Cryptology ePrint Archive: Listing for 2015
Regex
2015/1256 (PDF ) Mitigating Multi-Target Attacks in Hash-based Signatures Andreas Hülsing, Joost Rijneveld, Fang Song
2015/1255 (PDF ) Functional Encryption for Inner Product with Full Function Privacy Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/1254 (PDF ) Identity-based Hierarchical Key-insulated Encryption without Random Oracles Yohei Watanabe, Junji Shikata
2015/1253 (PDF ) Non-Malleable Functions and Their Applications Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
2015/1252 (PDF ) Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, Debdeep Mukhopadhyay
2015/1251 (PDF ) Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability Zhengjun Cao, Zhenfu Cao
2015/1250 (PDF ) Adaptively Secure Garbled Circuits from One-Way Functions Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs
2015/1249 (PDF ) Trap Me If You Can -- Million Dollar Curve Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain
2015/1248 (PDF ) Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model Janaka Alawatugoda
2015/1247 (PDF ) Missing a trick: Karatsuba variations Mike Scott
2015/1246 (PDF ) Universally Composable Direct Anonymous Attestation Jan Camenisch, Manu Drijvers, Anja Lehmann
2015/1245 (PDF ) Variation of GGH15 Multilinear Maps Gu Chunsheng
2015/1244 (PDF ) On values of vectorial Boolean functions and related problems in APN functions George Shushuev
2015/1243 (PDF ) Verifiable ASICs Riad S. Wahby, Max Howald, Siddharth Garg, abhi shelat, Michael Walfish
2015/1242 (PDF ) Quantum Cryptography Beyond Quantum Key Distribution Anne Broadbent, Christian Schaffner
2015/1241 (PDF ) Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
2015/1239 (PDF ) Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott
2015/1238 (PDF ) Asynchronous Secure Multiparty Computation in Constant Time Ran Cohen
2015/1237 (PDF ) On the Security of One Password Authenticated Key Exchange Protocol Stanislav V. Smyshlyaev, Igor B. Oshkin, Evgeniy K. Alekseev, Liliya R. Ahmetzyanova
2015/1236 (PDF ) A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks Liron David, Avishai Wool
2015/1235 (PDF ) Constant-round Leakage-resilient Zero-knowledge from Collision Resistance Susumu Kiyoshima
2015/1234 (PDF ) On Cryptographic Anonimity and Unpredicatbility in Secret Sharing Ruxandra Olimid, Anat Paskin-Cherniavsky
2015/1233 (PDF ) Degenerate Curve Attacks Samuel Neves, Mehdi Tibouchi
2015/1232 (PDF ) Extend FHEW to General Case Zhou Tanping, Liu Longfei, Yang Xiaoyuan, Han Yiliang
2015/1231 (PDF ) When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack Hassan Jameel Asghar, Mohamed Ali Kaafar
2015/1230 (PDF ) Indistinguishable Proofs of Work or Knowledge Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/1229 (PDF ) Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao
2015/1228 (PDF ) Privacy protection in electronic education based on polymorphic pseudonymization Eric R. Verheul
2015/1227 (PDF ) Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512 Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
2015/1226 (PDF ) Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos
2015/1225 (PDF ) ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p) Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay
2015/1224 (PDF ) Twisted Polynomials and Forgery Attacks on GCM Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, Elmar Tischhauser
2015/1223 (PDF ) Chosen-Ciphertext Security from Subset Sum Sebastian Faust, Daniel Masny, Daniele Venturi
2015/1222 (PDF ) On the Asymptotic Complexity of Solving LWE Gottfried Herold, Elena Kirshanova, Alexander May
2015/1220 (PDF ) Two-Round Man-in-the-Middle Security from LPN David Cash, Eike Kiltz, Stefano Tessaro
2015/1219 (PDF ) Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud
2015/1217 (PDF ) Two-faced processes and existence of RNG with proven properties Boris Ryabko
2015/1216 (PDF ) Non-Transferable Proxy Re-Encryption Hui Guo, Zhenfeng Zhang, Jing Xu
2015/1215 (PDF ) Simpler, Faster, and More Robust T-test Based Leakage Detection A. Adam Ding, Cong Chen, Thomas Eisenbarth
2015/1214 (PDF ) Simple Security Definitions for and Constructions of 0-RTT Key Exchange Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
2015/1213 (PDF ) Footprint scheduling for Dining-Cryptographer networks Anna Krasnova, Moritz Neikes, Peter Schwabe
2015/1212 (PDF ) Choosing and generating parameters for low level pairing implementation on BN curves Sylvain Duquesne, Nadia El Mrabet, Safia Haloui, Franck Rondepierre
2015/1211 (PDF ) Log Analysis of Estonian Internet Voting 2013--2015 Sven Heiberg, Arnis Parsovs, Jan Willemson
2015/1210 (PDF ) Quantum Security of the Fujisaki-Okamoto and OAEP Transforms Ehsan Ebrahimi Targhi, Dominique Unruh
2015/1209 (PDF ) Fast Optimistically Fair Cut-and-Choose 2PC Alptekin Kupcu, Payman Mohassel
2015/1208 (PDF ) Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE Zheng Yuan, Zhen Peng, Haiwen Ou
2015/1207 (PDF ) Comment on Demonstrations of Shor's Algorithm in the Past Decades Zhengjun Cao, Zhenfu Cao, Lihua Liu
2015/1206 (PDF ) Simple Photonic Emission Attack with Reduced Data Complexity Elad Carmon, Jean-Pierre Seifert, Avishai Wool
2015/1205 (PDF ) Deniable Functional Encryption Angelo De Caro, Vincenzo Iovino, Adam O'Neill
2015/1204 (PDF ) Secret, verifiable auctions from elections Elizabeth A. Quaglia, Ben Smyth
2015/1203 (PDF ) The graph of minimal distances of bent functions and its properties Nikolay Kolomeec
2015/1202 (PDF ) CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung
2015/1201 (PDF ) A Star-based Independent Biclique Attack on Full Rounds SQUARE Zheng Yuan, Zhen Peng, Ming Mao
2015/1200 (PDF ) Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/1199 (PDF ) A compression method for homomorphic ciphertexts S. Carpov, R. Sirdey
2015/1198 (PDF ) Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption Mihir Bellare, Anna Lysyanskaya
2015/1197 (PDF ) On-the-fly Homomorphic Batching/Unbatching Yarkın Doröz, Berk Sunar, Gizem S. Çetin
2015/1196 (PDF ) Secure Distributed Computation on Private Inputs Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/1195 (PDF ) ARITHMETIC USING WORD-WISE HOMOMORPHIC ENCRYPTION Gizem S. Cetin, Yarkin Doroz, Berk Sunar, William J. Martin
2015/1194 (PDF ) HOMOMORPHIC AUTOCOMPLETE Gizem S. Çetin, Wei Dai, Yarkın Doröz, Berk Sunar
2015/1193 (PDF ) Collision Attacks against CAESAR Candidates -- Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr, Gaëtan Leurent, Valentin Suder
2015/1192 (PDF ) A Guide to Fully Homomorphic Encryption Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand
2015/1191 (PDF ) A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers Chester Rebeiro, Debdeep Mukhopadhyay
2015/1190 (PDF ) Private Large-Scale Databases with Distributed Searchable Symmetric Encryption Yuval Ishal, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
2015/1189 (PDF ) Invariant Subspace Attack Against Full Midori64 Jian Guo, Jérémy Jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
2015/1188 (PDF ) Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/1187 (PDF ) On an almost-universal hash function family with applications to authentication and secrecy codes Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, László Tóth
2015/1186 (PDF ) Restricted linear congruences Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, Roberto Tauraso, László Tóth
2015/1185 (PDF ) Efficient Pseudorandom Functions via On-the-Fly Adaptation Nico Doettling, Dominique Schröder
2015/1184 (PDF ) Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems Alan Szepieniec, Jintai Ding, Bart Preneel
2015/1183 (PDF ) Authenticated Range \& Closest Point Queries in Zero-Knowledge Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
2015/1182 (PDF ) Chaskey: a MAC Algorithm for Microcontrollers -- Status Update and Proposal of Chaskey-12 -- Nicky Mouha
2015/1181 (PDF ) Construction of Transition Matrices for Binary FCSRs Zhiqiang Lin, Dingyi Pei, Dongdai Lin
2015/1180 (PDF ) Secure Comparator: a ZKP-Based Authentication System Ignat Korchagin, Eugene Pilyankevich
2015/1179 (PDF ) A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n} Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi
2015/1178 (PDF ) Textbook Non-Malleable Commitments Vipul Goyal, Omkant Pandey, Silas Richelson
2015/1177 (PDF ) On the CCA (in)security of MTProto Jakob Jakobsen, Claudio Orlandi
2015/1176 (PDF ) On the Efficiency of FHE-based Private Queries Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang
2015/1175 (PDF ) Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud Bhanu Prakash Gopularam, Nalini. N
2015/1174 (PDF ) On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers Goutam Paul, Souvik Ray
2015/1173 (PDF ) Secure Multiparty Computation with General Interaction Patterns Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin
2015/1170 (PDF ) Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security Takanori Yasuda, Xavier Dahan, Kouichi Sakurai
2015/1169 (PDF ) Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud Marc Green, Thomas Eisenbarth
2015/1167 (PDF ) Constraining Pseudorandom Functions Privately Dan Boneh, Kevin Lewi, David J. Wu
2015/1166 (PDF ) Ceremonies for End-to-End Verifiable Elections Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/1165 (PDF ) Meet-in-the-Middle Attacks on Reduced-Round Midori-64 Li Lin, Wenling Wu
2015/1164 (PDF ) Beyond Bitcoin - Part I: A critical look at blockchain-based systems Pasquale Forte, Diego Romano, Giovanni Schmid
2015/1163 (PDF ) A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher Mehmet Özen, Mustafa Çoban, Ferhat Karakoç
2015/1162 (PDF ) The Moral Character of Cryptographic Work Phillip Rogaway
2015/1161 (PDF ) Cyber and Physical Access Control in Legacy System Using Passwords Jia Xu, Jianying Zhou, Liming Lu
2015/1160 (PDF ) Cryptanalysis of multi-HFE Yasufumi Hashimoto
2015/1159 (PDF ) Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste
2015/1158 (PDF ) A note on the optimality of frequency analysis vs. $\ell_p$-optimization Marie-Sarah Lacharité, Kenneth G. Paterson
2015/1157 (PDF ) From Identification to Signatures, Tightly: A Framework and Generic Transforms Mihir Bellare, Bertram Poettering, Douglas Stebila
2015/1155 (PDF ) Cross Processor Cache Attacks Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/1154 (PDF ) NORX8 and NORX16: Authenticated Encryption for Low-End Systems Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves
2015/1153 (PDF ) Obliv-C: A Language for Extensible Data-Oblivious Computation Samee Zahur, David Evans
2015/1152 (PDF ) Privacy-preserving Friendship-based Recommender Systems Qiang Tang, Jun Wang
2015/1151 (PDF ) Fully Leakage-Resilient Codes Antonio Faonio, Jesper Buus Nielsen
2015/1150 (PDF ) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila
2015/1149 (PDF ) An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption Takahiro Matsuda, Goichiro Hanaoka
2015/1148 (PDF ) An Inverse-free Single-Keyed Tweakable Enciphering Scheme Ritam Bhaumik, Mridul Nandi
2015/1146 (PDF ) libgroupsig: An extensible C library for group signatures Jesus Diaz, David Arroyo, Francisco B. Rodriguez
