Cryptology ePrint Archive: Listing for 2012
Regex
2012/733 (PDF ) Reusable Garbled Circuits and Succinct Functional Encryption Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
2012/732 (PDF ) Non-Interactive Key Exchange Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson
2012/731 (PDF ) Time-memory Trade-offs for Near-collisions Gaëtan Leurent
2012/730 (PDF ) Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes Dalin Chu, Johann Großschädl, Zhe Liu, Volker Müller, Yang Zhang
2012/729 (PDF ) On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky, Omer Paneth
2012/728 (PDF ) Defensive Leakage Camouflage E. Brier, Q. Fortier, R. Korkikian, K. W. Magld, D. Naccache, G. Ozari de Almeida, A. Pommellet, A. H. Ragab, J. Vuillemin
2012/727 (PDF ) On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled
2012/726 (PDF ) Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting Marc Obrador, Paz Morillo, Sandra Guasch
2012/725 (PDF ) Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol Qingfeng Cheng
2012/724 (PDF ) A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, Dale L. Sibborn
2012/723 (PDF ) Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov, Avraham Entelis
2012/722 (PDF ) Hardness Preserving Reductions via Cuckoo Hashing Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor
2012/721 (PDF ) On the (In)security of Fischlin's Paradigm Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao
2012/720 (PDF ) Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields Antoine Joux
2012/719 (PDF ) An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song, Zhihui Li
2012/718 (PDF ) Succinct Non-Interactive Arguments via Linear Interactive Proofs Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth
2012/717 (PDF ) Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing Jan Camenisch, Anna Lysyanskaya, Gregory Neven
2012/716 (PDF ) Attribute-Based Functional Encryption on Lattices Xavier Boyen
2012/715 (PDF ) New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$ Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng
2012/714 (PDF ) Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai
2012/713 (PDF ) Systematic Treatment of Remote Attestation Aurelien Francillon, Quan Nguyen, Kasper B. Rasmussen, Gene Tsudik
2012/712 (PDF ) On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis Farzaneh Abed, Eik List, Stefan Lucks
2012/711 (PDF ) Unprovable Security of 2-Message Zero Knowledge Kai-Min Chung, Edward Lui, Mohammad Mahmoody, Rafael Pass
2012/710 (PDF ) Non Observability in the Random Oracle Model Prabhanjan Ananth, Raghav Bhaskar
2012/709 (PDF ) Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers Qun-Xiong Zheng, Wen-Feng Qi
2012/708 (PDF ) Calling out Cheaters: Covert Security With Public Verifiability Gilad Asharov, Claudio Orlandi
2012/707 (PDF ) Cryptanalysis of WIDEA Gaëtan Leurent
2012/706 (PDF ) On the (In)security of the Fiat-Shamir Paradigm, Revisited Dana Dachman-Soled, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt
2012/705 (PDF ) Why "Fiat-Shamir for Proofs" Lacks a Proof Nir Bitansky, Sanjam Garg, Daniel Wichs
2012/704 (PDF ) On the Non-malleability of the Fiat-Shamir Transform Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi
2012/703 (PDF ) Profiled Model Based Power Simulator for Side Channel Evaluation Nicolas Debande, Maël Berthier, Yves Bocktaels, Thanh-Ha Le
2012/702 (PDF ) Cryptanalysis of RAPP, an RFID Authentication Protocol Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
2012/701 (PDF ) Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
2012/700 (PDF ) Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou
2012/699 (PDF ) How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damgård, Sunoo Park
2012/698 (PDF ) 5PM: Secure Pattern Matching Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
2012/697 (PDF ) Verifiable Elections That Scale for Free Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/696 (PDF ) Cryptanalysis of RAKAPOSHI Stream Cipher Lin Ding, Jie Guan
2012/695 (PDF ) Fully Automated Analysis of Padding-Based Encryption in the Computational Model Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella-Béguelin
2012/694 (PDF ) Cryptanalysis of matrix conjugation schemes A. D. Myasnikov, A. Ushakov
2012/693 (PDF ) Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters
2012/692 (PDF ) Generic Constructions of Integrated PKE and PEKS Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin
2012/691 (PDF ) Root Optimization of Polynomials in the Number Field Sieve Shi Bai, Richard P. Brent, Emmanuel Thomé
2012/690 (PDF ) The Weakness of Integrity Protection for LTE Teng Wu, Guang Gong
2012/689 (PDF ) Cryptography Using CAPTCHA Puzzles Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia
2012/688 (PDF ) A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem Jintai Ding, Xiang Xie, Xiaodong Lin
2012/687 (PDF ) The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Karyn Benson, Hovav Shacham, Brent Waters
2012/686 (PDF ) Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, Le Dong
2012/685 (PDF ) Square root computation over even extension fields Gora Adj, Francisco Rodríguez-Henríquez
2012/684 (PDF ) Generic Related-key Attacks for HMAC Thomas Peyrin, Yu Sasaki, Lei Wang
2012/682 (PDF ) Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud Jiawei Yuan, Shucheng Yu
2012/681 (PDF ) Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations Guang Gong, Mark Aagaard, Xinxin Fan
2012/680 (PDF ) Natural Generalizations of Threshold Secret Sharing Oriol Farras, Carles Padro, Chaoping Xing, An Yang
2012/679 (PDF ) Hiding the Input-Size in Secure Two-Party Computation Yehuda Lindell, Kobbi Nissim, Claudio Orlandi
2012/678 (PDF ) Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output Benedikt Gierlichs, Jorn-Marc Schmidt, Michael Tunstall
2012/677 (PDF ) What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher Jialin Huang, Xuejia Lai
2012/676 (PDF ) Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan Julia Borghoff
2012/675 (PDF ) Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA Yoshinori Aono
2012/674 (PDF ) Lecture Notes in Secret Sharing Carles Padro
2012/673 (PDF ) Robust Encryption, Revisited Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
2012/672 (PDF ) Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials Itai Dinur, Orr Dunkelman, Adi Shamir
2012/671 (PDF ) Fully Secure Unbounded Inner-Product and Attribute-Based Encryption Tatsuaki Okamoto, Katsuyuki Takashima
2012/670 (PDF ) Fast Cryptography in Genus 2 Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
2012/669 (PDF ) Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay Zhen Liu, Zhenfu Cao, Duncan S. Wong
2012/668 (PDF ) Construction of Differential Characteristics in ARX Designs -- Application to Skein Gaetan Leurent
2012/667 (PDF ) False Negative probabilities in Tardos codes Antonino Simone, Boris Skoric
2012/666 (PDF ) Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem Chenglian Liu, Ziwei Ye
2012/665 (PDF ) Uniform Compression Functions Can Fail to Preserve “Full” Entropy Daniel R. L. Brown
2012/664 (PDF ) PRE- Stronger Security Notion and Efficient Construction with New Property Jiang Zhang, Zhenfeng Zhang, Yu Chen
2012/663 (PDF ) Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? Alexander Rostovtsev
2012/662 (PDF ) Asynchronous Physical Unclonable Functions – AsyncPUF Julian Murphy
2012/661 (PDF ) Breaking Another Quasigroup-Based Cryptographic Scheme Markus Dichtl, Pascale Böffgen
2012/659 (PDF ) Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pierpzyk
2012/658 (PDF ) Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy
2012/657 (PDF ) Fixed Argument Pairing Inversion on Elliptic Curves Sungwook Kim, Jung Hee Cheon
2012/656 (PDF ) Security Evaluation of Rakaposhi Stream Cipher Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2012/655 (PDF ) Privacy Preserving Revocable Predicate Encryption Revisited Kwangsu Lee, Intae Kim, Seong Oun Hwang
2012/654 (PDF ) Refine the Concept of Public Key Encryption with Delegated Search Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma
2012/653 (PDF ) How powerful are the DDH hard groups? Periklis A. Papakonstantinou, Charles W. Rackoff, Yevgeniy Vahlis
2012/652 (PDF ) Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai
2012/650 (PDF ) Formal analysis of privacy in Direct Anonymous Attestation schemes Ben Smyth, Mark D. Ryan, Liqun Chen
2012/649 (PDF ) A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption Yannick Seurin, Joana Treger
2012/648 (PDF ) Search in Encrypted Data: Theoretical Models and Practical Applications Qiang Tang
2012/647 (PDF ) A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions Daniel Smith-Tone, Cristina Tone
2012/646 (PDF ) Galindo-Garcia Identity-Based Signature, Revisited Sanjit Chatterjee, Chethan Kamath, Vikas Kumar
2012/645 (PDF ) Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
2012/644 (PDF ) Impossibility Results for Indifferentiability with Resets Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel
2012/643 (PDF ) Protocols for Multiparty Coin Toss With Dishonest Majority Amos Beimel, Eran Omri, Ilan Orlov
2012/642 (PDF ) Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits Ivan Damgard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
2012/641 (PDF ) A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure Bin Wang
