ) Threshold FlipThem: When the winner does not need to take all David Leslie, Chris Sherfield, Nigel P. Smart
2015/783 (PDF ) Cryptanalysis of the Authenticated Encryption Algorithm COFFE Ivan Tjuawinata, Tao Huang, Hongjun Wu
2015/782 (PDF ) Secure two-party computation in applied pi-calculus: models and verification Sergiu Bursuc
2015/781 (PDF ) Twisted Hessian curves Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange
2015/780 (PDF ) Multilinear Maps from Obfuscation Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson
2015/779 (PDF ) A Simple Scheme, for Strengthening Product-sum Type PKC Masao KASAHARA
2015/776 (PDF ) Functional Encryption for Turing Machines Prabhanjan Ananth, Amit Sahai
2015/775 (PDF ) Efficient MDS Diffusion Layers Through Decomposition of Matrices S. M. Dehnavi, M. R. Mirzaee Shamsabad, A. Mahmoodi Rishakani, Y. Fekri Dabanloo
2015/774 (PDF ) Revisiting Prime Power RSA Santanu Sarkar
2015/773 (PDF ) Distinguishing a truncated random permutation from a random function Shoni Gilboa, Shay Gueron
2015/772 (PDF ) Non-Malleable Encryption: Simpler, Shorter, Stronger Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
2015/771 (PDF ) A SAT-based Public Key Cryptography Scheme Sebastian E. Schmittner
2015/770 (PDF ) A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
2015/769 (PDF ) On the Hardness of Learning with Rounding over Small Modulus Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
2015/768 (PDF ) Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
2015/767 (PDF ) Dual EC: A Standardized Back Door Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen
2015/766 (PDF ) Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng
2015/765 (PDF ) Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version) Victoria Fehr, Marc Fischlin
2015/764 (PDF ) On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2}) Jincheng Zhuang, Qi Cheng
2015/763 (PDF ) Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki
2015/762 (PDF ) A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef
2015/761 (PDF ) Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language William Diehl
2015/760 (PDF ) Investigating SRAM PUFs in large CPUs and GPUs Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen
2015/759 (PDF ) Cryptanalysis of Gu's ideal multilinear map Alice Pellet-Mary, Damien Stehle
2015/758 (PDF ) Ring-LWE Cryptography for the Number Theorist Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
2015/757 (PDF ) Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks Matthias Hamann, Matthias Krause
2015/756 (PDF ) Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng, Hua Guo
2015/755 (PDF ) Revisiting TESLA in the quantum random oracle model Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
2015/754 (PDF ) Related-Key Attack on Full-Round PICARO Anne Canteaut, Virginie Lallemand, María Naya-Plasencia
2015/753 (PDF ) Differential Computation Analysis: Hiding your White-Box Designs is Not Enough Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
2015/752 (PDF ) On Constructing One-Way Permutations from Indistinguishability Obfuscation Gilad Asharov, Gil Segev
2015/751 (PDF ) Fast Garbling of Circuits Under Standard Assumptions Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas
2015/750 (PDF ) Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key Ryo Nishimaki, Daniel Wichs, Mark Zhandry
2015/749 (PDF ) Affine Equivalence and its Application to Tightening Threshold Implementations Pascal Sasdrich, Amir Moradi, Tim Güneysu
2015/748 (PDF ) A More Cautious Approach to Security Against Mass Surveillance Jean Paul Degabriele, Pooya Farshim, Bertram Poettering
2015/747 (PDF ) Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du
2015/746 (PDF ) A 2^{70} Attack on the Full MISTY1 Achiya Bar-On
2015/745 (PDF ) Faster ECC over F2571 (feat. PMULL) Hwajeong Seo
2015/744 (PDF ) BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware Ege Gulcan, Aydin Aysu, Patrick Schaumont
2015/743 (PDF ) Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions Benoit Libert, Thomas Peters, Moti Yung
2015/742 (PDF ) A Matrix Decomposition Method for Optimal Normal Basis Multiplication Can Kızılkale, Ömer Eǧecioǧlu, Çetin Kaya Koç
2015/741 (PDF ) On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
2015/740 (PDF ) Predictable Arguments of Knowledge Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
2015/738 (PDF ) Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) Kazuhiko Minematsu
2015/737 (PDF ) New multilinear maps from ideal lattices Gu Chunsheng
2015/735 (PDF ) Cutting-Edge Cryptography Through the Lens of Secret Sharing Ilan Komargodski, Mark Zhandry
2015/733 (PDF ) Fully Homomorphic Encryption on Octonion Ring Masahiro Yagisawa
2015/732 (PDF ) Compact Implementations of LEA Block Cipher for Low-End Microprocessors Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
2015/731 (PDF ) Same Value Analysis on Edwards Curves Rodrigo Abarzúa, Santi Martínez, Valeria Mendoza
2015/730 (PDF ) Indistinguishability Obfuscation from Functional Encryption for Simple Functions Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/729 (PDF ) Provably-Secure Remote Memory Attestation to Prevent Heap Overflow Attacks Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi
2015/728 (PDF ) Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas
2015/727 (PDF ) DPA, Bitslicing and Masking at 1 GHz Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede
2015/726 (PDF ) Compositions of linear functions and applications to hashing Vladimir Shpilrain, Bianca Sosnovski
2015/725 (PDF ) The self-blindable U-Prove scheme from FC'14 is forgeable Eric Verheul, Sietse Ringers, Jaap-Henk Hoepman
2015/724 (PDF ) A masked ring-LWE implementation Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2015/723 (PDF ) Cryptanalysis of Feistel Networks with Secret Round Functions Alex Biryukov, Gaëtan Leurent, Léo Perrin
2015/722 (PDF ) Oblivious Substring Search with Updates Tarik Moataz, Erik-Oliver Blass
2015/721 (PDF ) KDM-Security via Homomorphic Smooth Projective Hashing Hoeteck Wee
2015/720 (PDF ) Output-Compressing Randomized Encodings and Applications Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
2015/719 (PDF ) Consolidating masking schemes Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede
2015/718 (PDF ) Efficient Asynchronous Accumulators for Distributed PKI Leonid Reyzin, Sophia Yakoubov
2015/717 (PDF ) Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
2015/716 (PDF ) Linear Cryptanalysis of Reduced-Round SIMECK Variants Nasour Bagheri
2015/715 (PDF ) New Circular Security Counterexamples from Decision Linear and Learning with Errors Allison Bishop, Susan Hohenberger, Brent Waters
2015/714 (PDF ) New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code. Masao KASAHARA
2015/712 (PDF ) Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) David Bernhard, Bogdan Warinschi, Ngoc Khanh Nguyen
2015/711 (PDF ) Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version) Anne Canteaut, Sébastien Duval, Gaëtan Leurent
2015/710 (PDF ) Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version) Bernardo Ferreira, João Rodrigues, João Leitão, Henrique Domingos
2015/709 (PDF ) Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception Luka Malisa, Kari Kostiainen, Srdjan Capkun
2015/708 (PDF ) Choosing Parameters for NTRUEncrypt Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2015/707 (PDF ) Reconciling User Privacy and Implicit Authentication for Mobile Devices Siamak F. Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa
2015/706 (PDF ) A Brief Comparison of Simon and Simeck Stefan Kölbl, Arnab Roy
2015/705 (PDF ) Linear Overhead Optimally-resilient Robust MPC Using Preprocessing Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
2015/704 (PDF ) Indistinguishability Obfuscation: from Approximate to Exact Nir Bitansky, Vinod Vaikuntanathan
2015/703 (PDF ) Point-Function Obfuscation: A Framework and Generic Constructions Mihir Bellare, Igors Stepanovs
2015/702 (PDF ) Demystifying incentives in the consensus computer Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena
2015/701 (PDF ) Differentially private instance-based noise mechanisms in practice Sébastien Canard, Baptiste Olivier, Tony Quertier
2015/700 (PDF ) Four Neighbourhood Cellular Automata as Better Cryptographic Primitives Jimmy Jose, Dipanwita RoyChowdhury
2015/699 (PDF ) FURISC: FHE Encrypted URISC Design Ayantika Chatterjee, Indranil Sengupta
2015/698 (PDF ) Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa Subhamoy Maitra
2015/697 (PDF ) On the Security of a Self-healing Group Key Distribution Scheme Yandong Zheng, Hua Guo
2015/696 (PDF ) Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p) Miguel Morales Sandoval, Arturo Diaz Perez
2015/695 (PDF ) Cliptography: Clipping the Power of Kleptographic Attacks Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
2015/694 (PDF ) On the Complexity of Additively Homomorphic UC Commitments Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
2015/693 (PDF ) Foundations of Reactive Garbling Schemes Jesper Buus Nielsen, Samuel Ranellucci
2015/692 (PDF ) Fast and Secure Linear Regression and Biometric Authentication with Security Update Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
2015/691 (PDF ) SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth
2015/690 (PDF ) Systematic Reverse Engineering of Cache Slice Selection in Intel Processors Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/689 (PDF ) Counting Keys in Parallel After a Side Channel Attack Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam
2015/688 (PDF ) Binary Field Multiplication on ARMv8 Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
2015/687 (PDF ) Classical Cryptographic Protocols in a Quantum World Sean Hallgren, Adam Smith, Fang Song
2015/686 (PDF ) Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad faisal, Mahmood Ul Hassan
2015/685 (PDF ) On the discrete logarithm problem in finite fields of fixed characteristic Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2015/684 (PDF ) A One-time Stegosystem and Applications to Efficient Covert Communication Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar
2015/683 (PDF ) Security of Linear Secret-Sharing Schemes against Mass Surveillance Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci
2015/682 (PDF ) Integral Cryptanalysis on Full MISTY1 Yosuke Todo
2015/681 (PDF ) ANONIZE: A Large-Scale Anonymous Survey System Susan Hohenberger, Steven Myers, Rafael Pass, abhi shelat
2015/680 (PDF ) Indifferentiability of Confusion-Diffusion Networks Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/679 (PDF ) Another Look at Normal Approximations in Cryptanalysis Subhabrata Samajder, Palash Sarkar
2015/678 (PDF ) Optimizing MAKWA on GPU and CPU Thomas Pornin
2015/677 (PDF ) EdDSA for more curves Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang
2015/676 (PDF ) Quantum Cryptanalysis of NTRU Scott Fluhrer
2015/675 (PDF ) Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou
2015/674 (PDF ) Preprocessing-Based Verification of Multiparty Protocols with Honest Majority Roman Jagomägis, Peeter Laud, Alisa Pankova
2015/673 (PDF ) Decaf: Eliminating cofactors through point compression Mike Hamburg
2015/672 (PDF ) Function-Hiding Inner Product Encryption Allison Bishop, Abhishek Jain, Lucas Kowalczyk
2015/671 (PDF ) Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data Peeter Laud, Alisa Pankova
2015/670 (PDF ) Smart Security Management in Secure Devices Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
2015/669 (PDF ) GMU Hardware API for Authenticated Ciphers Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj
2015/668 (PDF ) The Fallacy of Composition of Oblivious RAM and Searchable Encryption Muhammad Naveed
2015/667 (PDF ) De Bruijn Sequences from Joining Cycles of Nonlinear Feedback Shift Registers Ming Li, Cees J. A. Jansen, Dongdai Lin, Qiuyan Wang
2015/666 (PDF ) Improved Linear Hull Attack on Round-Reduced \textsc{Simon} with Dynamic Key-guessing Techniques Huaifeng Chen, Xiaoyun Wang
2015/665 (PDF ) Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption. Romain Gay, Iordanis Kerenidis, Hoeteck Wee
2015/664 (PDF ) Secure Multi-Party Shuffling Mahnush Movahedi, Jared Saia, Mahdi Zamani
2015/663 (PDF ) Analyzing the Efficiency of Biased-Fault Based Attacks Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
2015/662 (PDF ) Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves Ryutaroh Matsumoto
2015/661 (PDF ) Cryptanalysis of a modern rotor machine in a multicast setting Shane Kepley, David Russo, Rainer Steinwandt
2015/659 (PDF ) Diversity and Transparency for ECC Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå
2015/658 (PDF ) Single-Cycle Implementations of Block Ciphers Pieter Maene, Ingrid Verbauwhede
2015/657 (PDF ) Randomizing the Montgomery Powering Ladder Duc-Phong Le, Chik How Tan, Michael Tunstall
2015/656 (PDF ) Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G. P. Biswas
2015/655 (PDF ) An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
2015/654 (PDF ) DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng
2015/652 (PDF ) Modelling ciphersuite and version negotiation in the TLS protocol Benjamin Dowling, Douglas Stebila
2015/651 (PDF ) Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller
2015/650 (PDF ) A New Encryption Standard of Ukraine: The Kalyna Block Cipher Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov
2015/649 (PDF ) On the Hardness of Proving CCA-security of Signed ElGamal David Bernhard, Marc Fischlin, Bogdan Warinschi
2015/648 (PDF ) Adaptive Proofs of Knowledge in the Random Oracle Model David Bernhard, Marc Fischlin, Bogdan Warinschi
2015/647 (PDF ) Efficient ephemeral elliptic curve cryptographic keys Andrea Miele, Arjen K. Lenstra
2015/646 (PDF ) Decomposition attack on SASASASAS Alex Biryukov, Dmitry Khovratovich
2015/644 (PDF ) The Pythia PRF Service Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart
2015/643 (PDF ) Short Accountable Ring Signatures Based on DDH Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
2015/642 (PDF ) A New Partial Key Exposure Attack on Multi-power RSA Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol
2015/641 (PDF ) Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings Jing Li, Licheng Wang
2015/640 (PDF ) Very-efficient simulatable flipping of many coins into a well Luís T. A. N. Brandão
2015/638 (PDF ) An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta
2015/637 (PDF ) A Novel Cyberspace-Oriented Access Control Model Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan
2015/636 (PDF ) On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks Matthias Hamann, Matthias Krause
2015/635 (PDF ) Microcash: Efficient Off-Line Small Payments Chris Pavlovski, Colin Boyd
2015/634 (PDF ) Phasing: Private Set Intersection using Permutation-based Hashing Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner
2015/633 (PDF ) An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/632 (PDF ) On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji
2015/631 (PDF ) Accelerating Homomorphic Evaluation on Reconfigurable Hardware Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrian Macias
2015/630 (PDF ) Unconditionally Secure Computation with Reduced Interaction Ivan Damgård, Jesper Buus Nielsen, Rafail Ostovsky, Adi Rosen
2015/629 (PDF ) BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo
2015/628 (PDF ) An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer
2015/627 (PDF ) On Necessary Padding with IO Justin Holmgren
2015/626 (PDF ) Practical Round-Optimal Blind Signatures in the Standard Model Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2015/625 (PDF ) Ed448-Goldilocks, a new elliptic curve Mike Hamburg
2015/624 (PDF ) Automated Analysis and Synthesis of Authenticated Encryption Schemes Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff
2015/622 (PDF ) Random Digit Representation of Integers Nicolas Méloni, M. Anwar Hasan
2015/621 (PDF ) Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms Sarani Bhattacharya, Debdeep Mukhopadhyay
2015/620 (PDF ) Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions Susumu Kiyoshima
2015/619 (PDF ) Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits Seher Tutdere, Osmanbey Uzunkol
2015/618 (PDF ) An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas
2015/617 (PDF ) Generalised tally-based decoders for traitor tracing and group testing Boris Skoric, Wouter de Groot
2015/616 (PDF ) The leaking battery: A privacy analysis of the HTML5 Battery Status API Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Diaz
2015/615 (PDF ) Security Analysis of Niu et al. Authentication and Ownership Management Protocol Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati
2015/614 (PDF ) Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem Fangguo Zhang
2015/613 (PDF ) Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei
2015/612 (PDF ) The Simeck Family of Lightweight Block Ciphers Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong
2015/610 (PDF ) McBits: fast constant-time code-based cryptography Daniel J. Bernstein, Tung Chou, Peter Schwabe
2015/609 (PDF ) Experimental Study of DIGIPASS GO3 and the Security of Authentication Igor Semaev
2015/608 (PDF ) Fully Secure Functional Encryption for Inner Products, from Standard Assumptions Shweta Agrawal, Benoit Libert, Damien Stehle
2015/607 (PDF ) Netcoin - A Traceable P2P Electronic Cash System Hitesh Tewari, Eamon O Nuallain
2015/606 (PDF ) Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon
2015/605 (PDF ) Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm Steven D. Galbraith, Ping Wang, Fangguo Zhang
2015/604 (PDF ) Structure-Preserving Signatures from Standard Assumptions, Revisited Eike Kiltz, Jiaxin Pan, Hoeteck Wee
2015/603 (PDF ) Complementary Dual Codes for Counter-measures to Side-Channel Attacks Claude Carlet, Sylvain Guilley
2015/602 (PDF ) Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhay
2015/601 (PDF ) A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation Mei Wang, Zheng Yuan, Xiao Feng
2015/600 (PDF ) Predictive Models for Min-Entropy Estimation John Kelsey, Kerry A. McKay, Meltem Sonmez Turan
2015/599 (PDF ) The Chain Rule for HILL Pseudoentropy, Revisited Krzysztof Pietrzak, Maciej Skorski
2015/598 (PDF ) Combining Differential Privacy and Secure Multiparty Computation Martin Pettai, Peeter Laud
2015/597 (PDF ) Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads? Amir Moradi, Alexander Wild
2015/596 (PDF ) Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
2015/594 (PDF ) Disk Encryption: Do We Need to Preserve Length? Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
2015/593 (PDF ) A Physical Approach for Stochastic Modeling of TERO-based TRNG Patrick HADDAD, Viktor FISCHER, Florent BERNARD, Jean NICOLAI
2015/592 (PDF ) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
2015/591 (PDF ) How much randomness can be extracted from memoryless Shannon entropy sources? Maciej Skorski
2015/590 (PDF ) TriviA: A Fast and Secure Authenticated Encryption Scheme Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
2015/589 (PDF ) Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath A. -M. Leventi-Peetz, J. -V. Peetz
2015/588 (PDF ) An analysis of the $C$ class of bent functions Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic
2015/587 (PDF ) AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD Trupil Limbasiya, Nishant Doshi
2015/585 (PDF ) SIMON and SPECK: Block Ciphers for the Internet of Things Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2015/584 (PDF ) How to Securely Prolong the Computational Bindingness of Pedersen Commitments Denise Demirel, Jean Lancrenon
2015/583 (PDF ) Secure Key Generation from Biased PUFs Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans Willems
2015/582 (PDF ) How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru
2015/581 (PDF ) Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation Chris Brzuska, Arno Mittelbach
2015/580 (PDF ) Composable & Modular Anonymous Credentials: Definitions and Practical Constructions Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
2015/579 (PDF ) A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation Mridul Nandi
2015/578 (PDF ) Tampering with the Delivery of Blocks and Transactions in Bitcoin Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
2015/577 (PDF ) Twist Insecurity Manfred Lochter, Andreas Wiemers
2015/576 (PDF ) The Carnac protocol -- or how to read the contents of a sealed envelope Michael Scott, Brian Spector
2015/575 (PDF ) Known-key Distinguisher on Full PRESENT Céline Blondeau, Thomas Peyrin, Lei Wang
2015/574 (PDF ) Fair and Robust Multi-Party Computation using a Global Transaction Ledger Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas
2015/573 (PDF ) Last fall degree, HFE, and Weil descent attacks on ECDLP Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo
2015/572 (PDF ) On Public Key Encryption from Noisy Codewords Eli Ben-Sasson, Iddo Ben-Tov, Ivan Damgard, Yuval Ishai, Noga ron-Zewi
2015/571 (PDF ) Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order - Extended Version Tobias Schneider, Amir Moradi, Tim Güneysu
2015/570 (PDF ) Constant Communication ORAM with Small Blocksize Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
2015/569 (PDF ) Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version) Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2015/568 (PDF ) Cryptanalysis of Reduced-Round Whirlwind (Full Version) Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2015/567 (PDF ) Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes Henri Gilbert, Jérôme Plût, Joana Treger
2015/566 (PDF ) A Framework for Identity-Based Encryption with Almost Tight Security Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/565 (PDF ) FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime Craig Costello, Patrick Longa
2015/564 (PDF ) Sanctum: Minimal Hardware Extensions for Strong Software Isolation Victor Costan, Ilia Lebedev, Srinivas Devadas
2015/563 (PDF ) Privacy in the Genomic Era Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang
2015/562 (PDF ) PUDA – Privacy and Unforgeability for Data Aggregation Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2015/561 (PDF ) SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip J. Longo, E. De Mulder, D. Page, M. Tunstall
2015/560 (PDF ) Generic Construction of UC-Secure Oblivious Transfer Olivier Blazy, Céline Chevalier
2015/559 (PDF ) Concurrent Secure Computation with Optimal Query Complexity Ran Canetti, Vipul Goyal, Abhishek Jain
2015/558 (PDF ) Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
2015/557 (PDF ) Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers Takanori Isobe, Kyoji Shibutani
2015/556 (PDF ) Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede
2015/555 (PDF ) Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack Tapas Pandit, Sumit Kumar Pandey, Rana Barua
2015/554 (PDF ) An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2015/553 (PDF ) Round-Optimal Black-Box Two-Party Computation Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro
2015/552 (PDF ) An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices Paul Kirchner, Pierre-Alain Fouque
2015/551 (PDF ) Quantum homomorphic encryption for circuits of low $T$-gate complexity Anne Broadbent, Stacey Jeffery
2015/550 (PDF ) Upending Stock Market Structure Using Secure Multi-Party Computation Charanjit S. Jutla
2015/549 (PDF ) ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices Amir Hassani Karbasi, Reza Ebrahimi Atani
2015/548 (PDF ) Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz
2015/547 (PDF ) Secure Computation of MIPS Machine Code Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz
2015/546 (PDF ) Actively Secure OT Extension with Optimal Overhead Marcel Keller, Emmanuela Orsini, Peter Scholl
2015/545 (PDF ) FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing
2015/544 (PDF ) Alternative cubics' rules with an algebraic appeal Daniel R. L. Brown
2015/543 (PDF ) Bloom Filters in Adversarial Environments Moni Naor, Eylon Yogev
2015/542 (PDF ) Improved Side-Channel Analysis of Finite-Field Multiplication Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff
2015/541 (PDF ) Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption Bart Mennink, Reza Reyhanitabar, Damian Vizár
2015/539 (PDF ) Tweaking Even-Mansour Ciphers Benoît Cogliati, Rodolphe Lampe, Yannick Seurin
2015/538 (PDF ) Pairing Based Mutual Healing in Wireless Sensor Networks Sarita Agrawal, Jay Patel, Manik Lal Das
2015/537 (PDF ) Towards Easy Leakage Certification François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo
2015/536 (PDF ) From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces François Durvaux, François-Xavier Standaert
2015/535 (PDF ) ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? Vincent Grosso, François-Xavier Standaert
2015/534 (PDF ) Problems, solutions and experience of the first international student's Olympiad in cryptography Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeria Vitkup
2015/533 (PDF ) Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher Xiaoshuang Ma, Kexin Qiao
2015/531 (PDF ) Reproducible Circularly-Secure Bit Encryption: Applications and Realizations Mohammad Hajiabadi, Bruce M. Kapron
2015/530 (PDF ) Practical Free-Start Collision Attacks on 76-step SHA-1 Pierre Karpman, Thomas Peyrin, Marc Stevens
2015/529 (PDF ) Power Analysis Attacks against IEEE 802.15.4 Nodes Colin O'Flynn, Zhizhang Chen
2015/528 (PDF ) SpaceMint: A Cryptocurrency Based on Proofs of Space Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
2015/527 (PDF ) Robust Profiling for DPA-Style Attacks Carolyn Whitnall, Elisabeth Oswald
2015/526 (PDF ) Generic Key Recovery Attack on Feistel Scheme Takanori Isobe, Kyoji Shibutani
2015/525 (PDF ) Short Randomizable Signatures David Pointcheval, Olivier Sanders
2015/524 (PDF ) Secure Key Exchange Protocol based on Virtual Proof of Reality Yansong Gao
2015/523 (PDF ) Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
2015/522 (PDF ) Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search Anja Becker, Nicolas Gama, Antoine Joux
2015/521 (PDF ) Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency Sergey Gorbunov, Silvio Micali
2015/520 (PDF ) A Constant Time, Single Round Attribute-Based Authenticated Key Exchange in Random Oracle Model Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
2015/519 (PDF ) Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping Yongge Wang
2015/518 (PDF ) Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin Ren Zhang, Bart Preneel
2015/517 (PDF ) Subversion-Resilient Signatures: Definitions, Constructions and Applications Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
2015/516 (PDF ) Key-Recovery Attacks on ASASA Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
2015/515 (PDF ) Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman
2015/514 (PDF ) Time-Lock Puzzles from Randomized Encodings Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters
2015/513 (PDF ) Computing Individual Discrete Logarithms Faster in $GF(p^n)$ Aurore Guillevic
2015/512 (PDF ) Key Extraction from the Primary Side of a Switched-Mode Power Supply Sami Saab, Andrew Leiserson, Michael Tunstall
2015/511 (PDF ) Near Collision Side Channel Attacks Baris Ege, Thomas Eisenbarth, Lejla Batina
2015/510 (PDF ) Equivoe-T: Transposition Equivocation Cryptography Gideon Samid
2015/509 (PDF ) A flaw in a theorem about Schnorr signatures Daniel R. L. Brown
2015/508 (PDF ) Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra
2015/507 (PDF ) Decomposing the ASASA Block Cipher Construction Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander
2015/506 (PDF ) Strong Non-Interference and Type-Directed Higher-Order Masking Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini
2015/505 (PDF ) The Tower Number Field Sieve Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung
2015/504 (PDF ) The Iterated Random Permutation Problem with Applications to Cascade Encryption Brice Minaud, Yannick Seurin
2015/503 (PDF ) The Norwegian Internet Voting Protocol: A new Instantiation Kristian Gjøsteen, Anders Smedstuen Lund
2015/502 (PDF ) Centrally Banked Cryptocurrencies George Danezis, Sarah Meiklejohn
2015/501 (PDF ) Multi-Prover Commitments Against Non-Signaling Attacks Serge Fehr, Max Fillinger
2015/500 (PDF ) Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure Alberto Battistello, Christophe Giraud
2015/499 (PDF ) Algebraic partitioning: Fully compact and (almost) tightly secure cryptography Dennis Hofheinz
2015/498 (PDF ) Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials Jiajun Zhang, Haining Fan
2015/497 (PDF ) Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost Zhangxiang Hu, Payman Mohassel, Mike Rosulek
2015/496 (PDF ) Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
2015/495 (PDF ) Improving algebraic attacks on stream ciphers based on linear feedback shifter registers over $F_{2^k}$ Sondre Rønjom
2015/493 (PDF ) Fault Tolerant Infective Countermeasure for AES Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
2015/492 (PDF ) Masking vs. Multiparty Computation: How Large is the Gap for AES? Vincent Grosso, François-Xavier Standaert, Sebastian Faust
2015/491 (PDF ) Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa
2015/490 (PDF ) Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement Sonam Devgan Kaul, Amit K. Awasthi
2015/489 (PDF ) Scalable and private media consumption with Popcorn Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish
2015/488 (PDF ) On Black-Box Complexity of Universally Composable Security in the CRS model Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2015/487 (PDF ) Contention in Cryptoland: Obfuscation, Leakage and UCE Mihir Bellare, Igors Stepanovs, Stefano Tessaro
2015/486 (PDF ) DECIM: Detecting Endpoint Compromise In Messaging Jiangshan Yu, Mark Ryan, Cas Cremers
2015/485 (PDF ) Turning Online Ciphers Off Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam
2015/484 (PDF ) More Rounds, Less Security? Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolić
2015/483 (PDF ) Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai, Adeline Langlois, Tancrëde Lepoint, Amin Sakzad, Damien Stehle, Ron Steinfeld
2015/482 (PDF ) How to build time-lock encryption Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi
2015/481 (PDF ) Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers Theodosis Mourouzis, Guangyan Song, Nicolas Courtois, Michalis Christofii
2015/480 (PDF ) Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation Berry Schoenmakers, Meilof Veeningen, Niels de Vreede
2015/479 (PDF ) A Provably Secure Group Signature Scheme from Code-Based Assumptions Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang
2015/477 (PDF ) Authentication Key Recovery on Galois Counter Mode (GCM) John Mattsson, Magnus Westerlund
2015/476 (PDF ) XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees Bart Mennink
2015/475 (PDF ) Randomizing scalar multiplication using exact covering systems of congruences Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
2015/474 (PDF ) Fully Homomorphic Encryption without bootstrapping Masahiro Yagisawa
2015/473 (PDF ) VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS Mehak Khurana, Meena Kumari
2015/472 (PDF ) High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
2015/471 (PDF ) A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott
2015/470 (PDF ) On the power of Public-key Functional Encryption with Function Privacy Vincenzo Iovino, Qiang Tang, Karol Żebrowski
2015/469 (PDF ) Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications Andrew Miller, Rob Jansen
2015/468 (PDF ) Practical Fully Homomorphic Encryption without Noise Reduction Dongxi Liu
2015/467 (PDF ) The Oblivious Machine - or: How to Put the C into MPC Marcel Keller
2015/466 (PDF ) Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process Zhou Tanping, Yang Xiaoyuan, Zhang Wei, Wu Liqiang
2015/465 (PDF ) Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation Hwajeong Seo, Zhe Liu, Johann Groschadl, Howon Kim
2015/464 (PDF ) Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies Florian Tschorsch, Björn Scheuermann
2015/462 (PDF ) Accelerating SWHE based PIRs using GPUs Wei Dai, Yarkın Doröz, Berk Sunar
2015/461 (PDF ) Approximate Algorithms on Lattices with Small Determinant Jung Hee Cheon, Changmin Lee
2015/460 (PDF ) Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, Elaine Shi
2015/459 (PDF ) New Observation on Division Property Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang
2015/458 (PDF ) A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS Sheena Sathyan, Shaji R S
2015/457 (PDF ) Generic Conversions from CPA to CCA secure Functional Encryption Mridul Nandi, Tapas Pandit
2015/456 (PDF ) Collateral damage of Facebook Apps: an enhanced privacy scoring model Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel
2015/455 (PDF ) Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu, N. Asokan, Benny Pinkas
2015/454 (PDF ) A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
2015/453 (PDF ) An Optimization of Gu Map-1 Yupu Hu, Huiwen Jia
2015/452 (PDF ) Masks will Fall Off -- Higher-Order Optimal Distinguishers Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul
2015/451 (PDF ) On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees Sihong Su, Xiaohu Tang
2015/450 (PDF ) Adaptively Secure Computation with Partial Erasures Carmit Hazay, Yehuda Lindell, Arpita Patra
2015/449 (PDF ) On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu
2015/448 (PDF ) A Comment on Gu Map-1 Yupu Hu, Huiwen Jia
2015/447 (PDF ) A New Model for Error-Tolerant Side-Channel Cube Attacks Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede
2015/446 (PDF ) On the Amortized Complexity of Zero-knowledge Protocols Ronald Cramer, Ivan Damgård, Marcel Keller
2015/445 (PDF ) XLS is not a Strong Pseudorandom Permutation Mridul Nandi
2015/444 (PDF ) Revisiting Security Claims of XLS and COPA Mridul Nandi
2015/443 (PDF ) Security Evaluation and Enhancement of Bistable Ring PUFs Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne Burleson
2015/442 (PDF ) Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
2015/441 (PDF ) FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems Devu Manikantan Shila, Vivek Venugopalan, Cameron D Patterson
2015/440 (PDF ) Message-Locked Encryption for Lock-Dependent Messages Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev
2015/439 (PDF ) On Concurrently Secure Computation in the Multiple Ideal Query Model Vipul Goyal, Abhishek Jain
2015/438 (PDF ) A Hybrid Approach for Proving Noninterference of Java Programs Ralf Kuesters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr
2015/437 (PDF ) A Note on the Unsoundness of vnTinyRAM's SNARK Bryan Parno
2015/436 (PDF ) On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
2015/435 (PDF ) On the (Fast) Algebraic Immunity of Boolean Power Functions Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
2015/434 (PDF ) Dickson Polynomials that are Involutions Pascale Charpin, Sihem Mesnager, Sumanta Sarkar
2015/433 (PDF ) A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu
2015/431 (PDF ) Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/430 (PDF ) Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov, Daniel Dinu, Dmitry Khovratovich
2015/429 (PDF ) Cryptanalysis of Round-Reduced LED Ivica Nikolić, Lei Wang, Shuang Wu
2015/428 (PDF ) Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic, Samuel Neves
2015/427 (PDF ) A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement Mudit Bhargava, Ken Mai
2015/426 (PDF ) Complementing Feistel Ciphers Alex Biryukov, Ivica Nikolic
2015/425 (PDF ) Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim Güneysu
2015/424 (PDF ) FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
2015/423 (PDF ) On the Implementation of Unified Arithmetic on Binary Huff Curves Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede
2015/422 (PDF ) Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation Marina Blanton, Fattaneh Bayatbabolghani
2015/421 (PDF ) VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede
2015/420 (PDF ) What Information is Leaked under Concurrent Composition? Vipul Goyal, Divya Gupta, Abhishek Jain
2015/419 (PDF ) Non-invasive Spoofing Attacks for Anti-lock Braking Systems Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani B. Srivastava
2015/418 (PDF ) Optimized Interpolation Attacks on LowMC Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
2015/417 (PDF ) Order-Revealing Encryption and the Hardness of Private Learning Mark Bun, Mark Zhandry
2015/416 (PDF ) HETest: A Homomorphic Encryption Testing Framework Mayank Varia, Sophia Yakoubov, Yang Yang
2015/415 (PDF ) STRIBOB / WHIRLBOB Security Analysis Addendum Markku-Juhani O. Saarinen
2015/414 (PDF ) On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes Mridul Nandi
2015/413 (PDF ) A Study of Pair Encodings: Predicate Encryption in Prime Order Groups Shashank Agrawal, Melissa Chase
2015/412 (PDF ) The Birth of Cryptographic Obfuscation -- A Survey Máté Horváth, Levente Buttyán
2015/411 (PDF ) Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser
2015/410 (PDF ) Efficient Ring-LWE Encryption on 8-bit AVR Processors Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
2015/409 (PDF ) Improved Dual System ABE in Prime-Order Groups via Predicate Encodings Jie Chen, Romain Gay, Hoeteck Wee
2015/408 (PDF ) Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves Franck Rondepierre
2015/407 (PDF ) Higher-Order Cryptanalysis of LowMC Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/406 (PDF ) Cryptography for Parallel RAM from Indistinguishability Obfuscation Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou
2015/405 (PDF ) Feasibility and Infeasibility of Secure Computation with Malicious PUFs Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder
2015/404 (PDF ) Zero-Knowledge Accumulators and Set Operations Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos
2015/403 (PDF ) Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian, Douglas R. Stinson
2015/402 (PDF ) Success through confidence: Evaluating the effectiveness of a side-channel attack Adrian Thillard, Emmanuel Prouff, Thomas Roche
2015/401 (PDF ) Simple Chosen-Ciphertext Security from Low-Noise LPN Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
2015/400 (PDF ) Expiration and Revocation of Keys for Attribute-based Signatures (Full Version) Stephen R. Tate, Roopa Vishwanathan
2015/399 (PDF ) New attacks on RSA with Moduli $N=p^rq$ Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/398 (PDF ) Factoring RSA moduli with weak prime factors Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/397 (PDF ) Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes Peter Gazi, Jooyoung Lee, Yannick Seurin, John Steinberger, Stefano Tessaro
2015/396 (PDF ) Generalizing Homomorphic MACs for Arithmetic Circuits Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo
2015/395 (PDF ) Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin
2015/394 (PDF ) Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015/393 (PDF ) Biclique cryptanalysis of MIBS-80 and PRESENT-80 Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba
2015/392 (PDF ) Forgery Attacks on round-reduced ICEPOLE-128 Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/391 (PDF ) On the Communication Complexity of Secure Computation Deepesh Data, Manoj M. Prabhakaran, Vinod M. Prabhakaran
2015/390 (PDF ) Dual System Encryption Framework in Prime-Order Groups Nuttapong Attrapadung
2015/389 (PDF ) Keccak Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2015/388 (PDF ) Succinct Garbled RAM Ran Canetti, Justin Holmgren
2015/387 (PDF ) Method to Protect Passwords in Databases for Web Applications Scott Contini
2015/386 (PDF ) Privately Evaluating Decision Trees and Random Forests David J. Wu, Tony Feng, Michael Naehrig, Kristin Lauter
2015/385 (PDF ) Feasibility and Completeness of Cryptographic Tasks in the Quantum World Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas
2015/384 (PDF ) Condensed Unpredictability Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak
2015/383 (PDF ) Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings Rafael Pass, abhi shelat
2015/382 (PDF ) High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers Thomas Pöppelmann, Tobias Oder, Tim Güneysu
2015/381 (PDF ) Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game Sumit Chakraborty
2015/380 (PDF ) Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation Céline Blondeau, Aslí Bay, Serge Vaudenay
2015/379 (PDF ) MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
2015/378 (PDF ) PAC Learning of Arbiter PUFs Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
2015/377 (PDF ) Cluster Computing in Zero Knowledge Alessandro Chiesa, Eran Tromer, Madars Virza
2015/376 (PDF ) Cryptography from Post-Quantum Assumptions Raza Ali Kazmi
2015/375 (PDF ) Bounds on surmising remixed keys Daniel R. L. Brown
2015/374 (PDF ) On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
2015/373 (PDF ) Publicly Verifiable Software Watermarking Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan
2015/372 (PDF ) Security Analysis of PRINCE Jeremy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu
2015/371 (PDF ) Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon, Feng-Hao Liu, Elaine Shi
2015/370 (PDF ) Financial Cryptography: Discriminatory Pricing Mechanism Sumit Chakraborty
2015/369 (PDF ) On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation Nir Bitansky, Omer Paneth
2015/368 (PDF ) Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov
2015/367 (PDF ) Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar-On
2015/366 (PDF ) A random zoo: sloth, unicorn, and trx Arjen K. Lenstra, Benjamin Wesolowski
2015/365 (PDF ) On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
2015/364 (PDF ) Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions Qiang Tang, Jun Wang
2015/363 (PDF ) Optimally Secure Tweakable Blockciphers Bart Mennink
2015/362 (PDF ) Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Crepeau, Raza Ali Kazmi
2015/361 (PDF ) Computationally binding quantum commitments Dominique Unruh
2015/360 (PDF ) Achieving Differential Privacy with Bias-Control Limited Source Yanqing Yao, Zhoujun Li
2015/359 (PDF ) Higher-Order Side Channel Security and Mask Refreshing Jean-Sebastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2015/358 (PDF ) On Generalized First Fall Degree Assumptions Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi
2015/357 (PDF ) A Group-theory Method to The Cycle Structures of Feedback Shift Registers Ming Li, Yupeng Jiang, Dongdai Lin
2015/356 (PDF ) Succinct Randomized Encodings and their Applications Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang
2015/355 (PDF ) Semantic Security and Indistinguishability in the Quantum World Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
2015/354 (PDF ) SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann
2015/353 (PDF ) Matrix Computational Assumptions in Multilinear Groups Paz Morillo, Carla Ràfols, Jorge L. Villar
2015/352 (PDF ) Broadcast from Minicast Secure Against General Adversaries Pavel Raykov
2015/351 (PDF ) Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad, Alptekin Küpçü
2015/350 (PDF ) Improving Local Collisions: New Attacks on Reduced SHA-256 Florian Mendel, Tomislav Nad, Martin Schläffer
2015/349 (PDF ) Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud Chang Liu, Liehuang Zhu, Jinjun Chen
2015/348 (PDF ) A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar
2015/347 (PDF ) Fault Analysis of Kuznyechik Riham AlTawy, Onur Duman, Amr M. Youssef
2015/346 (PDF ) End-to-End Verifiable Elections in the Standard Model∗ Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/345 (PDF ) Two Round Multiparty Computation via Multi-Key FHE Pratyay Mukherjee, Daniel Wichs
2015/344 (PDF ) Watermarking Cryptographic Programs Against Arbitrary Removal Strategies Ryo Nishimaki, Daniel Wichs
2015/343 (PDF ) High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe
2015/342 (PDF ) Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
2015/341 (PDF ) Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov, Gil Segev
2015/340 (PDF ) A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar
2015/339 (PDF ) Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen
2015/338 (PDF ) Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane
2015/337 (PDF ) Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede
2015/336 (PDF ) Arithmetic Cryptography Benny Applebaum, Jonathan Avron, Chris Brzuska
2015/335 (PDF ) Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2015/334 (PDF ) On the Correlation Intractability of Obfuscated Pseudorandom Functions Ran Canetti, Yilei Chen, Leonid Reyzin
2015/333 (PDF ) Nearly Optimal Verifiable Data Streaming (Full Version) Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nuernberger
2015/332 (PDF ) Security Intelligence for Broadcast : Threat Analytics Sumit Chakraborty
2015/331 (PDF ) A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, Somitra Sanadhya
2015/330 (PDF ) Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
2015/329 (PDF ) PAGES - A Family of Block Ciiphers Dieter Schmidt
2015/328 (PDF ) Strongly Secure Authenticated Key Exchange from Ideal Lattices Xiaopeng Yang, Wenping Ma
2015/327 (PDF ) Some results on Sprout Subhadeep Banik
2015/326 (PDF ) Cryptanalysis of an Authenticated Image Encryption Scheme Based on Chaotic Maps and Memory Cellular Automata Saeideh Kabirirad, Hamideh Hajiabadi
2015/325 (PDF ) Secure Multi-Party Computation with Identifiable Abort Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
2015/324 (PDF ) A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys Divesh Aggarwal, Alexander Golovnev
2015/322 (PDF ) Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers Peeter Laud, Alisa Pankova
2015/320 (PDF ) Hybrid Publicly Verifiable Computation James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2015/319 (PDF ) Point Decomposition Problem in Binary Elliptic Curves Koray Karabina
2015/318 (PDF ) Practical Divisible E-Cash Patrick Märtens
2015/317 (PDF ) Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
2015/316 (PDF ) Non-malleability under Selective Opening Attacks: Implication and Separation Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
2015/315 (PDF ) Query-Complexity Amplification for Random Oracles Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2015/314 (PDF ) Certificate-Based Encryption Resilient to Key Leakage Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang
2015/313 (PDF ) Recovering Short Generators of Principal Ideals in Cyclotomic Rings Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev
2015/312 (PDF ) Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks Pierre-Alain Fouque, Thomas Vannet
2015/311 (PDF ) Tagged One-Time Signatures: Tight Security and Optimal Tag Size Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2015/310 (PDF ) New algorithm for the discrete logarithm problem on elliptic curves Igor Semaev
2015/309 (PDF ) TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
2015/308 (PDF ) Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao
2015/307 (PDF ) Black-Box Garbled RAM Sanjam Garg, Steve Lu, Rafail Ostrovsky
2015/306 (PDF ) Analysis of VAES3 (FF2) Morris Dworkin, Ray Perlner
2015/305 (PDF ) Foundations of Reconfigurable PUFs (Full Version) Jonas Schneider, Dominique Schröder
2015/304 (PDF ) Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
2015/303 (PDF ) The Design Space of Lightweight Cryptography Nicky Mouha
2015/302 (PDF ) Boosting OMD for Almost Free Authentication of Associated Data Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2015/301 (PDF ) Cryptanalysis of GGH Map Yupu Hu, Huiwen Jia
2015/300 (PDF ) Scalable Divisible E-cash Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
2015/299 (PDF ) A Note on the Lindell-Waisbard Private Web Search Scheme Zhengjun Cao, Lihua Liu
2015/298 (PDF ) Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang
2015/297 (PDF ) Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
2015/296 (PDF ) The Uniform Distribution of Sequences Generated by Iteration of Polynomials Emil Lerner
2015/295 (PDF ) Security Analysis of Re-Encryption RPC Mix Nets Ralf Kuesters, Tomasz Truderung
2015/294 (PDF ) Accelerating Somewhat Homomorphic Evaluation using FPGAs Erdi̇̀nç Öztürk, Yarkın Doröz, Berk Sunar, Erkay Savaş
2015/293 (PDF ) Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/292 (PDF ) Secret Shared Random Access Machine Shlomi Dolev, Yin Li
2015/291 (PDF ) Two Operands of Multipliers in Side-Channel Attack Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki
2015/290 (PDF ) Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes Joseph A. Akinyele, Christina Garman, Susan Hohenberger
2015/289 (PDF ) Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin, Orhun Kara
2015/288 (PDF ) Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms Aydin Aysu, Patrick Schaumont
2015/287 (PDF ) Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world John M. Schanck, William Whyte, Zhenfei Zhang
2015/286 (PDF ) Impossible Differential Cryptanalysis of Reduced Round SIMON Zhan Chen, Ning Wang, Xiaoyun Wang
2015/285 (PDF ) Improved Linear Trails for the Block Cipher Simon Tomer Ashur
2015/284 (PDF ) A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu, Chang-An Zhao
2015/283 (PDF ) Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
2015/282 (PDF ) Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva
2015/281 (PDF ) Secret Sharing and Statistical Zero Knowledge Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2015/280 (PDF ) Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou
2015/279 (PDF ) Improved Cryptanalysis of AES-like Permutations Jérémy Jean, Maria Naya-Plasencia, Thomas Peyrin
2015/278 (PDF ) Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting Sébastien Canard, David Pointcheval, Olivier Sanders
2015/277 (PDF ) One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games Marco Tomamichel, Serge Fehr, Jędrzej Kaniewski, Stephanie Wehner
2015/276 (PDF ) An Improvment of the Elliptic Net Algorithm Binglong Chen, Chang-An Zhao
2015/275 (PDF ) MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai
2015/274 (PDF ) Low Depth Circuits for Efficient Homomorphic Sorting Gizem S. Çetin, Yarkın Doröz, Berk Sunar, Erkay Savaş
2015/273 (PDF ) Dual System Encryption via Predicate Encodings Hoeteck Wee
2015/272 (PDF ) Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing Baodong Qin, Shengli Liu
2015/271 (PDF ) Toward Secure Implementation of McEliece Decryption Mariya Georgieva, Frédéric de Portzamparc
2015/270 (PDF ) Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk Markus Dichtl
2015/269 (PDF ) Ideal Multilinear Maps Based on Ideal Lattices Gu Chunsheng
2015/268 (PDF ) Improved Top-Down Techniques in Differential Cryptanalysis Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir
2015/267 (PDF ) The Simplest Protocol for Oblivious Transfer Tung Chou, Claudio Orlandi
2015/266 (PDF ) GRECS: Graph Encryption for Approximate Shortest Distance Queries Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
2015/265 (PDF ) Password Hashing Competition - Survey and Benchmark George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas
2015/264 (PDF ) BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy
2015/263 (PDF ) Eclipse Attacks on Bitcoin’s Peer-to-Peer Network Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg
2015/262 (PDF ) A look at the PGP ecosystem through the key server data Hanno Böck
2015/261 (PDF ) Research Perspectives and Challenges for Bitcoin and Cryptocurrencies Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
2015/260 (PDF ) Computational Aspects of Correlation Power Analysis Paul Bottinelli, Joppe W. Bos
2015/259 (PDF ) Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES Patrick Derbez, Pierre-Alain Fouque
2015/258 (PDF ) Lightweight MDS Involution Matrices Siang Meng Sim, Khoongming Khoo, Frédérique Oggier, Thomas Peyrin
2015/257 (PDF ) Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices Vadim Lyubashevsky, Thomas Prest
2015/256 (PDF ) Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction Yang Lu, Quanling Zhang, Jiguo Li
2015/255 (PDF ) A comprehensive analysis of game-based ballot privacy definitions David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi
2015/254 (PDF ) Tornado Attack on RC4 with Applications to WEP and WPA Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux
2015/253 (PDF ) Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers Haiyan Wang, Dongdai Lin
2015/252 (PDF ) Linearization of Multi-valued Nonlinear Feedback Shift Registers Haiyan Wang, Jianghua Zhong, Dongdai Lin
2015/251 (PDF ) How to Construct UC-Secure Searchable Symmetric Encryption Scheme Kaoru Kurosawa, Yasuhiro Ohtaki
2015/250 (PDF ) Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys Junji Shikata
2015/249 (PDF ) Improved (Hierarchical) Inner-Product Encryption from Lattices Keita Xagawa
2015/248 (PDF ) Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES Ryo Nishimaki, Keita Xagawa
2015/247 (PDF ) Subgroup security in pairing-based cryptography Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, Geovandro C. C. F. Pereira, Gustavo Zanon
2015/246 (PDF ) Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee
2015/245 (PDF ) Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki
2015/244 (PDF ) Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation Jeremy Jean, Ivica Nikolic
2015/243 (PDF ) Reliable communication via semilattice properties of partial knowledge Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2015/242 (PDF ) Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2015/241 (PDF ) Espresso: A Stream Cipher for 5G Wireless Communication Systems Elena Dubrova, Martin Hell
2015/240 (PDF ) Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE Alex Biryukov, Patrick Derbez, Léo Perrin
2015/239 (PDF ) Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Patrick Derbez, Léo Perrin
2015/238 (PDF ) One Time Programs with Limited Memory Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michał Zając
2015/237 (PDF ) Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers
2015/236 (PDF ) Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey
2015/235 (PDF ) Performance and Security Improvements for Tor: A Survey Mashael AlSabah, Ian Goldberg
2015/234 (PDF ) Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
2015/233 (PDF ) Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ Ben Smyth, Steven Frink, Michael R. Clarkson
2015/232 (PDF ) Cryptanalysis of Full Sprout Virginie Lallemand, María Naya-Plasencia
2015/231 (PDF ) A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher Yonglin Hao
2015/230 (PDF ) W-SPS: Designing a Wide-Area Secure Positioning System Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
2015/229 (PDF ) Improving GGH Public Key Scheme Using Low Density Lattice Codes Reza Hooshmand
2015/228 (PDF ) Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga, Tomasz Kazana, Michał Zając, Maciej Zdanowicz
2015/227 (PDF ) Tradeoff Cryptanalysis of Memory-Hard Functions Alex Biryukov, Dmitry Khovratovich
2015/226 (PDF ) Secure Physical Computation using Disposable Circuits Ben Fisch, Daniel Freund, Moni Naor
2015/225 (PDF ) Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/224 (PDF ) GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2015/223 (PDF ) New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar
2015/222 (PDF ) Towards Understanding the Known-Key Security of Block Ciphers Elena Andreeva, Andrey Bogdanov, Bart Mennink
2015/221 (PDF ) Tighter, faster, simpler side-channel security evaluations beyond computing power Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal
2015/220 (PDF ) Key Homomorphic PRFs and Their Applications Dan Boneh, Kevin Lewi, Hart Montgomery, Ananth Raghunathan
2015/219 (PDF ) Efficient Format Preserving Encrypted Databases Prakruti C, Sashank Dara, V. N. Muralidhara
2015/218 (PDF ) Efficient k-out-of-n oblivious transfer protocol wang qinglong
2015/217 (PDF ) Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles Subhamoy Maitra, Goutam Paul, Willi Meier
2015/216 (PDF ) Quasi-Adaptive NIZK for Linear Subspaces Revisited Eike Kiltz, Hoeteck Wee
2015/215 (PDF ) A revocable anonymity in Tor Amadou Moctar Kane
2015/214 (PDF ) GCM Security Bounds Reconsidered Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata
2015/213 (PDF ) Attribute-Based Versions of Schnorr and ElGamal Javier Herranz
2015/212 (PDF ) Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
2015/211 (PDF ) Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing Thijs Laarhoven, Benne de Weger
2015/210 (PDF ) Secure and Efficient Initialization and Authentication Protocols for SHIELD Chenglu Jin, Marten van Dijk
2015/209 (PDF ) Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov
2015/208 (PDF ) Towards Secure Distance Bounding Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2015/207 (PDF ) Leakage Assessment Methodology - a clear roadmap for side-channel evaluations Tobias Schneider, Amir Moradi
2015/206 (PDF ) Efficient and Secure Delegation of Group Exponentiation to a Single Server Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain
2015/205 (PDF ) Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption Jooyoung Lee
2015/204 (PDF ) Leakage-Resilient Symmetric Encryption via Re-keying Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque
2015/203 (PDF ) Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu
2015/202 (PDF ) Adaptively Secure Coin-Flipping, Revisited Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park
2015/201 (PDF ) Statistical Properties of Multiplication mod $2^n$ A. Mahmoodi Rishakani, S. M. Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2015/200 (PDF ) Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs Alexander Wild, Amir Moradi, Tim Güneysu
2015/199 (PDF ) Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs Amir Moradi, Gesine Hinterwälder
2015/198 (PDF ) Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu
2015/197 (PDF ) SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON N. Nalla Anandakumar
2015/196 (PDF ) Tighter Reductions for Forward-Secure Signature Schemes Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2015/195 (PDF ) Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists Stephanie Bayer, Jens Groth
2015/194 (PDF ) Practical Homomorphic MACs for Arithmetic Circuits Dario Catalano, Dario Fiore
2015/193 (PDF ) Improving Modular Inversion in RNS using the Plus-Minus Method Karim Bigou, Arnaud Tisserand
2015/192 (PDF ) Memory-saving computation of the pairing final exponentiation on BN curves Sylvain DUQUESNE, Loubna GHAMMAM
2015/191 (PDF ) iDASH Secure Genome Analysis Competition Using ObliVM Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi
