Cryptology ePrint Archive: Listing for 2013
Regex
2013/882 (PDF ) New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers Zhe Liu, Johann Großschädl
2013/881 (PDF ) Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky, Aviv Zohar
2013/880 (PDF ) New Constructions of Revocable Identity-Based Encryption from Multilinear Maps Seunghwan Park, Kwangsu Lee, Dong Hoon Lee
2013/879 (PDF ) Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
2013/878 (PDF ) Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng
2013/877 (PDF ) MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li
2013/876 (PDF ) Public-Key Encryption with Lazy Parties Kenji Yasunaga
2013/875 (PDF ) Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE Michael Clear, Ciaran McGoldrick
2013/874 (PDF ) General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction Akinori Kawachi, Yoshio Okamoto, Keisuke Tanaka, Kenji Yasunaga
2013/873 (PDF ) Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation Mihir Bellare, Igors Stepanovs, Stefano Tessaro
2013/871 (PDF ) A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities Weiqiang Wen, Libin Wang, Jiaxin Pan
2013/870 (PDF ) A new class of hyper-bent functions and Kloosterman sums Chunming Tang, Yanfeng Qi
2013/869 (PDF ) How to Fake Auxiliary Input Dimitar Jetchev, Krzysztof Pietrzak
2013/868 (PDF ) Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft) Lear Bahack
2013/867 (PDF ) LHash: A Lightweight Hash Function (Full Version) Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong
2013/866 (PDF ) Compact Ring-LWE based Cryptoprocessor Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede
2013/865 (PDF ) SNR to Success Rate: Reaching the Limit of Non-Profiling DPA Suvadeep Hajra, Debdeep Mukhopadhyay
2013/864 (PDF ) Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs Adam Smith, Ye Zhang
2013/863 (PDF ) Formal Treatment of Distributed Trust in Electronic Voting Stephan Neumann, Melanie Volkamer
2013/862 (PDF ) How to Delegate Computations: The Power of No-Signaling Proofs Yael Tauman Kalai, Ran Raz, Ron D. Rothblum
2013/861 (PDF ) Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments Muhammad Rizwan Asghar
2013/860 (PDF ) On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs
2013/859 (PDF ) Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
2013/858 (PDF ) Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications Sherman S. M. Chow, Matthew Franklin, Haibin Zhang
2013/857 (PDF ) RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis Daniel Genkin, Adi Shamir, Eran Tromer
2013/856 (PDF ) Tightly-Secure Signatures From Lossy Identification Schemes Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi
2013/855 (PDF ) Weaknesses in a Recently Proposed RFID Authentication Protocol Mete Akgün, M. Ufuk Çaǧlayan
2013/854 (PDF ) Multiple-Use Transferable E-Cash Pratik Sarkar
2013/853 (PDF ) Automatic Search for Differential Trails in ARX Ciphers (Extended Version) Alex Biryukov, Vesselin Velichkov
2013/852 (PDF ) Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256 Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
2013/851 (PDF ) Power and Timing Side Channels for PUFs and their Efficient Exploitation Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson
2013/850 (PDF ) Secure Floating-Point Arithmetic and Private Satellite Collision Analysis Liina Kamm, Jan Willemson
2013/849 (PDF ) Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model Suvadeep Hajra, Debdeep Mukhopadhyay
2013/848 (PDF ) Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols Xi-Jun Lin, Lin Sun
2013/845 (PDF ) How to Keep a Secret: Leakage Deterring Public-key Cryptography Aggelos Kiayias, Qiang Tang
2013/844 (PDF ) A generic view on trace-and-revoke broadcast encryption schemes Dennis Hofheinz, Christoph Striecks
2013/843 (PDF ) A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues Jian Ye, Chenglian Liu
2013/842 (PDF ) Detecting Hidden Leakages Amir Moradi, Sylvain Guilley, Annelie Heuser
2013/841 (PDF ) Trust Views for the Web PKI Johannes Braun, Florian Volk, Johannes Buchmann, Max Mühlhäuser
2013/840 (PDF ) (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong Sheng Zhou
2013/839 (PDF ) Lattice Decoding Attacks on Binary LWE Shi Bai, Steven D. Galbraith
2013/838 (PDF ) An improved compression technique for signatures based on learning with errors Shi Bai, Steven D. Galbraith
2013/837 (PDF ) Fair Two-Party Computations via Bitcoin Deposits Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
2013/836 (PDF ) Identity-Based Key-Encapsulation Mechanism from Multilinear Maps Hao Wang, Lei Wu, Zhihua Zheng, Yilei Wang
2013/835 (PDF ) A Modular Framework for Building Variable-Input Length Tweakable Ciphers Thomas Shrimpton, R. Seth Terashima
2013/834 (PDF ) Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas, Andres Kroonmaa, Risto Laanoja
2013/833 (PDF ) Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda, David Pointcheval
2013/832 (PDF ) Practical Dynamic Searchable Encryption with Small Leakage Emil Stefanov, Charalampos Papamanthou, Elaine Shi
2013/831 (PDF ) Provable Security Proofs and their Interpretation in the Real World Vikram Singh
2013/830 (PDF ) Property Preserving Symmetric Encryption Revisited Sanjit Chatterjee, M. Prem Laxman Das
2013/829 (PDF ) Is Bitcoin a Decentralized Currency? Arthur Gervais, Ghassan Karame, Srdjan Capkun, Vedran Capkun
2013/828 (PDF ) Decentralized Traceable Attribute-Based Signatures Ali El Kaafarani, Essam Ghadafi, Dalia Khader
2013/827 (PDF ) Lower Bounds in the Hardware Token Model Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen
2013/826 (PDF ) Secure multi-party data analysis: end user validation and practical experiments Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt
2013/824 (PDF ) Fair and Efficient Secure Multiparty Computation with Reputation Systems Gilad Asharov, Yehuda Lindell, Hila Zarosim
2013/823 (PDF ) Another Look at XCB Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar
2013/822 (PDF ) Leakage Resilient Fully Homomorphic Encryption Alexandra Berkoff, Feng-Hao Liu
2013/819 (PDF ) Safe enclosures: towards cryptographic techniques for server protection Sergiu Bursuc, Julian P. Murphy
2013/818 (PDF ) On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography Roberto De Prisco, Alfredo De Santis
2013/817 (PDF ) Interactive Encryption and Message Authentication Yevgeniy Dodis, Dario Fiore
2013/816 (PDF ) Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes Shay Gueron, Vlad Krasnov
2013/815 (PDF ) Iterated group products and leakage resilience against NC^1 Eric Miles
2013/814 (PDF ) RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
2013/813 (PDF ) Multi-ciphersuite security of the Secure Shell (SSH) protocol Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila
2013/812 (PDF ) A Note on Bilinear Groups of a Large Composite Order Zhengjun Cao, Lihua Liu
2013/811 (PDF ) Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
2013/810 (PDF ) Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack Pablo Rauzy, Sylvain Guilley
2013/809 (PDF ) Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk
2013/808 (PDF ) Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
2013/807 (PDF ) Distributed Key Generation for Secure Encrypted Deduplication Yitao Duan
2013/806 (PDF ) Efficient (Anonymous) Compact HIBE From Standard Assumptions Somindu C. Ramanna, Palash Sarkar
2013/805 (PDF ) Proofs of Space: When Space is of the Essence Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi
2013/804 (PDF ) Group Signature with relaxed-privacy and revocability for VANET Mohammad Saiful Islam Mamun, Atsuko Miyaji
2013/803 (PDF ) Fully, (Almost) Tightly Secure IBE from Standard Assumptions Jie Chen, Hoeteck Wee
2013/802 (PDF ) Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng
2013/801 (PDF ) Authenticating Computation on Groups: New Homomorphic Primitives and Applications Dario Catalano, Antonio Marcedone, Orazio Puglisi
2013/800 (PDF ) Algebraic Properties of the Cube Attack Frank-M. Quedenfeld, Christopher Wolf
2013/799 (PDF ) New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography Gilles Macario-Rat, Jérôme Plût, Henri Gilbert
2013/797 (PDF ) Tamper Resilient Circuits: The Adversary at the Gates Aggelos Kiayias, Yiannis Tselekounis
2013/796 (PDF ) Proofs of Space Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak
2013/795 (PDF ) Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications Xi-Jun Lin, Lin Sun
2013/794 (PDF ) Behind the Scene of Side Channel Attacks Victor Lomné, Emmanuel Prouff, Thomas Roche
2013/793 (PDF ) A fast integer-based batch full-homomorphic encryption scheme over finite field Long Zhang, Qiuling Yue
2013/792 (PDF ) Improved Authenticity Bound of EAX, and Refinements Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata
2013/791 (PDF ) APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
2013/790 (PDF ) Parallelizable and Authenticated Online Ciphers Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar Tischhauser, Kan Yasuda
2013/789 (PDF ) Proofs of Data Possession and Retrievability Based on MRD Codes Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu
2013/788 (PDF ) Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis Zhengjun Cao, Lihua Liu
2013/787 (PDF ) Wide-weak Privacy Preserving RFID Mutual Authentication Protocol Raghuvir Songhela, Manik Lal Das
2013/786 (PDF ) Tree Based Symmetric Key Broadcast Encryption Sanjay Bhattacherjee, Palash Sarkar
2013/785 (PDF ) Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model Fei Tang, Hongda Li, Qihua Niu, Bei Liang
2013/784 (PDF ) Secure Multiparty Computations on Bitcoin Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek
2013/783 (PDF ) ECC-Based Non-Interactive Deniable Authentication with Designated Verifier Yalin Chen, Jue-Sam Chou
2013/782 (PDF ) How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? Dorit Ron, Adi Shamir
2013/781 (PDF ) Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings Rafael Pass, Karn Seth, Sidharth Telang
2013/780 (PDF ) A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester Nasser Ramazani Darmian
2013/779 (PDF ) Distributed Group Authentication for RFID Supply Management Mike Burmester, Jorge Munilla
2013/778 (PDF ) Multi-Stage Fault Attacks on Block Ciphers Philipp Jovanovic, Martin Kreuzer, Ilia Polian
2013/777 (PDF ) Construction of Multiplicative Monotone Span Program Yuenai Chen, Chunming Tang
2013/776 (PDF ) Location Leakage in Distance Bounding: Why Location Privacy does not Work Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay
2013/775 (PDF ) Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu
2013/774 (PDF ) Multi-Input Functional Encryption S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2013/773 (PDF ) CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions Markku-Juhani O. Saarinen
2013/772 (PDF ) Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen
2013/771 (PDF ) TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen, Shaohua Tang
2013/770 (PDF ) Efficient Template Attacks Omar Choudary, Markus G. Kuhn
2013/769 (PDF ) Broadcast Amplification Martin Hirt, Ueli Maurer, Pavel Raykov
2013/768 (PDF ) VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4 Bartosz Zoltak
