Cryptology ePrint Archive: Listing for 2014
Regex
2014/1029 (PDF ) On the Cryptographic Hardness of Finding a Nash Equilibrium Nir Bitansky, Omer Paneth, Alon Rosen
2014/1028 (PDF ) Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13 Payal Chaudhari, Manik Lal Das, Anish Mathuria
2014/1027 (PDF ) Simple Lattice Trapdoor Sampling from a Broad Class of Distributions Vadim Lyubashevsky, Daniel Wichs
2014/1026 (PDF ) Lattices with Symmetry H. W. Lenstra Jr., A. Silverberg
2014/1025 (PDF ) XPIR: Private Information Retrieval for Everyone Carlos Aguilar-Melchor, Joris Barrier, Laurent Fousse, Marc-Olivier Killijian
2014/1024 (PDF ) Cryptanalysis of the Co-ACD Assumption Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi
2014/1023 (PDF ) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search Nathan E. Price, Alan T. Sherman
2014/1022 (PDF ) Topology-Hiding Computation Tal Moran, Ilan Orlov, Silas Richelson
2014/1021 (PDF ) Tightly-Secure Signatures from Chameleon Hash Functions Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan
2014/1020 (PDF ) Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm
2014/1018 (PDF ) Algebraic Algorithms for LWE Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret
2014/1017 (PDF ) Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data Foteini Baldimtsi, Olga Ohrimenko
2014/1015 (PDF ) Compact Accumulator using Lattices Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini
2014/1014 (PDF ) Double-and-Add with Relative Jacobian Coordinates Björn Fay
2014/1013 (PDF ) Computational Independence Björn Fay
2014/1012 (PDF ) The Boomerang Attacks on BLAKE and BLAKE2 Yonglin Hao
2014/1011 (PDF ) Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay Alex Biryukov, Ivan Pustogarov
2014/1010 (PDF ) On Continuous After-the-Fact Leakage-Resilient Key Exchange Mohsen Toorani
2014/1009 (PDF ) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System Christopher D. Nguyen, Dhananjay S. Phatak, Steven D. Houston, Alan T. Sherman
2014/1008 (PDF ) DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
2014/1007 (PDF ) Fair Multiple-bank E-cash in the Standard Model Jiangxiao Zhang, Yanwu Gao, Chunhui Feng, Hua Guo, Zhoujun Li
2014/1006 (PDF ) Simple composition theorems of one-way functions -- proofs and presentations Jaime Gaspar, Eerke Boiten
2014/1005 (PDF ) A pure block chain based decentralized exchange. Harsh Patel
2014/1004 (PDF ) CONIKS: Bringing Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman
2014/1003 (PDF ) COFFE: Ciphertext Output Feedback Faithful Encryption Christian Forler, David McGrew, Stefan Lucks, Jakob Wenzel
2014/1002 (PDF ) Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam, Sashank Dara, Nalini N
2014/1000 (PDF ) Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
2014/999 (PDF ) First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA Yongdae Kim, Hyunsoo Yoon
2014/998 (PDF ) Hierarchical deterministic Bitcoin wallets that tolerate key leakage Gus Gutoski, Douglas Stebila
2014/997 (PDF ) Constants Count: Practical Improvements to Oblivious RAM Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas
2014/996 (PDF ) Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves Maike Massierer
2014/995 (PDF ) Partial Garbling Schemes and Their Applications Yuval Ishai, Hoeteck Wee
2014/994 (PDF ) Key-Policy Multi-authority Attribute-Based Encryption Riccardo Longo, Chiara Marcolla, Massimiliano Sala
2014/993 (PDF ) How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA Thomas Basmer, Christian Wittke, Zoya Dyka, Peter Langendoerfer
2014/992 (PDF ) Incentivized Outsourced Computation Resistant to Malicious Contractors Alptekin Kupcu
2014/991 (PDF ) Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation Kai-Min Chung, Huijia Lin, Rafael Pass
2014/990 (PDF ) Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen, Sander Siim
2014/989 (PDF ) Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti
2014/988 (PDF ) Armadillo: a compilation chain for privacy preserving applications Sergiu Carpov, Paul Dubrulle, Renaud Sirdey
2014/987 (PDF ) Cryptanalysis of Full PRIDE Block Cipher Yibin Dai, Shaozhen Chen
2014/986 (PDF ) Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan, Lei Hu, Ling Song, Siwei Sun, Xiaoshuang Ma
2014/985 (PDF ) Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement Bartosz Zoltak
2014/984 (PDF ) Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel Michael Peter, Jan Nordholz, Matthias Petschick, Janis Danisevskis, Julian Vetter, Jean-Pierre Seifert
2014/983 (PDF ) Public Verification of Private Effort Giulia Alberini, Tal Moran, Alon Rosen
2014/982 (PDF ) Outlier Privacy Edward Lui, Rafael Pass
2014/981 (PDF ) Publicly Verifiable Non-Interactive Arguments for Delegating Computation Omer Paneth, Guy N. Rothblum
2014/980 (PDF ) A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng
2014/979 (PDF ) The Chaining Lemma and its application Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi
2014/978 (PDF ) Improved Differential Analysis of Block Cipher PRIDE Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma
2014/977 (PDF ) A Survey on Lightweight Entity Authentication with Strong PUFs Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede
2014/976 (PDF ) Geppetto: Versatile Verifiable Computation Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur
2014/975 (PDF ) Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2014/973 (PDF ) Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma
2014/972 (PDF ) A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials Haining Fan
2014/971 (PDF ) Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function Y. Wei, E. Pasalic, F. Zhang, W. Wu
2014/970 (PDF ) Jackpot Stealing Information From Large Caches via Huge Pages Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2014/969 (PDF ) Privacy-Preserving Face Recognition with Outsourced Computation Can Xiang, Chunming Tang
2014/968 (PDF ) Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments Jorge Munilla, Mike Burmester, Albert Peinado
2014/967 (PDF ) A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy Maciej Skorski
2014/966 (PDF ) Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms Kan Yang, Xiaohua Jia, Kuan Zhang, Xuemin (Sherman) Shen
2014/965 (PDF ) Predicate Encryption for Multi-Dimensional Range Queries from Lattices Romain Gay, Pierrick Méaux, Hoeteck Wee
2014/964 (PDF ) On two windows multivariate cryptosystem depending on random parameters Urszula Romańczuk-Polubiec, Vasyl Ustimenko
2014/963 (PDF ) Malicious-Client Security in Blind Seer: A Scalable Private DBMS Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin
2014/962 (PDF ) Solving Polynomial Systems with Noise over F_2: Revisited Zhenyu Huang, Dongdai Lin
2014/961 (PDF ) When are Fuzzy Extractors Possible? Benjamin Fuller, Leonid Reyzin, Adam Smith
2014/960 (PDF ) Non-Interactive Secure Multiparty Computation Amos Beimel, Ariel Gabizon, Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Anat Paskin-Cherniavsky
2014/959 (PDF ) Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul
2014/958 (PDF ) Authenticated Encryption: How Reordering can Impact Performance Basel Alomair
2014/957 (PDF ) Black Box Separations for Differentially Private Protocols Dakshita Khurana, Hemanta K. Maji, Amit Sahai
2014/956 (PDF ) Tamper Detection and Continuous Non-Malleable Codes Zahra Jafargholi, Daniel Wichs
2014/955 (PDF ) On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
2014/954 (PDF ) Algebraic Fault Analysis of Katan Frank Quedenfeld
2014/953 (PDF ) The Related-Key Security of Iterated Even-Mansour Ciphers Pooya Farshim, Gordon Procter
2014/952 (PDF ) Balanced Encoding to Mitigate Power Analysis: A Case Study Cong Chen, Thomas Eisenbarth, Aria Shahverdi, Xin Ye
2014/951 (PDF ) Modified Alternating Step Generators with Non-Linear Scrambler Robert Wicik, Tomasz Rachwalik, Rafał Gliwa
2014/950 (PDF ) Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda
2014/949 (PDF ) Simplification/complication of the basis of prime Boolean ideal Alexander Rostovtsev, Anna Shustrova
2014/948 (PDF ) Lattice Point Enumeration on Block Reduced Bases Michael Walter
2014/947 (PDF ) The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2014/946 (PDF ) On a new fast public key cryptosystem Samir Bouftass, Abdelhak Azhari
2014/945 (PDF ) Boomerang Attack on Step-Reduced SHA-512 Hongbo Yu, Dongxia Bai
2014/944 (PDF ) Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2014/943 (PDF ) Advancing the State-of-the-Art in Hardware Trojans Detection Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk
2014/942 (PDF ) Public-Coin Differing-Inputs Obfuscation and Its Applications Yuval Ishai, Omkant Pandey, Amit Sahai
2014/941 (PDF ) Garbled RAM From One-Way Functions Sanjam Garg, Steve Lu, Rafail Ostrovsky, Alessandra Scafuro
2014/940 (PDF ) Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2014/938 (PDF ) Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas
2014/937 (PDF ) Analysis of Lewko-Sahai-Waters Revocation System Zhengjun Cao, Lihua Liu
2014/936 (PDF ) Outsourcing Secure Two-Party Computation as a Black Box Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler
2014/935 (PDF ) Boosting Higher-Order Correlation Attacks by Dimensionality Reduction Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia
2014/934 (PDF ) Efficient Generic Zero-Knowledge Proofs from Commitments Samuel Ranellucci, Alain Tapp, Rasmus Winther Zakarias
2014/933 (PDF ) Certificateless Proxy Re-Encryption Without Pairing: Revisited Akshayaram Srinivasan, C. Pandu Rangan
2014/932 (PDF ) Bicliques with Minimal Data and Time Complexity for AES (Extended Version) Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
2014/931 (PDF ) Cryptanalysis of JAMBU Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang
2014/930 (PDF ) Immunizing Multilinear Maps Against Zeroizing Attacks Dan Boneh, David J. Wu, Joe Zimmerman
2014/929 (PDF ) Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero Craig Gentry, Shai Halevi, Hemanta K. Maji, Amit Sahai
2014/928 (PDF ) Implementing Candidate Graded Encoding Schemes from Ideal Lattices Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois
2014/927 (PDF ) Physical functions : the common factor of side-channel and fault attacks ? Bruno Robisson, Hélène Le Bouder
2014/926 (PDF ) Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results Keita Emura, Takuya Hayashi
2014/925 (PDF ) Indistinguishability Obfuscation for Turing Machines with Unbounded Memory Venkata Koppula, Allison Bishop Lewko, Brent Waters
2014/924 (PDF ) Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields Antoine Joux, Cécile Pierrot
2014/922 (PDF ) Differential Analysis of Block Ciphers SIMON and SPECK Alex Biryukov, Arnab Roy, Vesselin Velichkov
2014/921 (PDF ) Batch NFS Daniel J. Bernstein, Tanja Lange
2014/920 (PDF ) Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schueth, François-Xavier Standaert
2014/919 (PDF ) Experimenting with Shuffle Block Cipher and SMT Solvers Martin Stanek
2014/918 (PDF ) Web Tap Payment Authentication and Encryption With Zero Customer Effort Henry Ng
2014/917 (PDF ) From Selective to Adaptive Security in Functional Encryption Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan
2014/916 (PDF ) Adaptively Secure Fully Homomorphic Signatures Based on Lattices Xavier Boyen, Xiong Fan, Elaine Shi
2014/915 (PDF ) Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014 Yanbin Pan
2014/914 (PDF ) Cryptography with One-Way Communication Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2014/913 (PDF ) Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
2014/912 (PDF ) Low-Cost Concurrent Error Detection for GCM and CCM Xiaofei Guo, Ramesh Karri
2014/911 (PDF ) A Denial of Service Attack against Fair Computations using Bitcoin Deposits Jethro Beekman
2014/910 (PDF ) Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model Vanishree Rao
2014/909 (PDF ) Robust Secret Sharing Schemes Against Local Adversaries Allison Bishop Lewko, Valerio Pastro
2014/908 (PDF ) Practical UC security with a Global Random Oracle Ran Canetti, Abhishek Jain, Alessandra Scafuro
2014/907 (PDF ) Finding shortest lattice vectors faster using quantum search Thijs Laarhoven, Michele Mosca, Joop van de Pol
2014/906 (PDF ) Cryptanalysis on the Multilinear Map over the Integers and its Related Problems Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehle
2014/905 (PDF ) Primary-Secondary-Resolver Membership Proof Systems Moni Naor, Asaf Ziv
2014/904 (PDF ) How Secure is TextSecure? Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Joerg Schwenk, Thorsten Holz
2014/903 (PDF ) Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable) Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos
2014/902 (PDF ) The Power of Negations in Cryptography Siyao Guo, Tal Malkin, Igor C. Oliveira, Alon Rosen
2014/901 (PDF ) A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System Kenneth G. Paterson, Mario Strefler