2015/190 (PDF ) Multi-Client Non-Interactive Verifiable Computation Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid
2015/189 (PDF ) Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár
2015/188 (PDF ) New Techniques for SPHFs and Efficient One-Round PAKE Protocols Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2015/187 (PDF ) How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality Juan Garay, Jonathan Katz, Bjoern Tackmann, Vassilis Zikas
2015/186 (PDF ) Higher Order Differential Analysis of NORX Sourav Das, Subhamoy Maitra, Willi Meier
2015/185 (PDF ) Remotely Managed Logic Built-In Self-Test for Secure M2M Communications Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben Smeets
2015/184 (PDF ) Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities Céline Blondeau, Kaisa Nyberg
2015/183 (PDF ) New Links Between Differential and Linear Cryptanalysis Céline Blondeau, Kaisa Nyberg
2015/182 (PDF ) Tweakable Blockciphers with Asymptotically Optimal Security Rodolphe Lampe, Yannick Seurin
2015/181 (PDF ) Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li
2015/180 (PDF ) Key-Homomorphic Constrained Pseudorandom Functions Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens
2015/179 (PDF ) A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves Palash Sarkar, Shashank Singh
2015/178 (PDF ) How to Incentivize Data-Driven Collaboration Among Competing Parties Pablo Daniel Azar, Shafi Goldwasser, Sunoo Park
2015/177 (PDF ) On the Security of an Efficient Group Key Agreement Scheme for MANETs Purushothama B R, Nishat Koti
2015/176 (PDF ) Key Recovery for LWE in Polynomial Time Kim Laine, Kristin Lauter
2015/175 (PDF ) Trivial Nonce-Misusing Attack on Pure OMD Tomer Ashur, Bart Mennink
2015/174 (PDF ) A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
2015/173 (PDF ) Indistinguishability Obfuscation from Compact Functional Encryption Prabhanjan Ananth, Abhishek Jain
2015/172 (PDF ) Silent Simon: A Threshold Implementation under 100 Slices Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth
2015/171 (PDF ) Authenticated Network Time Synchronization Benjamin Dowling, Douglas Stebila, Greg Zaverucha
2015/170 (PDF ) Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
2015/169 (PDF ) Short Schnorr signatures require a hash function with more than just random-prefix resistance Daniel R. L. Brown
2015/168 (PDF ) More PS and H-like bent functions C. Carlet
2015/167 (PDF ) Post-Zeroizing Obfuscation: The case of Evasive Circuits Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry
2015/166 (PDF ) Naturally Rehearsing Passwords Jeremiah Blocki, Manuel Blum, Anupam Datta
2015/165 (PDF ) The Cryptographic Hardness of Random Local Functions -- Survey Benny Applebaum
2015/164 (PDF ) Constant Size Ring Signature Without Random Oracle Priyanka Bose, Dipanjan Das, C. Pandu Rangan
2015/163 (PDF ) Indistinguishability Obfuscation from Functional Encryption Nir Bitansky, Vinod Vaikuntanathan
2015/162 (PDF ) New Multilinear Maps over the Integers Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2015/161 (PDF ) Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
2015/160 (PDF ) Differential-Linear Cryptanalysis of ICEPOLE Tao Huang, Ivan Tjuawinata, Hongjun Wu
2015/159 (PDF ) Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu
2015/158 (PDF ) Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions Zvika Brakerski, Ilan Komargodski, Gil Segev
2015/157 (PDF ) Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings Nuttapong Attrapadung, Shota Yamada
2015/156 (PDF ) Building Lossy Trapdoor Functions from Lossy Encryption Brett Hemenway, Rafail Ostrovsky
2015/155 (PDF ) On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor
2015/154 (PDF ) Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin, Yuval Ishai, Manoj M. Prabhakaran, Amit Sahai, Eran Tromer
2015/153 (PDF ) Functional Encryption from (Small) Hardware Tokens Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou
2015/152 (PDF ) Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults Ronan Lashermes, Jacques Fournier, Louis Goubin
2015/151 (PDF ) Bad directions in cryptographic hash functions Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen
2015/150 (PDF ) Insynd: Improved Privacy-Preserving Transparency Logging Roel Peeters, Tobias Pulls
2015/149 (PDF ) Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu
2015/148 (PDF ) On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
2015/147 (PDF ) High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage
2015/146 (PDF ) New Attacks on Feistel Structures with Improved Memory Complexities Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2015/145 (PDF ) Observations on the SIMON block cipher family Stefan Kölbl, Gregor Leander, Tyge Tiessen
2015/144 (PDF ) Security of the AES with a Secret S-box Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen
2015/143 (PDF ) Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs Erich Wenger, Paul Wolfger
2015/142 (PDF ) Multi-Client Verifiable Computation with Stronger Security Guarantees S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2015/141 (PDF ) Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method Céline Blondeau, Marine Minier
2015/140 (PDF ) The Random Oracle Model: A Twenty-Year Retrospective Neal Koblitz, Alfred Menezes
2015/139 (PDF ) Performance Analysis of Some Password Hashing Schemes Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2015/138 (PDF ) A Practical Key Exchange for the Internet using Lattice Cryptography Vikram Singh
2015/137 (PDF ) Multi-keyword Similarity Search Over Encrypted Cloud Data Mikhail Strizhov, Indrajit Ray
2015/136 (PDF ) Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto
2015/135 (PDF ) Generalizing Efficient Multiparty Computation Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp
2015/134 (PDF ) From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions Pierre Karpman
2015/133 (PDF ) Private Computation on Encrypted Genomic Data Kristin Lauter, Adriana Lopez-Alt, Michael Naehrig
2015/132 (PDF ) Homomorphic Computation of Edit Distance Jung Hee Cheon, Miran Kim, Kristin Lauter
2015/131 (PDF ) On Lightweight Stream Ciphers with Shorter Internal States Frederik Armknecht, Vasily Mikhalev
2015/130 (PDF ) How to Bootstrap Anonymous Communication Sune K. Jakobsen, Claudio Orlandi
2015/129 (PDF ) Block-wise Non-Malleable Codes Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay
2015/128 (PDF ) Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2015/127 (PDF ) Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes Ricardo Dahab, Steven Galbraith, Eduardo Morais
2015/126 (PDF ) Perfect Structure on the Edge of Chaos Nir Bitansky, Omer Paneth, Daniel Wichs
2015/125 (PDF ) Multilinear Pseudorandom Functions Aloni Cohen, Justin Holmgren
2015/124 (PDF ) GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs Alexander Wild, Amir Moradi, Tim Güneysu
2015/123 (PDF ) Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting Dennis Hofheinz, Jessica Koch, Christoph Striecks
2015/122 (PDF ) Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2015/121 (PDF ) Multi-Client Oblivious RAM secure against Malicious Servers Travis Mayberry, Erik-Oliver Blass, Guevara Noubir
2015/120 (PDF ) Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm
2015/119 (PDF ) Making Masking Security Proofs Concrete or How to Evaluate the Security of any Leaking Device (Extended Version) Alexandre Duc, Sebastian Faust, François-Xavier Standaert
2015/118 (PDF ) Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms Takahiro Matsuda, Goichiro Hanaoka
2015/117 (PDF ) Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy Maciej Skorski
2015/116 (PDF ) Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabâa, Ammar Bouallègue
2015/115 (PDF ) Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors Muhammad Yasir Malik
2015/114 (PDF ) Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
2015/113 (PDF ) Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
2015/112 (PDF ) Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
2015/111 (PDF ) The Multivariate Hidden Number Problem Steven D. Galbraith, Barak Shani
2015/110 (PDF ) sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices Shijun Zhao, Qianying Zhang
2015/108 (PDF ) TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski
2015/107 (PDF ) Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware Attila A. Yavuz, Jorge Guajardo
2015/106 (PDF ) Provably weak instances of Ring-LWE Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
2015/105 (PDF ) Inner Product Masking Revisited Josep Balasch, Sebastian Faust, Benedikt Gierlichs
2015/104 (PDF ) Weakening the Isolation Assumption of Tamper-proof Hardware Tokens Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges
2015/103 (PDF ) Mergeable Functional Encryption Vincenzo Iovino, Karol Zebrowski
2015/102 (PDF ) GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron, Yehuda Lindell
2015/101 (PDF ) Multi-Key Security: The Even-Mansour Construction Revisited Nicky Mouha, Atul Luykx
2015/100 (PDF ) Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA Christian Wittke, Zoya Dyka, Peter Langendoerfer
2015/099 (PDF ) Universally Composable Firewall Architectures using Trusted Hardware Dirk Achenbach, Jörn Müller-Quade, Jochen Rill
2015/098 (PDF ) Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method Shantian Cheng, Juanyang Zhang
2015/097 (PDF ) Surreptitiously Weakening Cryptographic Systems Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart
2015/096 (PDF ) A Meet in the Middle Attack on Reduced Round Kuznyechik Riham AlTawy, Amr M. Youssef
2015/095 (PDF ) Rotational Cryptanalysis of ARX Revisited Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld
2015/094 (PDF ) Some New Results on Binary Polynomial Multiplication Murat Cenk, M. Anwar Hasan
2015/093 (PDF ) Generalization of Statistical Criteria for Sboxes S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
2015/092 (PDF ) TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY Grasha Jacob, Dr. A. Murugan, Irine Viola
2015/091 (PDF ) Related-Key Forgeries for Prøst-OTR Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/090 (PDF ) Structural Evaluation by Generalized Integral Property Yosuke Todo
2015/089 (PDF ) On the security margin of MAC striping Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt
2015/088 (PDF ) Structural Weaknesses in the Open Smart Grid Protocol Klaus Kursawe, Christiane Peters
2015/087 (PDF ) Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives David Derler, Christian Hanser, Daniel Slamanig
2015/086 (PDF ) Practical Compact E-Cash with Arbitrary Wallet Size Patrick Märtens
2015/085 (PDF ) On the behaviors of affine equivalent Sboxes regarding differential and linear attacks Anne Canteaut, Joëlle Roué
2015/084 (PDF ) On the Disadvantages of Pairing-based Cryptography Zhengjun Cao, Lihua Liu
2015/083 (PDF ) Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal, Qiang Tang
2015/082 (PDF ) On the Difficulty of Securing Web Applications using CryptDB İhsan Haluk AKIN, Berk Sunar
2015/081 (PDF ) Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff
2015/080 (PDF ) The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group Feng Hao, Xun Yi, Liqun Chen, Siamak F. Shahandashti
2015/079 (PDF ) On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack Jiqiang Lu
2015/078 (PDF ) Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters GU Chun-xiang, Xin Dan, ZHENG Yong-hui, KANG Yuan-ji
2015/077 (PDF ) On the Primary Constructions of Vectorial Boolean Bent Functions Yuwei Xu, Chuankun Wu
2015/076 (PDF ) Fully Structure-Preserving Signatures and Shrinking Commitments Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi
2015/075 (PDF ) Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen
2015/074 (PDF ) Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt
2015/073 (PDF ) Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin
2015/072 (PDF ) Non-Interactive Zero-Knowledge Proofs of Non-Membership Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015/071 (PDF ) Factoring N=p^r q^s for Large r and s Jean-Sebastien Coron, Jean-Charles Faugere, Guenael Renault, Rina Zeitoun
2015/070 (PDF ) The Sum Can Be Weaker Than Each Part Gaëtan Leurent, Lei Wang
2015/069 (PDF ) On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks Benoît Cogliati, Yannick Seurin
2015/068 (PDF ) A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro Gregor Leander, Brice Minaud, Sondre Rønjom
2015/067 (PDF ) Non-black-box Simulation in the Fully Concurrent Setting, Revisited Susumu Kiyoshima
2015/066 (PDF ) Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware Tobias Schneider, Amir Moradi, Tim Güneysu
2015/065 (PDF ) A lightweight-friendly modifcation of GOST block cipher Andrey Dmukh, Denis Dygin, Grigory Marshalko
2015/064 (PDF ) Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation Handan Kılınç, Alptekin Küpçü
2015/063 (PDF ) CamlCrush: A PKCS\#11 Filtering Proxy R. Benadjila, T. Calderon, M. Daubignard
2015/062 (PDF ) Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher Yuval Yarom, Gefei Li, Damith C. Ranasinghe
2015/061 (PDF ) More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2015/060 (PDF ) Verified Proofs of Higher-Order Masking Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub
2015/059 (PDF ) Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2015/058 (PDF ) Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems Berry Schoenmakers, Meilof Veeningen
2015/057 (PDF ) Cold Boot Attacks in the Discrete Logarithm Setting Bertram Poettering, Dale L. Sibborn
2015/056 (PDF ) Better Algorithms for LWE and LWR Alexandre Duc, Florian Tramèr, Serge Vaudenay
2015/055 (PDF ) Richer Efficiency/Security Trade-offs in 2PC Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
2015/054 (PDF ) Non-committing encryption from $\Phi$-hiding Brett Hemenway, Rafail Ostrovsky, Alon Rosen
2015/053 (PDF ) Tight Bounds for Keyed Sponges and Truncated CBC Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
2015/052 (PDF ) Interactive Message-Locked Encryption and Secure Deduplication Mihir Bellare, Sriram Keelveedhi
2015/051 (PDF ) Improved Meet-in-the-Middle Distinguisher on Feistel Schemes Li Lin, Wenling Wu
2015/050 (PDF ) Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability Carla Ràfols
2015/049 (PDF ) On Solving Lpn using BKW and Variants Sonia Bogos, Florian Tramer, Serge Vaudenay
2015/048 (PDF ) On Obfuscation with Random Oracles Ran Canetti, Yael Tauman Kalai, Omer Paneth
2015/047 (PDF ) Linearly Homomorphic Encryption from DDH Guilhem Castagnos, Fabien Laguillaumie
2015/046 (PDF ) On the concrete hardness of Learning with Errors Martin R. Albrecht, Rachel Player, Sam Scott
2015/045 (PDF ) Reliable Information Extraction for Single Trace Attacks Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
2015/044 (PDF ) Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms Binanda Sengupta, Abhijit Das
2015/043 (PDF ) Group Signature with Deniability: How to Disavow a Signature Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
2015/042 (PDF ) High Performance Lattice-based CCA-secure Encryption Rachid El Bansarkhani, Johannes Buchmann
2015/041 (PDF ) Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP Artur Mariano, Thijs Laarhoven, Christian Bischof
2015/040 (PDF ) Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/039 (PDF ) Type-Based Verification of Electronic Voting Protocols Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling
2015/038 (PDF ) Aggregate Pseudorandom Functions and Connections to Learning Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan
2015/037 (PDF ) Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/036 (PDF ) Faster software for fast endomorphisms Billy Bob Brumley
2015/035 (PDF ) Cryptographically Secure CRC for Lightweight Message Authentication Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
2015/034 (PDF ) Suit up! Made-to-Measure Hardware Implementations of Ascon Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer
2015/033 (PDF ) On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel
2015/032 (PDF ) Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF Zvika Brakerski, Vinod Vaikuntanathan
2015/031 (PDF ) Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence Kai-Min Chung, Rafael Pass
2015/030 (PDF ) Cryptanalysis of Ascon Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2015/029 (PDF ) Predicate Encryption for Circuits from LWE Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2015/028 (PDF ) Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$) Jeremy Maitin-Shepard
2015/027 (PDF ) On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption Adam Smith, Ye Zhang
2015/026 (PDF ) A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/025 (PDF ) Obfuscating Circuits via Composite-Order Graded Encoding Benny Applebaum, Zvika Brakerski
2015/024 (PDF ) Non-Abelian Analogs of Lattice Rounding Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan
2015/023 (PDF ) Multilinear Maps Using Ideal Lattices without Encodings of Zero Gu Chunsheng
2015/022 (PDF ) TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang
2015/021 (PDF ) Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification Xin Li
2015/020 (PDF ) Simpler Efficient Group Signatures from Lattices Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
2015/019 (PDF ) Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi
2015/018 (PDF ) A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS JINTAI DING, ALEXEI MIASNIKOV, ALEXANDER USHAKOV
2015/017 (PDF ) Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
2015/016 (PDF ) Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption Yannis Rouselakis, Brent Waters
2015/015 (PDF ) One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model Florian Bergsma, Tibor Jager, Jörg Schwenk
2015/014 (PDF ) Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang
2015/013 (PDF ) Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification Nico Döttling
2015/012 (PDF ) Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint, Mehdi Tibouchi
2015/011 (PDF ) Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications Benjamin Buhrow, Paul Riemer, Mike Shea, Barry Gilbert, Erik Daniel
2015/010 (PDF ) Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms Shengli Liu, Kenneth G. Paterson
2015/009 (PDF ) Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2015/008 (PDF ) Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh, Aniket Kate
2015/007 (PDF ) Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure Tobias Pulls, Roel Peeters
2015/006 (PDF ) Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven
2015/005 (PDF ) Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs
2015/004 (PDF ) Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs Carmit Hazay
2015/003 (PDF ) Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen
2015/002 (PDF ) Characterization of MDS mappings S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/001 (PDF ) A note on the security of Higher-Order Threshold Implementations Oscar Reparaz
2014/1029 (PDF ) On the Cryptographic Hardness of Finding a Nash Equilibrium Nir Bitansky, Omer Paneth, Alon Rosen
2014/1028 (PDF ) Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13 Payal Chaudhari, Manik Lal Das, Anish Mathuria
2014/1027 (PDF ) Simple Lattice Trapdoor Sampling from a Broad Class of Distributions Vadim Lyubashevsky, Daniel Wichs
2014/1026 (PDF ) Lattices with Symmetry H. W. Lenstra Jr., A. Silverberg
2014/1025 (PDF ) XPIR: Private Information Retrieval for Everyone Carlos Aguilar-Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian
2014/1024 (PDF ) Cryptanalysis of the Co-ACD Assumption Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
2014/1023 (PDF ) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search Nathan E. Price, Alan T. Sherman
2014/1022 (PDF ) Topology-Hiding Computation Tal Moran, Ilan Orlov, Silas Richelson
2014/1021 (PDF ) Tightly-Secure Signatures from Chameleon Hash Functions Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan
2014/1020 (PDF ) Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
2014/1018 (PDF ) Algebraic Algorithms for LWE Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
2014/1017 (PDF ) Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data Foteini Baldimtsi, Olga Ohrimenko
2014/1015 (PDF ) Compact Accumulator using Lattices Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini
2014/1014 (PDF ) Double-and-Add with Relative Jacobian Coordinates Björn Fay
2014/1013 (PDF ) Computational Independence Björn Fay
2014/1012 (PDF ) The Boomerang Attacks on BLAKE and BLAKE2 Yonglin Hao
2014/1011 (PDF ) Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay Alex Biryukov, Ivan Pustogarov
2014/1010 (PDF ) On Continuous After-the-Fact Leakage-Resilient Key Exchange Mohsen Toorani
2014/1009 (PDF ) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System Christopher D. Nguyen, Dhananjay S. Phatak, Steven D. Houston, Alan T. Sherman
2014/1008 (PDF ) DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
2014/1007 (PDF ) Fair Multiple-bank E-cash in the Standard Model Jiangxiao Zhang, Yanwu Gao, Chunhui Feng, Hua Guo, Zhoujun Li
2014/1006 (PDF ) Simple composition theorems of one-way functions -- proofs and presentations Jaime Gaspar, Eerke Boiten
2014/1005 (PDF ) A pure block chain based decentralized exchange. Harsh Patel
2014/1004 (PDF ) CONIKS: Bringing Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman
2014/1003 (PDF ) COFFE: Ciphertext Output Feedback Faithful Encryption Christian Forler, David McGrew, Stefan Lucks, Jakob Wenzel
2014/1002 (PDF ) Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam, Sashank Dara, Nalini N
2014/1000 (PDF ) Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
2014/999 (PDF ) First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA Yongdae Kim, Hyunsoo Yoon
2014/998 (PDF ) Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gus Gutoski, Douglas Stebila
2014/997 (PDF ) Constants Count: Practical Improvements to Oblivious RAM Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas
2014/996 (PDF ) Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves Maike Massierer
2014/995 (PDF ) Partial Garbling Schemes and Their Applications Yuval Ishai, Hoeteck Wee
2014/994 (PDF ) Key-Policy Multi-authority Attribute-Based Encryption Riccardo Longo, Chiara Marcolla, Massimiliano Sala
2014/993 (PDF ) How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA Thomas Basmer, Christian Wittke, Zoya Dyka, Peter Langendoerfer
2014/992 (PDF ) Incentivized Outsourced Computation Resistant to Malicious Contractors Alptekin Kupcu
2014/991 (PDF ) Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation Kai-Min Chung, Huijia Lin, Rafael Pass
2014/990 (PDF ) Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen, Sander Siim
2014/989 (PDF ) Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti
2014/988 (PDF ) Armadillo: a compilation chain for privacy preserving applications Sergiu Carpov, Paul Dubrulle, Renaud Sirdey
2014/987 (PDF ) Cryptanalysis of Full PRIDE Block Cipher Yibin Dai, Shaozhen Chen
2014/986 (PDF ) Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma
2014/985 (PDF ) Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement Bartosz Zoltak
2014/984 (PDF ) Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel Michael Peter, Jan Nordholz, Matthias Petschick, Janis Danisevskis, Julian Vetter, Jean-Pierre Seifert
2014/983 (PDF ) Public Verification of Private Effort Giulia Alberini, Tal Moran, Alon Rosen
2014/982 (PDF ) Outlier Privacy Edward Lui, Rafael Pass
2014/981 (PDF ) Publicly Verifiable Non-Interactive Arguments for Delegating Computation Omer Paneth, Guy N. Rothblum
2014/980 (PDF ) A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
2014/979 (PDF ) The Chaining Lemma and its application Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
2014/978 (PDF ) Improved Differential Analysis of Block Cipher PRIDE Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma
2014/977 (PDF ) A Survey on Lightweight Entity Authentication with Strong PUFs Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede
2014/976 (PDF ) Geppetto: Versatile Verifiable Computation Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur
2014/975 (PDF ) Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2014/973 (PDF ) Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma
2014/972 (PDF ) A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials Haining Fan
2014/971 (PDF ) Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function Y. Wei, E. Pasalic, F. Zhang, W. Wu
2014/970 (PDF ) Jackpot Stealing Information From Large Caches via Huge Pages Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2014/969 (PDF ) Privacy-Preserving Face Recognition with Outsourced Computation Can Xiang, Chunming Tang
2014/968 (PDF ) Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments Jorge Munilla, Mike Burmester, Albert Peinado
2014/967 (PDF ) A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy Maciej Skorski
2014/966 (PDF ) Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms Kan Yang, Xiaohua Jia, Kuan Zhang, Xuemin (Sherman) Shen
2014/965 (PDF ) Predicate Encryption for Multi-Dimensional Range Queries from Lattices Romain Gay, Pierrick Méaux, Hoeteck Wee
2014/964 (PDF ) On two windows multivariate cryptosystem depending on random parameters Urszula Romańczuk-Polubiec, Vasyl Ustimenko
2014/963 (PDF ) Malicious-Client Security in Blind Seer: A Scalable Private DBMS Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
2014/962 (PDF ) Solving Polynomial Systems with Noise over F_2: Revisited Zhenyu Huang, Dongdai Lin
2014/961 (PDF ) When are Fuzzy Extractors Possible? Benjamin Fuller, Leonid Reyzin, Adam Smith
2014/960 (PDF ) Non-Interactive Secure Multiparty Computation Amos Beimel, Ariel Gabizon, Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Anat Paskin-Cherniavsky
2014/959 (PDF ) Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul
2014/958 (PDF ) Authenticated Encryption: How Reordering can Impact Performance Basel Alomair
2014/957 (PDF ) Black Box Separations for Differentially Private Protocols Dakshita Khurana, Hemanta K. Maji, Amit Sahai
2014/956 (PDF ) Tamper Detection and Continuous Non-Malleable Codes Zahra Jafargholi, Daniel Wichs
2014/955 (PDF ) On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
2014/954 (PDF ) Algebraic Fault Analysis of Katan Frank Quedenfeld
2014/953 (PDF ) The Related-Key Security of Iterated Even-Mansour Ciphers Pooya Farshim, Gordon Procter
2014/952 (PDF ) Balanced Encoding to Mitigate Power Analysis: A Case Study Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye
2014/951 (PDF ) Modified Alternating Step Generators with Non-Linear Scrambler Robert Wicik, Tomasz Rachwalik, Rafał Gliwa
2014/950 (PDF ) Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda
2014/949 (PDF ) Simplification/complication of the basis of prime Boolean ideal Alexander Rostovtsev, Anna Shustrova
2014/948 (PDF ) Lattice Point Enumeration on Block Reduced Bases Michael Walter
2014/947 (PDF ) The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2014/946 (PDF ) On a new fast public key cryptosystem Samir Bouftass, Abdelhak Azhari
2014/945 (PDF ) Boomerang Attack on Step-Reduced SHA-512 Hongbo Yu, Dongxia Bai
2014/944 (PDF ) Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2014/943 (PDF ) Advancing the State-of-the-Art in Hardware Trojans Detection Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk
2014/942 (PDF ) Public-Coin Differing-Inputs Obfuscation and Its Applications Yuval Ishai, Omkant Pandey, Amit Sahai
2014/941 (PDF ) Garbled RAM From One-Way Functions Sanjam Garg, Steve Lu, Rafail Ostrovsky, Alessandra Scafuro
2014/940 (PDF ) Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2014/938 (PDF ) Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
2014/937 (PDF ) Analysis of Lewko-Sahai-Waters Revocation System Zhengjun Cao, Lihua Liu
2014/936 (PDF ) Outsourcing Secure Two-Party Computation as a Black Box Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler
2014/935 (PDF ) Boosting Higher-Order Correlation Attacks by Dimensionality Reduction Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia
2014/934 (PDF ) Efficient Generic Zero-Knowledge Proofs from Commitments Samuel Ranellucci, Alain Tapp, Rasmus Winther Zakarias
2014/933 (PDF ) Certificateless Proxy Re-Encryption Without Pairing: Revisited Akshayaram Srinivasan, C. Pandu Rangan
2014/932 (PDF ) Bicliques with Minimal Data and Time Complexity for AES (Extended Version) Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
2014/931 (PDF ) Cryptanalysis of JAMBU Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang
2014/930 (PDF ) Immunizing Multilinear Maps Against Zeroizing Attacks Dan Boneh, David J. Wu, Joe Zimmerman
2014/929 (PDF ) Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero Craig Gentry, Shai Halevi, Hemanta K. Maji, Amit Sahai
2014/928 (PDF ) Implementing Candidate Graded Encoding Schemes from Ideal Lattices Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois
2014/927 (PDF ) Physical functions : the common factor of side-channel and fault attacks ? Bruno Robisson, Hélène Le Bouder
2014/926 (PDF ) Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results Keita Emura, Takuya Hayashi
2014/925 (PDF ) Indistinguishability Obfuscation for Turing Machines with Unbounded Memory Venkata Koppula, Allison Bishop Lewko, Brent Waters
2014/924 (PDF ) Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields Antoine Joux, Cécile Pierrot
2014/922 (PDF ) Differential Analysis of Block Ciphers SIMON and SPECK Alex Biryukov, Arnab Roy, Vesselin Velichkov
2014/921 (PDF ) Batch NFS Daniel J. Bernstein, Tanja Lange
2014/920 (PDF ) Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schueth, François-Xavier Standaert
2014/919 (PDF ) Experimenting with Shuffle Block Cipher and SMT Solvers Martin Stanek
2014/918 (PDF ) Web Tap Payment Authentication and Encryption With Zero Customer Effort Henry Ng
2014/917 (PDF ) From Selective to Adaptive Security in Functional Encryption Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan
2014/916 (PDF ) Adaptively Secure Fully Homomorphic Signatures Based on Lattices Xavier Boyen, Xiong Fan, Elaine Shi
2014/915 (PDF ) Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014 Yanbin Pan
2014/914 (PDF ) Cryptography with One-Way Communication Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2014/913 (PDF ) Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
2014/912 (PDF ) Low-Cost Concurrent Error Detection for GCM and CCM Xiaofei Guo, Ramesh Karri
2014/911 (PDF ) A Denial of Service Attack against Fair Computations using Bitcoin Deposits Jethro Beekman
2014/910 (PDF ) Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model Vanishree Rao
2014/909 (PDF ) Robust Secret Sharing Schemes Against Local Adversaries Allison Bishop Lewko, Valerio Pastro
2014/908 (PDF ) Practical UC security with a Global Random Oracle Ran Canetti, Abhishek Jain, Alessandra Scafuro
2014/907 (PDF ) Finding shortest lattice vectors faster using quantum search Thijs Laarhoven, Michele Mosca, Joop van de Pol
2014/906 (PDF ) Cryptanalysis on the Multilinear Map over the Integers and its Related Problems Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehle
2014/905 (PDF ) Primary-Secondary-Resolver Membership Proof Systems Moni Naor, Asaf Ziv
2014/904 (PDF ) How Secure is TextSecure? Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Joerg Schwenk, Thorsten Holz
2014/903 (PDF ) Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable) Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos
2014/902 (PDF ) The Power of Negations in Cryptography Siyao Guo, Tal Malkin, Igor C. Oliveira, Alon Rosen
2014/901 (PDF ) A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System Kenneth G. Paterson, Mario Strefler
2014/900 (PDF ) Some Security Results of the RC4+ Stream Cipher Subhadeep Banik, Sonu Jha
2014/899 (PDF ) Side Channel Power Analysis of an AES-256 Bootloader Colin O'Flynn, Zhizhang Chen
2014/898 (PDF ) A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme Eduardo Morais, Ricardo Dahab
2014/897 (PDF ) Leveled Fully Homomorphic Signatures from Standard Lattices Sergey Gorbunov, Vinod Vaikuntanathan, Daniel Wichs
2014/896 (PDF ) Efficiently Making Secure Two-Party Computation Fair Handan Kılınç, Alptekin Küpçü
2014/895 (PDF ) Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion Kerry A. McKay, Poorvi L. Vora
2014/894 (PDF ) THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS Joe Chiarella, Greg Mosher, Dr. J. Robert Buchanan
2014/893 (PDF ) Advanced Algebraic Attack on Trivium Frank Quedenfeld, Christopher Wolf
2014/892 (PDF ) Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014 Georg Fuchsbauer
2014/891 (PDF ) Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity Jean-Sebastien Coron, Johann Groszschaedl, Praveen Kumar Vadnala, Mehdi Tibouchi
2014/890 (PDF ) Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures Jean-Sebastien Coron, Arnab Roy, Srinivas Vivek
2014/889 (PDF ) Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
2014/888 (PDF ) Distance Lower Bounding Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi
2014/887 (PDF ) Hardware Implementation of Secure Shamir's Secret Sharing Scheme Pei Luo, Yu-Lun Lin, Zhen Wang, Mark Karpovsky
2014/886 (PDF ) Accountable Storage Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia
2014/885 (PDF ) Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits Marios O. Choudary, Markus G. Kuhn
2014/882 (PDF ) Obfuscation of Probabilistic Circuits and Applications Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan
2014/881 (PDF ) Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2014/880 (PDF ) Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective Joppe W. Bos, Michael Naehrig, Joop van de Pol
2014/879 (PDF ) Watch your Constants: Malicious Streebog Riham AlTawy, Amr M. Youssef
2014/878 (PDF ) Protecting obfuscation against arithmetic attacks Eric Miles, Amit Sahai, Mor Weiss
2014/877 (PDF ) CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs Daniel R. L. Brown
2014/876 (PDF ) Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model Mihir Bellare, Viet Tung Hoang
2014/875 (PDF ) Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2014/874 (PDF ) Accelerating Bliss: the geometry of ternary polynomials Léo Ducas
2014/873 (PDF ) Bootstrapping for HElib Shai Halevi, Victor Shoup
2014/872 (PDF ) Recent Results in Scalable Multi-Party Computation Jared Saia, Mahdi Zamani
2014/871 (PDF ) An algorithm for MD5 single-block collision attack using high-performance computing cluster Anton A. Kuznetsov
2014/870 (PDF ) Dynamic Behavior of RS latches using FIB processing and probe connection Naoya Torii, Dai Yamamoto, Masahiko Takenaka, Tsutomu Matsumoto
2014/869 (PDF ) Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA Werner Schindler
2014/868 (PDF ) Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski, Gil Segev, Eylon Yogev
2014/867 (PDF ) Random-Oracle Uninstantiability from Indistinguishability Obfuscation Chris Brzuska, Pooya Farshim, Arno Mittelbach
2014/865 (PDF ) Impossibility of Black-Box Simulation Against Leakage Attacks Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2014/864 (PDF ) How to Choose Interesting Points for Template Attacks More Effectively Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/863 (PDF ) A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou
2014/862 (PDF ) Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic - Miroslav Knezevic, Ventzislav Nikov, Peter Rombouts
2014/861 (PDF ) Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots İhsan Haluk Akın
2014/860 (PDF ) Differential Factors: Improved Attacks on SERPENT Cihangir Tezcan, Ferruh Özbudak
2014/858 (PDF ) Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds Dana Dachman-Soled, Jonathan Katz, Vanishree Rao
2014/857 (PDF ) Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles Jonathan Katz, Andrew Miller, Elaine Shi
2014/856 (PDF ) Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou
2014/855 (PDF ) Relating Undisturbed Bits to Other Properties of Substitution Boxes Rusydi H. Makarim, Cihangir Tezcan
2014/854 (PDF ) Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli
2014/853 (PDF ) Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner
2014/852 (PDF ) Faster ECC over $\mathbb{F}_{2^{521}-1}$ Robert Granger, Michael Scott
2014/851 (PDF ) Near Optimal Rate Homomorphic Encryption for Branching Programs Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
2014/850 (PDF ) The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses Markku-Juhani O. Saarinen
2014/849 (PDF ) A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks Ryotaro Hayashi, Tatsuyuki Matsushita
2014/848 (PDF ) Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events Nicolas T. Courtois, Pinar Emirdag, Filippo Valsorda
2014/847 (PDF ) Reflections on Slide with a Twist Attacks Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2014/846 (PDF ) Verifiable computation using multiple provers Andrew J. Blumberg, Justin Thaler, Victor Vu, Michael Walfish
2014/845 (PDF ) Adaptively secure two-party computation from indistinguishability obfuscation Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya
2014/844 (PDF ) Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation Sanjam Garg, Antigoni Polychroniadou
2014/843 (PDF ) Solving a Class of Modular Polynomial Equations and its Relation to Modular Inversion Hidden Number Problem and Inversive Congruential Generator Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng
2014/842 (PDF ) A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/841 (PDF ) Explicit Non-malleable Codes Resistant to Permutations and Perturbations Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/840 (PDF ) Constrained PRFs for Unbounded Inputs Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2014/839 (PDF ) A Simple and Improved Algorithm for Integer Factorization with Implicit Hints Koji Nuida, Naoto Itakura, Kaoru Kurosawa
2014/838 (PDF ) SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers Alhassan Khedr, Glenn Gulak, Vinod Vaikuntanathan
2014/837 (PDF ) True Random Number Generators Secure in a Changing Environment: Improved Security Bounds Maciej Skorski
2014/836 (PDF ) A Tight Transformation between HILL and Metric Conditional Pseudoentropy Maciej Skorski
2014/835 (PDF ) Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
2014/834 (PDF ) Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman
2014/833 (PDF ) Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability Essam Ghadafi
2014/832 (PDF ) Requirements for Standard Elliptic Curves Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
2014/831 (PDF ) Tweaks and Keys for Block Ciphers: the TWEAKEY Framework Jérémy Jean, Ivica Nikolić, Thomas Peyrin
2014/830 (PDF ) Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE) Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao
2014/829 (PDF ) Additively Homomorphic UC commitments with Optimal Amortized Overhead Ignacio Cascudo, Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti
2014/828 (PDF ) Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm Zhengjun Cao, Zhenfu Cao, Lihua Liu
2014/827 (PDF ) Interactive Coding for Interactive Proofs Yevgeniy Dodis, Allison Bishop Lewko
2014/826 (PDF ) Learning with Errors in the Exponent Ozgur Dagdelen, Sebastian Gajek, Florian Gopfert
2014/824 (PDF ) Accountable Tracing Signatures Markulf Kohlweiss, Ian Miers
2014/823 (PDF ) On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries Rafael Dowsley, Anderson C. A. Nascimento
2014/822 (PDF ) Ballot secrecy with malicious bulletin boards David Bernhard, Ben Smyth
2014/821 (PDF ) Non-malleable Reductions and Applications Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski
2014/820 (PDF ) Operational Signature Schemes Michael Backes, Ozgur Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder
2014/819 (PDF ) Riding on Asymmetry: Efficient ABE for Branching Programs Sergey Gorbunov, Dhinakaran Vinayagamurthy
2014/817 (PDF ) Optimized Karatsuba Squaring on 8-bit AVR Processors Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
2014/816 (PDF ) FHEW: Bootstrapping Homomorphic Encryption in less than a second Léo Ducas, Daniele Micciancio
2014/815 (PDF ) A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves Palash Sarkar, Shashank Singh
2014/814 (PDF ) Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing Lisa Bromberg, Vladimir Shpilrain, Alina Vdovina
2014/813 (PDF ) Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data Dario Catalano, Dario Fiore
2014/812 (PDF ) Search-and-compute on Encrypted Data Jung Hee Cheon, Miran Kim, Myungsun Kim
2014/811 (PDF ) A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugere, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
2014/810 (PDF ) Simulation-Based Secure Functional Encryption in the Random Oracle Model Vincenzo Iovino, Karol Zebrowski
2014/809 (PDF ) Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
2014/808 (PDF ) Online/Off-line Ring Signature Scheme with Provable Security Jayaprakash Kar
2014/807 (PDF ) Leakage-resilient non-malleable codes Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
2014/806 (PDF ) Summation polynomial algorithms for elliptic curves in characteristic two Steven D. Galbraith, Shishay W. Gebregiyorgis
2014/805 (PDF ) Dual-System Simulation-Soundness with Applications to UC-PAKE and More Charanjit S. Jutla, Arnab Roy
2014/804 (PDF ) Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions Jacob Alperin-Sheriff
2014/803 (PDF ) A Decentralized Public Key Infrastructure with Identity Retention Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
2014/802 (PDF ) Physical Characterization of Arbiter PUFs Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
2014/801 (PDF ) Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties Georgi Ivanov, Nikolay Nikolov, Svetla Nikova
2014/800 (PDF ) Efficient Pairings and ECC for Embedded Systems Thomas Unterluggauer, Erich Wenger
2014/799 (PDF ) Verifiable Random Functions from Weaker Assumptions Tibor Jager
2014/798 (PDF ) Multi-Identity and Multi-Key Leveled FHE from Learning with Errors Michael Clear, Ciarán McGoldrick
2014/797 (PDF ) Tightly-Secure Authenticated Key Exchange Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
2014/796 (PDF ) Distributed Cryptography Based on the Proofs of Work Marcin Andrychowicz, Stefan Dziembowski
2014/795 (PDF ) SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn
2014/794 (PDF ) Efficient Identity-Based Encryption over NTRU Lattices Léo Ducas, Vadim Lyubashevsky, Thomas Prest
2014/793 (PDF ) Robust Authenticated-Encryption: AEZ and the Problem that it Solves Viet Tung Hoang, Ted Krovetz, Phillip Rogaway
2014/792 (PDF ) General Classification of the Authenticated Encryption Schemes for the CAESAR Competition Farzaneh abed, Christian Forler, Stefan Lucks
2014/791 (PDF ) Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof Dongdai Lin, Yujuan Quan, Jian Weng, Jun Yan
2014/790 (PDF ) Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses Sarani Bhattacharya, Debdeep Mukhopadhyay
2014/789 (PDF ) Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
2014/788 (PDF ) Tuning GaussSieve for Speed Robert Fitzpatrick, Christian Bischof, Johannes Buchmann, Ozgur Dagdelen, Florian Gopfert, Artur Mariano, Bo-Yin Yang
2014/787 (PDF ) Another Tor is possible Amadou Moctar Kane
2014/786 (PDF ) On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation Chun Guo, Dongdai Lin
2014/785 (PDF ) Divisible E-Cash Made Practical Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
2014/784 (PDF ) Weak Instances of PLWE Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter
2014/783 (PDF ) Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian
2014/782 (PDF ) Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar, Philipp Jovanovic, Ilia Polian
2014/781 (PDF ) Tally-based simple decoders for traitor tracing and group testing Boris Skoric
2014/780 (PDF ) Deterministic Public-Key Encryption under Continual Leakage Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters
2014/779 (PDF ) Implementing Cryptographic Program Obfuscation Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
2014/778 (PDF ) Anonymous IBE from Quadratic Residuosity with Improved Performance Michael Clear, Hitesh Tewari, Ciarán McGoldrick
2014/777 (PDF ) (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces Koji Nuida, Kaoru Kurosawa
2014/776 (PDF ) How to Obfuscate Programs Directly Joe Zimmerman
2014/775 (PDF ) Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation Artur Mariano, Shahar Timnat, Christian Bischof
2014/774 (PDF ) Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff, Jonathan Katz, Matthew D. Green
2014/773 (PDF ) Obfuscating Low-Rank Matrix Branching Programs Amit Sahai, Mark Zhandry
2014/772 (PDF ) Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps Nuttapong Attrapadung
2014/771 (PDF ) Succinct Randomized Encodings and their Applications Nir Bitansky, Sanjam Garg, Sidharth Telang
2014/770 (PDF ) AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation Takaaki Mizuki, Yu-ichi Hayashi
2014/769 (PDF ) Indistinguishability Obfuscation of Iterated Circuits and RAM Programs Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan
2014/768 (PDF ) Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu
2014/767 (PDF ) Algebraic Attacks on Human Identification Protocols Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar, Josef Pieprzyk
2014/766 (PDF ) Succinct Garbling Schemes and Applications Huijia Lin, Rafael Pass
2014/765 (PDF ) The Bitcoin Backbone Protocol: Analysis and Applications Juan Garay, Aggelos Kiayias, Nikos Leonardos
2014/764 (PDF ) One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin Jens Groth, Markulf Kohlweiss
2014/763 (PDF ) On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun
2014/762 (PDF ) Access Control in Publicly Verifiable Outsourced Computation James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2014/761 (PDF ) Cryptanalysis of Reduced-round SIMON32 and SIMON48 Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo
2014/760 (PDF ) Montgomery Modular Multiplication on ARM-NEON Revisited Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim
2014/759 (PDF ) How to Efficiently Evaluate RAM Programs with Malicious Security Arash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek
2014/758 (PDF ) Cryptographic Reverse Firewalls Ilya Mironov, Noah Stephens-Davidowitz
2014/757 (PDF ) Adaptively Secure Broadcast Encryption with Small System Parameters Mark Zhandry
2014/756 (PDF ) Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates Samee Zahur, Mike Rosulek, David Evans
2014/755 (PDF ) Computing Mod Without Mod Mark A. Will, Ryan K. L. Ko
2014/754 (PDF ) Bilinear Entropy Expansion from the Decisional Linear Assumption Lucas Kowalczyk, Allison Bishop Lewko
2014/753 (PDF ) Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication Alonso Gonzalez-Ulloa, Alejandro Hevia
2014/752 (PDF ) Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci
2014/751 (PDF ) Higher-Order Threshold Implementations Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2014/750 (PDF ) Hardware Trojan Horses in Cryptographic IP Cores Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage
2014/749 (PDF ) Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM Daniel E. Holcomb, Kevin Fu
2014/748 (PDF ) Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations Mehmet Sabır Kiraz, Osmanbey Uzunkol
2014/747 (PDF ) Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2014/746 (PDF ) Decoy-based information security Vladimir Shpilrain
2014/745 (PDF ) Universal Signature Aggregators Susan Hohenberger, Venkata Koppula, Brent Waters
2014/744 (PDF ) Sieving for shortest vectors in lattices using angular locality-sensitive hashing Thijs Laarhoven
2014/743 (PDF ) Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security Benoit Libert, Marc Joye, Moti Yung, Thomas Peters
2014/742 (PDF ) A survey of Fault Attacks in Pairing Based Cryptography Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes
2014/741 (PDF ) Eliminating Leakage in Reverse Fuzzy Extractors André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser
2014/739 (PDF ) SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers Smile Markovski, Aleksandra Mileva, Vesna Dimitrova
2014/738 (PDF ) A Very Compact FPGA Implementation of LED and PHOTON N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann
2014/736 (PDF ) Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2014/735 (PDF ) Dealer-Leakage Resilient Verifiable Secret Sharing Ruxandra F. Olimid
2014/734 (PDF ) S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic
2014/733 (PDF ) Augmented Learning with Errors: The Untapped Potential of the Error Term Rachid El~Bansarkhani, Özgür Dagdelen, Johannes Buchmann
2014/732 (PDF ) Resizable Tree-Based Oblivious RAM Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2014/731 (PDF ) Secure modular password authentication for the web using channel bindings Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham
2014/730 (PDF ) Differentially Private Linear Algebra in the Streaming Model Jalaj Upadhyay
2014/729 (PDF ) Faster Binary-Field Multiplication and Faster Binary-Field MACs Daniel J. Bernstein, Tung Chou
2014/728 (PDF ) Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
2014/727 (PDF ) The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves Benjamin Smith
2014/725 (PDF ) Efficient Software Implementation of Ring-LWE Encryption Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2014/724 (PDF ) Protecting Encrypted Cookies from Compression Side-Channel Attacks Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014/723 (PDF ) Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage” Yalin Chen, Jue-Sam Chou
2014/722 (PDF ) Differential Cryptanalysis of SipHash Christoph Dobraunig, Florian Mendel, Martin Schläffer
2014/721 (PDF ) On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers Zhengjun Cao, Zhenfu Cao
2014/720 (PDF ) Adaptively Secure Constrained Pseudorandom Functions Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters
2014/719 (PDF ) Bivariate Polynomials Modulo Composites and their Applications Dan Boneh, Henry Corrigan-Gibbs
2014/718 (PDF ) Square Span Programs with Applications to Succinct NIZK Arguments George Danezis, Cedric Fournet, Jens Groth, Markulf Kohlweiss
2014/717 (PDF ) How to Split a Secret into Unknown Shares Ruxandra F. Olimid
2014/716 (PDF ) Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment Amir Moradi
2014/715 (PDF ) Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment' Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
2014/714 (PDF ) A comprehensive empirical comparison of parallel ListSieve and GaussSieve Artur Mariano, Ozgur Dagdelen, Christian Bischof
2014/713 (PDF ) Co-Location-Resistant Clouds Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, Bruce Shepherd
2014/712 (PDF ) Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks Mohammad Wazid
2014/711 (PDF ) New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$ Masao KASAHARA
2014/710 (PDF ) An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle Yehuda Lindell
2014/709 (PDF ) A Note on Quantum Security for Post-Quantum Cryptography Fang Song
2014/708 (PDF ) Formal Treatment of Privacy-Enhancing Credential Systems Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
2014/707 (PDF ) Analysis Of Variance and CPA in SCA Sebastien Tiran, Guillaume Reymond, Jean-Baptiste Rigaud, Driss Aboulkassimi, Benedikt Gierlichs, Mathieu Carbone, Gilles Ducharme, Philippe Maurine
2014/706 (PDF ) The Feasibility of Outsourced Database Search in the Plain Model Carmit Hazay, Hila Zarosim
2014/704 (PDF ) A 128-bit Block Cipher Based on Three Group Arithmetics Shenghui Su, Shuwang Lü, Daqiang Dong
2014/703 (PDF ) Linearity Measures for MQ Cryptography Simona Samardjiska, Danilo Gligoroski
2014/702 (PDF ) Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques Benoit Feix, Hugues Thiebeauld
2014/700 (PDF ) Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu
2014/699 (PDF ) Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version) Christina Boura, María Naya-Plasencia, Valentin Suder
2014/698 (PDF ) HIMMO - A lightweight collusion-resistant key predistribution scheme Oscar Garcia-Morchon, Domingo Gomez-Perez, Jaime Gutierrez, Ronald Rietman, Berry Schoenmakers, Ludo Tolhuizen
2014/697 (PDF ) A Fully Homomorphic Encryption Scheme with Better Key Size Zhigang Chen, Jian Wang, ZengNian Zhang, Xinxia Song
2014/696 (PDF ) Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, Ahto Truu
2014/695 (PDF ) Proof of Proximity of Knowledge Serge Vaudenay
2014/694 (PDF ) Malicious Hashing: Eve's Variant of SHA-1 Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer
2014/693 (PDF ) Optimal Proximity Proofs Ioana Boureanu, Serge Vaudenay
2014/692 (PDF ) Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead Enrique Larraia
2014/691 (PDF ) Integration of hardware tokens in the Idemix library Antonio de la Piedra
2014/690 (PDF ) Efficient Interval Check in the Presence of Malicious Adversaries Genqiang Wu, Yeping He, Yi Lu, Liping Ding
2014/689 (PDF ) Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, Ahto Truu
2014/688 (PDF ) White-Box AES Implementation Revisited Chung Hun Baek, Jung Hee Cheon, Hyunsook Hong
2014/687 (PDF ) Reducing the Complexity of Normal Basis Multiplication Omer Egecioglu, Cetin Kaya Koc
2014/685 (PDF ) Bit Security of the CDH Problems over Finite Field Mingqiang Wang, Tao Zhan, Haibin Zhang
2014/684 (PDF ) Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers
2014/683 (PDF ) Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao
2014/682 (PDF ) A Unified Formalism for Physical Attacks Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria
2014/681 (PDF ) Improved Linear Cryptanalysis of Reduced-round SIMON Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Martin M. Lauridsen
2014/680 (PDF ) Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao, Lihua Liu
2014/679 (PDF ) A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao, Lihua Liu
2014/678 (PDF ) A Counterexample to the Chain Rule for Conditional HILL Entropy Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs
2014/677 (PDF ) Attacks in Stream Ciphers: A Survey Gustavo Banegas
2014/676 (PDF ) Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts Zhen Liu, Zhenfu Cao, Duncan S. Wong
2014/675 (PDF ) The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang
2014/674 (PDF ) Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby, Srinath Setty, Max Howald, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish
2014/673 (PDF ) How to Estimate the Success Rate of Higher-Order Side-Channel Attacks Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
2014/672 (PDF ) Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound Xiao Wang, Hubert Chan, Elaine Shi
2014/671 (PDF ) SCORAM: Oblivious RAM for Secure Computation Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, Elaine Shi
2014/670 (PDF ) DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
2014/669 (PDF ) On the Communication Complexity of Secure Function Evaluation with Long Output Pavel Hubacek, Daniel Wichs
2014/668 (PDF ) Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation Ran Cohen, Yehuda Lindell
2014/667 (PDF ) Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings Yehuda Lindell, Ben Riva
2014/666 (PDF ) Functional Encryption Without Obfuscation Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
2014/665 (PDF ) Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi
2014/664 (PDF ) On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves William R. Trost, Guangwu Xu
2014/663 (PDF ) Locally Decodable and Updatable Non-Malleable Codes and Their Applications Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2014/662 (PDF ) Outsourced Pattern Matching Sebastian Faust, Carmit Hazay, Daniele Venturi
2014/661 (PDF ) One-Round Deniable Key Exchange with Perfect Forward Security Weiqiang Wen, Libin Wang, Min Xie
2014/660 (PDF ) Interactive Proofs under Continual Memory Leakage Prabhanjan Ananth, Vipul Goyal, Omkant Pandey
2014/659 (PDF ) On the Primitivity of Trinomials over Small Finite Fields YUjuan Li, Jinhua Zhao, Huaifu Wang
2014/658 (PDF ) The Adjacency Graphs of Some Feedback Shift Registers Ming Li, Yupeng Jiang, Dongdai Lin
2014/657 (PDF ) On the cycle decomposition of the WG-NLFSR YUjuan Li, Wnehua Shen, Huaifu Wang, Peipei Zhou
2014/656 (PDF ) Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur
2014/655 (PDF ) Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, Guang Gong
2014/654 (PDF ) Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay
2014/653 (PDF ) Mersenne factorization factory Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra
2014/652 (PDF ) A Dynamic Cube Attack on $105$ round Grain v1 Subhadeep Banik
2014/651 (PDF ) A note on CCA2-protected McEliece Cryptosystem with a systematic public key Pavol Zajac
2014/650 (PDF ) Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk
2014/649 (PDF ) FPGA Trojans through Detecting and Weakening of Cryptographic Primitives Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
2014/648 (PDF ) An Equivalent Condition on the Switching Construction of Differentially $4$-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function Xi Chen, Yazhi Deng, Min Zhu, Longjiang Qu
2014/647 (PDF ) Universally Composable Secure Group Communication Youliang Tian, Changgen Peng
2014/646 (PDF ) High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems Donald Donglong Chen, Nele Mentens, Frederik Vercauteren, Sujoy Sinha Roy, Ray C. C. Cheung, Derek Pao, Ingrid Verbauwhede
2014/645 (PDF ) Graph-Induced Multilinear Maps from Lattices Craig Gentry, Sergey Gorbunov, Shai Halevi
2014/644 (PDF ) Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai
2014/643 (PDF ) On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks' Ashok Kumar Das
2014/642 (PDF ) Balanced permutations Even-Mansour ciphers Shoni Gilboa, Shay Gueron
2014/641 (PDF ) The Multiple Number Field Sieve with Conjugation Method Cécile Pierrot
2014/640 (PDF ) Revocation in Publicly Verifiable Outsourced Computation James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2014/639 (PDF ) Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
2014/638 (PDF ) Substring-Searchable Symmetric Encryption Melissa Chase, Emily Shen
2014/637 (PDF ) Generic Hardness of the Multiple Discrete Logarithm Problem Aaram Yun
2014/636 (PDF ) Improved Timing Attacks on ECDSA Vikram Singh
2014/635 (PDF ) Type 2 Structure-Preserving Signature Schemes Revisited Sanjit Chatterjee, Alfred Menezes
2014/634 (PDF ) Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP Hongda Li, Qihua Niu, Guifang Huang
2014/633 (PDF ) Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity Ran Canetti, Abhishek Jain, Omer Paneth
2014/632 (PDF ) Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
2014/631 (PDF ) Zipf’s Law in Passwords Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
2014/630 (PDF ) Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation Peeter Laud