2012/640 (PDF ) Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function Gaoli Wang, Yanzhao Shen
2012/639 (PDF ) Coarse-grained integer - Smooth? Rough? Both! Daniel Loebenberger, Michael Nüsken
2012/638 (PDF ) Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme Cai-xue Zhou
2012/637 (PDF ) Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification Aviad Kipnis, Eliphaz Hibshoosh
2012/636 (PDF ) On the Complexity of the BKW Algorithm on LWE Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2012/634 (PDF ) Cryptanalysis of Double-Block-Length Hash Mode MJH Deukjo Hong, Daesung Kwon
2012/633 (PDF ) New Preimage Attack on MDC-4 Deukjo Hong, Daesung Kwon
2012/632 (PDF ) Pairings on Generalized Huff Curves Abdoul Aziz Ciss, Djiby Sow
2012/631 (PDF ) Message-Locked Encryption and Secure Deduplication Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
2012/630 (PDF ) On the Security of TLS Renegotiation Florian Giesen, Florian Kohlar, Douglas Stebila
2012/629 (PDF ) SCAPI: The Secure Computation Application Programming Interface Yael Ejgenberg, Moriya Farbstein, Meital Levy, Yehuda Lindell
2012/628 (PDF ) Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems Muhammad Yasir Malik
2012/627 (PDF ) Efficient Group Signatures in the Standard Model Laila El Aimani, Olivier Sanders
2012/626 (PDF ) Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis Xi Xiong, Haining Fan
2012/625 (PDF ) Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions Alexandra Boldyreva, Nathan Chenette, Adam O’Neill
2012/624 (PDF ) Order-Preserving Symmetric Encryption Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill
2012/623 (PDF ) Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes David McGrew
2012/622 (PDF ) Resolving the conflict between generality and plausibility in verified computation Srinath Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish
2012/621 (PDF ) Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong
2012/620 (PDF ) Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction Claus P. Schnorr, Taras Shevchenko
2012/619 (PDF ) Asynchronous Computational VSS with Reduced Communication Complexity Michael Backes, Amit Datta, Aniket Kate
2012/617 (PDF ) Security Analysis of an Open Car Immobilizer Protocol Stack Stefan Tillich, Marcin Wójcik
2012/616 (PDF ) Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions Nishanth Chandran, Sanjam Garg
2012/615 (PDF ) Polynomial time solutions of computational problems in noncommutative-algebraic cryptography Boaz Tsaban
2012/614 (PDF ) An arithmetic intersection formula for denominators of Igusa class polynomials Kristin Lauter, Bianca Viray
2012/613 (PDF ) Resource-Restricted Indifferentiability Grégory Demay, Peter Gaźi, Martin Hirt, Ueli Maurer
2012/612 (PDF ) Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff Byoung-Il Kim, Jin Hong
2012/611 (PDF ) A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay
2012/610 (PDF ) Candidate Multilinear Maps from Ideal Lattices Sanjam Garg, Craig Gentry, Shai Halevi
2012/609 (PDF ) A NEW APPROACH TO THE DISCRETE LOGARITHM PROBLEM WITH AUXILIARY INPUTS Taechan Kim, Jung Hee Cheon
2012/608 (PDF ) On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting Marina Blanton, Mehrdad Aliasgari
2012/607 (PDF ) Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem Charles Bouillaguet, Pierre-Alain Fouque, Amandine Véber
2012/606 (PDF ) Quantum-Secure Message Authentication Codes Dan Boneh, Mark Zhandry
2012/605 (PDF ) Secure Outsourced Attribute-Based Signatures Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
2012/604 (PDF ) Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay, Adriana Lopez-Alt, Hoeteck Wee, Daniel Wichs
2012/603 (PDF ) Collecting Data while Preserving Individuals' Privacy: A Case Study Alexis Bonnecaze, Robert Rolland
2012/602 (PDF ) A note on invariant linear transformations in multivariate public key cryptography Andreas Wiemers
2012/601 (PDF ) How to Garble RAM Programs Steve Lu, Rafail Ostrovsky
2012/600 (PDF ) The LED Block Cipher Jian Guo, Thomas Peyrin, Axel Poschmann, Matt Robshaw
2012/599 (PDF ) On the coefficients of the polynomial in the number field sieve Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
2012/598 (PDF ) Taking proof-based verified computation a few steps closer to practicality (extended version) Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Muqeet Ali, Andrew J. Blumberg, Michael Walfish
2012/597 (PDF ) A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj
2012/596 (PDF ) Evaluating User Privacy in Bitcoin Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun
2012/595 (PDF ) Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes Oriol Farràs, Carles Padró
2012/594 (PDF ) Improved Impossible Differential Attack on Reduced Version of Camellia-192/256 Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
2012/593 (PDF ) Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps Tomoko Yonemura, Taichi Isogai, Hirofumi Muratani, Yoshikazu Hanatani
2012/592 (PDF ) Attribute-Based Encryption for Circuits from Multilinear Maps Amit Sahai, Brent Waters
2012/591 (PDF ) Biclique Cryptanalysis Of PRESENT, LED, And KLEIN Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2012/588 (PDF ) Breaking Public Keys - How to Determine an Unknown RSA Public Modulus Hans-Joachim Knobloch
2012/587 (PDF ) Symbolic computation in block cipher with application to PRESENT Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
2012/586 (PDF ) SHADE: Secure HAmming DistancE computation from oblivious transfer Julien Bringer, Herve Chabanne, Alain Patey
2012/585 (PDF ) On Provably Secure Code-based Signature and Signcryption Scheme Preetha Mathew K, Sachin Vasant, C. Pandu Rangan
2012/584 (PDF ) Quantitative Analysis of the Full Bitcoin Transaction Graph Dorit Ron, Adi Shamir
2012/583 (PDF ) New Constructions and Proof Methods for Large Universe Attribute-Based Encryption Yannis Rouselakis, Brent Waters
2012/582 (PDF ) Using Randomizers for Batch Verification of ECDSA Signatures Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury
2012/581 (PDF ) On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang, Chun-guang Ma
2012/580 (PDF ) Cryptanalysis of the OKH Authenticated Encryption Scheme Peng Wang, Wenling Wu, Liting Zhang
2012/579 (PDF ) Defending Against the Unknown Enemy: Applying FlipIt to System Security Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos
2012/578 (PDF ) Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount? Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2012/577 (PDF ) A Framework for Unique Ring Signatures Matthew Franklin, Haibin Zhang
2012/576 (PDF ) Concurrent Signature without Random Oracles Xiao Tan, Qiong Huang, Duncan S. Wong
2012/575 (PDF ) Nanoelectronic Solutions for Hardware Security Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, Bryant Wysocki
2012/574 (PDF ) Quantum algorithm for the discrete logarithm problem for matrices over finite group rings A. D. Myasnikov, A. Ushakov
2012/573 (PDF ) Limits on the Usefulness of Random Oracles Iftach Haitner, Eran Omri, Hila Zarosim
2012/572 (PDF ) On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption Divya Gupta, Amit Sahai
2012/571 (PDF ) Improved side channel attack on the block cipher NOEKEON Changyong Peng, Chuangying zhu, Yuefei Zhu, Fei Kang
2012/570 (PDF ) Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock Hadi Soleimany, Kaisa Nyberg
2012/569 (PDF ) Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications San Ling, Khoa Nguyen, Damien Stehle, Huaxiong Wang
2012/568 (PDF ) On Transaction Pseudonyms with Implicit Attributes Stefan G. Weber
2012/567 (PDF ) Leakage Squeezing of Order Two Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi
2012/566 (PDF ) Quantization in Continuous-Source Zero Secrecy Leakage Helper Data Schemes Joep de Groot, Boris Škorić, Niels de Vreede, Jean-Paul Linnartz
2012/565 (PDF ) Packed Ciphertexts in LWE-based Homomorphic Encryption Zvika Brakerski, Craig Gentry, Shai Halevi
2012/564 (PDF ) Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
2012/563 (PDF ) Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions Kai-Min Chung, Huijia Lin, Rafael Pass
2012/562 (PDF ) Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency Kwangsu Lee, Dong Hoon Lee, Moti Yung
2012/561 (PDF ) An Attack on a Fully Homomorphic Encryption Scheme Hu Yupu, Wang Fenghe
2012/560 (PDF ) Computational Soundness of Coinductive Symbolic Security under Active Attacks Mohammad Hajiabadi, Bruce M. Kapron
2012/559 (PDF ) Plaintext Awareness in Identity-Based Key Encapsulation Mark Manulis, Bertram Poettering, Douglas Stebila
2012/558 (PDF ) Domain-Specific Pseudonymous Signatures for the German Identity Card Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2012/557 (PDF ) PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version) Stefan Katzenbeisser, Ünal Kocabaş, Vladimir Rožić, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann
2012/556 (PDF ) Resource-based Corruptions and the Combinatorics of Hidden Diversity Juan Garay, David Johnson, Aggelos Kiayias, Moti Yung
2012/555 (PDF ) New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai
2012/554 (PDF ) Security weakness in the Proof of Storage with Deduplication Youngjoo Shin, Junbeom Hur, Kwangjo Kim
2012/553 (PDF ) Bellcore attack in practice Andrey Sidorenko, Joachim van den Berg, Remko Foekema, Michiel Grashuis, Jaap de Vos