2014/900 (PDF ) Some Security Results of the RC4+ Stream Cipher Subhadeep Banik, Sonu Jha
2014/899 (PDF ) Side Channel Power Analysis of an AES-256 Bootloader Colin O'Flynn, Zhizhang Chen
2014/898 (PDF ) A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme Eduardo Morais, Ricardo Dahab
2014/897 (PDF ) Leveled Fully Homomorphic Signatures from Standard Lattices Sergey Gorbunov, Vinod Vaikuntanathan, Daniel Wichs
2014/896 (PDF ) Efficiently Making Secure Two-Party Computation Fair Handan Kılınç, Alptekin Küpçü
2014/895 (PDF ) Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion Kerry A. McKay, Poorvi L. Vora
2014/894 (PDF ) THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS Joe Chiarella, Greg Mosher, Dr. J. Robert Buchanan
2014/893 (PDF ) Advanced Algebraic Attack on Trivium Frank Quedenfeld, Christopher Wolf
2014/892 (PDF ) Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014 Georg Fuchsbauer
2014/891 (PDF ) Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity Jean-Sebastien Coron, Johann Groszschaedl, Praveen Kumar Vadnala, Mehdi Tibouchi
2014/890 (PDF ) Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures Jean-Sebastien Coron, Arnab Roy, Srinivas Vivek
2014/889 (PDF ) Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak
2014/888 (PDF ) Distance Lower Bounding Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi
2014/887 (PDF ) Hardware Implementation of Secure Shamir's Secret Sharing Scheme Pei Luo, Yu-Lun Lin, Zhen Wang, Mark Karpovsky
2014/886 (PDF ) Accountable Storage Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia
2014/885 (PDF ) Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits Marios O. Choudary, Markus G. Kuhn
2014/882 (PDF ) Obfuscation of Probabilistic Circuits and Applications Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan
2014/881 (PDF ) Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2014/880 (PDF ) Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective Joppe W. Bos, Michael Naehrig, Joop van de Pol
2014/879 (PDF ) Watch your Constants: Malicious Streebog Riham AlTawy, Amr M. Youssef
2014/878 (PDF ) Protecting obfuscation against arithmetic attacks Eric Miles, Amit Sahai, Mor Weiss
2014/877 (PDF ) CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs Daniel R. L. Brown
2014/876 (PDF ) Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model Mihir Bellare, Viet Tung Hoang
2014/875 (PDF ) Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2014/874 (PDF ) Accelerating Bliss: the geometry of ternary polynomials Léo Ducas
2014/873 (PDF ) Bootstrapping for HElib Shai Halevi, Victor Shoup
2014/872 (PDF ) Recent Results in Scalable Multi-Party Computation Jared Saia, Mahdi Zamani
2014/871 (PDF ) An algorithm for MD5 single-block collision attack using high-performance computing cluster Anton A. Kuznetsov
2014/870 (PDF ) Dynamic Behavior of RS latches using FIB processing and probe connection Naoya Torii, Dai Yamamoto, Masahiko Takenaka, Tsutomu Matsumoto
2014/869 (PDF ) Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA Werner Schindler
2014/868 (PDF ) Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski, Gil Segev, Eylon Yogev
2014/867 (PDF ) Random-Oracle Uninstantiability from Indistinguishability Obfuscation Chris Brzuska, Pooya Farshim, Arno Mittelbach
2014/865 (PDF ) Impossibility of Black-Box Simulation Against Leakage Attacks Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2014/864 (PDF ) How to Choose Interesting Points for Template Attacks More Effectively Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/863 (PDF ) A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou
2014/862 (PDF ) Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic - Miroslav Knezevic, Ventzislav Nikov, Peter Rombouts
2014/861 (PDF ) Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots İhsan Haluk Akın
2014/860 (PDF ) Differential Factors: Improved Attacks on SERPENT Cihangir Tezcan, Ferruh Özbudak
2014/858 (PDF ) Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds Dana Dachman-Soled, Jonathan Katz, Vanishree Rao
2014/857 (PDF ) Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles Jonathan Katz, Andrew Miller, Elaine Shi
2014/856 (PDF ) Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou
2014/855 (PDF ) Relating Undisturbed Bits to Other Properties of Substitution Boxes Rusydi H. Makarim, Cihangir Tezcan
2014/854 (PDF ) Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli
2014/853 (PDF ) Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Cătălin Roşu, Michael Steiner
2014/852 (PDF ) Faster ECC over $\mathbb{F}_{2^{521}-1}$ Robert Granger, Michael Scott
2014/851 (PDF ) Near Optimal Rate Homomorphic Encryption for Branching Programs Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
2014/850 (PDF ) The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses Markku-Juhani O. Saarinen
2014/849 (PDF ) A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks Ryotaro Hayashi, Tatsuyuki Matsushita
2014/848 (PDF ) Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events Nicolas T. Courtois, Pinar Emirdag, Filippo Valsorda
2014/847 (PDF ) Reflections on Slide with a Twist Attacks Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2014/846 (PDF ) Verifiable computation using multiple provers Andrew J. Blumberg, Justin Thaler, Victor Vu, Michael Walfish
2014/845 (PDF ) Adaptively secure two-party computation from indistinguishability obfuscation Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya
2014/844 (PDF ) Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation Sanjam Garg, Antigoni Polychroniadou
2014/843 (PDF ) Solving a Class of Modular Polynomial Equations and its Relation to Modular Inversion Hidden Number Problem and Inversive Congruential Generator Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng
2014/842 (PDF ) A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/841 (PDF ) Explicit Non-malleable Codes Resistant to Permutations and Perturbations Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/840 (PDF ) Constrained PRFs for Unbounded Inputs Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2014/839 (PDF ) A Simple and Improved Algorithm for Integer Factorization with Implicit Hints Koji Nuida, Naoto Itakura, Kaoru Kurosawa
2014/838 (PDF ) SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers Alhassan Khedr, Glenn Gulak, Vinod Vaikuntanathan
2014/837 (PDF ) True Random Number Generators Secure in a Changing Environment: Improved Security Bounds Maciej Skorski
2014/836 (PDF ) A Tight Transformation between HILL and Metric Conditional Pseudoentropy Maciej Skorski
2014/835 (PDF ) Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, Srinivas Vivek
2014/834 (PDF ) Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman
2014/833 (PDF ) Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability Essam Ghadafi
2014/832 (PDF ) Requirements for Standard Elliptic Curves Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze
2014/831 (PDF ) Tweaks and Keys for Block Ciphers: the TWEAKEY Framework Jérémy Jean, Ivica Nikolić, Thomas Peyrin
2014/830 (PDF ) Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE) Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao
2014/829 (PDF ) Additively Homomorphic UC commitments with Optimal Amortized Overhead Ignacio Cascudo, Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti
2014/828 (PDF ) Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm Zhengjun Cao, Zhenfu Cao, Lihua Liu
2014/827 (PDF ) Interactive Coding for Interactive Proofs Yevgeniy Dodis, Allison Bishop Lewko
2014/826 (PDF ) Learning with Errors in the Exponent Ozgur Dagdelen, Sebastian Gajek, Florian Gopfert
2014/824 (PDF ) Accountable Tracing Signatures Markulf Kohlweiss, Ian Miers
2014/823 (PDF ) On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries Rafael Dowsley, Anderson C. A. Nascimento
2014/822 (PDF ) Ballot secrecy with malicious bulletin boards David Bernhard, Ben Smyth
2014/821 (PDF ) Non-malleable Reductions and Applications Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski
2014/820 (PDF ) Operational Signature Schemes Michael Backes, Ozgur Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder
2014/819 (PDF ) Riding on Asymmetry: Efficient ABE for Branching Programs Sergey Gorbunov, Dhinakaran Vinayagamurthy
2014/817 (PDF ) Optimized Karatsuba Squaring on 8-bit AVR Processors Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
2014/816 (PDF ) FHEW: Bootstrapping Homomorphic Encryption in less than a second Léo Ducas, Daniele Micciancio
2014/815 (PDF ) A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves Palash Sarkar, Shashank Singh
2014/814 (PDF ) Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing Lisa Bromberg, Vladimir Shpilrain, Alina Vdovina
2014/813 (PDF ) Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data Dario Catalano, Dario Fiore
2014/812 (PDF ) Search-and-compute on Encrypted Data Jung Hee Cheon, Miran Kim, Myungsun Kim
2014/811 (PDF ) A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugere, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
2014/810 (PDF ) Simulation-Based Secure Functional Encryption in the Random Oracle Model Vincenzo Iovino, Karol Zebrowski
2014/809 (PDF ) Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
2014/808 (PDF ) Online/Off-line Ring Signature Scheme with Provable Security Jayaprakash Kar
2014/807 (PDF ) Leakage-resilient non-malleable codes Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
2014/806 (PDF ) Summation polynomial algorithms for elliptic curves in characteristic two Steven D. Galbraith, Shishay W. Gebregiyorgis
2014/805 (PDF ) Dual-System Simulation-Soundness with Applications to UC-PAKE and More Charanjit S. Jutla, Arnab Roy
2014/804 (PDF ) Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions Jacob Alperin-Sheriff
2014/803 (PDF ) A Decentralized Public Key Infrastructure with Identity Retention Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov
2014/802 (PDF ) Physical Characterization of Arbiter PUFs Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich
2014/801 (PDF ) Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties Georgi Ivanov, Nikolay Nikolov, Svetla Nikova
2014/800 (PDF ) Efficient Pairings and ECC for Embedded Systems Thomas Unterluggauer, Erich Wenger
2014/799 (PDF ) Verifiable Random Functions from Weaker Assumptions Tibor Jager
2014/798 (PDF ) Multi-Identity and Multi-Key Leveled FHE from Learning with Errors Michael Clear, Ciarán McGoldrick
2014/797 (PDF ) Tightly-Secure Authenticated Key Exchange Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
2014/796 (PDF ) Distributed Cryptography Based on the Proofs of Work Marcin Andrychowicz, Stefan Dziembowski
2014/795 (PDF ) SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein, Daira Hopwood, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Louiza Papachristodoulou, Michael Schneider, Peter Schwabe, Zooko Wilcox-O'Hearn
2014/794 (PDF ) Efficient Identity-Based Encryption over NTRU Lattices Léo Ducas, Vadim Lyubashevsky, Thomas Prest
2014/793 (PDF ) Robust Authenticated-Encryption: AEZ and the Problem that it Solves Viet Tung Hoang, Ted Krovetz, Phillip Rogaway
2014/792 (PDF ) General Classification of the Authenticated Encryption Schemes for the CAESAR Competition Farzaneh abed, Christian Forler, Stefan Lucks
2014/791 (PDF ) Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof Dongdai Lin, Yujuan Quan, Jian Weng, Jun Yan
2014/790 (PDF ) Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses Sarani Bhattacharya, Debdeep Mukhopadhyay
2014/789 (PDF ) Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
2014/788 (PDF ) Tuning GaussSieve for Speed Robert Fitzpatrick, Christian Bischof, Johannes Buchmann, Ozgur Dagdelen, Florian Gopfert, Artur Mariano, Bo-Yin Yang
2014/787 (PDF ) Another Tor is possible Amadou Moctar Kane
2014/786 (PDF ) On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation Chun Guo, Dongdai Lin
2014/785 (PDF ) Divisible E-Cash Made Practical Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
2014/784 (PDF ) Weak Instances of PLWE Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter
2014/783 (PDF ) Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware Raghavan Kumar, Philipp Jovanovic, Wayne Burleson, Ilia Polian
2014/782 (PDF ) Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar, Philipp Jovanovic, Ilia Polian
2014/781 (PDF ) Tally-based simple decoders for traitor tracing and group testing Boris Skoric
2014/780 (PDF ) Deterministic Public-Key Encryption under Continual Leakage Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters
2014/779 (PDF ) Implementing Cryptographic Program Obfuscation Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff
2014/778 (PDF ) Anonymous IBE from Quadratic Residuosity with Improved Performance Michael Clear, Hitesh Tewari, Ciarán McGoldrick