2014/629 (PDF ) Two-factor authentication for the Bitcoin protocol Christopher Mann, Daniel Loebenberger
2014/628 (PDF ) An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai
2014/627 (PDF ) On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption Debrup Chakraborty, Palash Sarkar
2014/626 (PDF ) Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs Daniel Genkin, Itamar Pipman, Eran Tromer
2014/625 (PDF ) Pretty Understandable Democracy 2.0 Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach
2014/624 (PDF ) KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
2014/623 (PDF ) Privacy with Imperfect Randomness Yevgeniy Dodis, Yanqing Yao
2014/622 (PDF ) Fully Secure Attribute Based Encryption from Multilinear Maps Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
2014/621 (PDF ) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi
2014/620 (PDF ) The M3dcrypt Password Hashing Function Isaiah Makwakwa
2014/619 (PDF ) THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER Mohammad Sadegh Nemati Nia, Ali Payandeh
2014/618 (PDF ) Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender Florian Böhl, Simon Greiner, Patrik Scheidecker
2014/617 (PDF ) ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk
2014/616 (PDF ) Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe Zhen Liu, Duncan S. Wong
2014/615 (PDF ) The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas
2014/614 (PDF ) Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version) Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng
2014/613 (PDF ) A Security Analysis of the Composition of ChaCha20 and Poly1305 Gordon Procter
2014/612 (PDF ) Attribute-Based Encryption Optimized for Cloud Computing Máté Horváth
2014/611 (PDF ) Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation Shlomi Dolev, Niv Gilboa, Ximing Li
2014/610 (PDF ) Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation Craig Gentry
2014/609 (PDF ) Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/608 (PDF ) Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
2014/607 (PDF ) Adding Controllable Linkability to Pairing-Based Group Signatures For Free Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
2014/606 (PDF ) A Multi-Function Provable Data Possession Scheme in Cloud Computing Xiaojun Yu, Qiaoyan Wen
2014/605 (PDF ) On the Limitations of Computational Fuzzy Extractors Kenji Yasunaga, Kosuke Yuzawa
2014/604 (PDF ) Private Web Search with Constant Round Efficiency Bolam Kang, Sung Cheol Goh, Myungsun Kim
2014/603 (PDF ) Recursive Trees for Practical ORAM Tarik Moataz, Erik-Oliver Blass, Guevara Noubir
2014/602 (PDF ) A Cryptographic Study of Tokenization Systems Sandra Diaz-Santiago, Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
2014/601 (PDF ) Adaptive versus Static Security in the UC Model Ivan Damgård, Jesper Buus Nielsen
2014/599 (PDF ) Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila
2014/598 (PDF ) Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge Tore Kasper Frederiksen, Jesper Buus Nielsen, Claudio Orlandi
2014/597 (PDF ) Invisible Adaptive Attacks Jesper Buus Nielsen, Mario Strefler
2014/596 (PDF ) Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification Marina Blanton, Siddharth Saraph
2014/595 (PDF ) Scalable Zero Knowledge via Cycles of Elliptic Curves Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
2014/594 (PDF ) Oblivious Parallel RAM and Applications Elette Boyle, Kai-Min Chung, Rafael Pass
2014/593 (PDF ) Improved Exponential-time Algorithms for Inhomogeneous-SIS Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield
2014/592 (PDF ) Multiprecision multiplication on AVR revisited Michael Hutter, Peter Schwabe
2014/591 (PDF ) Compact and Side Channel Secure Discrete Gaussian Sampling Sujoy Sinha Roy, Oscar Reparaz, Frederik Vercauteren, Ingrid Verbauwhede
2014/590 (PDF ) Automated algebraic analysis of structure-preserving signature schemes Joeri de Ruiter
2014/589 (PDF ) Authenticated Key Exchange from Ideal Lattices Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
2014/588 (PDF ) A Punctured Programming Approach to Adaptively Secure Functional Encryption Brent Waters
2014/587 (PDF ) Non-interactive zero-knowledge proofs in the quantum random oracle model Dominique Unruh
2014/586 (PDF ) An Algebraic Approach to Non-Malleability Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald
2014/585 (PDF ) The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti
2014/584 (PDF ) Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2014/583 (PDF ) Template Attacks Based On Priori Knowledge Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/582 (PDF ) NSEC5: Provably Preventing DNSSEC Zone Enumeration Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv
2014/581 (PDF ) (Hierarchical) Identity-Based Encryption from Affine Message Authentication Olivier Blazy, Eike Kiltz, Jiaxin Pan
2014/580 (PDF ) The Hunting of the SNARK Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer
2014/578 (PDF ) The Exact PRF-Security of NMAC and HMAC Peter Gaži, Krzysztof Pietrzak, Michal Rybár
2014/577 (PDF ) Reducing Communication Overhead of the Subset Difference Scheme Sanjay Bhattacherjee, Palash Sarkar
2014/576 (PDF ) Vernam Two Dan P. Milleville
2014/575 (PDF ) Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen
2014/574 (PDF ) Security Analysis of Multilinear Maps over the Integers Hyung Tae Lee, Jae Hong Seo
2014/573 (PDF ) A new public key system based on Polynomials over finite fields GF(2) Gurgen Khachatrian
2014/572 (PDF ) On the Optimality of Differential Fault Analyses on CLEFIA Juliane Krämer, Anke Stüber, Ágnes Kiss
2014/571 (PDF ) How to manipulate curve standards: a white paper for the black hat Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal
2014/570 (PDF ) Deja Q: Using Dual Systems to Revisit q-Type Assumptions Melissa Chase, Sarah Meiklejohn
2014/569 (PDF ) Fast Lattice Point Enumeration with Minimal Overhead Daniele Micciancio, Michael Walter
2014/568 (PDF ) New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC Masao KASAHARA
2014/566 (PDF ) Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Daniel Augot, Matthieu Finiasz
2014/565 (PDF ) Kangaroos in Side-Channel Attacks Tanja Lange, Christine van Vredendaal, Marnix Wakker
2014/563 (PDF ) Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski
2014/562 (PDF ) hHB: a Harder HB+ Protocol Ka Ahmad Khoureich
2014/561 (PDF ) Performance Increasing Approaches For Binary Field Inversion Vladislav Kovtun, Maria Bulakh
2014/560 (PDF ) Towards Forward Security Properties for PEKS and IBE Qiang Tang
2014/559 (PDF ) Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA Pablo Rauzy, Sylvain Guilley
2014/558 (PDF ) Double shielded Public Key Cryptosystems Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin, Weijian Wang
2014/557 (PDF ) Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima
2014/556 (PDF ) Securing Cloud Data in the New Attacker Model Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
2014/555 (PDF ) General Statistically Secure Computation with Bounded-Resettable Hardware Tokens Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
2014/554 (PDF ) On Virtual Grey Box Obfuscation for General Circuits Nir Bitansky, Ran Canetti, Yael Tauman-Kalai, Omer Paneth
2014/553 (PDF ) A Simpler Variant of Universally Composable Security for Standard Multiparty Computation Ran Canetti, Asaf Cohen, Yehuda Lindell
2014/552 (PDF ) Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards
2014/551 (PDF ) Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation Daniel Augot, Pierre-Alain Fouque, Pierre Karpman
2014/550 (PDF ) Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski, Gil Segev
2014/549 (PDF ) New Attacks on the RSA Cryptosystem Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig
2014/548 (PDF ) Implicit factorization of unbalanced RSA moduli Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin
2014/547 (PDF ) Authentication Codes Based on Resilient Boolean Maps Juan Carlos Ku-Cauich, Guillermo Morales-Luna
2014/546 (PDF ) Anonymous and Publicly Linkable Reputation Systems Johannes Blömer, Jakob Juhnke, Christina Kolb
2014/545 (PDF ) Solving closest vector instances using an approximate shortest independent vectors oracle Chengliang Tian, Wei Wei, Dongdai Lin
2014/544 (PDF ) Secure Mutual Testing Strategy for Cryptographic SoCs Amitabh Das, Dusko Karaklajic, Ingrid Verbauwhede
2014/543 (PDF ) A Practical Second-Order Fault Attack against a Real-World Pairing Implementation Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert
2014/542 (PDF ) On the Multi-output Filtering Model and Its Applications Guang Gong, Kalikinkar Mandal, Yin Tan, Teng Wu
2014/541 (PDF ) EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki
2014/540 (PDF ) Optimized Architecture for AES Abhijith P. S, Dr. Manish Goswami, S. Tadi, Kamal Pandey
2014/539 (PDF ) Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang
2014/537 (PDF ) Constrained Verifiable Random Functions Georg Fuchsbauer
2014/536 (PDF ) A Survey and New Results on the Decomposition of an NFSR into a Cascade Connection of Two Smaller NFSRs Tian Tian, Jia-Min Zhang, Chen-Dong Ye, Wen-Feng Qi
2014/535 (PDF ) On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes Massimo Chenal, Qiang Tang
2014/534 (PDF ) Differential Power Analysis of a McEliece Cryptosystem Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2014/533 (PDF ) Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions Jaiganesh Balasundaram
2014/531 (PDF ) Spatial Bloom Filters: Enabling Privacy in Location-aware Applications Paolo Palmieri, Luca Calderoni, Dario Maio
2014/530 (PDF ) FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison Khoongming Khoo, Thomas Peyrin, Axel Y. Poschmann, Huihui Yap
2014/529 (PDF ) Leakage-Resilient Signatures with Graceful Degradation Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
2014/528 (PDF ) Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin
2014/527 (PDF ) Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory Annelie Heuser, Olivier Rioul, Sylvain Guilley
2014/526 (PDF ) Curve41417: Karatsuba revisited Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
2014/525 (PDF ) Differential Analysis on Block Cipher PRIDE Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong
2014/524 (PDF ) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang, Yanfeng Qi
2014/523 (PDF ) Fully Secure and Fast Signing from Obfuscation Kim Ramchen, Brent Waters
2014/522 (PDF ) Constrained Pseudorandom Functions: Verifiable and Delegatable Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
2014/521 (PDF ) Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model Susan Hohenberger, Venkata Koppula, Brent Waters
2014/520 (PDF ) Squares of Random Linear Codes Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Gilles Zémor
2014/519 (PDF ) Realizing Pico: Finally No More Passwords! Jens Hermans, Roel Peeters
2014/518 (PDF ) Cryptography from Compression Functions: The UCE Bridge to the ROM Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
2014/517 (PDF ) On the Connection between Leakage Tolerance and Adaptive Security Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
2014/516 (PDF ) On the Classification of Finite Boolean Functions up to Fairness Nikolaos Makriyannis
2014/514 (PDF ) On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili
2014/513 (PDF ) RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data Noboru Kunihiro, Junya Honda
2014/512 (PDF ) Rmind: a tool for cryptographically secure statistical analysis Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk
2014/511 (PDF ) Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions Johannes Blömer, Gennadij Liske
2014/510 (PDF ) A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay
2014/509 (PDF ) Privacy preserving delegated word search in the cloud Kaoutar Elkhiyaoui, Melek Onen, Refik Molva
2014/508 (PDF ) Reversing Stealthy Dopant-Level Circuits Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino
2014/507 (PDF ) How to Generate and use Universal Samplers Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
2014/506 (PDF ) Finding Roots in GF(p^n) with the Successive Resultant Algorithm Christophe Petit
2014/505 (PDF ) On the quaternion $\ell$-isogeny path problem David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
2014/504 (PDF ) A Provable Security Analysis of Intel's Secure Key RNG Thomas Shrimpton, R. Seth Terashima
2014/503 (PDF ) Efficient Hidden Vector Encryption with Constant-Size Ciphertext Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
2014/502 (PDF ) What's the Gist? Privacy-Preserving Aggregation of User Profiles Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun
2014/501 (PDF ) WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time Markku--Juhani O. Saarinen, Billy Bob Brumley
2014/499 (PDF ) Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer Mehmet Sabır Kiraz, Ziya Alper Genç, Süleyman Kardaş
2014/498 (PDF ) Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix Souvik Kolay, Debdeep Mukhopadhyay
2014/497 (PDF ) NREPO:Normal Basis Recomputing with Permuted Operands Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri
2014/496 (PDF ) Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
2014/495 (PDF ) Improved Short Lattice Signatures in the Standard Model Léo Ducas, Daniele Micciancio
2014/494 (PDF ) Hardness of k-LWE and Applications in Traitor Tracing San Ling, Duong Hieu Phan, Damien Stehle, Ron Steinfeld
2014/493 (PDF ) Arithmetic on Abelian and Kummer Varieties David Lubicz, Damien Robert
2014/492 (PDF ) Fault attacks on pairing-based protocols revisited Sanjit Chatterjee, Koray Karabina, Alfred Menezes
2014/491 (PDF ) Bootstrappable Identity-Based Fully Homomorphic Encryption Michael Clear, Ciarán McGoldrick
2014/490 (PDF ) Universally Composable secure TNC protocol based on IF-T binding to TLS Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
2014/489 (PDF ) A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge Dan Ding, Guizhen Zhu, Xiaoyun Wang
2014/488 (PDF ) Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
2014/487 (PDF ) GGHLite: More Efficient Multilinear Maps from Ideal Lattices Adeline Langlois, Damien Stehle, Ron Steinfeld
2014/486 (PDF ) Binary Elligator Squared Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014/485 (PDF ) An Improved Truncated Differential Cryptanalysis of KLEIN Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, Mohammad Reza Aref
2014/484 (PDF ) Sealing the Leak on Classical NTRU Signatures Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit
2014/483 (PDF ) Disjunctions for Hash Proof Systems: New Constructions and Applications Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/482 (PDF ) Differentially Private Data Aggregation with Optimal Utility Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov
2014/481 (PDF ) Universally Composable Non-Interactive Key Exchange Eduarda S. V. Freire, Julia Hesse, Dennis Hofheinz
2014/480 (PDF ) Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
2014/479 (PDF ) Even more practical secure logging: Tree-based Seekable Sequential Key Generators Giorgia Azzurra Marson, Bertram Poettering
2014/478 (PDF ) Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks Benny Applebaum, Eyal Widder
2014/477 (PDF ) Relaxed Two-to-one Recoding Schemes Omkant Pandey, Kim Ramchen, Brent Waters
2014/476 (PDF ) Simon's Circuit Paul Baecher
2014/475 (PDF ) A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol Imran Erguler
2014/474 (PDF ) Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich
2014/472 (PDF ) How to Watermark Cryptographic Functions Ryo Nishimaki
2014/470 (PDF ) PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au
2014/469 (PDF ) Homomorphic Signatures with Efficient Verification for Polynomial Functions Dario Catalano, Dario Fiore, Bogdan Warinschi
2014/468 (PDF ) Privacy-Preserving Auditing for Attribute-Based Credentials Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
2014/467 (PDF ) Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Daniel Demmler, Thomas Schneider, Michael Zohner
2014/466 (PDF ) On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm. Samir Bouftass, Abdelhak Azhari
2014/465 (PDF ) Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula Jie Chen, Hoeteck Wee
2014/464 (PDF ) Providing Root of Trust for ARM TrustZone using On-Chip SRAM Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng
2014/463 (PDF ) (Leveled) Fully Homomorphic Signatures from Lattices Sergey Gorbunov, Vinod Vaikuntanathan
2014/462 (PDF ) Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
2014/460 (PDF ) FleXOR: Flexible garbling for XOR gates that beats free-XOR Vladimir Kolesnikov, Payman Mohassel, Mike Rosulek
2014/459 (PDF ) Template Attacks on Different Devices Omar Choudary, Markus G. Kuhn
2014/458 (PDF ) Automated Analysis of Cryptographic Assumptions in Generic Group Models Gilles Barthe, Edvard Fagerholm, Dario Fiore, John Mitchell, Andre Scedrov, Benedikt Schmidt
2014/457 (PDF ) Transcript secure signatures based on modular lattices Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
2014/456 (PDF ) Verified Implementations for Secure and Verifiable Computation José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Guillaume Davy, François Dupressoir, Benjamin Grégoire, Pierre-Yves Strub
2014/455 (PDF ) Single-shot security for one-time memories in the isolated qubits model Yi-Kai Liu
2014/454 (PDF ) Early Propagation and Imbalanced Routing, How to Diminish in FPGAs Amir Moradi, Vincent Immler
2014/453 (PDF ) Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçın
2014/452 (PDF ) Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake Iddo Bentov, Charles Lee, Alex Mizrahi, Meni Rosenfeld
2014/451 (PDF ) Leveled Fully Homomorphic Signatures from Standard Lattices Daniel Wichs
2014/448 (PDF ) Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao
2014/447 (PDF ) Faster Private Set Intersection based on OT Extension Benny Pinkas, Thomas Schneider, Michael Zohner
2014/446 (PDF ) 4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes Valerie Nachef, Jacques Patarin, Emmanuel Volte
2014/445 (PDF ) Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols, Andy Rupp
2014/444 (PDF ) RPKI vs ROVER: Comparing the Risks of BGP Security Solutions Aanchal Malhotra, Sharon Goldberg
2014/443 (PDF ) Minimizing the Two-Round Even-Mansour Cipher Shan Chen, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger
2014/442 (PDF ) Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix Xing Hu, Chunming Tang
2014/441 (PDF ) Improved Generic Attacks Against Hash-based MACs and HAIFA Itai Dinur, Gaëtan Leurent
2014/440 (PDF ) Double Level Montgomery Cox-Rower Architecture, New Bounds Jean-Claude Bajard, Nabil Merkiche
2014/439 (PDF ) Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions Chunming Tang, Yuenai Chen
2014/438 (PDF ) Security of Symmetric Encryption against Mass Surveillance Mihir Bellare, Kenneth Paterson, Phillip Rogaway
2014/437 (PDF ) Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
2014/436 (PDF ) Synthesis of Fault Attacks on Cryptographic Implementations Gilles Barthe, Francois Dupressoir, Pierre-Alain Fouque, Benjamin Gregoire, Jean-Christophe Zapalowicz
2014/435 (PDF ) Wait a minute! A fast, Cross-VM attack on AES Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2014/434 (PDF ) Just a Little Bit More Joop van de Pol, Nigel P. Smart, Yuval Yarom
2014/433 (PDF ) A Statistical Model for Higher Order DPA on Masked Devices A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
2014/432 (PDF ) Universally Composable Authentication and Key-exchange with Global PKI Ran Canetti, Daniel Shahaf, Margarita Vald
2014/431 (PDF ) A Low-Latency, Low-Area Hardware Oblivious RAM Controller Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Dimitrios Serpanos, Srinivas Devadas
2014/430 (PDF ) Revisiting the Gentry-Szydlo Algorithm H. W. Lenstra, A. Silverberg
2014/429 (PDF ) Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
2014/428 (PDF ) Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More Nuttapong Attrapadung
2014/427 (PDF ) Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez
2014/426 (PDF ) Towards Optimally Efficient Secret-Key Authentication from PRG Ivan Damgård, Sunoo Park
2014/425 (PDF ) Note of Multidimensional MITM Attack on 25-Round TWINE-128 Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen
2014/424 (PDF ) Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants Craig Costello, Alyson Deines-Schartz, Kristin Lauter, Tonghai Yang
2014/423 (PDF ) The Hash Function "Fugue" Shai Halevi, William E. Hall, Charanjit S. Jutla
2014/422 (PDF ) System-level non-interference for constant-time cryptography Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
2014/421 (PDF ) FNR : Arbitrary length small domain block cipher proposal Sashank Dara, Scott Fluhrer
2014/420 (PDF ) Bounded Fully Homomorphic Signature Schemes Xiang Xie, Rui Xue
2014/419 (PDF ) FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve Jérémie Detrey
2014/418 (PDF ) A Simple Recursive Tree Oblivious RAM Benny Pinkas, Tzachy Reinman
2014/417 (PDF ) Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions Inna Polak, Adi Shamir
2014/416 (PDF ) Adaptive Security of Constrained PRFs Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao
2014/415 (PDF ) Virtual Proofs of Reality Ulrich Rührmair
2014/414 (PDF ) A Security Proof of KCDSA using an extended Random Oracle Model Vikram Singh
2014/413 (PDF ) On the Cost of Lazy Engineering for Masked Software Implementations Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert
2014/412 (PDF ) Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville
2014/411 (PDF ) Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices) Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar
2014/410 (PDF ) Soft Analytical Side-Channel Attacks Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2014/409 (PDF ) Moments-Correlating DPA Amir Moradi, François-Xavier Standaert
2014/408 (PDF ) Bootstrapping BGV Ciphertexts with a Wider Choice of p and q Emmanuela Orsini, Joop van de Pol, Nigel P. Smart
2014/407 (PDF ) Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin
2014/406 (PDF ) New Generic Attacks Against Hash-based MACs Gaëtan Leurent, Thomas Peyrin, Lei Wang
2014/405 (PDF ) Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input Chris Brzuska, Arno Mittelbach
2014/404 (PDF ) Large-Scale Secure Computation Elette Boyle, Kai-Min Chung, Rafael Pass
2014/403 (PDF ) Generic Universal Forgery Attack on Iterative Hash-based MACs Thomas Peyrin, Lei Wang
2014/402 (PDF ) On the Existence of Extractable One-Way Functions Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2014/401 (PDF ) Software implementation of an Attribute-Based Encryption scheme Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H. Sánchez-Ramírez, Tadanori Teruya, Francisco Rodríguez-Henríquez
2014/400 (PDF ) Composable Oblivious Extended Permutations Peeter Laud, Jan Willemson
2014/399 (PDF ) An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme Dustin Moody, Ray Perlner, Daniel Smith-Tone
2014/398 (PDF ) Differential Properties of the HFE Cryptosystem Taylor Daniels, Daniel Smith-Tone
2014/397 (PDF ) Cofactorization on Graphics Processing Units Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
2014/396 (PDF ) Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs Helger Lipmaa
2014/395 (PDF ) Lightweight and Privacy-Preserving Delegatable Proofs of Storage Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong
2014/394 (PDF ) Relational Hash Avradip Mandal, Arnab Roy
2014/393 (PDF ) (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
2014/392 (PDF ) The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
2014/391 (PDF ) MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
2014/390 (PDF ) Black-Box Non-Black-Box Zero Knowledge Vipul Goyal, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti
2014/389 (PDF ) Accelerating NTRU based Homomorphic Encryption using GPUs Wei Dai, Yarkın Doröz, Berk Sunar
2014/388 (PDF ) Finding collisions for MD4 hash algorithm using hybrid algorithm Marko Carić
2014/387 (PDF ) New candidates for multivariate trapdoor functions Jaiberth Porras, John B. Baena, Jintai Ding
2014/386 (PDF ) Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
2014/385 (PDF ) Jacobian Coordinates on Genus 2 Curves Huseyin Hisil, Craig Costello
2014/384 (PDF ) Yao's millionaires' problem and decoy-based public key encryption by classical physics Dima Grigoriev, Vladimir Shpilrain
2014/383 (PDF ) Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System Younsung Choi, Dongho Won
2014/382 (PDF ) Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation Felix Günther, Mark Manulis, Andreas Peter
2014/381 (PDF ) Using Indistinguishability Obfuscation via UCEs Chris Brzuska, Arno Mittelbach
2014/380 (PDF ) Efficient Adaptively Secure IBBE from Standard Assumptions Somindu C. Ramanna, Palash Sarkar
2014/379 (PDF ) Hyper-and-elliptic-curve cryptography Daniel J. Bernstein, Tanja Lange
2014/376 (PDF ) How Secure is Deterministic Encryption? Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
2014/375 (PDF ) Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version) Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2014/374 (PDF ) Optimal Contracts for Outsourced Computation Viet Pham, MHR. Khouzani, Carlos Cid
2014/373 (PDF ) Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes Philipp Jovanovic, Atul Luykx, Bart Mennink
2014/372 (PDF ) Fully secure constrained pseudorandom functions using random oracles Dennis Hofheinz
2014/371 (PDF ) On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche
2014/370 (PDF ) Compact VSS and Efficient Homomorphic UC Commitments Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen
2014/369 (PDF ) On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness Michèle Feltz, Cas Cremers
2014/368 (PDF ) Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster Erich Wenger, Paul Wolfger
2014/367 (PDF ) Redefining the Transparency Order Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff
2014/366 (PDF ) Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System Younsung Choi, Dongho Won
2014/365 (PDF ) Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer Luke Mather, Elisabeth Oswald, Carolyn Whitnall
2014/364 (PDF ) Deleting Secret Data with Public Verifiability Feng Hao, Dylan Clarke, Avelino Francisco Zorzo
2014/363 (PDF ) Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi
2014/362 (PDF ) Nothing is for Free: Security in Searching Shared & Encrypted Data Qiang Tang
2014/361 (PDF ) New Results in the Linear Cryptanalysis of DES Igor Semaev
2014/360 (PDF ) McEliece in the world of Escher Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev
2014/359 (PDF ) Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations Eduardo Ruiz Duarte, Octavio Páez Osuna
2014/358 (PDF ) A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won
2014/357 (PDF ) Simulatable Leakage: Analysis, Pitfalls, and new Constructions J. Longo Galea, D. Martin, E. Oswald, D. Page, M. Stam, M. Tunstall
2014/356 (PDF ) Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
2014/355 (PDF ) Graph-theoretic design and analysis of key predistribution schemes Michelle Kendall, Keith M. Martin
2014/354 (PDF ) Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes Ray Perlner
2014/353 (PDF ) Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
2014/352 (PDF ) Multi-Vendor PayWord with Payment Approval Andrea Huszti
2014/351 (PDF ) Secret and Verifiable Delegated Voting for Wide Representation Yefim Leifman
2014/350 (PDF ) Distributed Smooth Projective Hashing and its Application to Two-Server PAKE Franziskus Kiefer, Mark Manulis
2014/349 (PDF ) Zerocash: Decentralized Anonymous Payments from Bitcoin Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza
2014/348 (PDF ) A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards Helger Lipmaa
2014/347 (PDF ) One-Way Functions and (Im)perfect Obfuscation Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, Eylon Yogev
2014/346 (PDF ) Time-Memory Trade-offs for Index Calculus in Genus 3 Kim Laine, Kristin Lauter
2014/345 (PDF ) Private Database Access With HE-over-ORAM Architecture Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
2014/344 (PDF ) Toward Robust Hidden Volumes using Write-Only Oblivious RAM Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu
2014/343 (PDF ) Solving Linear Equations Modulo Unknown Divisors: Revisited Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin
2014/342 (PDF ) Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
2014/341 (PDF ) Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2014/340 (PDF ) A Strong and Efficient Certificateless Digital Signature Scheme Mohammed Alfateh Hassouna, Mohsin Hashim
2014/338 (PDF ) A Tamper and Leakage Resilient von Neumann Architecture Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
2014/337 (PDF ) Related Randomness Attacks for Public Key Encryption Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn
2014/336 (PDF ) Private Predictive Analysis on Encrypted Medical Data Joppe W. Bos, Kristin Lauter, Michael Naehrig
2014/335 (PDF ) SHADOW NUMBERS PUBLIC KEY ENCRYPTION John Almeida
2014/334 (PDF ) LCPR: High Performance Compression Algorithm for Lattice-Based Signatures Rachid El Bansarkhani, Johannes Buchmann
2014/333 (PDF ) An optimal representation for the trace zero subgroup Elisa Gorla, Maike Massierer
2014/332 (PDF ) How to Choose Interesting Points for Template Attacks? Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/331 (PDF ) Machine Learning Classification over Encrypted Data Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser
2014/330 (PDF ) Noncentralized Cryptocurrency wtih No Blockchain qianxiaochao
2014/329 (PDF ) Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers
2014/328 (PDF ) Affine-evasive Sets Modulo a Prime Divesh Aggarwal
2014/327 (PDF ) An Optimal Strong Password Authentication Protocol with USB Sticks Vikram D
2014/325 (PDF ) A practical forgery and state recovery attack on the authenticated cipher PANDA-s Xiutao FENG, Fan ZHANG, Hui WANG
2014/324 (PDF ) From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi
2014/323 (PDF ) Some Remarks on Honeyword Based Password-Cracking Detection Imran Erguler
2014/322 (PDF ) Coding Theoretic Construction of Quantum Ramp Secret Sharing Ryutaroh Matsumoto
2014/321 (PDF ) Efficient Quantum-Immune Keyless Signatures with Identity Ahto Buldas, Risto Laanoja, Ahto Truu
2014/320 (PDF ) Improved Differential Cryptanalysis of Round-Reduced Speck Itai Dinur
2014/319 (PDF ) Preimage attacks on Reduced-round Stribog Riham AlTawy, Amr M. Youssef
2014/318 (PDF ) Index calculus in the trace zero variety Elisa Gorla, Maike Massierer
2014/317 (PDF ) Analysis of NORX: Investigating Differential and Rotational Properties Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
2014/316 (PDF ) Explicit Non-Malleable Codes Resistant to Permutations Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/315 (PDF ) Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R Bartosz Zoltak
2014/314 (PDF ) Improved Leakage Model Based on Genetic Algorithm Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu
2014/313 (PDF ) On the Complexity of Finding Low-Level Solutions Bjoern Grohmann
2014/312 (PDF ) Structure-Preserving Signatures from Type II Pairings Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
2014/311 (PDF ) Exponent-inversion Signatures and IBE under Static Assumptions Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu Ming Yiu
2014/310 (PDF ) Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More Yu Chen, Qiong Huang, Zongyang Zhang
2014/309 (PDF ) Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption Craig Gentry, Allison Lewko, Amit Sahai, Brent Waters
2014/308 (PDF ) The Locality of Searchable Symmetric Encryption David Cash, Stefano Tessaro
2014/307 (PDF ) Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni
2014/306 (PDF ) Publicly Evaluable Pseudorandom Functions and Their Applications Yu Chen, Zongyang Zhang
2014/305 (PDF ) Collision Attack on 5 Rounds of Grøstl Florian Mendel, Vincent Rijmen, Martin Schläffer
2014/304 (PDF ) Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
2014/302 (PDF ) Branching Heuristics in Differential Collision Search with Applications to SHA-512 Maria Eichlseder, Florian Mendel, Martin Schläffer
2014/301 (PDF ) How to Avoid Obfuscation Using Witness PRFs Mark Zhandry
2014/300 (PDF ) On the Powers of 2 Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2014/299 (PDF ) Optimality of Non-Adaptive Strategies: The Case of Parallel Games Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2014/298 (PDF ) Torsion Limits and Riemann-Roch Systems for Function Fields and Applications Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2014/297 (PDF ) Pipelineable On-Line Encryption Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew, Jakob Wenzel
2014/296 (PDF ) Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding Andris Ambainis, Ansis Rosmanis, Dominique Unruh
2014/295 (PDF ) ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation Nir Bitansky, Omer Paneth
2014/294 (PDF ) The M3lcrypt Password Based Key Derivation Function Isaiah Makwakwa
2014/292 (PDF ) Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256 Leibo Li, Keting Jia
2014/291 (PDF ) Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗ Antonio Sanso
2014/290 (PDF ) Reliable Broadcast with Respect to Topology Knowledge Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2014/289 (PDF ) An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation Ivan Damgaard, Rasmus Lauritsen, Tomas Toft
2014/288 (PDF ) Resilient Aggregation in Simple Linear Sensor Networks Kevin J. Henry, Douglas R. Stinson
2014/287 (PDF ) Active and Passive Side-Channel Attacks on Delay Based PUF Designs Georg T. Becker, Raghavan Kumar
2014/286 (PDF ) Weaknesses of Password Authentication Scheme Based on Geometric Hashing Martin Stanek
2014/285 (PDF ) Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials David Derler, Christian Hanser, Daniel Slamanig
2014/284 (PDF ) Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way Rafail Ostrovsky, Alessandra Scafuro, Muthuramakrishnan Venkitasubramaniam
2014/283 (PDF ) Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems Nicolas Gama, Malika Izabachene, Phong Q. Nguyen, Xiang Xie
2014/282 (PDF ) On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation Ivan Damgård, Frédéric Dupuis, Jesper Buus Nielsen
2014/281 (PDF ) WCFB: a tweakable wide block cipher Andrey Jivsov
2014/280 (PDF ) MSEA: Modified Symmetric Encryption Algorithm Rajul Kumar, K. K. Mishra, Ashish Tripathi, Abhinav Tomar, Surendra Singh
2014/279 (PDF ) Improved Impossible Differential Attacks against Round-Reduced LBlock Christina Boura, Marine Minier, María Naya-Plasencia, Valentin Suder
2014/278 (PDF ) Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions Essam Ghadafi
2014/277 (PDF ) New Treatment of the BSW Sampling and Its Applications to Stream Ciphers Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi
2014/276 (PDF ) Design of identity-based digital signature schemes using extended chaotic maps SK Hafizul Islam
2014/275 (PDF ) Identity-based encryption and digital signature schemes using extended chaotic maps SK Hafizul Islam
2014/274 (PDF ) A note on the construction of pairing-friendly elliptic curves for composite order protocols Sorina Ionica, Malika Izabachène
2014/273 (PDF ) Witness Encryption from Instance Independent Assumptions Craig Gentry, Allison Bishop Lewko, Brent Waters
2014/272 (PDF ) Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
2014/271 (PDF ) STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation Markku-Juhani O. Saarinen
2014/270 (PDF ) Faster Maliciously Secure Two-Party Computation Using the GPU Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen
2014/269 (PDF ) Chosen Ciphertext Security via Point Obfuscation Takahiro Matsuda, Goichiro Hanaoka
2014/268 (PDF ) New bit-parallel Montgomery multiplier for trinomials using squaring operation Yin Li, Yiyang Chen
2014/267 (PDF ) Differential Fault Analysis on the families of SIMON and SPECK ciphers Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
2014/266 (PDF ) ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wojcik
2014/265 (PDF ) Dual System Groups and its Applications --- Compact HIBE and More Jie Chen, Hoeteck Wee
2014/264 (PDF ) Continuous After-the-fact Leakage-Resilient Key Exchange (full version) Janaka Alawatugoda, Colin Boyd, Douglas Stebila
2014/263 (PDF ) A Generic Scan Attack on Hardware based eStream Winners Sandip Karmakar, Dipanwita Roy Chowdhury
2014/262 (PDF ) Differential Fault Analysis of MICKEY Family of Stream Ciphers Sandip Karmakar, Dipanwita Roy Chowdhury
2014/261 (PDF ) Fault Analysis of Grain Family of Stream Ciphers Sandip Karmakar, Dipanwita Roy Chowdhury
2014/260 (PDF ) Locally Decodable Codes for edit distance Rafail Ostrovsky, Anat Paskin-Cherniavsky
2014/259 (PDF ) Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2014/258 (PDF ) A realtime key recovery attack on the authenticated cipher FASER128 Xiutao FENG, Fan ZHANG
2014/257 (PDF ) Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem Bruce Kallick
2014/256 (PDF ) Private and Dynamic Time-Series Data Aggregation with Trust Relaxation Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
2014/255 (PDF ) Certification and Efficient Proofs of Committed Topology Graphs Thomas Gross
2014/254 (PDF ) Enhanced Lattice-Based Signatures on Reconfigurable Hardware Thomas Pöppelmann, Lëo Ducas, Tim Güneysu
2014/252 (PDF ) Making RSA-PSS Provably Secure Against Non-Random Faults Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014/251 (PDF ) Forgery on Stateless CMCC Guy Barwell
2014/250 (PDF ) Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme Boaz Tsaban, Noam Lifshitz
2014/249 (PDF ) Linear Extension Cube Attack on Stream Ciphers Liren Ding, Yongjuan Wang, Zhufeng Li
2014/248 (PDF ) Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2014/247 (PDF ) Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange Ivan Pryvalov, Aniket Kate
2014/246 (PDF ) Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme Kwangsu Lee, Dong Hoon Lee
2014/245 (PDF ) A practical state recovery attack on the stream cipher Sablier v1 Xiutao FENG, Fan ZHANG
2014/244 (PDF ) bitcoin.BitMint: Reconciling Bitcoin with Central Banks Gideon Samid
2014/243 (PDF ) Reusable Fuzzy Extractors for Low-Entropy Distributions Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith
2014/242 (PDF ) Zero-Knowledge Password Policy Checks and Verifier-Based PAKE Franziskus Kiefer, Mark Manulis
2014/240 (PDF ) Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries Martin Pettai, Peeter Laud
2014/239 (PDF ) Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5 Florian Legendre, Gilles Dequen, Michaël Krajecki
2014/238 (PDF ) High Parallel Complexity Graphs and Memory-Hard Functions Joël Alwen, Vladimir Serbinenko
2014/237 (PDF ) SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs Aydin Aysu, Ege Gulcan, Patrick Schaumont
2014/236 (PDF ) Linear Sequential Circuit Approximation of Acterbahn Stream Cipher Shazia Afreen
2014/235 (PDF ) Efficient Fuzzy Search on Encrypted Data Alexandra Boldyreva, Nathan Chenette
2014/234 (PDF ) Enhancing Oblivious RAM Performance Using Dynamic Prefetching Xiangyao Yu, Ling Ren, Christopher Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas
2014/233 (PDF ) Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar
2014/232 (PDF ) Bandwidth Efficient PIR from NTRU Yarkın Doröz, Berk Sunar, Ghaith Hammouri
2014/231 (PDF ) Self-Updatable Encryption with Short Public Parameters and Its Extensions Kwangsu Lee
2014/230 (PDF ) Isogeny graphs with maximal real multiplication Sorina Ionica, Emmanuel Thomé
2014/228 (PDF ) Cryptanalysis of SP Networks with Partial Non-Linear Layers Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban
2014/226 (PDF ) Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, Elmar Tischhauser
2014/225 (PDF ) Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption Tapas Pandit, Rana Barua
2014/224 (PDF ) Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices Henry Carter, Charles Lever, Patrick Traynor
2014/223 (PDF ) Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 Léo Perrin, Dmitry Khovratovich
2014/222 (PDF ) Optimizing Obfuscation: Avoiding Barrington's Theorem Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai
2014/221 (PDF ) Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations Toomas Krips, Jan Willemson
2014/220 (PDF ) Total Break of Zorro using Linear and Differential Attacks Shahram Rasoolzadeh, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2014/219 (PDF ) Dynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter
2014/218 (PDF ) A Practical Universal Forgery Attack against PAES-8 Yu Sasaki, Lei Wang
2014/217 (PDF ) A Forgery Attack against PANDA-s Yu Sasaki, Lei Wang
2014/216 (PDF ) Implementation and Improvement of the Partial Sum Attack on 6-round AES Francesco Aldà, Riccardo Aragona, Lorenzo Nicolodi, Massimiliano Sala
2014/215 (PDF ) Attack On the Markov Problem James L. Adams
2014/214 (PDF ) Squaring Algorithms with Delayed Carry Method and Efficient Parallelization Vladislav Kovtun, Andrew Okhrimenko
2014/213 (PDF ) Secret-Sharing for NP Ilan Komargodski, Moni Naor, Eylon Yogev
2014/212 (PDF ) Remarks on the Pocklington and Padró-Sáez Cube Root Algorithm in $\mathbb F_q$ Geon Heo, Seokhwan Choi, Kwang Ho Lee, Namhun Koo, Soonhak Kwon
2014/211 (PDF ) Some Randomness Experiments on TRIVIUM Subhabrata Samajder, Palash Sarkar
2014/210 (PDF ) Structural Cryptanalysis of McEliece Schemes with Compact Keys Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
2014/209 (PDF ) A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung
2014/208 (PDF ) Offline Dictionary Attack on Password Authentication Schemes using Smart Cards Ding Wang, Ping Wang
2014/207 (PDF ) Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption Katsuyuki Takashima
2014/206 (PDF ) Reconsidering Generic Composition Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
2014/205 (PDF ) Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness Ling Ren, Christopher Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas
2014/204 (PDF ) ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research Colin O'Flynn, Zhizhang (David) Chen
2014/203 (PDF ) Privacy-Preserving Implicit Authentication Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak F. Shahandashti
2014/202 (PDF ) Efficiently Verifiable Computation on Encrypted Data Dario Fiore, Rosario Gennaro, Valerio Pastro
2014/201 (PDF ) From Input Private to Universally Composable Secure Multiparty Computation Primitives Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen
2014/200 (PDF ) Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
2014/199 (PDF ) Doubly Spatial Encryption from DBDH Jie Chen, Hoeteck Wee
2014/198 (PDF ) Fast GPGPU-Based Elliptic Curve Scalar Multiplication Eric M. Mahé, Jean-Marie Chauvet
2014/197 (PDF ) Breaking POET Authentication with a Single Query Jian Guo, Jérémy Jean, Thomas Peyrin, Wang Lei
2014/195 (PDF ) Low Overhead Broadcast Encryption from Multilinear Maps Dan Boneh, Brent Waters, Mark Zhandry
2014/194 (PDF ) Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols Sai Raghu Talluri, Swapnoneel Roy
2014/193 (PDF ) JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri
2014/192 (PDF ) Two-sources Randomness Extractors for Elliptic Curves Abdoul Aziz Ciss
2014/191 (PDF ) Side-Channel Analysis on Blinded Regular Scalar Multiplications Benoit Feix, Mylène Roussellet, Alexandre Venelli
2014/190 (PDF ) The Temperature Side Channel and Heating Fault Attacks Michael Hutter, Jörn-Marc Schmidt
2014/189 (PDF ) Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
2014/188 (PDF ) A Second Look at Fischlin's Transformation Özgür Dagdelen, Daniele Venturi
2014/187 (PDF ) FFT-Based Key Recovery for the Integral Attack Yosuke Todo
2014/186 (PDF ) AES-Based Authenticated Encryption Modes in Parallel High-Performance Software Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
2014/185 (PDF ) Oblivious Data Structures Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang
2014/184 (PDF ) SETUP in Secret Sharing Schemes using Random Values Ruxandra F. Olimid
2014/183 (PDF ) Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs Tetsu Iwata, Lei Wang
2014/182 (PDF ) Proving the TLS Handshake Secure (as it is) Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella-Béguelin
2014/181 (PDF ) A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
2014/179 (PDF ) Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs Maura B. Paterson, Douglas R. Stinson
2014/178 (PDF ) Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data Qingji Zheng, Shouhuai Xu
2014/177 (PDF ) Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES Valentina Banciu, Elisabeth Oswald
2014/175 (PDF ) Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms T. D. B Weerasinghe
2014/174 (PDF ) Analysis of a Modified RC4 Algorithm T. D. B Weerasinghe
2014/173 (PDF ) Continuous Non-malleable Codes Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
2014/171 (PDF ) An Effective RC4 Stream Cipher T. D. B Weerasinghe
2014/170 (PDF ) Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256 Shay Gueron
2014/169 (PDF ) Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
2014/168 (PDF ) Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond Scott Coull, Kevin Dyer
2014/167 (PDF ) How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs
2014/166 (PDF ) Tuple decoders for traitor tracing schemes Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
2014/164 (PDF ) Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters Yuriy Tarannikov
2014/163 (PDF ) Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices Arnaud Dambra, Philippe Gaborit, Mylène Roussellet, Julien Schrek, Nicolas Tafforeau
2014/162 (PDF ) TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES Hu Xiong
2014/161 (PDF ) ``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
2014/160 (PDF ) TrueSet: Faster Verifiable Set Computations Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos
2014/159 (PDF ) Weak-Key Leakage Resilient Cryptography Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan
2014/158 (PDF ) Point compression for the trace zero subgroup over a small degree extension field Elisa Gorla, Maike Massierer
2014/157 (PDF ) CLOC: Authenticated Encryption for Short Input Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
2014/156 (PDF ) Non-Malleable Extractors with Shorter Seeds and Their Applications Yanqing Yao, Zhoujun Li
2014/155 (PDF ) Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels, Thomas Ristenpart
2014/153 (PDF ) Verifiable Oblivious Storage Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
2014/152 (PDF ) A Statistics-based Fundamental Model for Side-channel Attack Analysis Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang
2014/151 (PDF ) Security Analysis of Key-Alternating Feistel Ciphers Rodolphe Lampe, Yannick Seurin
2014/149 (PDF ) Millions of Millionaires: Multiparty Computation in Large Networks Mahdi Zamani, Mahnush Movahedi, Jared Saia
2014/148 (PDF ) Outsourcing Private RAM Computation Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
2014/147 (PDF ) The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields Razvan Barbulescu, Cécile Pierrot
2014/146 (PDF ) Untappable communication channels over optical fibers from quantum-optical noise Geraldo A. Barbosa, Jeroen van de Graaf
2014/144 (PDF ) How to Securely Release Unverified Plaintext in Authenticated Encryption Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
2014/143 (PDF ) Statistical Concurrent Non-Malleable Zero Knowledge Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
2014/140 (PDF ) Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack Yuval Yarom, Naomi Benger
2014/139 (PDF ) On the Phase Space of Block-Hiding Strategies Assaf Shomer
2014/138 (PDF ) Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction Jae Hong Seo
2014/137 (PDF ) Efficient, Oblivious Data Structures for MPC Marcel Keller, Peter Scholl
2014/136 (PDF ) Isolated Execution on Many-core Architectures Ramya Jayaram Masti, Devendra Rai, Claudio Marforio, Srdjan Capkun
2014/135 (PDF ) Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
2014/134 (PDF ) Kummer strikes back: new DH speed records Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe
2014/133 (PDF ) Efficient Secure and Verifiable Outsourcing of Matrix Multiplications Yihua Zhang, Marina Blanton
2014/132 (PDF ) Efficient Revocable Identity-Based Encryption via Subset Difference Methods Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park
2014/131 (PDF ) Modelling After-the-fact Leakage for Key Exchange Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014/130 (PDF ) Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig
2014/129 (PDF ) How to Use Bitcoin to Design Fair Protocols Iddo Bentov, Ranjit Kumaresan
2014/128 (PDF ) Efficient Three-Party Computation from Cut-and-Choose Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas
2014/127 (PDF ) Algebraic Properties of Modular Addition Modulo a Power of Two S. M. Dehnavi, Alireza Rahimipour
2014/125 (PDF ) Removing Erasures with Explainable Hash Proof Systems Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/124 (PDF ) On the Information Ratio of Non-Perfect Secret Sharing Schemes Oriol Farràs, Torben Brandt Hansen, Tarik Kaced, Carles Padró
2014/123 (PDF ) FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes Mohammad Sadeq Dousti, Rasool Jalili
2014/122 (PDF ) New Way to Construct Cryptographic Hash Function WANG Yong
2014/121 (PDF ) Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation Koki Hamada, Dai Ikarashi, Koji Chida, Katsumi Takahashi
2014/120 (PDF ) Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version) Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
2014/119 (PDF ) Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$) Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2014/118 (PDF ) Quantum position verification in the random oracle model Dominique Unruh
2014/117 (PDF ) An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems Bjoern Grohmann
2014/116 (PDF ) Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model Ronald Cramer, Carles Padrö, Chaoping Xing
2014/115 (PDF ) Comments on a novel user authentication and key agreement scheme Jia-Lun Tsai
2014/114 (PDF ) Prover Anonymous and Deniable Distance-Bounding Authentication Sebastien Gambs, Cristina Onete, Jean-Marc Robert
2014/113 (PDF ) Secure Compression: Theory \& Practice James Kelley, Roberto Tamassia
2014/112 (PDF ) Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
2014/111 (PDF ) A Note on the CLRW2 Tweakable Block Cipher Construction Gordon Procter
2014/110 (PDF ) Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box Sourav Das
2014/109 (PDF ) Diffusion Programmable Device : The device to prevent reverse engineering Mitsuru Shiozaki, Ryohei Hori, Takeshi Fujino
2014/108 (PDF ) MJH: A Faster Alternative to MDC-2 Jooyoung Lee, Martijn Stam
2014/107 (PDF ) Key-Indistinguishable Message Authentication Codes Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
2014/106 (PDF ) Algorithms in HElib Shai Halevi, Victor Shoup
2014/105 (PDF ) Reducing the Overhead of MPC over a Large Population Ashish Choudhury, Arpita Patra, Nigel P. Smart
2014/104 (PDF ) Space-efficient, byte-wise incremental and perfectly private encryption schemes Kévin Atighehchi
2014/103 (PDF ) SHipher: Families of Block Ciphers based on SubSet-Sum Problem Xiali Hei, Binheng Song
2014/102 (PDF ) Actively Secure Private Function Evaluation Payman Mohassel, Saeed Sadeghian, Nigel P. Smart
2014/101 (PDF ) Dishonest Majority Multi-Party Computation for Binary Circuits Enrique Larraia, Emmanuela Orsini, Nigel P. Smart
2014/100 (PDF ) Improved Slender-set Linear Cryptanalysis Guo-Qiang Liu, Chen-Hui Jin, Chuan-Da Qi
2014/099 (PDF ) Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources Chris Brzuska, Pooya Farshim, Arno Mittelbach
2014/098 (PDF ) Towards Characterizing Complete Fairness in Secure Two-Party Computation Gilad Asharov
2014/097 (PDF ) Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory Koji Nuida
2014/096 (PDF ) Tight security bounds for multiple encryption Yuanxi Dai, John Steinberger
2014/095 (PDF ) Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
2014/094 (PDF ) Faster Bootstrapping with Polynomial Error Jacob Alperin-Sheriff, Chris Peikert
2014/093 (PDF ) The Related-Key Analysis of Feistel Constructions Manuel Barbosa, Pooya Farshim
2014/092 (PDF ) A new class of system oriented PKC, K(I)SOPKC. Masao KASAHARA
2014/091 (PDF ) On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2014/090 (PDF ) Cryptanalysis of KLEIN (Full version) Virginie Lallemand, María Naya-Plasencia
2014/089 (PDF ) Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version) Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard
2014/088 (PDF ) A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing Himanshu Tyagi, Shun Watanabe
2014/087 (PDF ) AnoA: A Framework For Analyzing Anonymous Communication Protocols Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi
2014/086 (PDF ) Randomized and Efficient Authentication in Mobile Environments Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
2014/085 (PDF ) Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer Aleksandra Mileva
2014/084 (PDF ) RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede
2014/083 (PDF ) Garbled RAM Revisited, Part II Steve Lu, Rafail Ostrovsky
2014/082 (PDF ) Garbled RAM Revisited, Part I Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
2014/081 (PDF ) Efficient Round Optimal Blind Signatures Sanjam Garg, Divya Gupta
2014/080 (PDF ) A Full Characterization of Completeness for Two-party Randomized Function Evaluation Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
2014/079 (PDF ) Unifying Leakage Models: from Probing Attacks to Noisy Leakage Alexandre Duc, Stefan Dziembowski, Sebastian Faust
2014/078 (PDF ) Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers Ahmad Boorghany, Rasool Jalili
2014/077 (PDF ) Mixcoin: Anonymity for Bitcoin with accountable mixes Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten
2014/076 (PDF ) Certified Bitcoins Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
2014/075 (PDF ) Publicly Auditable Secure Multi-Party Computation Carsten Baum, Ivan Damgård, Claudio Orlandi
2014/074 (PDF ) New and Improved Key-Homomorphic Pseudorandom Functions Abhishek Banerjee, Chris Peikert
2014/073 (PDF ) Anonymous Authentication with Shared Secrets Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
2014/072 (PDF ) Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann
2014/071 (PDF ) Implementing Pairing-Based Cryptosystems in USB Tokens Zhaohui Cheng
2014/070 (PDF ) Lattice Cryptography for the Internet Chris Peikert
2014/069 (PDF ) One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks Manoj Ranjan Mishra, Jayaprakash Kar, Banshidhar Majhi
2014/068 (PDF ) Some security bounds for the DGHV scheme Franca Marinelli, Riccardo Aragona, Chiara Marcolla, Massimiliano Sala
2014/067 (PDF ) Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey
2014/066 (PDF ) A Subexponential Construction of Graph Coloring for Multiparty Computation Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld
2014/065 (PDF ) Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case Palash Sarkar, Shashank Singh
2014/064 (PDF ) A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems Alain Couvreur, Irene Márquez-Corbella, Ruud Pellikaan
2014/063 (PDF ) Cryptanalysis on “Secure untraceable off-line electronic cash system” Yalin Chen, Jue-Sam Chou
2014/062 (PDF ) A Comparison of the Homomorphic Encryption Schemes FV and YASHE Tancrède Lepoint, Michael Naehrig
2014/061 (PDF ) Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts Stefano Tessaro, David A. Wilson
2014/060 (PDF ) Verifiable Computation in Multiparty Protocols with Honest Majority Peeter Laud, Alisa Pankova
2014/059 (PDF ) Cuckoo Cycle: a memory bound graph-theoretic proof-of-work John Tromp
2014/058 (PDF ) Cryptanalysis of FIDES Itai Dinur, Jérémy Jean
2014/057 (PDF ) Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
2014/056 (PDF ) Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
2014/055 (PDF ) Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Younsung Choi
2014/054 (PDF ) The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions Sugata Gangopadhyay, Pantelimon Stanica
2014/053 (PDF ) Masking and Leakage-Resilient Primitives: One, the Other(s) or Both? Sonia Belaïd, Vincent Grosso, François-Xavier Standaert
2014/052 (PDF ) DAA-related APIs in TPM2.0 Revisited Li Xi
2014/051 (PDF ) An Equivalence-Preserving Transformation of Shift Registers Elena Dubrova
2014/050 (PDF ) Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication Daniel R. L. Brown
2014/049 (PDF ) Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography Neha tirthani, Ganesan R
2014/048 (PDF ) When a Boolean Function can be Expressed as the Sum of two Bent Functions Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li
2014/047 (PDF ) Down the Rabbit Hole: Revisiting the Shrinking Method Vivien Dubois
2014/046 (PDF ) Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking” Yalin Chen, Jue-Sam Chou
2014/045 (PDF ) Human Assisted Randomness Generation Using Video Games Mohsen Alimomeni, Reihaneh Safavi-Naini
2014/044 (PDF ) rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval Lichun Li, Michael Militzer, Anwitaman Datta
2014/043 (PDF ) Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings Mehdi Tibouchi
2014/042 (PDF ) A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem Jintai Ding, Chengdong Tao
2014/041 (PDF ) Cryptanalysis via algebraic spans Adi Ben-Zvi, Arkadius Kalka, Boaz Tsaban
2014/040 (PDF ) A Fast Modular Reduction Method Zhengjun Cao, Ruizhong Wei, Xiaodong Lin
2014/039 (PDF ) Homomorphic AES Evaluation using NTRU Yarkin Doroz, Yin Hu, Berk Sunar
2014/038 (PDF ) Extending and Applying a Framework for the Cryptographic Verification of Java Programs. Ralf Kuesters, Enrico Scapin, Tomasz Truderung, Juergen Graf
2014/037 (PDF ) On the Security of the Pre-Shared Key Ciphersuites of TLS Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk
2014/036 (PDF ) A Secure Text Messaging Protocol Gary Belvin
2014/035 (PDF ) A new attack on RSA with a composed decryption exponent Abderrahmane Nitaj, Mohamed Ould Douh
2014/034 (PDF ) Authenticated Encryption with SPECK Chase Manny
2014/033 (PDF ) Lattice-based Group Signature Scheme with Verier-local Revocation Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang
2014/032 (PDF ) Scale-Invariant Fully Homomorphic Encryption over the Integers Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
2014/031 (PDF ) On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results Yongge Wang
2014/030 (PDF ) Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplicio Jr.