2012/552 (PDF ) Provably Secure Concurrent Error Detection Against Differential Fault Analysis Xiaofei Guo, Debdeep Mukhopadhyay, Ramesh Karri
2012/551 (PDF ) Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists Liangze Li, Hongfeng Wu, Fan Zhang
2012/550 (PDF ) Dynamic Proofs of Retrievability via Oblivious RAM David Cash, Alptekin Kupcu, Daniel Wichs
2012/549 (PDF ) Faster batch forgery identification Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk
2012/548 (PDF ) Efficient Modular NIZK Arguments from Shift and Product Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
2012/547 (PDF ) Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta
2012/546 (PDF ) Rotational cryptanalysis of round-reduced Keccak Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny
2012/545 (PDF ) A Versatile Multi-Input Multiplier over Finite Fields Haibo Yi, Shaohua Tang, Lingling Xu
2012/544 (PDF ) Differential Analysis of the LED Block Cipher Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici
2012/543 (PDF ) Enhanced Chosen-Ciphertext Security and Applications Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill
2012/542 (PDF ) Salus: A System for Server-Aided Secure Function Evaluation Seny Kamara, Payman Mohassel, Ben Riva
2012/540 (PDF ) A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms Ga Won Lee, Jin Hong
2012/539 (PDF ) Efficient Implementation of RSA Algorithm with MKE Sami A. Nagar, Dr. Saad Alshamma
2012/538 (PDF ) Private Top-k Aggregation Protocols Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
2012/537 (PDF ) Intercepting Tokens: The Empire Strikes Back in the Clone Wars Özgür Dagdelen, Marc Fischlin
2012/536 (PDF ) Secret Sharing and Secure Computing from Monotone Formulae Ivan Bjerre Damgård, Jonas Kölker, Peter Bro Miltersen
2012/535 (PDF ) A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
2012/534 (PDF ) A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes Maura B. Paterson, Douglas R. Stinson
2012/533 (PDF ) Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems Thijs Laarhoven, Joop van de Pol, Benne de Weger
2012/532 (PDF ) Pairing computation on Edwards curves with high-degree twists Liangze Li, Hongfeng Wu, Fan Zhang
2012/531 (PDF ) Generic Construction of Trace and Revoke Schemes Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selcuk
2012/530 (PDF ) Dynamic Searchable Symmetric Encryption Seny Kamara, Charalampos Papamanthou, Tom Roeder
2012/529 (PDF ) PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knežević, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçın
2012/528 (PDF ) An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption Graham Enos, Yuliang Zheng
2012/527 (PDF ) Cryptanalysis of a recent two factor authentication scheme Michael Scott
2012/526 (PDF ) Invertible Polynomial Representation for Private Set Operations Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee
2012/525 (PDF ) Computing endomorphism rings of abelian varieties of dimension two Gaetan Bisson
2012/524 (PDF ) Tahoe – The Least-Authority Filesystem Zooko Wilcox-O'Hearn, Brian Warner
2012/523 (PDF ) The Curious Case of Non-Interactive Commitments Mohammad Mahmoody, Rafael Pass
2012/522 (PDF ) False Positive probabilities in q-ary Tardos codes: comparison of attacks A. Simone, B. Skoric
2012/521 (PDF ) Functional Encryption with Bounded Collusions via Multi-Party Computation Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2012/520 (PDF ) Optimizing Segment Based Document Protection (Corrected Version) Miroslaw Kutylowski, Maciej Gebala
2012/519 (PDF ) Faster implementation of scalar multiplication on Koblitz curves Diego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez
2012/518 (PDF ) Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies Kwangsu Lee, Dong Hoon Lee, Moti Yung
2012/517 (PDF ) Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity Ashish Choudhury, Martin Hirt, Arpita Patra
2012/516 (PDF ) Garbling XOR Gates ``For Free'' in the Standard Model Benny Applebaum
2012/515 (PDF ) Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition Mihir Bellare, Adam O'Neill
2012/514 (PDF ) RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures Mihir Bellare, Kenneth G. Paterson, Susan Thomson
2012/513 (PDF ) Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes
2012/512 (PDF ) Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing Ivan Damgard, Sarah Zakarias
2012/511 (PDF ) Entangled Cloud Storage Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgard, Daniele Venturi
2012/510 (PDF ) Enabling 3-share Threshold Implementations for any 4-bit S-box Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann
2012/509 (PDF ) On 3-share Threshold Implementations for 4-bit S-boxes Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang
2012/508 (PDF ) On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs Yi Deng, Juan Garay, San Ling, Huaxiong Wang, Moti Yung
2012/507 (PDF ) Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices Josep Balasch, Bariş Ege, Thomas Eisenbarth, Benoit Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich
2012/506 (PDF ) Succinct Malleable NIZKs and an Application to Compact Shuffles Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/505 (PDF ) On pseudorandomization of information-theoretically secure schemes without hardness assumptions Koji Nuida
2012/504 (PDF ) Scalable Deniable Group Key Establishment Kashi Neupane, Rainer Steinwandt, Adriana Suarez Corona
2012/503 (PDF ) Hierarchical Identity-Based (Lossy) Trapdoor Functions Alex Escala, Javier Herranz, Benoit Libert, Carla Rafols
2012/502 (PDF ) Are We Compromised? Modelling Security Assessment Games Viet Pham, Carlos Cid
2012/501 (PDF ) Privacy Amplification with Asymptotically Optimal Entropy Loss Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin
2012/500 (PDF ) Constant Ciphertext Length in CP-ABE Nishant Doshi, Devesh Jinwala
2012/498 (PDF ) Almost Perfect Algebraic Immune Functions with Good Nonlinearity Meicheng Liu, Dongdai Lin
2012/497 (PDF ) The low-call diet: Authenticated Encryption for call counting HSM users Mike Bond, George French, Nigel P. Smart, Gaven J. Watson
2012/496 (PDF ) Updating attribute in CP-ABE: A New Approach Nishant Doshi, Devesh Jinwala
2012/495 (PDF ) "Metaproofs" (and their Cryptographic Applications) Alfredo De Santis, Moti Yung
2012/494 (PDF ) Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
2012/493 (PDF ) Efficient Query Integrity for Outsourced Dynamic Databases Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2012/492 (PDF ) A Method for Generating Full Cycles by a Composition of NLFSRs Elena Dubrova
2012/491 (PDF ) On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown Lidong Han, Wei Wei, Mingjie Liu
2012/490 (PDF ) Desynchronization Attack on RAPP Ultralightweight Authentication Protocol Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/489 (PDF ) Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/488 (PDF ) Designated Verifier Threshold Proxy Signature Scheme without Random Oracles Mohammad Beheshti-Atashgah, Majid Bayat, Mahmoud Gardeshi, Mohammad Reza Aref
2012/487 (PDF ) Short communication: An interpretation of the Linux entropy estimator Benjamin Pousse
2012/486 (PDF ) Computational Soundness without Protocol Restrictions Michael Backes, Ankit Malik, Dominique Unruh
2012/485 (PDF ) Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace Neil Hanley, HeeSeok Kim, Michael Tunstall
2012/484 (PDF ) Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui
2012/483 (PDF ) An Efficient Signcryption Scheme from q-Diffie-Hellman Problems Jayaprakash Kar
2012/482 (PDF ) Approaches for the Parallelization of Software Implementation of Integer Multiplication Vladislav Kovtun, Andrew Okhrimenko
2012/481 (PDF ) Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance John Steinberger
2012/480 (PDF ) Short Signatures From Diffie-Hellman: Realizing Short Public Key Jae Hong Seo
2012/479 (PDF ) Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles Mohammad Reza Reyhanitabar, Willy Susilo
2012/478 (PDF ) Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol Wang Qinglong, Xu Li
2012/477 (PDF ) Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean
2012/476 (PDF ) A j-lanes tree hashing mode and j-lanes SHA-256 Shay Gueron
2012/475 (PDF ) Efficient Signatures of Knowledge and DAA in the Standard Model David Bernhard, Georg Fuchsbauer, Essam Ghadafi
2012/474 (PDF ) On the Semantic Security of Functional Encryption Schemes Manuel Barbosa, Pooya Farshim
2012/473 (PDF ) Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited Zhengan Huang, Shengli Liu, Baodong Qin
2012/472 (PDF ) On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme – Amir Moradi, Oliver Mischke
2012/471 (PDF ) A Quasigroup Based Random Number Generator for Resource Constrained Environments Matthew Battey, Abhishek Parakh
2012/470 (PDF ) Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime Sorin Iftene
2012/469 (PDF ) Perfect Keyword Privacy in PEKS Systems Mototsugu Nishioka
2012/468 (PDF ) Functional Encryption: New Perspectives and Lower Bounds Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2012/467 (PDF ) New results on nonexistence of generalized bent functions Yupeng Jiang, Yingpu Deng
2012/466 (PDF ) Computational Entropy and Information Leakage Benjamin Fuller, Leonid Reyzin