2014/777 (PDF ) (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces Koji Nuida, Kaoru Kurosawa
2014/776 (PDF ) How to Obfuscate Programs Directly Joe Zimmerman
2014/775 (PDF ) Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation Artur Mariano, Shahar Timnat, Christian Bischof
2014/774 (PDF ) Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff, Jonathan Katz, Matthew D. Green
2014/773 (PDF ) Obfuscating Low-Rank Matrix Branching Programs Amit Sahai, Mark Zhandry
2014/772 (PDF ) Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps Nuttapong Attrapadung
2014/771 (PDF ) Succinct Randomized Encodings and their Applications Nir Bitansky, Sanjam Garg, Sidharth Telang
2014/770 (PDF ) AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation Takaaki Mizuki, Yu-ichi Hayashi
2014/769 (PDF ) Indistinguishability Obfuscation of Iterated Circuits and RAM Programs Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan
2014/768 (PDF ) Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu
2014/767 (PDF ) Algebraic Attacks on Human Identification Protocols Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar, Josef Pieprzyk
2014/766 (PDF ) Succinct Garbling Schemes and Applications Huijia Lin, Rafael Pass
2014/765 (PDF ) The Bitcoin Backbone Protocol: Analysis and Applications Juan Garay, Aggelos Kiayias, Nikos Leonardos
2014/764 (PDF ) One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin Jens Groth, Markulf Kohlweiss
2014/763 (PDF ) On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun
2014/762 (PDF ) Access Control in Publicly Verifiable Outsourced Computation James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2014/761 (PDF ) Cryptanalysis of Reduced-round SIMON32 and SIMON48 Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo
2014/760 (PDF ) Montgomery Modular Multiplication on ARM-NEON Revisited Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim
2014/759 (PDF ) How to Efficiently Evaluate RAM Programs with Malicious Security Arash Afshar, Zhangxiang Hu, Payman Mohassel, Mike Rosulek
2014/758 (PDF ) Cryptographic Reverse Firewalls Ilya Mironov, Noah Stephens-Davidowitz
2014/757 (PDF ) Adaptively Secure Broadcast Encryption with Small System Parameters Mark Zhandry
2014/756 (PDF ) Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates Samee Zahur, Mike Rosulek, David Evans
2014/755 (PDF ) Computing Mod Without Mod Mark A. Will, Ryan K. L. Ko
2014/754 (PDF ) Bilinear Entropy Expansion from the Decisional Linear Assumption Lucas Kowalczyk, Allison Bishop Lewko
2014/753 (PDF ) Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication Alonso Gonzalez-Ulloa, Alejandro Hevia
2014/752 (PDF ) Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci
2014/751 (PDF ) Higher-Order Threshold Implementations Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2014/750 (PDF ) Hardware Trojan Horses in Cryptographic IP Cores Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage
2014/749 (PDF ) Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM Daniel E. Holcomb, Kevin Fu
2014/748 (PDF ) Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations Mehmet Sabır Kiraz, Osmanbey Uzunkol
2014/747 (PDF ) Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2014/746 (PDF ) Decoy-based information security Vladimir Shpilrain
2014/745 (PDF ) Universal Signature Aggregators Susan Hohenberger, Venkata Koppula, Brent Waters
2014/744 (PDF ) Sieving for shortest vectors in lattices using angular locality-sensitive hashing Thijs Laarhoven
2014/743 (PDF ) Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security Benoit Libert, Marc Joye, Moti Yung, Thomas Peters
2014/742 (PDF ) A survey of Fault Attacks in Pairing Based Cryptography Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes
2014/741 (PDF ) Eliminating Leakage in Reverse Fuzzy Extractors André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser
2014/739 (PDF ) SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers Smile Markovski, Aleksandra Mileva, Vesna Dimitrova
2014/738 (PDF ) A Very Compact FPGA Implementation of LED and PHOTON N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann
2014/736 (PDF ) Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2014/735 (PDF ) Dealer-Leakage Resilient Verifiable Secret Sharing Ruxandra F. Olimid
2014/734 (PDF ) S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic
2014/733 (PDF ) Augmented Learning with Errors: The Untapped Potential of the Error Term Rachid El~Bansarkhani, Özgür Dagdelen, Johannes Buchmann
2014/732 (PDF ) Resizable Tree-Based Oblivious RAM Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan
2014/731 (PDF ) Secure modular password authentication for the web using channel bindings Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham
2014/730 (PDF ) Differentially Private Linear Algebra in the Streaming Model Jalaj Upadhyay
2014/729 (PDF ) Faster Binary-Field Multiplication and Faster Binary-Field MACs Daniel J. Bernstein, Tung Chou
2014/728 (PDF ) Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
2014/727 (PDF ) The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves Benjamin Smith
2014/725 (PDF ) Efficient Software Implementation of Ring-LWE Encryption Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2014/724 (PDF ) Protecting Encrypted Cookies from Compression Side-Channel Attacks Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014/723 (PDF ) Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage” Yalin Chen, Jue-Sam Chou
2014/722 (PDF ) Differential Cryptanalysis of SipHash Christoph Dobraunig, Florian Mendel, Martin Schläffer
2014/721 (PDF ) On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers Zhengjun Cao, Zhenfu Cao
2014/720 (PDF ) Adaptively Secure Constrained Pseudorandom Functions Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters
2014/719 (PDF ) Bivariate Polynomials Modulo Composites and their Applications Dan Boneh, Henry Corrigan-Gibbs
2014/718 (PDF ) Square Span Programs with Applications to Succinct NIZK Arguments George Danezis, Cedric Fournet, Jens Groth, Markulf Kohlweiss
2014/717 (PDF ) How to Split a Secret into Unknown Shares Ruxandra F. Olimid
2014/716 (PDF ) Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment Amir Moradi
2014/715 (PDF ) Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment' Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
2014/714 (PDF ) A comprehensive empirical comparison of parallel ListSieve and GaussSieve Artur Mariano, Ozgur Dagdelen, Christian Bischof
2014/713 (PDF ) Co-Location-Resistant Clouds Yossi Azar, Seny Kamara, Ishai Menache, Mariana Raykova, Bruce Shepherd
2014/712 (PDF ) Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks Mohammad Wazid
2014/711 (PDF ) New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$ Masao KASAHARA
2014/710 (PDF ) An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle Yehuda Lindell
2014/709 (PDF ) A Note on Quantum Security for Post-Quantum Cryptography Fang Song
2014/708 (PDF ) Formal Treatment of Privacy-Enhancing Credential Systems Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
2014/707 (PDF ) Analysis Of Variance and CPA in SCA Sebastien Tiran, Guillaume Reymond, Jean-Baptiste Rigaud, Driss Aboulkassimi, Benedikt Gierlichs, Mathieu Carbone, Gilles Ducharme, Philippe Maurine
2014/706 (PDF ) The Feasibility of Outsourced Database Search in the Plain Model Carmit Hazay, Hila Zarosim
2014/704 (PDF ) A 128-bit Block Cipher Based on Three Group Arithmetics Shenghui Su, Shuwang Lü, Daqiang Dong
2014/703 (PDF ) Linearity Measures for MQ Cryptography Simona Samardjiska, Danilo Gligoroski
2014/702 (PDF ) Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques Benoit Feix, Hugues Thiebeauld
2014/700 (PDF ) Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu
2014/699 (PDF ) Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version) Christina Boura, María Naya-Plasencia, Valentin Suder
2014/698 (PDF ) HIMMO - A lightweight collusion-resistant key predistribution scheme Oscar Garcia-Morchon, Domingo Gomez-Perez, Jaime Gutierrez, Ronald Rietman, Berry Schoenmakers, Ludo Tolhuizen
2014/697 (PDF ) A Fully Homomorphic Encryption Scheme with Better Key Size Zhigang Chen, Jian Wang, ZengNian Zhang, Xinxia Song
2014/696 (PDF ) Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, Ahto Truu
2014/695 (PDF ) Proof of Proximity of Knowledge Serge Vaudenay
2014/694 (PDF ) Malicious Hashing: Eve's Variant of SHA-1 Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer
2014/693 (PDF ) Optimal Proximity Proofs Ioana Boureanu, Serge Vaudenay
2014/692 (PDF ) Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead Enrique Larraia
2014/691 (PDF ) Integration of hardware tokens in the Idemix library Antonio de la Piedra
2014/690 (PDF ) Efficient Interval Check in the Presence of Malicious Adversaries Genqiang Wu, Yeping He, Yi Lu, Liping Ding
2014/689 (PDF ) Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, Ahto Truu
2014/688 (PDF ) White-Box AES Implementation Revisited Chung Hun Baek, Jung Hee Cheon, Hyunsook Hong
2014/687 (PDF ) Reducing the Complexity of Normal Basis Multiplication Omer Egecioglu, Cetin Kaya Koc
2014/685 (PDF ) Bit Security of the CDH Problems over Finite Field Mingqiang Wang, Tao Zhan, Haibin Zhang
2014/684 (PDF ) Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers
2014/683 (PDF ) Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao
2014/682 (PDF ) A Unified Formalism for Physical Attacks Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria
2014/681 (PDF ) Improved Linear Cryptanalysis of Reduced-round SIMON Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Martin M. Lauridsen
2014/680 (PDF ) Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao, Lihua Liu
2014/679 (PDF ) A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao, Lihua Liu
2014/678 (PDF ) A Counterexample to the Chain Rule for Conditional HILL Entropy Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs
2014/677 (PDF ) Attacks in Stream Ciphers: A Survey Gustavo Banegas
2014/676 (PDF ) Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts Zhen Liu, Zhenfu Cao, Duncan S. Wong
2014/675 (PDF ) The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang
2014/674 (PDF ) Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby, Srinath Setty, Max Howald, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish
2014/673 (PDF ) How to Estimate the Success Rate of Higher-Order Side-Channel Attacks Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
2014/672 (PDF ) Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound Xiao Wang, Hubert Chan, Elaine Shi
2014/671 (PDF ) SCORAM: Oblivious RAM for Secure Computation Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, Elaine Shi
2014/670 (PDF ) DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis
2014/669 (PDF ) On the Communication Complexity of Secure Function Evaluation with Long Output Pavel Hubacek, Daniel Wichs
2014/668 (PDF ) Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation Ran Cohen, Yehuda Lindell
2014/667 (PDF ) Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings Yehuda Lindell, Ben Riva
2014/666 (PDF ) Functional Encryption Without Obfuscation Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
2014/665 (PDF ) Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi
2014/664 (PDF ) On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves William R. Trost, Guangwu Xu
2014/663 (PDF ) Locally Decodable and Updatable Non-Malleable Codes and Their Applications Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2014/662 (PDF ) Outsourced Pattern Matching Sebastian Faust, Carmit Hazay, Daniele Venturi
2014/661 (PDF ) One-Round Deniable Key Exchange with Perfect Forward Security Weiqiang Wen, Libin Wang, Min Xie
2014/660 (PDF ) Interactive Proofs under Continual Memory Leakage Prabhanjan Ananth, Vipul Goyal, Omkant Pandey
2014/659 (PDF ) On the Primitivity of Trinomials over Small Finite Fields YUjuan Li, Jinhua Zhao, Huaifu Wang
2014/658 (PDF ) The Adjacency Graphs of Some Feedback Shift Registers Ming Li, Yupeng Jiang, Dongdai Lin
2014/657 (PDF ) On the cycle decomposition of the WG-NLFSR YUjuan Li, Wnehua Shen, Huaifu Wang, Peipei Zhou
2014/656 (PDF ) Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur
2014/655 (PDF ) Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, Guang Gong
2014/654 (PDF ) Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay
2014/653 (PDF ) Mersenne factorization factory Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra
2014/652 (PDF ) A Dynamic Cube Attack on $105$ round Grain v1 Subhadeep Banik
2014/651 (PDF ) A note on CCA2-protected McEliece Cryptosystem with a systematic public key Pavol Zajac
2014/650 (PDF ) Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk
2014/649 (PDF ) FPGA Trojans through Detecting and Weakening of Cryptographic Primitives Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