2014/029 (PDF ) General Impossibility of Group Homomorphic Encryption in the Quantum World Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
2014/028 (PDF ) Channel Equalization for Side Channel Attacks Colin O'Flynn, Zhizhang (David) Chen
2014/027 (PDF ) Twisting Edwards curves with isogenies Mike Hamburg
2014/026 (PDF ) Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba
2014/025 (PDF ) Side-Channel Leakage through Static Power – Should We Care about in Practice? – Amir Moradi
2014/024 (PDF ) An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation Ivan Damgård, Jesper Buus Nielsen
2014/023 (PDF ) Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle Gengran Hu, Yanbin Pan, Feng Zhang
2014/022 (PDF ) Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR Sourav Das
2014/021 (PDF ) Online/Offline Attribute-Based Encryption Susan Hohenberger, Brent Waters
2014/020 (PDF ) (De-)Constructing TLS Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Bjoern Tackmann, Daniele Venturi
2014/019 (PDF ) Lazy Modulus Switching for the BKW Algorithm on LWE Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2014/018 (PDF ) Completeness for Symmetric Two-Party Functionalities - Revisited Yehuda Lindell, Eran Omri, Hila Zarosim
2014/016 (PDF ) Triple and Quadruple Encryption: Bridging the Gaps Bart Mennink, Bart Preneel
2014/015 (PDF ) Tight Security Bounds for Triple Encryption Jooyoung Lee
2014/014 (PDF ) Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes Felix Günther, Bertram Poettering
2014/012 (PDF ) Maximal Information Coefficient Analysis Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
2014/011 (PDF ) Construction of New Families of MDS Diffusion Layers S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2014/010 (PDF ) A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
2014/009 (PDF ) Characterization of EME with Linear Mixing Nilanjan Datta, Mridul Nandi
2014/008 (PDF ) A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis Annelie Heuser, Olivier Rioul, Sylvain Guilley
2014/007 (PDF ) One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner. Ethan Heilman
2014/006 (PDF ) Efficient Non-Interactive Zero Knowledge Arguments for Set Operations Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
2014/004 (PDF ) MaxMinMax problem and sparse equations over finite fields Igor Semaev
2014/003 (PDF ) $GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials Xi Xiong, Haining Fan
2014/002 (PDF ) Pseudorandom Generator Based on Hard Lattice Problem Kuan Cheng
2014/001 (PDF ) Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks Yalin Chen, Jue-Sam Chou
2013/882 (PDF ) New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers Zhe Liu, Johann Großschädl
2013/881 (PDF ) Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky, Aviv Zohar
2013/880 (PDF ) New Constructions of Revocable Identity-Based Encryption from Multilinear Maps Seunghwan Park, Kwangsu Lee, Dong Hoon Lee
2013/879 (PDF ) Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
2013/878 (PDF ) Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng
2013/877 (PDF ) MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
2013/876 (PDF ) Public-Key Encryption with Lazy Parties Kenji Yasunaga
2013/875 (PDF ) Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE Michael Clear, Ciaran McGoldrick
2013/874 (PDF ) General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga
2013/873 (PDF ) Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation Mihir Bellare, Igors Stepanovs, Stefano Tessaro
2013/871 (PDF ) A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities Weiqiang Wen, Libin Wang, Jiaxin Pan
2013/870 (PDF ) A new class of hyper-bent functions and Kloosterman sums Chunming Tang, Yanfeng Qi
2013/869 (PDF ) How to Fake Auxiliary Input Dimitar Jetchev, Krzysztof Pietrzak
2013/868 (PDF ) Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack
2013/867 (PDF ) LHash: A Lightweight Hash Function (Full Version) Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong
2013/866 (PDF ) Compact Ring-LWE based Cryptoprocessor Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede
2013/865 (PDF ) SNR to Success Rate: Reaching the Limit of Non-Profiling DPA Suvadeep Hajra, Debdeep Mukhopadhyay
2013/864 (PDF ) Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs Adam Smith, Ye Zhang
2013/863 (PDF ) Formal Treatment of Distributed Trust in Electronic Voting Stephan Neumann, Melanie Volkamer
2013/862 (PDF ) How to Delegate Computations: The Power of No-Signaling Proofs Yael Tauman Kalai, Ran Raz, Ron D. Rothblum
2013/861 (PDF ) Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments Muhammad Rizwan Asghar
2013/860 (PDF ) On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs
2013/859 (PDF ) Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
2013/858 (PDF ) Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications Sherman S. M. Chow, Matthew Franklin, Haibin Zhang
2013/857 (PDF ) RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis Daniel Genkin, Adi Shamir, Eran Tromer
2013/856 (PDF ) Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
2013/855 (PDF ) Weaknesses in a Recently Proposed RFID Authentication Protocol Mete Akgün, M. Ufuk Çaǧlayan
2013/854 (PDF ) Multiple-Use Transferable E-Cash Pratik Sarkar
2013/853 (PDF ) Automatic Search for Differential Trails in ARX Ciphers (Extended Version) Alex Biryukov, Vesselin Velichkov
2013/852 (PDF ) Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256 Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
2013/851 (PDF ) Power and Timing Side Channels for PUFs and their Efficient Exploitation Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson
2013/850 (PDF ) Secure Floating-Point Arithmetic and Private Satellite Collision Analysis Liina Kamm, Jan Willemson
2013/849 (PDF ) Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model Suvadeep Hajra, Debdeep Mukhopadhyay
2013/848 (PDF ) Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols Xi-Jun Lin, Lin Sun
2013/845 (PDF ) How to Keep a Secret: Leakage Deterring Public-key Cryptography Aggelos Kiayias, Qiang Tang
2013/844 (PDF ) A generic view on trace-and-revoke broadcast encryption schemes Dennis Hofheinz, Christoph Striecks
2013/843 (PDF ) A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues Jian Ye, Chenglian Liu
2013/842 (PDF ) Detecting Hidden Leakages Amir Moradi, Sylvain Guilley, Annelie Heuser
2013/841 (PDF ) Trust Views for the Web PKI Johannes Braun, Florian Volk, Johannes Buchmann, Max Mühlhäuser
2013/840 (PDF ) (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong Sheng Zhou
2013/839 (PDF ) Lattice Decoding Attacks on Binary LWE Shi Bai, Steven D. Galbraith
2013/838 (PDF ) An improved compression technique for signatures based on learning with errors Shi Bai, Steven D. Galbraith
2013/837 (PDF ) Fair Two-Party Computations via Bitcoin Deposits Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
2013/836 (PDF ) Identity-Based Key-Encapsulation Mechanism from Multilinear Maps Hao Wang, Lei Wu, Zhihua Zheng, Yilei Wang
2013/835 (PDF ) A Modular Framework for Building Variable-Input Length Tweakable Ciphers Thomas Shrimpton, R. Seth Terashima
2013/834 (PDF ) Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas, Andres Kroonmaa, Risto Laanoja
2013/833 (PDF ) Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda, David Pointcheval
2013/832 (PDF ) Practical Dynamic Searchable Encryption with Small Leakage Emil Stefanov, Charalampos Papamanthou, Elaine Shi
2013/831 (PDF ) Provable Security Proofs and their Interpretation in the Real World Vikram Singh
2013/830 (PDF ) Property Preserving Symmetric Encryption Revisited Sanjit Chatterjee, M. Prem Laxman Das
2013/829 (PDF ) Is Bitcoin a Decentralized Currency? Arthur Gervais, Ghassan Karame, Srdjan Capkun, Vedran Capkun
2013/828 (PDF ) Decentralized Traceable Attribute-Based Signatures Ali El Kaafarani, Essam Ghadafi, Dalia Khader
2013/827 (PDF ) Lower Bounds in the Hardware Token Model Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen
2013/826 (PDF ) Secure multi-party data analysis: end user validation and practical experiments Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt
2013/824 (PDF ) Fair and Efficient Secure Multiparty Computation with Reputation Systems Gilad Asharov, Yehuda Lindell, Hila Zarosim
2013/823 (PDF ) Another Look at XCB Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar
2013/822 (PDF ) Leakage Resilient Fully Homomorphic Encryption Alexandra Berkoff, Feng-Hao Liu
2013/819 (PDF ) Safe enclosures: towards cryptographic techniques for server protection Sergiu Bursuc, Julian P. Murphy
2013/818 (PDF ) On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography Roberto De Prisco, Alfredo De Santis
2013/817 (PDF ) Interactive Encryption and Message Authentication Yevgeniy Dodis, Dario Fiore
2013/816 (PDF ) Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes Shay Gueron, Vlad Krasnov
2013/815 (PDF ) Iterated group products and leakage resilience against NC^1 Eric Miles
2013/814 (PDF ) RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
2013/813 (PDF ) Multi-ciphersuite security of the Secure Shell (SSH) protocol Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila
2013/812 (PDF ) A Note on Bilinear Groups of a Large Composite Order Zhengjun Cao, Lihua Liu
2013/811 (PDF ) Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
2013/810 (PDF ) Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack Pablo Rauzy, Sylvain Guilley
2013/809 (PDF ) Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk
2013/808 (PDF ) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
2013/807 (PDF ) Distributed Key Generation for Secure Encrypted Deduplication Yitao Duan
2013/806 (PDF ) Efficient (Anonymous) Compact HIBE From Standard Assumptions Somindu C. Ramanna, Palash Sarkar
2013/805 (PDF ) Proofs of Space: When Space is of the Essence Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi
2013/804 (PDF ) Group Signature with relaxed-privacy and revocability for VANET Mohammad Saiful Islam Mamun, Atsuko Miyaji
2013/803 (PDF ) Fully, (Almost) Tightly Secure IBE from Standard Assumptions Jie Chen, Hoeteck Wee
2013/802 (PDF ) Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng
2013/801 (PDF ) Authenticating Computation on Groups: New Homomorphic Primitives and Applications Dario Catalano, Antonio Marcedone, Orazio Puglisi
2013/800 (PDF ) Algebraic Properties of the Cube Attack Frank-M. Quedenfeld, Christopher Wolf
2013/799 (PDF ) New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography Gilles Macario-Rat, Jérôme Plût, Henri Gilbert
2013/797 (PDF ) Tamper Resilient Circuits: The Adversary at the Gates Aggelos Kiayias, Yiannis Tselekounis
2013/796 (PDF ) Proofs of Space Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
2013/795 (PDF ) Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications Xi-Jun Lin, Lin Sun
2013/794 (PDF ) Behind the Scene of Side Channel Attacks Victor Lomné, Emmanuel Prouff, Thomas Roche
2013/793 (PDF ) A fast integer-based batch full-homomorphic encryption scheme over finite field Long Zhang, Qiuling Yue
2013/792 (PDF ) Improved Authenticity Bound of EAX, and Refinements Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata
2013/791 (PDF ) APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
2013/790 (PDF ) Parallelizable and Authenticated Online Ciphers Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda
2013/789 (PDF ) Proofs of Data Possession and Retrievability Based on MRD Codes Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu
2013/788 (PDF ) Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis Zhengjun Cao, Lihua Liu
2013/787 (PDF ) Wide-weak Privacy Preserving RFID Mutual Authentication Protocol Raghuvir Songhela, Manik Lal Das
2013/786 (PDF ) Tree Based Symmetric Key Broadcast Encryption Sanjay Bhattacherjee, Palash Sarkar
2013/785 (PDF ) Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model Fei Tang, Hongda Li, Qihua Niu, Bei Liang
2013/784 (PDF ) Secure Multiparty Computations on Bitcoin Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
2013/783 (PDF ) ECC-Based Non-Interactive Deniable Authentication with Designated Verifier Yalin Chen, Jue-Sam Chou
2013/782 (PDF ) How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? Dorit Ron, Adi Shamir
2013/781 (PDF ) Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings Rafael Pass, Karn Seth, Sidharth Telang
2013/780 (PDF ) A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester Nasser Ramazani Darmian
2013/779 (PDF ) Distributed Group Authentication for RFID Supply Management Mike Burmester, Jorge Munilla
2013/778 (PDF ) Multi-Stage Fault Attacks on Block Ciphers Philipp Jovanovic, Martin Kreuzer, Ilia Polian
2013/777 (PDF ) Construction of Multiplicative Monotone Span Program Yuenai Chen, Chunming Tang
2013/776 (PDF ) Location Leakage in Distance Bounding: Why Location Privacy does not Work Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay
2013/775 (PDF ) Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu
2013/774 (PDF ) Multi-Input Functional Encryption S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2013/773 (PDF ) CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions Markku-Juhani O. Saarinen
2013/772 (PDF ) Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen
2013/771 (PDF ) TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen, Shaohua Tang
2013/770 (PDF ) Efficient Template Attacks Omar Choudary, Markus G. Kuhn
2013/769 (PDF ) Broadcast Amplification Martin Hirt, Ueli Maurer, Pavel Raykov
2013/768 (PDF ) VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4 Bartosz Zoltak
2013/767 (PDF ) Misuse Resistant Parallel Authenticated Encryptions Nilanjan Datta, Mridul Nandi
2013/766 (PDF ) RankSign : an efficient signature algorithm based on the rank metric P. Gaborit, O. Ruatta, J. Schrek, G. Zémor
2013/765 (PDF ) Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More Kaoru Kurosawa, Le Trieu Phong
2013/764 (PDF ) Dynamic Countermeasure Against the Zero Power Analysis Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
2013/763 (PDF ) Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting Yutaka Kawai, Katsuyuki Takashima
2013/762 (PDF ) Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung
2013/761 (PDF ) Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati
2013/760 (PDF ) On cross joining de Bruijn sequences Johannes Mykkeltveit, Janusz Szmidt
2013/759 (PDF ) Vectorization of ChaCha Stream Cipher Martin Goll, Shay Gueron
2013/758 (PDF ) A Revocable Online-Offline Certificateless Signature Scheme without Pairing Karthik Abinav, Saikrishna Badrinarayanan, C. Pandu Rangan, S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan
2013/757 (PDF ) Practical Signatures from the Partial Fourier Recovery Problem Jeff Hoffstein, Jill Pipher, John Schanck, Joseph H. Silverman, William Whyte
2013/756 (PDF ) A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique Yonglin Hao, Dongxia Bai, Leibo Li
2013/754 (PDF ) Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP Omkant Pandey, Manoj Prabhakaran, Amit Sahai
2013/753 (PDF ) Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalcin
2013/752 (PDF ) On the Power of Rewinding Simulators in Functional Encryption Angelo De Caro, Vincenzo Iovino
2013/751 (PDF ) Using Hamiltonian Totems as Passwords Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache
2013/750 (PDF ) Fully Deniable Mutual Authentication Protocol Based on RSA Signature Xi-Jun Lin, Lin Sun
2013/749 (PDF ) Efficient CCA-secure Threshold Public-Key Encryption Scheme Xi-Jun Lin, Lin Sun
2013/748 (PDF ) Plaintext Recovery Attacks Against WPA/TKIP Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt
2013/747 (PDF ) Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks Jayaprakash Kar
2013/746 (PDF ) Asymptotically Efficient Lattice-Based Digital Signatures Vadim Lyubashevsky, Daniele Micciancio
2013/745 (PDF ) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate
2013/744 (PDF ) Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai
2013/742 (PDF ) CODING - Stream Cipher Methods by Varying Components during Ciphering Data Jürgen Müller
2013/741 (PDF ) Fast Software Implementation of Binary Elliptic Curve Cryptography Manuel Bluhm, Shay Gueron
2013/740 (PDF ) An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II) Gérald Gavin
2013/738 (PDF ) On the Resilience and Uniqueness of CPA for Secure Broadcast Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2013/737 (PDF ) Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodriguez-Henriquez
2013/736 (PDF ) TRS-80 With A Keccak Sponge Cake Jean-Marie Chauvet
2013/735 (PDF ) Masking Tables---An Underestimated Security Risk Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald
2013/734 (PDF ) Elliptic Curve Cryptography in Practice Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow
2013/732 (PDF ) SSS-V2: Secure Similarity Search Hyun-A Park
2013/731 (PDF ) Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited Yongqiang Li, Mingsheng Wang, Yuyin Yu
2013/730 (PDF ) Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees Łukasz Krzywiecki, Przemys{\l}aw Kubiak, Miros{\l}aw Kuty{\l}owski
2013/729 (PDF ) Functional Encryption for Randomized Functionalities Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai
2013/728 (PDF ) Modified Alternating Step Generators Robert Wicik, Tomasz Rachwalik
2013/727 (PDF ) Multi-Input Functional Encryption Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai
2013/726 (PDF ) Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack Chihong Joo, Aaram Yun
2013/724 (PDF ) Verifiable Set Operations over Outsourced Databases Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
2013/723 (PDF ) Amplifying Privacy in Privacy Amplification Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin
2013/722 (PDF ) The Realm of the Pairings Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
2013/721 (PDF ) Deep Attacks of a Certificateless Signature Scheme Bo Yang, Zhao Yang, Zibi Xiao, Shougui Li
2013/720 (PDF ) Outsourced Symmetric Private Information Retrieval Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
2013/719 (PDF ) Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited Sandro Coretti, Ueli Maurer, Björn Tackmann
2013/718 (PDF ) NTRU-KE: A Lattice-based Public Key Exchange Protocol Xinyu Lei, Xiaofeng Liao
2013/717 (PDF ) NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
2013/716 (PDF ) A Secure Obfuscator for Encrypted Blind Signature Functionality Xiao Feng, Zheng Yuan
2013/715 (PDF ) Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists Erik-Oliver Blass, Travis Mayberry, Guevara Noubir
2013/714 (PDF ) Method to secure data in the cloud while preserving summary statistics Sanchita Barman, Bimal Roy
2013/713 (PDF ) Cryptanalysis of Zorro Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang
2013/712 (PDF ) PUF-Based RFID Authentication Secure and Private under Memory Leakage Daisuke Moriyama, Shin'ichiro Matsuo, Moti Yung
2013/711 (PDF ) Ambiguous One-Move Nominative Signature Without Random Oracles Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang
2013/710 (PDF ) An Approach to Reduce Storage for Homomorphic Computations Jung Hee Cheon, Jinsu Kim
2013/709 (PDF ) Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks Mohammad Sadeq Dousti, Rasool Jalili
2013/708 (PDF ) Key Derivation Without Entropy Waste Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
2013/707 (PDF ) A reduction of Semigroup DLP to classic DLP Matan Banin, Boaz Tsaban
2013/706 (PDF ) How to Certify the Leakage of a Chip? François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2013/705 (PDF ) Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation Clemens Heuberger, Michela Mazzoli
2013/704 (PDF ) Adaptive Witness Encryption and Asymmetric Password-based Cryptography Mihir Bellare, Viet Tung Hoang
2013/703 (PDF ) Limits of Extractability Assumptions with Distributional Auxiliary Input Elette Boyle, Rafael Pass
2013/702 (PDF ) Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
2013/701 (PDF ) More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2013/700 (PDF ) Higher Order Masking of Look-up Tables Jean-Sebastien Coron
2013/699 (PDF ) Bootstrapping Obfuscators via Fast Pseudorandom Functions Benny Applebaum
2013/698 (PDF ) Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks Xi-Jun Lin, Lin Sun
2013/697 (PDF ) A More Efficient AES Threshold Implementation Begul Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2013/696 (PDF ) Examination of a New Defense Mechanism: Honeywords Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
2013/695 (PDF ) AEGIS: A Fast Authenticated Encryption Algorithm Hongjun Wu, Bart Preneel
2013/694 (PDF ) Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data Lichun Li, Anwitaman Datta
2013/693 (PDF ) Secure Key Exchange and Sessions Without Credentials Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis
2013/692 (PDF ) Faster Compact Diffie-Hellman: Endomorphisms on the x-line Craig Costello, Huseyin Hisil, Benjamin Smith
2013/691 (PDF ) Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2013/690 (PDF ) Obfuscation ==> (IND-CPA Security =/=> Circular Security) Antonio Marcedone, Claudio Orlandi
2013/689 (PDF ) Differing-Inputs Obfuscation and Applications Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry
2013/688 (PDF ) Unbalancing Pairing-Based Key Exchange Protocols Michael Scott
2013/687 (PDF ) How to Compress (Reusable) Garbled Circuits Craig Gentry, Sergey Gorbunov, Shai Halevi, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
2013/686 (PDF ) New abstractions in applied pi-calculus and automated verification of protected executions Shiwei Xu, Sergiu Bursuc, Julian P. Murphy
2013/685 (PDF ) Solving shortest and closest vector problems: The decomposition approach Anja Becker, Nicolas Gama, Antoine Joux
2013/684 (PDF ) Fully Bideniable Public-Key Encryption Marcel Šebek
2013/683 (PDF ) Separations in Circular Security for Arbitrary Length Key Cycles Venkata Koppula, Kim Ramchen, Brent Waters
2013/682 (PDF ) Secret Key Cryptosystem based on Non-Systematic Polar Codes Reza Hooshmand, Mohammad Reza Aref, Taraneh Eghlidos
2013/681 (PDF ) Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks Damien Vergnaud, David Xiao
2013/680 (PDF ) A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme Dana Dachman-Soled
2013/679 (PDF ) Formal verification of a software countermeasure against instruction skip attacks Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson
2013/678 (PDF ) Universally composable privacy preserving finite automata execution with low online and offline complexity Peeter Laud, Jan Willemson
2013/677 (PDF ) Bounded Tamper Resilience: How to go beyond the Algebraic Barrier Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
2013/676 (PDF ) Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
2013/675 (PDF ) A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher Tomer Ashur, Orr Dunkelman
2013/674 (PDF ) Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/673 (PDF ) Traps to the BGJT-Algorithm for Discrete Logarithms Qi Cheng, Daqing Wan, Jincheng Zhuang
2013/672 (PDF ) Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians Benjamin Smith
2013/671 (PDF ) Robust Pseudorandom Generators Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman
2013/670 (PDF ) Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces Charanjit Jutla, Arnab Roy
2013/669 (PDF ) Attribute-Based Encryption for Arithmetic Circuits Dan Boneh, Valeria Nikolaenko, Gil Segev
2013/668 (PDF ) Obfuscation for Evasive Functions Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2013/667 (PDF ) A TPM Diffie-Hellman Oracle Tolga Acar, Lan Nguyen, Greg Zaverucha
2013/666 (PDF ) An Offline Dictionary Attack against a Three-Party Key Exchange Protocol Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
2013/665 (PDF ) The Impossibility of Obfuscation with a Universal Simulator Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai
2013/664 (PDF ) TUC: Time-sensitive and Modular Analysis of Anonymous Communication Michael Backes, Praveen Manoharan, Esfandiar Mohammadi
2013/663 (PDF ) Linear Cryptanalysis of Round Reduced SIMON Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya
2013/662 (PDF ) Fine-Tuning Groth-Sahai Proofs Alex Escala, Jens Groth
2013/661 (PDF ) Private aggregation on untrusted servers with customizable thresholds Constantinos Patsakis, Michael Clear, Paul Laird
2013/660 (PDF ) Discrete Logarithms and Mordell-Weil Groups Mohammad Sadek
2013/658 (PDF ) Parallel authenticated encryption with the duplex construction Pawel Morawiecki, Josef Pieprzyk
2013/657 (PDF ) New Trapdoor Projection Maps for Composite-Order Bilinear Groups Sarah Meiklejohn, Hovav Shacham
2013/656 (PDF ) Bias-based modeling and entropy analysis of PUFs Robbert van den Berg, Boris Skoric, Vincent van der Leest
2013/655 (PDF ) Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version) Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel
2013/654 (PDF ) Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter Baodong Qin, Shengli Liu
2013/653 (PDF ) RKA-KDM secure encryption from public-key encryption Florian Böhl, Gareth T. Davies, Dennis Hofheinz
2013/652 (PDF ) Efficient Modular Arithmetic for SIMD Devices Wilke Trei
2013/651 (PDF ) A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound Sanjit Chatterjee, Chethan Kamath
2013/650 (PDF ) On Extractability (a.k.a. Differing-Inputs) Obfuscation Elette Boyle, Kai-Min Chung, Rafael Pass
2013/649 (PDF ) Security Analysis of Password-Authenticated Key Retrieval SeongHan Shin, Kazukuni Kobara
2013/648 (PDF ) Integral Distinguishers for Reduced-round Stribog Riham AlTawy, Amr M. Youssef
2013/647 (PDF ) A note on high-security general-purpose elliptic curves Diego F. Aranha, Paulo S. L. M. Barreto, Geovandro C. C. F. Pereira, Jefferson E. Ricardini
2013/646 (PDF ) Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles Johannes Blömer, Gennadij Liske
2013/645 (PDF ) FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap
2013/644 (PDF ) Elliptic and Hyperelliptic Curves: a Practical Security Analysis Joppe W. Bos, Craig Costello, Andrea Miele
2013/643 (PDF ) There is no Indistinguishability Obfuscation in Pessiland Tal Moran, Alon Rosen
2013/642 (PDF ) Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Dan Boneh, Mark Zhandry
2013/641 (PDF ) Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2013/640 (PDF ) Communication-Efficient MPC for General Adversary Structures Joshua Lampkins, Rafail Ostrovsky
2013/639 (PDF ) Differentially 4-Uniform Bijections by Permuting the Inverse Function Deng Tang, Claude Carlet, Xiaohu Tang
2013/638 (PDF ) DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption Somindu C. Ramanna
2013/637 (PDF ) Detection of Algebraic Manipulation in the Presence of Leakage Hadi Ahmadi, Reihaneh Safavi-Naini
2013/636 (PDF ) SCARE of Secret Ciphers with SPN Structures Matthieu Rivain, Thomas Roche
2013/635 (PDF ) Universal security; from bits and mips to pools, lakes -- and beyond Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
2013/634 (PDF ) Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/633 (PDF ) Four Measures of Nonlinearity J. Boyar, M. G. Find, R. Peralta
2013/632 (PDF ) Combined Modeling and Side Channel Attacks on Strong PUFs Ahmed Mahmoud, Ulrich Rührmair, Mehrdad Majzoobi, Farinaz Koushanfar
2013/631 (PDF ) Protecting Obfuscation Against Algebraic Attacks Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2013/630 (PDF ) Estimating Key Sizes For High Dimensional Lattice-Based Systems Joop van de Pol, Nigel P. Smart
2013/629 (PDF ) Secure Key Management in the Cloud Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob I. Pagter
2013/628 (PDF ) Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions Kazuhiko Minematsu
2013/627 (PDF ) Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud Jiawei Yuan, Shucheng Yu
2013/626 (PDF ) Improved Linear Attacks on the Chinese Block Cipher Standard Mingjie Liu, Jiazhe Chen
2013/625 (PDF ) PillarBox: Combating next-generation malware with fast forward-secure logging Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
2013/623 (PDF ) Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad, Amir Herzberg, Haya Shulman
2013/622 (PDF ) Decentralized Anonymous Credentials Christina Garman, Matthew Green, Ian Miers
2013/621 (PDF ) Multi-LHL protocol Marika Mitrengová
2013/620 (PDF ) Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
2013/619 (PDF ) Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes Jeroen Delvaux, Ingrid Verbauwhede
2013/618 (PDF ) Security Amplification against Meet-in-the-Middle Attacks Using Whitening Pierre-Alain Fouque, Pierre Karpman
2013/617 (PDF ) Some results concerning global avalanche characteristics of two $q$-ary functions Brajesh Kumar Singh
2013/616 (PDF ) Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan, Neil Hanley
2013/615 (PDF ) Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonker, Sjouke Mauw, Jun Pang
2013/614 (PDF ) Is extracting data the same as possessing data? Douglas R. Stinson, Jalaj Upadhyay
2013/613 (PDF ) Recomputing with Permuted Operands: A Concurrent Error Detection Approach Xiaofei Guo, Ramesh Karri
2013/612 (PDF ) Sub-linear Blind Ring Signatures without Random Oracles Essam Ghadafi
2013/611 (PDF ) Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki
2013/610 (PDF ) Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation Jeroen Delvaux, Ingrid Verbauwhede
2013/609 (PDF ) Ultra Low-Power implementation of ECC on the ARM Cortex-M0+ Ruan de Clercq, Leif Uhsadel, Anthony Van Herrewege, Ingrid Verbauwhede
2013/608 (PDF ) Towards Optimal Leakage Exploitation Rate in Template Attacks Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2013/607 (PDF ) Cryptanalysis of Full RIPEMD-128 Franck Landelle, Thomas Peyrin
2013/606 (PDF ) Revocable quantum timed-release encryption Dominique Unruh
2013/605 (PDF ) Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC. Masao KASAHARA
2013/604 (PDF ) Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos Jörg Schwenk
2013/603 (PDF ) Invariance-Based Concurrent Error Detection for Advanced Encryption Standard Xiaofei Guo, Ramesh Karri
2013/602 (PDF ) On the Efficacy of Solving LWE by Reduction to Unique-SVP Martin R. Albrecht, Robert Fitzpatrick, Florian G ̈opfert
2013/601 (PDF ) Two-round secure MPC from Indistinguishability Obfuscation Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
2013/600 (PDF ) Improved Cryptanalysis of Reduced RIPEMD-160 Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu
2013/599 (PDF ) Factoring RSA keys from certified smart cards: Coppersmith in the wild Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren
2013/598 (PDF ) Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar
2013/597 (PDF ) Efficient Pairings Computation on Jacobi Quartic Elliptic Curves Sylvain Duquesne, Nadia El Mrabet, Emmanuel Fouotsa
2013/596 (PDF ) Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study Michael Shantz, Edlyn Teske
2013/595 (PDF ) Enhanced certificate transparency and end-to-end encrypted mail Mark D. Ryan
2013/594 (PDF ) A Local-Global Approach to Solving Ideal Lattice Problems Yuan Tian, Rongxin Sun, Xueyong Zhu
2013/593 (PDF ) Efficient One-Sided Adaptively Secure Computation Carmit Hazay, Arpita Patra
2013/592 (PDF ) Cryptanalysis of the Toorani-Falahati Hill Ciphers Liam Keliher, Anthony Z. Delaney
2013/591 (PDF ) Analysis of the Rainbow Tradeoff Algorithm Used in Practice Jung Woo Kim, Jin Hong, Kunsoo Park
2013/590 (PDF ) EyeDecrypt -- Private Interactions in Plain Sight Andrea Forte, Juan Garay, Trevor Jim, Yevgeniy Vahlis
2013/589 (PDF ) Smashing MASH-1 Vladimir Antipkin
2013/588 (PDF ) SPHF-Friendly Non-Interactive Commitments Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval
2013/587 (PDF ) ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2013/586 (PDF ) Generic related-key and induced chosen IV attacks using the method of key differentiation Enes Pasalic, Yongzhuang Wei
2013/585 (PDF ) On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two Xiutao Feng, Guang Gong
2013/584 (PDF ) Cryptanalysis of GOST R Hash Function Zongyue Wang, Hongbo Yu, Xiaoyun Wang
2013/583 (PDF ) Polynomial Selection for the Number Field Sieve in an Elementary Geometric View Min Yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
2013/582 (PDF ) The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions Antoine Joux, Cécile Pierrot
2013/581 (PDF ) PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
2013/580 (PDF ) Random Projections, Graph Sparsification, and Differential Privacy Jalaj Upadhyay
2013/579 (PDF ) On Measurable Side-Channel Leaks inside ASIC Design Primitives Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
2013/578 (PDF ) A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent Oleksandr Kazymyrov, Valentyna Kazymyrova, Roman Oliynykov
2013/577 (PDF ) Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique Luís T. A. N. Brandão
2013/576 (PDF ) Extended Criterion for Absence of Fixed Points Oleksandr Kazymyrov, Valentyna Kazymyrova
2013/575 (PDF ) Equivalence between MAC and PRF for Blockcipher based Constructions Nilanjan Datta, Mridul Nandi
2013/574 (PDF ) On the Minimum Number of Multiplications Necessary for Universal Hash Constructions Mridul Nandi
2013/573 (PDF ) Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE Leibo Li, Keting Jia, Xiaoyun Wang
2013/572 (PDF ) Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher Goutam Paul, Subhamoy Maitra, Anupam Chattopadhyay
2013/571 (PDF ) Efficient General-Adversary Multi-Party Computation Martin Hirt, Daniel Tschudi
2013/570 (PDF ) New Efficient Identity-Based Encryption From Factorization Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao
2013/569 (PDF ) More Efficient Cryptosystems From $k^{th}$-Power Residues Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao
2013/568 (PDF ) Cryptanalysis of the Speck Family of Block Ciphers Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
2013/567 (PDF ) KDM Security in the Hybrid Framework Gareth T. Davies, Martijn Stam
2013/566 (PDF ) Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation Jeroen Delvaux, Ingrid Verbauwhede
2013/565 (PDF ) Non-Malleable Coding Against Bit-wise and Split-State Tampering Mahdi Cheraghchi, Venkatesan Guruswami
2013/564 (PDF ) Capacity of Non-Malleable Codes Mahdi Cheraghchi, Venkatesan Guruswami
2013/563 (PDF ) Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding Zvika Brakerski, Guy N. Rothblum
2013/562 (PDF ) Self-pairings on supersingular elliptic curves with embedding degree $three$ Binglong Chen, Chang-An Zhao
2013/561 (PDF ) Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2013/560 (PDF ) Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time Ben Morris, Phillip Rogaway
2013/559 (PDF ) A Definitional Framework for Functional Encryption Christian Matt, Ueli Maurer
2013/558 (PDF ) Practical approaches to varying network size in combinatorial key predistribution schemes Kevin Henry, Maura B. Paterson, Douglas R. Stinson
2013/557 (PDF ) Black-Box Obfuscation for d-CNFs Zvika Brakerski, Guy N. Rothblum
2013/556 (PDF ) Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012 Oleksandr Kazymyrov, Valentyna Kazymyrova
2013/555 (PDF ) Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design Ueli Maurer, Björn Tackmann, Sandro Coretti
2013/554 (PDF ) Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic Pablo Rauzy, Sylvain Guilley, Zakaria Najm
2013/553 (PDF ) Multi-Valued Byzantine Broadcast: the $t < n$ Case Martin Hirt, Pavel Raykov
2013/552 (PDF ) More Efficient Oblivious Transfer and Extensions for Faster Secure Computation Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2013/551 (PDF ) Puzzle Encryption Algorithm Gregory Alvarez, Charles Berenguer
2013/549 (PDF ) Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem Koh-ichi Nagao
2013/548 (PDF ) Decomposition formula of the Jacobian group of plane curve Koh-ichi Nagao
2013/547 (PDF ) Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang
2013/546 (PDF ) TRS-80 with a grain of salt Jean-Marie Chauvet
2013/545 (PDF ) Private Over-threshold Aggregation Protocols over Distributed Databases Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
2013/544 (PDF ) Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes Christian Hanser, Daniel Slamanig
2013/543 (PDF ) Cryptanalysis of the SIMON Family of Block Ciphers Hoda A. Alkhzaimi, Martin M. Lauridsen
2013/542 (PDF ) Searching for Nonlinear Feedback Shift Registers with Parallel Computing Przemysław Dąbrowski, Grzegorz Łabuzek, Tomasz Rachwalik, Janusz Szmidt
2013/541 (PDF ) Lattice-Based FHE as Secure as PKE Zvika Brakerski, Vinod Vaikuntanathan
2013/540 (PDF ) On the security of a password-only authenticated three-party key exchange protocol Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
2013/539 (PDF ) Rebound attacks on Stribog Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef
2013/538 (PDF ) Practical Issues with TLS Client Certificate Authentication Arnis Parsovs
2013/537 (PDF ) Inter-FSP Funds Transfer Protocol Amir Herzberg, Shay Nachmani
2013/536 (PDF ) A Three-Level Sieve Algorithm for the Shortest Vector Problem Feng Zhang, Yanbin Pan, Gengran Hu
2013/535 (PDF ) Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms Sujoy Sinha Roy, Junfeng Fan, Ingrid Verbauwhede
2013/534 (PDF ) Efficient Unobservable Anonymous Reporting against Strong Adversaries Nethanel Gelernter, Amir Herzberg
2013/533 (PDF ) Gossip Latin Square and The Meet-All Gossipers Problem Nethanel Gelernter, Amir Herzberg
2013/532 (PDF ) On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves Takakazu Satoh
2013/531 (PDF ) On the Limits of Provable Anonymity Nethanel Gelernter, Amir Herzberg
2013/530 (PDF ) The Parallel-Cut Meet-In-The-Middle Attack Ivica Nikolic, Lei Wang, Shuang Wu
2013/529 (PDF ) How to Withstand Mobile Virus Attacks, Revisited Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
2013/528 (PDF ) Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption Somindu C. Ramanna, Palash Sarkar
2013/527 (PDF ) The Spammed Code Offset Method Boris Skoric, Niels de Vreede
2013/526 (PDF ) Differential and Linear Cryptanalysis of Reduced-Round Simon Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
2013/525 (PDF ) Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler, Stefan Lucks, Jakob Wenzel
2013/524 (PDF ) Threshold Secret Image Sharing Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang, YaWei Ren
2013/523 (PDF ) White-Box Security Notions for Symmetric Encryption Schemes Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
2013/522 (PDF ) The Resistance of PRESENT-80 Against Related-Key Differential Attacks Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
2013/521 (PDF ) Multiple Limited-Birthday Distinguishers and Applications Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
2013/520 (PDF ) Locally Updatable and Locally Decodable Codes Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky
2013/519 (PDF ) Montgomery Multiplication Using Vector Instructions Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha
2013/517 (PDF ) Improvement of One Adaptive Oblivious Transfer Scheme Zhengjun Cao, Lihua Liu
2013/516 (PDF ) Algebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase, Sarah Meiklejohn, Gregory M. Zaverucha
2013/515 (PDF ) When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol Changyu Dong, Liqun Chen, Zikai Wen
2013/514 (PDF ) Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited Jia Xu, Jianying Zhou
2013/513 (PDF ) Enforcing Language Semantics Using Proof-Carrying Data Stephen Chong, Eran Tromer, Jeffrey A. Vaughan
2013/512 (PDF ) Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences Jingguo Bi, Phong Q. Nguyen
2013/511 (PDF ) Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref
2013/510 (PDF ) Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden
2013/509 (PDF ) Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation Susan Hohenberger, Amit Sahai, Brent Waters
2013/508 (PDF ) Multi-Key Searchable Encryption Raluca Ada Popa, Nickolai Zeldovich
2013/507 (PDF ) SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza
2013/506 (PDF ) A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA Pablo Rauzy, Sylvain Guilley
2013/505 (PDF ) Improvement of One Anonymous Identity-Based Encryption Zhengjun Cao, Lihua Liu
2013/504 (PDF ) A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves Reza Azarderakhsh, Koray Karabina
2013/503 (PDF ) On secret sharing with nonlinear product reconstruction Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Carles Padro, Chaoping Xing
2013/502 (PDF ) Proving TLS-attack related open biases of RC4 Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra
2013/501 (PDF ) Type-Based Analysis of Protected Storage in the TPM (full version) Jianxiong Shao, Dengguo Feng, Yu Qin
2013/500 (PDF ) Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups Ran Canetti, Vinod Vaikuntanathan
2013/499 (PDF ) Limits on the Power of Cryptographic Cheap Talk Pavel Hubacek, Jesper Buus Nielsen, Alon Rosen
2013/498 (PDF ) Non-Malleable Codes from Two-Source Extractors Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
2013/497 (PDF ) Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Zhengjun Cao, Hanyue Cao
2013/496 (PDF ) Rational Protocol Design: Cryptography Against Incentive-driven Adversaries Juan Garay, Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
2013/495 (PDF ) Revocable IBE Systems with Almost Constant-size Key Update Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang
2013/494 (PDF ) Differential Fault Attack against Grain family with very few faults and minimal assumptions Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra
2013/493 (PDF ) A new class of semi-bent quadratic Boolean functions Chunming Tang, Yanfeng Qi
2013/492 (PDF ) Cryptographically Enforced RBAC Anna Lisa Ferrara, George Fuchsbauer, Bogdan Warinschi
2013/491 (PDF ) Improved OT Extension for Transferring Short Secrets Vladimir Kolesnikov, Ranjit Kumaresan
2013/490 (PDF ) For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes Masoumeh Safkhani, Nasour Bagheri
2013/489 (PDF ) An Efficient Scheme for Centralized Group Key Management in Collaborative Environments Constantinos Patsakis, Agusti Solanas
2013/488 (PDF ) Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency Kwangsu Lee, Dong Hoon Lee
2013/487 (PDF ) Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2013/483 (PDF ) A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun
2013/482 (PDF ) Bounds in Shallows and in Miseries Céline Blondeau, Andrey Bogdanov, Gregor Leander
2013/481 (PDF ) Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012 Yosuke Todo, Keita Xagawa
2013/480 (PDF ) Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz, Ron D. Rothblum
2013/479 (PDF ) Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks B. Skoric
2013/478 (PDF ) Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach Stefan G. Weber
2013/477 (PDF ) Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing Renaud Dubois, Margaux Dugardin, Aurore Guillevic
2013/476 (PDF ) Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
2013/475 (PDF ) A note on verifying the APN property Pascale Charpin, Gohar M. Kyureghyan
2013/474 (PDF ) Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications Zhengjun Cao
2013/473 (PDF ) The Norwegian Internet Voting Protocol Kristian Gjøsteen
2013/472 (PDF ) Partially blind password-based signatures using elliptic curves Kristian Gjøsteen
2013/471 (PDF ) Obfuscating Conjunctions Zvika Brakerski, Guy N. Rothblum
2013/470 (PDF ) Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2013/469 (PDF ) Verifiable Delegation of Computation on Outsourced Data Michael Backes, Dario Fiore, Raphael M. Reischuk
2013/468 (PDF ) How To Construct Extractable One-Way Functions Against Uniform Adversaries Nir Bitansky, Ran Canetti, Omer Paneth
2013/467 (PDF ) Analysis of BLAKE2 Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu
2013/466 (PDF ) Efficient computation of addition-subtraction chains using generalized continued Fractions Amadou Tall, Ali Yassin Sanghare
2013/465 (PDF ) Practical & Provably Secure Distance-Bounding Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2013/464 (PDF ) Towards A Practical JCJ / Civitas Implementation Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig
2013/463 (PDF ) Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
2013/462 (PDF ) VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2013/461 (PDF ) HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu
2013/460 (PDF ) Solving Terminal Revocation in EAC by Augmenting Terminal Authentication Rafik Chaabouni
2013/459 (PDF ) Reset Indifferentiability and its Consequences Paul Baecher, Chris Brzuska, Arno Mittelbach
2013/458 (PDF ) Exponentiating in Pairing Groups Joppe W. Bos, Craig Costello, Michael Naehrig
2013/457 (PDF ) Deduction Soundness: Prove One, Get Five for Free Florian Böhl, Véronique Cortier, Bogdan Warinschi
2013/456 (PDF ) On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R, B B Amberker
2013/455 (PDF ) Another Nail in the Coffin of White-Box AES Implementations Tancrède Lepoint, Matthieu Rivain
2013/454 (PDF ) How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai, Brent Waters
2013/453 (PDF ) Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags Nasour Bagheri, Masoumeh Safkhani
2013/452 (PDF ) Secure Channel Coding Schemes based on Polar Codes Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
2013/451 (PDF ) Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters
2013/450 (PDF ) Revisiting the BGE Attack on a White-Box AES Implementation Yoni De Mulder, Peter Roelse, Bart Preneel
2013/449 (PDF ) A Note On the Storage Requirement for AKS Primality Testing Algorithm Zhengjun Cao
2013/448 (PDF ) Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom, Katrina Falkner
2013/447 (PDF ) Dynamic Runtime Methods to Enhance Private Key Blinding Karine Gandolfi-Villegas, Nabil Hamzi
2013/446 (PDF ) Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
2013/445 (PDF ) Implementing Lightweight Block Ciphers on x86 Architectures Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
2013/444 (PDF ) Sequential message authentication code without random oracles Bin Wang, Xiaojing Hong
2013/443 (PDF ) Optimally Anonymous and Transferable Conditional E-cash Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu
2013/442 (PDF ) On Fair Exchange, Fair Coins and Fair Sampling Shashank Agrawal, Manoj Prabhakaran
2013/440 (PDF ) Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption Mitsugu Iwamoto, Junji Shikata
2013/439 (PDF ) Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID Peter Pessl, Michael Hutter
2013/438 (PDF ) Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
2013/437 (PDF ) A Uniform Min-Max Theorem with Applications in Cryptography Salil Vadhan, Colin Jia Zheng
2013/436 (PDF ) Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
2013/435 (PDF ) Efficient Cryptosystems From $2^k$-th Power Residue Symbols Fabrice Benhamouda, Javier Herranz, Marc Joye, Benoît Libert
2013/434 (PDF ) Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures Susan Hohenberger, Amit Sahai, Brent Waters
2013/433 (PDF ) On Symmetric Encryption with Distinguishable Decryption Failures Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2013/432 (PDF ) How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling Eric Brier, David Naccache, Li-yao Xia
2013/431 (PDF ) Practical-Time Attacks Against Reduced Variants of MISTY1 Orr Dunkelman, Nathan Keller
2013/430 (PDF ) Security of the Misty Structure Beyond the Birthday Bound Jooyoung Lee
2013/429 (PDF ) DupLESS: Server-Aided Encryption for Deduplicated Storage Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
2013/428 (PDF ) Faster 128-EEA3 and 128-EIA3 Software Roberto Avanzi, Billy Bob Brumley
2013/427 (PDF ) Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials Jiangtao Han, Haining Fan
2013/426 (PDF ) Efficient Garbling from a Fixed-Key Blockcipher Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway
2013/425 (PDF ) Break WEP Faster with Statistical Analysis Rafik Chaabouni
2013/424 (PDF ) Instantiating Random Oracles via UCEs Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
2013/423 (PDF ) Locally Computable UOWHF with Linear Shrinkage Benny Applebaum, Yoni Moses
2013/422 (PDF ) Private Database Queries Using Somewhat Homomorphic Encryption Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
2013/421 (PDF ) Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results) Valentina Banciu, Simon Hoerder, Dan Page
2013/420 (PDF ) The Holey Grail: A special score function for non-binary traitor tracing B. Skoric, J. -J. Oosterwijk, J. Doumen
2013/419 (PDF ) How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin, Sara Krehbiel, Chris Peikert
2013/418 (PDF ) On Tight Security Proofs for Schnorr Signatures Nils Fleischhacker, Tibor Jager, Dominique Schröder
2013/417 (PDF ) The Improved Cube Attack on Grain-v1 Yongjuan Wang, Liren Ding, Wenbao Han, Xiangyu Wang
2013/416 (PDF ) Computational Fuzzy Extractors Benjamin Fuller, Xianrui Meng, Leonid Reyzin
2013/415 (PDF ) SL2 homomorphic hash functions: Worst case to average case reduction and short collision search Ciaran Mullan, Boaz Tsaban
2013/414 (PDF ) A novel certificateless deniable authentication protocol Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
2013/413 (PDF ) Policy-Based Signatures Mihir Bellare, Georg Fuchsbauer
2013/412 (PDF ) Moduar Form Aprroach to Solving Lattice Problems Yuan Tian, Xueyong Zhu, Rongxin Sun
2013/411 (PDF ) Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
2013/410 (PDF ) Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI Yossi Gilad, Amir Herzberg
2013/409 (PDF ) Order-Preserving Encryption Secure Beyond One-Wayness Tal Malkin, Isamu Teranishi, Moti Yung
2013/408 (PDF ) Delegatable Functional Signatures Michael Backes, Sebastian Meiser, Dominique Schröder
2013/407 (PDF ) Automated Security Proofs for Almost-Universal Hash for MAC verification Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
2013/405 (PDF ) New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields Chunming Tang, Yanfeng Qi, Maozhi Xu
2013/404 (PDF ) The SIMON and SPECK Families of Lightweight Block Ciphers Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2013/403 (PDF ) Function-Private Subspace-Membership Encryption and Its Applications Dan Boneh, Ananth Raghunathan, Gil Segev
2013/402 (PDF ) Efficient Two-Pass Anonymous Identity Authentication Using Smart Card Jue-Sam Chou, Chun-Hui Huang, Yu-Siang Huang, Yalin Chen
2013/401 (PDF ) Functional Signatures and Pseudorandom Functions Elette Boyle, Shafi Goldwasser, Ioana Ivan
2013/400 (PDF ) A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
2013/399 (PDF ) Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol Roel Peeters, Jens Hermans
2013/398 (PDF ) ASICS: Authenticated Key Exchange Security Incorporating Certification Systems Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
2013/397 (PDF ) Practical Secure Logging: Seekable Sequential Key Generators Giorgia Azzurra Marson, Bertram Poettering
2013/396 (PDF ) On the Practical Security of a Leakage Resilient Masking Scheme Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2013/394 (PDF ) A Public Key Cryptoscheme Using Bit-pair Shadows Shenghui Su, Shuwang Lü, Maozhi Xu, Tao Xie
2013/393 (PDF ) Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model Yong Li, Zheng Yang
2013/392 (PDF ) Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves Christian Hanser, Daniel Slamanig
2013/391 (PDF ) Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$ Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/390 (PDF ) Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada
2013/389 (PDF ) A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
2013/388 (PDF ) Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi
2013/387 (PDF ) Cryptographically Protected Prefixes for Location Privacy in IPv6 Jonathan Trostle, Hosei Matsuoka, James Kempf, Toshiro Kawahara, Ravi Jain
2013/386 (PDF ) Side Channel Attacks against Pairing over Theta Functions Nadia El Mrabet
2013/384 (PDF ) Sequential Aggregate Signatures Made Shorter Kwangsu Lee, Dong Hoon Lee, Moti Yung
2013/383 (PDF ) Lattice Signatures and Bimodal Gaussians Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky
2013/382 (PDF ) To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, Stefano Tessaro
2013/380 (PDF ) Comments on Three Multi-Server Authentication Protocols Yalin Chen, Jue-Sam Chou, Wen-Yi Tsai
2013/379 (PDF ) Delegatable Pseudorandom Functions and Applications Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias
2013/378 (PDF ) A note on quantum related-key attacks Martin Roetteler, Rainer Steinwandt
2013/377 (PDF ) An Algebraic Framework for Diffie-Hellman Assumptions Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Villar
2013/376 (PDF ) An Accurate Probabilistic Reliability Model for Silicon PUFs Roel Maes
2013/375 (PDF ) NaCl on 8-Bit AVR Microcontrollers Michael Hutter, Peter Schwabe
2013/374 (PDF ) A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN Majid Bayat, Mohammad Reza Aref
2013/373 (PDF ) Injective Encoding to Elliptic Curves Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi
2013/372 (PDF ) Practical Bootstrapping in Quasilinear Time Jacob Alperin-Sheriff, Chris Peikert
2013/371 (PDF ) Domain-Polymorphic Programming of Privacy-Preserving Applications Dan Bogdanov, Peeter Laud, Jaak Randmets
2013/370 (PDF ) Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions François-Xavier Standaert, Olivier Pereira, Yu Yu
2013/369 (PDF ) Block Ciphers that are Easier to Mask: How Far Can we Go? Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert
2013/368 (PDF ) Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique-- Jacques Patarin
2013/367 (PDF ) On the Security of TLS-DH and TLS-RSA in the Standard Model Florian Kohlar, Sven Schäge, Jörg Schwenk
2013/366 (PDF ) Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128 Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
2013/365 (PDF ) Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model Zheng Yang
2013/364 (PDF ) On the Achievability of Simulation-Based Security for Functional Encryption Angelo De Caro, Vincenzo Iovino Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano
2013/363 (PDF ) A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems -- Masao KASAHARA
2013/362 (PDF ) A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor Shigeo MITSUNARI
2013/361 (PDF ) Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2013/360 (PDF ) Achieving the limits of the noisy-storage model using entanglement sampling Frédéric Dupuis, Omar Fawzi, Stephanie Wehner
2013/359 (PDF ) A heuristic for finding compatible differential paths with application to HAS-160 Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef
2013/358 (PDF ) Counter-cryptanalysis Marc Stevens
2013/357 (PDF ) The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE Dmitry Khovratovich, Christian Rechberger
2013/356 (PDF ) Verifying Computations with State (Extended Version) Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, Michael Walfish
2013/355 (PDF ) New Attacks against Transformation-Based Privacy-Preserving Linear Programming Peeter Laud, Alisa Pankova
2013/354 (PDF ) Programmable Hash Functions in the Multilinear Setting Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks
2013/353 (PDF ) Profiling DPA: Efficacy and efficiency trade-offs Carolyn Whitnall, Elisabeth Oswald
2013/352 (PDF ) Constrained Pseudorandom Functions and Their Applications Dan Boneh, Brent Waters
2013/351 (PDF ) Time-Optimal Interactive Proofs for Circuit Evaluation Justin Thaler
2013/350 (PDF ) Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
2013/349 (PDF ) A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation Martin Hirt, Christoph Lucas, Ueli Maurer
2013/348 (PDF ) Multi-file proofs of retrievability for cloud storage auditing Bin Wang, Xiaojing Hong
2013/347 (PDF ) STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
2013/346 (PDF ) Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson
2013/345 (PDF ) Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012 Arnab Roy, Srinivas Vivek
2013/344 (PDF ) Limits of provable security for homomorphic encryption Andrej Bogdanov, Chin Ho Lee
2013/343 (PDF ) Quantum one-time programs Anne Broadbent, Gus Gutoski, Douglas Stebila
2013/342 (PDF ) Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices Xiang Xie, Rui Xue
2013/341 (PDF ) Trapdoor Smooth Projective Hash Functions Fabrice Benhamouda, David Pointcheval
2013/340 (PDF ) Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based Craig Gentry, Amit Sahai, Brent Waters
2013/339 (PDF ) On the Security of the TLS Protocol: A Systematic Analysis Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee
2013/338 (PDF ) Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs
2013/337 (PDF ) Attribute-Based Encryption for Circuits Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2013/335 (PDF ) Parallel and Dynamic Searchable Symmetric Encryption Seny Kamara, Charalampos Papamanthou
2013/334 (PDF ) Protecting PUF Error Correction by Codeword Masking Dominik Merli, Frederic Stumpf, Georg Sigl
2013/333 (PDF ) Double-authentication-preventing signatures Bertram Poettering, Douglas Stebila
2013/332 (PDF ) A method for obtaining lower bounds on the higher order nonlinearity of Boolean function Mikhail S. Lobanov
2013/331 (PDF ) New Constructions and Applications of Trapdoor DDH Groups Yannick Seurin
2013/330 (PDF ) Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga, Qiang Tang, Peter Ryan
2013/329 (PDF ) Protocol Variants and Electronic Identification Kristian Gjøsteen
2013/328 (PDF ) Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20 Nicky Mouha, Bart Preneel
2013/327 (PDF ) A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack Shenghui Su, Tao Xie, Shuwang Lü
2013/326 (PDF ) Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig Mihir Bellare, Sarah Meiklejohn, Susan Thomson
2013/325 (PDF ) Elligator: Elliptic-curve points indistinguishable from uniform random strings Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange
2013/324 (PDF ) Sieve-in-the-Middle: Improved MITM Attacks (Full Version) Anne Canteaut, María Naya-Plasencia, Bastien Vayssiere
2013/323 (PDF ) Encryption Schemes with Post-Challenge Auxiliary Inputs Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu
2013/322 (PDF ) BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
2013/321 (PDF ) Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote
2013/320 (PDF ) Instantaneous Frequency Analysis Roman Korkikian, David Naccache, Guilherme Ozari de Almeida
2013/319 (PDF ) On the use of continued fractions for stream ciphers Amadou Moctar Kane
2013/318 (PDF ) Fully-Anonymous Functional Proxy-Re-Encryption Yutaka Kawai, Katsuyuki Takashima
2013/317 (PDF ) Anon-Pass: Practical Anonymous Subscriptions Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel
2013/316 (PDF ) Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
2013/315 (PDF ) Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes Albrecht Petzoldt
2013/314 (PDF ) Keyed Side-Channel Based Hashing for IP Protection using Wavelets Timo Bartkewitz
2013/313 (PDF ) Pairing Inversion via Non-degenerate Auxiliary Pairings Seunghwan Chang, Hoon Hong, Eunjeong Lee, Hyang-Sook Lee
2013/312 (PDF ) Families of fast elliptic curves from Q-curves Benjamin Smith
2013/311 (PDF ) Four-dimensional GLV via the Weil restriction Aurore Guillevic, Sorina Ionica