2015/1145 (PDF ) Lattice Attacks on the DGHV Homomorphic Encryption Scheme Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/1144 (PDF ) Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015/1142 (PDF ) Midori: A Block Cipher for Low Energy (Extended Version) Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni
2015/1141 (PDF ) Amplifying Side Channels Through Performance Degradation Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom
2015/1140 (PDF ) Modular Inversion Hidden Number Problem- A Lattice Approach Pranjal Dutta
2015/1139 (PDF ) Secret Sharing Schemes with General Access Structures (Full version) Jian Liu, Sihem Mesnager, Lusheng Chen
2015/1138 (PDF ) Lightweight CRC-based Authentication Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
2015/1137 (PDF ) Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference Mengce Zheng, Noboru Kunihiro, Honggang Hu
2015/1136 (PDF ) Multi-Input Functional Encryption for Unbounded Arity Functions Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai
2015/1135 (PDF ) On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata
2015/1134 (PDF ) $\Lambda \circ \lambda$: Functional Lattice Cryptography Eric Crockett, Chris Peikert
2015/1133 (PDF ) Comment on ``Realization of a scalable Shor algorithm" Zhengjun Cao, Lihua Liu
2015/1132 (PDF ) Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders Katsuyuki Takashima, Atsushi Takayasu
2015/1131 (PDF ) On the Usability of Two-Factor Authentication Ding Wang, Ping Wang
2015/1130 (PDF ) A Note on Perfect Correctness by Derandomization Nir Bitansky, Vinod Vaikuntanathan
2015/1129 (PDF ) Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS Martin R. Albrecht, Kenneth G. Paterson
2015/1128 (PDF ) New directions in nearest neighbor searching with applications to lattice sieving Anja Becker, Léo Ducas, Nicolas Gama, Thijs Laarhoven
2015/1127 (PDF ) Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups Mikhail Anokhin
2015/1126 (PDF ) A Practical Oblivious Map Data Structure with Secure Deletion and History Independence Daniel S. Roche, Adam J. Aviv, Seung Geol Choi
2015/1125 (PDF ) Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
2015/1124 (PDF ) Secret Sharing Schemes Based on Resilient Boolean Maps Juan Carlos Ku-Cauich, Guillermo Morales-Luna
2015/1123 (PDF ) Practical, Predictable Lattice Basis Reduction Daniele Micciancio, Michael Walter
2015/1121 (PDF ) On the First Fall Degree of Summation Polynomials Stavros Kousidis, Andreas Wiemers
2015/1120 (PDF ) Even More Practical Key Exchanges for the Internet using Lattice Cryptography Vikram Singh, Arjun Chopra
2015/1119 (PDF ) On the Possibility of Non-Interactive E-Voting in the Public-key Setting Rosario Giustolisi, Vincenzo Iovino, Peter B. Rønne
2015/1118 (PDF ) Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers Zhenzhen Bao, Peng Luo, Dongdai Lin
2015/1117 (PDF ) Efficient implementation of AND, OR and NOT operators for ABCs Antonio de la Piedra
2015/1116 (PDF ) CHf-ORAM: A Constant Communication ORAM without Homomorphic Encryption Tarik Moataz, Erik-Oliver Blass, Travis Mayberry
2015/1115 (PDF ) Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
2015/1114 (PDF ) Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension Michał Wroński
2015/1113 (PDF ) Multi-Input Functional Encryption with Unbounded-Message Security Vipul Goyal, Aayush Jain, Adam O' Neill
2015/1112 (PDF ) Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles Prastudy Fauzi, Helger Lipmaa
2015/1110 (PDF ) Privacy-Aware Authentication in the Internet of Things Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
2015/1109 (PDF ) Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi
2015/1108 (PDF ) Recommender Systems and their Security Concerns Jun Wang, Qiang Tang
2015/1107 (PDF ) Concurrent Secure Computation via Non-Black Box Simulation Vipul Goyal, Divya Gupta, Amit Sahai
2015/1106 (PDF ) POPE: Partial Order Preserving Encoding Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich
2015/1105 (PDF ) Selene: Voting with Transparent Verifiability and Coercion-Mitigation Peter Y A Ryan, Peter B Roenne, Vincenzo Iovino
2015/1104 (PDF ) Computing Jacobi's \theta in quasi-linear time Hugo Labrande
2015/1103 (PDF ) Linear codes with few weights from weakly regular bent functions based on a generic construction Sihem Mesnager
2015/1102 (PDF ) A Practical Cryptanalysis of the Algebraic Eraser Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban
2015/1101 (PDF ) Virtual Smart Cards: How to Sign with a Password and a Server Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
2015/1100 (PDF ) Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves. Anissa Sghaier, Loubna Ghammam, Medyen Zeghid, Sylvain Duquesne, Mohsen Machhout
2015/1099 (PDF ) Device-Enhanced Password Protocols with Optimal Online-Offline Protection Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2015/1098 (PDF ) Ring Signature Confidential Transactions for Monero Shen Noether
2015/1097 (PDF ) On the Communication required for Unconditionally Secure Multiplication Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou, Michael Raskin
2015/1096 (PDF ) Watermarking Cryptographic Capabilities Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs
2015/1095 (PDF ) Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures Vipul Goyal, Aayush Jain, Dakshita Khurana
2015/1094 (PDF ) Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification Divesh Aggarwal, Kaave Hosseini, Shachar Lovett
2015/1093 (PDF ) C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs Ahmed Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, Hubert Chan, Charalampos Papamanthou, Rafael Pass, abhi shelat, Elaine Shi
2015/1092 (PDF ) Post-quantum key exchange - a new hope Erdem Alkim, Léo Ducas, Thomas Pöppelmann, Peter Schwabe
2015/1090 (PDF ) Do Distributed Differentially-Private Protocols Require Oblivious Transfer? Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai
2015/1089 (PDF ) Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, Gabriele Spini
2015/1088 (PDF ) Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015 Eiichiro Fujisaki, Keita Xagawa
2015/1086 (PDF ) Chicken or the Egg - Computational Data Attacks or Physical Attacks Julien Allibert, Benoit Feix, Georges Gagnerot, Ismael Kane, Hugues Thiebeauld, Tiana Razafindralambo
2015/1085 (PDF ) Malicious Keccak Pawel Morawiecki
2015/1084 (PDF ) Patchable Indistinguishability Obfuscation: iO for Evolving Software Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/1083 (PDF ) Implementation Attacks on Post-Quantum Cryptographic Schemes Mostafa Taha, Thomas Eisenbarth
2015/1082 (PDF ) Delegating RAM Computations with Adaptive Soundness and Privacy Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin
2015/1081 (PDF ) NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim
2015/1080 (PDF ) Variations to the cryptographics algorithms AES and TWOFISH P. Freyre, N. Díaz, O. Cuellar
2015/1079 (PDF ) De Bruijn Sequences from Symmetric Shift Registers Ming Li, Mingxing Wang, Dongdai Lin
2015/1078 (PDF ) Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan
2015/1077 (PDF ) Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn Dibyendu Roy, Sourav Mukhopadhyay
2015/1076 (PDF ) An appendix for a recent paper of Kim Razvan Barbulescu
2015/1075 (PDF ) Cybersecurity in an era with quantum computers: will we be ready? Michele Mosca
2015/1074 (PDF ) Succinct Adaptive Garbled RAM Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
2015/1073 (PDF ) Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs David Derler, Daniel Slamanig
2015/1071 (PDF ) Revisiting Secure Two-Party Computation with Rational Players Arpita Maitra, Goutam Paul, Asim K. Pal
2015/1070 (PDF ) Barriers to Black-Box Constructions of Traitor Tracing Systems Bo Tang, Jiapeng Zhang
2015/1069 (PDF ) Indifferentiability of 8-Round Feistel Networks Yuanxi Dai, John Steinberger
2015/1068 (PDF ) Black-Box Parallel Garbled RAM Steve Lu, Rafail Ostrovsky
2015/1067 (PDF ) Public Verifiability in the Covert Model (Almost) for Free Vladimir Kolesnikov, Alex J. Malozemoff
2015/1066 (PDF ) Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential Haipeng Qu, Peng Shang, Xi-Jun Lin, Lin Sun
2015/1065 (PDF ) Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM Christopher Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov
2015/1064 (PDF ) Déjà Q: Encore! Un Petit IBE Hoeteck Wee
2015/1063 (PDF ) Optimal Computational Split-state Non-malleable Codes Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
2015/1062 (PDF ) Lower Bounds on Assumptions behind Indistinguishability Obfuscation Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, abhi shelat
2015/1061 (PDF ) On Basing Private Information Retrieval on NP-Hardness Tianren Liu, Vinod Vaikuntanathan
2015/1060 (PDF ) Complete addition formulas for prime order elliptic curves Joost Renes, Craig Costello, Lejla Batina
2015/1059 (PDF ) A General Framework for Redactable Signatures and New Constructions David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2015/1058 (PDF ) Rational Sumchecks Siyao Guo, Pavel Hubacek, Alon Rosen, Margarita Vald
2015/1057 (PDF ) The Complexity of Computing the Optimal Composition of Differential Privacy Jack Murtagh, Salil Vadhan
2015/1056 (PDF ) Information-theoretic Local Non-malleable Codes and their Applications Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman
2015/1055 (PDF ) Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits Yuval Ishai, Mor Weiss, Guang Yang
2015/1054 (PDF ) Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS HUI ZHAO, Kouichi Sakurai
2015/1053 (PDF ) Oblivious Parallel RAM: Improved Efficiency and Generic Constructions Binyi Chen, Huijia Lin, Stefano Tessaro
2015/1052 (PDF ) PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management Chenglu Jin, Xiaolin Xu, Wayne Burleson, Ulrich Rührmair, Marten van Dijk
2015/1051 (PDF ) Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme Jayaprakash Kar
2015/1050 (PDF ) Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem Thuraya M. Qaradaghi, Newroz N. Abdulrazaq
2015/1049 (PDF ) Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers Thomas Peyrin, Yannick Seurin
2015/1048 (PDF ) Verifiable Random Functions from Standard Assumptions Dennis Hofheinz, Tibor Jager
2015/1047 (PDF ) Reconfigurable Cryptography: A flexible approach to long-term security Julia Hesse, Dennis Hofheinz, Andy Rupp
2015/1046 (PDF ) From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back Benny Applebaum, Pavel Raykov
2015/1045 (PDF ) Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs Gefei Li, Yuval Yarom, Damith C. Ranasinghe
2015/1044 (PDF ) Homomorphic evaluation requires depth Andrej Bogdanov, Chin Ho Lee
2015/1043 (PDF ) The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle Subhamoy Maitra
2015/1042 (PDF ) ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM Andreas Hülsing, Joost Rijneveld, Peter Schwabe
2015/1041 (PDF ) The Number of Boolean Functions with Multiplicative Complexity 2 Magnus Gausdal Find, Daniel Smith-Tone, Meltem Sonmez Turan
2015/1040 (PDF ) Fully Homomorphic Encryption with Composite Number Modulus Masahiro Yagisawa
2015/1039 (PDF ) Maturity and Performance of Programmable Secure Computation David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen
2015/1038 (PDF ) Revisiting LEGOs: Optimizations, Analysis, and their Limit Yan Huang, Ruiyu Zhu
2015/1037 (PDF ) Cryptanalysis of GGH15 Multilinear Maps Jean-Sebastien Coron, Moon Sung Lee, Tancrede Lepoint, Mehdi Tibouchi
2015/1036 (PDF ) Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selcuk Kavut, Subhamoy Maitra
2015/1035 (PDF ) CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control Britta Hale, Christopher Carr, Danilo Gligoroski
2015/1034 (PDF ) Real time detection of cache-based side-channel attacks using Hardware Performance Counters Marco Chiappetta, Erkay Savas, Cemal Yilmaz
2015/1033 (PDF ) The Ultimate Transposition Cipher (UTC) Gideon Samid
2015/1032 (PDF ) Essentially Optimal Robust Secret Sharing with Maximal Corruptions Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs
2015/1031 (PDF ) Secure Dating with Four or Fewer Cards Antonio Marcedone, Zikai Wen, Elaine Shi
2015/1030 (PDF ) SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC Vadim N. Tsypyschev
2015/1029 (PDF ) The Energy Budget for Wireless Security: Extended Version Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
2015/1028 (PDF ) Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3 Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska
2015/1027 (PDF ) Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case Taechan Kim, Razvan Barbulescu
2015/1026 (PDF ) Hardness Estimation of LWE via Band Pruning Yoshinori Aono, Le Trieu Phong, Lihua Wang
2015/1025 (PDF ) PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers Dieter Schmidt
2015/1023 (PDF ) Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/1022 (PDF ) Recent progress on the elliptic curve discrete logarithm problem Steven D. Galbraith, Pierrick Gaudry
2015/1021 (PDF ) New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption Katsuyuki Takashima
2015/1020 (PDF ) Attacking the Network Time Protocol Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg
2015/1019 (PDF ) Speed-Security Tradeoffs in Blockchain Protocols Aggelos Kiayias, Giorgos Panagiotakos
2015/1018 (PDF ) A Riddle Wrapped in an Enigma Neal Koblitz, Alfred J. Menezes
2015/1017 (PDF ) Functional Encryption: Decentralised and Delegatable Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai
2015/1016 (PDF ) One-Key Compression Function Based MAC with Security beyond Birthday Bound Avijit Dutta, Mridul Nandi, Goutam Paul
2015/1015 (PDF ) On Bitcoin as a public randomness source Joseph Bonneau, Jeremy Clark, Steven Goldfeder
2015/1014 (PDF ) Fast Fourier Orthogonalization Léo Ducas, Thomas Prest
2015/1013 (PDF ) Inception Makes Non-malleable Codes Stronger Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
2015/1012 (PDF ) An Efficient Multiple PKG Compatible Identity Based Authenticated Key Agreement protocol Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan
2015/1011 (PDF ) Hierarchical Functional Encryption Zvika Brakerski, Gil Segev
2015/1010 (PDF ) TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption Sanjam Garg, Payman Mohassel, Charalampos Papamanthou
2015/1009 (PDF ) Applications of Key Recovery Cube-attack-like Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny
2015/1008 (PDF ) Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges Gaby G. Dagher, Benedikt Buenz, Joseph Bonneau, Jeremy Clark, Dan Boneh
2015/1007 (PDF ) How to Vote Privately Using Bitcoin Zhichao Zhao, T-H. Hubert Chan
2015/1006 (PDF ) Confidential Benchmarking based on Multiparty Computation Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft
2015/1005 (PDF ) Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces Wenbin Zhang, Chik How Tan
2015/1004 (PDF ) Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi
2015/1003 (PDF ) Results on polynomial interpolation with mixed modular operations and unknown moduli Oscar Garcia-Morchon, Ronald Rietman, Igor Shparlinski, Ludo Tolhuizen
2015/1002 (PDF ) got HW crypto? On the (in)security of a Self-Encrypting Drive series Gunnar Alendal, Christian Kison, modg
2015/1001 (PDF ) Dismantling real-world ECC with Horizontal and Vertical Template Attacks Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrege, Carine Therond
2015/1000 (PDF ) Factoring as a Service Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger
2015/999 (PDF ) Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
2015/998 (PDF ) All or Nothing at All Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson
2015/997 (PDF ) Incremental Program Obfuscation Sanjam Garg, Omkant Pandey
2015/996 (PDF ) Multi-user Schnorr security, revisited Daniel J. Bernstein
2015/995 (PDF ) Updates on Sorting of Fully Homomorphic Encrypted Data Nitesh Emmadi, Praveen Gauravaram, Harika Narumanchi, Habeeb Syed
2015/993 (PDF ) Bi-Deniable Inner Product Encryption from LWE Daniel Apon, Xiong Fan, Feng-Hao Liu
2015/992 (PDF ) Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency Jinsu Kim, Sungwook Kim, Jae Hong Seo
2015/991 (PDF ) Ed3363 (HighFive) -- An alternative Elliptic Curve Mike Scott
2015/990 (PDF ) Encryption Switching Protocols Geoffroy Couteau, Thomas Peters, David Pointcheval
2015/989 (PDF ) Fast Oblivious AES\\A dedicated application of the MiniMac protocol Ivan Damgård, Rasmus Winther Zakarias
2015/988 (PDF ) Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48 Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram
2015/987 (PDF ) Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries Yehuda Lindell, Ben Riva
2015/986 (PDF ) Bit Coincidence Mining Algorithm Koh-ichi Nagao
2015/985 (PDF ) Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system Koh-ichi Nagao
2015/984 (PDF ) Complexity of ECDLP under the First Fall Degree Assumption Koh-ichi Nagao
2015/983 (PDF ) Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes Ping Ngai Chung, Craig Costello, Benjamin Smith
2015/982 (PDF ) A note on constructions of bent functions from involutions Sihem Mesnager
2015/981 (PDF ) Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud Ayantika Chatterjee, Indranil Sengupta
2015/980 (PDF ) Analysis of an RFID Authentication Protocol in Accordance with EPC Standards Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref
2015/979 (PDF ) Guidelines for Using the CryptDB System Securely Raluca Ada Popa, Nickolai Zeldovich, Hari Balakrishnan
2015/978 (PDF ) The OPTLS Protocol and TLS 1.3 Hugo Krawczyk, Hoeteck Wee
2015/977 (PDF ) Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³) Michał Wroński
2015/976 (PDF ) On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure Alex Biryukov, Léo Perrin
2015/975 (PDF ) Extended Functionality in Verifiable Searchable Encryption James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick
2015/974 (PDF ) The Conjoined Microprocessor Ehsan Aerabi, A. Elhadi Amirouche, Houda Ferradi, Rémi Géraud, David Naccache, Jean Vuillemin
2015/973 (PDF ) Some Cryptanalytic Results on Zipper Hash and Concatenated Hash Ashwin Jha, Mridul Nandi
2015/972 (PDF ) Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash David Pointcheval, Olivier Sanders, Jacques Traoré
2015/971 (PDF ) Attacks on the Search-RLWE problem with small error Hao Chen, Kristin E. Lauter, Katherine E. Stange
2015/969 (PDF ) Zero-Knowledge Interactive Proof Systems for New Lattice Problems Claude Crepéau, Raza Ali Kazmi
2015/968 (PDF ) Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Gaëtan Leurent
2015/967 (PDF ) Freestart collision for full SHA-1 Marc Stevens, Pierre Karpman, Thomas Peyrin
2015/966 (PDF ) Vulnerabilities of ``McEliece in the World of Escher" Dustin Moody, Ray Perlner
2015/965 (PDF ) Private Genome Analysis through Homomorphic Encryption Miran Kim, Kristin Lauter
2015/964 (PDF ) Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN Danping Shi, Lei Hu, Siwei Sun, Ling Song
2015/963 (PDF ) When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria
2015/962 (PDF ) SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen
2015/961 (PDF ) Short Structure-Preserving Signatures Essam Ghadafi
2015/960 (PDF ) More Efficient Secure Outsourcing Methods for Bilinear Maps Öznur Arabacı, Mehmet Sabir Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/959 (PDF ) Cryptanalysis of the Round-Reduced Kupyna Hash Function Jian Zou, Le Dong
2015/957 (PDF ) Delegating RAM Computations Yael Tauman Kalai, Omer Paneth
2015/956 (PDF ) Analysis of the Kupyna-256 Hash Function Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/955 (PDF ) On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives Mridul Nandi, Tapas Pandit
2015/954 (PDF ) Online-Offline Homomorphic Signatures for Polynomial Functions Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2015/953 (PDF ) Gaussian Sampling Precision in Lattice Cryptography Markku-Juhani O. Saarinen
2015/952 (PDF ) Commitment and Oblivious Transfer in the Bounded Storage Model with Errors Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento
2015/951 (PDF ) Nearly Optimal Robust Secret Sharing Mahdi Cheraghchi
2015/950 (PDF ) A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer Shota Goto, Junji Shikata
2015/949 (PDF ) Private Processing of Outsourced Network Functions: Feasibility and Constructions Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar
2015/948 (PDF ) A Provably Secure Short Signature Scheme from Coding Theory Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/947 (PDF ) Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng
2015/946 (PDF ) Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem Alex Biryukov, Dmitry Khovratovich
2015/945 (PDF ) Secure Set-based Policy Checking and Its Application to Password Registration Changyu Dong, Franziskus Kiefer
2015/944 (PDF ) New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields Palash Sarkar, Shashank Singh
2015/943 (PDF ) Sandy2x: New Curve25519 Speed Records Tung Chou
2015/942 (PDF ) Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios Ben Smyth
2015/941 (PDF ) Cryptanalysis of the New Multilinear Map over the Integers Brice Minaud, Pierre-Alain Fouque
2015/940 (PDF ) Secure Association for the Internet of Things Almog Benin, Sivan Toledo, Eran Tromer
2015/939 (PDF ) A Decade of Lattice Cryptography Chris Peikert
2015/938 (PDF ) Lattice Based Cryptography for Beginners Dong Pyo Chi, Jeong Woon Choi, Jeong San Kim, Taewan Kim
2015/937 (PDF ) End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung
2015/935 (PDF ) Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Céline Blondeau, Kaisa Nyberg
2015/934 (PDF ) Cryptanalysis of the New CLT Multilinear Maps Jung Hee Cheon, Changmin Lee, Hansol Ryu
2015/933 (PDF ) Cryptanalysis of Provably Secure Certicateless Short Signature Scheme Jayaprakash Kar
2015/932 (PDF ) Using Tweaks To Design Fault Resistant Ciphers Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/931 (PDF ) Fast and Secure Three-party Computation: The Garbled Circuit Approach Payman Mohassel, Mike Rosulek, Ye Zhang
2015/930 (PDF ) Nearly Sparse Linear Algebra and application to Discrete Logarithms Computations Antoine Joux, Cécile Pierrot
2015/929 (PDF ) Are you The One to Share? Secret Transfer with Access Structure Yongjun Zhao, Sherman S. M. Chow
2015/928 (PDF ) HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network Hassan Noura, Damien Couroussé