2012/465 (PDF ) T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2012/464 (PDF ) Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming Carles Padro, Leonor Vazquez, An Yang
2012/463 (PDF ) Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting Xiang Xie, Rui Xue, Rui Zhang
2012/462 (PDF ) Perfect Ambiguous Optimistic Fair Exchange Yang Wang, Man Ho Au, Willy Susilo
2012/461 (PDF ) Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits Nir Bitansky, Alessandro Chiesa
2012/460 (PDF ) Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes Yohei Watanabe, Takenobu Seito, Junji Shikata
2012/459 (PDF ) Barriers in Cryptography with Weak, Correlated and Leaky Sources Daniel Wichs
2012/458 (PDF ) Computing small discrete logarithms faster Daniel J. Bernstein, Tanja Lange
2012/457 (PDF ) Hush Functions Extended to Any Size Input versus Any Size Output Gideon Samid
2012/456 (PDF ) Crowd-Blending Privacy Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass
2012/455 (PDF ) Must you know the code of f to securely compute f? Mike Rosulek
2012/454 (PDF ) A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh
2012/453 (PDF ) New Leakage Resilient CCA-Secure Public Key Encryption Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2012/452 (PDF ) EPiC: Efficient Privacy-Preserving Counting for MapReduce Erik-Oliver Blass, Guevara Noubir, Triet D. Vo-Huu
2012/451 (PDF ) Stam's Conjecture and Threshold Phenomena in Collision Resistance John Steinberger, Xiaoming Sun, Zhe Yang
2012/450 (PDF ) Tweakable Blockciphers with Beyond Birthday-Bound Security Will Landecker, Thomas Shrimpton, R. Seth Terashima
2012/449 (PDF ) Long Term Confidentiality: a Survey Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alex Wiesmaier
2012/448 (PDF ) On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
2012/447 (PDF ) Multi-receiver Homomorphic Authentication Codes for Network Coding Zhaohui Tang, Hoon Wei Lim
2012/446 (PDF ) Differential Fault Analysis of AES: Towards Reaching its Limits Sk Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
2012/445 (PDF ) A note on ‘An efficient certificateless aggregate signature with constant pairing computations’ Debiao He, Jianhua Chen, Miaomiao Tian
2012/444 (PDF ) Factorization of a 1061-bit number by the Special Number Field Sieve Greg Childers
2012/443 (PDF ) Improved CRT Algorithm for Class Polynomials in Genus 2 Kristin Lauter, Damien Robert
2012/442 (PDF ) Group Signatures with Almost-for-free Revocation Benoit Libert, Thomas Peters, Moti Yung
2012/441 (PDF ) Adaptively Secure Multi-Party Computation with Dishonest Majority Sanjam Garg, Amit Sahai
2012/440 (PDF ) New Preimage Attacks Against Reduced SHA-1 Simon Knellwolf, Dmitry Khovratovich
2012/439 (PDF ) Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang, Ping Wang, Chun-guang Ma, Zhong Chen
2012/438 (PDF ) Breaking and Repairing GCM Security Proofs Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
2012/437 (PDF ) Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption Amit Sahai, Hakan Seyalioglu, Brent Waters
2012/436 (PDF ) Secure Database Commitments and Universal Arguments of Quasi Knowledge Melissa Chase, Ivan Visconti
2012/435 (PDF ) Differential Privacy with Imperfect Randomness Yevgeniy Dodis, Adriana Lopez-Alt, Ilya Mironov, Salil Vadhan
2012/434 (PDF ) Algebraic (Trapdoor) One Way Functions and their Applications Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis
2012/433 (PDF ) Impossibility Results for Static Input Secure Computation Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti
2012/432 (PDF ) TorScan: Tracing Long-lived Connections and Differential Scanning Attacks Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2012/431 (PDF ) On the Security of Dynamic Group Signatures: Preventing Signature Hijacking Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
2012/430 (PDF ) A formal study of two physical countermeasures against side channel attacks Sébastien Briais, Sylvain Guilley, Jean-Luc Danger
2012/429 (PDF ) Simple construction of epsilon-biased distribution Long Hoang Nguyen, Andrew William Roscoe
2012/428 (PDF ) Rational authentication protocols and their use in financial transactions Long Hoang Nguyen
2012/427 (PDF ) Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian Robert Drylo
2012/426 (PDF ) A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes Ed Kendall, Michelle Kendall, Wilfrid S. Kendall
2012/425 (PDF ) The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures Gautham Sekar
2012/424 (PDF ) Scalable Group Signatures with Revocation Benoit Libert, Thomas Peters, Moti Yung
2012/423 (PDF ) Programmable encryption and key-dependent messages Dominique Unruh
2012/422 (PDF ) Biclique Cryptanalysis of TWINE Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
2012/421 (PDF ) Security margin evaluation of SHA-3 contest finalists through SAT-based attacks Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny
2012/420 (PDF ) A Publicly-Veriable Mix-net with Everlasting Privacy Towards Observers Denise Demirel, Jeroen van de Graaf
2012/418 (PDF ) Weaknesses of an Improvement Authentication Scheme using Rafael Martínez-Peláez, Francisco Rico-Novella
2012/417 (PDF ) Efficient Padding Oracle Attacks on Cryptographic Hardware Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay
2012/416 (PDF ) Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal Cas Cremers, Michèle Feltz
2012/415 (PDF ) Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion Jialin Huang, Xuejia Lai
2012/414 (PDF ) Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials Yin Li, Gong-liang Chen, Xiao-ning Xie
2012/413 (PDF ) Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation Mukund Kalyanaraman, Michael Orshansky
2012/412 (PDF ) Probabilistic Infinite Secret Sharing Laszlo Csirmaz
2012/411 (PDF ) Infinite Secret Sharing -- Examples Alexander Dibert, Laszlo Csirmaz
2012/410 (PDF ) Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme Qingfeng Cheng
2012/409 (PDF ) MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes Rafael Misoczki, Jean-Pierre Tillich, Nicolas Sendrier, Paulo S. L. M. Barreto
2012/408 (PDF ) Efficient Implementation of Bilinear Pairings on ARM Processors Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao
2012/407 (PDF ) Cross-Unlinkable Hierarchical Group Signatures Julien Bringer, Herve Chabanne, Alain Patey
2012/406 (PDF ) Comments on four multi-server authentication protocols using smart card Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang
2012/405 (PDF ) Secure Computation on Floating Point Numbers Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele
2012/404 (PDF ) Secret Sharing Schemes for Very Dense Graphs Amos Beimel, Oriol Farràs, Yuval Mintz
2012/403 (PDF ) Fully Private Revocable Predicate Encryption Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
2012/402 (PDF ) Forward-Secure Hierarchical Predicate Encryption Juan Manuel Gonzälez Nieto, Mark Manulis, Dongdong Sun
2012/401 (PDF ) An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers Martin Albrecht, Gregor Leander
2012/400 (PDF ) An Algebraic Fault Attack on the LED Block Cipher Philipp Jovanovic, Martin Kreuzer, Ilia Polian
2012/399 (PDF ) Differential Fault Analysis on Block Cipher Piccolo Kitae Jeong
2012/398 (PDF ) PIRMAP: Efficient Private Information Retrieval for MapReduce Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2012/397 (PDF ) Cross-Domain Password-Based Authenticated Key Exchange Revisited Liqun Chen, Hoon Wei Lim, Guomin Yang
2012/396 (PDF ) On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$ Brajesh Kumar Singh
2012/395 (PDF ) A New Efficient Authenticated ID-Based Group Key Agreement Protocol Morteza Arifi, Mahmoud Gardeshi, Mohammad Sabzinejad Farash
2012/394 (PDF ) An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari
2012/393 (PDF ) A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Majid Bayat
2012/392 (PDF ) ID Based Signcryption Scheme in Standard Model S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
2012/391 (PDF ) Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy Shaohui Wang, Sujuan Liu, Danwei Chen
2012/390 (PDF ) Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three Chol-Sun Sin
2012/389 (PDF ) Wide Strong Private RFID Identification based on Zero-Knowledge Roel Peeters, Jens Hermans
2012/388 (PDF ) The Arithmetic Codex Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2012/387 (PDF ) New cryptographic constructions using generalized learning with errors problem Jintai ding
2012/386 (PDF ) Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards Rafael Martínez-Peláez, Francisco Rico-Novella
2012/385 (PDF ) CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen
2012/384 (PDF ) Functional Encryption for Regular Languages Brent Waters
2012/383 (PDF ) Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited Junji Shikata
2012/382 (PDF ) On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification Afonso Arriaga, Manuel Barbosa, Pooya Farshim
2012/380 (PDF ) Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices Ioana Boureanu, Serge Vaudenay
2012/379 (PDF ) All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments Eiichiro Fujisaki
2012/378 (PDF ) Multiparty Proximity Testing with Dishonest Majority from Equality Testing Ran Gelles, Rafail Ostrovsky, Kina Winoto