2013/310 (PDF ) MinimaLT: Minimal-latency Networking Through Better Security W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange
2013/309 (PDF ) Bypassing Passkey Authentication in Bluetooth Low Energy Tomas Rosa
2013/308 (PDF ) Lattice-Based Group Signatures with Logarithmic Signature Size Fabien Laguillaumie, Adeline Langlois, Benoit Libert, Damien Stehle
2013/307 (PDF ) Maliciously Circuit-Private FHE Rafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky
2013/306 (PDF ) Solving a $6120$-bit DLP on a Desktop Computer Faruk Golouglu, Robert Granger, Gary McGuire, Jens Zumbragel
2013/305 (PDF ) Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis Sonia Belaid, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jorn-Marc Schmidt, Francois-Xavier Standaert, Stefan Tillich
2013/304 (PDF ) Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede
2013/303 (PDF ) Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions Shivam Bhasin, Claude Carlet, Sylvain Guilley
2013/302 (PDF ) Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors Nicolas T. Courtois
2013/301 (PDF ) Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128 Zheng Yuan, Xian Li, Bart Preneel
2013/300 (PDF ) A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups Allison Lewko, Sarah Meiklejohn
2013/299 (PDF ) Computing class polynomials for abelian surfaces Andres Enge, Emmanuel Thomé
2013/298 (PDF ) Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wojcik
2013/297 (PDF ) Improvement and Efficient Implementation of a Lattice-based Signature Scheme Rachid El Bansarkhani, Johannes Buchmann
2013/296 (PDF ) Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption Morten Dahl, Ivan Damgård
2013/295 (PDF ) Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks Mickaël Cazorla, Kevin Marquet, Marine Minier
2013/294 (PDF ) Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis Colin O'Flynn, Zhizhang (David) Chen
2013/293 (PDF ) A Toolkit for Ring-LWE Cryptography Vadim Lyubashevsky, Chris Peikert, Oded Regev
2013/292 (PDF ) A Leakage Resilient MAC Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wojcik
2013/291 (PDF ) Security ranking among assumptions within the Uber assumption framework Antoine Joux, Antoine Rojat
2013/290 (PDF ) Massive Group Message Authentication with Revocable Anonymity Boaz Catane, Amir Herzberg
2013/289 (PDF ) Secure Second Price Auctions with a Rational Auctioneer Boaz Catane, Amir Herzberg
2013/288 (PDF ) Key Classification Attack on Block Ciphers Maghsoud Parviz, Seyed Hassan Mousavi, Saeed Mirahmadi
2013/287 (PDF ) The failure of McEliece PKC based on Reed-Muller codes. I. V. Chizhov, M. A. Borodin
2013/286 (PDF ) Salvaging Indifferentiability in a Multi-stage Setting Arno Mittelbach
2013/285 (PDF ) A Novel Proof on Weil Pairing Sutirtha Sanyal
2013/284 (PDF ) A Secure Paper-Based Electronic Voting With No Encryption Asghar Tavakkoli, Reza Ebrahimi Atani
2013/283 (PDF ) Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh, Ananth Raghunathan, Gil Segev
2013/282 (PDF ) Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes Goutam Paul, Anupam Chattopadhyay
2013/281 (PDF ) Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting Carlos Aguilar-Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit
2013/280 (PDF ) Path ORAM: An Extremely Simple Oblivious RAM Protocol Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas
2013/279 (PDF ) Pinocchio: Nearly Practical Verifiable Computation Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova
2013/278 (PDF ) A Frequency Leakage Model and its application to CPA and DPA S. Tiran, S. Ordas, Y. Teglia, M. Agoyan, P. Maurine
2013/277 (PDF ) ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2013/276 (PDF ) Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs David Bernhard, Stephan Neumann, Melanie Volkamer
2013/275 (PDF ) The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version) Johannes Braun, Gregor Rynkowski
2013/273 (PDF ) Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions Deepak Kumar Dalai
2013/272 (PDF ) Cryptography Challenges for Computational Privacy in Public Clouds Sashank Dara
2013/271 (PDF ) The Legal Classification of Identity-Based Signatures Christoph Sorge
2013/270 (PDF ) Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters Yu Yu
2013/269 (PDF ) CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion Jonathan Trostle
2013/268 (PDF ) Dynamic Cube Attack on Grain-v1 Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
2013/267 (PDF ) Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction S. Dov Gordon, Tal Malkin, Mike Rosulek, Hoeteck Wee
2013/266 (PDF ) L-P States of RC4 Stream Cipher Jing Lv, Dongdai Lin
2013/265 (PDF ) Attribute-Based Encryption with Fast Decryption Susan Hohenberger, Brent Waters
2013/264 (PDF ) Encrypted Secret Sharing and Analysis by Plaintext Randomization Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
2013/263 (PDF ) Speeding up QUAD Albrecht Petzoldt
2013/262 (PDF ) An efficient FHE based on the hardness of solving systems of non-linear multivariate equations Gérald Gavin
2013/261 (PDF ) Secure information transmission based on physical principles Dima Grigoriev, Vladimir Shpilrain
2013/260 (PDF ) From Weak to Strong Zero-Knowledge and Applications Kai-Min Chung, Edward Lui, Rafael Pass
2013/259 (PDF ) Private Interactive Communication Across an Adversarial Channel Ran Gelles, Amit Sahai, Akshay Wadia
2013/258 (PDF ) Witness Encryption and its Applications Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters
2013/257 (PDF ) Secure two-party computation: a visual way Paolo D'Arco, Roberto De Prisco
2013/256 (PDF ) On the Lossiness of the Rabin Trapdoor Function Yannick Seurin
2013/255 (PDF ) How to Construct an Ideal Cipher from a Small Set of Public Permutations Rodolphe Lampe, Yannick Seurin
2013/254 (PDF ) Towards Adoption of DNSSEC: Availability and Security Challenges Amir Herzberg, Haya Shulman
2013/253 (PDF ) CacheAudit: A Tool for the Static Analysis of Cache Side Channels Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke
2013/252 (PDF ) On the Primitivity of some Trinomials over Finite Fields LI Yujuan, WANG Huaifu, ZHAO Jinhua
2013/251 (PDF ) Permutation Polynomials and Their Differential Properties over Residue Class Rings Yuyin Yu, Mingsheng Wang
2013/250 (PDF ) Fully Homomorphic Encryption for Mathematicians Alice Silverberg
2013/249 (PDF ) How to Factor N_1 and N_2 When p_1=p_2 mod 2^t Kaoru Kurosawa, Takuma Ueda
2013/248 (PDF ) Another Look at Security Theorems for 1-Key Nested MACs Neal Koblitz, Alfred Menezes
2013/247 (PDF ) Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
2013/246 (PDF ) A New Lever Function with Adequate Indeterminacy Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu
2013/245 (PDF ) The Fiat-Shamir Transformation in a Quantum World Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni
2013/244 (PDF ) Cryptographic schemes, key exchange, public key. Ted Hurley
2013/243 (PDF ) A Simple ORAM Kai-Min Chung, Rafael Pass
2013/242 (PDF ) AE5 Security Notions: Definitions Implicit in the CAESAR Call Chanathip Namprempre, Phillip Rogaway, Tom Shrimpton
2013/241 (PDF ) The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4 Joachim Strömbergson, Simon Josefsson
2013/240 (PDF ) Algebraic analysis of Trivium-like ciphers Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
2013/239 (PDF ) Optimizing ORAM and Using it Efficiently for Secure Computation Craig Gentry, Kenny Goldman, Shai Halevi, Charanjit Julta, Mariana Raykova, Daniel Wichs
2013/238 (PDF ) Anonymity-preserving Public-Key Encryption: A Constructive Approach Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
2013/237 (PDF ) Type-Based Analysis of Generic Key Management APIs (Long Version) Pedro Adão, Riccardo Focardi, Flaminia L. Luccio
2013/236 (PDF ) A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo
2013/235 (PDF ) Ballot secrecy and ballot independence: definitions and relations Ben Smyth, David Bernhard
2013/234 (PDF ) A Cryptographic Analysis of OPACITY Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
2013/233 (PDF ) Attacks on JH, Grøstl and SMASH Hash Functions Yiyuan Luo, Xuejia Lai
2013/232 (PDF ) Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean function Kaushik Chakraborty, Anupam Chattopadhyay, Subhamoy Maitra
2013/231 (PDF ) Sakura: a flexible coding for tree hashing Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2013/230 (PDF ) Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt'' Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
2013/229 (PDF ) How to Run Turing Machines on Encrypted Data Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
2013/228 (PDF ) Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park
2013/227 (PDF ) Analysis of authentication and key establishment in inter-generational mobile telephony Chunyu Tang, David A. Naumann, Susanne Wetzel
2013/226 (PDF ) Public key exchange using semidirect product of (semi)groups Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
2013/225 (PDF ) Transparent, Distributed, and Replicated Dynamic Provable Data Possession Mohammad Etemad, Alptekin Küpçü
2013/224 (PDF ) On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater
2013/223 (PDF ) The PACE|AA Protocol for Machine Readable Travel Documents, and its Security Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2013/222 (PDF ) Tight security bounds for key-alternating ciphers Shan Chen, John Steinberger
2013/221 (PDF ) Identity-based Aggregate Signatures with Verifiable Single Ones Yang Zhang, Jun-liang Chen
2013/220 (PDF ) Towards Efficient Private Distributed Computation on Unbounded Input Streams Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
2013/219 (PDF ) Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes Stefan G. Weber
2013/218 (PDF ) Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves Aurore Guillevic
2013/217 (PDF ) Computing on Authenticated Data for Adjustable Predicates Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
2013/216 (PDF ) Election Verifiability or Ballot Privacy: Do We Need to Choose? Edouard Cuvelier, Olivier Pereira, Thomas Peters
2013/215 (PDF ) Optical PUFs Reloaded Ulrich Rührmair, Christian Hilgers, Sebastian Urban, Agnes Weiershäuser, Elias Dinter, Brigitte Forster, Christian Jirauschek
2013/214 (PDF ) Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System Filip Zagorski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
2013/213 (PDF ) On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes Guangjun Fan, Yongbin Zhou, F. -X. Standaert, Dengguo Feng
2013/212 (PDF ) A Closer Look at HMAC Krzysztof Pietrzak
2013/211 (PDF ) A new criterion for avoiding the propagation of linear relations through an Sbox (Full version) Christina Boura, Anne Canteaut
2013/210 (PDF ) Cryptophia's Short Combiner for Collision-Resistant Hash Functions Arno Mittelbach
2013/209 (PDF ) New modular multiplication and division algorithms based on continued fraction expansion Mourad Gouicem
2013/208 (PDF ) CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
2013/207 (PDF ) Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng
2013/206 (PDF ) Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko
2013/205 (PDF ) Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$ Jan Camenisch, Robert R. Enderlein, Victor Shoup
2013/204 (PDF ) Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture Shi Pu, Jyh-Charn Liu
2013/203 (PDF ) From oblivious AES to efficient and secure database join in the multiparty setting Sven Laur, Riivo Talviste, Jan Willemson
2013/202 (PDF ) Breaking NLM-MAC Generator Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
2013/201 (PDF ) Non-malleable Codes from Additive Combinatorics Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett
2013/200 (PDF ) Selecting polynomials for the Function Field Sieve Razvan Barbulescu
2013/199 (PDF ) Quantum algorithms for the subset-sum problem Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer
2013/198 (PDF ) On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes Zhizhou Li, Ten H. Lai
2013/197 (PDF ) Discrete logarithm in GF(2^809) with FFS Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann
2013/196 (PDF ) Fast Two-Party Secure Computation with Minimal Assumptions abhi shelat, Chih-hao Shen
2013/195 (PDF ) On the (re)design of an FPGA-based PUF Philipp Grabher, Dan Page, Marcin Wójcik
2013/194 (PDF ) On the Impossibility of Cryptography with Tamperable Randomness Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth
2013/193 (PDF ) Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng
2013/192 (PDF ) A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties David Lubicz, Damien Robert
2013/191 (PDF ) Improved Differential Fault Analysis on ARIA using Small Number of Faults Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
2013/190 (PDF ) Power Analysis Attacks against FPGA Implementations of KLEIN Shaohua Tang, Jianhao Wu, Weijian Li, Zheng Gong
2013/189 (PDF ) Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes Appala Naidu Tentu, Prabal Paul, V Ch Venkaiah
2013/188 (PDF ) A family of 6-to-4-bit S-boxes with large linear branch number Daniel Loebenberger, Michael Nüsken
2013/187 (PDF ) Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model Jorge Munilla, Alberto Peinado, Guoming Yang, Willy Susilo
2013/186 (PDF ) On the (Im)possibility of Projecting Property in Prime-Order Setting Jae Hong Seo
2013/185 (PDF ) Security Analysis of Linearly Filtered NLFSRs Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett
2013/184 (PDF ) The Vernam cipher is robust to small deviations from randomness Boris Ryabko
2013/183 (PDF ) Practical Multilinear Maps over the Integers Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2013/182 (PDF ) Collusion-Resistant Domain-Specific Pseudonymous Signatures Julien Bringer, Herve Chabanne, Alain Patey
2013/181 (PDF ) On the evaluation of modular polynomials Andrew V. Sutherland
2013/180 (PDF ) A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code Masao KASAHARA
2013/179 (PDF ) Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2013/178 (PDF ) Cryptanalysis of RC4(n,m) Stream Cipher Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2013/177 (PDF ) A generic construction for voting correctness at minimum cost - Application to Helios Veronique Cortier, David Galindo, Stephane Glondu, Malika Izabachene
2013/176 (PDF ) Distinguishing Attacks on RC4 and A New Improvement of the Cipher Jing Lv, Bin Zhang, Dongdai Lin
2013/175 (PDF ) Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano
2013/174 (PDF ) Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key Deukjo Hong, Daesung Kwon
2013/173 (PDF ) On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems" Ray Perlner, Daniel Smith-Tone
2013/172 (PDF ) On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version) Raphael Spreitzer, Thomas Plos
2013/171 (PDF ) Confined Guessing: New Signatures From Standard Assumptions Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
2013/170 (PDF ) Fast Collision Attack on MD5 Tao Xie, Fanbao Liu, Dengguo Feng
2013/169 (PDF ) Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
2013/168 (PDF ) On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage Simon Hoerder, Kimmo Järvinen, Dan Page
2013/167 (PDF ) Single Password Authentication Tolga Acar, Mira Belenkiy, Alptekin Küpçü
2013/166 (PDF ) On generalized semi-bent (and partially bent) Boolean functions Brajesh Kumar Singh
2013/164 (PDF ) Provably Secure LWE Encryption with Smallish Uniform Noise and Secret Daniel Cabarcas, Florian Göpfert, Patrick Weiden
2013/163 (PDF ) Search Pattern Leakage in Searchable Encryption: Attacks and New Construction Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan
2013/162 (PDF ) A Non Asymptotic Analysis of Information Set Decoding Yann Hamdaoui, Nicolas Sendrier
2013/161 (PDF ) Completeness Theorems for All Finite Stateless 2-Party Primitives Daniel Kraschewski
2013/160 (PDF ) Interactive Coding, Revisited Kai-Min Chung, Rafael Pass, Sidharth Telang
2013/159 (PDF ) Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme Dingding Jia, Bao Liand Yamin Liu, Qixiang Mei
2013/158 (PDF ) Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version) Armando Faz-Hernandez, Patrick Longa, Ana H. Sanchez
2013/157 (PDF ) The fragility of AES-GCM authentication algorithm Shay Gueron, Vlad Krasnov
2013/156 (PDF ) Incentivizing Outsourced Computation Mira Belenkiy, Melissa Chase, C. Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya
2013/155 (PDF ) MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
2013/154 (PDF ) Optimal Suspicion Functions for Tardos Traitor Tracing Schemes Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
2013/153 (PDF ) On the security of a certicateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang
2013/152 (PDF ) Policy-based Secure Deletion Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti
2013/151 (PDF ) Some Fixes To SSH Xu ZiJie
2013/150 (PDF ) Practical (Second) Preimage Attacks on TCS_SHA-3 Gautham Sekar, Soumyadeep Bhattacharya
2013/149 (PDF ) Secure and Constant Cost Public Cloud Storage Auditing with Deduplication Jiawei Yuan, Shucheng Yu
2013/148 (PDF ) AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again) Alexander Rostovtsev
2013/147 (PDF ) A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms Naomi Benger, Manuel Charlemagne, Kefei Chen
2013/146 (PDF ) High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
2013/145 (PDF ) Key Wrapping with a Fixed Permutation Dmitry Khovratovich
2013/144 (PDF ) On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes Gordon Procter, Carlos Cid
2013/143 (PDF ) An architecture for practical actively secure MPC with dishonest majority Marcel Keller, Peter Scholl, Nigel P. Smart
2013/142 (PDF ) A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES Kisoon YOON
2013/141 (PDF ) Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton M. Shakiba, M. Dakhilalian, H. Mala
2013/140 (PDF ) Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures Marc Fischlin, Nils Fleischhacker
2013/139 (PDF ) Rethinking Definitions of Security for Session Key Agreement Wesley George, Charles Rackoff
2013/138 (PDF ) Multi-bit homomorphic encryption based on learning with errors over rings Zhang Wei, Liu Shuguang, Yang Xiaoyuan
2013/137 (PDF ) How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation Payman Mohassel, Saeed Sadeghian
2013/136 (PDF ) 2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers Dieter Schmidt
2013/135 (PDF ) An MQ/Code Cryptosystem Proposal Leonard J. Schulman
2013/134 (PDF ) Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III
2013/133 (PDF ) New Lattice Based Signature Using The Jordan Normal Form Hemlata Nagesh, Birendra Kumar Sharma
2013/132 (PDF ) Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme Niu Liu, Shaohua Tang, Lingling Xu
2013/131 (PDF ) Two is the fastest prime: lambda coordinates for binary elliptic curves Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
2013/130 (PDF ) Blank Digital Signatures Christian Hanser, Daniel Slamanig
2013/129 (PDF ) An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich
2013/128 (PDF ) Attribute-Based Encryption for Circuits from Multilinear Maps Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters
2013/127 (PDF ) Oblivious PAKE: Efficient Handling of Password Trials Franziskus Kiefer, Mark Manulis
2013/126 (PDF ) Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin, Jan-Åke Larsson
2013/125 (PDF ) Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan, Gil Segev, Salil Vadhan
2013/123 (PDF ) Analysis and Improvement of Lindell's UC-Secure Commitment Schemes Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2013/122 (PDF ) Practical collision attack on 40-step RIPEMD-128 Gaoli Wang
2013/121 (PDF ) Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes Helger Lipmaa
2013/120 (PDF ) An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks
2013/119 (PDF ) Speeding up Ate Pairing Computation in Affine Coordinates Duc-Phong Le, Chik How Tan
2013/118 (PDF ) Throughput Optimized Implementations of QUAD Jason R. Hamlet, Robert W. Brocato
2013/117 (PDF ) On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s Namhun Koo, Gook Hwa Cho, Soonhak Kwon
2013/116 (PDF ) The Algorithm of AAES Shiyong Zhang, Gongliang Chen, Lei Fan
2013/115 (PDF ) A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
2013/114 (PDF ) Public Key Exchange Using Matrices Over Group Rings Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
2013/113 (PDF ) Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
2013/112 (PDF ) PUF Modeling Attacks on Simulated and Silicon Data Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne Burleson, Srinivas Devadas
2013/111 (PDF ) Message Authentication Codes Secure against Additively Related-Key Attacks Keita Xagawa
2013/110 (PDF ) Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness Gilad Asharov, Yehuda Lindell, Tal Rabin
2013/109 (PDF ) Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces Charanjit S. Jutla, Arnab Roy
2013/108 (PDF ) Unconditionally Secure and Universally Composable Commitments from Physical Assumptions Ivan Damgard, Alessandra Scafuro
2013/107 (PDF ) On the Arithmetic Complexity of Strassen-Like Matrix Multiplications Murat Cenk, M. Anwar Hasan
2013/105 (PDF ) Lossy Chains and Fractional Secret Sharing Yuval Ishai, Eyal Kushilevitz, Omer Strulovich
2013/104 (PDF ) A Tutorial on White-box AES James A. Muir
2013/103 (PDF ) On the Complexity of Broadcast Setup Martin Hirt, Pavel Raykov
2013/102 (PDF ) On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis Yuchen Cao, Yongbin Zhou, Zhenmei Yu
2013/101 (PDF ) Notions of Black-Box Reductions, Revisited Paul Baecher, Chris Brzuska, Marc Fischlin
2013/100 (PDF ) Attacks and Comments on Several Recently Proposed Key Management Schemes Niu Liu, Shaohua Tang, Lingling Xu
2013/099 (PDF ) Constant-round secure two-party computation from a linear number of oblivious transfer Samuel Ranellucci, Alain Tapp
2013/098 (PDF ) Learning with Rounding, Revisited: New Reduction, Properties and Applications Joel Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs
2013/097 (PDF ) Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2013/096 (PDF ) State convergence in bit-based stream ciphers Sui-Guan Teo, Harry Bartlett, Ali Alhamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson
2013/095 (PDF ) A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic Antoine Joux
2013/094 (PDF ) On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
2013/093 (PDF ) On the security of a certificateless aggregate signature scheme Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou
2013/092 (PDF ) Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs Vadim Lyubashevsky, Daniel Masny
2013/091 (PDF ) Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
2013/089 (PDF ) Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. James McLaughlin, John A. Clark
2013/088 (PDF ) Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World Dan Boneh, Mark Zhandry
2013/087 (PDF ) Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1)) Namhun Koo, Gook Hwa Cho, Soonhak Kwon
2013/086 (PDF ) Efficient Private File Retrieval by Combining ORAM and PIR Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2013/085 (PDF ) Between a Rock and a Hard Place: Interpolating Between MPC and FHE Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
2013/084 (PDF ) Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse
2013/083 (PDF ) A Security Framework for Analysis and Design of Software Attestation Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
2013/082 (PDF ) Secret Sharing, Rank Inequalities, and Information Inequalities Sebastia Martin, Carles Padro, An Yang
2013/081 (PDF ) Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose Yan Huang, Jonathan Katz, Dave Evans
2013/080 (PDF ) An efficient attack of a McEliece cryptosystem variant based on convolutional codes Grégory Landais, Jean-Pierre Tillich
2013/079 (PDF ) Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries Yehuda Lindell
2013/078 (PDF ) Broadcast Steganography Nelly Fazio, Antonio R. Nicolosi, Irippuge Milinda Perera
2013/077 (PDF ) UC-Secure Multi-Session OT Using Tamper-Proof Hardware Kaoru Kurosawa, Ro Nojima, Le Trieu Phong
2013/076 (PDF ) Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas
2013/075 (PDF ) Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme Joppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig
2013/074 (PDF ) On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$ and $\F_{2^{3164}}$ Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
2013/073 (PDF ) Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently Marek Jawurek, Florian Kerschbaum, Claudio Orlandi
2013/072 (PDF ) The UC approach: an application view István Vajda
2013/071 (PDF ) Relation collection for the Function Field Sieve Jérémie Detrey, Pierrick Gaudry, Marion Videau
2013/070 (PDF ) Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen
2013/069 (PDF ) Hardness of SIS and LWE with Small Parameters Daniele Micciancio, Chris Peikert
2013/068 (PDF ) Why Proving HIBE Systems Secure is Difficult Allison Lewko, Brent Waters
2013/067 (PDF ) Power Analysis of Hardware Implementations Protected with Secret Sharing Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michael Peeters, Gilles Van Assche
2013/066 (PDF ) Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard Amin Mohammadali, Zahra Ahmadian, Mohammad Reza Aref
2013/065 (PDF ) Instantiating Treeless Signature Schemes Patrick Weiden, Andreas Hülsing, Daniel Cabarcas, Johannes Buchmann
2013/064 (PDF ) Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols Sven Laur, Bingsheng Zhang
2013/063 (PDF ) A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol Christian L. F. Corniaux, Hossein Ghodosi
2013/062 (PDF ) Symbolic Universal Composability Florian Böhl, Dominique Unruh
2013/061 (PDF ) On the Indifferentiability of Key-Alternating Ciphers Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
2013/060 (PDF ) On FHE without bootstrapping Aayush Jain
2013/059 (PDF ) Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay
2013/058 (PDF ) Cryptanalysis of the Dragonfly Key Exchange Protocol Dylan Clarke, Feng Hao
2013/057 (PDF ) CRT-based Fully Homomorphic Encryption over the Integers Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon
2013/056 (PDF ) On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography Kishan Chand Gupta, Indranil Ghosh Ray
2013/055 (PDF ) Secrecy without one-way functions Dima Grigoriev, Vladimir Shpilrain
2013/054 (PDF ) Joint Compartmented Threshold Access Structures Ali Aydın Selçuk, Ramazan Yılmaz
2013/053 (PDF ) A revocable certificateless signature scheme Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng
2013/052 (PDF ) Some Complexity Results and Bit Unpredictable for Short Vector Problem Kuan Cheng
2013/051 (PDF ) Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation Payman Mohassel, Ben Riva
2013/050 (PDF ) Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem Roohallah Rastaghi
2013/049 (PDF ) Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses Christopher Meyer, Jörg Schwenk
2013/048 (PDF ) Power Balanced Circuits for Leakage-Power-Attacks Resilient Design Basel Halak, Julian Murphy, Alex Yakovlev
2013/047 (PDF ) Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes Carles Padro
2013/046 (PDF ) Fast and Maliciously Secure Two-Party Computation Using the GPU Tore Kasper Frederiksen, Jesper Buus Nielsen
2013/044 (PDF ) Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions Fangguo Zhang, Xu Ma, Shengli Liu
2013/043 (PDF ) Differential Fault Attack on the PRINCE Block Cipher Ling Song, Lei Hu
2013/042 (PDF ) Complexity of Multi-Party Computation Functionalities Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2013/041 (PDF ) Trace Expression of r-th Root over Finite Field Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
2013/040 (PDF ) An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model Roohallah Rastaghi
2013/039 (PDF ) Creating a Challenge for Ideal Lattices Thomas Plantard, Michael Schneider
2013/038 (PDF ) Verifiable Data Streaming Dominique Schröder, Heike Schröder
2013/037 (PDF ) Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles Jayaprakash Kar
2013/036 (PDF ) Batch Fully Homomorphic Encryption over the Integers Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
2013/034 (PDF ) New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2013/033 (PDF ) CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2013/032 (PDF ) Detection of Cheaters in Non-interactive Polynomial Evaluation Maki Yoshida, Satoshi Obana
2013/031 (PDF ) An Analysis of the EMV Channel Establishment Protocol Chris Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson
2013/030 (PDF ) On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks Haiyan Sun
2013/029 (PDF ) Improved Differential Fault Attack on MICKEY 2.0 Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
2013/028 (PDF ) More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96 Stanislav Bulygin
2013/027 (PDF ) Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven Watson
2013/026 (PDF ) RSA private key reconstruction from random bits using SAT solvers Constantinos Patsakis
2013/025 (PDF ) The IITM Model: a Simple and Expressive Model for Universal Composability Ralf Kuesters, Max Tuengerthal, Daniel Rausch
2013/024 (PDF ) New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
2013/023 (PDF ) A New Practical Identity-Based Encryption System Jong Hwan Park, Dong Hoon Lee
2013/022 (PDF ) Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations. James McLaughlin, John A. Clark
2013/021 (PDF ) Rate-Limited Secure Function Evaluation Özgür Dagdelen, Payman Mohassel, Daniele Venturi
2013/020 (PDF ) Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles Markus Rückert, Dominique Schroeder
2013/019 (PDF ) Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaźi
2013/018 (PDF ) Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption Jae Hong Seo, Keita Emura
2013/017 (PDF ) Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions Alexandra Boldyreva, Robert Lychev
2013/016 (PDF ) Revocable Identity-Based Encryption Revisited: Security Model and Construction Jae Hong Seo, Keita Emura
2013/015 (PDF ) Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography Graham Enos
2013/014 (PDF ) On formal and automatic security verification of WSN transport protocols Ta Vinh Thong, Amit Dvir
2013/013 (PDF ) Efficiently Outsourcing Multiparty Computation under Multiple Keys Andreas Peter, Erik Tews, Stefan Katzenbeisser
2013/012 (PDF ) Tropical cryptography Dima Grigoriev, Vladimir Shpilrain
2013/011 (PDF ) Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity. James McLaughlin, John A. Clark
2013/010 (PDF ) Simultaneous Resettable WI from One-way Functions Kai-Min Chung, Rafael Pass
2013/009 (PDF ) Achieving Anonymity Against Major Face Recognition Algorithms Benedikt Driessen, Markus Dürmuth
2013/008 (PDF ) Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security Kai-Min Chung, Rafael Pass, Karn Seth
2013/007 (PDF ) A Matrix Approach for Constructing Quadratic APN Functions Yuyin Yu, Mingsheng Wang, Yongqiang Li
2013/006 (PDF ) Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks Qingfeng Cheng
2013/005 (PDF ) Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue, Faouzi Chekir
2013/004 (PDF ) Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices Damien Stehlé, Ron Steinfeld
2013/003 (PDF ) On Formal Expressions of BRW-polynomials Guillermo Morales-Luna
2013/002 (PDF ) Generalized (Identity-Based) Hash Proof System and Its Applications Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2013/001 (PDF ) Shielding circuits with groups Eric Miles, Emanuele Viola
2012/733 (PDF ) Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
2012/732 (PDF ) Non-Interactive Key Exchange Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson
2012/731 (PDF ) Time-memory Trade-offs for Near-collisions Gaëtan Leurent
2012/730 (PDF ) Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes Dalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang
2012/729 (PDF ) On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky, Omer Paneth
2012/728 (PDF ) Defensive Leakage Camouflage E. Brier, Q. Fortier, R. Korkikian, K. W. Magld, D. Naccache, G. Ozari de Almeida, A. Pommellet, A. H. Ragab, J. Vuillemin
2012/727 (PDF ) On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled
2012/726 (PDF ) Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting Marc Obrador, Paz Morillo, Sandra Guasch
2012/725 (PDF ) Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng
2012/724 (PDF ) A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn
2012/723 (PDF ) Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov, Avraham Entelis
2012/722 (PDF ) Hardness Preserving Reductions via Cuckoo Hashing Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor
2012/721 (PDF ) On the (In)security of Fischlin's Paradigm Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao
2012/720 (PDF ) Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields Antoine Joux
2012/719 (PDF ) An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song, Zhihui Li
2012/718 (PDF ) Succinct Non-Interactive Arguments via Linear Interactive Proofs Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth
2012/717 (PDF ) Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing Jan Camenisch, Anna Lysyanskaya, Gregory Neven
2012/716 (PDF ) Attribute-Based Functional Encryption on Lattices Xavier Boyen
2012/715 (PDF ) New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$ Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng
2012/714 (PDF ) Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai
2012/713 (PDF ) Systematic Treatment of Remote Attestation Aurelien Francillon, Quan Nguyen, Kasper B. Rasmussen, Gene Tsudik
2012/712 (PDF ) On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis Farzaneh Abed, Eik List, Stefan Lucks
2012/711 (PDF ) Unprovable Security of 2-Message Zero Knowledge Kai-Min Chung, Edward Lui, Mohammad Mahmoody, Rafael Pass
2012/710 (PDF ) Non Observability in the Random Oracle Model Prabhanjan Ananth, Raghav Bhaskar
2012/709 (PDF ) Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers Qun-Xiong Zheng, Wen-Feng Qi
2012/708 (PDF ) Calling out Cheaters: Covert Security With Public Verifiability Gilad Asharov, Claudio Orlandi
2012/707 (PDF ) Cryptanalysis of WIDEA Gaëtan Leurent
2012/706 (PDF ) On the (In)security of the Fiat-Shamir Paradigm, Revisited Dana Dachman-Soled, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt
2012/705 (PDF ) Why "Fiat-Shamir for Proofs" Lacks a Proof Nir Bitansky, Sanjam Garg, Daniel Wichs
2012/704 (PDF ) On the Non-malleability of the Fiat-Shamir Transform Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi
2012/703 (PDF ) Profiled Model Based Power Simulator for Side Channel Evaluation Nicolas Debande, Maël Berthier, Yves Bocktaels, Thanh-Ha Le
2012/702 (PDF ) Cryptanalysis of RAPP, an RFID Authentication Protocol Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
2012/701 (PDF ) Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
2012/700 (PDF ) Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou
2012/699 (PDF ) How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damgård, Sunoo Park
2012/698 (PDF ) 5PM: Secure Pattern Matching Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
2012/697 (PDF ) Verifiable Elections That Scale for Free Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/696 (PDF ) Cryptanalysis of RAKAPOSHI Stream Cipher Lin Ding, Jie Guan
2012/695 (PDF ) Fully Automated Analysis of Padding-Based Encryption in the Computational Model Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella-Béguelin
2012/694 (PDF ) Cryptanalysis of matrix conjugation schemes A. D. Myasnikov, A. Ushakov
2012/693 (PDF ) Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters
2012/692 (PDF ) Generic Constructions of Integrated PKE and PEKS Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin
2012/691 (PDF ) Root Optimization of Polynomials in the Number Field Sieve Shi Bai, Richard P. Brent, Emmanuel Thomé
2012/690 (PDF ) The Weakness of Integrity Protection for LTE Teng Wu, Guang Gong
2012/689 (PDF ) Cryptography Using CAPTCHA Puzzles Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia
2012/688 (PDF ) A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem Jintai Ding, Xiang Xie, Xiaodong Lin
2012/687 (PDF ) The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Karyn Benson, Hovav Shacham, Brent Waters
2012/686 (PDF ) Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, Le Dong
2012/685 (PDF ) Square root computation over even extension fields Gora Adj, Francisco Rodríguez-Henríquez
2012/684 (PDF ) Generic Related-key Attacks for HMAC Thomas Peyrin, Yu Sasaki, Lei Wang
2012/682 (PDF ) Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud Jiawei Yuan, Shucheng Yu
2012/681 (PDF ) Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations Guang Gong, Mark Aagaard, Xinxin Fan
2012/680 (PDF ) Natural Generalizations of Threshold Secret Sharing Oriol Farras, Carles Padro, Chaoping Xing, An Yang
2012/679 (PDF ) Hiding the Input-Size in Secure Two-Party Computation Yehuda Lindell, Kobbi Nissim, Claudio Orlandi
2012/678 (PDF ) Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output Benedikt Gierlichs, Jorn-Marc Schmidt, Michael Tunstall
2012/677 (PDF ) What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher Jialin Huang, Xuejia Lai
2012/676 (PDF ) Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan Julia Borghoff
2012/675 (PDF ) Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA Yoshinori Aono
2012/674 (PDF ) Lecture Notes in Secret Sharing Carles Padro
2012/673 (PDF ) Robust Encryption, Revisited Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
2012/672 (PDF ) Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials Itai Dinur, Orr Dunkelman, Adi Shamir
2012/671 (PDF ) Fully Secure Unbounded Inner-Product and Attribute-Based Encryption Tatsuaki Okamoto, Katsuyuki Takashima
2012/670 (PDF ) Fast Cryptography in Genus 2 Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
2012/669 (PDF ) Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay Zhen Liu, Zhenfu Cao, Duncan S. Wong
2012/668 (PDF ) Construction of Differential Characteristics in ARX Designs -- Application to Skein Gaetan Leurent
2012/667 (PDF ) False Negative probabilities in Tardos codes Antonino Simone, Boris Skoric
2012/666 (PDF ) Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem Chenglian Liu, Ziwei Ye
2012/665 (PDF ) Uniform Compression Functions Can Fail to Preserve “Full” Entropy Daniel R. L. Brown
2012/664 (PDF ) PRE- Stronger Security Notion and Efficient Construction with New Property Jiang Zhang, Zhenfeng Zhang, Yu Chen
2012/663 (PDF ) Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? Alexander Rostovtsev
2012/662 (PDF ) Asynchronous Physical Unclonable Functions – AsyncPUF Julian Murphy
2012/661 (PDF ) Breaking Another Quasigroup-Based Cryptographic Scheme Markus Dichtl, Pascale Böffgen
2012/659 (PDF ) Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pierpzyk
2012/658 (PDF ) Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy
2012/657 (PDF ) Fixed Argument Pairing Inversion on Elliptic Curves Sungwook Kim, Jung Hee Cheon
2012/656 (PDF ) Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2012/655 (PDF ) Privacy Preserving Revocable Predicate Encryption Revisited Kwangsu Lee, Intae Kim, Seong Oun Hwang
2012/654 (PDF ) Refine the Concept of Public Key Encryption with Delegated Search Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma
2012/653 (PDF ) How powerful are the DDH hard groups? Periklis A. Papakonstantinou, Charles W. Rackoff, Yevgeniy Vahlis
2012/652 (PDF ) Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai
2012/650 (PDF ) Formal analysis of privacy in Direct Anonymous Attestation schemes Ben Smyth, Mark D. Ryan, Liqun Chen
2012/649 (PDF ) A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption Yannick Seurin, Joana Treger
2012/648 (PDF ) Search in Encrypted Data: Theoretical Models and Practical Applications Qiang Tang
2012/647 (PDF ) A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions Daniel Smith-Tone, Cristina Tone
2012/646 (PDF ) Galindo-Garcia Identity-Based Signature, Revisited Sanjit Chatterjee, Chethan Kamath, Vikas Kumar
2012/645 (PDF ) Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
2012/644 (PDF ) Impossibility Results for Indifferentiability with Resets Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel
2012/643 (PDF ) Protocols for Multiparty Coin Toss With Dishonest Majority Amos Beimel, Eran Omri, Ilan Orlov
2012/642 (PDF ) Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits Ivan Damgard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
2012/641 (PDF ) A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure Bin Wang
2012/640 (PDF ) Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function Gaoli Wang, Yanzhao Shen
2012/639 (PDF ) Coarse-grained integer - Smooth? Rough? Both! Daniel Loebenberger, Michael Nüsken
2012/638 (PDF ) Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme Cai-xue Zhou
2012/637 (PDF ) Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification Aviad Kipnis, Eliphaz Hibshoosh
2012/636 (PDF ) On the Complexity of the BKW Algorithm on LWE Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2012/634 (PDF ) Cryptanalysis of Double-Block-Length Hash Mode MJH Deukjo Hong, Daesung Kwon
2012/633 (PDF ) New Preimage Attack on MDC-4 Deukjo Hong, Daesung Kwon
2012/632 (PDF ) Pairings on Generalized Huff Curves Abdoul Aziz Ciss, Djiby Sow
2012/631 (PDF ) Message-Locked Encryption and Secure Deduplication Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
2012/630 (PDF ) On the Security of TLS Renegotiation Florian Giesen, Florian Kohlar, Douglas Stebila
2012/629 (PDF ) SCAPI: The Secure Computation Application Programming Interface Yael Ejgenberg, Moriya Farbstein, Meital Levy, Yehuda Lindell
2012/628 (PDF ) Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems Muhammad Yasir Malik
2012/627 (PDF ) Efficient Group Signatures in the Standard Model Laila El Aimani, Olivier Sanders
2012/626 (PDF ) Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis Xi Xiong, Haining Fan
2012/625 (PDF ) Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions Alexandra Boldyreva, Nathan Chenette, Adam O’Neill
2012/624 (PDF ) Order-Preserving Symmetric Encryption Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill
2012/623 (PDF ) Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes David McGrew
2012/622 (PDF ) Resolving the conflict between generality and plausibility in verified computation Srinath Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish
2012/621 (PDF ) Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong
2012/620 (PDF ) Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction Claus P. Schnorr, Taras Shevchenko
2012/619 (PDF ) Asynchronous Computational VSS with Reduced Communication Complexity Michael Backes, Amit Datta, Aniket Kate
2012/617 (PDF ) Security Analysis of an Open Car Immobilizer Protocol Stack Stefan Tillich, Marcin Wójcik
2012/616 (PDF ) Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions Nishanth Chandran, Sanjam Garg
2012/615 (PDF ) Polynomial time solutions of computational problems in noncommutative-algebraic cryptography Boaz Tsaban
2012/614 (PDF ) An arithmetic intersection formula for denominators of Igusa class polynomials Kristin Lauter, Bianca Viray
2012/613 (PDF ) Resource-Restricted Indifferentiability Grégory Demay, Peter Gaźi, Martin Hirt, Ueli Maurer
2012/612 (PDF ) Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff Byoung-Il Kim, Jin Hong
2012/611 (PDF ) A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
2012/610 (PDF ) Candidate Multilinear Maps from Ideal Lattices Sanjam Garg, Craig Gentry, Shai Halevi
2012/609 (PDF ) A NEW APPROACH TO THE DISCRETE LOGARITHM PROBLEM WITH AUXILIARY INPUTS Taechan Kim, Jung Hee Cheon
2012/608 (PDF ) On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting Marina Blanton, Mehrdad Aliasgari
2012/607 (PDF ) Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber
2012/606 (PDF ) Quantum-Secure Message Authentication Codes Dan Boneh, Mark Zhandry
2012/605 (PDF ) Secure Outsourced Attribute-Based Signatures Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
2012/604 (PDF ) Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay, Adriana Lopez-Alt, Hoeteck Wee, Daniel Wichs
2012/603 (PDF ) Collecting Data while Preserving Individuals' Privacy: A Case Study Alexis Bonnecaze, Robert Rolland
2012/602 (PDF ) A note on invariant linear transformations in multivariate public key cryptography Andreas Wiemers
2012/601 (PDF ) How to Garble RAM Programs Steve Lu, Rafail Ostrovsky
2012/600 (PDF ) The LED Block Cipher Jian Guo, Thomas Peyrin, Axel Poschmann, Matt Robshaw
2012/599 (PDF ) On the coefficients of the polynomial in the number field sieve Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
2012/598 (PDF ) Taking proof-based verified computation a few steps closer to practicality (extended version) Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Muqeet Ali, Andrew J. Blumberg, Michael Walfish
2012/597 (PDF ) A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj
2012/596 (PDF ) Evaluating User Privacy in Bitcoin Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun
2012/595 (PDF ) Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes Oriol Farràs, Carles Padró
2012/594 (PDF ) Improved Impossible Differential Attack on Reduced Version of Camellia-192/256 Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
2012/593 (PDF ) Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps Tomoko Yonemura, Taichi Isogai, Hirofumi Muratani, Yoshikazu Hanatani
2012/592 (PDF ) Attribute-Based Encryption for Circuits from Multilinear Maps Amit Sahai, Brent Waters
2012/591 (PDF ) Biclique Cryptanalysis Of PRESENT, LED, And KLEIN Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2012/588 (PDF ) Breaking Public Keys - How to Determine an Unknown RSA Public Modulus Hans-Joachim Knobloch
2012/587 (PDF ) Symbolic computation in block cipher with application to PRESENT Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
2012/586 (PDF ) SHADE: Secure HAmming DistancE computation from oblivious transfer Julien Bringer, Herve Chabanne, Alain Patey
2012/585 (PDF ) On Provably Secure Code-based Signature and Signcryption Scheme Preetha Mathew K, Sachin Vasant, C. Pandu Rangan
2012/584 (PDF ) Quantitative Analysis of the Full Bitcoin Transaction Graph Dorit Ron, Adi Shamir
2012/583 (PDF ) New Constructions and Proof Methods for Large Universe Attribute-Based Encryption Yannis Rouselakis, Brent Waters
2012/582 (PDF ) Using Randomizers for Batch Verification of ECDSA Signatures Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury
2012/581 (PDF ) On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang, Chun-guang Ma
2012/580 (PDF ) Cryptanalysis of the OKH Authenticated Encryption Scheme Peng Wang, Wenling Wu, Liting Zhang
2012/579 (PDF ) Defending Against the Unknown Enemy: Applying FlipIt to System Security Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos
2012/578 (PDF ) Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount? Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2012/577 (PDF ) A Framework for Unique Ring Signatures Matthew Franklin, Haibin Zhang
2012/576 (PDF ) Concurrent Signature without Random Oracles Xiao Tan, Qiong Huang, Duncan S. Wong
2012/575 (PDF ) Nanoelectronic Solutions for Hardware Security Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, Bryant Wysocki
2012/574 (PDF ) Quantum algorithm for the discrete logarithm problem for matrices over finite group rings A. D. Myasnikov, A. Ushakov
2012/573 (PDF ) Limits on the Usefulness of Random Oracles Iftach Haitner, Eran Omri, Hila Zarosim
2012/572 (PDF ) On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption Divya Gupta, Amit Sahai
2012/571 (PDF ) Improved side channel attack on the block cipher NOEKEON Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
2012/570 (PDF ) Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock Hadi Soleimany, Kaisa Nyberg
2012/569 (PDF ) Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications San Ling, Khoa Nguyen, Damien Stehle, Huaxiong Wang
2012/568 (PDF ) On Transaction Pseudonyms with Implicit Attributes Stefan G. Weber
2012/567 (PDF ) Leakage Squeezing of Order Two Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi
2012/566 (PDF ) Quantization in Continuous-Source Zero Secrecy Leakage Helper Data Schemes Joep de Groot, Boris Škorić, Niels de Vreede, Jean-Paul Linnartz
2012/565 (PDF ) Packed Ciphertexts in LWE-based Homomorphic Encryption Zvika Brakerski, Craig Gentry, Shai Halevi
2012/564 (PDF ) Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
2012/563 (PDF ) Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions Kai-Min Chung, Huijia Lin, Rafael Pass
2012/562 (PDF ) Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency Kwangsu Lee, Dong Hoon Lee, Moti Yung
2012/561 (PDF ) An Attack on a Fully Homomorphic Encryption Scheme Hu Yupu, Wang Fenghe
2012/560 (PDF ) Computational Soundness of Coinductive Symbolic Security under Active Attacks Mohammad Hajiabadi, Bruce M. Kapron
2012/559 (PDF ) Plaintext Awareness in Identity-Based Key Encapsulation Mark Manulis, Bertram Poettering, Douglas Stebila
2012/558 (PDF ) Domain-Specific Pseudonymous Signatures for the German Identity Card Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2012/557 (PDF ) PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version) Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
2012/556 (PDF ) Resource-based Corruptions and the Combinatorics of Hidden Diversity Juan Garay, David Johnson, Aggelos Kiayias, Moti Yung
2012/555 (PDF ) New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai
2012/554 (PDF ) Security weakness in the Proof of Storage with Deduplication Youngjoo Shin, Junbeom Hur, Kwangjo Kim
2012/553 (PDF ) Bellcore attack in practice Andrey Sidorenko, Joachim van den Berg, Remko Foekema, Michiel Grashuis, Jaap de Vos
2012/552 (PDF ) Provably Secure Concurrent Error Detection Against Differential Fault Analysis Xiaofei Guo, Debdeep Mukhopadhyay, Ramesh Karri
2012/551 (PDF ) Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists Liangze Li, Hongfeng Wu, Fan Zhang
2012/550 (PDF ) Dynamic Proofs of Retrievability via Oblivious RAM David Cash, Alptekin Kupcu, Daniel Wichs
2012/549 (PDF ) Faster batch forgery identification Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk
2012/548 (PDF ) Efficient Modular NIZK Arguments from Shift and Product Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
2012/547 (PDF ) Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta
2012/546 (PDF ) Rotational cryptanalysis of round-reduced Keccak Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny
2012/545 (PDF ) A Versatile Multi-Input Multiplier over Finite Fields Haibo Yi, Shaohua Tang, Lingling Xu
2012/544 (PDF ) Differential Analysis of the LED Block Cipher Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici
2012/543 (PDF ) Enhanced Chosen-Ciphertext Security and Applications Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill
2012/542 (PDF ) Salus: A System for Server-Aided Secure Function Evaluation Seny Kamara, Payman Mohassel, Ben Riva
2012/540 (PDF ) A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms Ga Won Lee, Jin Hong
2012/539 (PDF ) Efficient Implementation of RSA Algorithm with MKE Sami A. Nagar, Dr. Saad Alshamma
2012/538 (PDF ) Private Top-k Aggregation Protocols Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
2012/537 (PDF ) Intercepting Tokens: The Empire Strikes Back in the Clone Wars Özgür Dagdelen, Marc Fischlin
2012/536 (PDF ) Secret Sharing and Secure Computing from Monotone Formulae Ivan Bjerre Damgård, Jonas Kölker, Peter Bro Miltersen
2012/535 (PDF ) A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
2012/534 (PDF ) A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes Maura B. Paterson, Douglas R. Stinson
2012/533 (PDF ) Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems Thijs Laarhoven, Joop van de Pol, Benne de Weger
2012/532 (PDF ) Pairing computation on Edwards curves with high-degree twists Liangze Li, Hongfeng Wu, Fan Zhang
2012/531 (PDF ) Generic Construction of Trace and Revoke Schemes Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selcuk
2012/530 (PDF ) Dynamic Searchable Symmetric Encryption Seny Kamara, Charalampos Papamanthou, Tom Roeder
2012/529 (PDF ) PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knežević, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçın
2012/528 (PDF ) An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption Graham Enos, Yuliang Zheng
2012/527 (PDF ) Cryptanalysis of a recent two factor authentication scheme Michael Scott
2012/526 (PDF ) Invertible Polynomial Representation for Private Set Operations Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee
2012/525 (PDF ) Computing endomorphism rings of abelian varieties of dimension two Gaetan Bisson
2012/524 (PDF ) Tahoe – The Least-Authority Filesystem Zooko Wilcox-O'Hearn, Brian Warner
2012/523 (PDF ) The Curious Case of Non-Interactive Commitments Mohammad Mahmoody, Rafael Pass
2012/522 (PDF ) False Positive probabilities in q-ary Tardos codes: comparison of attacks A. Simone, B. Skoric
2012/521 (PDF ) Functional Encryption with Bounded Collusions via Multi-Party Computation Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2012/520 (PDF ) Optimizing Segment Based Document Protection (Corrected Version) Miroslaw Kutylowski, Maciej Gebala
2012/519 (PDF ) Faster implementation of scalar multiplication on Koblitz curves Diego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez
2012/518 (PDF ) Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies Kwangsu Lee, Dong Hoon Lee, Moti Yung
2012/517 (PDF ) Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity Ashish Choudhury, Martin Hirt, Arpita Patra
2012/516 (PDF ) Garbling XOR Gates ``For Free'' in the Standard Model Benny Applebaum
2012/515 (PDF ) Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition Mihir Bellare, Adam O'Neill
2012/514 (PDF ) RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures Mihir Bellare, Kenneth G. Paterson, Susan Thomson
2012/513 (PDF ) Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes
2012/512 (PDF ) Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing Ivan Damgard, Sarah Zakarias
2012/511 (PDF ) Entangled Cloud Storage Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgard, Daniele Venturi
2012/510 (PDF ) Enabling 3-share Threshold Implementations for any 4-bit S-box Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann
2012/509 (PDF ) On 3-share Threshold Implementations for 4-bit S-boxes Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang
2012/508 (PDF ) On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs Yi Deng, Juan Garay, San Ling, Huaxiong Wang, Moti Yung
2012/507 (PDF ) Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich
2012/506 (PDF ) Succinct Malleable NIZKs and an Application to Compact Shuffles Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/505 (PDF ) On pseudorandomization of information-theoretically secure schemes without hardness assumptions Koji Nuida
2012/504 (PDF ) Scalable Deniable Group Key Establishment Kashi Neupane, Rainer Steinwandt, Adriana Suarez Corona
2012/503 (PDF ) Hierarchical Identity-Based (Lossy) Trapdoor Functions Alex Escala, Javier Herranz, Benoit Libert, Carla Rafols
2012/502 (PDF ) Are We Compromised? Modelling Security Assessment Games Viet Pham, Carlos Cid
2012/501 (PDF ) Privacy Amplification with Asymptotically Optimal Entropy Loss Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin
2012/500 (PDF ) Constant Ciphertext Length in CP-ABE Nishant Doshi, Devesh Jinwala
2012/498 (PDF ) Almost Perfect Algebraic Immune Functions with Good Nonlinearity Meicheng Liu, Dongdai Lin
2012/497 (PDF ) The low-call diet: Authenticated Encryption for call counting HSM users Mike Bond, George French, Nigel P. Smart, Gaven J. Watson
2012/496 (PDF ) Updating attribute in CP-ABE: A New Approach Nishant Doshi, Devesh Jinwala
2012/495 (PDF ) "Metaproofs" (and their Cryptographic Applications) Alfredo De Santis, Moti Yung
2012/494 (PDF ) Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
2012/493 (PDF ) Efficient Query Integrity for Outsourced Dynamic Databases Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2012/492 (PDF ) A Method for Generating Full Cycles by a Composition of NLFSRs Elena Dubrova
2012/491 (PDF ) On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown Lidong Han, Wei Wei, Mingjie Liu
2012/490 (PDF ) Desynchronization Attack on RAPP Ultralightweight Authentication Protocol Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/489 (PDF ) Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/488 (PDF ) Designated Verifier Threshold Proxy Signature Scheme without Random Oracles Mohammad Beheshti-Atashgah, Majid Bayat, Mahmoud Gardeshi, Mohammad Reza Aref
2012/487 (PDF ) Short communication: An interpretation of the Linux entropy estimator Benjamin Pousse
2012/486 (PDF ) Computational Soundness without Protocol Restrictions Michael Backes, Ankit Malik, Dominique Unruh
2012/485 (PDF ) Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace Neil Hanley, HeeSeok Kim, Michael Tunstall
2012/484 (PDF ) Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui
2012/483 (PDF ) An Efficient Signcryption Scheme from q-Diffie-Hellman Problems Jayaprakash Kar
2012/482 (PDF ) Approaches for the Parallelization of Software Implementation of Integer Multiplication Vladislav Kovtun, Andrew Okhrimenko
2012/481 (PDF ) Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance John Steinberger
2012/480 (PDF ) Short Signatures From Diffie-Hellman: Realizing Short Public Key Jae Hong Seo
2012/479 (PDF ) Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles Mohammad Reza Reyhanitabar, Willy Susilo
2012/478 (PDF ) Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol Wang Qinglong, Xu Li
2012/477 (PDF ) Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean
2012/476 (PDF ) A j-lanes tree hashing mode and j-lanes SHA-256 Shay Gueron
2012/475 (PDF ) Efficient Signatures of Knowledge and DAA in the Standard Model David Bernhard, Georg Fuchsbauer, Essam Ghadafi
2012/474 (PDF ) On the Semantic Security of Functional Encryption Schemes Manuel Barbosa, Pooya Farshim
2012/473 (PDF ) Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited Zhengan Huang, Shengli Liu, Baodong Qin
2012/472 (PDF ) On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme – Amir Moradi, Oliver Mischke
2012/471 (PDF ) A Quasigroup Based Random Number Generator for Resource Constrained Environments Matthew Battey, Abhishek Parakh
2012/470 (PDF ) Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime Sorin Iftene
2012/469 (PDF ) Perfect Keyword Privacy in PEKS Systems Mototsugu Nishioka
2012/468 (PDF ) Functional Encryption: New Perspectives and Lower Bounds Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2012/467 (PDF ) New results on nonexistence of generalized bent functions Yupeng Jiang, Yingpu Deng
2012/466 (PDF ) Computational Entropy and Information Leakage Benjamin Fuller, Leonid Reyzin
2012/465 (PDF ) T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2012/464 (PDF ) Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming Carles Padro, Leonor Vazquez, An Yang