2015/927 (PDF ) Rich Queries on Encrypted Data: Beyond Exact Matches Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel Rosu, Michael Steiner
2015/926 (PDF ) CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC Vadim N. Tsypyschev, Julia S. Vinogradova
2015/925 (PDF ) Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay
2015/924 (PDF ) Masking Large Keys in Hardware: A Masked Implementation of McEliece Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
2015/923 (PDF ) DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay
2015/922 (PDF ) Localised Multisecret Sharing Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2015/921 (PDF ) Identity-Based Revocation from Subset Difference Methods under Simple Assumptions Kwangsu Lee, Jong Hwan Park
2015/920 (PDF ) Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage Giuseppe Ateniese, Antonio Faonio, Seny Kamara
2015/918 (PDF ) Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk
2015/917 (PDF ) Private Proximity Testing on Steroids: An NTRU-based Protocol Constantinos Patsakis, Panayiotis Kotzanikolaou, M ́elanie Bouroche
2015/916 (PDF ) Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis Subhabrata Samajder, Palash Sarkar
2015/915 (PDF ) A Generic Construction for Verifiable Attribute-based Keyword Search Schemes Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh
2015/914 (PDF ) A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
2015/913 (PDF ) Functional Signcryption: Notion, Construction, and Applications Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/912 (PDF ) Extraction of intrinsic structure for Hardware Trojan detection Maxime Lecomte, Jacques Fournier, Philippe Maurine
2015/911 (PDF ) Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin
2015/910 (PDF ) QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions Alonso González, Alejandro Hevia, Carla Ràfols
2015/909 (PDF ) On the Impact of Known-Key Attacks on Hash Functions Bart Mennink, Bart Preneel
2015/908 (PDF ) Linear Distinguishers in the Key-less Setting: Application to PRESENT Martin M. Lauridsen, Christian Rechberger
2015/907 (PDF ) Cryptographic Assumptions: A Position Paper Shafi Goldwasser, Yael Tauman Kalai
2015/906 (PDF ) RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors Adnan Baysal, Suhap Sahin
2015/905 (PDF ) Mapping the Intel Last-Level Cache Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee, Gernot Heiser
2015/904 (PDF ) Almost-tight Identity Based Encryption against Selective Opening Attack Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen
2015/903 (PDF ) A Note on the Indifferentiability of the 10-Round Feistel Construction Yannick Seurin
2015/902 (PDF ) Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques Kexin Qiao, Lei Hu, Siwei Sun
2015/901 (PDF ) A Unified Approach to MPC with Preprocessing using OT Tore Kasper Frederiksen, Marcel Keller, Emmanuela Orsini, Peter Scholl
2015/900 (PDF ) New Results on Identity-based Encryption from Quadratic Residuosity Ferucio Laurentiu Tiplea, Emil Simion
2015/899 (PDF ) Privacy-preserving Attribute Based Searchable Encryption Payal Chaudhari, Maniklal Das
2015/898 (PDF ) Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/897 (PDF ) Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography Prosanta Gope
2015/896 (PDF ) Improved Attacks on Reduced-Round Camellia-128/192/256 Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
2015/895 (PDF ) Rogue Decryption Failures: Reconciling AE Robustness Notions Guy Barwell, Dan Page, Martijn Stam
2015/894 (PDF ) Comparison of cube attacks over different vector spaces Richard Winter, Ana Salagean, Raphael C. -W. Phan
2015/893 (PDF ) Robust Authenticated Encryption and the Limits of Symmetric Cryptography Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015/892 (PDF ) Security Against Related Randomness Attacks via Reconstructive Extractors Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee
2015/891 (PDF ) Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy Sébastien Canard, Viet Cuong Trinh
2015/890 (PDF ) MI-T-HFE, a New Multivariate Signature Scheme Wenbin Zhang, Chik How Tan
2015/889 (PDF ) Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? Anamaria Costache, Nigel P. Smart
2015/888 (PDF ) Tweak-Length Extension for Tweakable Blockciphers Kazuhiko Minematsu, Tetsu Iwata
2015/887 (PDF ) Composable Security in the Tamper Proof Hardware Model under Minimal Complexity Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2015/886 (PDF ) Applying Cryptographic Acceleration Techniques to Error Correction Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion
2015/885 (PDF ) A New Standard of Ukraine: The Kupyna Hash Function Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov
2015/884 (PDF ) General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/882 (PDF ) Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy
2015/881 (PDF ) Generic Security of NMAC and HMAC with Input Whitening Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
2015/880 (PDF ) Generic Efficient Dynamic Proofs of Retrievability Mohammad Etemad, Alptekin Küpçü
2015/879 (PDF ) Computing information on domain parameters from public keys selected uniformly at random Martin Ekerå
2015/878 (PDF ) Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model Edward Eaton, Fang Song
2015/877 (PDF ) Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule Christophe Clavier, Julien Francq, Antoine Wurcker
2015/876 (PDF ) 10-Round Feistel is Indifferentiable from an Ideal Cipher Dana Dachman-Soled, Jonathan Katz, Aishwarya Thiruvengadam
2015/875 (PDF ) Bent and Semi-bent Functions via Linear Translators Neşe Koçak, Sihem Mesnager, Ferruh Özbudak
2015/874 (PDF ) Indifferentiability of 10-Round Feistel Networks Yuanxi Dai, John Steinberger
2015/873 (PDF ) On the Diffusion Property of Iterated Functions Jian Liu, Sihem Mesnager, Lusheng Chen
2015/872 (PDF ) Traceability Improvements of a New RFID Protocol Based On EPC C1G2 Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni
2015/871 (PDF ) Photonic Side Channel Analysis of Arbiter PUFs Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers
2015/870 (PDF ) Gambling, Computational Information and Encryption Security Mohammad Hajiabadi, Bruce M. Kapron
2015/869 (PDF ) New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs
2015/868 (PDF ) Optimally Secure Block Ciphers from Ideal Primitives Stefano Tessaro
2015/867 (PDF ) Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2015/866 (PDF ) Graded Encoding, Variations on a Scheme Shai Halevi
2015/865 (PDF ) Card-based Cryptographic Protocols Using a Minimal Number of Cards Alexander Koch, Stefan Walzer, Kevin Härtel
2015/864 (PDF ) Encryption Performance Improvements of the Paillier Cryptosystem Christine Jost, Ha Lam, Alexander Maximov, Ben Smeets
2015/863 (PDF ) Is There an Oblivious RAM Lower Bound? Elette Boyle, Moni Naor
2015/862 (PDF ) Idealizing Identity-Based Encryption Dennis Hofheinz, Christian Matt, Ueli Maurer
2015/861 (PDF ) A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers Chun Guo, Dongdai Lin
2015/860 (PDF ) Selective Opening Security for Receivers Carmit Hazay, Arpita Patra, Bogdan Warinschi
2015/859 (PDF ) Factor Base Discrete Logarithms in Kummer Extensions Dianyan Xiao, Jincheng Zhuang, Qi Cheng
2015/858 (PDF ) Skipping the $q$ in Group Signatures Olivier Blazy, Saqib A. Kakvi
2015/857 (PDF ) Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy Benjamin Fuller, Ariel Hamlin
2015/856 (PDF ) MGR HASH FUNCTION Khushboo Bussi, Dhananjoy Dey, P. R. Mishra, B. K. Dass
2015/854 (PDF ) Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu
2015/853 (PDF ) Standard Security Does Imply Security Against Selective Opening for Markov Distributions Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak
2015/852 (PDF ) Analysis of a key exchange protocol based on tropical matrix algebra Matvei Kotov, Alexander Ushakov
2015/851 (PDF ) Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing Benoît Cogliati, Yannick Seurin
2015/850 (PDF ) Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable Zhen Liu, Duncan S. Wong
2015/849 (PDF ) Regulating the Pace of von Neumann Correctors Houda Ferradi, Rémi Géraud, Diana Maimuţ, David Naccache, Amaury de Wargny
2015/848 (PDF ) The Multiplicative Complexity of Boolean Functions on Four and Five Variables Meltem Sonmez Turan, Rene Peralta
2015/847 (PDF ) Exploring Energy Efficiency of Lightweight Block Ciphers Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
2015/846 (PDF ) Characterization of Secure Multiparty Computation Without Broadcast Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
2015/845 (PDF ) Cryptanalysis of the Quadratic Zero-Testing of GGH Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi
2015/844 (PDF ) DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2015/843 (PDF ) Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes David Derler, Daniel Slamanig
2015/842 (PDF ) On Linkability and Malleability in Self-blindable Credentials Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers
2015/841 (PDF ) An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices Vanga Odelu, Ashok Kumar Das, Adrijit Goswami
2015/840 (PDF ) Related-key Impossible Differential Analysis of Full Khudra Qianqian Yang, Lei Hu, Siwei Sun, Ling Song
2015/839 (PDF ) Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really? David Wong
2015/838 (PDF ) Offline Witness Encryption Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2015/837 (PDF ) Multi-Variate High-Order Attacks of Shuffled Tables Recomputation Nicolas BRUNEAU, Sylvain GUILLEY, Zakaria NAJM, Yannick TEGLIA
2015/836 (PDF ) Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys Benjamin Wesolowski, Pascal Junod
2015/835 (PDF ) On near prime-order elliptic curves with small embedding degrees (Full version) Duc-Phong Le, Nadia El Mrabet, Chik How Tan
2015/833 (PDF ) Efficient Key Authentication Service for Secure End-to-end Communications Mohammad Etemad, Alptekin Küpçü
2015/832 (PDF ) Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices David McCann, Kerstin Eder, Elisabeth Oswald
2015/831 (PDF ) M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, Marten van Dijk
2015/830 (PDF ) Unique Signature with Short Output from CDH Assumption Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng
2015/829 (PDF ) Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1 Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
2015/828 (PDF ) State-recovery analysis of Spritz Ralph Ankele, Stefan Koelbl, Christian Rechberger
2015/827 (PDF ) Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
2015/826 (PDF ) Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys Dario Catalano, Dario Fiore, Luca Nizzardo
2015/825 (PDF ) The Emperor's New Password Creation Policies Ding Wang, Ping Wang
2015/824 (PDF ) Efficient Fully Structure-Preserving Signatures for Large Messages Jens Groth
2015/823 (PDF ) Efficient (ideal) lattice sieving using cross-polytope LSH Anja Becker, Thijs Laarhoven
2015/822 (PDF ) Efficiently Obfuscating Re-Encryption Program under DDH Assumption Akshayaram Srinivasan, C. Pandu Rangan
2015/821 (PDF ) A general framework for building noise-free homomorphic cryptosystems Gérald Gavin
2015/820 (PDF ) Extended Nested Dual System Groups, Revisited Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