2014/648 (PDF ) An Equivalent Condition on the Switching Construction of Differentially $4$-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function Xi Chen, Yazhi Deng, Min Zhu, Longjiang Qu
2014/647 (PDF ) Universally Composable Secure Group Communication Youliang Tian, Changgen Peng
2014/646 (PDF ) High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems Donald Donglong Chen, Nele Mentens, Frederik Vercauteren, Sujoy Sinha Roy, Ray C. C. Cheung, Derek Pao, Ingrid Verbauwhede
2014/645 (PDF ) Graph-Induced Multilinear Maps from Lattices Craig Gentry, Sergey Gorbunov, Shai Halevi
2014/644 (PDF ) Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai
2014/643 (PDF ) On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks' Ashok Kumar Das
2014/642 (PDF ) Balanced permutations Even-Mansour ciphers Shoni Gilboa, Shay Gueron
2014/641 (PDF ) The Multiple Number Field Sieve with Conjugation Method Cécile Pierrot
2014/640 (PDF ) Revocation in Publicly Verifiable Outsourced Computation James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2014/639 (PDF ) Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas
2014/638 (PDF ) Substring-Searchable Symmetric Encryption Melissa Chase, Emily Shen
2014/637 (PDF ) Generic Hardness of the Multiple Discrete Logarithm Problem Aaram Yun
2014/636 (PDF ) Improved Timing Attacks on ECDSA Vikram Singh
2014/635 (PDF ) Type 2 Structure-Preserving Signature Schemes Revisited Sanjit Chatterjee, Alfred Menezes
2014/634 (PDF ) Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP Hongda Li, Qihua Niu, Guifang Huang
2014/633 (PDF ) Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity Ran Canetti, Abhishek Jain, Omer Paneth
2014/632 (PDF ) Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
2014/631 (PDF ) Zipf’s Law in Passwords Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang
2014/630 (PDF ) Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation Peeter Laud
2014/629 (PDF ) Two-factor authentication for the Bitcoin protocol Christopher Mann, Daniel Loebenberger
2014/628 (PDF ) An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai
2014/627 (PDF ) On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption Debrup Chakraborty, Palash Sarkar
2014/626 (PDF ) Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs Daniel Genkin, Itamar Pipman, Eran Tromer
2014/625 (PDF ) Pretty Understandable Democracy 2.0 Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach
2014/624 (PDF ) KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
2014/623 (PDF ) Privacy with Imperfect Randomness Yevgeniy Dodis, Yanqing Yao
2014/622 (PDF ) Fully Secure Attribute Based Encryption from Multilinear Maps Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
2014/621 (PDF ) (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi
2014/620 (PDF ) The M3dcrypt Password Hashing Function Isaiah Makwakwa
2014/619 (PDF ) THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER Mohammad Sadegh Nemati Nia, Ali Payandeh
2014/618 (PDF ) Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender Florian Böhl, Simon Greiner, Patrik Scheidecker
2014/617 (PDF ) ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data Michael Backes, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk
2014/616 (PDF ) Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe Zhen Liu, Duncan S. Wong
2014/615 (PDF ) The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas
2014/614 (PDF ) Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version) Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng
2014/613 (PDF ) A Security Analysis of the Composition of ChaCha20 and Poly1305 Gordon Procter
2014/612 (PDF ) Attribute-Based Encryption Optimized for Cloud Computing Máté Horváth
2014/611 (PDF ) Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation Shlomi Dolev, Niv Gilboa, Ximing Li
2014/610 (PDF ) Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation Craig Gentry
2014/609 (PDF ) Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/608 (PDF ) Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
2014/607 (PDF ) Adding Controllable Linkability to Pairing-Based Group Signatures For Free Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
2014/606 (PDF ) A Multi-Function Provable Data Possession Scheme in Cloud Computing Xiaojun Yu, Qiaoyan Wen
2014/605 (PDF ) On the Limitations of Computational Fuzzy Extractors Kenji Yasunaga, Kosuke Yuzawa
2014/604 (PDF ) Private Web Search with Constant Round Efficiency Bolam Kang, Sung Cheol Goh, Myungsun Kim
2014/603 (PDF ) Recursive Trees for Practical ORAM Tarik Moataz, Erik-Oliver Blass, Guevara Noubir
2014/602 (PDF ) A Cryptographic Study of Tokenization Systems Sandra Diaz-Santiago, Lil Maria Rodriguez-Henriquez, Debrup Chakraborty
2014/601 (PDF ) Adaptive versus Static Security in the UC Model Ivan Damgård, Jesper Buus Nielsen
2014/599 (PDF ) Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila
2014/598 (PDF ) Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge Tore Kasper Frederiksen, Jesper Buus Nielsen, Claudio Orlandi
2014/597 (PDF ) Invisible Adaptive Attacks Jesper Buus Nielsen, Mario Strefler
2014/596 (PDF ) Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification Marina Blanton, Siddharth Saraph
2014/595 (PDF ) Scalable Zero Knowledge via Cycles of Elliptic Curves Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza
2014/594 (PDF ) Oblivious Parallel RAM and Applications Elette Boyle, Kai-Min Chung, Rafael Pass
2014/593 (PDF ) Improved Exponential-time Algorithms for Inhomogeneous-SIS Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield
2014/592 (PDF ) Multiprecision multiplication on AVR revisited Michael Hutter, Peter Schwabe
2014/591 (PDF ) Compact and Side Channel Secure Discrete Gaussian Sampling Sujoy Sinha Roy, Oscar Reparaz, Frederik Vercauteren, Ingrid Verbauwhede
2014/590 (PDF ) Automated algebraic analysis of structure-preserving signature schemes Joeri de Ruiter
2014/589 (PDF ) Authenticated Key Exchange from Ideal Lattices Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
2014/588 (PDF ) A Punctured Programming Approach to Adaptively Secure Functional Encryption Brent Waters
2014/587 (PDF ) Non-interactive zero-knowledge proofs in the quantum random oracle model Dominique Unruh
2014/586 (PDF ) An Algebraic Approach to Non-Malleability Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald
2014/585 (PDF ) The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti
2014/584 (PDF ) Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2014/583 (PDF ) Template Attacks Based On Priori Knowledge Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/582 (PDF ) NSEC5: Provably Preventing DNSSEC Zone Enumeration Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv
2014/581 (PDF ) (Hierarchical) Identity-Based Encryption from Affine Message Authentication Olivier Blazy, Eike Kiltz, Jiaxin Pan
2014/580 (PDF ) The Hunting of the SNARK Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer
2014/578 (PDF ) The Exact PRF-Security of NMAC and HMAC Peter Gaži, Krzysztof Pietrzak, Michal Rybár
2014/577 (PDF ) Reducing Communication Overhead of the Subset Difference Scheme Sanjay Bhattacherjee, Palash Sarkar
2014/576 (PDF ) Vernam Two Dan P. Milleville
2014/575 (PDF ) Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor Markku-Juhani O. Saarinen
2014/574 (PDF ) Security Analysis of Multilinear Maps over the Integers Hyung Tae Lee, Jae Hong Seo
2014/573 (PDF ) A new public key system based on Polynomials over finite fields GF(2) Gurgen Khachatrian
2014/572 (PDF ) On the Optimality of Differential Fault Analyses on CLEFIA Juliane Krämer, Anke Stüber, Ágnes Kiss
2014/571 (PDF ) How to manipulate curve standards: a white paper for the black hat Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal
2014/570 (PDF ) Deja Q: Using Dual Systems to Revisit q-Type Assumptions Melissa Chase, Sarah Meiklejohn
2014/569 (PDF ) Fast Lattice Point Enumeration with Minimal Overhead Daniele Micciancio, Michael Walter
2014/568 (PDF ) New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC Masao KASAHARA
2014/566 (PDF ) Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Daniel Augot, Matthieu Finiasz
2014/565 (PDF ) Kangaroos in Side-Channel Attacks Tanja Lange, Christine van Vredendaal, Marnix Wakker
2014/563 (PDF ) Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski
2014/562 (PDF ) hHB: a Harder HB+ Protocol Ka Ahmad Khoureich
2014/561 (PDF ) Performance Increasing Approaches For Binary Field Inversion Vladislav Kovtun, Maria Bulakh
2014/560 (PDF ) Towards Forward Security Properties for PEKS and IBE Qiang Tang
2014/559 (PDF ) Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA Pablo Rauzy, Sylvain Guilley
2014/558 (PDF ) Double shielded Public Key Cryptosystems Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin, Weijian Wang
2014/557 (PDF ) Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima
2014/556 (PDF ) Securing Cloud Data in the New Attacker Model Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
2014/555 (PDF ) General Statistically Secure Computation with Bounded-Resettable Hardware Tokens Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
2014/554 (PDF ) On Virtual Grey Box Obfuscation for General Circuits Nir Bitansky, Ran Canetti, Yael Tauman-Kalai, Omer Paneth
2014/553 (PDF ) A Simpler Variant of Universally Composable Security for Standard Multiparty Computation Ran Canetti, Asaf Cohen, Yehuda Lindell
2014/552 (PDF ) Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards
2014/551 (PDF ) Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation Daniel Augot, Pierre-Alain Fouque, Pierre Karpman
2014/550 (PDF ) Function-Private Functional Encryption in the Private-Key Setting Zvika Brakerski, Gil Segev
2014/549 (PDF ) New Attacks on the RSA Cryptosystem Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig
2014/548 (PDF ) Implicit factorization of unbalanced RSA moduli Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin
2014/547 (PDF ) Authentication Codes Based on Resilient Boolean Maps Juan Carlos Ku-Cauich, Guillermo Morales-Luna
2014/546 (PDF ) Anonymous and Publicly Linkable Reputation Systems Johannes Blömer, Jakob Juhnke, Christina Kolb
2014/545 (PDF ) Solving closest vector instances using an approximate shortest independent vectors oracle Chengliang Tian, Wei Wei, Dongdai Lin
2014/544 (PDF ) Secure Mutual Testing Strategy for Cryptographic SoCs Amitabh Das, Dusko Karaklajic, Ingrid Verbauwhede
2014/543 (PDF ) A Practical Second-Order Fault Attack against a Real-World Pairing Implementation Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert
2014/542 (PDF ) On the Multi-output Filtering Model and Its Applications Guang Gong, Kalikinkar Mandal, Yin Tan, Teng Wu
2014/541 (PDF ) EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, Takafumi Aoki
2014/540 (PDF ) Optimized Architecture for AES Abhijith P. S, Dr. Manish Goswami, S. Tadi, Kamal Pandey
2014/539 (PDF ) Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption Hoon Wei Lim, Shruti Tople, Prateek Saxena, Ee-Chien Chang
2014/537 (PDF ) Constrained Verifiable Random Functions Georg Fuchsbauer
2014/536 (PDF ) A Survey and New Results on the Decomposition of an NFSR into a Cascade Connection of Two Smaller NFSRs Tian Tian, Jia-Min Zhang, Chen-Dong Ye, Wen-Feng Qi
2014/535 (PDF ) On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes Massimo Chenal, Qiang Tang
2014/534 (PDF ) Differential Power Analysis of a McEliece Cryptosystem Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2014/533 (PDF ) Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions Jaiganesh Balasundaram
2014/531 (PDF ) Spatial Bloom Filters: Enabling Privacy in Location-aware Applications Paolo Palmieri, Luca Calderoni, Dario Maio
2014/530 (PDF ) FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison Khoongming Khoo, Thomas Peyrin, Axel Y. Poschmann, Huihui Yap
2014/529 (PDF ) Leakage-Resilient Signatures with Graceful Degradation Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
2014/528 (PDF ) Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin
2014/527 (PDF ) Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory Annelie Heuser, Olivier Rioul, Sylvain Guilley
2014/526 (PDF ) Curve41417: Karatsuba revisited Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
2014/525 (PDF ) Differential Analysis on Block Cipher PRIDE Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong
2014/524 (PDF ) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang, Yanfeng Qi
2014/523 (PDF ) Fully Secure and Fast Signing from Obfuscation Kim Ramchen, Brent Waters
2014/522 (PDF ) Constrained Pseudorandom Functions: Verifiable and Delegatable Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
2014/521 (PDF ) Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model Susan Hohenberger, Venkata Koppula, Brent Waters
2014/520 (PDF ) Squares of Random Linear Codes Ignacio Cascudo, Ronald Cramer, Diego Mirandola, Gilles Zémor