2012/463 (PDF ) Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting Xiang Xie, Rui Xue, Rui Zhang
2012/462 (PDF ) Perfect Ambiguous Optimistic Fair Exchange Yang Wang, Man Ho Au, Willy Susilo
2012/461 (PDF ) Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits Nir Bitansky, Alessandro Chiesa
2012/460 (PDF ) Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes Yohei Watanabe, Takenobu Seito, Junji Shikata
2012/459 (PDF ) Barriers in Cryptography with Weak, Correlated and Leaky Sources Daniel Wichs
2012/458 (PDF ) Computing small discrete logarithms faster Daniel J. Bernstein, Tanja Lange
2012/457 (PDF ) Hush Functions Extended to Any Size Input versus Any Size Output Gideon Samid
2012/456 (PDF ) Crowd-Blending Privacy Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass
2012/455 (PDF ) Must you know the code of f to securely compute f? Mike Rosulek
2012/454 (PDF ) A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh
2012/453 (PDF ) New Leakage Resilient CCA-Secure Public Key Encryption Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2012/452 (PDF ) EPiC: Efficient Privacy-Preserving Counting for MapReduce Erik-Oliver Blass, Guevara Noubir, Triet D. Vo-Huu
2012/451 (PDF ) Stam's Conjecture and Threshold Phenomena in Collision Resistance John Steinberger, Xiaoming Sun, Zhe Yang
2012/450 (PDF ) Tweakable Blockciphers with Beyond Birthday-Bound Security Will Landecker, Thomas Shrimpton, R. Seth Terashima
2012/449 (PDF ) Long Term Confidentiality: a Survey Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alex Wiesmaier
2012/448 (PDF ) On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
2012/447 (PDF ) Multi-receiver Homomorphic Authentication Codes for Network Coding Zhaohui Tang, Hoon Wei Lim
2012/446 (PDF ) Differential Fault Analysis of AES: Towards Reaching its Limits Sk Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
2012/445 (PDF ) A note on ‘An efficient certificateless aggregate signature with constant pairing computations’ Debiao He, Jianhua Chen, Miaomiao Tian
2012/444 (PDF ) Factorization of a 1061-bit number by the Special Number Field Sieve Greg Childers
2012/443 (PDF ) Improved CRT Algorithm for Class Polynomials in Genus 2 Kristin Lauter, Damien Robert
2012/442 (PDF ) Group Signatures with Almost-for-free Revocation Benoit Libert, Thomas Peters, Moti Yung
2012/441 (PDF ) Adaptively Secure Multi-Party Computation with Dishonest Majority Sanjam Garg, Amit Sahai
2012/440 (PDF ) New Preimage Attacks Against Reduced SHA-1 Simon Knellwolf, Dmitry Khovratovich
2012/439 (PDF ) Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
2012/438 (PDF ) Breaking and Repairing GCM Security Proofs Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
2012/437 (PDF ) Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption Amit Sahai, Hakan Seyalioglu, Brent Waters
2012/436 (PDF ) Secure Database Commitments and Universal Arguments of Quasi Knowledge Melissa Chase, Ivan Visconti
2012/435 (PDF ) Differential Privacy with Imperfect Randomness Yevgeniy Dodis, Adriana Lopez-Alt, Ilya Mironov, Salil Vadhan
2012/434 (PDF ) Algebraic (Trapdoor) One Way Functions and their Applications Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis
2012/433 (PDF ) Impossibility Results for Static Input Secure Computation Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti
2012/432 (PDF ) TorScan: Tracing Long-lived Connections and Differential Scanning Attacks Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2012/431 (PDF ) On the Security of Dynamic Group Signatures: Preventing Signature Hijacking Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
2012/430 (PDF ) A formal study of two physical countermeasures against side channel attacks Sébastien Briais, Sylvain Guilley, Jean-Luc Danger
2012/429 (PDF ) Simple construction of epsilon-biased distribution Long Hoang Nguyen, Andrew William Roscoe
2012/428 (PDF ) Rational authentication protocols and their use in financial transactions Long Hoang Nguyen
2012/427 (PDF ) Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian Robert Drylo
2012/426 (PDF ) A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes Ed Kendall, Michelle Kendall, Wilfrid S. Kendall
2012/425 (PDF ) The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures Gautham Sekar
2012/424 (PDF ) Scalable Group Signatures with Revocation Benoit Libert, Thomas Peters, Moti Yung
2012/423 (PDF ) Programmable encryption and key-dependent messages Dominique Unruh
2012/422 (PDF ) Biclique Cryptanalysis of TWINE Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
2012/421 (PDF ) Security margin evaluation of SHA-3 contest finalists through SAT-based attacks Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny
2012/420 (PDF ) A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers Denise Demirel, Jeroen van de Graaf
2012/418 (PDF ) Weaknesses of an Improvement Authentication Scheme using Rafael Martínez-Peláez, Francisco Rico-Novella
2012/417 (PDF ) Efficient Padding Oracle Attacks on Cryptographic Hardware Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay
2012/416 (PDF ) Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal Cas Cremers, Michèle Feltz
2012/415 (PDF ) Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion Jialin Huang, Xuejia Lai
2012/414 (PDF ) Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials Yin Li, Gong-liang Chen, Xiao-ning Xie
2012/413 (PDF ) Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation Mukund Kalyanaraman, Michael Orshansky
2012/412 (PDF ) Probabilistic Infinite Secret Sharing Laszlo Csirmaz
2012/411 (PDF ) Infinite Secret Sharing -- Examples Alexander Dibert, Laszlo Csirmaz
2012/410 (PDF ) Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme Qingfeng Cheng
2012/409 (PDF ) MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto
2012/408 (PDF ) Efficient Implementation of Bilinear Pairings on ARM Processors Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao
2012/407 (PDF ) Cross-Unlinkable Hierarchical Group Signatures Julien Bringer, Herve Chabanne, Alain Patey
2012/406 (PDF ) Comments on four multi-server authentication protocols using smart card Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang
2012/405 (PDF ) Secure Computation on Floating Point Numbers Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele
2012/404 (PDF ) Secret Sharing Schemes for Very Dense Graphs Amos Beimel, Oriol Farràs, Yuval Mintz
2012/403 (PDF ) Fully Private Revocable Predicate Encryption Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
2012/402 (PDF ) Forward-Secure Hierarchical Predicate Encryption Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
2012/401 (PDF ) An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers Martin Albrecht, Gregor Leander
2012/400 (PDF ) An Algebraic Fault Attack on the LED Block Cipher Philipp Jovanovic, Martin Kreuzer, Ilia Polian
2012/399 (PDF ) Differential Fault Analysis on Block Cipher Piccolo Kitae Jeong
2012/398 (PDF ) PIRMAP: Efficient Private Information Retrieval for MapReduce Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2012/397 (PDF ) Cross-Domain Password-Based Authenticated Key Exchange Revisited Liqun Chen, Hoon Wei Lim, Guomin Yang
2012/396 (PDF ) On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$ Brajesh Kumar Singh
2012/395 (PDF ) A New Efficient Authenticated ID-Based Group Key Agreement Protocol Morteza Arifi, Mahmoud Gardeshi, Mohammad Sabzinejad Farash
2012/394 (PDF ) An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari
2012/393 (PDF ) A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
2012/392 (PDF ) ID Based Signcryption Scheme in Standard Model S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
2012/391 (PDF ) Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy Shaohui Wang, Sujuan Liu, Danwei Chen
2012/390 (PDF ) Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three Chol-Sun Sin
2012/389 (PDF ) Wide Strong Private RFID Identification based on Zero-Knowledge Roel Peeters, Jens Hermans
2012/388 (PDF ) The Arithmetic Codex Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2012/387 (PDF ) New cryptographic constructions using generalized learning with errors problem Jintai ding
2012/386 (PDF ) Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards Rafael Martínez-Peláez, Francisco Rico-Novella
2012/385 (PDF ) CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen
2012/384 (PDF ) Functional Encryption for Regular Languages Brent Waters
2012/383 (PDF ) Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited Junji Shikata
2012/382 (PDF ) On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification Afonso Arriaga, Manuel Barbosa, Pooya Farshim
2012/380 (PDF ) Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices Ioana Boureanu, Serge Vaudenay
2012/379 (PDF ) All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments Eiichiro Fujisaki
2012/378 (PDF ) Multiparty Proximity Testing with Dishonest Majority from Equality Testing Ran Gelles, Rafail Ostrovsky, Kina Winoto
2012/377 (PDF ) Distributed Key Generation in the Wild Aniket Kate, Yizhou Huang, Ian Goldberg
2012/376 (PDF ) Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem Colleen M. Swanson, Douglas R. Stinson
2012/375 (PDF ) How to Store some Secrets Reto E. Koenig, Rolf Haenni
2012/374 (PDF ) Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary, Felix Grobert, Joachim Metz
2012/373 (PDF ) Optimal Lower Bound for Differentially Private Multi-Party Aggregation T-H. Hubert Chan, Elaine Shi, Dawn Song
2012/371 (PDF ) Simultaneous hashing of multiple messages Shay Gueron, Vlad Krasnov
2012/370 (PDF ) Improved Broadcast Encryption Scheme with Constant-Size Ciphertext Renaud Dubois, Aurore Guillevic, Marine Sengelin Le Breton
2012/369 (PDF ) Factorisation of RSA-704 with CADO-NFS Shi Bai, Emmanuel Thomé, Paul Zimmermann
2012/368 (PDF ) Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski, Rabia Shahid, Malik Umar Sharif
2012/367 (PDF ) On Continual Leakage of Discrete Log Representations Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
2012/366 (PDF ) Securing Circuits Against Constant-Rate Tampering Dana Dachman-Soled, Yael Tauman Kalai
2012/365 (PDF ) Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
2012/364 (PDF ) Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions Ivan Damgard, Adriana Lopez-Alt
2012/363 (PDF ) A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions Anne Canteaut, Thomas Fuhr, María Naya-Plasencia, Pascal Paillier, Jean-René Reinhard, Marion Videau
2012/362 (PDF ) Achieving Constant Round Leakage-Resilient Zero-Knowledge Omkant Pandey
2012/361 (PDF ) Quantum Key Distribution in the Classical Authenticated Key Exchange Framework Michele Mosca, Douglas Stebila, Berkant Ustaoglu
2012/360 (PDF ) Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics Céline Blondeau, Benoît Gérard, Kaisa Nyberg
2012/359 (PDF ) Another look at non-uniformity Neal Koblitz, Alfred Menezes
2012/358 (PDF ) PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version -- Gilles Piret, Thomas Roche, Claude Carlet
2012/357 (PDF ) Publicly Verifiable Ciphertexts Juan Manuel Gonzälez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila
2012/356 (PDF ) Fully Anonymous Attribute Tokens from Lattices Jan Camenisch, Gregory Neven, Markus Rückert
2012/355 (PDF ) Never trust a bunny Daniel J. Bernstein, Tanja Lange
2012/354 (PDF ) Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output Arno Mittelbach
2012/353 (PDF ) On Reconfigurable Fabrics and Generic Side-Channel Countermeasures Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik
2012/352 (PDF ) On Hashing Graphs Ashish Kundu, Elisa Bertino
2012/351 (PDF ) SipHash: a fast short-input PRF Jean-Philippe Aumasson, Daniel J. Bernstein
2012/350 (PDF ) A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption Liangliang Xiao, I-Ling Yen
2012/349 (PDF ) A Differential Fault Attack on Grain-128a using MACs Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
2012/348 (PDF ) Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven
2012/347 (PDF ) Algebraic Differential Fault Attacks on LED using a Single Fault Injection Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji
2012/346 (PDF ) Edwards model of elliptic curves defined over any fields Oumar DIAO, Emmanuel FOUOTSA
2012/345 (PDF ) Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$ Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
2012/344 (PDF ) Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code Masao KASAHARA
2012/343 (PDF ) High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions Tamas Gyorfi, Octavian Cret, Guillaume Hanrot, Nicolas Brisebarre
2012/342 (PDF ) Enhancing Location Privacy for Electric Vehicles (at the right time) Joseph Liu, Man Ho Au, Willy Susilo, Jianying Zhou
2012/341 (PDF ) From Selective to Full Security: Semi-Generic Transformations in the Standard Model Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
2012/340 (PDF ) Deciding Epistemic and Strategic Properties of Cryptographic Protocols Henning Schnoor
2012/339 (PDF ) Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash Adi Shamir, Eldad Zinger
2012/338 (PDF ) Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong, Mingsheng Wang
2012/337 (PDF ) Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme Sanjay Bhattacherjee, Palash Sarkar
2012/336 (PDF ) RSA modulus generation in the two-party case Gerald Gavin
2012/335 (PDF ) Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Yu Lou, Huiting Han, Chunming Tang, Maozhi Xu
2012/334 (PDF ) On the Traceability of Tags in SUAP RFID Authentication Protocols Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2012/333 (PDF ) On the Feasibility of Extending Oblivious Transfer Yehuda Lindell, Hila Zarosim
2012/332 (PDF ) A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/331 (PDF ) Homomorphic Authentication Codes for Network Coding Zhaohui Tang
2012/330 (PDF ) A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences Xu ZiJie, Xu Ke
2012/329 (PDF ) An Analysis of ZVP-Attack on ECC Cryptosystems Claude Crépeau, Raza Ali Kazmi
2012/328 (PDF ) The Multivariate Probabilistic Encryption Scheme MQQ-ENC Danilo Gligoroski, Simona Samardjiska
2012/327 (PDF ) Security Analysis of RAPP An RFID Authentication Protocol based on Permutation Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
2012/326 (PDF ) New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Allison Lewko, Brent Waters
2012/325 (PDF ) A note on generalized bent criteria for Boolean functions Sugata Gangopadhyay, Enes Pasalic, Pantelimon Stanica
2012/324 (PDF ) 3D Hardware Canaries Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf
2012/323 (PDF ) ML Confidential: Machine Learning on Encrypted Data Thore Graepel, Kristin Lauter, Michael Naehrig
2012/322 (PDF ) Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak
2012/321 (PDF ) DECT Security Analysis Erik Tews
2012/320 (PDF ) The Discrete Logarithm Problem in non-representable rings Matan Banin, Boaz Tsaban
2012/319 (PDF ) Bounds on the Threshold Gap in Secret Sharing and its Applications Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2012/318 (PDF ) Non-uniform cracks in the concrete: the power of free precomputation Daniel J. Bernstein, Tanja Lange
2012/317 (PDF ) A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen, Daniel Engels
2012/316 (PDF ) Computationally Complete Symbolic Attacker in Action Gergei Bana, Pedro Adão, Hideki Sakurada
2012/315 (PDF ) Using Variance to Analyze Visual Cryptography Schemes Teng Guo, Feng Liu, ChuanKun Wu, YoungChang Hou
2012/314 (PDF ) Generation of Nonlinear Feedback Shift Registers with special-purpose hardware Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zablocki
2012/312 (PDF ) Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Debiao He
2012/311 (PDF ) Tightly Secure Signatures and Public-Key Encryption Dennis Hofheinz, Tibor Jager
2012/310 (PDF ) A mathematical problem for security analysis of hash functions and pseudorandom generators Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata
2012/309 (PDF ) Fast and compact elliptic-curve cryptography Mike Hamburg
2012/308 (PDF ) Verified Security of Redundancy-Free Encryption from Rabin and RSA Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin
2012/307 (PDF ) Multi-Channel Broadcast Encryption Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh
2012/306 (PDF ) Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp
2012/305 (PDF ) Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography Duong Hieu Phan, Viet Cuong Trinh
2012/304 (PDF ) Actively Secure Two-Party Evaluation of any Quantum Operation Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
2012/303 (PDF ) On The Distribution of Linear Biases: Three Instructive Examples Mohamed Ahmed Abdelraheem, Martin Aagren, Peter Beelen, Gregor Leander
2012/302 (PDF ) On instance separation in the UC-framework István Vajda
2012/301 (PDF ) A Public Shuffle without Private Permutations Myungsun Kim, Jinsu Kim, Jung Hee Cheon
2012/300 (PDF ) Threshold Implementations of all 3x3 and 4x4 S-boxes B. Bilgin, S. Nikova, V. Nikov, V. Rijmen, G. Stütz
2012/299 (PDF ) Differential Power Analysis on ZUC Algorithm TANG Ming, CHENG PingPan, QIU ZhenLong
2012/298 (PDF ) Anonymous Credentials Light Foteini Baldimtsi, Anna Lysyanskaya
2012/297 (PDF ) Tamper and Leakage Resilience in the Split-State Model Feng-Hao Liu, Anna Lysyanskaya
2012/296 (PDF ) In the blink of an eye: There goes your AES key Sergei Skorobogatov, Christopher Woods
2012/295 (PDF ) Broadcast-enhanced key predistribution schemes Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson
2012/294 (PDF ) Two grumpy giants and a baby Daniel J. Bernstein, Tanja Lange
2012/293 (PDF ) New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors Wei Wei, Chengliang Tian, Xiaoyun Wang
2012/292 (PDF ) An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle Jon Passki, Tom Ritter
2012/291 (PDF ) Efficient Dynamic Provable Possession of Remote Data via Update Trees Yihua Zhang, Marina Blanton
2012/290 (PDF ) Fully Homomorphic Message Authenticators Rosario Gennaro, Daniel Wichs
2012/289 (PDF ) Ring Group Signatures Liqun Chen
2012/288 (PDF ) Fair Exchange of Short Signatures without Trusted Third Party Philippe Camacho
2012/287 (PDF ) Computationally-Fair Group and Identity-Based Key-Exchange Andrew C. Yao, Yunlei Zhao
2012/286 (PDF ) Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis Sk Subidh Ali, Debdeep Mukhopadhyay
2012/285 (PDF ) Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2012/284 (PDF ) Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2012/283 (PDF ) Some properties of q-ary functions based on spectral analysis Deep Singh, Maheshanand Bhaintwal
2012/282 (PDF ) ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY Md. Iftekhar Salam, Hoon-Jae Lee
2012/281 (PDF ) Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications Dario Fiore, Rosario Gennaro
2012/280 (PDF ) Improved ``Partial Sums"-based Square Attack on AES Michael Tunstall
2012/279 (PDF ) Concurrent Zero Knowledge in the Bounded Player Model Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti
2012/278 (PDF ) Improved Indifferentiability Security Bound for the JH Mode Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
2012/277 (PDF ) Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil Rkia Aouinatou, Mostafa Belkasmi
2012/276 (PDF ) Official Arbitration with Secure Cloud Storage Application Alptekin Küpçü
2012/275 (PDF ) Implementing BLAKE with AVX, AVX2, and XOP Samuel Neves, Jean-Philippe Aumasson
2012/274 (PDF ) Boomerang and Slide-Rotational Analysis of the SM3 Hash Function Aleksandar Kircanski, Amr M. Youssef
2012/273 (PDF ) Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
2012/272 (PDF ) Passive Corruption in Statistical Multi-Party Computation Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
2012/270 (PDF ) Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings Enrico Thomae
2012/269 (PDF ) Quantifying Side-Channel Information Leakage from Web Applications Luke Mather, Elisabeth Oswald
2012/268 (PDF ) On the CCA2 Security of McEliece in the Standard Model Edoardo Persichetti
2012/267 (PDF ) Self-pairings on Hyperelliptic Curves Steven D. Galbraith, Chang-An Zhao
2012/266 (PDF ) Compilation Techniques for Efficient Encrypted Computation Christopher Fletcher, Marten van Dijk, Srinivas Devadas
2012/265 (PDF ) Foundations of Garbled Circuits Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
2012/264 (PDF ) On the (In)Security of IDEA in Various Hashing Modes Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang
2012/263 (PDF ) One-way Functions from Chebyshev Polynomials Kai-Yuen Cheong
2012/262 (PDF ) Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol I. Damgard, M. Keller, E. Larraia, C. Miles, N. P. Smart
2012/261 (PDF ) Dual Form Signatures: An Approach for Proving Security from Static Assumptions Michael Gerbush, Allison Lewko, Adam O'Neill, Brent Waters
2012/260 (PDF ) Transposition of AES Key Schedule Jialin Huang, Xuejia Lai
2012/259 (PDF ) A Novel Strong Designated Verifier Signature Scheme without Random Oracles Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/258 (PDF ) Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin
2012/256 (PDF ) The myth of generic DPA...and the magic of learning Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert
2012/255 (PDF ) How to Garble Arithmetic Circuits Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
2012/254 (PDF ) FastPRP: Fast Pseudo-Random Permutations for Small Domains Emil Stefanov, Elaine Shi
2012/253 (PDF ) Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Zhian Zhu
2012/252 (PDF ) Fair Private Set Intersection with a Semi-trusted Arbiter Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
2012/251 (PDF ) The Linux Pseudorandom Number Generator Revisited Patrick Lacharme, Andrea Röck, Vincent Strubel, Marion Videau
2012/250 (PDF ) New Identity Based Encryption And Its Proxy Re-encryption Xu An Wang, Xiaoyuan Yang
2012/249 (PDF ) Binary and q-ary Tardos codes, revisited Boris Skoric, Jan-Jaap Oosterwijk
2012/248 (PDF ) Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
2012/247 (PDF ) On Efficient Pairings on Elliptic Curves over Extension Fields Xusheng Zhang, Kunpeng Wang, Dongdai Lin
2012/246 (PDF ) A Secret Sharing Scheme Based on Group Presentations and the Word Problem Maggie Habeeb, Delaram Kahrobaei, Vladimir Shpilrain
2012/245 (PDF ) On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen
2012/244 (PDF ) Cryptography from tensor problems Leonard J. Schulman
2012/243 (PDF ) COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES MYUNGSUN KIM, JIHYE KIM, JUNG HEE CHEON
2012/242 (PDF ) Less is More: Relaxed yet Composable Security Notions for Key Exchange C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, S. Williams
2012/241 (PDF ) Key distribution system and attribute-based encryption Masahiro Yagisawa
2012/240 (PDF ) Field Switching in BGV-Style Homomorphic Encryption Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
2012/239 (PDF ) Zero-Knowledge for Multivariate Polynomials Valerie Nachef, Jacques Patarin, Emmanuel Volte
2012/238 (PDF ) The Boomerang Attacks on the Round-Reduced Skein-512 Hongbo Yu, Jiazhe Chen, XIaoyun Wang
2012/237 (PDF ) In the point of view security, An efficient scheme in IBE with random oracle Rkia Aouinatou, Mostafa Belkasmi
2012/236 (PDF ) On Necessary and Sufficient Conditions for Private Ballot Submission D. Bernhard, O. Pereira, B. Warinschi
2012/235 (PDF ) Ring-LWE in Polynomial Rings Leo Ducas, Alain Durmus
2012/234 (PDF ) SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
2012/233 (PDF ) A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis Qi Chai, Guang Gong
2012/232 (PDF ) Implementing Pairings at the 192-bit Security Level Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez
2012/231 (PDF ) A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin, Pengwei Wang
2012/230 (PDF ) On Ideal Lattices and Learning with Errors Over Rings Vadim Lyubashevsky, Chris Peikert, Oded Regev
2012/229 (PDF ) Languages with Efficient Zero-Knowledge PCP's are in SZK Mohammad Mahmoody, David Xiao
2012/228 (PDF ) Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results Marten van Dijk, Ulrich Rührmair
2012/226 (PDF ) ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn, C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya
2012/225 (PDF ) When Homomorphism Becomes a Liability Zvika Brakerski
2012/224 (PDF ) Shorter IBE and Signatures via Asymmetric Pairings Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoeteck Wee
2012/223 (PDF ) A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes Enrico Thomae
2012/222 (PDF ) A secret sharing scheme of prime numbers based on hardness of factorization Kai-Yuen Cheong
2012/221 (PDF ) Almost-Everywhere Secure Computation with Edge Corruptions Nishanth Chandran, Juan Garay, Rafail Ostrovsky
2012/220 (PDF ) Hedged Public-key Encryption: How to Protect against Bad Randomness Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek
2012/219 (PDF ) Private Fingerprint Matching Siamak F. Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona
2012/218 (PDF ) Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams T-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu
2012/217 (PDF ) Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2012/216 (PDF ) Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler
2012/215 (PDF ) Quadratic Span Programs and Succinct NIZKs without PCPs Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova
2012/214 (PDF ) Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version) Shengbao Wu, Mingsheng Wang
2012/213 (PDF ) Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2012/212 (PDF ) Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, Dongdai Lin
2012/211 (PDF ) Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama
2012/210 (PDF ) On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks Yusong Du, Fangguo Zhang
2012/209 (PDF ) Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications Donghoon Chang, Moti Yung
2012/208 (PDF ) A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER Jay Shah, Ayan Mahalanobis
2012/206 (PDF ) (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou
2012/205 (PDF ) Information-flow control for programming on encrypted data J. C. Mitchell, R. Sharma, D. Stefan, J. Zimmerman
2012/204 (PDF ) Unique Group Signatures Matthew Franklin, Haibin Zhang
2012/203 (PDF ) Robust biometric-based user authentication scheme for wireless sensor networks Debiao He
2012/202 (PDF ) Secure Similarity Coefficients Computation with Malicious Adversaries Bo Zhang, Fangguo Zhang
2012/201 (PDF ) Comment an Anonymous Multi-receiver Identity-based Encryption Scheme J. H. Zhang, Y. B. Cui
2012/200 (PDF ) Aggregate Signcryption Alexander W. Dent
2012/199 (PDF ) Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault
2012/198 (PDF ) Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures Jae Hong Seo, Jung Hee Cheon
2012/197 (PDF ) On The Security of One-Witness Blind Signature Schemes Foteini Baldimtsi, Anna Lysyanskaya
2012/196 (PDF ) Multi-Instance Security and its Application to Password-Based Cryptography Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
2012/195 (PDF ) The BlueJay Ultra-Lightweight Hybrid Cryptosystem Markku-Juhani O. Saarinen
2012/194 (PDF ) A Multivariate based Threshold Ring Signature Scheme Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2012/193 (PDF ) An Efficient Homomorphic Encryption Protocol for Multi-User Systems Liangliang Xiao, Osbert Bastani, I-Ling Yen
2012/192 (PDF ) Extending Order Preserving Encryption for Multi-User Systems Liangliang Xiao, I-Ling Yen, Dung T. Huynh
2012/191 (PDF ) Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes Liangliang Xiao, I-Ling Yen
2012/190 (PDF ) On the Security of an Improved Password Authentication Scheme Based on ECC Ding Wang, Chun-guang Ma
2012/189 (PDF ) Universally Composable Key-Management Steve Kremer, Robert Künnemann, Graham Steel
2012/188 (PDF ) Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification Xin Li
2012/187 (PDF ) SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version) Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann
2012/186 (PDF ) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh
2012/185 (PDF ) Replay attacks that violate ballot secrecy in Helios Ben Smyth
2012/184 (PDF ) Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten, Boris Skoric
2012/183 (PDF ) Differentially Private Smart Metering with Battery Recharging Michael Backes, Sebastian Meiser
2012/182 (PDF ) How to Construct Quantum Random Functions Mark Zhandry
2012/181 (PDF ) A Modular Framework for Multi-Factor Authentication and Key Exchange Nils Fleischhacker, Mark Manulis, Amir Azodi
2012/180 (PDF ) Yet Another SHA-3 Round 3 FPGA Results Paper Brian Baldwin, William P. Marnane
2012/179 (PDF ) Billion-Gate Secure Computation with Malicious Adversaries Benjamin Kreuter, abhi shelat, Chih-hao Shen
2012/178 (PDF ) Eperio: Mitigating Technical Complexity in Cryptographic Election Verification Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams
2012/177 (PDF ) Everlasting Multi-Party Computation Dominique Unruh
2012/176 (PDF ) Improvements of Algebraic Attacks Based on Structured Gaussian Elimination Satrajit Ghosh, Abhijit Das
2012/175 (PDF ) Optimal First-Order Masking with Linear and Non-Linear Bijections Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY, Jean-Luc DANGER
2012/174 (PDF ) Zero Knowledge with Rubik's Cubes and Non-Abelian Groups Emmanuel VOLTE, Jacques PATARIN, Valérie NACHEF
2012/173 (PDF ) Automatically Verified Mechanized Proof of One-Encryption Key Exchange Bruno Blanchet
2012/172 (PDF ) Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2012/171 (PDF ) Quantum Money from Hidden Subspaces Scott Aaronson, Paul Christiano
2012/170 (PDF ) Approaches for the performance increasing of software implementation of integer multiplication in prime fields Vladislav Kovtun, Andrew Okhrimenko
2012/169 (PDF ) Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan
2012/168 (PDF ) A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich
2012/167 (PDF ) Pairing-based methods for genus 2 jacobians with maximal endomorphism ring Sorina Ionica
2012/166 (PDF ) A List of Maximum Period NLFSRs Elena Dubrova
2012/165 (PDF ) Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy Cristina Onete
2012/164 (PDF ) On Secure Two-party Integer Division Morten Dahl, Chao Ning, Tomas Toft
2012/163 (PDF ) Differential propagation analysis of Keccak Joan Daemen, Gilles Van Assche
2012/162 (PDF ) Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network Jayaprakash Kar
2012/161 (PDF ) New Constructions of Low Correlation Sequences with High Linear Complexity Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
2012/159 (PDF ) Hybrid Encryption in the Multi-User Setting G. M. Zaverucha
2012/158 (PDF ) Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading Peter Gazi, Stefano Tessaro
2012/157 (PDF ) Attack on Fully Homomorphic Encryption over the Integers Gu Chunsheng
2012/156 (PDF ) Fast Embedded Software Hashing Dag Arne Osvik
2012/155 (PDF ) Toward Practical Group Encryption Laila El Aimani, Marc Joye
2012/153 (PDF ) A Framework for the Cryptographic Verification of Java-like Programs Ralf Kuesters, Tomasz Truderung, Juergen Graf
2012/152 (PDF ) On security of a Certificateless Aggregate Signature Scheme Limin Shen, Yinxia Sun
2012/151 (PDF ) On Boolean Ideals and Varieties with Application to Algebraic Attacks Alexander Rostovtsev, Alexey Mizyukin
2012/150 (PDF ) Circular chosen-ciphertext security with compact ciphertexts Dennis Hofheinz
2012/149 (PDF ) Attacking Scrambled Burrows-Wheeler Transform Martin Stanek
2012/148 (PDF ) Replacing Username/Password with Software-Only Two-Factor Authentication Michael Scott
2012/147 (PDF ) On Security Arguments of the Second Round SHA-3 Candidates Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger
2012/146 (PDF ) On Polynomial Systems Arising from a Weil Descent Christophe Petit, Jean-Jacques Quisquater
2012/145 (PDF ) Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita
2012/144 (PDF ) Somewhat Practical Fully Homomorphic Encryption Junfeng Fan, Frederik Vercauteren
2012/143 (PDF ) Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
2012/142 (PDF ) Identity-Based Encryption with Master Key-Dependent Message Security and Applications David Galindo, Javier Herranz, Jorge Villar
2012/141 (PDF ) Bicliques for permutations: collision and preimage attacks in stronger settings Dmitry Khovratovich
2012/140 (PDF ) Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors Selcuk Baktir, Erkay Savas
2012/139 (PDF ) Formal verication of secure ad-hoc network routing protocols using deductive model-checking Ta Vinh Thong
2012/138 (PDF ) An Improved Differential Attack on Full GOST (extended version) Nicolas T. Courtois
2012/137 (PDF ) Usable assembly language for GPUs: a success story Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
2012/136 (PDF ) Adaptive Key Protection in Complex Cryptosystems with Attributes Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng
2012/135 (PDF ) David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
2012/134 (PDF ) A Digital Signature Scheme for Long-Term Security Dimitrios Poulakis, Robert Rolland
2012/133 (PDF ) Toward Practical Private Access to Data Centers via Parallel ORAM Jacob R. Lorch, Bryan Parno, James Mickens, Mariana Raykova, Joshua Schiffman
2012/132 (PDF ) CFS Software Implementation Gregory Landais, Nicolas Sendrier
2012/131 (PDF ) Composition Theorems for CCA Cryptographic Security Rodolphe Lampe, Jacques Patarin
2012/130 (PDF ) Broadcast-Efficient Secure Multiparty Computation Juan Garay, Clint Givens, Rafail Ostrovsky
2012/129 (PDF ) Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts Nelly Fazio, Irippuge Milinda Perera
2012/128 (PDF ) Provably Secure Distance-Bounding: an Analysis of Prominent Protocols Marc Fischlin, Cristina Onete
2012/127 (PDF ) Additive autocorrelation of some classes of cubic semi-bent Boolean functions Deep Singh, Maheshanand Bhaintwal
2012/126 (PDF ) Compact Implementation of Threefish and Skein on FPGA Nuray At, Jean-Luc Beuchat, Ismail San
2012/124 (PDF ) On Securing Communication From Profilers Sandra Diaz-Santiago, Debrup Chakraborty
2012/123 (PDF ) Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system- A. Dehbaoui, J. M. Dutertre, B. Robisson, P. Orsatelli, P. Maurine, A. Tria
2012/122 (PDF ) Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three Reza R. Farashahi, Hongfeng Wu, Chang-An Zhao
2012/121 (PDF ) An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps Mitra Fatemi, Taraneh Eghlidos, Mohammadreza Aref
2012/120 (PDF ) Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks Yongge Wang
2012/119 (PDF ) Accelerating the Final Exponentiation in the Computation of the Tate Pairings Taechan Kim, Sungwook Kim, Jung Hee Cheon
2012/118 (PDF ) Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2012/117 (PDF ) Universally Composable Security With Local Adversaries Ran Canetti, Margarita Vald
2012/116 (PDF ) Clash Attacks on the Verifiability of E-Voting Systems Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2012/115 (PDF ) Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing XU Chun-xiang, HE Xiao-hu, Daniel Abraha
2012/114 (PDF ) On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
2012/113 (PDF ) On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model Bart Mennink
2012/112 (PDF ) On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sonmez Turan
2012/111 (PDF ) On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks Yin Zhang, Meicheng Liu, Dongdai Lin
2012/110 (PDF ) Finding Optimal Formulae for Bilinear Maps Razvan Barbulescu, Jérémie Detrey, Nicolas Estibals, Paul Zimmermann
2012/108 (PDF ) On the Optimality of Lattices for the Coppersmith Technique Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe
2012/107 (PDF ) Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks Guilin Wang, Jiangshan Yu, Qi Xie
2012/106 (PDF ) More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents Santanu Sarkar, Subhamoy Maitra
2012/105 (PDF ) Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
2012/104 (PDF ) Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
2012/103 (PDF ) FlipIt: The Game of "Stealthy Takeover" Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
2012/102 (PDF ) On the Circular Security of Bit-Encryption Ron Rothblum
2012/100 (PDF ) Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet Shahram Khazaei, Björn Terelius, Douglas Wikström
2012/099 (PDF ) Homomorphic Evaluation of the AES Circuit Craig Gentry, Shai Halevi, Nigel P. Smart
2012/098 (PDF ) Combined Attacks on the AES Key Schedule François Dassance, Alexandre Venelli
2012/097 (PDF ) An algorithm for factoring integers Yingpu Deng, Yanbin Pan
2012/096 (PDF ) The Collision Security of MDC-4 Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
2012/095 (PDF ) Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
2012/094 (PDF ) Algebraic attack on lattice based cryptosystems via solving equations over real numbers. Jintai Ding, Dieter Schmidt
2012/093 (PDF ) Recent Results on Balanced Symmetric Boolean Functions Yingming Guo, Guangpu Gao, Yaqun Zhao
2012/092 (PDF ) Tolerant Algebraic Side-Channel Analysis of {AES} Yossef Oren, Avishai Wool
2012/090 (PDF ) Worst-Case to Average-Case Reductions for Module Lattices Adeline Langlois, Damien Stehle
2012/089 (PDF ) ECM at Work Joppe W. Bos, Thorsten Kleinjung
2012/087 (PDF ) Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev
2012/085 (PDF ) Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery Stanislav Bulygin, Michael Walter
2012/084 (PDF ) Improved Algebraic Side-Channel Attack on AES Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter
2012/083 (PDF ) Optimally Robust Private Information Retrieval Casey Devet, Ian Goldberg, Nadia Heninger
2012/082 (PDF ) Semi-Supervised Template Attack Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cedric Meuter, Gianluca Bontempi, Olivier Markowitch
2012/081 (PDF ) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification Michael Backes, Fabian Bendun, Dominique Unruh
2012/080 (PDF ) Strongly Unforgeable Proxy Re-Signatures in the Standard Model S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan
2012/079 (PDF ) Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0 Masao KASAHARA
2012/078 (PDF ) Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP Zvika Brakerski
2012/077 (PDF ) MAGNITUDE SQUARED COHERENCE BASED SCA Sebastien Tiran, Amine Dehbaoui, Philippe Maurine
2012/076 (PDF ) Secure Identity-Based Encryption in the Quantum Random Oracle Model Mark Zhandry
2012/075 (PDF ) Efficient identity-based threshold decryption scheme from bilinear pairings Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang
2012/074 (PDF ) Another look at HMAC Neal Koblitz, Alfred Menezes
2012/073 (PDF ) Efficient identity-based threshold signature scheme from bilinear pairings in the standard model Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
2012/072 (PDF ) Particularly Friendly Members of Family Trees Craig Costello
2012/071 (PDF ) Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer
2012/070 (PDF ) Finding ECM-Friendly Curves through a Study of Galois Properties Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery
2012/069 (PDF ) Automatic Search of Attacks on round-reduced AES and Applications Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
2012/067 (PDF ) Parallelizing message schedules to accelerate the computations of hash functions Shay Gueron, Vlad Krasnov
2012/066 (PDF ) Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis Jiqiang Lu, Wen-She Yap, Yongzhuang Wei
2012/065 (PDF ) Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha” Tsukasa Ishiguro
2012/064 (PDF ) Ron was wrong, Whit is right Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter
2012/063 (PDF ) Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikström
2012/061 (PDF ) A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/060 (PDF ) Improved Security for Linearly Homomorphic Signatures: A Generic Framework David Mandell Freeman
2012/059 (PDF ) Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs
2012/058 (PDF ) Key recycling in authentication Christopher Portmann
2012/057 (PDF ) Anonymous Constant-Size Ciphertext HIBE From Asymmetric Pairings Somindu C. Ramanna, Palash Sarkar
2012/056 (PDF ) A New Pseudorandom Generator from Collision-Resistant Hash Functions Alexandra Boldyreva, Virendra Kumar
2012/054 (PDF ) On the performance of certain Private Set Intersection protocols Emiliano De Cristofaro, Gene Tsudik
2012/053 (PDF ) Beating Shannon requires BOTH efficient adversaries AND non-zero advantage Yevgeniy Dodis
2012/052 (PDF ) Identity-based Encryption with Efficient Revocation Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
2012/051 (PDF ) Eavesdropping on Satellite Telecommunication Systems Benedikt Driessen
2012/050 (PDF ) Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture Jeremy Constantin, Andreas Burg, Frank K. Gurkaynak
2012/049 (PDF ) 2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160 Yu Sasaki, Lei Wang
2012/048 (PDF ) Designing Integrated Accelerator for Stream Ciphers with Structural Similarities Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid
2012/047 (PDF ) Incremental Deterministic Public-Key Encryption Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
2012/046 (PDF ) Modifying Boolean Functions to Ensure Maximum Algebraic Immunity Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis
2012/045 (PDF ) Signature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
2012/044 (PDF ) PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems Jun Zhou, Zhenfu Cao
2012/043 (PDF ) A novel Group Key Transfer Protocol Chingfang Hsu, Bing Zeng, Qi Cheng, Guohua Cui
2012/042 (PDF ) Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
2012/040 (PDF ) Single-block collision attack on MD5 Marc Stevens
2012/039 (PDF ) Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke
2012/038 (PDF ) Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loic van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon
2012/037 (PDF ) Some results on $q$-ary bent functions Deep Singh, Maheshanand Bhaintwal, Brajesh Kumar Singh
2012/036 (PDF ) Efficient Leakage-free Authentication of Trees, Graphs and Forests Ashish Kundu, Mikhail Atallah, Elisa Bertino
2012/035 (PDF ) Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
2012/034 (PDF ) Automatic Quantification of Cache Side-Channels Boris Köpf, Laurent Mauborgne, Martin Ochoa
2012/033 (PDF ) A note on hyper-bent functions via Dillon-like exponents Sihem Mesnager, Jean-Pierre Flori
2012/032 (PDF ) Counterexamples to Hardness Amplification Beyond Negligible Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs
2012/031 (PDF ) An error in "On a new formal proof model for RFID location privacy" Da-Zhi Sun
2012/030 (PDF ) Fault Analysis of the KATAN Family of Block Ciphers Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
2012/029 (PDF ) On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin
2012/028 (PDF ) A First-Order Leak-Free Masking Countermeasure Houssem MAGHREBI, Emmanuel PROUFF, Sylvain GUILLEY, Jean-Luc DANGER
2012/026 (PDF ) Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding Anja Becker, Antoine Joux, Alexander May, Alexander Meurer
2012/025 (PDF ) A new remote data integrity checking scheme for cloud storage Xiangtao Yan, Yifa Li
2012/024 (PDF ) Variants of Waters' Dual-System Primitives Using Asymmetric Pairings Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
2012/023 (PDF ) On the security of Lo et al.’s ownership transfer protocol Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Ali Mahani
2012/022 (PDF ) Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity Mihir Bellare, Stefano Tessaro
2012/020 (PDF ) Dickson polynomials, hyperelliptic curves and hyper-bent functions Jean-Pierre Flori, Sihem Mesnager
2012/019 (PDF ) Towards Unconditional Soundness: Computationally Complete Symbolic Attacker Gergei Bana, Hubert Comon-Lundh
2012/018 (PDF ) Attacks and Security Proofs of EAX-Prime Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata
2012/017 (PDF ) Secondary constructions on generalized bent functions Brajesh Kumar Singh
2012/015 (PDF ) A Cryptographic Treatment of the Wiretap Channel Mihir Bellare, Stefano Tessaro, Alexander Vardy
2012/014 (PDF ) Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
2012/012 (PDF ) Malleable Proof Systems and Applications Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/011 (PDF ) Biclique Attack of the Full ARIA-256 Shao-zhen Chen Tian-min Xu
2012/010 (PDF ) PayTree: "Amortized Signature" for Flexible Micro-Payments Charanjit Jutla, Moti Yung
2012/009 (PDF ) On the Indifferentiability of the Integrated-Key Hash Functions Saif Al-Kuwari
2012/008 (PDF ) Security proof with dishonest keys Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri
2012/007 (PDF ) Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
2012/006 (PDF ) Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger, Allison Lewko, Brent Waters
2012/005 (PDF ) A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Benjamin Fuller, Adam O'Neill, Leonid Reyzin
2012/004 (PDF ) The new SHA-3 software shootout Daniel J. Bernstein, Tanja Lange
2012/003 (PDF ) On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian
2012/002 (PDF ) ECC2K-130 on NVIDIA GPUs Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
2012/001 (PDF ) Digital Signatures from Challenge-Divided Sigma-Protocols Andrew C. Yao, Yunlei Zhao
2011/714 (PDF ) Position-Verification in Multi-Channel Models Huajun Zhang, Zongyang Zhang, Zhenfu Cao
2011/713 (PDF ) A server-aided verification signature scheme without random oracles Bin Wang, Qing Zhao
2011/712 (PDF ) Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices Johann Großschädl, Dan Page, Stefan Tillich
2011/711 (PDF ) Evolutionary Construction of de Bruijn Sequences Meltem Sonmez Turan
2011/710 (PDF ) Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov, Johann Großschädl
2011/709 (PDF ) Fault Attack against Miller's algorithm Nadia El Mrabet
2011/708 (PDF ) Computational Extractors and Pseudorandomness Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin
2011/707 (PDF ) Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF Alex Biryukov, Ilya Kizhvatov, Bin Zhang
2011/706 (PDF ) Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer, Peter Günther, Gennadij Liske
2011/705 (PDF ) Differential Attacks on Generalized Feistel Schemes Valerie Nachef, Emmanuel Volte, Jacques Patarin
2011/704 (PDF ) Security Analysis of a PUF based RFID Authentication Protocol Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/703 (PDF ) Waters Signatures with Optimal Security Reduction Dennis Hofheinz, Tibor Jager, Edward Knapp
2011/702 (PDF ) Comments of an efficient and secure multi-server authentication scheme with key agreement Yitao Chen
2011/701 (PDF ) Decentralized Attribute-Based Signatures Tatsuaki Okamoto, Katsuyuki Takashima
2011/700 (PDF ) Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model Tatsuaki Okamoto, Katsuyuki Takashima
2011/698 (PDF ) A generalization of the class of hyper-bent Boolean functions in binomial forms Chunming Tang, Yu Lou, Yanfeng Qi, Baocheng Wang, Yixian Yang
2011/697 (PDF ) SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
2011/696 (PDF ) Efficient Network Coding Signatures in the Standard Model Dario Catalano, Dario Fiore, Bogdan Warinschi
2011/695 (PDF ) Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2011/694 (PDF ) Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng
2011/693 (PDF ) A non-interactive deniable authentication scheme in the standard model Bin Wang, Qing Zhao, Ke Dai
2011/692 (PDF ) Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions Cheng Chen, Zhenfeng Zhang, Dengguo Feng
2011/691 (PDF ) Yet Another Ultralightweight Authentication Protocol that is Broken Gildas Avoine, Xavier Carpent
2011/690 (PDF ) A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation Masao KASAHARA
2011/688 (PDF ) Authenticated Key Exchange under Bad Randomness Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang
2011/687 (PDF ) Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption) Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
2011/686 (PDF ) Analysis of some natural variants of the PKP Algorithm Rodolphe LAMPE, Jacques PATARIN
2011/685 (PDF ) Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov
2011/684 (PDF ) Identification Based Encryption with RSA-OAEP. Using SEM and Without Rkia Aouinatou, Mostafa Belkasmi
2011/683 (PDF ) Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems Falko Strenzke
2011/682 (PDF ) UC framework for anonymous communication István Vajda
2011/681 (PDF ) Physically Uncloneable Functions in the Universal Composition Framework Chris Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
2011/680 (PDF ) Better Bootstrapping in Fully Homomorphic Encryption Craig Gentry, Shai Halevi, Nigel P. Smart
2011/679 (PDF ) CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider
2011/678 (PDF ) On definitions of selective opening security Florian Böhl, Dennis Hofheinz, Daniel Kraschewski
2011/677 (PDF ) CommitCoin: Carbon Dating Commitments with Bitcoin Jeremy Clark, Aleksander Essex
2011/676 (PDF ) Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie
2011/675 (PDF ) Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges
2011/674 (PDF ) Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval Colleen M. Swanson, Douglas R. Stinson
2011/673 (PDF ) Pseudorandom Signatures Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering
2011/672 (PDF ) Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke
2011/671 (PDF ) Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256 Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man
2011/670 (PDF ) SHA-3 on ARM11 processors Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang
2011/669 (PDF ) Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf, Enrico Thomae
2011/668 (PDF ) Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr K. Tysowski, M. Anwarul Hasan
2011/666 (PDF ) A Gross-Zagier formula for quaternion algebras over totally real fields Eyal Z. Goren, Kristin E. Lauter
2011/665 (PDF ) Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Gonzalez Nieto
2011/664 (PDF ) On the Security of ID Based Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
2011/663 (PDF ) Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
2011/662 (PDF ) Deploying secure multi-party computation for financial data analysis Dan Bogdanov, Riivo Talviste, Jan Willemson
2011/661 (PDF ) New Impossible Differential Attacks on Camellia Dongxia Bai, Leibo Li
2011/660 (PDF ) Program Obfuscation with Leaky Hardware Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum
2011/659 (PDF ) Formally Assessing Cryptographic Entropy Daniel R. L. Brown
2011/658 (PDF ) Anonymous attestation with user-controlled linkability D. Bernhard, G. Fuchsbauer, E. Ghadafi, N. P. Smart, B. Warinschi
2011/657 (PDF ) A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions Abhranil Maiti, Vikash Gunreddy, Patrick Schaumont
2011/656 (PDF ) Use Data-depend Function Build Message Expansion Function ZiJie Xu, Ke Xu
2011/655 (PDF ) Privacy-Preserving Stream Aggregation with Fault Tolerance T-H. Hubert Chan, Elaine Shi, Dawn Song
2011/654 (PDF ) Elliptic Curve Cryptography in JavaScript Laurie Haustenne, Quentin De Neyer, Olivier Pereira
2011/652 (PDF ) Security Enhancement of the Vortex Family of Hash Functions Shay Gueron, Michael Kounavis
2011/651 (PDF ) CHECKER: On-site checking in RFID-based supply chains Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2011/650 (PDF ) Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
2011/649 (PDF ) On the Security of NMAC and Its Variants Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng
2011/648 (PDF ) Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption Tatsuaki Okamoto, Katsuyuki Takashima
2011/647 (PDF ) Breaking $H^2$-MAC Using Birthday Paradox Fanbao Liu, Tao Xie, Changxiang Shen
2011/646 (PDF ) The security impact of a new cryptographic library Daniel J. Bernstein, Tanja Lange, Peter Schwabe
2011/645 (PDF ) Fully Homomorphic Encryption Based on Approximate Matrix GCD Gu Chunsheng
2011/644 (PDF ) McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
2011/643 (PDF ) Some Words About Cryptographic Key Recognition In Data Streams Alexey Chilikov, Evgeny Alekseev
2011/642 (PDF ) Constructing differentially 4-uniform permutations over $\mbf_{2^{2m}}$ from quadratic APN permutations over $\mbf_{2^{2m+1}}$ Yongqiang Li, Mingsheng Wang
2011/641 (PDF ) Collision for 75-step SHA-1: Intensive Parallelization with GPU E. A. Grechnikov, A. V. Adinetz
2011/640 (PDF ) Hummingbird: Privacy at the time of Twitter Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams
2011/639 (PDF ) Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla
2011/638 (PDF ) Rubik's for cryptographers Christophe Petit, Jean-Jacques Quisquater
2011/637 (PDF ) Random Number Generation Based on Oscillatory Metastability in Ring Circuits Laszlo Hars
2011/635 (PDF ) Groestl Tweaks and their Effect on FPGA Results Marcin Rogawski, Kris Gaj
2011/634 (PDF ) Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
2011/633 (PDF ) Practical realisation and elimination of an ECC-related software bug attack B. B. Brumley, M. Barbosa, D. Page, F. Vercauteren
2011/632 (PDF ) A Scalable Method for Constructing Galois NLFSRs with Period $2^n-1$ using Cross-Join Pairs Elena Dubrova
2011/631 (PDF ) Cheating Human Vision in Visual Secret Sharing Yu-Chi Chen, Gwoboa Horng, Du-Shiau Tsai
2011/630 (PDF ) Indifferentiability Security of the Fast Wide Pipe Hash: Breaking the Birthday Barrier Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
2011/629 (PDF ) Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
2011/628 (PDF ) Maximum Leakage Resilient IBE and IPE Kaoru Kurosawa, Le Trieu Phong
2011/627 (PDF ) A note on semi-bent functions with multiple trace terms and hyperelliptic curves Sihem Mesnager
2011/626 (PDF ) Algebraic Complexity Reduction and Cryptanalysis of GOST Nicolas T. Courtois
2011/624 (PDF ) New attacks on Keccak-224 and Keccak-256 Itai Dinur, Orr Dunkelman, Adi Shamir
2011/623 (PDF ) Indifferentiability of the Hash Algorithm BLAKE Donghoon Chang, Mridul Nandi, Moti Yung
2011/622 (PDF ) Homomorphic encryption from codes Andrej Bogdanov, Chin Ho Lee
2011/621 (PDF ) Adaptive Security of Concurrent Non-Malleable Zero-Knowledge Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
2011/620 (PDF ) Provable Security of BLAKE with Non-Ideal Compression Function Elena Andreeva, Atul Luykx, Bart Mennink
2011/619 (PDF ) Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64 Bo Zhu, Guang Gong
2011/618 (PDF ) Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2011/617 (PDF ) Charm: A framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele, Matthew D. Green, Avi D. Rubin
2011/616 (PDF ) Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT Jiazhe Chen, Meiqin Wang, Bart Preneel
2011/615 (PDF ) On the Joint Security of Encryption and Signature in EMV Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler
2011/614 (PDF ) On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud Keke Chen
2011/613 (PDF ) Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Gilad Asharov, Abhishek Jain, Daniel Wichs
2011/612 (PDF ) IBAKE: Identity-Based Authenticated Key Exchange Protocol Vladimir Kolesnikov, Ganapathy S. Sundaram
2011/611 (PDF ) Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam
2011/610 (PDF ) An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert
2011/609 (PDF ) The PHOTON Family of Lightweight Hash Functions Jian Guo, Thomas Peyrin, Axel Poschmann
2011/608 (PDF ) Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication Patrick Longa, Francesco Sica
2011/607 (PDF ) Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions} Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Javier Herranz
2011/605 (PDF ) Efficient and Secure Delegation of Linear Algebra Payman Mohassel
2011/604 (PDF ) Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions Aurore Guillevic, Damien Vergnaud
2011/602 (PDF ) Positive Results for Concurrently Secure Computation in the Plain Model Vipul Goyal
2011/601 (PDF ) A Multi-Receiver ID-Based Generalized Signcryption Scheme Caixue Zhou
2011/600 (PDF ) A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms Chunming Tang, Yanfeng Qi, Maozhi Xu, Baocheng Wang, Yixian Yang
2011/598 (PDF ) New Subexponential Algorithms for Factoring in $SL(2,\fq)$ Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault
2011/597 (PDF ) How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan
2011/596 (PDF ) Parallel Homomorphic Encryption Seny Kamara, Mariana Raykova
2011/594 (PDF ) Receipt Freeness of Prêt à Voter Provably Secure Dalia Khader, Peter Y. A. Ryan
2011/593 (PDF ) CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model Yu Chen, Liqun Chen, Zongyang Zhang
2011/592 (PDF ) Generic Constructions for Verifiable Signcryption Laila El Aimani
2011/591 (PDF ) A Unified Framework for Small Secret Exponent Attack on RSA Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
2011/590 (PDF ) An Efficient Broadcast Attack against NTRU Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu
2011/589 (PDF ) Impact of Intel's New Instruction Sets on Software Implementation of $GF(2)[x]$ Multiplication Chen Su, Haining Fan
2011/588 (PDF ) Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 Arpita Maitra, Goutam Paul
2011/587 (PDF ) Signatures of Correct Computation Charalampos Papamanthou, Elaine Shi, Roberto Tamassia
2011/586 (PDF ) TweLEX: A Tweaked Version of the LEX Stream Cipher Mainack Mondal, Avik Chakraborti, Nilanjan Datta, Debdeep Mukhopadhyay
2011/585 (PDF ) Iris: A Scalable Cloud File System with Efficient Integrity Checks Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels
2011/584 (PDF ) A Single-Key Attack on 6-Round KASUMI Teruo Saito
2011/583 (PDF ) Revocable Identity-Based Encryption from Lattices Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen
2011/582 (PDF ) Randomness Extraction in finite fields $\mathbb{F}_{p^{n}}$ Abdoul Aziz Ciss
2011/581 (PDF ) Standard Security Does Not Imply Security Against Selective-Opening Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek
2011/580 (PDF ) On a new generalization of Huff curves Abdoul Aziz Ciss, Djiby Sow
2011/579 (PDF ) Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama
2011/578 (PDF ) ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS Balasingham Balamohan
2011/577 (PDF ) An Efficient Protocol for the Commit-Prove-Fair-Open functionality Ou Ruan, Cai Fu, Guohua Cui
2011/576 (PDF ) Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures Jing Liu, Qiong Huang, Bo Yang, Yang Zhang
2011/575 (PDF ) Exclusive Key Based Group Rekeying Protocols Jing Liu, Changji Wang
2011/574 (PDF ) Towards Efficient Provable Data Possession in Cloud Storage Jia Xu, Ee-Chien Chang, Jianying Zhou
2011/573 (PDF ) A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0 Masao Kasahara
2011/572 (PDF ) The ElGamal cryptosystem over circulant matrices Ayan Mahalanobis
2011/570 (PDF ) Degree of regularity for HFE- Jintai Ding, Thorsten Kleinjung
2011/569 (PDF ) Analysis of the Hamming Weight of the Extended wmbNAF Ming Li, Ali Miri, Daming Zhu
2011/568 (PDF ) Single Layer Optical-scan Voting with Fully Distributed Trust Aleksander Essex, Christian Henrich, Urs Hengartner