2013/767 (PDF ) Misuse Resistant Parallel Authenticated Encryptions Nilanjan Datta, Mridul Nandi
2013/766 (PDF ) RankSign : an efficient signature algorithm based on the rank metric P. Gaborit, O. Ruatta, J. Schrek, G. Zémor
2013/765 (PDF ) Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More Kaoru Kurosawa, Le Trieu Phong
2013/764 (PDF ) Dynamic Countermeasure Against the Zero Power Analysis Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
2013/763 (PDF ) Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting Yutaka Kawai, Katsuyuki Takashima
2013/762 (PDF ) Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung
2013/761 (PDF ) Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati
2013/760 (PDF ) On cross joining de Bruijn sequences Johannes Mykkeltveit, Janusz Szmidt
2013/759 (PDF ) Vectorization of ChaCha Stream Cipher Martin Goll, Shay Gueron
2013/758 (PDF ) A Revocable Online-Offline Certificateless Signature Scheme without Pairing Karthik Abinav, Saikrishna Badrinarayanan, C. Pandu Rangan, S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan
2013/757 (PDF ) Practical Signatures from the Partial Fourier Recovery Problem Jeff Hoffstein, Jill Pipher, John Schanck, Joseph H. Silverman, William Whyte
2013/756 (PDF ) A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique Yonglin Hao, Dongxia Bai, Leibo Li
2013/754 (PDF ) Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP Omkant Pandey, Manoj Prabhakaran, Amit Sahai
2013/753 (PDF ) Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalcin
2013/752 (PDF ) On the Power of Rewinding Simulators in Functional Encryption Angelo De Caro, Vincenzo Iovino
2013/751 (PDF ) Using Hamiltonian Totems as Passwords Hervé Chabanne, Jean-Michel Cioranesco, Vincent Despiegel, Jean-Christophe Fondeur, David Naccache
2013/750 (PDF ) Fully Deniable Mutual Authentication Protocol Based on RSA Signature Xi-Jun Lin, Lin Sun
2013/749 (PDF ) Efficient CCA-secure Threshold Public-Key Encryption Scheme Xi-Jun Lin, Lin Sun
2013/748 (PDF ) Plaintext Recovery Attacks Against WPA/TKIP Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt
2013/747 (PDF ) Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks Jayaprakash Kar
2013/746 (PDF ) Asymptotically Efficient Lattice-Based Digital Signatures Vadim Lyubashevsky, Daniele Micciancio
2013/745 (PDF ) Asynchronous MPC with a Strict Honest Majority Using Non-equivocation Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate
2013/744 (PDF ) Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai
2013/742 (PDF ) CODING - Stream Cipher Methods by Varying Components during Ciphering Data Jürgen Müller
2013/741 (PDF ) Fast Software Implementation of Binary Elliptic Curve Cryptography Manuel Bluhm, Shay Gueron
2013/740 (PDF ) An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II) Gérald Gavin
2013/738 (PDF ) On the Resilience and Uniqueness of CPA for Secure Broadcast Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2013/737 (PDF ) Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodriguez-Henriquez
2013/736 (PDF ) TRS-80 With A Keccak Sponge Cake Jean-Marie Chauvet
2013/735 (PDF ) Masking Tables---An Underestimated Security Risk Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald
2013/734 (PDF ) Elliptic Curve Cryptography in Practice Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow
2013/732 (PDF ) SSS-V2: Secure Similarity Search Hyun-A Park
2013/731 (PDF ) Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited Yongqiang Li, Mingsheng Wang, Yuyin Yu
2013/730 (PDF ) Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees Łukasz Krzywiecki, Przemys{\l}aw Kubiak, Miros{\l}aw Kuty{\l}owski
2013/729 (PDF ) Functional Encryption for Randomized Functionalities Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai
2013/728 (PDF ) Modified Alternating Step Generators Robert Wicik, Tomasz Rachwalik
2013/727 (PDF ) Multi-Input Functional Encryption Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai
2013/726 (PDF ) Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack Chihong Joo, Aaram Yun
2013/724 (PDF ) Verifiable Set Operations over Outsourced Databases Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
2013/723 (PDF ) Amplifying Privacy in Privacy Amplification Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin
2013/722 (PDF ) The Realm of the Pairings Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
2013/721 (PDF ) Deep Attacks of a Certificateless Signature Scheme Bo Yang, Zhao Yang, Zibi Xiao, Shougui Li
2013/720 (PDF ) Outsourced Symmetric Private Information Retrieval Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
2013/719 (PDF ) Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited Sandro Coretti, Ueli Maurer, Björn Tackmann
2013/718 (PDF ) NTRU-KE: A Lattice-based Public Key Exchange Protocol Xinyu Lei, Xiaofeng Liao
2013/717 (PDF ) NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
2013/716 (PDF ) A Secure Obfuscator for Encrypted Blind Signature Functionality Xiao Feng, Zheng Yuan
2013/715 (PDF ) Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists Erik-Oliver Blass, Travis Mayberry, Guevara Noubir
2013/714 (PDF ) Method to secure data in the cloud while preserving summary statistics Sanchita Barman, Bimal Roy
2013/713 (PDF ) Cryptanalysis of Zorro Jian Guo, Ivica Nikolic, Thomas Peyrin, Lei Wang
2013/712 (PDF ) PUF-Based RFID Authentication Secure and Private under Memory Leakage Daisuke Moriyama, Shin'ichiro Matsuo, Moti Yung
2013/711 (PDF ) Ambiguous One-Move Nominative Signature Without Random Oracles Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang
2013/710 (PDF ) An Approach to Reduce Storage for Homomorphic Computations Jung Hee Cheon, Jinsu Kim
2013/709 (PDF ) Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks Mohammad Sadeq Dousti, Rasool Jalili
2013/708 (PDF ) Key Derivation Without Entropy Waste Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs
2013/707 (PDF ) A reduction of Semigroup DLP to classic DLP Matan Banin, Boaz Tsaban
2013/706 (PDF ) How to Certify the Leakage of a Chip? François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2013/705 (PDF ) Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation Clemens Heuberger, Michela Mazzoli
2013/704 (PDF ) Adaptive Witness Encryption and Asymmetric Password-based Cryptography Mihir Bellare, Viet Tung Hoang
2013/703 (PDF ) Limits of Extractability Assumptions with Distributional Auxiliary Input Elette Boyle, Rafael Pass
2013/702 (PDF ) Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs
2013/701 (PDF ) More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2013/700 (PDF ) Higher Order Masking of Look-up Tables Jean-Sebastien Coron
2013/699 (PDF ) Bootstrapping Obfuscators via Fast Pseudorandom Functions Benny Applebaum
2013/698 (PDF ) Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks Xi-Jun Lin, Lin Sun
2013/697 (PDF ) A More Efficient AES Threshold Implementation Begul Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2013/696 (PDF ) Examination of a New Defense Mechanism: Honeywords Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz
2013/695 (PDF ) AEGIS: A Fast Authenticated Encryption Algorithm Hongjun Wu, Bart Preneel
2013/694 (PDF ) Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data Lichun Li, Anwitaman Datta
2013/693 (PDF ) Secure Key Exchange and Sessions Without Credentials Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis
2013/692 (PDF ) Faster Compact Diffie-Hellman: Endomorphisms on the x-line Craig Costello, Huseyin Hisil, Benjamin Smith
2013/691 (PDF ) Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2013/690 (PDF ) Obfuscation ==> (IND-CPA Security =/=> Circular Security) Antonio Marcedone, Claudio Orlandi
2013/689 (PDF ) Differing-Inputs Obfuscation and Applications Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry
2013/688 (PDF ) Unbalancing Pairing-Based Key Exchange Protocols Michael Scott
2013/687 (PDF ) How to Compress (Reusable) Garbled Circuits Craig Gentry, Sergey Gorbunov, Shai Halevi, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
2013/686 (PDF ) New abstractions in applied pi-calculus and automated verification of protected executions Shiwei Xu, Sergiu Bursuc, Julian P. Murphy
2013/685 (PDF ) Solving shortest and closest vector problems: The decomposition approach Anja Becker, Nicolas Gama, Antoine Joux
2013/684 (PDF ) Fully Bideniable Public-Key Encryption Marcel Šebek
2013/683 (PDF ) Separations in Circular Security for Arbitrary Length Key Cycles Venkata Koppula, Kim Ramchen, Brent Waters
2013/682 (PDF ) Secret Key Cryptosystem based on Non-Systematic Polar Codes Reza Hooshmand, Mohammad Reza Aref, Taraneh Eghlidos
2013/681 (PDF ) Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks Damien Vergnaud, David Xiao
2013/680 (PDF ) A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme Dana Dachman-Soled
2013/679 (PDF ) Formal verification of a software countermeasure against instruction skip attacks Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson
2013/678 (PDF ) Universally composable privacy preserving finite automata execution with low online and offline complexity Peeter Laud, Jan Willemson
2013/677 (PDF ) Bounded Tamper Resilience: How to go beyond the Algebraic Barrier Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
2013/676 (PDF ) Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song
2013/675 (PDF ) A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher Tomer Ashur, Orr Dunkelman
2013/674 (PDF ) Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/673 (PDF ) Traps to the BGJT-Algorithm for Discrete Logarithms Qi Cheng, Daqing Wan, Jincheng Zhuang
2013/672 (PDF ) Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians Benjamin Smith
2013/671 (PDF ) Robust Pseudorandom Generators Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman
2013/670 (PDF ) Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces Charanjit Jutla, Arnab Roy
2013/669 (PDF ) Attribute-Based Encryption for Arithmetic Circuits Dan Boneh, Valeria Nikolaenko, Gil Segev
2013/668 (PDF ) Obfuscation for Evasive Functions Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2013/667 (PDF ) A TPM Diffie-Hellman Oracle Tolga Acar, Lan Nguyen, Greg Zaverucha
2013/666 (PDF ) An Offline Dictionary Attack against a Three-Party Key Exchange Protocol Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
2013/665 (PDF ) The Impossibility of Obfuscation with a Universal Simulator Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai
2013/664 (PDF ) TUC: Time-sensitive and Modular Analysis of Anonymous Communication Michael Backes, Praveen Manoharan, Esfandiar Mohammadi
2013/663 (PDF ) Linear Cryptanalysis of Round Reduced SIMON Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya
2013/662 (PDF ) Fine-Tuning Groth-Sahai Proofs Alex Escala, Jens Groth
2013/661 (PDF ) Private aggregation on untrusted servers with customizable thresholds Constantinos Patsakis, Michael Clear, Paul Laird
2013/660 (PDF ) Discrete Logarithms and Mordell-Weil Groups Mohammad Sadek
2013/658 (PDF ) Parallel authenticated encryption with the duplex construction Pawel Morawiecki, Josef Pieprzyk
2013/657 (PDF ) New Trapdoor Projection Maps for Composite-Order Bilinear Groups Sarah Meiklejohn, Hovav Shacham
2013/656 (PDF ) Bias-based modeling and entropy analysis of PUFs Robbert van den Berg, Boris Skoric, Vincent van der Leest