2014/519 (PDF ) Realizing Pico: Finally No More Passwords! Jens Hermans, Roel Peeters
2014/518 (PDF ) Cryptography from Compression Functions: The UCE Bridge to the ROM Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi
2014/517 (PDF ) On the Connection between Leakage Tolerance and Adaptive Security Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
2014/516 (PDF ) On the Classification of Finite Boolean Functions up to Fairness Nikolaos Makriyannis
2014/514 (PDF ) On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili
2014/513 (PDF ) RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data Noboru Kunihiro, Junya Honda
2014/512 (PDF ) Rmind: a tool for cryptographically secure statistical analysis Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk
2014/511 (PDF ) Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions Johannes Blömer, Gennadij Liske
2014/510 (PDF ) A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay
2014/509 (PDF ) Privacy preserving delegated word search in the cloud Kaoutar Elkhiyaoui, Melek Onen, Refik Molva
2014/508 (PDF ) Reversing Stealthy Dopant-Level Circuits Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino
2014/507 (PDF ) How to Generate and use Universal Samplers Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
2014/506 (PDF ) Finding Roots in GF(p^n) with the Successive Resultant Algorithm Christophe Petit
2014/505 (PDF ) On the quaternion $\ell$-isogeny path problem David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol
2014/504 (PDF ) A Provable Security Analysis of Intel's Secure Key RNG Thomas Shrimpton, R. Seth Terashima
2014/503 (PDF ) Efficient Hidden Vector Encryption with Constant-Size Ciphertext Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
2014/502 (PDF ) What's the Gist? Privacy-Preserving Aggregation of User Profiles Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun
2014/501 (PDF ) WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time Markku--Juhani O. Saarinen, Billy Bob Brumley
2014/499 (PDF ) Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer Mehmet Sabır Kiraz, Ziya Alper Genç, Süleyman Kardaş
2014/498 (PDF ) Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix Souvik Kolay, Debdeep Mukhopadhyay
2014/497 (PDF ) NREPO:Normal Basis Recomputing with Permuted Operands Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri
2014/496 (PDF ) Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
2014/495 (PDF ) Improved Short Lattice Signatures in the Standard Model Léo Ducas, Daniele Micciancio
2014/494 (PDF ) Hardness of k-LWE and Applications in Traitor Tracing San Ling, Duong Hieu Phan, Damien Stehle, Ron Steinfeld
2014/493 (PDF ) Arithmetic on Abelian and Kummer Varieties David Lubicz, Damien Robert
2014/492 (PDF ) Fault attacks on pairing-based protocols revisited Sanjit Chatterjee, Koray Karabina, Alfred Menezes
2014/491 (PDF ) Bootstrappable Identity-Based Fully Homomorphic Encryption Michael Clear, Ciarán McGoldrick
2014/490 (PDF ) Universally Composable secure TNC protocol based on IF-T binding to TLS Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
2014/489 (PDF ) A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge Dan Ding, Guizhen Zhu, Xiaoyun Wang
2014/488 (PDF ) Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson
2014/487 (PDF ) GGHLite: More Efficient Multilinear Maps from Ideal Lattices Adeline Langlois, Damien Stehle, Ron Steinfeld
2014/486 (PDF ) Binary Elligator Squared Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014/485 (PDF ) An Improved Truncated Differential Cryptanalysis of KLEIN Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, Mohammad Reza Aref
2014/484 (PDF ) Sealing the Leak on Classical NTRU Signatures Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit
2014/483 (PDF ) Disjunctions for Hash Proof Systems: New Constructions and Applications Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/482 (PDF ) Differentially Private Data Aggregation with Optimal Utility Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov
2014/481 (PDF ) Universally Composable Non-Interactive Key Exchange Eduarda S. V. Freire, Julia Hesse, Dennis Hofheinz
2014/480 (PDF ) Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran
2014/479 (PDF ) Even more practical secure logging: Tree-based Seekable Sequential Key Generators Giorgia Azzurra Marson, Bertram Poettering
2014/478 (PDF ) Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks Benny Applebaum, Eyal Widder
2014/477 (PDF ) Relaxed Two-to-one Recoding Schemes Omkant Pandey, Kim Ramchen, Brent Waters
2014/476 (PDF ) Simon's Circuit Paul Baecher
2014/475 (PDF ) A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol Imran Erguler
2014/474 (PDF ) Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich
2014/472 (PDF ) How to Watermark Cryptographic Functions Ryo Nishimaki
2014/470 (PDF ) PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au
2014/469 (PDF ) Homomorphic Signatures with Efficient Verification for Polynomial Functions Dario Catalano, Dario Fiore, Bogdan Warinschi
2014/468 (PDF ) Privacy-Preserving Auditing for Attribute-Based Credentials Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
2014/467 (PDF ) Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Daniel Demmler, Thomas Schneider, Michael Zohner
2014/466 (PDF ) On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm. Samir Bouftass, Abdelhak Azhari
2014/465 (PDF ) Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula Jie Chen, Hoeteck Wee
2014/464 (PDF ) Providing Root of Trust for ARM TrustZone using On-Chip SRAM Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng
2014/463 (PDF ) (Leveled) Fully Homomorphic Signatures from Lattices Sergey Gorbunov, Vinod Vaikuntanathan
2014/462 (PDF ) Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps Constantin Catalin Dragan, Ferucio Laurentiu Tiplea
2014/460 (PDF ) FleXOR: Flexible garbling for XOR gates that beats free-XOR Vladimir Kolesnikov, Payman Mohassel, Mike Rosulek
2014/459 (PDF ) Template Attacks on Different Devices Omar Choudary, Markus G. Kuhn
2014/458 (PDF ) Automated Analysis of Cryptographic Assumptions in Generic Group Models Gilles Barthe, Edvard Fagerholm, Dario Fiore, John Mitchell, Andre Scedrov, Benedikt Schmidt
2014/457 (PDF ) Transcript secure signatures based on modular lattices Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte
2014/456 (PDF ) Verified Implementations for Secure and Verifiable Computation José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Guillaume Davy, François Dupressoir, Benjamin Grégoire, Pierre-Yves Strub
2014/455 (PDF ) Single-shot security for one-time memories in the isolated qubits model Yi-Kai Liu
2014/454 (PDF ) Early Propagation and Imbalanced Routing, How to Diminish in FPGAs Amir Moradi, Vincent Immler
2014/453 (PDF ) Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçın
2014/452 (PDF ) Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake Iddo Bentov, Charles Lee, Alex Mizrahi, Meni Rosenfeld
2014/451 (PDF ) Leveled Fully Homomorphic Signatures from Standard Lattices Daniel Wichs
2014/448 (PDF ) Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao
2014/447 (PDF ) Faster Private Set Intersection based on OT Extension Benny Pinkas, Thomas Schneider, Michael Zohner
2014/446 (PDF ) 4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes Valerie Nachef, Jacques Patarin, Emmanuel Volte
2014/445 (PDF ) Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols, Andy Rupp
2014/444 (PDF ) RPKI vs ROVER: Comparing the Risks of BGP Security Solutions Aanchal Malhotra, Sharon Goldberg
2014/443 (PDF ) Minimizing the Two-Round Even-Mansour Cipher Shan Chen, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger
2014/442 (PDF ) Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix Xing Hu, Chunming Tang
2014/441 (PDF ) Improved Generic Attacks Against Hash-based MACs and HAIFA Itai Dinur, Gaëtan Leurent
2014/440 (PDF ) Double Level Montgomery Cox-Rower Architecture, New Bounds Jean-Claude Bajard, Nabil Merkiche
2014/439 (PDF ) Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions Chunming Tang, Yuenai Chen
2014/438 (PDF ) Security of Symmetric Encryption against Mass Surveillance Mihir Bellare, Kenneth Paterson, Phillip Rogaway
2014/437 (PDF ) Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
2014/436 (PDF ) Synthesis of Fault Attacks on Cryptographic Implementations Gilles Barthe, Francois Dupressoir, Pierre-Alain Fouque, Benjamin Gregoire, Jean-Christophe Zapalowicz
2014/435 (PDF ) Wait a minute! A fast, Cross-VM attack on AES Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2014/434 (PDF ) Just a Little Bit More Joop van de Pol, Nigel P. Smart, Yuval Yarom
2014/433 (PDF ) A Statistical Model for Higher Order DPA on Masked Devices A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo
2014/432 (PDF ) Universally Composable Authentication and Key-exchange with Global PKI Ran Canetti, Daniel Shahaf, Margarita Vald
2014/431 (PDF ) A Low-Latency, Low-Area Hardware Oblivious RAM Controller Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, Emil Stefanov, Dimitrios Serpanos, Srinivas Devadas
2014/430 (PDF ) Revisiting the Gentry-Szydlo Algorithm H. W. Lenstra, A. Silverberg
2014/429 (PDF ) Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
2014/428 (PDF ) Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More Nuttapong Attrapadung
2014/427 (PDF ) Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez
2014/426 (PDF ) Towards Optimally Efficient Secret-Key Authentication from PRG Ivan Damgård, Sunoo Park
2014/425 (PDF ) Note of Multidimensional MITM Attack on 25-Round TWINE-128 Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen
2014/424 (PDF ) Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants Craig Costello, Alyson Deines-Schartz, Kristin Lauter, Tonghai Yang
2014/423 (PDF ) The Hash Function "Fugue" Shai Halevi, William E. Hall, Charanjit S. Jutla
2014/422 (PDF ) System-level non-interference for constant-time cryptography Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna, David Pichardie
2014/421 (PDF ) FNR : Arbitrary length small domain block cipher proposal Sashank Dara, Scott Fluhrer
2014/420 (PDF ) Bounded Fully Homomorphic Signature Schemes Xiang Xie, Rui Xue
2014/419 (PDF ) FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve Jérémie Detrey
2014/418 (PDF ) A Simple Recursive Tree Oblivious RAM Benny Pinkas, Tzachy Reinman
2014/417 (PDF ) Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions Inna Polak, Adi Shamir
2014/416 (PDF ) Adaptive Security of Constrained PRFs Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao
2014/415 (PDF ) Virtual Proofs of Reality Ulrich Rührmair
2014/414 (PDF ) A Security Proof of KCDSA using an extended Random Oracle Model Vikram Singh
2014/413 (PDF ) On the Cost of Lazy Engineering for Masked Software Implementations Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert
2014/412 (PDF ) Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville
2014/411 (PDF ) Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices) Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar
2014/410 (PDF ) Soft Analytical Side-Channel Attacks Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert
2014/409 (PDF ) Moments-Correlating DPA Amir Moradi, François-Xavier Standaert
2014/408 (PDF ) Bootstrapping BGV Ciphertexts with a Wider Choice of p and q Emmanuela Orsini, Joop van de Pol, Nigel P. Smart
2014/407 (PDF ) Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin
2014/406 (PDF ) New Generic Attacks Against Hash-based MACs Gaëtan Leurent, Thomas Peyrin, Lei Wang
2014/405 (PDF ) Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input Chris Brzuska, Arno Mittelbach
2014/404 (PDF ) Large-Scale Secure Computation Elette Boyle, Kai-Min Chung, Rafael Pass
2014/403 (PDF ) Generic Universal Forgery Attack on Iterative Hash-based MACs Thomas Peyrin, Lei Wang
2014/402 (PDF ) On the Existence of Extractable One-Way Functions Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen
2014/401 (PDF ) Software implementation of an Attribute-Based Encryption scheme Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H. Sánchez-Ramírez, Tadanori Teruya, Francisco Rodríguez-Henríquez
2014/400 (PDF ) Composable Oblivious Extended Permutations Peeter Laud, Jan Willemson
2014/399 (PDF ) An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme Dustin Moody, Ray Perlner, Daniel Smith-Tone
2014/398 (PDF ) Differential Properties of the HFE Cryptosystem Taylor Daniels, Daniel Smith-Tone
2014/397 (PDF ) Cofactorization on Graphics Processing Units Andrea Miele, Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra
2014/396 (PDF ) Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs Helger Lipmaa
2014/395 (PDF ) Lightweight and Privacy-Preserving Delegatable Proofs of Storage Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong
2014/394 (PDF ) Relational Hash Avradip Mandal, Arnab Roy
2014/393 (PDF ) (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
2014/392 (PDF ) The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng
2014/391 (PDF ) MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen
2014/390 (PDF ) Black-Box Non-Black-Box Zero Knowledge Vipul Goyal, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti
2014/389 (PDF ) Accelerating NTRU based Homomorphic Encryption using GPUs Wei Dai, Yarkın Doröz, Berk Sunar
2014/388 (PDF ) Finding collisions for MD4 hash algorithm using hybrid algorithm Marko Carić
2014/387 (PDF ) New candidates for multivariate trapdoor functions Jaiberth Porras, John B. Baena, Jintai Ding
2014/386 (PDF ) Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
2014/385 (PDF ) Jacobian Coordinates on Genus 2 Curves Huseyin Hisil, Craig Costello
2014/384 (PDF ) Yao's millionaires' problem and decoy-based public key encryption by classical physics Dima Grigoriev, Vladimir Shpilrain
2014/383 (PDF ) Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System Younsung Choi, Dongho Won
2014/382 (PDF ) Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation Felix Günther, Mark Manulis, Andreas Peter
2014/381 (PDF ) Using Indistinguishability Obfuscation via UCEs Chris Brzuska, Arno Mittelbach
2014/380 (PDF ) Efficient Adaptively Secure IBBE from Standard Assumptions Somindu C. Ramanna, Palash Sarkar
2014/379 (PDF ) Hyper-and-elliptic-curve cryptography Daniel J. Bernstein, Tanja Lange
2014/376 (PDF ) How Secure is Deterministic Encryption? Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
2014/375 (PDF ) Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version) Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2014/374 (PDF ) Optimal Contracts for Outsourced Computation Viet Pham, MHR. Khouzani, Carlos Cid
2014/373 (PDF ) Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes Philipp Jovanovic, Atul Luykx, Bart Mennink
2014/372 (PDF ) Fully secure constrained pseudorandom functions using random oracles Dennis Hofheinz
2014/371 (PDF ) On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche
2014/370 (PDF ) Compact VSS and Efficient Homomorphic UC Commitments Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen
2014/369 (PDF ) On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness Michèle Feltz, Cas Cremers
2014/368 (PDF ) Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster Erich Wenger, Paul Wolfger
2014/367 (PDF ) Redefining the Transparency Order Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff
2014/366 (PDF ) Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System Younsung Choi, Dongho Won
2014/365 (PDF ) Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer Luke Mather, Elisabeth Oswald, Carolyn Whitnall
2014/364 (PDF ) Deleting Secret Data with Public Verifiability Feng Hao, Dylan Clarke, Avelino Francisco Zorzo
2014/363 (PDF ) Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi
2014/362 (PDF ) Nothing is for Free: Security in Searching Shared & Encrypted Data Qiang Tang
2014/361 (PDF ) New Results in the Linear Cryptanalysis of DES Igor Semaev
2014/360 (PDF ) McEliece in the world of Escher Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev
2014/359 (PDF ) Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations Eduardo Ruiz Duarte, Octavio Páez Osuna
2014/358 (PDF ) A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols Kim-Kwang Raymond Choo, Junghyun Nam, Dongho Won
2014/357 (PDF ) Simulatable Leakage: Analysis, Pitfalls, and new Constructions J. Longo Galea, D. Martin, E. Oswald, D. Page, M. Stam, M. Tunstall
2014/356 (PDF ) Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy
2014/355 (PDF ) Graph-theoretic design and analysis of key predistribution schemes Michelle Kendall, Keith M. Martin
2014/354 (PDF ) Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes Ray Perlner
2014/353 (PDF ) Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
2014/352 (PDF ) Multi-Vendor PayWord with Payment Approval Andrea Huszti
2014/351 (PDF ) Secret and Verifiable Delegated Voting for Wide Representation Yefim Leifman
2014/350 (PDF ) Distributed Smooth Projective Hashing and its Application to Two-Server PAKE Franziskus Kiefer, Mark Manulis
2014/349 (PDF ) Zerocash: Decentralized Anonymous Payments from Bitcoin Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza
2014/348 (PDF ) A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards Helger Lipmaa
2014/347 (PDF ) One-Way Functions and (Im)perfect Obfuscation Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, Eylon Yogev
2014/346 (PDF ) Time-Memory Trade-offs for Index Calculus in Genus 3 Kim Laine, Kristin Lauter
2014/345 (PDF ) Private Database Access With HE-over-ORAM Architecture Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
2014/344 (PDF ) Toward Robust Hidden Volumes using Write-Only Oblivious RAM Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu
2014/343 (PDF ) Solving Linear Equations Modulo Unknown Divisors: Revisited Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin
2014/342 (PDF ) Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
2014/341 (PDF ) Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2014/340 (PDF ) A Strong and Efficient Certificateless Digital Signature Scheme Mohammed Alfateh Hassouna, Mohsin Hashim
2014/338 (PDF ) A Tamper and Leakage Resilient von Neumann Architecture Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
2014/337 (PDF ) Related Randomness Attacks for Public Key Encryption Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn
2014/336 (PDF ) Private Predictive Analysis on Encrypted Medical Data Joppe W. Bos, Kristin Lauter, Michael Naehrig
2014/335 (PDF ) SHADOW NUMBERS PUBLIC KEY ENCRYPTION John Almeida
2014/334 (PDF ) LCPR: High Performance Compression Algorithm for Lattice-Based Signatures Rachid El Bansarkhani, Johannes Buchmann
2014/333 (PDF ) An optimal representation for the trace zero subgroup Elisa Gorla, Maike Massierer
2014/332 (PDF ) How to Choose Interesting Points for Template Attacks? Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng
2014/331 (PDF ) Machine Learning Classification over Encrypted Data Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser
2014/330 (PDF ) Noncentralized Cryptocurrency wtih No Blockchain qianxiaochao
2014/329 (PDF ) Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers
2014/328 (PDF ) Affine-evasive Sets Modulo a Prime Divesh Aggarwal
2014/327 (PDF ) An Optimal Strong Password Authentication Protocol with USB Sticks Vikram D
2014/325 (PDF ) A practical forgery and state recovery attack on the authenticated cipher PANDA-s Xiutao FENG, Fan ZHANG, Hui WANG
2014/324 (PDF ) From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi
2014/323 (PDF ) Some Remarks on Honeyword Based Password-Cracking Detection Imran Erguler
2014/322 (PDF ) Coding Theoretic Construction of Quantum Ramp Secret Sharing Ryutaroh Matsumoto
2014/321 (PDF ) Efficient Quantum-Immune Keyless Signatures with Identity Ahto Buldas, Risto Laanoja, Ahto Truu
2014/320 (PDF ) Improved Differential Cryptanalysis of Round-Reduced Speck Itai Dinur
2014/319 (PDF ) Preimage attacks on Reduced-round Stribog Riham AlTawy, Amr M. Youssef
2014/318 (PDF ) Index calculus in the trace zero variety Elisa Gorla, Maike Massierer
2014/317 (PDF ) Analysis of NORX: Investigating Differential and Rotational Properties Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
2014/316 (PDF ) Explicit Non-Malleable Codes Resistant to Permutations Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2014/315 (PDF ) Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R Bartosz Zoltak
2014/314 (PDF ) Improved Leakage Model Based on Genetic Algorithm Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu
2014/313 (PDF ) On the Complexity of Finding Low-Level Solutions Bjoern Grohmann
2014/312 (PDF ) Structure-Preserving Signatures from Type II Pairings Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
2014/311 (PDF ) Exponent-inversion Signatures and IBE under Static Assumptions Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu Ming Yiu
2014/310 (PDF ) Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More Yu Chen, Qiong Huang, Zongyang Zhang
2014/309 (PDF ) Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption Craig Gentry, Allison Lewko, Amit Sahai, Brent Waters
2014/308 (PDF ) The Locality of Searchable Symmetric Encryption David Cash, Stefano Tessaro
2014/307 (PDF ) Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks Alessandro Barenghi, Gerardo Pelosi, Francesco Regazzoni
2014/306 (PDF ) Publicly Evaluable Pseudorandom Functions and Their Applications Yu Chen, Zongyang Zhang
2014/305 (PDF ) Collision Attack on 5 Rounds of Grøstl Florian Mendel, Vincent Rijmen, Martin Schläffer
2014/304 (PDF ) Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
2014/302 (PDF ) Branching Heuristics in Differential Collision Search with Applications to SHA-512 Maria Eichlseder, Florian Mendel, Martin Schläffer
2014/301 (PDF ) How to Avoid Obfuscation Using Witness PRFs Mark Zhandry
2014/300 (PDF ) On the Powers of 2 Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2014/299 (PDF ) Optimality of Non-Adaptive Strategies: The Case of Parallel Games Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2014/298 (PDF ) Torsion Limits and Riemann-Roch Systems for Function Fields and Applications Ignacio Cascudo, Ronald Cramer, Chaoping Xing
2014/297 (PDF ) Pipelineable On-Line Encryption Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew, Jakob Wenzel
2014/296 (PDF ) Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding Andris Ambainis, Ansis Rosmanis, Dominique Unruh
2014/295 (PDF ) ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation Nir Bitansky, Omer Paneth
2014/294 (PDF ) The M3lcrypt Password Based Key Derivation Function Isaiah Makwakwa
2014/292 (PDF ) Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256 Leibo Li, Keting Jia
2014/291 (PDF ) Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗ Antonio Sanso
2014/290 (PDF ) Reliable Broadcast with Respect to Topology Knowledge Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2014/289 (PDF ) An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation Ivan Damgaard, Rasmus Lauritsen, Tomas Toft
2014/288 (PDF ) Resilient Aggregation in Simple Linear Sensor Networks Kevin J. Henry, Douglas R. Stinson
2014/287 (PDF ) Active and Passive Side-Channel Attacks on Delay Based PUF Designs Georg T. Becker, Raghavan Kumar
2014/286 (PDF ) Weaknesses of Password Authentication Scheme Based on Geometric Hashing Martin Stanek
2014/285 (PDF ) Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials David Derler, Christian Hanser, Daniel Slamanig
2014/284 (PDF ) Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way Rafail Ostrovsky, Alessandra Scafuro, Muthuramakrishnan Venkitasubramaniam
2014/283 (PDF ) Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems Nicolas Gama, Malika Izabachene, Phong Q. Nguyen, Xiang Xie
2014/282 (PDF ) On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation Ivan Damgård, Frédéric Dupuis, Jesper Buus Nielsen
2014/281 (PDF ) WCFB: a tweakable wide block cipher Andrey Jivsov
2014/280 (PDF ) MSEA: Modified Symmetric Encryption Algorithm Rajul Kumar, K. K. Mishra, Ashish Tripathi, Abhinav Tomar, Surendra Singh
2014/279 (PDF ) Improved Impossible Differential Attacks against Round-Reduced LBlock Christina Boura, Marine Minier, María Naya-Plasencia, Valentin Suder
2014/278 (PDF ) Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions Essam Ghadafi
2014/277 (PDF ) New Treatment of the BSW Sampling and Its Applications to Stream Ciphers Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi
2014/276 (PDF ) Design of identity-based digital signature schemes using extended chaotic maps SK Hafizul Islam
2014/275 (PDF ) Identity-based encryption and digital signature schemes using extended chaotic maps SK Hafizul Islam
2014/274 (PDF ) A note on the construction of pairing-friendly elliptic curves for composite order protocols Sorina Ionica, Malika Izabachène
2014/273 (PDF ) Witness Encryption from Instance Independent Assumptions Craig Gentry, Allison Bishop Lewko, Brent Waters
2014/272 (PDF ) Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
2014/271 (PDF ) STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation Markku-Juhani O. Saarinen
2014/270 (PDF ) Faster Maliciously Secure Two-Party Computation Using the GPU Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen
2014/269 (PDF ) Chosen Ciphertext Security via Point Obfuscation Takahiro Matsuda, Goichiro Hanaoka
2014/268 (PDF ) New bit-parallel Montgomery multiplier for trinomials using squaring operation Yin Li, Yiyang Chen
2014/267 (PDF ) Differential Fault Analysis on the families of SIMON and SPECK ciphers Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay
2014/266 (PDF ) ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption Pawel Morawiecki, Kris Gaj, Ekawat Homsirikamol, Krystian Matusiewicz, Josef Pieprzyk, Marcin Rogawski, Marian Srebrny, Marcin Wojcik
2014/265 (PDF ) Dual System Groups and its Applications --- Compact HIBE and More Jie Chen, Hoeteck Wee
2014/264 (PDF ) Continuous After-the-fact Leakage-Resilient Key Exchange (full version) Janaka Alawatugoda, Colin Boyd, Douglas Stebila
2014/263 (PDF ) A Generic Scan Attack on Hardware based eStream Winners Sandip Karmakar, Dipanwita Roy Chowdhury
2014/262 (PDF ) Differential Fault Analysis of MICKEY Family of Stream Ciphers Sandip Karmakar, Dipanwita Roy Chowdhury
2014/261 (PDF ) Fault Analysis of Grain Family of Stream Ciphers Sandip Karmakar, Dipanwita Roy Chowdhury
2014/260 (PDF ) Locally Decodable Codes for edit distance Rafail Ostrovsky, Anat Paskin-Cherniavsky
2014/259 (PDF ) Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus
2014/258 (PDF ) A realtime key recovery attack on the authenticated cipher FASER128 Xiutao FENG, Fan ZHANG
2014/257 (PDF ) Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem Bruce Kallick
2014/256 (PDF ) Private and Dynamic Time-Series Data Aggregation with Trust Relaxation Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
2014/255 (PDF ) Certification and Efficient Proofs of Committed Topology Graphs Thomas Gross
2014/254 (PDF ) Enhanced Lattice-Based Signatures on Reconfigurable Hardware Thomas Pöppelmann, Lëo Ducas, Tim Güneysu
2014/252 (PDF ) Making RSA-PSS Provably Secure Against Non-Random Faults Gilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014/251 (PDF ) Forgery on Stateless CMCC Guy Barwell
2014/250 (PDF ) Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme Boaz Tsaban, Noam Lifshitz
2014/249 (PDF ) Linear Extension Cube Attack on Stream Ciphers Liren Ding, Yongjuan Wang, Zhufeng Li
2014/248 (PDF ) Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2014/247 (PDF ) Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange Ivan Pryvalov, Aniket Kate
2014/246 (PDF ) Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme Kwangsu Lee, Dong Hoon Lee
2014/245 (PDF ) A practical state recovery attack on the stream cipher Sablier v1 Xiutao FENG, Fan ZHANG
2014/244 (PDF ) bitcoin.BitMint: Reconciling Bitcoin with Central Banks Gideon Samid
2014/243 (PDF ) Reusable Fuzzy Extractors for Low-Entropy Distributions Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam Smith
2014/242 (PDF ) Zero-Knowledge Password Policy Checks and Verifier-Based PAKE Franziskus Kiefer, Mark Manulis
2014/240 (PDF ) Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries Martin Pettai, Peeter Laud
2014/239 (PDF ) Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5 Florian Legendre, Gilles Dequen, Michaël Krajecki
2014/238 (PDF ) High Parallel Complexity Graphs and Memory-Hard Functions Joël Alwen, Vladimir Serbinenko
2014/237 (PDF ) SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs Aydin Aysu, Ege Gulcan, Patrick Schaumont
2014/236 (PDF ) Linear Sequential Circuit Approximation of Acterbahn Stream Cipher Shazia Afreen
2014/235 (PDF ) Efficient Fuzzy Search on Encrypted Data Alexandra Boldyreva, Nathan Chenette
2014/234 (PDF ) Enhancing Oblivious RAM Performance Using Dynamic Prefetching Xiangyao Yu, Ling Ren, Christopher Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas
2014/233 (PDF ) Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar
2014/232 (PDF ) Bandwidth Efficient PIR from NTRU Yarkın Doröz, Berk Sunar, Ghaith Hammouri
2014/231 (PDF ) Self-Updatable Encryption with Short Public Parameters and Its Extensions Kwangsu Lee
2014/230 (PDF ) Isogeny graphs with maximal real multiplication Sorina Ionica, Emmanuel Thomé
2014/228 (PDF ) Cryptanalysis of SP Networks with Partial Non-Linear Layers Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban
2014/226 (PDF ) Weak-Key Analysis of POET Mohamed Ahmed Abdelraheem, Andrey Bogdanov, Elmar Tischhauser
2014/225 (PDF ) Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption Tapas Pandit, Rana Barua
2014/224 (PDF ) Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices Henry Carter, Charles Lever, Patrick Traynor
2014/223 (PDF ) Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 Léo Perrin, Dmitry Khovratovich
2014/222 (PDF ) Optimizing Obfuscation: Avoiding Barrington's Theorem Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai
2014/221 (PDF ) Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations Toomas Krips, Jan Willemson
2014/220 (PDF ) Total Break of Zorro using Linear and Differential Attacks Shahram Rasoolzadeh, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2014/219 (PDF ) Dynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter
2014/218 (PDF ) A Practical Universal Forgery Attack against PAES-8 Yu Sasaki, Lei Wang
2014/217 (PDF ) A Forgery Attack against PANDA-s Yu Sasaki, Lei Wang
2014/216 (PDF ) Implementation and Improvement of the Partial Sum Attack on 6-round AES Francesco Aldà, Riccardo Aragona, Lorenzo Nicolodi, Massimiliano Sala
2014/215 (PDF ) Attack On the Markov Problem James L. Adams
2014/214 (PDF ) Squaring Algorithms with Delayed Carry Method and Efficient Parallelization Vladislav Kovtun, Andrew Okhrimenko
2014/213 (PDF ) Secret-Sharing for NP Ilan Komargodski, Moni Naor, Eylon Yogev
2014/212 (PDF ) Remarks on the Pocklington and Padró-Sáez Cube Root Algorithm in $\mathbb F_q$ Geon Heo, Seokhwan Choi, Kwang Ho Lee, Namhun Koo, Soonhak Kwon
2014/211 (PDF ) Some Randomness Experiments on TRIVIUM Subhabrata Samajder, Palash Sarkar
2014/210 (PDF ) Structural Cryptanalysis of McEliece Schemes with Compact Keys Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich
2014/209 (PDF ) A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung
2014/208 (PDF ) Offline Dictionary Attack on Password Authentication Schemes using Smart Cards Ding Wang, Ping Wang
2014/207 (PDF ) Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption Katsuyuki Takashima
2014/206 (PDF ) Reconsidering Generic Composition Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton
2014/205 (PDF ) Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness Ling Ren, Christopher Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, Srinivas Devadas
2014/204 (PDF ) ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research Colin O'Flynn, Zhizhang (David) Chen
2014/203 (PDF ) Privacy-Preserving Implicit Authentication Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak F. Shahandashti
2014/202 (PDF ) Efficiently Verifiable Computation on Encrypted Data Dario Fiore, Rosario Gennaro, Valerio Pastro
2014/201 (PDF ) From Input Private to Universally Composable Secure Multiparty Computation Primitives Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen
2014/200 (PDF ) Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
2014/199 (PDF ) Doubly Spatial Encryption from DBDH Jie Chen, Hoeteck Wee
2014/198 (PDF ) Fast GPGPU-Based Elliptic Curve Scalar Multiplication Eric M. Mahé, Jean-Marie Chauvet
2014/197 (PDF ) Breaking POET Authentication with a Single Query Jian Guo, Jérémy Jean, Thomas Peyrin, Wang Lei
2014/195 (PDF ) Low Overhead Broadcast Encryption from Multilinear Maps Dan Boneh, Brent Waters, Mark Zhandry
2014/194 (PDF ) Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols Sai Raghu Talluri, Swapnoneel Roy
2014/193 (PDF ) JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri
2014/192 (PDF ) Two-sources Randomness Extractors for Elliptic Curves Abdoul Aziz Ciss
2014/191 (PDF ) Side-Channel Analysis on Blinded Regular Scalar Multiplications Benoit Feix, Mylène Roussellet, Alexandre Venelli
2014/190 (PDF ) The Temperature Side Channel and Heating Fault Attacks Michael Hutter, Jörn-Marc Schmidt
2014/189 (PDF ) Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal
2014/188 (PDF ) A Second Look at Fischlin's Transformation Özgür Dagdelen, Daniele Venturi
2014/187 (PDF ) FFT-Based Key Recovery for the Integral Attack Yosuke Todo
2014/186 (PDF ) AES-Based Authenticated Encryption Modes in Parallel High-Performance Software Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
2014/185 (PDF ) Oblivious Data Structures Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang
2014/184 (PDF ) SETUP in Secret Sharing Schemes using Random Values Ruxandra F. Olimid
2014/183 (PDF ) Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs Tetsu Iwata, Lei Wang
2014/182 (PDF ) Proving the TLS Handshake Secure (as it is) Karthikeyan Bhargavan, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Santiago Zanella-Béguelin
2014/181 (PDF ) A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
2014/179 (PDF ) Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs Maura B. Paterson, Douglas R. Stinson
2014/178 (PDF ) Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data Qingji Zheng, Shouhuai Xu
2014/177 (PDF ) Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES Valentina Banciu, Elisabeth Oswald
2014/175 (PDF ) Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms T. D. B Weerasinghe
2014/174 (PDF ) Analysis of a Modified RC4 Algorithm T. D. B Weerasinghe
2014/173 (PDF ) Continuous Non-malleable Codes Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
2014/171 (PDF ) An Effective RC4 Stream Cipher T. D. B Weerasinghe
2014/170 (PDF ) Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256 Shay Gueron
2014/169 (PDF ) Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman
2014/168 (PDF ) Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond Scott Coull, Kevin Dyer
2014/167 (PDF ) How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs
2014/166 (PDF ) Tuple decoders for traitor tracing schemes Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven
2014/164 (PDF ) Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters Yuriy Tarannikov
2014/163 (PDF ) Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices Arnaud Dambra, Philippe Gaborit, Mylène Roussellet, Julien Schrek, Nicolas Tafforeau
2014/162 (PDF ) TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES Hu Xiong
2014/161 (PDF ) ``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way Naomi Benger, Joop van de Pol, Nigel P. Smart, Yuval Yarom
2014/160 (PDF ) TrueSet: Faster Verifiable Set Computations Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos
2014/159 (PDF ) Weak-Key Leakage Resilient Cryptography Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan
2014/158 (PDF ) Point compression for the trace zero subgroup over a small degree extension field Elisa Gorla, Maike Massierer
2014/157 (PDF ) CLOC: Authenticated Encryption for Short Input Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
2014/156 (PDF ) Non-Malleable Extractors with Shorter Seeds and Their Applications Yanqing Yao, Zhoujun Li
2014/155 (PDF ) Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels, Thomas Ristenpart
2014/153 (PDF ) Verifiable Oblivious Storage Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
2014/152 (PDF ) A Statistics-based Fundamental Model for Side-channel Attack Analysis Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang
2014/151 (PDF ) Security Analysis of Key-Alternating Feistel Ciphers Rodolphe Lampe, Yannick Seurin
2014/149 (PDF ) Millions of Millionaires: Multiparty Computation in Large Networks Mahdi Zamani, Mahnush Movahedi, Jared Saia
2014/148 (PDF ) Outsourcing Private RAM Computation Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
2014/147 (PDF ) The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields Razvan Barbulescu, Cécile Pierrot
2014/146 (PDF ) Untappable communication channels over optical fibers from quantum-optical noise Geraldo A. Barbosa, Jeroen van de Graaf
2014/144 (PDF ) How to Securely Release Unverified Plaintext in Authenticated Encryption Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
2014/143 (PDF ) Statistical Concurrent Non-Malleable Zero Knowledge Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
2014/140 (PDF ) Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack Yuval Yarom, Naomi Benger
2014/139 (PDF ) On the Phase Space of Block-Hiding Strategies Assaf Shomer
2014/138 (PDF ) Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction Jae Hong Seo
2014/137 (PDF ) Efficient, Oblivious Data Structures for MPC Marcel Keller, Peter Scholl
2014/136 (PDF ) Isolated Execution on Many-core Architectures Ramya Jayaram Masti, Devendra Rai, Claudio Marforio, Srdjan Capkun
2014/135 (PDF ) Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
2014/134 (PDF ) Kummer strikes back: new DH speed records Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe
2014/133 (PDF ) Efficient Secure and Verifiable Outsourcing of Matrix Multiplications Yihua Zhang, Marina Blanton
2014/132 (PDF ) Efficient Revocable Identity-Based Encryption via Subset Difference Methods Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park