2011/567 (PDF ) On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption Moon Sung Lee
2011/566 (PDF ) Fully Homomorphic Encryption with Polylog Overhead Craig Gentry, Shai Halevi, Nigel P. Smart
2011/565 (PDF ) Cryptographic Hash Functions: Recent Design Trends and Security Notions Saif Al-Kuwari, James H. Davenport, Russell J. Bradford
2011/564 (PDF ) Private-key Symbolic Encryption N. Ahmed, C. D. Jensen, E. Zenner
2011/563 (PDF ) On the Security of RFID Anti Cloning Security Protocol(ACSP) Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/562 (PDF ) A Group Testing Approach to Improved Corruption Localizing Hashing Annalisa De Bonis, Giovanni Di Crescenzo
2011/561 (PDF ) A Domain-Specific Language for Computing on Encrypted Data Alex Bain, John Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman
2011/560 (PDF ) Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation Ching-Hua Yu, Bo-Yin Yang
2011/559 (PDF ) Instantiability of RSA-OAEP under Chosen-Plaintext Attack Eike Kiltz, Adam O'Neill, Adam Smith
2011/558 (PDF ) Improved Attacks on Full GOST Itai Dinur, Orr Dunkelman, Adi Shamir
2011/557 (PDF ) An Improved Trace Driven Instruction Cache Timing Attack on RSA Chen Cai-Sen, Wang Tao, Chen Xiao-Cen, Zhou Ping
2011/556 (PDF ) GF(2^n) redundant representation using matrix embedding Yongjia Wang, Xi Xiong, Haining Fan
2011/555 (PDF ) On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks Michelle Kendall, Keith Martin
2011/554 (PDF ) On the security models for certificateless signature schemes achieving level 3 security Yu-Chi Chen, Gwoboa Horng
2011/553 (PDF ) Publicly Verifiable Proofs of Sequential Work Mohammad Mahmoody, Tal Moran, Salil Vadhan
2011/552 (PDF ) Recyclable PUFs: Logically Reconfigurable PUFs Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
2011/551 (PDF ) Security Evaluation against Differential Cryptanalysis for Block Cipher Structures Shengbao Wu, Mingsheng Wang
2011/550 (PDF ) A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions Javad Alizadeh, Abdolrasoul Mirghadri
2011/549 (PDF ) 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin, Zhuojun Liu, Baofeng Wu
2011/548 (PDF ) On the security of MQ_DRBG V. O. Drelikhov, G. B. Marshalko, A. V. Pokrovskiy
2011/547 (PDF ) The Single Cycle T-functions Zhaopeng Dai, Zhuojun Liu
2011/546 (PDF ) Hidden Vector Encryption Fully Secure Against Unrestricted Queries Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2011/545 (PDF ) Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0 Masao Kasahara
2011/544 (PDF ) Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Andres Molina-Markham, George Danezis, Kevin Fu, Prashant Shenoy, David Irwin
2011/543 (PDF ) Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption Tatsuaki Okamoto, Katsuyuki Takashima
2011/542 (PDF ) Certificate-Based Signcryption: Security Model and Efficient Construction Yang Lu, Jiguo Li
2011/541 (PDF ) Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman, Nathan Keller, Adi Shamir
2011/540 (PDF ) Efficient Implementation of the $\eta_T$ Pairing on GPU Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi
2011/539 (PDF ) Sign Modules in Secure Arithmetic Circuits Ching-Hua Yu
2011/538 (PDF ) Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage Jia Xu, Ee-Chien Chang, Jianying Zhou
2011/537 (PDF ) Lattice Signatures Without Trapdoors Vadim Lyubashevsky
2011/536 (PDF ) Revisiting Lower and Upper Bounds for Selective Decommitments Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti
2011/535 (PDF ) Multiparty Computation from Somewhat Homomorphic Encryption I. Damgard, V. Pastro, N. P. Smart, S. Zakarias
2011/534 (PDF ) Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks Maxime Nassar, Sylvain Guilley, Jean-Luc Danger
2011/533 (PDF ) Two-Output Secure Computation with Malicious Adversaries abhi shelat, Chih-hao Shen
2011/532 (PDF ) Hash Functions Based on Three Permutations: A Generic Security Analysis Bart Mennink, Bart Preneel
2011/531 (PDF ) Static Fault Attacks on Hardware DES Registers Philippe Loubet-Moundi, David Vigilant, Francis Olivier
2011/530 (PDF ) Key-Evolution Schemes Resilient to Space-Bounded Leakage Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
2011/529 (PDF ) Secure and Efficient Proof of Storage with Deduplication Qingji Zheng, Shouhuai Xu
2011/528 (PDF ) Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou
2011/526 (PDF ) Universally Composable Security Analysis of OAuth v2.0 Suresh Chari, Charanjit Jutla, Arnab Roy
2011/525 (PDF ) A Note on the Density of the Multiple Subset Sum Problems Yanbin Pan, Feng Zhang
2011/524 (PDF ) Security of Reduced-Round Camellia against Impossible Differential Attack Leibo Li, Jiazhe Chen, Xiaoyun Wang
2011/522 (PDF ) A Compact S-Box Design for SMS4 Block Cipher Imran Abbasi, Mehreen Afzal
2011/521 (PDF ) Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions Daniele Micciancio, Petros Mol
2011/520 (PDF ) Houssem Maghrebi and Sylvain Guilley and Claude Carlet and Jean-Luc Danger Houssem maghebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger
2011/519 (PDF ) Leakage-Resilient Cryptography From the Inner-Product Extractor Stefan Dziembowski, Sebastian Faust
2011/518 (PDF ) Two 1-Round Protocols for Delegation of Computation Ran Canetti, Ben Riva, Guy N. Rothblum
2011/517 (PDF ) Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2011/516 (PDF ) Protecting AES with Shamir's Secret Sharing Scheme Louis Goubin, Ange Martinelli
2011/515 (PDF ) A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang
2011/514 (PDF ) Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols Mohammad Sadeq Dousti, Rasool Jalili
2011/513 (PDF ) Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships Abhishek Jain, Omkant Pandey
2011/512 (PDF ) A Dichotomy for Local Small-Bias Generators Benny Applebaum, Andrej Bogdanov, Alon Rosen
2011/511 (PDF ) The Cryptographic Power of Random Selection Matthias Krause, Matthias Hamann
2011/510 (PDF ) On the Security of the Free-XOR Technique Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou
2011/509 (PDF ) Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies Emil Stefanov, Elaine Shi, Dawn Song
2011/508 (PDF ) Secure Two-Party Computation with Low Communication Ivan Damgård, Sebastian Faust, Carmit Hazay
2011/507 (PDF ) Relatively-Sound NIZKs and Password-Based Key-Exchange Charanjit Jutla, Arnab Roy
2011/506 (PDF ) Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies Luca De Feo, David Jao, Jérôme Plût
2011/505 (PDF ) A New Second Order Side Channel Attack Based on Linear Regression Julien Doget, Guillaume Dabosville, Emmanuel Prouff
2011/504 (PDF ) From Non-Adaptive to Adaptive Pseudorandom Functions Iftach Haitner, Itay Berman
2011/503 (PDF ) On the influence of the algebraic degree of $F^{−1}$ on the algebraic degree of $G \circ F$ Christina Boura, Anne Canteaut
2011/502 (PDF ) Wild McEliece Incognito Daniel J. Bernstein, Tanja Lange, Christiane Peters
2011/501 (PDF ) Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller Daniele Micciancio, Chris Peikert
2011/500 (PDF ) Biclique Cryptanalysis of the Block Cipher SQUARE Hamid Mala
2011/499 (PDF ) Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2011/498 (PDF ) An Efficient Secure Anonymous Proxy Signature Scheme Jue-Sam Chou, Shih-Che Hung, Yalin Chen
2011/497 (PDF ) Can a Program Reverse-Engineer Itself? Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion
2011/496 (PDF ) On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction Avradip Mandal, Jacques Patarin, Yannick Seurin
2011/495 (PDF ) Vector Commitments and their Applications Dario Catalano, Dario Fiore
2011/494 (PDF ) Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi
2011/493 (PDF ) From Point Obfuscation To 3-round Zero-Knowledge Nir Bitansky, Omer Paneth
2011/492 (PDF ) Rational distance-bounding protocols over noisy channels Long H. Nguyen
2011/490 (PDF ) Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting Allison Lewko
2011/489 (PDF ) Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis A. N. Alekseychuk, L. V. Kovalchuk
2011/488 (PDF ) A Survey of Cryptography Based on Physically Unclonable Objects Kai-Yuen Cheong
2011/487 (PDF ) Noiseless Database Privacy Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
2011/486 (PDF ) On the Joint Security of Encryption and Signature, Revisited Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
2011/485 (PDF ) Another Look at Automated Theorem-Proving. II Neal Koblitz
2011/484 (PDF ) XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions Johannes Buchmann, Erik Dahmen, Andreas Hülsing
2011/483 (PDF ) Adaption of Pollard's kangaroo algorithm to the FACTOR problem Mario Romsy
2011/482 (PDF ) Secure Computation with Sublinear Amortized Work Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis
2011/481 (PDF ) Close to Uniform Prime Number Generation With Fewer Random Bits Pierre-Alain Fouque, Mehdi Tibouchi
2011/480 (PDF ) Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis Sanjay Bhattacherjee, Palash Sarkar
2011/479 (PDF ) Identity-Based (Lossy) Trapdoor Functions and Applications Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters
2011/478 (PDF ) An efficient certificateless authenticated key agreement scheme Debiao He, Sahadeo Padhye, Jianhua Chen
2011/477 (PDF ) Cryptanalysis of NTRU with two public keys Abderrahmane Nitaj
2011/476 (PDF ) Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model Benoit Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
2011/475 (PDF ) Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis Nicolas T. Courtois, Daniel Hulme, Theodosis Mourouzis
2011/474 (PDF ) Improved Generic Algorithms for Hard Knapsacks Anja Becker, Jean-Sébastien Coron, Antoine Joux
2011/473 (PDF ) Practically Efficient Verifiable Delegation of Polynomial and its Applications Jia XU
2011/472 (PDF ) Forward Secure Ring Signature without Random Oracles Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou
2011/471 (PDF ) Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme P. Scholl, N. P. Smart
2011/470 (PDF ) Non-malleable public key encryption in BRSIM/UC István Vajda
2011/469 (PDF ) Cryptanalysis of INCrypt32 in HID's iCLASS Systems ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, Daewan Han
2011/468 (PDF ) Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three Hongfeng Wu, Chang-An Zhao
2011/467 (PDF ) A !ew Efficient Asymmetric Cryptosystem for large data sets M. R. K. Ariffin, M. A. Asbullah, N. A. Abu
2011/466 (PDF ) Green Cryptanalysis: Meet-in-the-Middle Key-Recovery for the Full KASUMI Cipher Keting Jia, Christian Rechberger, Xiaoyun Wang
2011/465 (PDF ) Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings Craig Costello, Kristin Lauter, Michael Naehrig
2011/464 (PDF ) Private and Oblivious Set and Multiset Operations Marina Blanton, Everaldo Aguiar
2011/463 (PDF ) Decentralized Dynamic Broadcast Encryption Duong Hieu Phan, David Pointcheval, Mario Strefler
2011/462 (PDF ) Secure Outsourced Computation of Iris Matching Marina Blanton, Mehrdad Aliasgari
2011/461 (PDF ) Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving Fangguo Zhang, Ping Wang
2011/460 (PDF ) Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings Zijian Zhang, Liehuang Zhu, Lejian Liao
2011/459 (PDF ) Sufficient conditions for sound hashing using a truncated permutation Joan Daemen, Tony Dusenge, Gilles Van Assche
2011/458 (PDF ) Sieving for Shortest Vectors in Ideal Lattices Michael Schneider
2011/457 (PDF ) Resettable Statistical Zero Knowledge Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia
2011/456 (PDF ) Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs Shafi Goldwasser, Huijia Lin, Aviad Rubinstein
2011/455 (PDF ) The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
2011/454 (PDF ) Threshold Fully Homomorphic Encryption and Secure Computation Steven Myers, Mona Sergi, abhi shelat
2011/453 (PDF ) Practical Complexity Differential Cryptanalysis and Fault Analysis of AES Michael Tunstall
2011/452 (PDF ) The Good lower bound of Second-order nonlinearity of a class of Boolean function Manish Garg, Sugata Gangopadhyay
2011/451 (PDF ) Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won
2011/449 (PDF ) Biclique Cryptanalysis of the Full AES Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
2011/448 (PDF ) (Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 stream cipher Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
2011/447 (PDF ) On Verifying Dynamic Multiple Data Copies over Cloud Servers Ayad F. Barsoum, M. Anwar Hasan
2011/444 (PDF ) Generalised Mersenne Numbers Revisited Robert Granger, Andrew Moss
2011/443 (PDF ) From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
2011/442 (PDF ) Another Look at Tightness Sanjit Chatterjee, Alfred Menezes, Palash Sarkar
2011/441 (PDF ) Fully Homomorphic Encryption over the Integers with Shorter Public Keys Jean-Sebastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi
2011/440 (PDF ) Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
2011/439 (PDF ) Optimal Data Authentication from Directed Transitive Signatures Philippe Camacho
2011/438 (PDF ) Short Transitive Signatures for Directed Trees Philippe Camacho, Alejandro Hevia
2011/437 (PDF ) Approximate common divisors via lattices Henry Cohn, Nadia Heninger
2011/436 (PDF ) Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers Yuanmi Chen, Phong Q. Nguyen
2011/435 (PDF ) The IPS Compiler: Optimizations, Variants and Concrete Efficiency Yehuda Lindell, Benny Pinkas, Eli Oxman
2011/434 (PDF ) An Efficient Protocol for Oblivious DFA Evaluation and Applications Payman Mohassel, Salman Niksefat, Saeed Sadeghian, Babak Sadeghiyan
2011/433 (PDF ) Collusion-Preserving Computation Joel Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas
2011/432 (PDF ) Ciphers that Securely Encipher their own Keys Mihir Bellare, David Cash, Sriram Keelveedhi
2011/431 (PDF ) Roots of Square: Cryptanalysis of Double-Layer Square and Square+ Enrico Thomae, Christopher Wolf
2011/430 (PDF ) Analogues of Velu's Formulas for Isogenies on Alternate Models of Elliptic Curves Dustin Moody, Daniel Shumow
2011/429 (PDF ) Round-efficient Oblivious Database Manipulation Sven Laur, Jan Willemson, Bingsheng Zhang
2011/428 (PDF ) AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI - Tatsuya TAKEHISA, Hiroki NOGAWA, Masakatu MORII
2011/427 (PDF ) A new attack on the KMOVcryptosystem Abderrahmane Nitaj
2011/426 (PDF ) Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi
2011/425 (PDF ) Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings Laurie Genelle, Emmanuel Prouff, Michaël Quisquater
2011/424 (PDF ) Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/423 (PDF ) Linear Cryptanalysis of PRINTcipher --- Trails and Samples Everywhere Martin Ågren, Thomas Johansson
2011/422 (PDF ) Improved Analysis of ECHO-256 Jérémy Jean, María Naya-Plasencia, Martin Schläffer
2011/421 (PDF ) Superposition Attacks on Cryptographic Protocols Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail
2011/420 (PDF ) Unaligned Rebound Attack - Application to Keccak Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei
2011/418 (PDF ) An efficient RFID mutual authentication scheme based on ECC Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin
2011/417 (PDF ) New Data-Efficient Attacks on Reduced-Round IDEA Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir
2011/416 (PDF ) Efficient Parallelization of Lanczos Type Algorithms Ilya Popovyan
2011/415 (PDF ) On the Access Structures of Hyperelliptic Secret Sharing Lei Li, Siman Yang
2011/414 (PDF ) Fuzzy Identity Based Encryption from Lattices Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
2011/413 (PDF ) Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation Protocols - Extended Version Thomas Roche, Emmanuel Prouff
2011/412 (PDF ) Automatic Insertion of DPA Countermeasures Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall
2011/411 (PDF ) Comments on a password authentication and update scheme based on elliptic curve cryptography Debiao He
2011/410 (PDF ) Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
2011/408 (PDF ) Resettable Cryptography in Constant Rounds -- the Case of Zero Knowledge Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung
2011/407 (PDF ) Oblivious RAM with O((log N)^3) Worst-Case Cost Elaine Shi, Hubert Chan, Emil Stefanov, Mingfei Li
2011/406 (PDF ) Composition Theorems Without Pre-Established Session Identifiers Ralf Kuesters, Max Tuengerthal
2011/405 (PDF ) Can Homomorphic Encryption be Practical? Kristin Lauter, Michael Naehrig, Vinod Vaikuntanathan
2011/404 (PDF ) A constant-round resettably-sound resettable zero-knowledge argument in the BPK model Seiko Arita
2011/403 (PDF ) A Fair Evaluation Framework for Comparing Side-Channel Distinguishers Carolyn Whitnall, Elisabeth Oswald
2011/402 (PDF ) Formalizing Group Blind Signatures and Practical Constructions without Random Oracles Essam Ghadafi
2011/401 (PDF ) Pseudorandom Functions and Lattices Abhishek Banerjee, Chris Peikert, Alon Rosen
2011/400 (PDF ) On a generalized combinatorial conjecture involving addition $\mod 2^k - 1$ Gérard Cohen, Jean-Pierre Flori
2011/399 (PDF ) Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic Luk Bettale, Jean-Charles Faugère, Ludovic Perret
2011/398 (PDF ) Hardness of Learning Problems over Burnside Groups of Exponent 3 Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III
2011/397 (PDF ) The n-Diffie-Hellman Problem and its Applications Liqun Chen, Yu Chen
2011/396 (PDF ) Fair Computation with Rational Players Amos Beimel, Adam Groce, Jonathan Katz, Ilan Orlov
2011/395 (PDF ) Improved Anonymity for Key-Trees Michael Beye, Thijs Veugen
2011/394 (PDF ) A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument Helger Lipmaa, Bingsheng Zhang
2011/392 (PDF ) An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version) Yun Zhang, Christophe Tartary, Huaxiong Wang
2011/391 (PDF ) On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4, Virtex 5, and Spartan 6 Bitstream Encryption Mechanism Amir Moradi, Markus Kasper, Christof Paar
2011/390 (PDF ) On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar
2011/389 (PDF ) Spatial Encryption Mike Hamburg
2011/388 (PDF ) Modulus Fault Attacks Against RSA-CRT Signatures Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi
2011/387 (PDF ) Analysis of the Parallel Distinguished Point Tradeoff Jin Hong, Ga Won Lee, Daegun Ma
2011/386 (PDF ) How to share secrets simultaneously Laszlo Csirmaz
2011/385 (PDF ) Efficient Implementation of Grand Cru with TI C6x+ Processor Azhar Ali Khan, Ghulam Murtaza
2011/384 (PDF ) Distributed Oblivious RAM for Secure Two-Party Computation Steve Lu, Rafail Ostrovsky
2011/383 (PDF ) A representation of the $p$-sylow subgroup of $\perm(\F_p^n)$ and a cryptographic application Stefan Maubach
2011/382 (PDF ) Generic Fully Simulatable Adaptive Oblivious Transfer Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2011/381 (PDF ) A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu
2011/380 (PDF ) An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis Carolyn Whitnall, Elisabeth Oswald, Luke Mather
2011/378 (PDF ) A generalization of the Lucas addition chains Amadou TALL
2011/377 (PDF ) Improved Generalized Birthday Attack Paul Kirchner
2011/376 (PDF ) Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check Julien Bringer, Alain Patey
2011/375 (PDF ) Complexity of universal access structures Laszlo Csirmaz
2011/374 (PDF ) Restoring the Differential Resistance of MD6 Ethan Heilman
2011/373 (PDF ) An efficient characterization of a family of hyperbent functions with multiple trace terms Jean-Pierre Flori, Sihem Mesnager
2011/372 (PDF ) Identity based signcryption schemes without random oracles Prashant Kushwah, Sunder Lal
2011/371 (PDF ) Monoidic Codes in Cryptography Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
2011/370 (PDF ) Socio-Rational Secret Sharing as a New Direction in Rational Cryptography Mehrdad Nojoumian, Douglas R. Stinson
2011/369 (PDF ) Storing Secrets on Continually Leaky Devices Yevgeniy Dodis, Allison Lewko, Brent Waters, Daniel Wichs
2011/368 (PDF ) High-speed high-security signatures Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang
2011/367 (PDF ) Decoding One Out of Many Nicolas Sendrier
2011/366 (PDF ) Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks Deng Tang, Claude Carlet, Xiaohu Tang
2011/365 (PDF ) Security flaws in a biometrics-based multi-server authentication with key agreement scheme Debiao He
2011/364 (PDF ) The Value $4$ of Binary Kloosterman Sums Jean-Pierre Flori, Sihem Mesnager, Gérard Cohen
2011/362 (PDF ) Practically Efficient Proof of Retrievability in Cloud Storage Jia XU, Ee-Chien CHANG
2011/361 (PDF ) The Exact Security of a Stateful IBE and New Compact Stateful PKE Schemes S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2011/360 (PDF ) Certificateless Aggregate Signcryption Schemes Ziba Eslami, Nasrollah Pakniat
2011/359 (PDF ) High-Entropy Visual Identification for Touch Screen Devices Nathaniel Wesley Filardo, Giuseppe Ateniese
2011/358 (PDF ) Constructing a Ternary FCSR with a Given Connection Integer Lin Zhiqiang, Pei Dingyi
2011/357 (PDF ) Generalized Learning Problems and Applications to Non-Commutative Cryptography Gilbert Baumslag, Nelly Fazio, Antonio R. Nicolosi, Vladimir Shpilrain, William E. Skeith III
2011/356 (PDF ) An Efficient Attack on All Concrete KKS Proposals Ayoub Otmani, Jean-Pierre Tillich
2011/355 (PDF ) On the (Non-)Equivalence of UC Security Notions Oana Ciobotaru
2011/354 (PDF ) A coprocessor for secure and high speed modular arithmetic Nicolas Guillermin
2011/353 (PDF ) Hidden Pair of Bijection Signature Scheme Masahito Gotaishi, Shigeo Tsujii
2011/352 (PDF ) Bi-Deniable Public-Key Encryption Adam O'Neill, Chris Peikert, Brent Waters
2011/350 (PDF ) $HB^N$: An HB-like protocol secure against man-in-the-middle attacks Carl Bosley, Kristiyan Haralambiev, Antonio Nicolosi
2011/349 (PDF ) Efficient Methods for Exploiting Faults Induced at AES Middle Rounds Chong Hee Kim
2011/348 (PDF ) Extractors Against Side-Channel Attacks: Weak or Strong? Marcel Medwed, Francois-Xavier Standaert
2011/346 (PDF ) Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security Hai Huang
2011/345 (PDF ) LBlock: A Lightweight Block Cipher * Wenling Wu, Lei Zhang
2011/344 (PDF ) Efficient Fully Homomorphic Encryption from (Standard) LWE Zvika Brakerski, Vinod Vaikuntanathan
2011/343 (PDF ) Another Look at Security Definitions Neal Koblitz, Alfred Menezes
2011/342 (PDF ) A Domain Transformation for Structure-Preserving Signatures on Group Elements Melissa Chase, Markulf Kohlweiss
2011/340 (PDF ) Encrypting More Information in Visual Cryptography Scheme Feng Liu, Peng Li, ChuanKun Wu
2011/339 (PDF ) Careful with Composition: Limitations of Indifferentiability and Universal Composability Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton
2011/338 (PDF ) Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves Matthieu Rivain
2011/337 (PDF ) Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan
2011/335 (PDF ) New look at impossibility result on Dolev-Yao models with hashes István Vajda
2011/334 (PDF ) On the Efficient Implementation of Pairing-Based Protocols Michael Scott
2011/333 (PDF ) Cryptanalysis of a key agreement protocol based on chaotic Hash Debiao He
2011/332 (PDF ) A depth-16 circuit for the AES S-box Joan Boyar, Rene Peralta
2011/331 (PDF ) Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems Masoumeh Safkhani, Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Nasour Bagheri, Majid Naderi
2011/330 (PDF ) Simple and Asymptotically Optimal $t$-Cheater Identifiable Secret Sharing Scheme Ashish Choudhury
2011/329 (PDF ) Hardness of Computing Individual Bits for One-way Functions on Elliptic Curves Alexandre Duc, Dimitar Jetchev
2011/328 (PDF ) Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption Gu Chunsheng
2011/327 (PDF ) On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
2011/326 (PDF ) SGCM: The Sophie Germain Counter Mode Markku-Juhani O. Saarinen
2011/325 (PDF ) New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm Aram Jivanyan, Gurgen Khachatryan
2011/324 (PDF ) On the Efficiency of Bit Commitment Reductions Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger
2011/323 (PDF ) A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256 Shusheng Liu, Libin Wang, Zheng Gong
2011/322 (PDF ) A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework Carolyn Whitnall, Elisabeth Oswald
2011/321 (PDF ) A Formal Approach to Distance-Bounding RFID Protocols Ulrich Duerholz, Marc Fischlin, Michael Kasper, Cristina Onete
2011/320 (PDF ) Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks Manan Nayak, Shashank Agrawal, Kannan Srinathan
2011/319 (PDF ) Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
2011/318 (PDF ) Scalar Multiplication on Koblitz Curves using $\tau^2-$NAF Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga
2011/317 (PDF ) Two Simple Code-Verification Voting Protocols Helger Lipmaa
2011/316 (PDF ) Security of Blind Signatures Revisited Dominique Schröder, Dominique Unruh
2011/315 (PDF ) Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0 Zhi Hu, Patrick Longa, Maozhi Xu
2011/314 (PDF ) Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi
2011/313 (PDF ) Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity Arpita Patra
2011/312 (PDF ) Differential Cryptanalysis of GOST Nicolas T. Courtois, Michal Misztal
2011/311 (PDF ) Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh, Gil Segev, Brent Waters
2011/310 (PDF ) Universally Composable Synchronous Computation Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
2011/309 (PDF ) On Constructing Homomorphic Encryption Schemes from Coding Theory Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi
2011/308 (PDF ) Provably Secure and Practical Onion Routing Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi
2011/307 (PDF ) Ways to restrict the differential path ZiJie Xu, Ke Xu
2011/306 (PDF ) Group Law Computations on Jacobians of Hyperelliptic Curves Craig Costello, Kristin Lauter
2011/305 (PDF ) A new attack on Jakobsson Hybrid Mix-Net Seyyed Amir Mortazavi
2011/304 (PDF ) Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage Jia XU
2011/303 (PDF ) GNUC: A New Universal Composability Framework Dennis Hofheinz, Victor Shoup
2011/302 (PDF ) Univariate Side Channel Attacks and Leakage Modeling Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert
2011/301 (PDF ) On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations Ronald Cramer, Ivan Damgard, Valerio Pastro
2011/300 (PDF ) One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability Cas Cremers, Michele Feltz
2011/299 (PDF ) Modes of Operations for Encryption and Authentication Using Stream Ciphers Supporting an Initialisation Vector Palash Sarkar
2011/298 (PDF ) Local limit theorem for large deviations and statistical box-tests Igor Semaev
2011/297 (PDF ) NEW STATISTICAL BOX-TEST AND ITS POWER Igor Semaev, Mehdi M. Hassanzadeh
2011/296 (PDF ) Short Signatures From Weaker Assumptions Dennis Hofheinz, Tibor Jager, Eike Kiltz
2011/295 (PDF ) Counting Points on Genus 2 Curves with Real Multiplication P. Gaudry, D. Kohel, B. Smith
2011/294 (PDF ) Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf
2011/292 (PDF ) On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve Namhun Koo, Gooc Hwa Jo, Soonhak Kwon
2011/291 (PDF ) Leakage-Resilient Coin Tossing Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai
2011/290 (PDF ) Some Results Concerning Generalized Bent Functions Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh
2011/289 (PDF ) Polly Cracker, Revisited Martin R. Albrecht, Jean-Charles Faugère, Pooya Farshim, Gottfried Herold, Ludovic Perret
2011/288 (PDF ) On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks Ashish Choudhury, Arpita Patra
2011/287 (PDF ) Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48 Stanislav Bulygin
2011/286 (PDF ) Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
2011/285 (PDF ) Exploiting Linear Hull in Matsui’s Algorithm 1 (extended version) Andrea Röck, Kaisa Nyberg
2011/283 (PDF ) The Fault Attack ECDLP Revisited Mingqiang Wang, Xiaoyun Wang, Tao Zhan
2011/282 (PDF ) An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
2011/281 (PDF ) Computational Verifiable Secret Sharing Revisited Michael Backes, Aniket Kate, Arpita Patra
2011/280 (PDF ) DDH-like Assumptions Based on Extension Rings Ronald Cramer, Ivan Damgaard, Eike Kiltz, Sarah Zakarias, Angela Zottarel
2011/279 (PDF ) Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits Craig Gentry, Shai Halevi
2011/278 (PDF ) Comparing Different Definitions of Secure Session Can Zhang
2011/277 (PDF ) Fully Homomorphic Encryption without Bootstrapping Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan
2011/276 (PDF ) Analysis of the SSH Key Exchange Protocol Stephen C. Williams
2011/275 (PDF ) Inverting the Square systems is exponential Jintai Ding
2011/273 (PDF ) Memory Delegation Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz
2011/272 (PDF ) Outsourcing Multi-Party Computation Seny Kamara, Payman Mohassel, Mariana Raykova
2011/271 (PDF ) Practical Key-recovery For All Possible Parameters of SFLASH Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat
2011/270 (PDF ) Programmable Hash Functions and Their Applications Dennis Hofheinz, Eike Kiltz
2011/269 (PDF ) Authenticated and Misuse-Resistant Encryption of Key-Dependent Data Mihir Bellare, Sriram Keelveedhi
2011/268 (PDF ) Birthday Forgery Attack on 128-EIA3 Version 1.5 Raja Zeshan Haider
2011/267 (PDF ) Mutual Private Set Intersection with Linear Complexity Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon
2011/266 (PDF ) Identity-Based Decryption Daniel R. L. Brown
2011/265 (PDF ) Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol Qiushi Yang, Yvo Desmedt
2011/264 (PDF ) Round Optimal Blind Signatures Dominique Schröder, Dominique Unruh
2011/263 (PDF ) The Computational Square-Root Exponent Problem- Revisited Fangguo Zhang
2011/262 (PDF ) Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner
2011/261 (PDF ) OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak Danilo Gligoroski, Rune Steinsmo Ødeård, Rune Erlend Jensen
2011/260 (PDF ) Security \& Indistinguishability in the Presence of Traffic Analysis Cristina Onete, Daniele Venturi
2011/259 (PDF ) Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski Douglas R. Stinson
2011/258 (PDF ) A High Speed Pairing Coprocessor Using RNS and Lazy Reduction Gavin Xiaoxu Yao, Junfeng Fan, Ray C. C. Cheung, Ingrid Verbauwhede
2011/257 (PDF ) Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein
2011/255 (PDF ) Hiding the Policy in Cryptographic Access Control Sascha Müller, Stefan Katzenbeisser
2011/254 (PDF ) Using the Cloud to Determine Key Strengths T. Kleinjung, A. K. Lenstra, D. Page, N. P. Smart
2011/253 (PDF ) Attack Cryptosystems Based on HCDLP Mingqiang Wang, Xiaoyun Wang, Tao Zhan
2011/252 (PDF ) Cryptography Secure Against Related-Key Attacks and Tampering Mihir Bellare, David Cash, Rachel Miller
2011/251 (PDF ) Concurrently Secure Computation in Constant Rounds Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai
2011/250 (PDF ) A Parallel Repetition Theorem for Leakage Resilience Zvika Brakerski, Yael Tauman Kalai
2011/248 (PDF ) Fast Password Recovery Attack: Application to APOP Fanbao Liu, Yi Liu, Tao Xie, Yumeng Feng
2011/247 (PDF ) An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2 Qi Chai, Xinxin Fan, Guang Gong
2011/246 (PDF ) A Framework for Secure Single Sign-On Bernardo Machado David, Anderson C. A. Nascimento, Rafael Tonicelli
2011/245 (PDF ) On the Number of Carries Occuring in an Addition $\mod 2^k-1$ Jean-Pierre Flori, Hugues Randriam
2011/244 (PDF ) PRISM -- Privacy-Preserving Search in MapReduce Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Onen
2011/243 (PDF ) Affine Pairings on ARM Tolga Acar, Kristin Lauter, Michael Naehrig, Daniel Shumow
2011/242 (PDF ) Cryptanalysis of KeeLoq code-hopping using a Single FPGA Idan Sheetrit, Avishai Wool
2011/241 (PDF ) A Novel Adaptive Proactive Secret Sharing without a Trusted Party Xiuqun Wang
2011/240 (PDF ) Universal Composability from Essentially Any Trusted Setup Mike Rosulek
2011/239 (PDF ) Efficient Software Implementations of Modular Exponentiation Shay Gueron
2011/238 (PDF ) Attacks On a Double Length Blockcipher-based Hash Proposal Yiyuan Luo, Xuejia Lai
2011/237 (PDF ) The block cipher NSABC (public domain) Alice Nguyenova-Stepanikova, Tran Ngoc Duong
2011/236 (PDF ) Using Templates to Distinguish Multiplications from Squaring Operations Neil Hanley, Michael Tunstall, William P. Marnane
2011/235 (PDF ) Computer-Aided Decision-Making with Trust Relations and Trust Domains (Cryptographic Applications) Simon Kramer, Rajeev Goré, Eiji Okamoto
2011/234 (PDF ) Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards Debiao He
2011/233 (PDF ) Correlated-Input Secure Hash Functions Vipul Goyal, Adam O'Neill, Vanishree Rao
2011/232 (PDF ) Remote Timing Attacks are Still Practical Billy Bob Brumley, Nicola Tuveri
2011/231 (PDF ) History-Free Sequential Aggregate Signatures Marc Fischlin, Anja Lehmann, Dominique Schröder
2011/230 (PDF ) All-But-Many Lossy Trapdoor Functions Dennis Hofheinz
2011/229 (PDF ) Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar
2011/228 (PDF ) A Framework for Practical Universally Composable Zero-Knowledge Protocols Jan Camenisch, Stephan Krenn, Victor Shoup
2011/227 (PDF ) Robust parent-identifying codes and combinatorial arrays Alexander Barg, Grigory Kabatiansky
2011/226 (PDF ) Substitution-permutation networks, pseudorandom functions, and Natural Proofs Eric Miles, Emanuele Viola
2011/225 (PDF ) A Simple and Efficient New Group Key Management Approach Based on Linear Geometry Shaohua Tang, Jintai Ding, Yujun Liang
2011/224 (PDF ) Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang
2011/223 (PDF ) A Perfectly Binding Commitment Scheme Against Quantum Attacks Zeng Bing, Chen Liang, Tang Xueming
2011/222 (PDF ) Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations Kyle Brogle, Sharon Goldberg, Leonid Reyzin
2011/221 (PDF ) Protecting Drive Encryption Systems Against Memory Attacks Leo Dorrendorf
2011/220 (PDF ) Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks István Vajda
2011/219 (PDF ) On the Security of TLS-DHE in the Standard Model Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
2011/218 (PDF ) Cryptographic Analysis of All 4 x 4 - Bit S-Boxes Markku-Juhani O. Saarinen
2011/217 (PDF ) Identity Based Deterministic Signature Scheme Without Forking-Lemma S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2011/216 (PDF ) Provably Secure Group Key Management Approach Based upon Hyper-sphere Shaohua Tang, Lingling Xu, Niu Liu, Jintai Ding, Zhiming Yang
2011/215 (PDF ) Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation M. Barbosa, P. Farshim
2011/214 (PDF ) On ``identities'', ``names'', ``NAMES'', ``ROLES'' and Security: A Manifesto Charles Rackoff
2011/213 (PDF ) On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
2011/212 (PDF ) Maiorana-McFarland Functions with High Second-Order Nonlinearity Nicholas Kolokotronis, Konstantinos Limniotis
2011/211 (PDF ) Security Evaluation of GOST 28147-89 In View Of International Standardisation Nicolas T. Courtois
2011/210 (PDF ) The preimage security of double-block-length compression functions Jooyoung Lee, Martijn Stam, John Steinberger
2011/209 (PDF ) Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Zvika Brakerski, Gil Segev
2011/208 (PDF ) Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy Jian Weng, Yunlei Zhao
2011/207 (PDF ) Proofs of Ownership in Remote Storage Systems Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
2011/206 (PDF ) Isomorphism classes of Edwards curves over finite fields R. Farashahi, D. Moody, H. Wu
2011/205 (PDF ) Group-oriented ring signature Chunbo Ma, Jun Ao
2011/204 (PDF ) Leakage Tolerant Interactive Protocols Nir Bitansky, Ran Canetti, Shai Halevi
2011/203 (PDF ) Key agreement based on homomorphisms of algebraic structures Juha Partala
2011/202 (PDF ) Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen
2011/201 (PDF ) Improved Meet-in-the-Middle Cryptanalysis of KTANTAN Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling
2011/200 (PDF ) Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version) Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
2011/199 (PDF ) An efficient deterministic test for Kloosterman sum zeros Omran Ahmadi, Robert Granger
2011/198 (PDF ) Terminating BKZ Guillaume Hanrot, Xavier Pujol, Damien Stehlé
2011/197 (PDF ) Public Key Encryption for the Forgetful Puwen Wei, Yuliang Zheng, Xiaoyun Wang
2011/196 (PDF ) Acceleration of Composite Order Bilinear Pairing on Graphics Hardware Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, S. M. Yiu
2011/194 (PDF ) Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2011/193 (PDF ) Security Analysis of $LMAP^{++}$, an RFID Authentication Protocol Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya
2011/192 (PDF ) Short and Efficient Certificate-Based Signature Joseph K. Liu, Feng Bao, Jianying Zhou
2011/191 (PDF ) On the Security of the Winternitz One-Time Signature Scheme Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert
2011/190 (PDF ) SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS Peng Xu, Hai Jin
2011/189 (PDF ) SIMPL Systems as a Keyless Cryptographic and Security Primitive Ulrich Rührmair
2011/188 (PDF ) Physical Turing Machines and the Formalization of Physical Cryptography Ulrich Rührmair
2011/187 (PDF ) Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation Hyung Tae Lee, Jung Hee Cheon, Jin Hong
2011/185 (PDF ) Efficient and Secure Data Storage Operations for Mobile Cloud Computing Zhibin Zhou, Dijiang Huang
2011/184 (PDF ) Fortification of AES with Dynamic Mix-Column Transformation Ghulam Murtaza, Azhar Ali Khan, Syed Wasi Alam, Aqeel Farooqi
2011/182 (PDF ) Designated Confirmer Signatures With Unified Verification Guilin Wang, Fubiao Xia, Yunlei Zhao
2011/181 (PDF ) Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
2011/180 (PDF ) Highly-Efficient Universally-Composable Commitments based on the DDH Assumption Yehuda Lindell
2011/179 (PDF ) Compact McEliece keys based on Quasi-Dyadic Srivastava codes Edoardo Persichetti
2011/178 (PDF ) Differential Fault Analysis of AES: Toward Reducing Number of Faults Chong Hee KIM
2011/177 (PDF ) Dynamic MDS Matrices for Substantial Cryptographic Strength Muhammad Yasir Malik, Jong-Seon No
2011/176 (PDF ) A FPGA pairing implementation using the Residue Number System Sylvain Duquesne, Nicolas Guillermin
2011/175 (PDF ) Analysis of reduced-SHAvite-3-256 v2 Marine Minier, Maria Naya-Plasencia, Thomas Peyrin
2011/174 (PDF ) On-line secret sharing Laszlo Csirmaz, Gabor Tardos
2011/172 (PDF ) The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs T. V. Laptyeva, S. Flach, K. Kladko
2011/171 (PDF ) On lower bounds on second--order nonliearities of bent functions obtained by using Niho power functions Manish Garg, Sugata Gangopadhyay
2011/170 (PDF ) Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López
2011/169 (PDF ) Identity-Based Cryptography for Cloud Security Hongwei Li, Yuanshun Dai, Bo Yang
2011/168 (PDF ) A Commitment-Consistent Proof of a Shuffle Douglas Wikström
2011/167 (PDF ) Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin
2011/166 (PDF ) Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance Jeremy Clark, Urs Hengartner
2011/165 (PDF ) Improved Side Channel Cube Attacks on PRESENT XinJie Zhao, Tao Wang, ShiZe Guo
2011/164 (PDF ) On the relation between the MXL family of algorithms and Gröbner basis algorithms Martin Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
2011/162 (PDF ) Collision Timing Attack when Breaking 42 AES ASIC Cores Amir Moradi, Oliver Mischke, Christof Paar
2011/161 (PDF ) Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Francisco Rodriguez-Henriquez, Palash Sarkar
2011/160 (PDF ) Cryptanalysis of ARMADILLO2 Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
2011/158 (PDF ) Enhancing Data Privacy in the Cloud Yanbin Lu, Gene Tsudik
2011/157 (PDF ) Secure Computation on the Web: Computing without Simultaneous Interaction Shai Halevi, Yehuda Lindell, Benny Pinkas
2011/156 (PDF ) Strong Forward Security in Identity-Based Signcryption Madeline González Muñiz, Peeter Laud
2011/153 (PDF ) Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices Jingguo Bi, Qi Cheng
2011/152 (PDF ) A Practical Application of Differential Privacy to Personalized Online Advertising Yehuda Lindell, Eran Omri
2011/151 (PDF ) Direct Exponent and Scalar Multiplication Classes of an MDS Matrix G. Murtaza, N. Ikram
2011/150 (PDF ) A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing Jue-Sam Chou, Cheng-Lun Wu, Yalin Chen
2011/149 (PDF ) Generic Side-Channel Distinguishers: Improvements and Limitations Nicolas Veyrat-Charvillon, François-Xavier Standaert
2011/148 (PDF ) Near-Collision Attack on the Step-Reduced Compression Function of Skein-256 Hongbo Yu, Jiazhe Chen, Keting jia, Xiaoyun Wang
2011/147 (PDF ) The Optimal Linear Secret Sharing Scheme for Any Given Access Structure Tang Chunming, Gao Shuhong, Zhang Chengli
2011/146 (PDF ) ECDLP on GPU Lei Xu, Dongdai Lin, Jing Zou
2011/143 (PDF ) Computing $(\ell,\ell)$-isogenies in polynomial time on Jacobians of genus~$2$ curves Romain Cosset, Damien Robert
2011/141 (PDF ) Fast and Private Computation of Cardinality of Set Intersection and Union Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
2011/140 (PDF ) Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64 Martin Ågren
2011/139 (PDF ) Shortest Lattice Vectors in the Presence of Gaps Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng
2011/138 (PDF ) Constant-Round Privacy Preserving Multiset Union Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon
2011/137 (PDF ) Towards a Game Theoretic View of Secure Computation Gilad Asharov, Ran Canetti, Carmit Hazay
2011/136 (PDF ) A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation Gilad Asharov, Yehuda Lindell
2011/135 (PDF ) On isogeny classes of Edwards curves over finite fields Omran Ahmadi, Robert Granger
2011/134 (PDF ) Differentially Private Billing with Rebates George Danezis, Markulf Kohlweiss, Alfredo Rial
2011/133 (PDF ) Fully Homomorphic SIMD Operations N. P. Smart, F. Vercauteren
2011/132 (PDF ) Verifiable Delegation of Computation over Large Datasets Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis
2011/131 (PDF ) Trapdoor oneway functions associated with exponentiation Virendra Sule
2011/130 (PDF ) Ergodic Theory Over ${\F}_2[[T]]$ Dongdai Lin, Tao Shi, Zifeng Yang
2011/129 (PDF ) Distance Hijacking Attacks on Distance Bounding Protocols Cas Cremers, Kasper B. Rasmussen, Benedikt Schmidt, Srdjan Capkun
2011/127 (PDF ) Integer Arithmetic without Arithmetic Addition Gideon Samid
2011/126 (PDF ) The Hummingbird-2 Lightweight Authenticated Encryption Algorithm Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith
2011/125 (PDF ) A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)$\Sigma$PKC Masao KASAHARA
2011/124 (PDF ) A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I) Masao KASAHARA
2011/123 (PDF ) Linear Hulls with Correlation Zero and Linear Cryptanalysis of Block Ciphers Andrey Bogdanov, Vincent Rijmen
2011/122 (PDF ) Secure Multi-Party Sorting and Applications Kristjän Valur Jönsson, Gunnar Kreitz, Misbah Uddin
2011/121 (PDF ) More Practical Fully Homomorphic Encryption Gu Chunsheng
2011/120 (PDF ) Faster 2-regular information-set decoding Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
2011/118 (PDF ) New Fully Homomorphic Encryption over the Integers Gu Chunsheng
2011/117 (PDF ) Bounded Vector Signatures and their Applications Lei Wei, Scott E. Coull, Michael K. Reiter
2011/116 (PDF ) Short-output universal hash functions and their use in fast and secure message authentication Long Hoang Nguyen, Andrew William Roscoe
2011/115 (PDF ) Multiple Differential Cryptanalysis: Theory and Practice (Corrected) Céline Blondeau, Benoît Gérard
2011/114 (PDF ) Fully Homomorphic Encryption, Approximate Lattice Problem and LWE Gu Chunsheng
2011/113 (PDF ) Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik
2011/112 (PDF ) An efficient certificateless two-party authenticated key agreement scheme from pairings Debiao He, Jin Hu
2011/111 (PDF ) Generalizations of Bent Functions. A Survey Natalia Tokareva
2011/109 (PDF ) Secure Blind Decryption Matthew Green
2011/108 (PDF ) Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation Jannik Dreier, Florian Kerschbaum
2011/107 (PDF ) Threshold Encryption into Multiple Ciphertexts Martin Stanek
2011/106 (PDF ) Common Randomness and Secret Key Capacities of Two-way Channels Hadi Ahmadi, Reihaneh Safavi-Naini
2011/105 (PDF ) Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation S. Erickson, M. J. Jacobson Jr., A. Stein
2011/104 (PDF ) Unconditionally Secure Signature Schemes Revisited Colleen M. Swanson, Douglas R. Stinson
2011/103 (PDF ) Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA István Vajda
2011/102 (PDF ) Optimal and Parallel Online Memory Checking Charalampos Papamanthou, Roberto Tamassia
2011/101 (PDF ) Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter
2011/100 (PDF ) A Novel Group Signature Scheme Based on MPKC Guangdong Yang, Shaohua Tang, Li Yang
2011/099 (PDF ) Can Code Polymorphism Limit Information Leakage? Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall
2011/098 (PDF ) Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields M. D. Velichka, M. J. Jacobson Jr., A. Stein
2011/097 (PDF ) Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture Shi Pu, Pu Duan, Jyh-Charn Liu
2011/096 (PDF ) Computing on Authenticated Data Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters
2011/095 (PDF ) ALRED Blues: New Attacks on AES-Based MAC's Orr Dunkelman, Nathan Keller, Adi Shamir
2011/094 (PDF ) Graceful Degradation in Multi-Party Computation Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
2011/093 (PDF ) Linear Cryptanalysis Using Multiple Linear Approximations Miia Hermelin, Kaisa Nyberg
2011/092 (PDF ) Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity Akinori Kawachi, Christopher Portmann, Keisuke Tanaka
2011/091 (PDF ) A New Approach to Practical Active-Secure Two-Party Computation Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra
2011/090 (PDF ) Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes Yu Chen, Liqun Chen, Zhong Chen
2011/089 (PDF ) Octal Bent Generalized Boolean Functions Pantelimon Stanica, Thor Martinsen
2011/088 (PDF ) Leftover Hash Lemma, Revisited Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Francois-Xavier Standaert, Yu Yu
2011/087 (PDF ) On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis, Iftach Haitner, Aris Tentes
2011/086 (PDF ) Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher Xin-jie Zhao, Tao Wang, Shi-ze Guo
2011/084 (PDF ) Traitor Tracing against Public Collaboration (Full Version) Xingwen Zhao, Fangguo Zhang
2011/083 (PDF ) On the number of bent functions from iterative constructions: lower bounds and hypotheses Natalia Tokareva
2011/081 (PDF ) Secure Datastructures based on Multiparty Computation Tomas Toft
2011/080 (PDF ) Turbo Codes Can Be Asymptotically Information-Theoretically Secure Xiao Ma
2011/079 (PDF ) Identity-based Digital Signature Scheme Without Bilinear Pairings He Debiao, Chen Jianhua, Hu Jin
2011/078 (PDF ) A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2011/077 (PDF ) DPA Leakage Evaluation and Countermeasure Plug-in Tang Ming, Wang Xiaorong, Qiu Zhenlong, Gao Si, Zhang Huanguo, Wu Qianhong
2011/076 (PDF ) A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Maura B. Paterson, Douglas R. Stinson
2011/074 (PDF ) Really fast syndrome-based hashing Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
2011/073 (PDF ) Cryptanalysis of three matrix-based key establishment protocols Simon R. Blackburn, Carlos Cid, Ciaran Mullan
2011/072 (PDF ) AES Variants Secure Against Related-Key Differential and Boomerang Attacks Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
2011/071 (PDF ) Information-theoretic Bounds for Differentially Private Mechanisms Gilles Barthe, Boris Köpf
2011/070 (PDF ) Rational authentication protocols Long H. Nguyen
2011/069 (PDF ) Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security Chao Ning, Qiuliang Xu
2011/068 (PDF ) Rational Secret Sharing with Honest Players over an Asynchronous Channel William K. Moses Jr., C. Pandu Rangan
2011/067 (PDF ) On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves Simon R. Blackburn, Alina Ostafe, Igor E. Shparlinski
2011/066 (PDF ) Deniable Encryption with Negligible Detection Probability: An Interactive Construction Markus Duermuth, David Mandell Freeman
2011/065 (PDF ) Fully Simulatable Quantum-Secure Coin-Flipping and Applications Carolin Lunemann, Jesper Buus Nielsen
2011/064 (PDF ) Cryptographic Treatment of Private User Profiles Felix Günther, Mark Manulis, Thorsten Strufe
2011/063 (PDF ) Secret Keys from Channel Noise Hadi Ahmadi, Reihaneh Safavi-Naini
2011/062 (PDF ) Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication Swapnoneel Roy, Amlan K Das, Yu Li
2011/061 (PDF ) Cryptanalysis of Some Protocols for RFID Systems Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya
2011/060 (PDF ) A Group Signature Scheme from Lattice Assumptions S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan
2011/059 (PDF ) Extending Baby-step Giant-step algorithm for FACTOR problem Martin Stanek
2011/058 (PDF ) Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier
2011/057 (PDF ) Another Look at RSA Signatures With Affine Padding Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
2011/056 (PDF ) Spectral Coherence Analysis - First Experimental Results - Amine Dehbaoui, Sébastien Tiran, Philippe Maurine, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2011/055 (PDF ) On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC Dongdai Lin, Jean-Charles Faugere, Ludovic Perret, Tianze Wang
2011/053 (PDF ) Adaptive Pseudo-Free Groups and Applications Dario Catalano, Dario Fiore, Bogdan Warinschi
2011/052 (PDF ) Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model Alex Escala, Javier Herranz, Paz Morillo
2011/049 (PDF ) Unbounded HIBE and Attribute-Based Encryption Allison Lewko, Brent Waters
2011/048 (PDF ) A non-Abelian factorization problem and an associated cryptosystem Srinath Baba, Srinivas Kotyad, Raghu Teja
2011/047 (PDF ) Constructing differential 4-uniform permutations from know ones Yuyin Yu, Mingsheng Wang, Yongqiang Li
2011/046 (PDF ) Lower and Upper Bounds for Deniable Public-Key Encryption Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
2011/045 (PDF ) Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup Farshid Farhat, Somayeh Salimi, Ahmad Salahi
2011/044 (PDF ) Fast Scalar Multiplication in ECC using The Multi base Number System. G. N. Purohit, Asmita Singh Rawat
2011/043 (PDF ) Proxy Blind Multi-signature Scheme using ECC for handheld devices Jayaprakash Kar
2011/042 (PDF ) Computing endomorphism rings of elliptic curves under the GRH Gaetan Bisson
2011/041 (PDF ) Reclaiming Privacy for Smartphone Applications (Revised Version) Emiliano De Cristofaro, Anthony Durussel, Imad Aad
2011/040 (PDF ) Simple and Exact Formula for Minimum Loop Length in Ate_i Pairing based on Brezing-Weng Curves Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
2011/039 (PDF ) Fast point quadrupling on elliptic curves Duc-Phong Le, Binh P Nguyen
2011/038 (PDF ) Cold Boot Key Recovery by Solving Polynomial Systems with Noise Martin Albrecht, Carlos Cid
2011/037 (PDF ) Higher-Order Differential Attack on Reduced SHA-256 Mario Lamberger, Florian Mendel
2011/035 (PDF ) A New Family of Implicitly Authenticated Diffie-Hellman Protocols Andrew C. Yao, Yunlei Zhao
2011/034 (PDF ) Secure Authentication from a Weak Key, Without Leaking Information Niek J. Bouman, Serge Fehr
2011/033 (PDF ) The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations Jean-Marc Couveignes, Jean-Gabriel Kammerer
2011/032 (PDF ) Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests Piotr Mroczkowski, Janusz Szmidt
2011/031 (PDF ) Efficient Unconditional Asynchronous Byzantine Agreement with Optimal Resilience Ashish Choudhury, Arpita Patra
2011/030 (PDF ) Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
2011/029 (PDF ) Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs Benjamin Gittins
2011/028 (PDF ) The Parazoa Family: Generalizing the Sponge Hash Functions Elena Andreeva, Bart Mennink, Bart Preneel
2011/027 (PDF ) Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2011/026 (PDF ) Private Discovery of Common Social Contacts Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
2011/025 (PDF ) Supporting Publication and Subscription Confidentiality in Pub/Sub Networks Mihaela Ion, Giovanni Russello, Bruno Crispo
2011/024 (PDF ) Secure evaluation of polynomial using privacy ring homomorphisms Alexander Rostovtsev, Alexey Bogdanov, Mikhail Mikhaylov
2011/023 (PDF ) Improved zero-sum distinguisher for full round Keccak-f permutation Ming Duan, Xuajia Lai
2011/022 (PDF ) Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT Farzaneh Abazari, Babak Sadeghian
2011/021 (PDF ) Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts Jae Hong Seo, Jung Hee Cheon
2011/020 (PDF ) Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over $\F_{p^6}$ Antoine Joux, Vanessa Vitse
2011/019 (PDF ) Collision Resistance of the JH Hash Function Jooyoung Lee, Deukjo Hong
2011/018 (PDF ) Homomorphic Signatures for Polynomial Functions Dan Boneh, David Mandell Freeman
2011/017 (PDF ) New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256 Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang
2011/016 (PDF ) An Anonymous Health Care System Melissa Chase, Kristin Lauter
2011/014 (PDF ) Unconditionally Reliable Message Transmission in Directed Neighbour Networks Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
2011/013 (PDF ) Secure Message Transmission In Asynchronous Directed Networks Shashank Agrawal, Abhinav Mehta, Kannan Srinathan
2011/012 (PDF ) Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption Jens Groth
2011/011 (PDF ) After-the-Fact Leakage in Public-Key Encryption Shai Halevi, Huijia Lin
2011/010 (PDF ) Structured Encryption and Controlled Disclosure Melissa Chase, Seny Kamara
2011/009 (PDF ) Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments Helger Lipmaa
2011/008 (PDF ) Computing Elliptic Curve Discrete Logarithms with the Negation Map Ping Wang, Fangguo Zhang
2011/007 (PDF ) KISS: A Bit Too Simple Greg Rose
2011/006 (PDF ) Exploring the Limits of Common Coins Using Frontier Analysis of Protocols Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek
2011/005 (PDF ) Is privacy compatible with truthfulness? David Xiao
2011/004 (PDF ) A low-memory algorithm for finding short product representations in finite groups Gaetan Bisson, Andrew V. Sutherland
2011/003 (PDF ) On the correct use of the negation map in the Pollard rho method Daniel J. Bernstein, Tanja Lange, Peter Schwabe
2011/002 (PDF ) A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version) Gunnar Kreitz
2011/001 (PDF ) Practical Frameworks For $h$-Out-Of-$n$ Oblivious Transfer With Security Against Covert and Malicious Adversaries Zeng Bing, Tang Xueming, Xu Peng, Jing Jiandu
2010/661 (PDF ) Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li, Chao Li, Jinshu Su, Bing Sun
2010/660 (PDF ) Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches Brian J. Matt
2010/659 (PDF ) Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation Mark Manulis, Bertram Poettering
2010/658 (PDF ) ABC - A New Framework for Block Ciphers Uri Avraham, Eli Biham, Orr Dunkelman
2010/657 (PDF ) On small secret key attack against RSA with high bits known prime factor Yasufumi Hashimoto
2010/656 (PDF ) A Note on Constant-Round Zero-Knowledge Proofs of Knowledge Yehuda Lindell
2010/655 (PDF ) On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings İsa Sertkaya, Ali Doğanaksoy
2010/654 (PDF ) Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version) Daniel Kraschewski, Jörn Müller-Quade
2010/653 (PDF ) Cubic groups M. A. Popov
2010/652 (PDF ) Active Domain Expansion for Normal Narrow-pipe Hash Functions Xigen Yao
2010/651 (PDF ) On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya, Avradip Mandal
2010/650 (PDF ) Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 Jean-Sebastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi
2010/649 (PDF ) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Gonzalez Nieto
2010/648 (PDF ) Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations Dario Fiore, Dominique Schröder
2010/647 (PDF ) Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi
2010/646 (PDF ) Statistical Analysis of Second Order Differential Power Analysis Emmanuel Prouff, Matthieu Rivain, Régis Bévan
2010/645 (PDF ) A Timed Logic for Modeling and Reasoning about Security Protocols Xinfeng Lei, Rui Xue, Ting Yu
2010/644 (PDF ) A Practical Platform for Cube-Attack-like Cryptanalyses Bo Zhu, Wenye Yu, Tao Wang
2010/643 (PDF ) Construct MD5 Collisions Using Just A Single Block Of Message Tao Xie, Dengguo Feng
2010/642 (PDF ) More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai
2010/641 (PDF ) A new algorithm for computing Groebner bases Shuhong Gao, Frank Volny IV, Mingsheng Wang
2010/640 (PDF ) Short collusion-secure fingerprint codes against three pirates Koji Nuida
2010/638 (PDF ) One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi, Hugo Krawczyk
2010/637 (PDF ) Breaking An Identity-Based Encryption Scheme based on DHIES Martin R. Albrecht, Kenneth G. Paterson
2010/636 (PDF ) Differential Fault Analysis of AES using a Single Multiple-Byte Fault Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
2010/634 (PDF ) ROTIV: RFID Ownership Transfer with Issuer Verification Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2010/633 (PDF ) Low Data Complexity Attacks on AES Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque
2010/632 (PDF ) Efficient and provably-secure certificateless signature scheme without bilinear pairings He Debiao, Chen Jianhua, Zhang Rui
2010/631 (PDF ) Black-box property of Cryptographic Hash Functions Michal Rjaško
2010/630 (PDF ) Divison Polynomials for Alternate Models of Elliptic Curves Dustin Moody
2010/629 (PDF ) On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang, Mridul Nandi, Moti Yung
2010/628 (PDF ) State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson
2010/627 (PDF ) Secure and Efficient Protocols for Iris and Fingerprint Identification Marina Blanton, Paolo Gasti
2010/626 (PDF ) Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack Peng Xu, Hai Jin
2010/625 (PDF ) Attacking and fixing Helios: An analysis of ballot secrecy Veronique Cortier, Ben Smyth
2010/624 (PDF ) No-leak authentication by the Sherlock Holmes method Dima Grigoriev, Vladimir Shpilrain
2010/623 (PDF ) Cryptanalysis of Skein Daniel J. Bernstein, Tanja Lange
2010/622 (PDF ) A new result on the distinctness of primitive sequences over Z(pq) modulo 2 Qunxiong Zheng, Wenfeng Qi
2010/621 (PDF ) Generic Compilers for Authenticated Key Exchange (Full Version) Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
2010/619 (PDF ) Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption Yang Lu
2010/618 (PDF ) A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 Thomas Fuhr, Henri Gilbert, Jean-Renë Reinhard, Marion Videau
2010/617 (PDF ) Computing Discrete Logarithms in an Interval Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai
2010/616 (PDF ) A non-uniform birthday problem with applications to discrete logarithms Steven D. Galbraith, Mark Holmes
2010/615 (PDF ) Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval Steven D. Galbraith, Raminder S. Ruprai
2010/614 (PDF ) An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder, Marcin Wojcik, Stefan Tillich, Dan Page
2010/613 (PDF ) Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner, Chris Peikert
2010/611 (PDF ) Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
2010/610 (PDF ) Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions Craig Gentry, Daniel Wichs
2010/609 (PDF ) The Round Complexity of General VSS Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2010/608 (PDF ) A New Model of Binary Elliptic Curves with Fast Arithmetic Hongfeng Wu, Chunming Tang, Rongquan Feng
2010/607 (PDF ) How to Improve Rebound Attacks María Naya-Plasencia
2010/606 (PDF ) Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices He Debiao, Chen Jianhua, Hu Jin
2010/605 (PDF ) A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques Tzipora Halevi, Nitesh Saxena
2010/604 (PDF ) On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization Shangwei Zhao, Ruyong Feng, Xiao-Shan Gao
2010/603 (PDF ) Cryptanalysis of Dual CRT-RSA Santanu Sarkar, Subhamoy Maitra
2010/602 (PDF ) An Improved Algebraic Attack on Hamsi-256 Itai Dinur, Adi Shamir
2010/601 (PDF ) Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic Lei Li, Siman Yang
2010/600 (PDF ) Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters Anne Broadbent, Stacey Jeffery, Alain Tapp
2010/599 (PDF ) Secure Multiparty Computation with Partial Fairness Amos Beimel, Eran Omri, Ilan Orlov
2010/598 (PDF ) A Broadcast Attack against NTRU Using Ding's Algorithm Yanbin Pan, Yingpu Deng
2010/597 (PDF ) A New Class of Bent--Negabent Boolean Functions Sugata Gangopadhyay, Ankita Chaturvedi
2010/596 (PDF ) Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL Enrico Thomae, Christopher Wolf
2010/595 (PDF ) Attribute-Based Signatures Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010/594 (PDF ) Cache Games - Bringing Access Based Cache Attacks on AES to Practice Endre Bangerter, David Gullasch, Stephan Krenn
2010/593 (PDF ) Differential Attack on Five Rounds of the SC2000 Block Cipher Jiqiang Lu
2010/591 (PDF ) Bonsai Trees, or How to Delegate a Lattice Basis David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert
2010/590 (PDF ) Beyond the Limits of DPA: Combined Side-Channel Collision Attacks Andrey Bogdanov, Ilya Kizhvatov
2010/589 (PDF ) Higher-order differential properties of Keccak and Luffa Christina Boura, Anne Canteaut, Christophe De Cannière
2010/588 (PDF ) Improved Collisions for Reduced ECHO-256 Martin Schläffer
2010/587 (PDF ) Group Message Authentication Bartosz Przydatek, Douglas Wikström
2010/586 (PDF ) Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm İsmail San, Nuray At
2010/585 (PDF ) Smaller decoding exponents: ball-collision decoding Daniel J. Bernstein, Tanja Lange, Christiane Peters
2010/584 (PDF ) VMCrypt - Modular Software Architecture for Scalable Secure Computation Lior Malka, Jonathan Katz
2010/583 (PDF ) Improved Preimage Attack on One-block MD4 Jinmin Zhong, Xuejia Lai
2010/582 (PDF ) Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
2010/581 (PDF ) Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm Jintai Ding
2010/580 (PDF ) The Cube Attack on Stream Cipher Trivium and Quadraticity Tests Piotr Mroczkowski, Janusz Szmidt
2010/579 (PDF ) Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion WeiGuo Zhang, GuoZhen Xiao
2010/578 (PDF ) L1 - An Intermediate Language for Mixed-Protocol Secure Computation Axel Schroepfer, Florian Kerschbaum, Guenter Mueller
2010/577 (PDF ) Discrete Logarithms, Diffie-Hellman, and Reductions Neal Koblitz, Alfred Menezes, Igor Shparlinski
2010/576 (PDF ) Efficient Hashing using the AES Instruction Set Joppe W. Bos, Onur Ozen, Martijn Stam
2010/575 (PDF ) A Discrete Logarithm Attack on Elliptic Curves Otto Johnston
2010/574 (PDF ) Cryptanalysis of PRESENT-like ciphers with secret S-boxes Julia Borghoff, Lars R. Knudsen, Gregor Leander, Soeren S. Thomsen
2010/573 (PDF ) On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$ Yongqiang Li, Mingsheng Wang
2010/572 (PDF ) Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson
2010/571 (PDF ) Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform Mohamed El Hadedy, Danilo Gligoroski, Svein J. Knapskog
2010/570 (PDF ) Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur, Adi Shamir
2010/569 (PDF ) Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function Jérémy Jean, Pierre-Alain Fouque
2010/568 (PDF ) Efficient Two-Move Blind Signatures in the Common Reference String Model E. Ghadafi, N. P. Smart
2010/567 (PDF ) ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS Claude Carlet, Sihem Mesnager
2010/566 (PDF ) Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles Yusuke Naito
2010/565 (PDF ) Self-Protecting Electronic Medical Records Using Attribute-Based Encryption Joseph A. Akinyele, Christoph U. Lehmann, Matthew D. Green, Matthew W. Pagano, Zachary N. J. Peterson, Aviel D. Rubin
2010/564 (PDF ) Cryptographic Randomness Testing of Block Ciphers and Hash Functions Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
2010/563 (PDF ) Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption Tatsuaki Okamoto, Katsuyuki Takashima
2010/562 (PDF ) How to Leak on Key Updates Allison Lewko, Mark Lewko, Brent Waters
2010/561 (PDF ) Password-Protected Secret Sharing Stanislaw Jarecki, Ali Bagherzandi, Nitesh Saxena, Yanbin Lu
2010/560 (PDF ) On CCA-Secure Fully Homomorphic Encryption J. Loftus, A. May, N. P. Smart, F. Vercauteren
2010/559 (PDF ) Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals
2010/558 (PDF ) Solving LWE problem with bounded errors in polynomial time Jintai Ding
2010/556 (PDF ) Definitional Issues in Functional Encryption Adam O'Neill
2010/555 (PDF ) RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation S. Duquesne
2010/554 (PDF ) Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant Stéphane Jacob
2010/552 (PDF ) A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality Carmit Hazay, Yehuda Lindell
2010/551 (PDF ) A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries Carmit Hazay, Yehuda Lindell
2010/550 (PDF ) Isogenies and Cryptography RAZA ALI KAZMI
2010/549 (PDF ) A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem Yalin Chen, Jue-Sam Chou, Chi-Fong Lin
2010/548 (PDF ) SHA-512/256 Shay Gueron, Simon Johnson, Jesse Walker
2010/546 (PDF ) Timed Encryption and Its Application Shaoquan Jiang
2010/545 (PDF ) Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu, Chuankun Wu
2010/544 (PDF ) Semantic Security Under Related-Key Attacks and Applications Benny Applebaum, Danny Harnik, Yuval Ishai
2010/543 (PDF ) Functional Encryption: Definitions and Challenges Dan Boneh, Amit Sahai, Brent Waters
2010/542 (PDF ) Squaring in cyclotomic subgroups Koray Karabina
2010/541 (PDF ) One-time Computable and Uncomputable Functions Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
2010/540 (PDF ) Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption Anna Lysyanskaya, Aaron Segal
2010/539 (PDF ) Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves Reza R. Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, J. Felipe Voloch
2010/538 (PDF ) Rotational Rebound Attacks on Reduced Skein Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger
2010/537 (PDF ) Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits Yongzhuang Wei, Jiqiang Lu, Yupu Hu
2010/536 (PDF ) On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings Xu Guo, Sinan Huang, Leyla Nazhandali, Patrick Schaumont
2010/535 (PDF ) Linear Analysis of Reduced-Round CubeHash Tomer Ashur, Orr Dunkelman
2010/534 (PDF ) Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity Xiangyong Zeng, Claude Carlet, Jinyong Shan, Lei Hu
2010/532 (PDF ) A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov, Christian Rechberger
2010/531 (PDF ) Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem
2010/530 (PDF ) How to Read a Signature? Vanessa Gratzer, David Naccache
2010/529 (PDF ) Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields Kristin Lauter, Ning Shang
2010/528 (PDF ) Constant-Round Private Function Evaluation with Linear Complexity Jonathan Katz, Lior Malka
2010/527 (PDF ) The Digital Signature Scheme MQQ-SIG Danilo Gligoroski, Rune Steinsmo \O deg\aa rd, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski
2010/526 (PDF ) Faster Explicit Formulas for Computing Pairings over Ordinary Curves Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López
2010/525 (PDF ) Torus-based compression by factor 4 and 6 Koray Karabina
2010/524 (PDF ) Combining properties of cryptographic hash functions Michal Rjaško
2010/523 (PDF ) Affine Masking against Higher-Order Side Channel Analysis Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain
2010/522 (PDF ) Signatures Resilient to Continual Leakage on Memory and Computation Tal Malkin, Isamu Teranishiy, Yevgeniy Vahlis, Moti Yung
2010/521 (PDF ) Linear Approximations of Addition Modulo $2^n$-1 Xiutao Feng, Chunfang Zhou, Chuankun Wu
2010/520 (PDF ) Implementing Gentry's Fully-Homomorphic Encryption Scheme Craig Gentry, Shai Halevi
2010/519 (PDF ) Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited Matthias Krause, Frederik Armknecht, Ewan Fleischmann
2010/518 (PDF ) Boolean functions with all main cryptographic properties Ziran Tu, Yingpu Deng
2010/517 (PDF ) Cryptanalysis of block EnRUPT Elias Yarrkov
2010/516 (PDF ) Key Agreement Protocols Based on Multivariate Polynomials over Fq Masahiro Yagisawa
2010/514 (PDF ) Semi-Homomorphic Encryption and Multiparty Computation Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias
2010/513 (PDF ) Key-Dependent Message Security: Generic Amplification and Completeness Benny Applebaum
2010/512 (PDF ) Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo
2010/511 (PDF ) On the complexity of Decomposition Attack Koh-ichi Nagao
2010/509 (PDF ) On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware Maria Dubovitskaya, Alessandra Scafuro, Ivan Visconti
2010/508 (PDF ) A Fault Analytic Method against HB+ Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento
2010/507 (PDF ) On isotopisms of commutative presemifields and CCZ-equivalence of functions Lilya Budaghyan, Tor Helleseth
2010/506 (PDF ) Quantum Preimage and Collision Attacks on CubeHash Gaëtan Leurent
2010/505 (PDF ) Termination-Insensitive Computational Indistinguishability (and applications to computational soundness) Dominique Unruh
2010/504 (PDF ) Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
2010/503 (PDF ) BiTR: Built-in Tamper Resilience Seung Geol Choi, Aggelos Kiayias, Tal Malkin
2010/502 (PDF ) Proving Coercion-Resistance of Scantegrity II Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2010/501 (PDF ) Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter
2010/500 (PDF ) ATTACKS ON THE AKACP PROTOCOL Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, Spyros T. Halkidis, George Stephanides
2010/499 (PDF ) Secure Computations on Non-Integer Values M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, H. Schroeder
2010/498 (PDF ) Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields Vladislav Kovtun, Sergey Kavun
2010/496 (PDF ) Efficient Attributes for Anonymous Credentials (Extended Version) Jan Camenisch, Thomas Groß
2010/495 (PDF ) A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme Mahabir Prasad Jhanwar
2010/494 (PDF ) Stronger Security Model of Group Key Agreement Jianjie Zhao, Dawu Gu, M. Choudary Gorantla
2010/492 (PDF ) Efficient Fully Secure Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2010/491 (PDF ) A Collaborative Framework for Privacy Protection in Online Social Networks Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn
2010/490 (PDF ) Strong designated verifier signature scheme: new definition and construction Zuhua Shao
2010/489 (PDF ) Loiss: A Byte-Oriented Stream Cipher Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu
2010/488 (PDF ) Fully Leakage-Resilient Signatures Elette Boyle, Gil Segev, Daniel Wichs
2010/487 (PDF ) Constant Round Non-Malleable Protocols using One Way Functions Vipul Goyal
2010/486 (PDF ) A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS Claude Carlet, Sihem Mesnager
2010/485 (PDF ) Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba
2010/484 (PDF ) Automata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
2010/483 (PDF ) Constant-round Non-Malleable Commitments from Any One-Way Function Huijia Lin, Rafael Pass
2010/481 (PDF ) A secure email login system using virtual password Bhavin Tanti, Nishant doshi
2010/480 (PDF ) Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010-- Shigeo Tsujii, Masahito Gotaishi
2010/479 (PDF ) Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems R. M. Avanzi, S. Hoerder, D. Page, M. Tunstall
2010/478 (PDF ) Cryptanalysis of the Convex Hull Click Human Identification Protocol Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
2010/477 (PDF ) On Compression of Data Encrypted with Block Ciphers Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin
2010/476 (PDF ) Predicate Encryption with Partial Public Keys Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
2010/475 (PDF ) Pairing Computation on Elliptic Curves of Jacobi Quartic Form Hong Wang, Kunpeng Wang, Lijun Zhang, Bao Li
2010/474 (PDF ) Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman
2010/472 (PDF ) Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought A. Simone, B. Skoric
2010/470 (PDF ) Two identification protocols based on Cayley graphs of Coxeter groups Feliú Sagols, Guillermo Morales-Luna
2010/469 (PDF ) Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
2010/468 (PDF ) Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes Goichiro Hanaoka, Jian Weng
2010/467 (PDF ) Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles Xinfeng Lei, Rui Xue, Ting Yu
2010/466 (PDF ) PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search Benwen Zhu, Bo Zhu, Kui Ren
2010/465 (PDF ) How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices Falko Strenzke
2010/463 (PDF ) Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems Mohammad Reza Sohizadeh Abyaneh
2010/462 (PDF ) Unconditionally Secure Rational Secret Sharing in Standard Communication Networks Zhifang Zhang
2010/461 (PDF ) Identity Based Partial Aggregate Signature Scheme Without Pairing S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan
2010/459 (PDF ) CCA2 Secure Certificateless Encryption Schemes Based on RSA S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/458 (PDF ) Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring Masahiro Yagisawa
2010/457 (PDF ) Improving the performance of Luffa Hash Algorithm Thomaz Oliveira, Julio López
2010/456 (PDF ) Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam Smith
2010/455 (PDF ) Optimal Verification of Operations on Dynamic Sets Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2010/454 (PDF ) Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol Jesse Walker, Jiangtao Li
2010/453 (PDF ) Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh, David Mandell Freeman
2010/452 (PDF ) Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting Feng Hao, Matthew Nicolas Kreeger
2010/451 (PDF ) Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault Subidh Ali, Debdeep Mukhopadhyay
2010/450 (PDF ) Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary Kaoru Kurosawa
2010/449 (PDF ) Oblivious and Fair Server-Aided Two-Party Computation Amir Herzberg, Haya Shulman
2010/448 (PDF ) Sequential Rationality in Cryptographic Protocols Ronen Gradwohl, Noam Livne, Alon Rosen
2010/447 (PDF ) Side-channel Analysis of Six SHA-3 Candidates Olivier Benoit, Thomas Peyrin
2010/446 (PDF ) Short One-Time Signatures G. M. Zaverucha, D. R. Stinson
2010/445 (PDF ) Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj
2010/444 (PDF ) New Construction of Identity-based Proxy Re-encryption Song Luo, Jianbin Hu, Zhong Chen
2010/443 (PDF ) Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang, Deng Tang, Xiangyong Zeng, Lei Hu
2010/442 (PDF ) Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade Dan Boneh, Hart Montgomery, Ananth Raghunathan
2010/441 (PDF ) Provably Secure Higher-Order Masking of AES Matthieu Rivain, Emmanuel Prouff
2010/440 (PDF ) Piret and Quisquater's DFA on AES Revisited Christophe Giraud, Adrian Thillard
2010/439 (PDF ) Embedded Extended Visual Cryptography Schemes Feng Liu, Chuankun Wu
2010/438 (PDF ) Achieving Leakage Resilience Through Dual System Encryption Allison Lewko, Yannis Rouselakis, Brent Waters
2010/437 (PDF ) Selecting Parameters for the Rainbow Signature Scheme - Extended Version - Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2010/436 (PDF ) Arithmetic of Supersingular Koblitz Curves in Characteristic Three Roberto Avanzi, Clemens Heuberger, Helmut Prodinger
2010/435 (PDF ) The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA Cihangir Tezcan
2010/434 (PDF ) Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512 Takanori Isobe, Taizo Shirai
2010/433 (PDF ) The PASSERINE Public Key Encryption and Authentication Mechanism Markku-Juhani O. Saarinen
2010/432 (PDF ) AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS K. Atighehchi, A. Enache, T. Muntean, G. Risterucci
2010/431 (PDF ) Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees Jing Liu, Bo Yang
2010/430 (PDF ) Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates Vlastimil Klima, Danilo Gligoroski
2010/429 (PDF ) A Family of Implementation-Friendly BN Elliptic Curves Geovandro C. C. F. Pereira, Marcos A. Simplício Jr, Michael Naehrig, Paulo S. L. M. Barreto
2010/428 (PDF ) Random Oracles in a Quantum World Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
2010/426 (PDF ) Parallelizing the Camellia and SMS4 Block Ciphers - Extended version Huihui Yap, Khoongming Khoo, Axel Poschmann
2010/425 (PDF ) KIST: A new encryption algorithm based on splay R. Wei, Z. Zeng
2010/424 (PDF ) CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2010/423 (PDF ) Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm LI Yun-qiang, Wang Ai-lan
2010/422 (PDF ) Synchronized Aggregate Signatures: New Definitions, Constructions and Applications Jae Hyun Ahn, Matthew Green, Susan Hohenberger
2010/421 (PDF ) Binomial Sieve Series -- a Prospective Cryptographic Tool Gideon Samid
2010/420 (PDF ) Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann
2010/419 (PDF ) White-Box Cryptography and SPN ciphers. LRC method. Dmitry Schelkunov
2010/418 (PDF ) Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function Jue-Sam Chou, Hsien-ching Chen, Chun-Yun Chen
2010/417 (PDF ) Distinguishing Properties of Higher Order Derivatives of Boolean Functions Ming Duan, Xuejia Lai, Mohan Yang, Xiaorui Sun, Bo Zhu
2010/416 (PDF ) Computationally Sound Verification of Source Code Michael Backes, Matteo Maffei, Dominique Unruh
2010/415 (PDF ) Perfectly Balanced Boolean Functions and Golić Conjecture Stanislav Smyshlyaev
2010/414 (PDF ) On Strong Simulation and Composable Point Obfuscation Nir Bitansky, Ran Canetti
2010/413 (PDF ) Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics E. A. Grechnikov
2010/412 (PDF ) Optimal Adversary Behavior for the Serial Model of Financial Attack Trees Margus Niitsoo
2010/411 (PDF ) Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials. Vivien Dubois, Jean-Gabriel Kammerer
2010/410 (PDF ) Wild McEliece Daniel J. Bernstein, Tanja Lange, Christiane Peters
2010/409 (PDF ) The collision security of Tandem-DM in the ideal cipher model Jooyoung Lee, Martijn Stam, John Steinberger
2010/408 (PDF ) Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall
2010/407 (PDF ) Flaws in Differential Cryptanalysis of Reduced Round PRESENT Manoj Kumar, Pratibha Yadav, Meena Kumari
2010/406 (PDF ) Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf Julien Francq, Céline Thuillet
2010/405 (PDF ) Privacy-Preserving RFID Systems: Model and Constructions Sébastien Canard, Iwen Coisel, Jonathan Etrog, Marc Girault
2010/404 (PDF ) On the Insecurity of Parallel Repetition for Leakage Resilience Allison Lewko, Brent Waters
2010/402 (PDF ) On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack Mohammad Reza Sohizadeh Abyaneh
2010/401 (PDF ) Privacy-friendly Incentives and their Application to Wikipedia (Extended Version) Jan Camenisch, Thomas Groß, Peter Hladky, Christian Hoertnagl
2010/400 (PDF ) Security Analysis of a Threshold Proxy Signature Scheme Kitae Kim, Dahun Nyang
2010/399 (PDF ) Faster Computation of Self-pairings Chang-An Zhao, Fangguo Zhang, Dongqing Xie
2010/398 (PDF ) Distinguisher for Shabal's Permutation Function Peter Novotney
2010/397 (PDF ) Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks Mihir Bellare, David Cash
2010/396 (PDF ) From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks Noémie Floissac, Yann L'Hyver
2010/395 (PDF ) On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption Zhibin Zhou, Dijiang Huang
2010/394 (PDF ) Horizontal Correlation Analysis on Exponentiation Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylene Roussellet, Vincent Verneuil
2010/393 (PDF ) A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment Jue-Sam Chou, Yalin Chen, Chun-Hui Huang
2010/392 (PDF ) Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
2010/391 (PDF ) Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks Daniel Z. Zanger
2010/390 (PDF ) Elliptic curves in Huff's model Hongfeng Wu, Rongquan Feng
2010/389 (PDF ) The impossibility of computationally sound XOR Dominique Unruh
2010/388 (PDF ) On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings Sanjit Chatterjee, Darrel Hankerson, Alfred Menezes
2010/387 (PDF ) A Combinatorial Analysis of HC-128 Goutam Paul, Subhamoy Maitra, Shashwat Raizada
2010/386 (PDF ) BoostReduce - A Framework For Strong Lattice Basis Reduction Werner Backes, Susanne Wetzel
2010/385 (PDF ) First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version– Emmanuel Prouff, Robert McEvoy
2010/384 (PDF ) Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions Danilo Gligoroski, Vlastimil Klima
2010/383 (PDF ) Huff's Model for Elliptic Curves Marc Joye, Mehdi Tibouchi, Damien Vergnaud
2010/382 (PDF ) Deterministic Encoding and Hashing to Odd Hyperelliptic Curves Pierre-Alain Fouque, Mehdi Tibouchi
2010/381 (PDF ) Security Reductions of the Second Round SHA-3 Candidates Elena Andreeva, Bart Mennink, Bart Preneel
2010/380 (PDF ) Analysis of an internet voting protocol Kristian Gjøsteen
2010/379 (PDF ) Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree Sorina Ionica, Antoine Joux
2010/378 (PDF ) Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation Jin Wang
2010/377 (PDF ) Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring Masahiro Yagisawa
2010/376 (PDF ) Identity Based Online/Offline Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/375 (PDF ) Improved Collision Attacks on the Reduced-Round Grøstl Hash Function Kota Ideguchi, Elmar Tischhauser, Bart Preneel
2010/374 (PDF ) Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees Zhen Liu, Zhenfu Cao, Duncan S. Wong
2010/373 (PDF ) Hashing into Hessian Curves Reza Rezaeian Farashahi
2010/372 (PDF ) Decoding square-free Goppa codes over $\F_p$ Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
2010/371 (PDF ) Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves Nicolas Estibals
2010/370 (PDF ) Finding discrete logarithms with a set orbit distinguisher Robert P. Gallant
2010/369 (PDF ) Double Ciphertext Mode : A Proposal for Secure Backup Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez
2010/368 (PDF ) Round-Optimal Password-Based Authenticated Key Exchange Jonathan Katz, Vinod Vaikuntanathan
2010/367 (PDF ) Starfish on Strike Daniel J. Bernstein, Peter Birkner, Tanja Lange
2010/366 (PDF ) Oblivious RAM Revisited Benny Pinkas, Tzachy Reinman
2010/365 (PDF ) TASTY: Tool for Automating Secure Two-partY computations Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
2010/364 (PDF ) A Compact FPGA Implementation of the SHA-3 Candidate ECHO Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2010/363 (PDF ) An Analysis of Affine Coordinates for Pairing Computation Kristin Lauter, Peter L. Montgomery, Michael Naehrig
2010/362 (PDF ) Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties Deng Tang, Weiguo Zhang, Xiaohu Tang
2010/361 (PDF ) On the Use of Financial Data as a Random Beacon Jeremy Clark, Urs Hengartner
2010/360 (PDF ) On the Security of Identity Based Threshold Unsigncryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, S. Priti, C. Pandu Rangan
2010/359 (PDF ) Identity Based Self Delegated Signature - Self Proxy Signatures S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopinath, C. Pandu Rangan
2010/358 (PDF ) The Fiat--Shamir Transform for Group and Ring Signature Schemes M. -F. Lee, N. P. Smart, B. Warinschi
2010/356 (PDF ) Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes Pinaki Sarkar, Amrita Saha, Morshed Udan Chowdhury
2010/355 (PDF ) Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
2010/354 (PDF ) High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves Jean-Luc Beuchat, Jorge Enrique González Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, Tadanori Teruya
2010/353 (PDF ) Cryptographic Pairings Based on Elliptic Nets Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto
2010/352 (PDF ) A Digital Signature Using Multivariate Functions on Quaternion Ring Masahiro Yagisawa
2010/351 (PDF ) Decentralizing Attribute-Based Encryption Allison Lewko, Brent Waters
2010/350 (PDF ) A Security Enhancement and Proof for Authentication and Key Agreement (AKA) Vladimir Kolesnikov
2010/349 (PDF ) Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems Kenneth Koon-Ho Wong, Gregory V. Bard
2010/348 (PDF ) Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids A. N. Alekseychuk
2010/347 (PDF ) Time-Specific Encryption Kenneth G. Paterson, Elizabeth A. Quaglia
2010/346 (PDF ) Efficient Generalized Signcryption Schemes Prashant Kushwah, Sunder Lal
2010/345 (PDF ) Robust RFID Authentication Protocol with Formal Proof and Its Feasibility Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama, Kazuo Ohta
2010/344 (PDF ) Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves. Ezekiel J Kachisa
2010/343 (PDF ) Identity Based Public Verifiable Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/342 (PDF ) Fixed Argument Pairings Craig Costello, Douglas Stebila
2010/341 (PDF ) A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme Masao Kasahara
2010/340 (PDF ) A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm Jayaprakash Kar, Banshidhar Majhi
2010/339 (PDF ) A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols Jose Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2010/338 (PDF ) Efficient SIMD arithmetic modulo a Mersenne number Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
2010/337 (PDF ) Practical-Titled Attack on AES-128 Using Chosen-Text Relations Vincent Rijmen
2010/336 (PDF ) Efficient Differential Fault Analysis for AES Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
2010/335 (PDF ) Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, Catherine Gebotys
2010/334 (PDF ) Security Proof of AugPAKE SeongHan Shin, Kazukuni Kobara, Hideki Imai
2010/332 (PDF ) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurelien Francillon, Boris Danev, Srdjan Capkun
2010/331 (PDF ) A Distinguisher for High Rate McEliece Cryptosystems Jean-Charles Faugère, Valérie Gauthier, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich
2010/330 (PDF ) Distributed Rational Consensus Amjed Shareef
2010/329 (PDF ) On the Security of Pseudorandomized Information-Theoretically Secure Schemes Koji Nuida, Goichiro Hanaoka
2010/328 (PDF ) Signatures for Multi-source Network Coding László Czap, István Vajda
2010/327 (PDF ) Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2010/326 (PDF ) Privacy-Preserving Multi-Objective Evolutionary Algorithms Daniel Funke, Florian Kerschbaum
2010/325 (PDF ) Effect of the Dependent Paths in Linear Hull Zhenli Dai, Meiqin Wang, Yue Sun
2010/324 (PDF ) Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images Abdel Alim Kamal, Amr M. Youssef
2010/323 (PDF ) Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent
2010/322 (PDF ) Improved Single-Key Attacks on 8-round AES Orr Dunkelman, Nathan Keller, Adi Shamir
2010/321 (PDF ) Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function Martin Schläffer
2010/319 (PDF ) On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010 Jian Weng, Yunlei Zhao
2010/318 (PDF ) Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost Ivan Damgård, Claudio Orlandi
2010/317 (PDF ) A Note On Gottesman-Chuang Quantum Signature Scheme Zhengjun Cao
2010/316 (PDF ) A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang
2010/315 (PDF ) Efficient Techniques for High-Speed Elliptic Curve Cryptography Patrick Longa, Catherine Gebotys
2010/314 (PDF ) Weaknesses of a dynamic ID-based remote user authentication scheme He Debiao, Chen Jianhua, Hu Jin
2010/313 (PDF ) Fast Exhaustive Search for Polynomial Systems in $F_2$ Charles Bouillaguet, Chen-Mou Cheng, Tony (Tung) Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang
2010/312 (PDF ) Security weakness of two authenticated key exchange protocols from pairings Qingfeng Cheng, Chuangui Ma
2010/311 (PDF ) Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation J. C. Bajard, S. Duquesne, M. Ercegovac
2010/309 (PDF ) Co-Z Addition Formulae and Binary Ladders on Elliptic Curves Raveen R. Goundar, Marc Joye, Atsuko Miyaji
2010/308 (PDF ) Attacking M&M Collective Signature Scheme Michal Rjaško, Martin Stanek
2010/307 (PDF ) Impossible Differential Cryptanalysis of SPN Ciphers Ruilin Li, Bing Sun, Chao Li
2010/306 (PDF ) On security of a remote user authentication scheme without using smart cards He Debiao, Chen Jianhua, Hu Jin
2010/305 (PDF ) On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing Marten van Dijk, Ari Juels
2010/304 (PDF ) Cryptanalysis of the Compression Function of SIMD Hongbo Yu, Xiaoyun Wang
2010/303 (PDF ) Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange Ran Canetti, Sebastian Gajek
2010/302 (PDF ) Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design Frederik Armknecht, Carsten Elsner, Martin Schmidt
2010/301 (PDF ) On generalized Feistel networks Viet Tung Hoang, Phillip Rogaway
2010/300 (PDF ) Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
2010/299 (PDF ) Faster Fully Homomorphic Encryption Damien Stehle, Ron Steinfeld
2010/298 (PDF ) On the Indifferentiability of the Grøstl Hash Function Elena Andreeva, Bart Mennink, Bart Preneel
2010/297 (PDF ) Correlation-Enhanced Power Analysis Collision Attack Amir Moradi, Oliver Mischke, Thomas Eisenbarth
2010/296 (PDF ) Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen, ZHANG Huan-Guo
2010/295 (PDF ) Ideal Key Derivation and Encryption in Simulation-based Security Ralf Kuesters, Max Tuengerthal
2010/294 (PDF ) Computing genus 2 curves from invariants on the Hilbert moduli space Kristin Lauter, Tonghai Yang
2010/293 (PDF ) Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities Jacques Patarin
2010/292 (PDF ) A Low-Area yet Performant FPGA Implementation of Shabal Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah
2010/291 (PDF ) Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card He Debiao, Chen Jianhua, Hu Jin
2010/290 (PDF ) Intractable Problems in Cryptography Neal Koblitz, Alfred Menezes
2010/289 (PDF ) A Two-Party Protocol with Trusted Initializer for Computing the Inner Product Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento
2010/288 (PDF ) Lattice-based Identity-Based Broadcast Encryption Scheme Jin Wang, Jingguo Bi
2010/287 (PDF ) Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography Jacques Patarin
2010/286 (PDF ) On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions Sugata Gangopadhyay, Brajesh Kumar Singh
2010/285 (PDF ) A SAT-based preimage analysis of reduced KECCAK hash functions Pawel Morawiecki, Marian Srebrny
2010/284 (PDF ) Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer Yehuda Lindell, Benny Pinkas
2010/283 (PDF ) Recursive Information Hiding in Visual Cryptography Sandeep Katta
2010/282 (PDF ) Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish Kerry A. McKay, Poorvi L. Vora
2010/281 (PDF ) Protocols for Reliable and Secure Message Transmission Ashish Choudhury
2010/280 (PDF ) Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation Arpita Patra
2010/279 (PDF ) On the Round Complexity of Covert Computation Vipul Goyal, Abhishek Jain
2010/278 (PDF ) Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, Vinod Vaikuntanathan
2010/276 (PDF ) Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2010/275 (PDF ) Position-Based Quantum Cryptography: Impossibility and Constructions Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
2010/274 (PDF ) Online/Offline Identity-Based Signcryption Revisited Joseph K. Liu, Joonsang Baek, Jianying Zhou
2010/273 (PDF ) Symmetric States and their Structure: Improved Analysis of CubeHash Niels Ferguson, Stefan Lucks, Kerry A. McKay
2010/272 (PDF ) Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore Zhimin Chen, Patrick Schaumont
2010/271 (PDF ) Selecting Parameters for Secure McEliece-based Cryptosystems Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, Johannes Buchmann
2010/270 (PDF ) Factorization of RSA-180 S. A. Danilov, I. A. Popovyan
2010/269 (PDF ) LAB Form for Iterated Hash Functions Xigen Yao
2010/268 (PDF ) Key-Controlled Order-Preserving Encryption HU Mengke, GAO Juntao
2010/267 (PDF ) Two improved authenticated multiple key exchange protocols Feng LIU
2010/266 (PDF ) Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition Chao Ning, Qiuliang Xu
2010/265 (PDF ) CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles Jian Weng, Minrong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao
2010/264 (PDF ) Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk
2010/262 (PDF ) Cube Test Analysis of the Statistical Behavior of CubeHash and Skein Alan Kaminsky
2010/261 (PDF ) Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT Céline Blondeau, Benoît Gérard
2010/260 (PDF ) On FPGA-based implementations of Gr\{o}stl Bernhard Jungk, Steffen Reith
2010/259 (PDF ) Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA Andrey V. Pavlov
2010/258 (PDF ) On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions Ruchi Gode, Sugata Gangopadhyay
2010/257 (PDF ) Feasible Attack on the 13-round AES-256 Alex Biryukov, Dmitry Khovratovich
2010/255 (PDF ) Automorphism group of the set of all bent functions Natalia Tokareva
2010/254 (PDF ) Cryptanalysis of XXTEA Elias Yarrkov
2010/253 (PDF ) Separable Hash Functions Sarang Aravamuthan
2010/252 (PDF ) A supplement to Liu et al.'s certificateless signcryption scheme in the standard model Zhengping Jin, Qiaoyan Wen, Hua Zhang
2010/251 (PDF ) Modeling Attacks on Physical Unclonable Functions Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber
2010/250 (PDF ) Collusion Free Protocol for Rational Secret Sharing Amjed Shareef
2010/249 (PDF ) Rational Secret Sharing without Broadcast Amjed Shareef
2010/248 (PDF ) Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others Alex Biryukov, Ivica Nikolić
2010/247 (PDF ) A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem Jia XU
2010/246 (PDF ) Quantifying Trust Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
2010/245 (PDF ) Towards a Theory of Trust Based Collaborative Search Yacov Yacobi
2010/244 (PDF ) Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset Jia XU
2010/243 (PDF ) Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity Senshan Pan, Xiaotong Fu, Weiguo Zhang
2010/242 (PDF ) Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios Yang ZHANG, Jun-Liang CHEN
2010/241 (PDF ) Improved Delegation of Computation using Fully Homomorphic Encryption Kai-Min Chung, Yael Kalai, Salil Vadhan
2010/240 (PDF ) Weaknesses of a dynamic ID-based remote user authentication scheme He Debiao, Chen Jianhua, Hu Jin
2010/239 (PDF ) One-round and authenticated three-party multiple key exchange protocol from parings Feng LIU
2010/238 (PDF ) Collusion Free Protocol for Correlated Element Selection Problem Amjed Shareef, Akshay Agrawal, C. Pandu Rangan
2010/237 (PDF ) A New Security Model for Authenticated Key Agreement Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
2010/236 (PDF ) Accountability: Definition and Relationship to Verifiability Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2010/235 (PDF ) Attribute-based group key establishment Rainer Steinwandt, Adriana Suárez Corona
2010/234 (PDF ) Efficient provable data possession for hybrid clouds Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
2010/233 (PDF ) Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials Georg Fuchsbauer
2010/232 (PDF ) On Representable Matroids and Ideal Secret Sharing Ching-Fang Hsu, Qi Cheng
2010/231 (PDF ) Throughput-Optimal Routing in Unreliable Networks Paul Bunn, Rafail Ostrovsky
2010/230 (PDF ) A calculus for game-based security proofs David Nowak, Yu Zhang
2010/229 (PDF ) Concurrent composition in the bounded quantum storage model Dominique Unruh
2010/228 (PDF ) Practical NFC Peer-to-Peer Relay Attack using Mobile Phones Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2010/227 (PDF ) A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$ Neal Koblitz
2010/226 (PDF ) Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) Zvika Brakerski, Shafi Goldwasser
2010/225 (PDF ) A Security Weakness in a Generic Construction of a Group Key Exchange Protocol Junghyun Nam
2010/224 (PDF ) Efficient Implementation of the Orlandi Protocol Extended Version Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
2010/223 (PDF ) Improved Differential Attacks for ECHO and Grostl Thomas Peyrin
2010/222 (PDF ) Some Observations on Indifferentiability Ewan Fleischmann, Michael Gorski, Stefan Lucks
2010/221 (PDF ) Solving Generalized Small Inverse Problems Noboru Kunihiro
2010/220 (PDF ) (If) Size Matters: Size-Hiding Private Set Intersection Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik
2010/219 (PDF ) Tracker: Security and Privacy for RFID-based Supply Chains Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
2010/217 (PDF ) Secure Code Update for Embedded Devices via Proofs of Secure Erasure Daniele Perito, Gene Tsudik
2010/216 (PDF ) Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework Zheng Yuan, Xiaoqiu Ren
2010/215 (PDF ) On the q-Strong Diffie-Hellman Problem Naoki Tanaka, Taiichi Saito
2010/214 (PDF ) How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
2010/213 (PDF ) Composable Security Analysis of OS Services Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema
2010/212 (PDF ) Quantum Proofs of Knowledge Dominique Unruh
2010/211 (PDF ) Practical-time Attack on the Full MMB Block Cipher Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang
2010/209 (PDF ) Identity-Based Authenticated Asymmetric Group Key Agreement Protocol Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
2010/208 (PDF ) Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves Richard Moloney, Aidan O'Mahony, Pierre Laurent
2010/207 (PDF ) Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares Koen Simoens, Roel Peeters, Bart Preneel
2010/206 (PDF ) Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey Long Hoang Nguyen, Andrew William Roscoe
2010/205 (PDF ) On Protecting Cryptographic Keys Against Continual Leakage Ali Juma, Yevgeniy Vahlis
2010/204 (PDF ) Certificateless generalized signcryption Ji Huifang, Han Wenbao, Zhao Long
2010/203 (PDF ) Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure Bernard Colbert, Anthony H. Dekker, Lynn Margaret Batten
2010/202 (PDF ) Robust Combiner for Obfuscators Amir Herzberg, Haya Shulman
2010/200 (PDF ) Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs Markus Rückert, Michael Schneider, Dominique Schröder
2010/199 (PDF ) A Framework for Fully-Simulatable $t$-out-of-$n$ Oblivious Transfer Bing Zeng, Christophe Tartary, Chingfang Hsu
2010/198 (PDF ) The Rebound Attack and Subspace Distinguishers: Application to Whirlpool Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
2010/197 (PDF ) Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2010/196 (PDF ) Cryptography Against Continuous Memory Attacks Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
2010/195 (PDF ) On E-Vote Integrity in the Case of Malicious Voter Computers Sven Heiberg, Helger Lipmaa, Filip Van Laenen
2010/194 (PDF ) Identity-Based Online/Offline Key Encapsulation and Encryption Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou
2010/193 (PDF ) Speeding Up The Widepipe: Secure and Fast Hashing Mridul Nandi, Souradyuti Paul
2010/192 (PDF ) Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
2010/191 (PDF ) On Designated Verifier Signature Schemes Michal Rjaško, Martin Stanek
2010/190 (PDF ) J-PAKE: Authenticated Key Exchange Without PKI Feng Hao, Peter Ryan
2010/189 (PDF ) New generic algorithms for hard knapsacks Nick Howgrave-Graham, Antoine Joux
2010/188 (PDF ) Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
2010/187 (PDF ) Certificateless Signcryption without Pairing Wenjian Xie, Zhang Zhang
2010/186 (PDF ) New software speed records for cryptographic pairings Michael Naehrig, Ruben Niederhagen, Peter Schwabe
2010/185 (PDF ) New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation Wenping Ma, Chen Yang, Shaohui Sun
2010/183 (PDF ) Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman
2010/182 (PDF ) A Simple BGN-type Cryptosystem from LWE Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010/181 (PDF ) Cryptanalysis of a DoS-resistant ID-based password authentication He Debiao, Chen Jianhua, Hu Jin
2010/180 (PDF ) The World is Not Enough: Another Look on Second-Order DPA Francois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
2010/179 (PDF ) A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity Ziran Tu, Yingpu Deng
2010/178 (PDF ) Identity Based Online/Offline Encryption Scheme Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
2010/177 (PDF ) On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields Robert Granger
2010/176 (PDF ) A Comparison of Cryptanalytic Tradeoff Algorithms Jin Hong, Sunghwan Moon
2010/175 (PDF ) Sanitizable signatures with strong transparency in the standard model Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan
2010/174 (PDF ) A Reflection on the Security of Two-Party Key Establishment Protocols Qiang Tang
2010/173 (PDF ) Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2010/172 (PDF ) Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia
2010/171 (PDF ) On Foundation and Construction of Physical Unclonable Functions Jiang Wu, Maire O'Neill
2010/170 (PDF ) On a conjecture about binary strings distribution Jean-Pierre Flori, Hugues Randriambololona, Gérard Cohen, Sihem Mesnager
2010/169 (PDF ) Dismantling SecureMemory, CryptoMemory and CryptoRF Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur
2010/168 (PDF ) A Meet-in-the-Middle Attack on ARIA Xuehai Tang, Bing Sun, Ruilin Li, Chao Li
2010/167 (PDF ) Evolutionary Cipher against Differential Power Attack Tang ming, Meng Qinshu, Zhang Huanguo, Gao Si, Dou Qin, Shen Fei, Li Du
2010/166 (PDF ) Fault Analysis Study of the Block Cipher FOX64 Ruilin Li, Jianxiong You, Bing Sun, Chao Li
2010/165 (PDF ) Comment on four two-party authentication protocols Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2010/164 (PDF ) Black-Box Constructions of Protocols for Secure Computation Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2010/163 (PDF ) Golay Complementary Sequences Over the QAM Constellation Wenping Ma, Chen Yang, Shaohui Sun
2010/162 (PDF ) 1024XKS - A High Security Software Oriented Block Cipher Revisited Dieter Schmidt
2010/161 (PDF ) Stange's Elliptic Nets and Coxeter Group F4 Daniel R. L. Brown
2010/160 (PDF ) A Flaw in The Internal State Recovery Attack on ALPHA-MAC Shengbao Wu, Mingsheng Wang, Zheng Yuan
2010/159 (PDF ) Identity-Based Encryption Secure against Selective Opening Attack Mihir Bellare, Brent Waters, Scott Yilek
2010/158 (PDF ) A variant of the F4 algorithm Antoine Joux, Vanessa Vitse
2010/157 (PDF ) Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$ Antoine Joux, Vanessa Vitse
2010/156 (PDF ) Genus 2 Curves with Complex Multiplication Eyal Z. Goren, Kristin E. Lauter
2010/155 (PDF ) the upper bounds on differntial characteristics in block cipher SMS4 Zhang MeiLing, Liu JingMei, Wang XinMei
2010/154 (PDF ) Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
2010/153 (PDF ) Founding Cryptography on Tamper-Proof Hardware Tokens Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
2010/152 (PDF ) Secure and Fast Implementations of Two Involution Ciphers Billy Bob Brumley
2010/151 (PDF ) Ring signature with divided private key Stelian Flonta, Liviu-Cristian Miclea
2010/150 (PDF ) Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm Mohammad Sadeq Dousti
2010/149 (PDF ) On Small Subgroup Non-confinement Attack Feng Hao
2010/148 (PDF ) Comments on five smart card based password authentication protocols Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2010/147 (PDF ) A New Framework for Password-Based Authenticated Key Exchange Adam Groce, Jonathan Katz
2010/146 (PDF ) Some Applications of Lattice Based Root Finding Techniques Santanu Sarkar, Subhamoy Maitra
2010/145 (PDF ) i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010/144 (PDF ) New Definitions and Separations for Circular Security David Cash, Matthew Green, Susan Hohenberger
2010/143 (PDF ) Small Scale Variants Of The Block Cipher PRESENT Gregor Leander
2010/142 (PDF ) Mean value formulas for twisted Edwards curves Dustin Moody
2010/140 (PDF ) Improved Agreeing-Gluing Algorithm Igor Semaev
2010/139 (PDF ) A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0 Masao Kasahara
2010/138 (PDF ) On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP Manoj Kumar
2010/137 (PDF ) Estimating the Security of Lattice-based Cryptosystems Markus Rückert, Michael Schneider
2010/136 (PDF ) On Robust Key Agreement Based on Public Key Authentication Feng Hao
2010/135 (PDF ) On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
2010/134 (PDF ) Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves - Masaaki Shirase
2010/133 (PDF ) Signing on Elements in Bilinear Groups for Modular Protocol Design Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo
2010/132 (PDF ) On the claimed privacy of EC-RAC III Junfeng Fan, Jens Hermans, Frederik Vercauteren
2010/131 (PDF ) Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation Jooyoung Lee, John Steinberger
2010/130 (PDF ) Low Voltage Fault Attacks to AES and RSA on General Purpose Processors Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
2010/129 (PDF ) Relation for Algebraic Attack on E0 combiner N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
2010/126 (PDF ) On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks Jian-zhu Lu, Jipeng Zhou
2010/125 (PDF ) Cryptographic Aspects of Real Hyperelliptic Curves M. J. Jacobson Jr., R. Scheidler, A. Stein
2010/124 (PDF ) A Hardware Wrapper for the SHA-3 Hash Algorithms Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilton, Neil Hanley, Maire O'Neill, William P. Marnane
2010/123 (PDF ) Delaying Mismatched Field Multiplications in Pairing Computations Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2010/122 (PDF ) Security of Encryption Schemes in Weakened Random Oracle Models Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa
2010/120 (PDF ) Universal One-Way Hash Functions and Average Case Complexity via Inaccessible Entropy Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, Hoeteck Wee
2010/118 (PDF ) Proposal of a Signature Scheme based on STS Trapdoor Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita
2010/117 (PDF ) Cryptographic Agility and its Relation to Circular Encryption Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
2010/116 (PDF ) Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator M. Abdelaziz Elaabid, Sylvain Guilley
2010/115 (PDF ) A Security Evaluation of DNSSEC with NSEC3 Jason Bau, John C Mitchell
2010/114 (PDF ) The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem Simon R. Blackburn
2010/113 (PDF ) Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model Xu An Wang, Xiaoyuan Yang
2010/112 (PDF ) CCA-Secure PRE Scheme without Random Oracles Jun Shao, Zhenfu Cao, Peng Liu
2010/111 (PDF ) On zero practical significance of “"Key recovery attack on full GOST block cipher with zero time and memory”" Vladimir Rudskoy
2010/110 (PDF ) Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
2010/109 (PDF ) Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green, Susan Hohenberger
2010/108 (PDF ) Perfectly Secure Oblivious RAM Without Random Oracles Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
2010/107 (PDF ) Adaptive Concurrent Non-Malleability with Bare Public-Keys Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/106 (PDF ) Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography Ivan Damgård, Yuval Ishai, Mikkel Krøigaard
2010/105 (PDF ) Bias in the nonlinear filter generator output sequence Sui-Guan Teo, Leonie Simpson, Ed Dawson
2010/104 (PDF ) Avoiding Full Extension Field Arithmetic in Pairing Computations Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2010/103 (PDF ) The Extended Access Control for Machine Readable Travel Documents Rafik Chaabouni, Serge Vaudenay
2010/102 (PDF ) Constructing Verifiable Random Functions with Large Input Spaces Susan Hohenberger, Brent Waters
2010/101 (PDF ) Fair Blind Signatures without Random Oracles Georg Fuchsbauer, Damien Vergnaud
2010/100 (PDF ) Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security Brett Hemenway, Steve Lu, Rafail Ostrovsky
2010/099 (PDF ) On Homomorphic Encryption and Chosen-Ciphertext Security Brett Hemenway, Rafail Ostrovsky
2010/098 (PDF ) A Zero-One Law for Deterministic 2-Party Secure Computation Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010/097 (PDF ) Parallel Enumeration of Shortest Lattice Vectors Özgür Dagdelen, Michael Schneider
2010/096 (PDF ) Secret Sharing Extensions based on the Chinese Remainder Theorem Kamer Kaya, Ali Aydın Selçuk
2010/095 (PDF ) Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR Kenneth G. Paterson, Gaven J. Watson
2010/094 (PDF ) A Random Number Generator Based on Isogenies Operations He Debiao, Chen Jianhua, Hu Jin
2010/093 (PDF ) New Impossible Differential Attacks on AES Zheng Yuan
2010/092 (PDF ) Security Weaknesses in Two Certificateless Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/091 (PDF ) Distinguishers for the Compression Function and Output Transformation of Hamsi-256 Jean-Philippe Aumasson, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune Odegaard, Thomas Peyrin, Martin Schläffer
2010/090 (PDF ) Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n}) Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi
2010/089 (PDF ) Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
2010/088 (PDF ) An Efficient and Parallel Gaussian Sampler for Lattices Chris Peikert
2010/087 (PDF ) MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions Christopher Wolf, Bart Preneel
2010/086 (PDF ) A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model Zvika Brakerski, Yael Tauman Kalai
2010/085 (PDF ) Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein Mouftah, Eiji Okamoto
2010/084 (PDF ) Attribute-based Authenticated Key Exchange M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2010/083 (PDF ) One Round Group Key Exchange with Forward Security in the Standard Model M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2010/082 (PDF ) Predicate-Based Key Exchange James Birkett, Douglas Stebila
2010/081 (PDF ) The Eris hybrid cipher Sandy Harris
2010/080 (PDF ) Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols Gergei Bana, Koji Hasebe, Mitsuhiro Okada
2010/079 (PDF ) From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2010/078 (PDF ) Multiple Bytes Differential Fault Analysis on CLEFIA Xin-jie ZHAO, Tao WANG, Jing-zhe GAO
2010/077 (PDF ) ECC2K-130 on Cell CPUs Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe
2010/076 (PDF ) Private and Continual Release of Statistics T-H. Hubert Chan, Elaine Shi, Dawn Song
2010/075 (PDF ) A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra Mehdi Vasef
2010/074 (PDF ) Concurrent Knowledge Extraction in the Public-Key Model Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/073 (PDF ) Related-Key Boomerang Attack on Block Cipher SQUARE Bonwook Koo, Yongjin Yeom, Junghwan Song
2010/072 (PDF ) Approximating Addition by XOR: how to go all the way Didier Alquié
2010/071 (PDF ) 2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree Didier Alquié
2010/070 (PDF ) Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles Markus Rückert
2010/069 (PDF ) Type-II Optimal Polynomial Bases Daniel J. Bernstein, Tanja Lange
2010/068 (PDF ) Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2010/067 (PDF ) A Pairing-Based DAA Scheme Further Reducing TPM Resources Ernie Brickell, Jiangtao Li
2010/066 (PDF ) Some Observations on TWIS Block Cipher Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li
2010/065 (PDF ) An Anonymous ID-based Encryption Revisited Zhengjun Cao
2010/064 (PDF ) New Advances on Privacy-Preserving Policy Reconciliation Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
2010/063 (PDF ) Differential Fault Analysis on SMS4 Using a Single Fault Ruilin Li, Bing Sun, Chao Li, Jianxiong You
2010/062 (PDF ) Differential Cryptanalysis of SMS4 Block Cipher Bozhan Su, Wenling Wu, Wentao Zhang
2010/061 (PDF ) Privacy-Preserving Matching Protocols for Attributes and Strings Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu, Jyh-Charn Liu
2010/060 (PDF ) Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding Yongge Wang
2010/059 (PDF ) A New Framework for RFID Privacy Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/058 (PDF ) Solinas primes of small weight for fixed sizes José de Jesús Angel Angel, Guillermo Morales-Luna
2010/057 (PDF ) Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256 Cagdas Calik, Meltem Sonmez Turan
2010/056 (PDF ) Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment Xin-jie ZHAO, Tao WANG
2010/055 (PDF ) Credential Authenticated Identification and Key Exchange Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
2010/054 (PDF ) An Improved Timing Attack with Error Detection on RSA-CRT Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
2010/053 (PDF ) Logical cryptoanalysis on the example of the cryptosystem DES A. D. Plotnikov
2010/051 (PDF ) A Principle for Cryptographic Protocols Beyond Security, Less Parameters Zhengjun Cao
2010/050 (PDF ) Authenticating Aggregate Range Queries over Multidimensional Dataset Jia XU, Ee-Chien CHANG
2010/049 (PDF ) On Symmetric Encryption and Point Obfuscation Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
2010/047 (PDF ) Lower Bounds for Straight Line Factoring Daniel R. L. Brown
2010/043 (PDF ) Differential and invertibility properties of BLAKE (full version) Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
2010/042 (PDF ) A modified eCK model with stronger security for tripartite authenticated key exchange Qingfeng Cheng, Chuangui Ma, Fushan Wei
2010/041 (PDF ) The Effects of the Omission of Last Round's MixColumns on AES Orr Dunkelman, Nathan Keller
2010/040 (PDF ) Batch Groth-Sahai Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
2010/039 (PDF ) On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields Xiwang Cao, Lei Hu
2010/038 (PDF ) Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions Arnaud Boscher, Helena Handschuh, Elena Trichina
2010/037 (PDF ) Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves Pierre-Alain Fouque, Mehdi Tibouchi
2010/035 (PDF ) Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption Goichiro Hanaoka, Kaoru Kurosawa
2010/034 (PDF ) On the order of the polynomial $x^p-x-a$ Xiwang Cao
2010/033 (PDF ) Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
2010/032 (PDF ) An Information Theoretic Perspective on the Differential Fault Analysis against AES Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta
2010/031 (PDF ) Class Invariants by the CRT Method Andreas Enge, Andrew V. Sutherland
2010/030 (PDF ) On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions Simon R. Blackburn, Douglas R. Stinson, Jalaj Upadhyay
2010/029 (PDF ) On Achieving the "Best of Both Worlds" in Secure Multiparty Computation Yuval Ishai, Jonathan Katz, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2010/028 (PDF ) A secure anonymous communication scheme in vehicular ad hoc networks from pairings Jue-Sam Chou, Yalin Chen
2010/027 (PDF ) A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings Yalin Chen, Jue-Sam Chou, Xian-Wu Hou
2010/026 (PDF ) Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth Xin-jie Zhao, Tao Wang
2010/025 (PDF ) New Methodologies for Differential-Linear Cryptanalysis and Its Extensions Jiqiang Lu
2010/024 (PDF ) Authentication schemes from actions on graphs, groups, or rings Dima Grigoriev, Vladimir Shpilrain
2010/023 (PDF ) Differential Fault Analysis on AES with 192 and 256-Bit Keys Junko Takahashi, Toshinori Fukunaga
2010/022 (PDF ) Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2010/021 (PDF ) A note on ``Improved Fast Correlation Attacks on Stream Ciphers" Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong
2010/020 (PDF ) Number of Jacobi quartic curves over finite fields Rongquan Feng, Hongfeng Wu
2010/019 (PDF ) Related-Key Boomerang and Rectangle Attacks Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller
2010/018 (PDF ) Scalability and Security Conflict for RFID Authentication Protocols Imran Erguler, Emin Anarim
2010/017 (PDF ) A new one-time signature scheme from syndrome decoding Paulo S. L. M. Barreto, Rafael Misoczki
2010/016 (PDF ) Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang
2010/015 (PDF ) Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures? Jorge Guajardo, Bart Mennink
2010/014 (PDF ) A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs Mridul Nandi
2010/013 (PDF ) A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, Adi Shamir
2010/012 (PDF ) Differential Cache Trace Attack Against CLEFIA Chester Rebeiro, Debdeep Mukhopadhyay
2010/010 (PDF ) Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta
2010/009 (PDF ) The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions Xuelian Li, Yupu Hu, Juntao Gao
2010/008 (PDF ) A DAA Scheme Requiring Less TPM Resources Liqun Chen
2010/007 (PDF ) Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2010/006 (PDF ) Factorization of a 768-bit RSA modulus Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen Lenstra, Emmanuel Thomé, Joppe Bos, Pierrick Gaudry, Alexander Kruppa, Peter Montgomery, Dag Arne Osvik, Herman te Riele, Andrey Timofeev, Paul Zimmermann
2010/005 (PDF ) Skew-Frobenius map on twisted Edwards curve Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng
2010/004 (PDF ) Halving on Binary Edwards Curves Qiping Lin, Fangguo Zhang
2010/003 (PDF ) Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
2010/002 (PDF ) Practical ID-based Encryption for Wireless Sensor Network Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng
2010/001 (PDF ) Transfinite Cryptography Jacques Patarin
[ Cryptology ePrint archive ]