2012/377 (PDF ) Distributed Key Generation in the Wild Aniket Kate, Yizhou Huang, Ian Goldberg
2012/376 (PDF ) Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem Colleen M. Swanson, Douglas R. Stinson
2012/375 (PDF ) How to Store some Secrets Reto E. Koenig, Rolf Haenni
2012/374 (PDF ) Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary, Felix Grobert, Joachim Metz
2012/373 (PDF ) Optimal Lower Bound for Differentially Private Multi-Party Aggregation T-H. Hubert Chan, Elaine Shi, Dawn Song
2012/371 (PDF ) Simultaneous hashing of multiple messages Shay Gueron, Vlad Krasnov
2012/370 (PDF ) Improved Broadcast Encryption Scheme with Constant-Size Ciphertext Renaud Dubois, Aurore Guillevic, Marine Sengelin Le Breton
2012/369 (PDF ) Factorisation of RSA-704 with CADO-NFS Shi Bai, Emmanuel Thomé, Paul Zimmermann
2012/368 (PDF ) Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski, Rabia Shahid, Malik Umar Sharif
2012/367 (PDF ) On Continual Leakage of Discrete Log Representations Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
2012/366 (PDF ) Securing Circuits Against Constant-Rate Tampering Dana Dachman-Soled, Yael Tauman Kalai
2012/365 (PDF ) Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
2012/364 (PDF ) Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions Ivan Damgard, Adriana Lopez-Alt
2012/363 (PDF ) A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions Anne Canteaut, Thomas Fuhr, María Naya-Plasencia, Pascal Paillier, Jean-René Reinhard, Marion Videau
2012/362 (PDF ) Achieving Constant Round Leakage-Resilient Zero-Knowledge Omkant Pandey
2012/361 (PDF ) Quantum Key Distribution in the Classical Authenticated Key Exchange Framework Michele Mosca, Douglas Stebila, Berkant Ustaoglu
2012/360 (PDF ) Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics Céline Blondeau, Benoît Gérard, Kaisa Nyberg
2012/359 (PDF ) Another look at non-uniformity Neal Koblitz, Alfred Menezes
2012/358 (PDF ) PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version -- Gilles Piret, Thomas Roche, Claude Carlet
2012/357 (PDF ) Publicly Verifiable Ciphertexts Juan Manuel Gonzälez Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila
2012/356 (PDF ) Fully Anonymous Attribute Tokens from Lattices Jan Camenisch, Gregory Neven, Markus Rückert
2012/355 (PDF ) Never trust a bunny Daniel J. Bernstein, Tanja Lange
2012/354 (PDF ) Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output Arno Mittelbach
2012/353 (PDF ) On Reconfigurable Fabrics and Generic Side-Channel Countermeasures Robert Beat, Philipp Grabher, Dan Page, Stefan Tillich, Marcin Wójcik
2012/352 (PDF ) On Hashing Graphs Ashish Kundu, Elisa Bertino
2012/351 (PDF ) SipHash: a fast short-input PRF Jean-Philippe Aumasson, Daniel J. Bernstein
2012/350 (PDF ) A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption Liangliang Xiao, I-Ling Yen
2012/349 (PDF ) A Differential Fault Attack on Grain-128a using MACs Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
2012/348 (PDF ) Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven
2012/347 (PDF ) Algebraic Differential Fault Attacks on LED using a Single Fault Injection Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji
2012/346 (PDF ) Edwards model of elliptic curves defined over any fields Oumar DIAO, Emmanuel FOUOTSA
2012/345 (PDF ) Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$ Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi
2012/344 (PDF ) Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code Masao KASAHARA
2012/343 (PDF ) High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions Tamas Gyorfi, Octavian Cret, Guillaume Hanrot, Nicolas Brisebarre
2012/342 (PDF ) Enhancing Location Privacy for Electric Vehicles (at the right time) Joseph Liu, Man Ho Au, Willy Susilo, Jianying Zhou
2012/341 (PDF ) From Selective to Full Security: Semi-Generic Transformations in the Standard Model Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
2012/340 (PDF ) Deciding Epistemic and Strategic Properties of Cryptographic Protocols Henning Schnoor
2012/339 (PDF ) Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash Adi Shamir, Eldad Zinger
2012/338 (PDF ) Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong, Mingsheng Wang
2012/337 (PDF ) Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme Sanjay Bhattacherjee, Palash Sarkar
2012/336 (PDF ) RSA modulus generation in the two-party case Gerald Gavin
2012/335 (PDF ) Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Yu Lou, Huiting Han, Chunming Tang, Maozhi Xu
2012/334 (PDF ) On the Traceability of Tags in SUAP RFID Authentication Protocols Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2012/333 (PDF ) On the Feasibility of Extending Oblivious Transfer Yehuda Lindell, Hila Zarosim
2012/332 (PDF ) A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/331 (PDF ) Homomorphic Authentication Codes for Network Coding Zhaohui Tang
2012/330 (PDF ) A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences Xu ZiJie, Xu Ke
2012/329 (PDF ) An Analysis of ZVP-Attack on ECC Cryptosystems Claude Crépeau, Raza Ali Kazmi
2012/328 (PDF ) The Multivariate Probabilistic Encryption Scheme MQQ-ENC Danilo Gligoroski, Simona Samardjiska
2012/327 (PDF ) Security Analysis of RAPP An RFID Authentication Protocol based on Permutation Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
2012/326 (PDF ) New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Allison Lewko, Brent Waters
2012/325 (PDF ) A note on generalized bent criteria for Boolean functions Sugata Gangopadhyay, Enes Pasalic, Pantelimon Stanica
2012/324 (PDF ) 3D Hardware Canaries Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf
2012/323 (PDF ) ML Confidential: Machine Learning on Encrypted Data Thore Graepel, Kristin Lauter, Michael Naehrig
2012/322 (PDF ) Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak
2012/321 (PDF ) DECT Security Analysis Erik Tews
2012/320 (PDF ) The Discrete Logarithm Problem in non-representable rings Matan Banin, Boaz Tsaban
2012/319 (PDF ) Bounds on the Threshold Gap in Secret Sharing and its Applications Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2012/318 (PDF ) Non-uniform cracks in the concrete: the power of free precomputation Daniel J. Bernstein, Tanja Lange
2012/317 (PDF ) A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen, Daniel Engels
2012/316 (PDF ) Computationally Complete Symbolic Attacker in Action Gergei Bana, Pedro Adão, Hideki Sakurada
2012/315 (PDF ) Using Variance to Analyze Visual Cryptography Schemes Teng Guo, Feng Liu, ChuanKun Wu, YoungChang Hou
2012/314 (PDF ) Generation of Nonlinear Feedback Shift Registers with special-purpose hardware Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zablocki
2012/312 (PDF ) Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Debiao He
2012/311 (PDF ) Tightly Secure Signatures and Public-Key Encryption Dennis Hofheinz, Tibor Jager
2012/310 (PDF ) A mathematical problem for security analysis of hash functions and pseudorandom generators Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata
2012/309 (PDF ) Fast and compact elliptic-curve cryptography Mike Hamburg
2012/308 (PDF ) Verified Security of Redundancy-Free Encryption from Rabin and RSA Gilles Barthe, David Pointcheval, Santiago Zanella-Béguelin
2012/307 (PDF ) Multi-Channel Broadcast Encryption Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh
2012/306 (PDF ) Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp
2012/305 (PDF ) Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography Duong Hieu Phan, Viet Cuong Trinh
2012/304 (PDF ) Actively Secure Two-Party Evaluation of any Quantum Operation Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
2012/303 (PDF ) On The Distribution of Linear Biases: Three Instructive Examples Mohamed Ahmed Abdelraheem, Martin Aagren, Peter Beelen, Gregor Leander
2012/302 (PDF ) On instance separation in the UC-framework István Vajda
2012/301 (PDF ) A Public Shuffle without Private Permutations Myungsun Kim, Jinsu Kim, Jung Hee Cheon
2012/300 (PDF ) Threshold Implementations of all 3x3 and 4x4 S-boxes B. Bilgin, S. Nikova, V. Nikov, V. Rijmen, G. Stütz
2012/299 (PDF ) Differential Power Analysis on ZUC Algorithm TANG Ming, CHENG PingPan, QIU ZhenLong
2012/298 (PDF ) Anonymous Credentials Light Foteini Baldimtsi, Anna Lysyanskaya
2012/297 (PDF ) Tamper and Leakage Resilience in the Split-State Model Feng-Hao Liu, Anna Lysyanskaya
2012/296 (PDF ) In the blink of an eye: There goes your AES key Sergei Skorobogatov, Christopher Woods
2012/295 (PDF ) Broadcast-enhanced key predistribution schemes Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson
2012/294 (PDF ) Two grumpy giants and a baby Daniel J. Bernstein, Tanja Lange
2012/293 (PDF ) New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors Wei Wei, Chengliang Tian, Xiaoyun Wang
2012/292 (PDF ) An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle Jon Passki, Tom Ritter
2012/291 (PDF ) Efficient Dynamic Provable Possession of Remote Data via Update Trees Yihua Zhang, Marina Blanton
2012/290 (PDF ) Fully Homomorphic Message Authenticators Rosario Gennaro, Daniel Wichs
2012/289 (PDF ) Ring Group Signatures Liqun Chen
2012/288 (PDF ) Fair Exchange of Short Signatures without Trusted Third Party Philippe Camacho
2012/287 (PDF ) Computationally-Fair Group and Identity-Based Key-Exchange Andrew C. Yao, Yunlei Zhao