2015/819 (PDF ) Improving the Big Mac Attack on Elliptic Curve Cryptography Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache
2015/818 (PDF ) cuHE: A Homomorphic Encryption Accelerator Library Wei Dai, Berk Sunar
2015/817 (PDF ) Secure Multiparty Computation of a Social Network Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar
2015/816 (PDF ) Analysis of Keyless Massive MIMO-based Cryptosystem Security Valery Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev
2015/815 (PDF ) On the Power of Hierarchical Identity-Based Encryption Mohammad Mahmoody, Ameer Mohammed
2015/814 (PDF ) CLKS: Certificateless Keyword Search on Encrypted Data Qingji Zheng, Xiangxue Li, Aytac Azgin
2015/813 (PDF ) Revisiting Turning Online Cipher Off Ritam Bhaumik, Mridul Nandi
2015/812 (PDF ) The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob Alex Biryukov, Léo Perrin, Aleksei Udovenko
2015/811 (PDF ) Key-recovery attacks against the MAC algorithm Chaskey Chrysanthi Mavromati
2015/810 (PDF ) Improved OR Composition of Sigma-Protocols Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2015/809 (PDF ) New Techniques for Electronic Voting Alan Szepieniec, Bart Preneel
2015/808 (PDF ) Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks Mihir Bellare, Joseph Jaeger, Daniel Kane
2015/807 (PDF ) Fair Distributed Computation of Reactive Functions Juan Garay, Björn Tackmann, Vassilis Zikas
2015/806 (PDF ) Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti
2015/805 (PDF ) A classification of elliptic curves with respect to the GHS attack in odd characteristic Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2015/804 (PDF ) SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE Sumit Chakraborty
2015/803 (PDF ) Statistical and Algebraic Properties of DES Stian Fauskanger, Igor Semaev
2015/802 (PDF ) Ciphertext-only attack on d*d Hill in O(d13^d) Shahram Khazaei, Siavash Ahmadi
2015/801 (PDF ) Scalar Blinding on Elliptic Curves based on Primes with Special Structure Scott Fluhrer
2015/799 (PDF ) Secure Binary Field Multiplication Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim
2015/797 (PDF ) What Security Can We Achieve within 4 Rounds? Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2015/796 (PDF ) Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi
2015/795 (PDF ) Fast and Memory-Efficient Key Recovery in Side-Channel Attacks Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman
2015/794 (PDF ) Safe-Errors on SPA Protected implementations with the Atomicity Technique Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache
2015/793 (PDF ) Algorithmic Information Theory for Obfuscation Security Rabih Mohsen, Alexandre Miranda Pinto
2015/792 (PDF ) Standard Security Does Not Imply Indistinguishability Under Selective Opening Dennis Hofheinz, Vanishree Rao, Daniel Wichs
2015/791 (PDF ) On the Equivalence of Obfuscation and Multilinear Maps Omer Paneth, Amit Sahai
2015/790 (PDF ) On weak and strong 2^k-bent Boolean functions Pantelimon Stanica
2015/789 (PDF ) Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator Gangqiang Yang, Mark D. Aagaard, Guang Gong
2015/788 (PDF ) Cracking-Resistant Password Vaults using Natural Language Encoders Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart
2015/787 (PDF ) Backtracking-Assisted Multiplication Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou
2015/786 (PDF ) Buying AES Design Resistance with Speed and Energy Jean-Michel Cioranesco, Roman Korkikian, David Naccache, Rodrigo Portella do Canto
2015/785 (PDF ) Double-Speed Barrett Moduli Rémi Géraud, Diana Maimut, David Naccache
2015/784 (PDF ) Threshold FlipThem: When the winner does not need to take all David Leslie, Chris Sherfield, Nigel P. Smart
2015/783 (PDF ) Cryptanalysis of the Authenticated Encryption Algorithm COFFE Ivan Tjuawinata, Tao Huang, Hongjun Wu
2015/782 (PDF ) Secure two-party computation in applied pi-calculus: models and verification Sergiu Bursuc
2015/781 (PDF ) Twisted Hessian curves Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange
2015/780 (PDF ) Multilinear Maps from Obfuscation Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson
2015/779 (PDF ) A Simple Scheme, for Strengthening Product-sum Type PKC Masao KASAHARA
2015/776 (PDF ) Functional Encryption for Turing Machines Prabhanjan Ananth, Amit Sahai
2015/775 (PDF ) Efficient MDS Diffusion Layers Through Decomposition of Matrices S. M. Dehnavi, M. R. Mirzaee Shamsabad, A. Mahmoodi Rishakani, Y. Fekri Dabanloo
2015/774 (PDF ) Revisiting Prime Power RSA Santanu Sarkar
2015/773 (PDF ) Distinguishing a truncated random permutation from a random function Shoni Gilboa, Shay Gueron
2015/772 (PDF ) Non-Malleable Encryption: Simpler, Shorter, Stronger Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
2015/771 (PDF ) A SAT-based Public Key Cryptography Scheme Sebastian E. Schmittner
2015/770 (PDF ) A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
2015/769 (PDF ) On the Hardness of Learning with Rounding over Small Modulus Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
2015/768 (PDF ) Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
2015/767 (PDF ) Dual EC: A Standardized Back Door Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen
2015/766 (PDF ) Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng
2015/765 (PDF ) Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version) Victoria Fehr, Marc Fischlin
2015/764 (PDF ) On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2}) Jincheng Zhuang, Qi Cheng
2015/763 (PDF ) Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, Takafumi Aoki
2015/762 (PDF ) A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b Riham AlTawy, Ahmed Abdelkhalek, Amr M. Youssef
2015/761 (PDF ) Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language William Diehl
2015/760 (PDF ) Investigating SRAM PUFs in large CPUs and GPUs Pol Van Aubel, Daniel J. Bernstein, Ruben Niederhagen
2015/759 (PDF ) Cryptanalysis of Gu's ideal multilinear map Alice Pellet-Mary, Damien Stehle
2015/758 (PDF ) Ring-LWE Cryptography for the Number Theorist Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
2015/757 (PDF ) Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks Matthias Hamann, Matthias Krause
2015/756 (PDF ) Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng, Hua Guo
2015/755 (PDF ) Revisiting TESLA in the quantum random oracle model Erdem Alkim, Nina Bindel, Johannes Buchmann, Özgür Dagdelen, Edward Eaton, Gus Gutoski, Juliane Krämer, Filip Pawlega
2015/754 (PDF ) Related-Key Attack on Full-Round PICARO Anne Canteaut, Virginie Lallemand, María Naya-Plasencia
2015/753 (PDF ) Differential Computation Analysis: Hiding your White-Box Designs is Not Enough Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
2015/752 (PDF ) On Constructing One-Way Permutations from Indistinguishability Obfuscation Gilad Asharov, Gil Segev
2015/751 (PDF ) Fast Garbling of Circuits Under Standard Assumptions Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas
2015/750 (PDF ) Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key Ryo Nishimaki, Daniel Wichs, Mark Zhandry
2015/749 (PDF ) Affine Equivalence and its Application to Tightening Threshold Implementations Pascal Sasdrich, Amir Moradi, Tim Güneysu
2015/748 (PDF ) A More Cautious Approach to Security Against Mass Surveillance Jean Paul Degabriele, Pooya Farshim, Bertram Poettering
2015/747 (PDF ) Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du
2015/746 (PDF ) A 2^{70} Attack on the Full MISTY1 Achiya Bar-On
2015/745 (PDF ) Faster ECC over F2571 (feat. PMULL) Hwajeong Seo
2015/744 (PDF ) BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware Ege Gulcan, Aydin Aysu, Patrick Schaumont
2015/743 (PDF ) Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions Benoit Libert, Thomas Peters, Moti Yung
2015/742 (PDF ) A Matrix Decomposition Method for Optimal Normal Basis Multiplication Can Kızılkale, Ömer Eǧecioǧlu, Çetin Kaya Koç
2015/741 (PDF ) On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
2015/740 (PDF ) Predictable Arguments of Knowledge Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
2015/738 (PDF ) Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) Kazuhiko Minematsu
2015/737 (PDF ) New multilinear maps from ideal lattices Gu Chunsheng
2015/735 (PDF ) Cutting-Edge Cryptography Through the Lens of Secret Sharing Ilan Komargodski, Mark Zhandry
2015/733 (PDF ) Fully Homomorphic Encryption on Octonion Ring Masahiro Yagisawa
2015/732 (PDF ) Compact Implementations of LEA Block Cipher for Low-End Microprocessors Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
2015/731 (PDF ) Same Value Analysis on Edwards Curves Rodrigo Abarzúa, Santi Martínez, Valeria Mendoza
2015/730 (PDF ) Indistinguishability Obfuscation from Functional Encryption for Simple Functions Prabhanjan Ananth, Abhishek Jain, Amit Sahai
2015/729 (PDF ) Provably-Secure Remote Memory Attestation to Prevent Heap Overflow Attacks Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi
2015/728 (PDF ) Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas
2015/727 (PDF ) DPA, Bitslicing and Masking at 1 GHz Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede
2015/726 (PDF ) Compositions of linear functions and applications to hashing Vladimir Shpilrain, Bianca Sosnovski
2015/725 (PDF ) The self-blindable U-Prove scheme from FC'14 is forgeable Eric Verheul, Sietse Ringers, Jaap-Henk Hoepman
2015/724 (PDF ) A masked ring-LWE implementation Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2015/723 (PDF ) Cryptanalysis of Feistel Networks with Secret Round Functions Alex Biryukov, Gaëtan Leurent, Léo Perrin
2015/722 (PDF ) Oblivious Substring Search with Updates Tarik Moataz, Erik-Oliver Blass
2015/721 (PDF ) KDM-Security via Homomorphic Smooth Projective Hashing Hoeteck Wee
2015/720 (PDF ) Output-Compressing Randomized Encodings and Applications Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
2015/719 (PDF ) Consolidating masking schemes Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede
2015/718 (PDF ) Efficient Asynchronous Accumulators for Distributed PKI Leonid Reyzin, Sophia Yakoubov
2015/717 (PDF ) Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
2015/716 (PDF ) Linear Cryptanalysis of Reduced-Round SIMECK Variants Nasour Bagheri
2015/715 (PDF ) New Circular Security Counterexamples from Decision Linear and Learning with Errors Allison Bishop, Susan Hohenberger, Brent Waters
2015/714 (PDF ) New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code. Masao KASAHARA
2015/712 (PDF ) Adaptive Proofs have Straightline Extractors (in the Random Oracle Model) David Bernhard, Bogdan Warinschi, Ngoc Khanh Nguyen
2015/711 (PDF ) Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version) Anne Canteaut, Sébastien Duval, Gaëtan Leurent
2015/710 (PDF ) Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version) Bernardo Ferreira, João Rodrigues, João Leitão, Henrique Domingos
2015/709 (PDF ) Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception Luka Malisa, Kari Kostiainen, Srdjan Capkun
2015/708 (PDF ) Choosing Parameters for NTRUEncrypt Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2015/707 (PDF ) Reconciling User Privacy and Implicit Authentication for Mobile Devices Siamak F. Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa
2015/706 (PDF ) A Brief Comparison of Simon and Simeck Stefan Kölbl, Arnab Roy
2015/705 (PDF ) Linear Overhead Optimally-resilient Robust MPC Using Preprocessing Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
2015/704 (PDF ) Indistinguishability Obfuscation: from Approximate to Exact Nir Bitansky, Vinod Vaikuntanathan
2015/703 (PDF ) Point-Function Obfuscation: A Framework and Generic Constructions Mihir Bellare, Igors Stepanovs
2015/702 (PDF ) Demystifying incentives in the consensus computer Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena
2015/701 (PDF ) Differentially private instance-based noise mechanisms in practice Sébastien Canard, Baptiste Olivier, Tony Quertier
2015/700 (PDF ) Four Neighbourhood Cellular Automata as Better Cryptographic Primitives Jimmy Jose, Dipanwita RoyChowdhury
2015/699 (PDF ) FURISC: FHE Encrypted URISC Design Ayantika Chatterjee, Indranil Sengupta
2015/698 (PDF ) Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa Subhamoy Maitra
2015/697 (PDF ) On the Security of a Self-healing Group Key Distribution Scheme Yandong Zheng, Hua Guo
2015/696 (PDF ) Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p) Miguel Morales Sandoval, Arturo Diaz Perez
2015/695 (PDF ) Cliptography: Clipping the Power of Kleptographic Attacks Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
2015/694 (PDF ) On the Complexity of Additively Homomorphic UC Commitments Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
2015/693 (PDF ) Foundations of Reactive Garbling Schemes Jesper Buus Nielsen, Samuel Ranellucci
2015/692 (PDF ) Fast and Secure Linear Regression and Biometric Authentication with Security Update Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang
2015/691 (PDF ) SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth
2015/690 (PDF ) Systematic Reverse Engineering of Cache Slice Selection in Intel Processors Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2015/689 (PDF ) Counting Keys in Parallel After a Side Channel Attack Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam
2015/688 (PDF ) Binary Field Multiplication on ARMv8 Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
2015/687 (PDF ) Classical Cryptographic Protocols in a Quantum World Sean Hallgren, Adam Smith, Fang Song
2015/686 (PDF ) Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad faisal, Mahmood Ul Hassan
2015/685 (PDF ) On the discrete logarithm problem in finite fields of fixed characteristic Robert Granger, Thorsten Kleinjung, Jens Zumbrägel
2015/684 (PDF ) A One-time Stegosystem and Applications to Efficient Covert Communication Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar
2015/683 (PDF ) Security of Linear Secret-Sharing Schemes against Mass Surveillance Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci
2015/682 (PDF ) Integral Cryptanalysis on Full MISTY1 Yosuke Todo
2015/681 (PDF ) ANONIZE: A Large-Scale Anonymous Survey System Susan Hohenberger, Steven Myers, Rafael Pass, abhi shelat
2015/680 (PDF ) Indifferentiability of Confusion-Diffusion Networks Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger
2015/679 (PDF ) Another Look at Normal Approximations in Cryptanalysis Subhabrata Samajder, Palash Sarkar
2015/678 (PDF ) Optimizing MAKWA on GPU and CPU Thomas Pornin
2015/677 (PDF ) EdDSA for more curves Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang
2015/676 (PDF ) Quantum Cryptanalysis of NTRU Scott Fluhrer
2015/675 (PDF ) Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou
2015/674 (PDF ) Preprocessing-Based Verification of Multiparty Protocols with Honest Majority Roman Jagomägis, Peeter Laud, Alisa Pankova
2015/673 (PDF ) Decaf: Eliminating cofactors through point compression Mike Hamburg
2015/672 (PDF ) Function-Hiding Inner Product Encryption Allison Bishop, Abhishek Jain, Lucas Kowalczyk
2015/671 (PDF ) Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data Peeter Laud, Alisa Pankova
2015/670 (PDF ) Smart Security Management in Secure Devices Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan
2015/669 (PDF ) GMU Hardware API for Authenticated Ciphers Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj
2015/668 (PDF ) The Fallacy of Composition of Oblivious RAM and Searchable Encryption Muhammad Naveed
2015/667 (PDF ) De Bruijn Sequences from Joining Cycles of Nonlinear Feedback Shift Registers Ming Li, Cees J. A. Jansen, Dongdai Lin, Qiuyan Wang
2015/666 (PDF ) Improved Linear Hull Attack on Round-Reduced \textsc{Simon} with Dynamic Key-guessing Techniques Huaifeng Chen, Xiaoyun Wang
2015/665 (PDF ) Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption. Romain Gay, Iordanis Kerenidis, Hoeteck Wee
2015/664 (PDF ) Secure Multi-Party Shuffling Mahnush Movahedi, Jared Saia, Mahdi Zamani
2015/663 (PDF ) Analyzing the Efficiency of Biased-Fault Based Attacks Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont
2015/662 (PDF ) Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves Ryutaroh Matsumoto
2015/661 (PDF ) Cryptanalysis of a modern rotor machine in a multicast setting Shane Kepley, David Russo, Rainer Steinwandt
2015/659 (PDF ) Diversity and Transparency for ECC Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå
2015/658 (PDF ) Single-Cycle Implementations of Block Ciphers Pieter Maene, Ingrid Verbauwhede
2015/657 (PDF ) Randomizing the Montgomery Powering Ladder Duc-Phong Le, Chik How Tan, Michael Tunstall
2015/656 (PDF ) Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G. P. Biswas
2015/655 (PDF ) An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin
2015/654 (PDF ) DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng
2015/652 (PDF ) Modelling ciphersuite and version negotiation in the TLS protocol Benjamin Dowling, Douglas Stebila
2015/651 (PDF ) Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller
2015/650 (PDF ) A New Encryption Standard of Ukraine: The Kalyna Block Cipher Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov
2015/649 (PDF ) On the Hardness of Proving CCA-security of Signed ElGamal David Bernhard, Marc Fischlin, Bogdan Warinschi
2015/648 (PDF ) Adaptive Proofs of Knowledge in the Random Oracle Model David Bernhard, Marc Fischlin, Bogdan Warinschi
2015/647 (PDF ) Efficient ephemeral elliptic curve cryptographic keys Andrea Miele, Arjen K. Lenstra
2015/646 (PDF ) Decomposition attack on SASASASAS Alex Biryukov, Dmitry Khovratovich
2015/644 (PDF ) The Pythia PRF Service Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart
2015/643 (PDF ) Short Accountable Ring Signatures Based on DDH Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit
2015/642 (PDF ) A New Partial Key Exposure Attack on Multi-power RSA Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol
2015/641 (PDF ) Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings Jing Li, Licheng Wang
2015/640 (PDF ) Very-efficient simulatable flipping of many coins into a well Luís T. A. N. Brandão
2015/638 (PDF ) An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta
2015/637 (PDF ) A Novel Cyberspace-Oriented Access Control Model Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan
2015/636 (PDF ) On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks Matthias Hamann, Matthias Krause
2015/635 (PDF ) Microcash: Efficient Off-Line Small Payments Chris Pavlovski, Colin Boyd
2015/634 (PDF ) Phasing: Private Set Intersection using Permutation-based Hashing Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner
2015/633 (PDF ) An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol
2015/632 (PDF ) On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji
2015/631 (PDF ) Accelerating Homomorphic Evaluation on Reconfigurable Hardware Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrian Macias
2015/630 (PDF ) Unconditionally Secure Computation with Reduced Interaction Ivan Damgård, Jesper Buus Nielsen, Rafail Ostovsky, Adi Rosen
2015/629 (PDF ) BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo
2015/628 (PDF ) An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer
2015/627 (PDF ) On Necessary Padding with IO Justin Holmgren
2015/626 (PDF ) Practical Round-Optimal Blind Signatures in the Standard Model Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
2015/625 (PDF ) Ed448-Goldilocks, a new elliptic curve Mike Hamburg
2015/624 (PDF ) Automated Analysis and Synthesis of Authenticated Encryption Schemes Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff
2015/622 (PDF ) Random Digit Representation of Integers Nicolas Méloni, M. Anwar Hasan
2015/621 (PDF ) Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms Sarani Bhattacharya, Debdeep Mukhopadhyay
2015/620 (PDF ) Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions Susumu Kiyoshima
2015/619 (PDF ) Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits Seher Tutdere, Osmanbey Uzunkol
2015/618 (PDF ) An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas
2015/617 (PDF ) Generalised tally-based decoders for traitor tracing and group testing Boris Skoric, Wouter de Groot
2015/616 (PDF ) The leaking battery: A privacy analysis of the HTML5 Battery Status API Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Diaz
2015/615 (PDF ) Security Analysis of Niu et al. Authentication and Ownership Management Protocol Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati
2015/614 (PDF ) Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem Fangguo Zhang
2015/613 (PDF ) Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei
2015/612 (PDF ) The Simeck Family of Lightweight Block Ciphers Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong
2015/610 (PDF ) McBits: fast constant-time code-based cryptography Daniel J. Bernstein, Tung Chou, Peter Schwabe
2015/609 (PDF ) Experimental Study of DIGIPASS GO3 and the Security of Authentication Igor Semaev
2015/608 (PDF ) Fully Secure Functional Encryption for Inner Products, from Standard Assumptions Shweta Agrawal, Benoit Libert, Damien Stehle
2015/607 (PDF ) Netcoin - A Traceable P2P Electronic Cash System Hitesh Tewari, Eamon O Nuallain
2015/606 (PDF ) Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon
2015/605 (PDF ) Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm Steven D. Galbraith, Ping Wang, Fangguo Zhang
2015/604 (PDF ) Structure-Preserving Signatures from Standard Assumptions, Revisited Eike Kiltz, Jiaxin Pan, Hoeteck Wee
2015/603 (PDF ) Complementary Dual Codes for Counter-measures to Side-Channel Attacks Claude Carlet, Sylvain Guilley
2015/602 (PDF ) Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhay
2015/601 (PDF ) A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation Mei Wang, Zheng Yuan, Xiao Feng
2015/600 (PDF ) Predictive Models for Min-Entropy Estimation John Kelsey, Kerry A. McKay, Meltem Sonmez Turan
2015/599 (PDF ) The Chain Rule for HILL Pseudoentropy, Revisited Krzysztof Pietrzak, Maciej Skorski
2015/598 (PDF ) Combining Differential Privacy and Secure Multiparty Computation Martin Pettai, Peeter Laud
2015/597 (PDF ) Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads? Amir Moradi, Alexander Wild
2015/596 (PDF ) Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