2013/655 (PDF ) Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version) Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel
2013/654 (PDF ) Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter Baodong Qin, Shengli Liu
2013/653 (PDF ) RKA-KDM secure encryption from public-key encryption Florian Böhl, Gareth T. Davies, Dennis Hofheinz
2013/652 (PDF ) Efficient Modular Arithmetic for SIMD Devices Wilke Trei
2013/651 (PDF ) A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound Sanjit Chatterjee, Chethan Kamath
2013/650 (PDF ) On Extractability (a.k.a. Differing-Inputs) Obfuscation Elette Boyle, Kai-Min Chung, Rafael Pass
2013/649 (PDF ) Security Analysis of Password-Authenticated Key Retrieval SeongHan Shin, Kazukuni Kobara
2013/648 (PDF ) Integral Distinguishers for Reduced-round Stribog Riham AlTawy, Amr M. Youssef
2013/647 (PDF ) A note on high-security general-purpose elliptic curves Diego F. Aranha, Paulo S. L. M. Barreto, Geovandro C. C. F. Pereira, Jefferson E. Ricardini
2013/646 (PDF ) Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles Johannes Blömer, Gennadij Liske
2013/645 (PDF ) FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap
2013/644 (PDF ) Elliptic and Hyperelliptic Curves: a Practical Security Analysis Joppe W. Bos, Craig Costello, Andrea Miele
2013/643 (PDF ) There is no Indistinguishability Obfuscation in Pessiland Tal Moran, Alon Rosen
2013/642 (PDF ) Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Dan Boneh, Mark Zhandry
2013/641 (PDF ) Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2013/640 (PDF ) Communication-Efficient MPC for General Adversary Structures Joshua Lampkins, Rafail Ostrovsky
2013/639 (PDF ) Differentially 4-Uniform Bijections by Permuting the Inverse Function Deng Tang, Claude Carlet, Xiaohu Tang
2013/638 (PDF ) DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption Somindu C. Ramanna
2013/637 (PDF ) Detection of Algebraic Manipulation in the Presence of Leakage Hadi Ahmadi, Reihaneh Safavi-Naini
2013/636 (PDF ) SCARE of Secret Ciphers with SPN Structures Matthieu Rivain, Thomas Roche
2013/635 (PDF ) Universal security; from bits and mips to pools, lakes -- and beyond Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé
2013/634 (PDF ) Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/633 (PDF ) Four Measures of Nonlinearity J. Boyar, M. G. Find, R. Peralta
2013/632 (PDF ) Combined Modeling and Side Channel Attacks on Strong PUFs Ahmed Mahmoud, Ulrich Rührmair, Mehrdad Majzoobi, Farinaz Koushanfar
2013/631 (PDF ) Protecting Obfuscation Against Algebraic Attacks Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2013/630 (PDF ) Estimating Key Sizes For High Dimensional Lattice-Based Systems Joop van de Pol, Nigel P. Smart
2013/629 (PDF ) Secure Key Management in the Cloud Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob I. Pagter
2013/628 (PDF ) Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions Kazuhiko Minematsu
2013/627 (PDF ) Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud Jiawei Yuan, Shucheng Yu
2013/626 (PDF ) Improved Linear Attacks on the Chinese Block Cipher Standard Mingjie Liu, Jiazhe Chen
2013/625 (PDF ) PillarBox: Combating next-generation malware with fast forward-secure logging Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
2013/623 (PDF ) Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad, Amir Herzberg, Haya Shulman
2013/622 (PDF ) Decentralized Anonymous Credentials Christina Garman, Matthew Green, Ian Miers
2013/621 (PDF ) Multi-LHL protocol Marika Mitrengová
2013/620 (PDF ) Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
2013/619 (PDF ) Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes Jeroen Delvaux, Ingrid Verbauwhede
2013/618 (PDF ) Security Amplification against Meet-in-the-Middle Attacks Using Whitening Pierre-Alain Fouque, Pierre Karpman
2013/617 (PDF ) Some results concerning global avalanche characteristics of two $q$-ary functions Brajesh Kumar Singh
2013/616 (PDF ) Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan, Neil Hanley
2013/615 (PDF ) Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonker, Sjouke Mauw, Jun Pang
2013/614 (PDF ) Is extracting data the same as possessing data? Douglas R. Stinson, Jalaj Upadhyay
2013/613 (PDF ) Recomputing with Permuted Operands: A Concurrent Error Detection Approach Xiaofei Guo, Ramesh Karri
2013/612 (PDF ) Sub-linear Blind Ring Signatures without Random Oracles Essam Ghadafi
2013/611 (PDF ) Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki
2013/610 (PDF ) Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation Jeroen Delvaux, Ingrid Verbauwhede
2013/609 (PDF ) Ultra Low-Power implementation of ECC on the ARM Cortex-M0+ Ruan de Clercq, Leif Uhsadel, Anthony Van Herrewege, Ingrid Verbauwhede
2013/608 (PDF ) Towards Optimal Leakage Exploitation Rate in Template Attacks Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2013/607 (PDF ) Cryptanalysis of Full RIPEMD-128 Franck Landelle, Thomas Peyrin
2013/606 (PDF ) Revocable quantum timed-release encryption Dominique Unruh
2013/605 (PDF ) Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC. Masao KASAHARA
2013/604 (PDF ) Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos Jörg Schwenk
2013/603 (PDF ) Invariance-Based Concurrent Error Detection for Advanced Encryption Standard Xiaofei Guo, Ramesh Karri
2013/602 (PDF ) On the Efficacy of Solving LWE by Reduction to Unique-SVP Martin R. Albrecht, Robert Fitzpatrick, Florian G ̈opfert
2013/601 (PDF ) Two-round secure MPC from Indistinguishability Obfuscation Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
2013/600 (PDF ) Improved Cryptanalysis of Reduced RIPEMD-160 Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, Shuang Wu
2013/599 (PDF ) Factoring RSA keys from certified smart cards: Coppersmith in the wild Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren
2013/598 (PDF ) Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar
2013/597 (PDF ) Efficient Pairings Computation on Jacobi Quartic Elliptic Curves Sylvain Duquesne, Nadia El Mrabet, Emmanuel Fouotsa
2013/596 (PDF ) Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study Michael Shantz, Edlyn Teske
2013/595 (PDF ) Enhanced certificate transparency and end-to-end encrypted mail Mark D. Ryan
2013/594 (PDF ) A Local-Global Approach to Solving Ideal Lattice Problems Yuan Tian, Rongxin Sun, Xueyong Zhu
2013/593 (PDF ) Efficient One-Sided Adaptively Secure Computation Carmit Hazay, Arpita Patra
2013/592 (PDF ) Cryptanalysis of the Toorani-Falahati Hill Ciphers Liam Keliher, Anthony Z. Delaney
2013/591 (PDF ) Analysis of the Rainbow Tradeoff Algorithm Used in Practice Jung Woo Kim, Jin Hong, Kunsoo Park
2013/590 (PDF ) EyeDecrypt -- Private Interactions in Plain Sight Andrea Forte, Juan Garay, Trevor Jim, Yevgeniy Vahlis
2013/589 (PDF ) Smashing MASH-1 Vladimir Antipkin
2013/588 (PDF ) SPHF-Friendly Non-Interactive Commitments Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval
2013/587 (PDF ) ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2013/586 (PDF ) Generic related-key and induced chosen IV attacks using the method of key differentiation Enes Pasalic, Yongzhuang Wei
2013/585 (PDF ) On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two Xiutao Feng, Guang Gong
2013/584 (PDF ) Cryptanalysis of GOST R Hash Function Zongyue Wang, Hongbo Yu, Xiaoyun Wang
2013/583 (PDF ) Polynomial Selection for the Number Field Sieve in an Elementary Geometric View Min Yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang
2013/582 (PDF ) The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions Antoine Joux, Cécile Pierrot
2013/581 (PDF ) PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma
2013/580 (PDF ) Random Projections, Graph Sparsification, and Differential Privacy Jalaj Upadhyay
2013/579 (PDF ) On Measurable Side-Channel Leaks inside ASIC Design Primitives Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino
2013/578 (PDF ) A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent Oleksandr Kazymyrov, Valentyna Kazymyrova, Roman Oliynykov
2013/577 (PDF ) Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique Luís T. A. N. Brandão
2013/576 (PDF ) Extended Criterion for Absence of Fixed Points Oleksandr Kazymyrov, Valentyna Kazymyrova
2013/575 (PDF ) Equivalence between MAC and PRF for Blockcipher based Constructions Nilanjan Datta, Mridul Nandi
2013/574 (PDF ) On the Minimum Number of Multiplications Necessary for Universal Hash Constructions Mridul Nandi
2013/573 (PDF ) Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE Leibo Li, Keting Jia, Xiaoyun Wang
2013/572 (PDF ) Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher Goutam Paul, Subhamoy Maitra, Anupam Chattopadhyay
2013/571 (PDF ) Efficient General-Adversary Multi-Party Computation Martin Hirt, Daniel Tschudi
2013/570 (PDF ) New Efficient Identity-Based Encryption From Factorization Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao
2013/569 (PDF ) More Efficient Cryptosystems From $k^{th}$-Power Residues Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao
2013/568 (PDF ) Cryptanalysis of the Speck Family of Block Ciphers Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
2013/567 (PDF ) KDM Security in the Hybrid Framework Gareth T. Davies, Martijn Stam
2013/566 (PDF ) Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation Jeroen Delvaux, Ingrid Verbauwhede
2013/565 (PDF ) Non-Malleable Coding Against Bit-wise and Split-State Tampering Mahdi Cheraghchi, Venkatesan Guruswami
2013/564 (PDF ) Capacity of Non-Malleable Codes Mahdi Cheraghchi, Venkatesan Guruswami
2013/563 (PDF ) Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding Zvika Brakerski, Guy N. Rothblum
2013/562 (PDF ) Self-pairings on supersingular elliptic curves with embedding degree $three$ Binglong Chen, Chang-An Zhao
2013/561 (PDF ) Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2013/560 (PDF ) Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time Ben Morris, Phillip Rogaway
2013/559 (PDF ) A Definitional Framework for Functional Encryption Christian Matt, Ueli Maurer
2013/558 (PDF ) Practical approaches to varying network size in combinatorial key predistribution schemes Kevin Henry, Maura B. Paterson, Douglas R. Stinson
2013/557 (PDF ) Black-Box Obfuscation for d-CNFs Zvika Brakerski, Guy N. Rothblum
2013/556 (PDF ) Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012 Oleksandr Kazymyrov, Valentyna Kazymyrova
2013/555 (PDF ) Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design Ueli Maurer, Björn Tackmann, Sandro Coretti
2013/554 (PDF ) Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic Pablo Rauzy, Sylvain Guilley, Zakaria Najm
2013/553 (PDF ) Multi-Valued Byzantine Broadcast: the $t < n$ Case Martin Hirt, Pavel Raykov
2013/552 (PDF ) More Efficient Oblivious Transfer and Extensions for Faster Secure Computation Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2013/551 (PDF ) Puzzle Encryption Algorithm Gregory Alvarez, Charles Berenguer
2013/549 (PDF ) Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem Koh-ichi Nagao
2013/548 (PDF ) Decomposition formula of the Jacobian group of plane curve Koh-ichi Nagao
2013/547 (PDF ) Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang
2013/546 (PDF ) TRS-80 with a grain of salt Jean-Marie Chauvet
2013/545 (PDF ) Private Over-threshold Aggregation Protocols over Distributed Databases Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim
2013/544 (PDF ) Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes Christian Hanser, Daniel Slamanig
2013/543 (PDF ) Cryptanalysis of the SIMON Family of Block Ciphers Hoda A. Alkhzaimi, Martin M. Lauridsen
2013/542 (PDF ) Searching for Nonlinear Feedback Shift Registers with Parallel Computing Przemysław Dąbrowski, Grzegorz Łabuzek, Tomasz Rachwalik, Janusz Szmidt
2013/541 (PDF ) Lattice-Based FHE as Secure as PKE Zvika Brakerski, Vinod Vaikuntanathan
2013/540 (PDF ) On the security of a password-only authenticated three-party key exchange protocol Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik, Dongho Won
2013/539 (PDF ) Rebound attacks on Stribog Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef
2013/538 (PDF ) Practical Issues with TLS Client Certificate Authentication Arnis Parsovs
2013/537 (PDF ) Inter-FSP Funds Transfer Protocol Amir Herzberg, Shay Nachmani
2013/536 (PDF ) A Three-Level Sieve Algorithm for the Shortest Vector Problem Feng Zhang, Yanbin Pan, Gengran Hu
2013/535 (PDF ) Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms Sujoy Sinha Roy, Junfeng Fan, Ingrid Verbauwhede
2013/534 (PDF ) Efficient Unobservable Anonymous Reporting against Strong Adversaries Nethanel Gelernter, Amir Herzberg
2013/533 (PDF ) Gossip Latin Square and The Meet-All Gossipers Problem Nethanel Gelernter, Amir Herzberg
2013/532 (PDF ) On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves Takakazu Satoh
2013/531 (PDF ) On the Limits of Provable Anonymity Nethanel Gelernter, Amir Herzberg
2013/530 (PDF ) The Parallel-Cut Meet-In-The-Middle Attack Ivica Nikolic, Lei Wang, Shuang Wu
2013/529 (PDF ) How to Withstand Mobile Virus Attacks, Revisited Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
2013/528 (PDF ) Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption Somindu C. Ramanna, Palash Sarkar
2013/527 (PDF ) The Spammed Code Offset Method Boris Skoric, Niels de Vreede
2013/526 (PDF ) Differential and Linear Cryptanalysis of Reduced-Round Simon Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
2013/525 (PDF ) Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler, Stefan Lucks, Jakob Wenzel
2013/524 (PDF ) Threshold Secret Image Sharing Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang, YaWei Ren
2013/523 (PDF ) White-Box Security Notions for Symmetric Encryption Schemes Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
2013/522 (PDF ) The Resistance of PRESENT-80 Against Related-Key Differential Attacks Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
2013/521 (PDF ) Multiple Limited-Birthday Distinguishers and Applications Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
2013/520 (PDF ) Locally Updatable and Locally Decodable Codes Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky
2013/519 (PDF ) Montgomery Multiplication Using Vector Instructions Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha
2013/517 (PDF ) Improvement of One Adaptive Oblivious Transfer Scheme Zhengjun Cao, Lihua Liu
2013/516 (PDF ) Algebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase, Sarah Meiklejohn, Gregory M. Zaverucha
2013/515 (PDF ) When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol Changyu Dong, Liqun Chen, Zikai Wen
2013/514 (PDF ) Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited Jia Xu, Jianying Zhou
2013/513 (PDF ) Enforcing Language Semantics Using Proof-Carrying Data Stephen Chong, Eran Tromer, Jeffrey A. Vaughan
2013/512 (PDF ) Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences Jingguo Bi, Phong Q. Nguyen
2013/511 (PDF ) Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref
2013/510 (PDF ) Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden
2013/509 (PDF ) Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation Susan Hohenberger, Amit Sahai, Brent Waters
2013/508 (PDF ) Multi-Key Searchable Encryption Raluca Ada Popa, Nickolai Zeldovich
2013/507 (PDF ) SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza
2013/506 (PDF ) A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA Pablo Rauzy, Sylvain Guilley
2013/505 (PDF ) Improvement of One Anonymous Identity-Based Encryption Zhengjun Cao, Lihua Liu
2013/504 (PDF ) A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves Reza Azarderakhsh, Koray Karabina
2013/503 (PDF ) On secret sharing with nonlinear product reconstruction Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Carles Padro, Chaoping Xing
2013/502 (PDF ) Proving TLS-attack related open biases of RC4 Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra
2013/501 (PDF ) Type-Based Analysis of Protected Storage in the TPM (full version) Jianxiong Shao, Dengguo Feng, Yu Qin
2013/500 (PDF ) Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups Ran Canetti, Vinod Vaikuntanathan
2013/499 (PDF ) Limits on the Power of Cryptographic Cheap Talk Pavel Hubacek, Jesper Buus Nielsen, Alon Rosen
2013/498 (PDF ) Non-Malleable Codes from Two-Source Extractors Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
2013/497 (PDF ) Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Zhengjun Cao, Hanyue Cao
2013/496 (PDF ) Rational Protocol Design: Cryptography Against Incentive-driven Adversaries Juan Garay, Jonathan Katz, Ueli Maurer, Bjoern Tackmann, Vassilis Zikas
2013/495 (PDF ) Revocable IBE Systems with Almost Constant-size Key Update Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang
2013/494 (PDF ) Differential Fault Attack against Grain family with very few faults and minimal assumptions Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra
2013/493 (PDF ) A new class of semi-bent quadratic Boolean functions Chunming Tang, Yanfeng Qi
2013/492 (PDF ) Cryptographically Enforced RBAC Anna Lisa Ferrara, George Fuchsbauer, Bogdan Warinschi
2013/491 (PDF ) Improved OT Extension for Transferring Short Secrets Vladimir Kolesnikov, Ranjit Kumaresan
2013/490 (PDF ) For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes Masoumeh Safkhani, Nasour Bagheri
2013/489 (PDF ) An Efficient Scheme for Centralized Group Key Management in Collaborative Environments Constantinos Patsakis, Agusti Solanas
2013/488 (PDF ) Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency Kwangsu Lee, Dong Hoon Lee
2013/487 (PDF ) Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2013/483 (PDF ) A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun
2013/482 (PDF ) Bounds in Shallows and in Miseries Céline Blondeau, Andrey Bogdanov, Gregor Leander
2013/481 (PDF ) Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012 Yosuke Todo, Keita Xagawa
2013/480 (PDF ) Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz, Ron D. Rothblum
2013/479 (PDF ) Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks B. Skoric
2013/478 (PDF ) Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach Stefan G. Weber
2013/477 (PDF ) Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing Renaud Dubois, Margaux Dugardin, Aurore Guillevic
2013/476 (PDF ) Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
2013/475 (PDF ) A note on verifying the APN property Pascale Charpin, Gohar M. Kyureghyan
2013/474 (PDF ) Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications Zhengjun Cao
2013/473 (PDF ) The Norwegian Internet Voting Protocol Kristian Gjøsteen
2013/472 (PDF ) Partially blind password-based signatures using elliptic curves Kristian Gjøsteen
2013/471 (PDF ) Obfuscating Conjunctions Zvika Brakerski, Guy N. Rothblum
2013/470 (PDF ) Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2013/469 (PDF ) Verifiable Delegation of Computation on Outsourced Data Michael Backes, Dario Fiore, Raphael M. Reischuk
2013/468 (PDF ) How To Construct Extractable One-Way Functions Against Uniform Adversaries Nir Bitansky, Ran Canetti, Omer Paneth
2013/467 (PDF ) Analysis of BLAKE2 Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu
2013/466 (PDF ) Efficient computation of addition-subtraction chains using generalized continued Fractions Amadou Tall, Ali Yassin Sanghare
2013/465 (PDF ) Practical & Provably Secure Distance-Bounding Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2013/464 (PDF ) Towards A Practical JCJ / Civitas Implementation Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig
2013/463 (PDF ) Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
2013/462 (PDF ) VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2013/461 (PDF ) HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware Zongbin Liu, Neng Gao, Jiwu Jing, Peng Liu
2013/460 (PDF ) Solving Terminal Revocation in EAC by Augmenting Terminal Authentication Rafik Chaabouni
2013/459 (PDF ) Reset Indifferentiability and its Consequences Paul Baecher, Chris Brzuska, Arno Mittelbach
2013/458 (PDF ) Exponentiating in Pairing Groups Joppe W. Bos, Craig Costello, Michael Naehrig
2013/457 (PDF ) Deduction Soundness: Prove One, Get Five for Free Florian Böhl, Véronique Cortier, Bogdan Warinschi
2013/456 (PDF ) On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R, B B Amberker
2013/455 (PDF ) Another Nail in the Coffin of White-Box AES Implementations Tancrède Lepoint, Matthieu Rivain
2013/454 (PDF ) How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai, Brent Waters
2013/453 (PDF ) Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags Nasour Bagheri, Masoumeh Safkhani
2013/452 (PDF ) Secure Channel Coding Schemes based on Polar Codes Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram
2013/451 (PDF ) Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters
2013/450 (PDF ) Revisiting the BGE Attack on a White-Box AES Implementation Yoni De Mulder, Peter Roelse, Bart Preneel
2013/449 (PDF ) A Note On the Storage Requirement for AKS Primality Testing Algorithm Zhengjun Cao
2013/448 (PDF ) Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom, Katrina Falkner
2013/447 (PDF ) Dynamic Runtime Methods to Enhance Private Key Blinding Karine Gandolfi-Villegas, Nabil Hamzi
2013/446 (PDF ) Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
2013/445 (PDF ) Implementing Lightweight Block Ciphers on x86 Architectures Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
2013/444 (PDF ) Sequential message authentication code without random oracles Bin Wang, Xiaojing Hong
2013/443 (PDF ) Optimally Anonymous and Transferable Conditional E-cash Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu
2013/442 (PDF ) On Fair Exchange, Fair Coins and Fair Sampling Shashank Agrawal, Manoj Prabhakaran
2013/440 (PDF ) Revisiting Conditional Rényi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption Mitsugu Iwamoto, Junji Shikata
2013/439 (PDF ) Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID Peter Pessl, Michael Hutter
2013/438 (PDF ) Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
2013/437 (PDF ) A Uniform Min-Max Theorem with Applications in Cryptography Salil Vadhan, Colin Jia Zheng
2013/436 (PDF ) Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
2013/435 (PDF ) Efficient Cryptosystems From $2^k$-th Power Residue Symbols Fabrice Benhamouda, Javier Herranz, Marc Joye, Benoît Libert