2012/286 (PDF ) Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis Sk Subidh Ali, Debdeep Mukhopadhyay
2012/285 (PDF ) Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2012/284 (PDF ) Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2012/283 (PDF ) Some properties of q-ary functions based on spectral analysis Deep Singh, Maheshanand Bhaintwal
2012/282 (PDF ) ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY Md. Iftekhar Salam, Hoon-Jae Lee
2012/281 (PDF ) Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications Dario Fiore, Rosario Gennaro
2012/280 (PDF ) Improved ``Partial Sums"-based Square Attack on AES Michael Tunstall
2012/279 (PDF ) Concurrent Zero Knowledge in the Bounded Player Model Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti
2012/278 (PDF ) Improved Indifferentiability Security Bound for the JH Mode Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
2012/277 (PDF ) Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil Rkia Aouinatou, Mostafa Belkasmi
2012/276 (PDF ) Official Arbitration with Secure Cloud Storage Application Alptekin Küpçü
2012/275 (PDF ) Implementing BLAKE with AVX, AVX2, and XOP Samuel Neves, Jean-Philippe Aumasson
2012/274 (PDF ) Boomerang and Slide-Rotational Analysis of the SM3 Hash Function Aleksandar Kircanski, Amr M. Youssef
2012/273 (PDF ) Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
2012/272 (PDF ) Passive Corruption in Statistical Multi-Party Computation Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
2012/270 (PDF ) Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings Enrico Thomae
2012/269 (PDF ) Quantifying Side-Channel Information Leakage from Web Applications Luke Mather, Elisabeth Oswald
2012/268 (PDF ) On the CCA2 Security of McEliece in the Standard Model Edoardo Persichetti
2012/267 (PDF ) Self-pairings on Hyperelliptic Curves Steven D. Galbraith, Chang-An Zhao
2012/266 (PDF ) Compilation Techniques for Efficient Encrypted Computation Christopher Fletcher, Marten van Dijk, Srinivas Devadas
2012/265 (PDF ) Foundations of Garbled Circuits Mihir Bellare, Viet Tung Hoang, Phillip Rogaway
2012/264 (PDF ) On the (In)Security of IDEA in Various Hashing Modes Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang
2012/263 (PDF ) One-way Functions from Chebyshev Polynomials Kai-Yuen Cheong
2012/262 (PDF ) Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol I. Damgard, M. Keller, E. Larraia, C. Miles, N. P. Smart
2012/261 (PDF ) Dual Form Signatures: An Approach for Proving Security from Static Assumptions Michael Gerbush, Allison Lewko, Adam O'Neill, Brent Waters
2012/260 (PDF ) Transposition of AES Key Schedule Jialin Huang, Xuejia Lai
2012/259 (PDF ) A Novel Strong Designated Verifier Signature Scheme without Random Oracles Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/258 (PDF ) Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols José Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin
2012/256 (PDF ) The myth of generic DPA...and the magic of learning Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert
2012/255 (PDF ) How to Garble Arithmetic Circuits Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
2012/254 (PDF ) FastPRP: Fast Pseudo-Random Permutations for Small Domains Emil Stefanov, Elaine Shi
2012/253 (PDF ) Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Zhian Zhu
2012/252 (PDF ) Fair Private Set Intersection with a Semi-trusted Arbiter Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
2012/251 (PDF ) The Linux Pseudorandom Number Generator Revisited Patrick Lacharme, Andrea Röck, Vincent Strubel, Marion Videau
2012/250 (PDF ) New Identity Based Encryption And Its Proxy Re-encryption Xu An Wang, Xiaoyuan Yang
2012/249 (PDF ) Binary and q-ary Tardos codes, revisited Boris Skoric, Jan-Jaap Oosterwijk
2012/248 (PDF ) Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
2012/247 (PDF ) On Efficient Pairings on Elliptic Curves over Extension Fields Xusheng Zhang, Kunpeng Wang, Dongdai Lin
2012/246 (PDF ) A Secret Sharing Scheme Based on Group Presentations and the Word Problem Maggie Habeeb, Delaram Kahrobaei, Vladimir Shpilrain
2012/245 (PDF ) On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes Qiang Li, Xiangxue Li, Dong Zheng, Zheng Huang, Kefei Chen
2012/244 (PDF ) Cryptography from tensor problems Leonard J. Schulman
2012/243 (PDF ) COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES MYUNGSUN KIM, JIHYE KIM, JUNG HEE CHEON
2012/242 (PDF ) Less is More: Relaxed yet Composable Security Notions for Key Exchange C. Brzuska, M. Fischlin, N. P. Smart, B. Warinschi, S. Williams
2012/241 (PDF ) Key distribution system and attribute-based encryption Masahiro Yagisawa
2012/240 (PDF ) Field Switching in BGV-Style Homomorphic Encryption Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
2012/239 (PDF ) Zero-Knowledge for Multivariate Polynomials Valerie Nachef, Jacques Patarin, Emmanuel Volte
2012/238 (PDF ) The Boomerang Attacks on the Round-Reduced Skein-512 Hongbo Yu, Jiazhe Chen, XIaoyun Wang
2012/237 (PDF ) In the point of view security, An efficient scheme in IBE with random oracle Rkia Aouinatou, Mostafa Belkasmi
2012/236 (PDF ) On Necessary and Sufficient Conditions for Private Ballot Submission D. Bernhard, O. Pereira, B. Warinschi
2012/235 (PDF ) Ring-LWE in Polynomial Rings Leo Ducas, Alain Durmus
2012/234 (PDF ) SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
2012/233 (PDF ) A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis Qi Chai, Guang Gong
2012/232 (PDF ) Implementing Pairings at the 192-bit Security Level Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez
2012/231 (PDF ) A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin, Pengwei Wang
2012/230 (PDF ) On Ideal Lattices and Learning with Errors Over Rings Vadim Lyubashevsky, Chris Peikert, Oded Regev
2012/229 (PDF ) Languages with Efficient Zero-Knowledge PCP's are in SZK Mohammad Mahmoody, David Xiao
2012/228 (PDF ) Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results Marten van Dijk, Ulrich Rührmair
2012/226 (PDF ) ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn, C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya
2012/225 (PDF ) When Homomorphism Becomes a Liability Zvika Brakerski
2012/224 (PDF ) Shorter IBE and Signatures via Asymmetric Pairings Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoeteck Wee
2012/223 (PDF ) A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes Enrico Thomae
2012/222 (PDF ) A secret sharing scheme of prime numbers based on hardness of factorization Kai-Yuen Cheong
2012/221 (PDF ) Almost-Everywhere Secure Computation with Edge Corruptions Nishanth Chandran, Juan Garay, Rafail Ostrovsky
2012/220 (PDF ) Hedged Public-key Encryption: How to Protect against Bad Randomness Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek
2012/219 (PDF ) Private Fingerprint Matching Siamak F. Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona
2012/218 (PDF ) Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams T-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu
2012/217 (PDF ) Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2012/216 (PDF ) Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti, Mario Strefler
2012/215 (PDF ) Quadratic Span Programs and Succinct NIZKs without PCPs Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova
2012/214 (PDF ) Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version) Shengbao Wu, Mingsheng Wang
2012/213 (PDF ) Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2012/212 (PDF ) Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, Dongdai Lin
2012/211 (PDF ) Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama
2012/210 (PDF ) On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks Yusong Du, Fangguo Zhang
2012/209 (PDF ) Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications Donghoon Chang, Moti Yung
2012/208 (PDF ) A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER Jay Shah, Ayan Mahalanobis
2012/206 (PDF ) (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou
2012/205 (PDF ) Information-flow control for programming on encrypted data J. C. Mitchell, R. Sharma, D. Stefan, J. Zimmerman
2012/204 (PDF ) Unique Group Signatures Matthew Franklin, Haibin Zhang
2012/203 (PDF ) Robust biometric-based user authentication scheme for wireless sensor networks Debiao He
2012/202 (PDF ) Secure Similarity Coefficients Computation with Malicious Adversaries Bo Zhang, Fangguo Zhang
2012/201 (PDF ) Comment an Anonymous Multi-receiver Identity-based Encryption Scheme J. H. Zhang, Y. B. Cui
2012/200 (PDF ) Aggregate Signcryption Alexander W. Dent
2012/199 (PDF ) Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm Jean-Charles Faugère, Pierrick Gaudry, Louise Huot, Guénaël Renault
2012/198 (PDF ) Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures Jae Hong Seo, Jung Hee Cheon
2012/197 (PDF ) On The Security of One-Witness Blind Signature Schemes Foteini Baldimtsi, Anna Lysyanskaya
2012/196 (PDF ) Multi-Instance Security and its Application to Password-Based Cryptography Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
2012/195 (PDF ) The BlueJay Ultra-Lightweight Hybrid Cryptosystem Markku-Juhani O. Saarinen
2012/194 (PDF ) A Multivariate based Threshold Ring Signature Scheme Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2012/193 (PDF ) An Efficient Homomorphic Encryption Protocol for Multi-User Systems Liangliang Xiao, Osbert Bastani, I-Ling Yen