2014/131 (PDF ) Modelling After-the-fact Leakage for Key Exchange Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014/130 (PDF ) Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig
2014/129 (PDF ) How to Use Bitcoin to Design Fair Protocols Iddo Bentov, Ranjit Kumaresan
2014/128 (PDF ) Efficient Three-Party Computation from Cut-and-Choose Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas
2014/127 (PDF ) Algebraic Properties of Modular Addition Modulo a Power of Two S. M. Dehnavi, Alireza Rahimipour
2014/125 (PDF ) Removing Erasures with Explainable Hash Proof Systems Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2014/124 (PDF ) On the Information Ratio of Non-Perfect Secret Sharing Schemes Oriol Farràs, Torben Brandt Hansen, Tarik Kaced, Carles Padró
2014/123 (PDF ) FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes Mohammad Sadeq Dousti, Rasool Jalili
2014/122 (PDF ) New Way to Construct Cryptographic Hash Function WANG Yong
2014/121 (PDF ) Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation Koki Hamada, Dai Ikarashi, Koji Chida, Katsumi Takahashi
2014/120 (PDF ) Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version) Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu
2014/119 (PDF ) Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$) Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2014/118 (PDF ) Quantum position verification in the random oracle model Dominique Unruh
2014/117 (PDF ) An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems Bjoern Grohmann
2014/116 (PDF ) Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model Ronald Cramer, Carles Padrö, Chaoping Xing
2014/115 (PDF ) Comments on a novel user authentication and key agreement scheme Jia-Lun Tsai
2014/114 (PDF ) Prover Anonymous and Deniable Distance-Bounding Authentication Sebastien Gambs, Cristina Onete, Jean-Marc Robert
2014/113 (PDF ) Secure Compression: Theory \& Practice James Kelley, Roberto Tamassia
2014/112 (PDF ) Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich
2014/111 (PDF ) A Note on the CLRW2 Tweakable Block Cipher Construction Gordon Procter
2014/110 (PDF ) Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box Sourav Das
2014/109 (PDF ) Diffusion Programmable Device : The device to prevent reverse engineering Mitsuru Shiozaki, Ryohei Hori, Takeshi Fujino
2014/108 (PDF ) MJH: A Faster Alternative to MDC-2 Jooyoung Lee, Martijn Stam
2014/107 (PDF ) Key-Indistinguishable Message Authentication Codes Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
2014/106 (PDF ) Algorithms in HElib Shai Halevi, Victor Shoup
2014/105 (PDF ) Reducing the Overhead of MPC over a Large Population Ashish Choudhury, Arpita Patra, Nigel P. Smart
2014/104 (PDF ) Space-efficient, byte-wise incremental and perfectly private encryption schemes Kévin Atighehchi
2014/103 (PDF ) SHipher: Families of Block Ciphers based on SubSet-Sum Problem Xiali Hei, Binheng Song
2014/102 (PDF ) Actively Secure Private Function Evaluation Payman Mohassel, Saeed Sadeghian, Nigel P. Smart
2014/101 (PDF ) Dishonest Majority Multi-Party Computation for Binary Circuits Enrique Larraia, Emmanuela Orsini, Nigel P. Smart
2014/100 (PDF ) Improved Slender-set Linear Cryptanalysis Guo-Qiang Liu, Chen-Hui Jin, Chuan-Da Qi
2014/099 (PDF ) Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources Chris Brzuska, Pooya Farshim, Arno Mittelbach
2014/098 (PDF ) Towards Characterizing Complete Fairness in Secure Two-Party Computation Gilad Asharov
2014/097 (PDF ) Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory Koji Nuida
2014/096 (PDF ) Tight security bounds for multiple encryption Yuanxi Dai, John Steinberger
2014/095 (PDF ) Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
2014/094 (PDF ) Faster Bootstrapping with Polynomial Error Jacob Alperin-Sheriff, Chris Peikert
2014/093 (PDF ) The Related-Key Analysis of Feistel Constructions Manuel Barbosa, Pooya Farshim
2014/092 (PDF ) A new class of system oriented PKC, K(I)SOPKC. Masao KASAHARA
2014/091 (PDF ) On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2014/090 (PDF ) Cryptanalysis of KLEIN (Full version) Virginie Lallemand, María Naya-Plasencia
2014/089 (PDF ) Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version) Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard
2014/088 (PDF ) A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing Himanshu Tyagi, Shun Watanabe
2014/087 (PDF ) AnoA: A Framework For Analyzing Anonymous Communication Protocols Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi
2014/086 (PDF ) Randomized and Efficient Authentication in Mobile Environments Wei Jiang, Dan Lin, Feng Li, Elisa Bertino
2014/085 (PDF ) Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer Aleksandra Mileva
2014/084 (PDF ) RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede
2014/083 (PDF ) Garbled RAM Revisited, Part II Steve Lu, Rafail Ostrovsky
2014/082 (PDF ) Garbled RAM Revisited, Part I Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs
2014/081 (PDF ) Efficient Round Optimal Blind Signatures Sanjam Garg, Divya Gupta
2014/080 (PDF ) A Full Characterization of Completeness for Two-party Randomized Function Evaluation Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
2014/079 (PDF ) Unifying Leakage Models: from Probing Attacks to Noisy Leakage Alexandre Duc, Stefan Dziembowski, Sebastian Faust
2014/078 (PDF ) Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers Ahmad Boorghany, Rasool Jalili
2014/077 (PDF ) Mixcoin: Anonymity for Bitcoin with accountable mixes Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten
2014/076 (PDF ) Certified Bitcoins Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros
2014/075 (PDF ) Publicly Auditable Secure Multi-Party Computation Carsten Baum, Ivan Damgård, Claudio Orlandi
2014/074 (PDF ) New and Improved Key-Homomorphic Pseudorandom Functions Abhishek Banerjee, Chris Peikert
2014/073 (PDF ) Anonymous Authentication with Shared Secrets Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
2014/072 (PDF ) Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann
2014/071 (PDF ) Implementing Pairing-Based Cryptosystems in USB Tokens Zhaohui Cheng
2014/070 (PDF ) Lattice Cryptography for the Internet Chris Peikert
2014/069 (PDF ) One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks Manoj Ranjan Mishra, Jayaprakash Kar, Banshidhar Majhi
2014/068 (PDF ) Some security bounds for the DGHV scheme Franca Marinelli, Riccardo Aragona, Chiara Marcolla, Massimiliano Sala
2014/067 (PDF ) Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey
2014/066 (PDF ) A Subexponential Construction of Graph Coloring for Multiparty Computation Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld
2014/065 (PDF ) Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case Palash Sarkar, Shashank Singh
2014/064 (PDF ) A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems Alain Couvreur, Irene Márquez-Corbella, Ruud Pellikaan
2014/063 (PDF ) Cryptanalysis on “Secure untraceable off-line electronic cash system” Yalin Chen, Jue-Sam Chou
2014/062 (PDF ) A Comparison of the Homomorphic Encryption Schemes FV and YASHE Tancrède Lepoint, Michael Naehrig
2014/061 (PDF ) Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts Stefano Tessaro, David A. Wilson
2014/060 (PDF ) Verifiable Computation in Multiparty Protocols with Honest Majority Peeter Laud, Alisa Pankova
2014/059 (PDF ) Cuckoo Cycle: a memory bound graph-theoretic proof-of-work John Tromp
2014/058 (PDF ) Cryptanalysis of FIDES Itai Dinur, Jérémy Jean
2014/057 (PDF ) Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez
2014/056 (PDF ) Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
2014/055 (PDF ) Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Younsung Choi
2014/054 (PDF ) The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions Sugata Gangopadhyay, Pantelimon Stanica
2014/053 (PDF ) Masking and Leakage-Resilient Primitives: One, the Other(s) or Both? Sonia Belaïd, Vincent Grosso, François-Xavier Standaert
2014/052 (PDF ) DAA-related APIs in TPM2.0 Revisited Li Xi
2014/051 (PDF ) An Equivalence-Preserving Transformation of Shift Registers Elena Dubrova
2014/050 (PDF ) Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication Daniel R. L. Brown
2014/049 (PDF ) Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography Neha tirthani, Ganesan R
2014/048 (PDF ) When a Boolean Function can be Expressed as the Sum of two Bent Functions Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li
2014/047 (PDF ) Down the Rabbit Hole: Revisiting the Shrinking Method Vivien Dubois
2014/046 (PDF ) Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking” Yalin Chen, Jue-Sam Chou
2014/045 (PDF ) Human Assisted Randomness Generation Using Video Games Mohsen Alimomeni, Reihaneh Safavi-Naini
2014/044 (PDF ) rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval Lichun Li, Michael Militzer, Anwitaman Datta
2014/043 (PDF ) Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings Mehdi Tibouchi
2014/042 (PDF ) A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem Jintai Ding, Chengdong Tao
2014/041 (PDF ) Cryptanalysis via algebraic spans Adi Ben-Zvi, Arkadius Kalka, Boaz Tsaban
2014/040 (PDF ) A Fast Modular Reduction Method Zhengjun Cao, Ruizhong Wei, Xiaodong Lin
2014/039 (PDF ) Homomorphic AES Evaluation using NTRU Yarkin Doroz, Yin Hu, Berk Sunar
2014/038 (PDF ) Extending and Applying a Framework for the Cryptographic Verification of Java Programs. Ralf Kuesters, Enrico Scapin, Tomasz Truderung, Juergen Graf
2014/037 (PDF ) On the Security of the Pre-Shared Key Ciphersuites of TLS Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk
2014/036 (PDF ) A Secure Text Messaging Protocol Gary Belvin
2014/035 (PDF ) A new attack on RSA with a composed decryption exponent Abderrahmane Nitaj, Mohamed Ould Douh
2014/034 (PDF ) Authenticated Encryption with SPECK Chase Manny
2014/033 (PDF ) Lattice-based Group Signature Scheme with Verier-local Revocation Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang
2014/032 (PDF ) Scale-Invariant Fully Homomorphic Encryption over the Integers Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
2014/031 (PDF ) On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results Yongge Wang
2014/030 (PDF ) Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplicio Jr.
2014/029 (PDF ) General Impossibility of Group Homomorphic Encryption in the Quantum World Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
2014/028 (PDF ) Channel Equalization for Side Channel Attacks Colin O'Flynn, Zhizhang (David) Chen
2014/027 (PDF ) Twisting Edwards curves with isogenies Mike Hamburg
2014/026 (PDF ) Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba
2014/025 (PDF ) Side-Channel Leakage through Static Power – Should We Care about in Practice? – Amir Moradi
2014/024 (PDF ) An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation Ivan Damgård, Jesper Buus Nielsen
2014/023 (PDF ) Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle Gengran Hu, Yanbin Pan, Feng Zhang
2014/022 (PDF ) Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR Sourav Das
2014/021 (PDF ) Online/Offline Attribute-Based Encryption Susan Hohenberger, Brent Waters
2014/020 (PDF ) (De-)Constructing TLS Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Bjoern Tackmann, Daniele Venturi
2014/019 (PDF ) Lazy Modulus Switching for the BKW Algorithm on LWE Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
2014/018 (PDF ) Completeness for Symmetric Two-Party Functionalities - Revisited Yehuda Lindell, Eran Omri, Hila Zarosim
2014/016 (PDF ) Triple and Quadruple Encryption: Bridging the Gaps Bart Mennink, Bart Preneel
2014/015 (PDF ) Tight Security Bounds for Triple Encryption Jooyoung Lee
2014/014 (PDF ) Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes Felix Günther, Bertram Poettering
2014/012 (PDF ) Maximal Information Coefficient Analysis Yanis Linge, Cecile Dumas, Sophie Lambert-Lacroix
2014/011 (PDF ) Construction of New Families of MDS Diffusion Layers S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2014/010 (PDF ) A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh
2014/009 (PDF ) Characterization of EME with Linear Mixing Nilanjan Datta, Mridul Nandi
2014/008 (PDF ) A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis Annelie Heuser, Olivier Rioul, Sylvain Guilley
2014/007 (PDF ) One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner. Ethan Heilman
2014/006 (PDF ) Efficient Non-Interactive Zero Knowledge Arguments for Set Operations Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
2014/004 (PDF ) MaxMinMax problem and sparse equations over finite fields Igor Semaev
2014/003 (PDF ) $GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials Xi Xiong, Haining Fan
2014/002 (PDF ) Pseudorandom Generator Based on Hard Lattice Problem Kuan Cheng
2014/001 (PDF ) Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks Yalin Chen, Jue-Sam Chou
[ Cryptology ePrint archive ]