2013/434 (PDF ) Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures Susan Hohenberger, Amit Sahai, Brent Waters
2013/433 (PDF ) On Symmetric Encryption with Distinguishable Decryption Failures Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2013/432 (PDF ) How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling Eric Brier, David Naccache, Li-yao Xia
2013/431 (PDF ) Practical-Time Attacks Against Reduced Variants of MISTY1 Orr Dunkelman, Nathan Keller
2013/430 (PDF ) Security of the Misty Structure Beyond the Birthday Bound Jooyoung Lee
2013/429 (PDF ) DupLESS: Server-Aided Encryption for Deduplicated Storage Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart
2013/428 (PDF ) Faster 128-EEA3 and 128-EIA3 Software Roberto Avanzi, Billy Bob Brumley
2013/427 (PDF ) Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials Jiangtao Han, Haining Fan
2013/426 (PDF ) Efficient Garbling from a Fixed-Key Blockcipher Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway
2013/425 (PDF ) Break WEP Faster with Statistical Analysis Rafik Chaabouni
2013/424 (PDF ) Instantiating Random Oracles via UCEs Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
2013/423 (PDF ) Locally Computable UOWHF with Linear Shrinkage Benny Applebaum, Yoni Moses
2013/422 (PDF ) Private Database Queries Using Somewhat Homomorphic Encryption Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
2013/421 (PDF ) Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results) Valentina Banciu, Simon Hoerder, Dan Page
2013/420 (PDF ) The Holey Grail: A special score function for non-binary traitor tracing B. Skoric, J. -J. Oosterwijk, J. Doumen
2013/419 (PDF ) How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin, Sara Krehbiel, Chris Peikert
2013/418 (PDF ) On Tight Security Proofs for Schnorr Signatures Nils Fleischhacker, Tibor Jager, Dominique Schröder
2013/417 (PDF ) The Improved Cube Attack on Grain-v1 Yongjuan Wang, Liren Ding, Wenbao Han, Xiangyu Wang
2013/416 (PDF ) Computational Fuzzy Extractors Benjamin Fuller, Xianrui Meng, Leonid Reyzin
2013/415 (PDF ) SL2 homomorphic hash functions: Worst case to average case reduction and short collision search Ciaran Mullan, Boaz Tsaban
2013/414 (PDF ) A novel certificateless deniable authentication protocol Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li
2013/413 (PDF ) Policy-Based Signatures Mihir Bellare, Georg Fuchsbauer
2013/412 (PDF ) Moduar Form Aprroach to Solving Lattice Problems Yuan Tian, Xueyong Zhu, Rongxin Sun
2013/411 (PDF ) Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan
2013/410 (PDF ) Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI Yossi Gilad, Amir Herzberg
2013/409 (PDF ) Order-Preserving Encryption Secure Beyond One-Wayness Tal Malkin, Isamu Teranishi, Moti Yung
2013/408 (PDF ) Delegatable Functional Signatures Michael Backes, Sebastian Meiser, Dominique Schröder
2013/407 (PDF ) Automated Security Proofs for Almost-Universal Hash for MAC verification Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
2013/405 (PDF ) New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields Chunming Tang, Yanfeng Qi, Maozhi Xu
2013/404 (PDF ) The SIMON and SPECK Families of Lightweight Block Ciphers Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2013/403 (PDF ) Function-Private Subspace-Membership Encryption and Its Applications Dan Boneh, Ananth Raghunathan, Gil Segev
2013/402 (PDF ) Efficient Two-Pass Anonymous Identity Authentication Using Smart Card Jue-Sam Chou, Chun-Hui Huang, Yu-Siang Huang, Yalin Chen
2013/401 (PDF ) Functional Signatures and Pseudorandom Functions Elette Boyle, Shafi Goldwasser, Ioana Ivan
2013/400 (PDF ) A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic Razvan Barbulescu, Pierrick Gaudry, Antoine Joux, Emmanuel Thomé
2013/399 (PDF ) Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol Roel Peeters, Jens Hermans
2013/398 (PDF ) ASICS: Authenticated Key Exchange Security Incorporating Certification Systems Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
2013/397 (PDF ) Practical Secure Logging: Seekable Sequential Key Generators Giorgia Azzurra Marson, Bertram Poettering
2013/396 (PDF ) On the Practical Security of a Leakage Resilient Masking Scheme Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2013/394 (PDF ) A Public Key Cryptoscheme Using Bit-pair Shadows Shenghui Su, Shuwang Lü, Maozhi Xu, Tao Xie
2013/393 (PDF ) Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model Yong Li, Zheng Yang
2013/392 (PDF ) Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves Christian Hanser, Daniel Slamanig
2013/391 (PDF ) Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$ Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2013/390 (PDF ) Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada
2013/389 (PDF ) A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
2013/388 (PDF ) Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi
2013/387 (PDF ) Cryptographically Protected Prefixes for Location Privacy in IPv6 Jonathan Trostle, Hosei Matsuoka, James Kempf, Toshiro Kawahara, Ravi Jain
2013/386 (PDF ) Side Channel Attacks against Pairing over Theta Functions Nadia El Mrabet
2013/384 (PDF ) Sequential Aggregate Signatures Made Shorter Kwangsu Lee, Dong Hoon Lee, Moti Yung
2013/383 (PDF ) Lattice Signatures and Bimodal Gaussians Léo Ducas, Alain Durmus, Tancrède Lepoint, Vadim Lyubashevsky
2013/382 (PDF ) To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC Yevgeniy Dodis, Thomas Ristenpart, John Steinberger, Stefano Tessaro
2013/380 (PDF ) Comments on Three Multi-Server Authentication Protocols Yalin Chen, Jue-Sam Chou, Wen-Yi Tsai
2013/379 (PDF ) Delegatable Pseudorandom Functions and Applications Aggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias
2013/378 (PDF ) A note on quantum related-key attacks Martin Roetteler, Rainer Steinwandt
2013/377 (PDF ) An Algebraic Framework for Diffie-Hellman Assumptions Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Villar
2013/376 (PDF ) An Accurate Probabilistic Reliability Model for Silicon PUFs Roel Maes
2013/375 (PDF ) NaCl on 8-Bit AVR Microcontrollers Michael Hutter, Peter Schwabe
2013/374 (PDF ) A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN Majid Bayat, Mohammad Reza Aref
2013/373 (PDF ) Injective Encoding to Elliptic Curves Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi
2013/372 (PDF ) Practical Bootstrapping in Quasilinear Time Jacob Alperin-Sheriff, Chris Peikert
2013/371 (PDF ) Domain-Polymorphic Programming of Privacy-Preserving Applications Dan Bogdanov, Peeter Laud, Jaak Randmets
2013/370 (PDF ) Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions François-Xavier Standaert, Olivier Pereira, Yu Yu
2013/369 (PDF ) Block Ciphers that are Easier to Mask: How Far Can we Go? Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert
2013/368 (PDF ) Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique-- Jacques Patarin
2013/367 (PDF ) On the Security of TLS-DH and TLS-RSA in the Standard Model Florian Kohlar, Sven Schäge, Jörg Schwenk
2013/366 (PDF ) Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128 Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin
2013/365 (PDF ) Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model Zheng Yang
2013/364 (PDF ) On the Achievability of Simulation-Based Security for Functional Encryption Angelo De Caro, Vincenzo Iovino Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano
2013/363 (PDF ) A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems -- Masao KASAHARA
2013/362 (PDF ) A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor Shigeo MITSUNARI
2013/361 (PDF ) Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2013/360 (PDF ) Achieving the limits of the noisy-storage model using entanglement sampling Frédéric Dupuis, Omar Fawzi, Stephanie Wehner
2013/359 (PDF ) A heuristic for finding compatible differential paths with application to HAS-160 Aleksandar Kircanski, Riham AlTawy, Amr M. Youssef
2013/358 (PDF ) Counter-cryptanalysis Marc Stevens
2013/357 (PDF ) The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE Dmitry Khovratovich, Christian Rechberger
2013/356 (PDF ) Verifying Computations with State (Extended Version) Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, Michael Walfish
2013/355 (PDF ) New Attacks against Transformation-Based Privacy-Preserving Linear Programming Peeter Laud, Alisa Pankova
2013/354 (PDF ) Programmable Hash Functions in the Multilinear Setting Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, Christoph Striecks
2013/353 (PDF ) Profiling DPA: Efficacy and efficiency trade-offs Carolyn Whitnall, Elisabeth Oswald
2013/352 (PDF ) Constrained Pseudorandom Functions and Their Applications Dan Boneh, Brent Waters
2013/351 (PDF ) Time-Optimal Interactive Proofs for Circuit Evaluation Justin Thaler
2013/350 (PDF ) Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
2013/349 (PDF ) A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation Martin Hirt, Christoph Lucas, Ueli Maurer
2013/348 (PDF ) Multi-file proofs of retrievability for cloud storage auditing Bin Wang, Xiaojing Hong
2013/347 (PDF ) STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
2013/346 (PDF ) Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson
2013/345 (PDF ) Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012 Arnab Roy, Srinivas Vivek
2013/344 (PDF ) Limits of provable security for homomorphic encryption Andrej Bogdanov, Chin Ho Lee
2013/343 (PDF ) Quantum one-time programs Anne Broadbent, Gus Gutoski, Douglas Stebila
2013/342 (PDF ) Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices Xiang Xie, Rui Xue
2013/341 (PDF ) Trapdoor Smooth Projective Hash Functions Fabrice Benhamouda, David Pointcheval
2013/340 (PDF ) Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based Craig Gentry, Amit Sahai, Brent Waters
2013/339 (PDF ) On the Security of the TLS Protocol: A Systematic Analysis Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee
2013/338 (PDF ) Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs
2013/337 (PDF ) Attribute-Based Encryption for Circuits Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2013/335 (PDF ) Parallel and Dynamic Searchable Symmetric Encryption Seny Kamara, Charalampos Papamanthou
2013/334 (PDF ) Protecting PUF Error Correction by Codeword Masking Dominik Merli, Frederic Stumpf, Georg Sigl
2013/333 (PDF ) Double-authentication-preventing signatures Bertram Poettering, Douglas Stebila
2013/332 (PDF ) A method for obtaining lower bounds on the higher order nonlinearity of Boolean function Mikhail S. Lobanov
2013/331 (PDF ) New Constructions and Applications of Trapdoor DDH Groups Yannick Seurin
2013/330 (PDF ) Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga, Qiang Tang, Peter Ryan
2013/329 (PDF ) Protocol Variants and Electronic Identification Kristian Gjøsteen
2013/328 (PDF ) Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20 Nicky Mouha, Bart Preneel
2013/327 (PDF ) A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack Shenghui Su, Tao Xie, Shuwang Lü
2013/326 (PDF ) Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig Mihir Bellare, Sarah Meiklejohn, Susan Thomson
2013/325 (PDF ) Elligator: Elliptic-curve points indistinguishable from uniform random strings Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange
2013/324 (PDF ) Sieve-in-the-Middle: Improved MITM Attacks (Full Version) Anne Canteaut, María Naya-Plasencia, Bastien Vayssiere
2013/323 (PDF ) Encryption Schemes with Post-Challenge Auxiliary Inputs Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu
2013/322 (PDF ) BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
2013/321 (PDF ) Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote
2013/320 (PDF ) Instantaneous Frequency Analysis Roman Korkikian, David Naccache, Guilherme Ozari de Almeida
2013/319 (PDF ) On the use of continued fractions for stream ciphers Amadou Moctar Kane
2013/318 (PDF ) Fully-Anonymous Functional Proxy-Re-Encryption Yutaka Kawai, Katsuyuki Takashima
2013/317 (PDF ) Anon-Pass: Practical Anonymous Subscriptions Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel
2013/316 (PDF ) Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
2013/315 (PDF ) Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes Albrecht Petzoldt
2013/314 (PDF ) Keyed Side-Channel Based Hashing for IP Protection using Wavelets Timo Bartkewitz
2013/313 (PDF ) Pairing Inversion via Non-degenerate Auxiliary Pairings Seunghwan Chang, Hoon Hong, Eunjeong Lee, Hyang-Sook Lee
2013/312 (PDF ) Families of fast elliptic curves from Q-curves Benjamin Smith
2013/311 (PDF ) Four-dimensional GLV via the Weil restriction Aurore Guillevic, Sorina Ionica
2013/310 (PDF ) MinimaLT: Minimal-latency Networking Through Better Security W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange
2013/309 (PDF ) Bypassing Passkey Authentication in Bluetooth Low Energy Tomas Rosa
2013/308 (PDF ) Lattice-Based Group Signatures with Logarithmic Signature Size Fabien Laguillaumie, Adeline Langlois, Benoit Libert, Damien Stehle
2013/307 (PDF ) Maliciously Circuit-Private FHE Rafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky
2013/306 (PDF ) Solving a $6120$-bit DLP on a Desktop Computer Faruk Golouglu, Robert Granger, Gary McGuire, Jens Zumbragel
2013/305 (PDF ) Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis Sonia Belaid, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jorn-Marc Schmidt, Francois-Xavier Standaert, Stefan Tillich
2013/304 (PDF ) Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede
2013/303 (PDF ) Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions Shivam Bhasin, Claude Carlet, Sylvain Guilley
2013/302 (PDF ) Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors Nicolas T. Courtois
2013/301 (PDF ) Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128 Zheng Yuan, Xian Li, Bart Preneel
2013/300 (PDF ) A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups Allison Lewko, Sarah Meiklejohn
2013/299 (PDF ) Computing class polynomials for abelian surfaces Andres Enge, Emmanuel Thomé
2013/298 (PDF ) Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wojcik
2013/297 (PDF ) Improvement and Efficient Implementation of a Lattice-based Signature Scheme Rachid El Bansarkhani, Johannes Buchmann
2013/296 (PDF ) Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption Morten Dahl, Ivan Damgård
2013/295 (PDF ) Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks Mickaël Cazorla, Kevin Marquet, Marine Minier
2013/294 (PDF ) Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis Colin O'Flynn, Zhizhang (David) Chen
2013/293 (PDF ) A Toolkit for Ring-LWE Cryptography Vadim Lyubashevsky, Chris Peikert, Oded Regev
2013/292 (PDF ) A Leakage Resilient MAC Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wojcik
2013/291 (PDF ) Security ranking among assumptions within the Uber assumption framework Antoine Joux, Antoine Rojat
2013/290 (PDF ) Massive Group Message Authentication with Revocable Anonymity Boaz Catane, Amir Herzberg
2013/289 (PDF ) Secure Second Price Auctions with a Rational Auctioneer Boaz Catane, Amir Herzberg
2013/288 (PDF ) Key Classification Attack on Block Ciphers Maghsoud Parviz, Seyed Hassan Mousavi, Saeed Mirahmadi
2013/287 (PDF ) The failure of McEliece PKC based on Reed-Muller codes. I. V. Chizhov, M. A. Borodin
2013/286 (PDF ) Salvaging Indifferentiability in a Multi-stage Setting Arno Mittelbach
2013/285 (PDF ) A Novel Proof on Weil Pairing Sutirtha Sanyal
2013/284 (PDF ) A Secure Paper-Based Electronic Voting With No Encryption Asghar Tavakkoli, Reza Ebrahimi Atani
2013/283 (PDF ) Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh, Ananth Raghunathan, Gil Segev
2013/282 (PDF ) Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes Goutam Paul, Anupam Chattopadhyay
2013/281 (PDF ) Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting Carlos Aguilar-Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit
2013/280 (PDF ) Path ORAM: An Extremely Simple Oblivious RAM Protocol Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas
2013/279 (PDF ) Pinocchio: Nearly Practical Verifiable Computation Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova
2013/278 (PDF ) A Frequency Leakage Model and its application to CPA and DPA S. Tiran, S. Ordas, Y. Teglia, M. Agoyan, P. Maurine
2013/277 (PDF ) ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2013/276 (PDF ) Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs David Bernhard, Stephan Neumann, Melanie Volkamer
2013/275 (PDF ) The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI (Extended Version) Johannes Braun, Gregor Rynkowski
2013/273 (PDF ) Computing the Rank of Incidence Matrix and the Algebraic Immunity of Boolean Functions Deepak Kumar Dalai
2013/272 (PDF ) Cryptography Challenges for Computational Privacy in Public Clouds Sashank Dara
2013/271 (PDF ) The Legal Classification of Identity-Based Signatures Christoph Sorge
2013/270 (PDF ) Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters Yu Yu
2013/269 (PDF ) CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion Jonathan Trostle
2013/268 (PDF ) Dynamic Cube Attack on Grain-v1 Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
2013/267 (PDF ) Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction S. Dov Gordon, Tal Malkin, Mike Rosulek, Hoeteck Wee
2013/266 (PDF ) L-P States of RC4 Stream Cipher Jing Lv, Dongdai Lin
2013/265 (PDF ) Attribute-Based Encryption with Fast Decryption Susan Hohenberger, Brent Waters
2013/264 (PDF ) Encrypted Secret Sharing and Analysis by Plaintext Randomization Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
2013/263 (PDF ) Speeding up QUAD Albrecht Petzoldt
2013/262 (PDF ) An efficient FHE based on the hardness of solving systems of non-linear multivariate equations Gérald Gavin
2013/261 (PDF ) Secure information transmission based on physical principles Dima Grigoriev, Vladimir Shpilrain
2013/260 (PDF ) From Weak to Strong Zero-Knowledge and Applications Kai-Min Chung, Edward Lui, Rafael Pass
2013/259 (PDF ) Private Interactive Communication Across an Adversarial Channel Ran Gelles, Amit Sahai, Akshay Wadia
2013/258 (PDF ) Witness Encryption and its Applications Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters
2013/257 (PDF ) Secure two-party computation: a visual way Paolo D'Arco, Roberto De Prisco
2013/256 (PDF ) On the Lossiness of the Rabin Trapdoor Function Yannick Seurin
2013/255 (PDF ) How to Construct an Ideal Cipher from a Small Set of Public Permutations Rodolphe Lampe, Yannick Seurin
2013/254 (PDF ) Towards Adoption of DNSSEC: Availability and Security Challenges Amir Herzberg, Haya Shulman
2013/253 (PDF ) CacheAudit: A Tool for the Static Analysis of Cache Side Channels Goran Doychev, Dominik Feld, Boris Köpf, Laurent Mauborgne, Jan Reineke
2013/252 (PDF ) On the Primitivity of some Trinomials over Finite Fields LI Yujuan, WANG Huaifu, ZHAO Jinhua
2013/251 (PDF ) Permutation Polynomials and Their Differential Properties over Residue Class Rings Yuyin Yu, Mingsheng Wang
2013/250 (PDF ) Fully Homomorphic Encryption for Mathematicians Alice Silverberg
2013/249 (PDF ) How to Factor N_1 and N_2 When p_1=p_2 mod 2^t Kaoru Kurosawa, Takuma Ueda
2013/248 (PDF ) Another Look at Security Theorems for 1-Key Nested MACs Neal Koblitz, Alfred Menezes
2013/247 (PDF ) Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
2013/246 (PDF ) A New Lever Function with Adequate Indeterminacy Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu
2013/245 (PDF ) The Fiat-Shamir Transformation in a Quantum World Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni
2013/244 (PDF ) Cryptographic schemes, key exchange, public key. Ted Hurley
2013/243 (PDF ) A Simple ORAM Kai-Min Chung, Rafael Pass
2013/242 (PDF ) AE5 Security Notions: Definitions Implicit in the CAESAR Call Chanathip Namprempre, Phillip Rogaway, Tom Shrimpton
2013/241 (PDF ) The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4 Joachim Strömbergson, Simon Josefsson
2013/240 (PDF ) Algebraic analysis of Trivium-like ciphers Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson
2013/239 (PDF ) Optimizing ORAM and Using it Efficiently for Secure Computation Craig Gentry, Kenny Goldman, Shai Halevi, Charanjit Julta, Mariana Raykova, Daniel Wichs
2013/238 (PDF ) Anonymity-preserving Public-Key Encryption: A Constructive Approach Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
2013/237 (PDF ) Type-Based Analysis of Generic Key Management APIs (Long Version) Pedro Adão, Riccardo Focardi, Flaminia L. Luccio
2013/236 (PDF ) A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo
2013/235 (PDF ) Ballot secrecy and ballot independence: definitions and relations Ben Smyth, David Bernhard
2013/234 (PDF ) A Cryptographic Analysis of OPACITY Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
2013/233 (PDF ) Attacks on JH, Grøstl and SMASH Hash Functions Yiyuan Luo, Xuejia Lai
2013/232 (PDF ) Quantum algorithms to check Resiliency, Symmetry and Linearity of a Boolean function Kaushik Chakraborty, Anupam Chattopadhyay, Subhamoy Maitra
2013/231 (PDF ) Sakura: a flexible coding for tree hashing Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2013/230 (PDF ) Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt'' Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
2013/229 (PDF ) How to Run Turing Machines on Encrypted Data Shafi Goldwasser, Yael Kalai, Raluca Ada Popa, Vinod Vaikuntanathan, Nickolai Zeldovich
2013/228 (PDF ) Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park
2013/227 (PDF ) Analysis of authentication and key establishment in inter-generational mobile telephony Chunyu Tang, David A. Naumann, Susanne Wetzel
2013/226 (PDF ) Public key exchange using semidirect product of (semi)groups Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
2013/225 (PDF ) Transparent, Distributed, and Replicated Dynamic Provable Data Possession Mohammad Etemad, Alptekin Küpçü
2013/224 (PDF ) On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater
2013/223 (PDF ) The PACE|AA Protocol for Machine Readable Travel Documents, and its Security Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2013/222 (PDF ) Tight security bounds for key-alternating ciphers Shan Chen, John Steinberger
2013/221 (PDF ) Identity-based Aggregate Signatures with Verifiable Single Ones Yang Zhang, Jun-liang Chen
2013/220 (PDF ) Towards Efficient Private Distributed Computation on Unbounded Input Streams Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
2013/219 (PDF ) Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes Stefan G. Weber