2015/594 (PDF ) Disk Encryption: Do We Need to Preserve Length? Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez, Palash Sarkar
2015/593 (PDF ) A Physical Approach for Stochastic Modeling of TERO-based TRNG Patrick HADDAD, Viktor FISCHER, Florent BERNARD, Jean NICOLAI
2015/592 (PDF ) Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel
2015/591 (PDF ) How much randomness can be extracted from memoryless Shannon entropy sources? Maciej Skorski
2015/590 (PDF ) TriviA: A Fast and Secure Authenticated Encryption Scheme Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi
2015/589 (PDF ) Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath A. -M. Leventi-Peetz, J. -V. Peetz
2015/588 (PDF ) An analysis of the $C$ class of bent functions Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic
2015/587 (PDF ) AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD Trupil Limbasiya, Nishant Doshi
2015/585 (PDF ) SIMON and SPECK: Block Ciphers for the Internet of Things Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2015/584 (PDF ) How to Securely Prolong the Computational Bindingness of Pedersen Commitments Denise Demirel, Jean Lancrenon
2015/583 (PDF ) Secure Key Generation from Biased PUFs Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans Willems
2015/582 (PDF ) How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru
2015/581 (PDF ) Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation Chris Brzuska, Arno Mittelbach
2015/580 (PDF ) Composable & Modular Anonymous Credentials: Definitions and Practical Constructions Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
2015/579 (PDF ) A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation Mridul Nandi
2015/578 (PDF ) Tampering with the Delivery of Blocks and Transactions in Bitcoin Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
2015/577 (PDF ) Twist Insecurity Manfred Lochter, Andreas Wiemers
2015/576 (PDF ) The Carnac protocol -- or how to read the contents of a sealed envelope Michael Scott, Brian Spector
2015/575 (PDF ) Known-key Distinguisher on Full PRESENT Céline Blondeau, Thomas Peyrin, Lei Wang
2015/574 (PDF ) Fair and Robust Multi-Party Computation using a Global Transaction Ledger Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas
2015/573 (PDF ) Last fall degree, HFE, and Weil descent attacks on ECDLP Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo
2015/572 (PDF ) On Public Key Encryption from Noisy Codewords Eli Ben-Sasson, Iddo Ben-Tov, Ivan Damgard, Yuval Ishai, Noga ron-Zewi
2015/571 (PDF ) Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order - Extended Version Tobias Schneider, Amir Moradi, Tim Güneysu
2015/570 (PDF ) Constant Communication ORAM with Small Blocksize Tarik Moataz, Travis Mayberry, Erik-Oliver Blass
2015/569 (PDF ) Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version) Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2015/568 (PDF ) Cryptanalysis of Reduced-Round Whirlwind (Full Version) Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
2015/567 (PDF ) Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes Henri Gilbert, Jérôme Plût, Joana Treger
2015/566 (PDF ) A Framework for Identity-Based Encryption with Almost Tight Security Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/565 (PDF ) FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime Craig Costello, Patrick Longa
2015/564 (PDF ) Sanctum: Minimal Hardware Extensions for Strong Software Isolation Victor Costan, Ilia Lebedev, Srinivas Devadas
2015/563 (PDF ) Privacy in the Genomic Era Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang
2015/562 (PDF ) PUDA – Privacy and Unforgeability for Data Aggregation Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2015/561 (PDF ) SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip J. Longo, E. De Mulder, D. Page, M. Tunstall
2015/560 (PDF ) Generic Construction of UC-Secure Oblivious Transfer Olivier Blazy, Céline Chevalier
2015/559 (PDF ) Concurrent Secure Computation with Optimal Query Complexity Ran Canetti, Vipul Goyal, Abhishek Jain
2015/558 (PDF ) Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
2015/557 (PDF ) Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers Takanori Isobe, Kyoji Shibutani
2015/556 (PDF ) Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede
2015/555 (PDF ) Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack Tapas Pandit, Sumit Kumar Pandey, Rana Barua
2015/554 (PDF ) An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2015/553 (PDF ) Round-Optimal Black-Box Two-Party Computation Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro
2015/552 (PDF ) An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices Paul Kirchner, Pierre-Alain Fouque
2015/551 (PDF ) Quantum homomorphic encryption for circuits of low $T$-gate complexity Anne Broadbent, Stacey Jeffery
2015/550 (PDF ) Upending Stock Market Structure Using Secure Multi-Party Computation Charanjit S. Jutla
2015/549 (PDF ) ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices Amir Hassani Karbasi, Reza Ebrahimi Atani
2015/548 (PDF ) Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz
2015/547 (PDF ) Secure Computation of MIPS Machine Code Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz
2015/546 (PDF ) Actively Secure OT Extension with Optimal Overhead Marcel Keller, Emmanuela Orsini, Peter Scholl
2015/545 (PDF ) FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing
2015/544 (PDF ) Alternative cubics' rules with an algebraic appeal Daniel R. L. Brown
2015/543 (PDF ) Bloom Filters in Adversarial Environments Moni Naor, Eylon Yogev
2015/542 (PDF ) Improved Side-Channel Analysis of Finite-Field Multiplication Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff
2015/541 (PDF ) Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption Bart Mennink, Reza Reyhanitabar, Damian Vizár
2015/539 (PDF ) Tweaking Even-Mansour Ciphers Benoît Cogliati, Rodolphe Lampe, Yannick Seurin
2015/538 (PDF ) Pairing Based Mutual Healing in Wireless Sensor Networks Sarita Agrawal, Jay Patel, Manik Lal Das
2015/537 (PDF ) Towards Easy Leakage Certification François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo
2015/536 (PDF ) From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces François Durvaux, François-Xavier Standaert
2015/535 (PDF ) ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? Vincent Grosso, François-Xavier Standaert
2015/534 (PDF ) Problems, solutions and experience of the first international student's Olympiad in cryptography Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeria Vitkup
2015/533 (PDF ) Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher Xiaoshuang Ma, Kexin Qiao
2015/531 (PDF ) Reproducible Circularly-Secure Bit Encryption: Applications and Realizations Mohammad Hajiabadi, Bruce M. Kapron
2015/530 (PDF ) Practical Free-Start Collision Attacks on 76-step SHA-1 Pierre Karpman, Thomas Peyrin, Marc Stevens
2015/529 (PDF ) Power Analysis Attacks against IEEE 802.15.4 Nodes Colin O'Flynn, Zhizhang Chen
2015/528 (PDF ) SpaceMint: A Cryptocurrency Based on Proofs of Space Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, Krzysztof Pietrzak
2015/527 (PDF ) Robust Profiling for DPA-Style Attacks Carolyn Whitnall, Elisabeth Oswald
2015/526 (PDF ) Generic Key Recovery Attack on Feistel Scheme Takanori Isobe, Kyoji Shibutani
2015/525 (PDF ) Short Randomizable Signatures David Pointcheval, Olivier Sanders
2015/524 (PDF ) Secure Key Exchange Protocol based on Virtual Proof of Reality Yansong Gao
2015/523 (PDF ) Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
2015/522 (PDF ) Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search Anja Becker, Nicolas Gama, Antoine Joux
2015/521 (PDF ) Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency Sergey Gorbunov, Silvio Micali
2015/520 (PDF ) A Constant Time, Single Round Attribute-Based Authenticated Key Exchange in Random Oracle Model Suvradip Chakraborty, Y. Sreenivasarao, C. Pandu Rangan, Srinivasan Raghuraman
2015/519 (PDF ) Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping Yongge Wang
2015/518 (PDF ) Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin Ren Zhang, Bart Preneel
2015/517 (PDF ) Subversion-Resilient Signatures: Definitions, Constructions and Applications Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
2015/516 (PDF ) Key-Recovery Attacks on ASASA Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
2015/515 (PDF ) Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman
2015/514 (PDF ) Time-Lock Puzzles from Randomized Encodings Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters
2015/513 (PDF ) Computing Individual Discrete Logarithms Faster in $GF(p^n)$ Aurore Guillevic
2015/512 (PDF ) Key Extraction from the Primary Side of a Switched-Mode Power Supply Sami Saab, Andrew Leiserson, Michael Tunstall
2015/511 (PDF ) Near Collision Side Channel Attacks Baris Ege, Thomas Eisenbarth, Lejla Batina
2015/510 (PDF ) Equivoe-T: Transposition Equivocation Cryptography Gideon Samid
2015/509 (PDF ) A flaw in a theorem about Schnorr signatures Daniel R. L. Brown
2015/508 (PDF ) Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra
2015/507 (PDF ) Decomposing the ASASA Block Cipher Construction Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander
2015/506 (PDF ) Strong Non-Interference and Type-Directed Higher-Order Masking Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini
2015/505 (PDF ) The Tower Number Field Sieve Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung
2015/504 (PDF ) The Iterated Random Permutation Problem with Applications to Cascade Encryption Brice Minaud, Yannick Seurin
2015/503 (PDF ) The Norwegian Internet Voting Protocol: A new Instantiation Kristian Gjøsteen, Anders Smedstuen Lund
2015/502 (PDF ) Centrally Banked Cryptocurrencies George Danezis, Sarah Meiklejohn
2015/501 (PDF ) Multi-Prover Commitments Against Non-Signaling Attacks Serge Fehr, Max Fillinger
2015/500 (PDF ) Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure Alberto Battistello, Christophe Giraud
2015/499 (PDF ) Algebraic partitioning: Fully compact and (almost) tightly secure cryptography Dennis Hofheinz
2015/498 (PDF ) Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials Jiajun Zhang, Haining Fan
2015/497 (PDF ) Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost Zhangxiang Hu, Payman Mohassel, Mike Rosulek
2015/496 (PDF ) Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
2015/495 (PDF ) Improving algebraic attacks on stream ciphers based on linear feedback shifter registers over $F_{2^k}$ Sondre Rønjom
2015/493 (PDF ) Fault Tolerant Infective Countermeasure for AES Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay
2015/492 (PDF ) Masking vs. Multiparty Computation: How Large is the Gap for AES? Vincent Grosso, François-Xavier Standaert, Sebastian Faust
2015/491 (PDF ) Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa
2015/490 (PDF ) Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement Sonam Devgan Kaul, Amit K. Awasthi
2015/489 (PDF ) Scalable and private media consumption with Popcorn Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish
2015/488 (PDF ) On Black-Box Complexity of Universally Composable Security in the CRS model Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2015/487 (PDF ) Contention in Cryptoland: Obfuscation, Leakage and UCE Mihir Bellare, Igors Stepanovs, Stefano Tessaro