2012/192 (PDF ) Extending Order Preserving Encryption for Multi-User Systems Liangliang Xiao, I-Ling Yen, Dung T. Huynh
2012/191 (PDF ) Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes Liangliang Xiao, I-Ling Yen
2012/190 (PDF ) On the Security of an Improved Password Authentication Scheme Based on ECC Ding Wang, Chun-guang Ma
2012/189 (PDF ) Universally Composable Key-Management Steve Kremer, Robert Künnemann, Graham Steel
2012/188 (PDF ) Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification Xin Li
2012/187 (PDF ) SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version) Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Sandeep Tamrakar, Christian Wachsmann
2012/186 (PDF ) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh
2012/185 (PDF ) Replay attacks that violate ballot secrecy in Helios Ben Smyth
2012/184 (PDF ) Asymptotic fingerprinting capacity in the Combined Digit Model Dion Boesten, Boris Skoric
2012/183 (PDF ) Differentially Private Smart Metering with Battery Recharging Michael Backes, Sebastian Meiser
2012/182 (PDF ) How to Construct Quantum Random Functions Mark Zhandry
2012/181 (PDF ) A Modular Framework for Multi-Factor Authentication and Key Exchange Nils Fleischhacker, Mark Manulis, Amir Azodi
2012/180 (PDF ) Yet Another SHA-3 Round 3 FPGA Results Paper Brian Baldwin, William P. Marnane
2012/179 (PDF ) Billion-Gate Secure Computation with Malicious Adversaries Benjamin Kreuter, abhi shelat, Chih-hao Shen
2012/178 (PDF ) Eperio: Mitigating Technical Complexity in Cryptographic Election Verification Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams
2012/177 (PDF ) Everlasting Multi-Party Computation Dominique Unruh
2012/176 (PDF ) Improvements of Algebraic Attacks Based on Structured Gaussian Elimination Satrajit Ghosh, Abhijit Das
2012/175 (PDF ) Optimal First-Order Masking with Linear and Non-Linear Bijections Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY, Jean-Luc DANGER
2012/174 (PDF ) Zero Knowledge with Rubik's Cubes and Non-Abelian Groups Emmanuel VOLTE, Jacques PATARIN, Valérie NACHEF
2012/173 (PDF ) Automatically Verified Mechanized Proof of One-Encryption Key Exchange Bruno Blanchet
2012/172 (PDF ) Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2012/171 (PDF ) Quantum Money from Hidden Subspaces Scott Aaronson, Paul Christiano
2012/170 (PDF ) Approaches for the performance increasing of software implementation of integer multiplication in prime fields Vladislav Kovtun, Andrew Okhrimenko
2012/169 (PDF ) Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers Xiaopei Guo, Kejian Xu, Tongsen Sun, Xiubin Fan
2012/168 (PDF ) A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes Valérie Gauthier, Ayoub Otmani, Jean-Pierre Tillich
2012/167 (PDF ) Pairing-based methods for genus 2 jacobians with maximal endomorphism ring Sorina Ionica
2012/166 (PDF ) A List of Maximum Period NLFSRs Elena Dubrova
2012/165 (PDF ) Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy Cristina Onete
2012/164 (PDF ) On Secure Two-party Integer Division Morten Dahl, Chao Ning, Tomas Toft
2012/163 (PDF ) Differential propagation analysis of Keccak Joan Daemen, Gilles Van Assche
2012/162 (PDF ) Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network Jayaprakash Kar
2012/161 (PDF ) New Constructions of Low Correlation Sequences with High Linear Complexity Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
2012/159 (PDF ) Hybrid Encryption in the Multi-User Setting G. M. Zaverucha
2012/158 (PDF ) Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading Peter Gazi, Stefano Tessaro
2012/157 (PDF ) Attack on Fully Homomorphic Encryption over the Integers Gu Chunsheng
2012/156 (PDF ) Fast Embedded Software Hashing Dag Arne Osvik
2012/155 (PDF ) Toward Practical Group Encryption Laila El Aimani, Marc Joye
2012/153 (PDF ) A Framework for the Cryptographic Verification of Java-like Programs Ralf Kuesters, Tomasz Truderung, Juergen Graf
2012/152 (PDF ) On security of a Certificateless Aggregate Signature Scheme Limin Shen, Yinxia Sun
2012/151 (PDF ) On Boolean Ideals and Varieties with Application to Algebraic Attacks Alexander Rostovtsev, Alexey Mizyukin
2012/150 (PDF ) Circular chosen-ciphertext security with compact ciphertexts Dennis Hofheinz
2012/149 (PDF ) Attacking Scrambled Burrows-Wheeler Transform Martin Stanek
2012/148 (PDF ) Replacing Username/Password with Software-Only Two-Factor Authentication Michael Scott
2012/147 (PDF ) On Security Arguments of the Second Round SHA-3 Candidates Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger
2012/146 (PDF ) On Polynomial Systems Arising from a Weil Descent Christophe Petit, Jean-Jacques Quisquater
2012/145 (PDF ) Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita
2012/144 (PDF ) Somewhat Practical Fully Homomorphic Encryption Junfeng Fan, Frederik Vercauteren
2012/143 (PDF ) Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
2012/142 (PDF ) Identity-Based Encryption with Master Key-Dependent Message Security and Applications David Galindo, Javier Herranz, Jorge Villar
2012/141 (PDF ) Bicliques for permutations: collision and preimage attacks in stronger settings Dmitry Khovratovich
2012/140 (PDF ) Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors Selcuk Baktir, Erkay Savas
2012/139 (PDF ) Formal verication of secure ad-hoc network routing protocols using deductive model-checking Ta Vinh Thong
2012/138 (PDF ) An Improved Differential Attack on Full GOST (extended version) Nicolas T. Courtois
2012/137 (PDF ) Usable assembly language for GPUs: a success story Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
2012/136 (PDF ) Adaptive Key Protection in Complex Cryptosystems with Attributes Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng
2012/135 (PDF ) David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
2012/134 (PDF ) A Digital Signature Scheme for Long-Term Security Dimitrios Poulakis, Robert Rolland
2012/133 (PDF ) Toward Practical Private Access to Data Centers via Parallel ORAM Jacob R. Lorch, Bryan Parno, James Mickens, Mariana Raykova, Joshua Schiffman
2012/132 (PDF ) CFS Software Implementation Gregory Landais, Nicolas Sendrier
2012/131 (PDF ) Composition Theorems for CCA Cryptographic Security Rodolphe Lampe, Jacques Patarin
2012/130 (PDF ) Broadcast-Efficient Secure Multiparty Computation Juan Garay, Clint Givens, Rafail Ostrovsky
2012/129 (PDF ) Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts Nelly Fazio, Irippuge Milinda Perera
2012/128 (PDF ) Provably Secure Distance-Bounding: an Analysis of Prominent Protocols Marc Fischlin, Cristina Onete
2012/127 (PDF ) Additive autocorrelation of some classes of cubic semi-bent Boolean functions Deep Singh, Maheshanand Bhaintwal
2012/126 (PDF ) Compact Implementation of Threefish and Skein on FPGA Nuray At, Jean-Luc Beuchat, Ismail San
2012/124 (PDF ) On Securing Communication From Profilers Sandra Diaz-Santiago, Debrup Chakraborty
2012/123 (PDF ) Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system- A. Dehbaoui, J. M. Dutertre, B. Robisson, P. Orsatelli, P. Maurine, A. Tria
2012/122 (PDF ) Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three Reza R. Farashahi, Hongfeng Wu, Chang-An Zhao
2012/121 (PDF ) An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps Mitra Fatemi, Taraneh Eghlidos, Mohammadreza Aref
2012/120 (PDF ) Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks Yongge Wang
2012/119 (PDF ) Accelerating the Final Exponentiation in the Computation of the Tate Pairings Taechan Kim, Sungwook Kim, Jung Hee Cheon
2012/118 (PDF ) Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2012/117 (PDF ) Universally Composable Security With Local Adversaries Ran Canetti, Margarita Vald
2012/116 (PDF ) Clash Attacks on the Verifiability of E-Voting Systems Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2012/115 (PDF ) Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing XU Chun-xiang, HE Xiao-hu, Daniel Abraha
2012/114 (PDF ) On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
2012/113 (PDF ) On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model Bart Mennink
2012/112 (PDF ) On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sonmez Turan
2012/111 (PDF ) On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks Yin Zhang, Meicheng Liu, Dongdai Lin
2012/110 (PDF ) Finding Optimal Formulae for Bilinear Maps Razvan Barbulescu, Jérémie Detrey, Nicolas Estibals, Paul Zimmermann
2012/108 (PDF ) On the Optimality of Lattices for the Coppersmith Technique Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe
2012/107 (PDF ) Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks Guilin Wang, Jiangshan Yu, Qi Xie
2012/106 (PDF ) More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents Santanu Sarkar, Subhamoy Maitra
2012/105 (PDF ) Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
2012/104 (PDF ) Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang
2012/103 (PDF ) FlipIt: The Game of "Stealthy Takeover" Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
2012/102 (PDF ) On the Circular Security of Bit-Encryption Ron Rothblum
2012/100 (PDF ) Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet Shahram Khazaei, Björn Terelius, Douglas Wikström