2013/218 (PDF ) Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves Aurore Guillevic
2013/217 (PDF ) Computing on Authenticated Data for Adjustable Predicates Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
2013/216 (PDF ) Election Verifiability or Ballot Privacy: Do We Need to Choose? Edouard Cuvelier, Olivier Pereira, Thomas Peters
2013/215 (PDF ) Optical PUFs Reloaded Ulrich Rührmair, Christian Hilgers, Sebastian Urban, Agnes Weiershäuser, Elias Dinter, Brigitte Forster, Christian Jirauschek
2013/214 (PDF ) Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System Filip Zagorski, Richard T. Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora
2013/213 (PDF ) On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes Guangjun Fan, Yongbin Zhou, F. -X. Standaert, Dengguo Feng
2013/212 (PDF ) A Closer Look at HMAC Krzysztof Pietrzak
2013/211 (PDF ) A new criterion for avoiding the propagation of linear relations through an Sbox (Full version) Christina Boura, Anne Canteaut
2013/210 (PDF ) Cryptophia's Short Combiner for Collision-Resistant Hash Functions Arno Mittelbach
2013/209 (PDF ) New modular multiplication and division algorithms based on continued fraction expansion Mourad Gouicem
2013/208 (PDF ) CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
2013/207 (PDF ) Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng
2013/206 (PDF ) Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko
2013/205 (PDF ) Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$ Jan Camenisch, Robert R. Enderlein, Victor Shoup
2013/204 (PDF ) Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture Shi Pu, Jyh-Charn Liu
2013/203 (PDF ) From oblivious AES to efficient and secure database join in the multiparty setting Sven Laur, Riivo Talviste, Jan Willemson
2013/202 (PDF ) Breaking NLM-MAC Generator Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld
2013/201 (PDF ) Non-malleable Codes from Additive Combinatorics Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett
2013/200 (PDF ) Selecting polynomials for the Function Field Sieve Razvan Barbulescu
2013/199 (PDF ) Quantum algorithms for the subset-sum problem Daniel J. Bernstein, Stacey Jeffery, Tanja Lange, Alexander Meurer
2013/198 (PDF ) On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes Zhizhou Li, Ten H. Lai
2013/197 (PDF ) Discrete logarithm in GF(2^809) with FFS Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann
2013/196 (PDF ) Fast Two-Party Secure Computation with Minimal Assumptions abhi shelat, Chih-hao Shen
2013/195 (PDF ) On the (re)design of an FPGA-based PUF Philipp Grabher, Dan Page, Marcin Wójcik
2013/194 (PDF ) On the Impossibility of Cryptography with Tamperable Randomness Per Austrin, Kai-Min Chung, Mohammad Mahmoody, Rafael Pass, Karn Seth
2013/193 (PDF ) Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng
2013/192 (PDF ) A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties David Lubicz, Damien Robert
2013/191 (PDF ) Improved Differential Fault Analysis on ARIA using Small Number of Faults Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
2013/190 (PDF ) Power Analysis Attacks against FPGA Implementations of KLEIN Shaohua Tang, Jianhao Wu, Weijian Li, Zheng Gong
2013/189 (PDF ) Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes Appala Naidu Tentu, Prabal Paul, V Ch Venkaiah
2013/188 (PDF ) A family of 6-to-4-bit S-boxes with large linear branch number Daniel Loebenberger, Michael Nüsken
2013/187 (PDF ) Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model Jorge Munilla, Alberto Peinado, Guoming Yang, Willy Susilo
2013/186 (PDF ) On the (Im)possibility of Projecting Property in Prime-Order Setting Jae Hong Seo
2013/185 (PDF ) Security Analysis of Linearly Filtered NLFSRs Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld, Harry Bartlett
2013/184 (PDF ) The Vernam cipher is robust to small deviations from randomness Boris Ryabko
2013/183 (PDF ) Practical Multilinear Maps over the Integers Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2013/182 (PDF ) Collusion-Resistant Domain-Specific Pseudonymous Signatures Julien Bringer, Herve Chabanne, Alain Patey
2013/181 (PDF ) On the evaluation of modular polynomials Andrew V. Sutherland
2013/180 (PDF ) A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code Masao KASAHARA
2013/179 (PDF ) Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2013/178 (PDF ) Cryptanalysis of RC4(n,m) Stream Cipher Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld
2013/177 (PDF ) A generic construction for voting correctness at minimum cost - Application to Helios Veronique Cortier, David Galindo, Stephane Glondu, Malika Izabachene
2013/176 (PDF ) Distinguishing Attacks on RC4 and A New Improvement of the Cipher Jing Lv, Bin Zhang, Dongdai Lin
2013/175 (PDF ) Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano
2013/174 (PDF ) Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key Deukjo Hong, Daesung Kwon
2013/173 (PDF ) On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems" Ray Perlner, Daniel Smith-Tone
2013/172 (PDF ) On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version) Raphael Spreitzer, Thomas Plos
2013/171 (PDF ) Confined Guessing: New Signatures From Standard Assumptions Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
2013/170 (PDF ) Fast Collision Attack on MD5 Tao Xie, Fanbao Liu, Dengguo Feng
2013/169 (PDF ) Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel Rosu, Michael Steiner
2013/168 (PDF ) On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage Simon Hoerder, Kimmo Järvinen, Dan Page
2013/167 (PDF ) Single Password Authentication Tolga Acar, Mira Belenkiy, Alptekin Küpçü
2013/166 (PDF ) On generalized semi-bent (and partially bent) Boolean functions Brajesh Kumar Singh
2013/164 (PDF ) Provably Secure LWE Encryption with Smallish Uniform Noise and Secret Daniel Cabarcas, Florian Göpfert, Patrick Weiden
2013/163 (PDF ) Search Pattern Leakage in Searchable Encryption: Attacks and New Construction Chang Liu, Liehuang Zhu, Mingzhong Wang, Yu-an Tan
2013/162 (PDF ) A Non Asymptotic Analysis of Information Set Decoding Yann Hamdaoui, Nicolas Sendrier
2013/161 (PDF ) Completeness Theorems for All Finite Stateless 2-Party Primitives Daniel Kraschewski
2013/160 (PDF ) Interactive Coding, Revisited Kai-Min Chung, Rafael Pass, Sidharth Telang
2013/159 (PDF ) Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme Dingding Jia, Bao Liand Yamin Liu, Qixiang Mei
2013/158 (PDF ) Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version) Armando Faz-Hernandez, Patrick Longa, Ana H. Sanchez
2013/157 (PDF ) The fragility of AES-GCM authentication algorithm Shay Gueron, Vlad Krasnov
2013/156 (PDF ) Incentivizing Outsourced Computation Mira Belenkiy, Melissa Chase, C. Chris Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya
2013/155 (PDF ) MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
2013/154 (PDF ) Optimal Suspicion Functions for Tardos Traitor Tracing Schemes Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen
2013/153 (PDF ) On the security of a certicateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang
2013/152 (PDF ) Policy-based Secure Deletion Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti
2013/151 (PDF ) Some Fixes To SSH Xu ZiJie
2013/150 (PDF ) Practical (Second) Preimage Attacks on TCS_SHA-3 Gautham Sekar, Soumyadeep Bhattacharya
2013/149 (PDF ) Secure and Constant Cost Public Cloud Storage Auditing with Deduplication Jiawei Yuan, Shucheng Yu
2013/148 (PDF ) AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again) Alexander Rostovtsev
2013/147 (PDF ) A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms Naomi Benger, Manuel Charlemagne, Kefei Chen
2013/146 (PDF ) High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition Joppe W. Bos, Craig Costello, Huseyin Hisil, Kristin Lauter
2013/145 (PDF ) Key Wrapping with a Fixed Permutation Dmitry Khovratovich
2013/144 (PDF ) On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes Gordon Procter, Carlos Cid
2013/143 (PDF ) An architecture for practical actively secure MPC with dishonest majority Marcel Keller, Peter Scholl, Nigel P. Smart
2013/142 (PDF ) A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES Kisoon YOON
2013/141 (PDF ) Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton M. Shakiba, M. Dakhilalian, H. Mala
2013/140 (PDF ) Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures Marc Fischlin, Nils Fleischhacker
2013/139 (PDF ) Rethinking Definitions of Security for Session Key Agreement Wesley George, Charles Rackoff
2013/138 (PDF ) Multi-bit homomorphic encryption based on learning with errors over rings Zhang Wei, Liu Shuguang, Yang Xiaoyuan
2013/137 (PDF ) How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation Payman Mohassel, Saeed Sadeghian
2013/136 (PDF ) 2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers Dieter Schmidt
2013/135 (PDF ) An MQ/Code Cryptosystem Proposal Leonard J. Schulman
2013/134 (PDF ) Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III
2013/133 (PDF ) New Lattice Based Signature Using The Jordan Normal Form Hemlata Nagesh, Birendra Kumar Sharma
2013/132 (PDF ) Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme Niu Liu, Shaohua Tang, Lingling Xu
2013/131 (PDF ) Two is the fastest prime: lambda coordinates for binary elliptic curves Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez
2013/130 (PDF ) Blank Digital Signatures Christian Hanser, Daniel Slamanig
2013/129 (PDF ) An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa, Frank H. Li, Nickolai Zeldovich
2013/128 (PDF ) Attribute-Based Encryption for Circuits from Multilinear Maps Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters
2013/127 (PDF ) Oblivious PAKE: Efficient Handling of Password Trials Franziskus Kiefer, Mark Manulis
2013/126 (PDF ) Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin, Jan-Åke Larsson
2013/125 (PDF ) Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions Ananth Raghunathan, Gil Segev, Salil Vadhan
2013/123 (PDF ) Analysis and Improvement of Lindell's UC-Secure Commitment Schemes Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2013/122 (PDF ) Practical collision attack on 40-step RIPEMD-128 Gaoli Wang
2013/121 (PDF ) Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes Helger Lipmaa
2013/120 (PDF ) An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks
2013/119 (PDF ) Speeding up Ate Pairing Computation in Affine Coordinates Duc-Phong Le, Chik How Tan
2013/118 (PDF ) Throughput Optimized Implementations of QUAD Jason R. Hamlet, Robert W. Brocato
2013/117 (PDF ) On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s Namhun Koo, Gook Hwa Cho, Soonhak Kwon
2013/116 (PDF ) The Algorithm of AAES Shiyong Zhang, Gongliang Chen, Lei Fan
2013/115 (PDF ) A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
2013/114 (PDF ) Public Key Exchange Using Matrices Over Group Rings Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain
2013/113 (PDF ) Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA Nuray At, Jean-Luc Beuchat, Eiji Okamoto, Ismail San, Teppei Yamazaki
2013/112 (PDF ) PUF Modeling Attacks on Simulated and Silicon Data Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne Burleson, Srinivas Devadas