2012/099 (PDF ) Homomorphic Evaluation of the AES Circuit Craig Gentry, Shai Halevi, Nigel P. Smart
2012/098 (PDF ) Combined Attacks on the AES Key Schedule François Dassance, Alexandre Venelli
2012/097 (PDF ) An algorithm for factoring integers Yingpu Deng, Yanbin Pan
2012/096 (PDF ) The Collision Security of MDC-4 Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
2012/095 (PDF ) Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer
2012/094 (PDF ) Algebraic attack on lattice based cryptosystems via solving equations over real numbers. Jintai Ding, Dieter Schmidt
2012/093 (PDF ) Recent Results on Balanced Symmetric Boolean Functions Yingming Guo, Guangpu Gao, Yaqun Zhao
2012/092 (PDF ) Tolerant Algebraic Side-Channel Analysis of {AES} Yossef Oren, Avishai Wool
2012/090 (PDF ) Worst-Case to Average-Case Reductions for Module Lattices Adeline Langlois, Damien Stehle
2012/089 (PDF ) ECM at Work Joppe W. Bos, Thorsten Kleinjung
2012/087 (PDF ) Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms Joppe W. Bos, Alina Dudeanu, Dimitar Jetchev
2012/085 (PDF ) Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery Stanislav Bulygin, Michael Walter
2012/084 (PDF ) Improved Algebraic Side-Channel Attack on AES Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter
2012/083 (PDF ) Optimally Robust Private Information Retrieval Casey Devet, Ian Goldberg, Nadia Heninger
2012/082 (PDF ) Semi-Supervised Template Attack Liran Lerman, Stephane Fernandes Medeiros, Nikita Veshchikov, Cedric Meuter, Gianluca Bontempi, Olivier Markowitch
2012/081 (PDF ) Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification Michael Backes, Fabian Bendun, Dominique Unruh
2012/080 (PDF ) Strongly Unforgeable Proxy Re-Signatures in the Standard Model S. Sree Vivek, S. Sharmila Deva Selvi, Guhan Balasubramanian, C. Pandu Rangan
2012/079 (PDF ) Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0 Masao KASAHARA
2012/078 (PDF ) Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP Zvika Brakerski
2012/077 (PDF ) MAGNITUDE SQUARED COHERENCE BASED SCA Sebastien Tiran, Amine Dehbaoui, Philippe Maurine
2012/076 (PDF ) Secure Identity-Based Encryption in the Quantum Random Oracle Model Mark Zhandry
2012/075 (PDF ) Efficient identity-based threshold decryption scheme from bilinear pairings Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang
2012/074 (PDF ) Another look at HMAC Neal Koblitz, Alfred Menezes
2012/073 (PDF ) Efficient identity-based threshold signature scheme from bilinear pairings in the standard model Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
2012/072 (PDF ) Particularly Friendly Members of Family Trees Craig Costello
2012/071 (PDF ) Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer
2012/070 (PDF ) Finding ECM-Friendly Curves through a Study of Galois Properties Razvan Barbulescu, Joppe W. Bos, Cyril Bouvier, Thorsten Kleinjung, Peter L. Montgomery
2012/069 (PDF ) Automatic Search of Attacks on round-reduced AES and Applications Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
2012/067 (PDF ) Parallelizing message schedules to accelerate the computations of hash functions Shay Gueron, Vlad Krasnov
2012/066 (PDF ) Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis Jiqiang Lu, Wen-She Yap, Yongzhuang Wei
2012/065 (PDF ) Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha” Tsukasa Ishiguro
2012/064 (PDF ) Ron was wrong, Whit is right Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter
2012/063 (PDF ) Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikström
2012/061 (PDF ) A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh
2012/060 (PDF ) Improved Security for Linearly Homomorphic Signatures: A Generic Framework David Mandell Freeman
2012/059 (PDF ) Message Authentication, Revisited Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs
2012/058 (PDF ) Key recycling in authentication Christopher Portmann
2012/057 (PDF ) Anonymous Constant-Size Ciphertext HIBE From Asymmetric Pairings Somindu C. Ramanna, Palash Sarkar
2012/056 (PDF ) A New Pseudorandom Generator from Collision-Resistant Hash Functions Alexandra Boldyreva, Virendra Kumar
2012/054 (PDF ) On the performance of certain Private Set Intersection protocols Emiliano De Cristofaro, Gene Tsudik
2012/053 (PDF ) Beating Shannon requires BOTH efficient adversaries AND non-zero advantage Yevgeniy Dodis
2012/052 (PDF ) Identity-based Encryption with Efficient Revocation Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
2012/051 (PDF ) Eavesdropping on Satellite Telecommunication Systems Benedikt Driessen
2012/050 (PDF ) Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture Jeremy Constantin, Andreas Burg, Frank K. Gurkaynak
2012/049 (PDF ) 2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160 Yu Sasaki, Lei Wang
2012/048 (PDF ) Designing Integrated Accelerator for Stream Ciphers with Structural Similarities Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid
2012/047 (PDF ) Incremental Deterministic Public-Key Encryption Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev
2012/046 (PDF ) Modifying Boolean Functions to Ensure Maximum Algebraic Immunity Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis
2012/045 (PDF ) Signature Schemes Secure against Hard-to-Invert Leakage Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel
2012/044 (PDF ) PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems Jun Zhou, Zhenfu Cao
2012/043 (PDF ) A novel Group Key Transfer Protocol Chingfang Hsu, Bing Zeng, Qi Cheng, Guohua Cui
2012/042 (PDF ) Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
2012/040 (PDF ) Single-block collision attack on MD5 Marc Stevens
2012/039 (PDF ) Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke
2012/038 (PDF ) Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure François Durvaux, Mathieu Renauld, François-Xavier Standaert, Loic van Oldeneel tot Oldenzeel, Nicolas Veyrat-Charvillon
2012/037 (PDF ) Some results on $q$-ary bent functions Deep Singh, Maheshanand Bhaintwal, Brajesh Kumar Singh
2012/036 (PDF ) Efficient Leakage-free Authentication of Trees, Graphs and Forests Ashish Kundu, Mikhail Atallah, Elisa Bertino
2012/035 (PDF ) Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
2012/034 (PDF ) Automatic Quantification of Cache Side-Channels Boris Köpf, Laurent Mauborgne, Martin Ochoa
2012/033 (PDF ) A note on hyper-bent functions via Dillon-like exponents Sihem Mesnager, Jean-Pierre Flori
2012/032 (PDF ) Counterexamples to Hardness Amplification Beyond Negligible Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs
2012/031 (PDF ) An error in "On a new formal proof model for RFID location privacy" Da-Zhi Sun
2012/030 (PDF ) Fault Analysis of the KATAN Family of Block Ciphers Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
2012/029 (PDF ) On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model Yannick Seurin
2012/028 (PDF ) A First-Order Leak-Free Masking Countermeasure Houssem MAGHREBI, Emmanuel PROUFF, Sylvain GUILLEY, Jean-Luc DANGER
2012/026 (PDF ) Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding Anja Becker, Antoine Joux, Alexander May, Alexander Meurer
2012/025 (PDF ) A new remote data integrity checking scheme for cloud storage Xiangtao Yan, Yifa Li
2012/024 (PDF ) Variants of Waters' Dual-System Primitives Using Asymmetric Pairings Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
2012/023 (PDF ) On the security of Lo et al.’s ownership transfer protocol Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Ali Mahani
2012/022 (PDF ) Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity Mihir Bellare, Stefano Tessaro
2012/020 (PDF ) Dickson polynomials, hyperelliptic curves and hyper-bent functions Jean-Pierre Flori, Sihem Mesnager
2012/019 (PDF ) Towards Unconditional Soundness: Computationally Complete Symbolic Attacker Gergei Bana, Hubert Comon-Lundh
2012/018 (PDF ) Attacks and Security Proofs of EAX-Prime Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata
2012/017 (PDF ) Secondary constructions on generalized bent functions Brajesh Kumar Singh
2012/015 (PDF ) A Cryptographic Treatment of the Wiretap Channel Mihir Bellare, Stefano Tessaro, Alexander Vardy
2012/014 (PDF ) Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
2012/012 (PDF ) Malleable Proof Systems and Applications Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2012/011 (PDF ) Biclique Attack of the Full ARIA-256 Shao-zhen Chen Tian-min Xu
2012/010 (PDF ) PayTree: "Amortized Signature" for Flexible Micro-Payments Charanjit Jutla, Moti Yung
2012/009 (PDF ) On the Indifferentiability of the Integrated-Key Hash Functions Saif Al-Kuwari
2012/008 (PDF ) Security proof with dishonest keys Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri
2012/007 (PDF ) Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
2012/006 (PDF ) Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger, Allison Lewko, Brent Waters
2012/005 (PDF ) A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Benjamin Fuller, Adam O'Neill, Leonid Reyzin
2012/004 (PDF ) The new SHA-3 software shootout Daniel J. Bernstein, Tanja Lange
2012/003 (PDF ) On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian
2012/002 (PDF ) ECC2K-130 on NVIDIA GPUs Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang
2012/001 (PDF ) Digital Signatures from Challenge-Divided Sigma-Protocols Andrew C. Yao, Yunlei Zhao
[ Cryptology ePrint archive ]