2013/111 (PDF ) Message Authentication Codes Secure against Additively Related-Key Attacks Keita Xagawa
2013/110 (PDF ) Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness Gilad Asharov, Yehuda Lindell, Tal Rabin
2013/109 (PDF ) Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces Charanjit S. Jutla, Arnab Roy
2013/108 (PDF ) Unconditionally Secure and Universally Composable Commitments from Physical Assumptions Ivan Damgard, Alessandra Scafuro
2013/107 (PDF ) On the Arithmetic Complexity of Strassen-Like Matrix Multiplications Murat Cenk, M. Anwar Hasan
2013/105 (PDF ) Lossy Chains and Fractional Secret Sharing Yuval Ishai, Eyal Kushilevitz, Omer Strulovich
2013/104 (PDF ) A Tutorial on White-box AES James A. Muir
2013/103 (PDF ) On the Complexity of Broadcast Setup Martin Hirt, Pavel Raykov
2013/102 (PDF ) On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis Yuchen Cao, Yongbin Zhou, Zhenmei Yu
2013/101 (PDF ) Notions of Black-Box Reductions, Revisited Paul Baecher, Chris Brzuska, Marc Fischlin
2013/100 (PDF ) Attacks and Comments on Several Recently Proposed Key Management Schemes Niu Liu, Shaohua Tang, Lingling Xu
2013/099 (PDF ) Constant-round secure two-party computation from a linear number of oblivious transfer Samuel Ranellucci, Alain Tapp
2013/098 (PDF ) Learning with Rounding, Revisited: New Reduction, Properties and Applications Joel Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs
2013/097 (PDF ) Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2013/096 (PDF ) State convergence in bit-based stream ciphers Sui-Guan Teo, Harry Bartlett, Ali Alhamdan, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson
2013/095 (PDF ) A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic Antoine Joux
2013/094 (PDF ) On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption Adriana Lopez-Alt, Eran Tromer, Vinod Vaikuntanathan
2013/093 (PDF ) On the security of a certificateless aggregate signature scheme Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou
2013/092 (PDF ) Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs Vadim Lyubashevsky, Daniel Masny
2013/091 (PDF ) Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
2013/089 (PDF ) Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. James McLaughlin, John A. Clark
2013/088 (PDF ) Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World Dan Boneh, Mark Zhandry
2013/087 (PDF ) Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1)) Namhun Koo, Gook Hwa Cho, Soonhak Kwon
2013/086 (PDF ) Efficient Private File Retrieval by Combining ORAM and PIR Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2013/085 (PDF ) Between a Rock and a Hard Place: Interpolating Between MPC and FHE Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
2013/084 (PDF ) Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks Boris Skoric, Allard P. Mosk, Pepijn W. H. Pinkse
2013/083 (PDF ) A Security Framework for Analysis and Design of Software Attestation Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann
2013/082 (PDF ) Secret Sharing, Rank Inequalities, and Information Inequalities Sebastia Martin, Carles Padro, An Yang
2013/081 (PDF ) Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose Yan Huang, Jonathan Katz, Dave Evans
2013/080 (PDF ) An efficient attack of a McEliece cryptosystem variant based on convolutional codes Grégory Landais, Jean-Pierre Tillich
2013/079 (PDF ) Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries Yehuda Lindell
2013/078 (PDF ) Broadcast Steganography Nelly Fazio, Antonio R. Nicolosi, Irippuge Milinda Perera
2013/077 (PDF ) UC-Secure Multi-Session OT Using Tamper-Proof Hardware Kaoru Kurosawa, Ro Nojima, Le Trieu Phong
2013/076 (PDF ) Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas
2013/075 (PDF ) Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme Joppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig
2013/074 (PDF ) On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$ and $\F_{2^{3164}}$ Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
2013/073 (PDF ) Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently Marek Jawurek, Florian Kerschbaum, Claudio Orlandi
2013/072 (PDF ) The UC approach: an application view István Vajda
2013/071 (PDF ) Relation collection for the Function Field Sieve Jérémie Detrey, Pierrick Gaudry, Marion Videau
2013/070 (PDF ) Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen
2013/069 (PDF ) Hardness of SIS and LWE with Small Parameters Daniele Micciancio, Chris Peikert
2013/068 (PDF ) Why Proving HIBE Systems Secure is Difficult Allison Lewko, Brent Waters
2013/067 (PDF ) Power Analysis of Hardware Implementations Protected with Secret Sharing Guido Bertoni, Joan Daemen, Nicolas Debande, Thanh-Ha Le, Michael Peeters, Gilles Van Assche
2013/066 (PDF ) Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard Amin Mohammadali, Zahra Ahmadian, Mohammad Reza Aref
2013/065 (PDF ) Instantiating Treeless Signature Schemes Patrick Weiden, Andreas Hülsing, Daniel Cabarcas, Johannes Buchmann
2013/064 (PDF ) Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols Sven Laur, Bingsheng Zhang
2013/063 (PDF ) A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol Christian L. F. Corniaux, Hossein Ghodosi
2013/062 (PDF ) Symbolic Universal Composability Florian Böhl, Dominique Unruh
2013/061 (PDF ) On the Indifferentiability of Key-Alternating Ciphers Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
2013/060 (PDF ) On FHE without bootstrapping Aayush Jain
2013/059 (PDF ) Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay
2013/058 (PDF ) Cryptanalysis of the Dragonfly Key Exchange Protocol Dylan Clarke, Feng Hao
2013/057 (PDF ) CRT-based Fully Homomorphic Encryption over the Integers Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon
2013/056 (PDF ) On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography Kishan Chand Gupta, Indranil Ghosh Ray
2013/055 (PDF ) Secrecy without one-way functions Dima Grigoriev, Vladimir Shpilrain
2013/054 (PDF ) Joint Compartmented Threshold Access Structures Ali Aydın Selçuk, Ramazan Yılmaz
2013/053 (PDF ) A revocable certificateless signature scheme Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng
2013/052 (PDF ) Some Complexity Results and Bit Unpredictable for Short Vector Problem Kuan Cheng
2013/051 (PDF ) Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation Payman Mohassel, Ben Riva
2013/050 (PDF ) Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem Roohallah Rastaghi
2013/049 (PDF ) Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses Christopher Meyer, Jörg Schwenk
2013/048 (PDF ) Power Balanced Circuits for Leakage-Power-Attacks Resilient Design Basel Halak, Julian Murphy, Alex Yakovlev
2013/047 (PDF ) Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes Carles Padro
2013/046 (PDF ) Fast and Maliciously Secure Two-Party Computation Using the GPU Tore Kasper Frederiksen, Jesper Buus Nielsen
2013/044 (PDF ) Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions Fangguo Zhang, Xu Ma, Shengli Liu
2013/043 (PDF ) Differential Fault Attack on the PRINCE Block Cipher Ling Song, Lei Hu
2013/042 (PDF ) Complexity of Multi-Party Computation Functionalities Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2013/041 (PDF ) Trace Expression of r-th Root over Finite Field Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
2013/040 (PDF ) An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model Roohallah Rastaghi
2013/039 (PDF ) Creating a Challenge for Ideal Lattices Thomas Plantard, Michael Schneider
2013/038 (PDF ) Verifiable Data Streaming Dominique Schröder, Heike Schröder
2013/037 (PDF ) Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles Jayaprakash Kar
2013/036 (PDF ) Batch Fully Homomorphic Encryption over the Integers Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
2013/034 (PDF ) New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2013/033 (PDF ) CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2013/032 (PDF ) Detection of Cheaters in Non-interactive Polynomial Evaluation Maki Yoshida, Satoshi Obana
2013/031 (PDF ) An Analysis of the EMV Channel Establishment Protocol Chris Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson
2013/030 (PDF ) On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks Haiyan Sun
2013/029 (PDF ) Improved Differential Fault Attack on MICKEY 2.0 Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
2013/028 (PDF ) More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96 Stanislav Bulygin
2013/027 (PDF ) Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven Watson
2013/026 (PDF ) RSA private key reconstruction from random bits using SAT solvers Constantinos Patsakis
2013/025 (PDF ) The IITM Model: a Simple and Expressive Model for Universal Composability Ralf Kuesters, Max Tuengerthal, Daniel Rausch
2013/024 (PDF ) New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field Gook Hwa Cho, Namhun Koo, Eunhye Ha, Soonhak Kwon
2013/023 (PDF ) A New Practical Identity-Based Encryption System Jong Hwan Park, Dong Hoon Lee
2013/022 (PDF ) Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations. James McLaughlin, John A. Clark
2013/021 (PDF ) Rate-Limited Secure Function Evaluation Özgür Dagdelen, Payman Mohassel, Daniele Venturi
2013/020 (PDF ) Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles Markus Rückert, Dominique Schroeder
2013/019 (PDF ) Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaźi
2013/018 (PDF ) Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption Jae Hong Seo, Keita Emura
2013/017 (PDF ) Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions Alexandra Boldyreva, Robert Lychev
2013/016 (PDF ) Revocable Identity-Based Encryption Revisited: Security Model and Construction Jae Hong Seo, Keita Emura
2013/015 (PDF ) Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography Graham Enos
2013/014 (PDF ) On formal and automatic security verification of WSN transport protocols Ta Vinh Thong, Amit Dvir
2013/013 (PDF ) Efficiently Outsourcing Multiparty Computation under Multiple Keys Andreas Peter, Erik Tews, Stefan Katzenbeisser
2013/012 (PDF ) Tropical cryptography Dima Grigoriev, Vladimir Shpilrain
2013/011 (PDF ) Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity. James McLaughlin, John A. Clark
2013/010 (PDF ) Simultaneous Resettable WI from One-way Functions Kai-Min Chung, Rafael Pass
2013/009 (PDF ) Achieving Anonymity Against Major Face Recognition Algorithms Benedikt Driessen, Markus Dürmuth
2013/008 (PDF ) Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security Kai-Min Chung, Rafael Pass, Karn Seth
2013/007 (PDF ) A Matrix Approach for Constructing Quadratic APN Functions Yuyin Yu, Mingsheng Wang, Yongqiang Li
2013/006 (PDF ) Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks Qingfeng Cheng
2013/005 (PDF ) Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue, Faouzi Chekir
2013/004 (PDF ) Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices Damien Stehlé, Ron Steinfeld
2013/003 (PDF ) On Formal Expressions of BRW-polynomials Guillermo Morales-Luna
2013/002 (PDF ) Generalized (Identity-Based) Hash Proof System and Its Applications Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2013/001 (PDF ) Shielding circuits with groups Eric Miles, Emanuele Viola
[ Cryptology ePrint archive ]