2015/486 (PDF ) DECIM: Detecting Endpoint Compromise In Messaging Jiangshan Yu, Mark Ryan, Cas Cremers
2015/485 (PDF ) Turning Online Ciphers Off Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam
2015/484 (PDF ) More Rounds, Less Security? Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolić
2015/483 (PDF ) Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai, Adeline Langlois, Tancrëde Lepoint, Amin Sakzad, Damien Stehle, Ron Steinfeld
2015/482 (PDF ) How to build time-lock encryption Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi
2015/481 (PDF ) Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers Theodosis Mourouzis, Guangyan Song, Nicolas Courtois, Michalis Christofii
2015/480 (PDF ) Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation Berry Schoenmakers, Meilof Veeningen, Niels de Vreede
2015/479 (PDF ) A Provably Secure Group Signature Scheme from Code-Based Assumptions Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang
2015/477 (PDF ) Authentication Key Recovery on Galois Counter Mode (GCM) John Mattsson, Magnus Westerlund
2015/476 (PDF ) XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees Bart Mennink
2015/475 (PDF ) Randomizing scalar multiplication using exact covering systems of congruences Eleonora Guerrini, Laurent Imbert, Théo Winterhalter
2015/474 (PDF ) Fully Homomorphic Encryption without bootstrapping Masahiro Yagisawa
2015/473 (PDF ) VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS Mehak Khurana, Meena Kumari
2015/472 (PDF ) High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
2015/471 (PDF ) A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott
2015/470 (PDF ) On the power of Public-key Functional Encryption with Function Privacy Vincenzo Iovino, Qiang Tang, Karol Żebrowski
2015/469 (PDF ) Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications Andrew Miller, Rob Jansen
2015/468 (PDF ) Practical Fully Homomorphic Encryption without Noise Reduction Dongxi Liu
2015/467 (PDF ) The Oblivious Machine - or: How to Put the C into MPC Marcel Keller
2015/466 (PDF ) Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process Zhou Tanping, Yang Xiaoyuan, Zhang Wei, Wu Liqiang
2015/465 (PDF ) Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation Hwajeong Seo, Zhe Liu, Johann Groschadl, Howon Kim
2015/464 (PDF ) Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies Florian Tschorsch, Björn Scheuermann
2015/462 (PDF ) Accelerating SWHE based PIRs using GPUs Wei Dai, Yarkın Doröz, Berk Sunar
2015/461 (PDF ) Approximate Algorithms on Lattices with Small Determinant Jung Hee Cheon, Changmin Lee
2015/460 (PDF ) Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, Elaine Shi
2015/459 (PDF ) New Observation on Division Property Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang
2015/458 (PDF ) A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS Sheena Sathyan, Shaji R S
2015/457 (PDF ) Generic Conversions from CPA to CCA secure Functional Encryption Mridul Nandi, Tapas Pandit
2015/456 (PDF ) Collateral damage of Facebook Apps: an enhanced privacy scoring model Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel
2015/455 (PDF ) Secure Deduplication of Encrypted Data without Additional Independent Servers Jian Liu, N. Asokan, Benny Pinkas
2015/454 (PDF ) A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce
2015/453 (PDF ) An Optimization of Gu Map-1 Yupu Hu, Huiwen Jia
2015/452 (PDF ) Masks will Fall Off -- Higher-Order Optimal Distinguishers Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul
2015/451 (PDF ) On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees Sihong Su, Xiaohu Tang
2015/450 (PDF ) Adaptively Secure Computation with Partial Erasures Carmit Hazay, Yehuda Lindell, Arpita Patra
2015/449 (PDF ) On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu
2015/448 (PDF ) A Comment on Gu Map-1 Yupu Hu, Huiwen Jia
2015/447 (PDF ) A New Model for Error-Tolerant Side-Channel Cube Attacks Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede
2015/446 (PDF ) On the Amortized Complexity of Zero-knowledge Protocols Ronald Cramer, Ivan Damgård, Marcel Keller
2015/445 (PDF ) XLS is not a Strong Pseudorandom Permutation Mridul Nandi
2015/444 (PDF ) Revisiting Security Claims of XLS and COPA Mridul Nandi
2015/443 (PDF ) Security Evaluation and Enhancement of Bistable Ring PUFs Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne Burleson
2015/442 (PDF ) Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendoerfer
2015/441 (PDF ) FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems Devu Manikantan Shila, Vivek Venugopalan, Cameron D Patterson
2015/440 (PDF ) Message-Locked Encryption for Lock-Dependent Messages Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev
2015/439 (PDF ) On Concurrently Secure Computation in the Multiple Ideal Query Model Vipul Goyal, Abhishek Jain
2015/438 (PDF ) A Hybrid Approach for Proving Noninterference of Java Programs Ralf Kuesters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr
2015/437 (PDF ) A Note on the Unsoundness of vnTinyRAM's SNARK Bryan Parno
2015/436 (PDF ) On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
2015/435 (PDF ) On the (Fast) Algebraic Immunity of Boolean Power Functions Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang
2015/434 (PDF ) Dickson Polynomials that are Involutions Pascale Charpin, Sihem Mesnager, Sumanta Sarkar
2015/433 (PDF ) A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu
2015/431 (PDF ) Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
2015/430 (PDF ) Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov, Daniel Dinu, Dmitry Khovratovich
2015/429 (PDF ) Cryptanalysis of Round-Reduced LED Ivica Nikolić, Lei Wang, Shuang Wu
2015/428 (PDF ) Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic, Samuel Neves
2015/427 (PDF ) A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement Mudit Bhargava, Ken Mai
2015/426 (PDF ) Complementing Feistel Ciphers Alex Biryukov, Ivica Nikolic
2015/425 (PDF ) Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim Güneysu
2015/424 (PDF ) FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang
2015/423 (PDF ) On the Implementation of Unified Arithmetic on Binary Huff Curves Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede
2015/422 (PDF ) Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation Marina Blanton, Fattaneh Bayatbabolghani
2015/421 (PDF ) VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede
2015/420 (PDF ) What Information is Leaked under Concurrent Composition? Vipul Goyal, Divya Gupta, Abhishek Jain
2015/419 (PDF ) Non-invasive Spoofing Attacks for Anti-lock Braking Systems Yasser Shoukry, Paul Martin, Paulo Tabuada, Mani B. Srivastava
2015/418 (PDF ) Optimized Interpolation Attacks on LowMC Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
2015/417 (PDF ) Order-Revealing Encryption and the Hardness of Private Learning Mark Bun, Mark Zhandry
2015/416 (PDF ) HETest: A Homomorphic Encryption Testing Framework Mayank Varia, Sophia Yakoubov, Yang Yang
2015/415 (PDF ) STRIBOB / WHIRLBOB Security Analysis Addendum Markku-Juhani O. Saarinen
2015/414 (PDF ) On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes Mridul Nandi
2015/413 (PDF ) A Study of Pair Encodings: Predicate Encryption in Prime Order Groups Shashank Agrawal, Melissa Chase
2015/412 (PDF ) The Birth of Cryptographic Obfuscation -- A Survey Máté Horváth, Levente Buttyán
2015/411 (PDF ) Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser
2015/410 (PDF ) Efficient Ring-LWE Encryption on 8-bit AVR Processors Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
2015/409 (PDF ) Improved Dual System ABE in Prime-Order Groups via Predicate Encodings Jie Chen, Romain Gay, Hoeteck Wee
2015/408 (PDF ) Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves Franck Rondepierre
2015/407 (PDF ) Higher-Order Cryptanalysis of LowMC Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/406 (PDF ) Cryptography for Parallel RAM from Indistinguishability Obfuscation Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou
2015/405 (PDF ) Feasibility and Infeasibility of Secure Computation with Malicious PUFs Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder
2015/404 (PDF ) Zero-Knowledge Accumulators and Set Operations Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos
2015/403 (PDF ) Sequential Secret Sharing as a New Hierarchical Access Structure Mehrdad Nojoumian, Douglas R. Stinson
2015/402 (PDF ) Success through confidence: Evaluating the effectiveness of a side-channel attack Adrian Thillard, Emmanuel Prouff, Thomas Roche
2015/401 (PDF ) Simple Chosen-Ciphertext Security from Low-Noise LPN Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
2015/400 (PDF ) Expiration and Revocation of Keys for Attribute-based Signatures (Full Version) Stephen R. Tate, Roopa Vishwanathan
2015/399 (PDF ) New attacks on RSA with Moduli $N=p^rq$ Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/398 (PDF ) Factoring RSA moduli with weak prime factors Abderrahmane Nitaj, Tajjeeddine Rachidi
2015/397 (PDF ) Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes Peter Gazi, Jooyoung Lee, Yannick Seurin, John Steinberger, Stefano Tessaro
2015/396 (PDF ) Generalizing Homomorphic MACs for Arithmetic Circuits Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo
2015/395 (PDF ) Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin
2015/394 (PDF ) Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015/393 (PDF ) Biclique cryptanalysis of MIBS-80 and PRESENT-80 Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba
2015/392 (PDF ) Forgery Attacks on round-reduced ICEPOLE-128 Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/391 (PDF ) On the Communication Complexity of Secure Computation Deepesh Data, Manoj M. Prabhakaran, Vinod M. Prabhakaran
2015/390 (PDF ) Dual System Encryption Framework in Prime-Order Groups Nuttapong Attrapadung
2015/389 (PDF ) Keccak Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2015/388 (PDF ) Succinct Garbled RAM Ran Canetti, Justin Holmgren
2015/387 (PDF ) Method to Protect Passwords in Databases for Web Applications Scott Contini
2015/386 (PDF ) Privately Evaluating Decision Trees and Random Forests David J. Wu, Tony Feng, Michael Naehrig, Kristin Lauter
2015/385 (PDF ) Feasibility and Completeness of Cryptographic Tasks in the Quantum World Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas
2015/384 (PDF ) Condensed Unpredictability Maciej Skorski, Alexander Golovnev, Krzysztof Pietrzak
2015/383 (PDF ) Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings Rafael Pass, abhi shelat
2015/382 (PDF ) High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers Thomas Pöppelmann, Tobias Oder, Tim Güneysu
2015/381 (PDF ) Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game Sumit Chakraborty
2015/380 (PDF ) Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation Céline Blondeau, Aslí Bay, Serge Vaudenay
2015/379 (PDF ) MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia
2015/378 (PDF ) PAC Learning of Arbiter PUFs Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
2015/377 (PDF ) Cluster Computing in Zero Knowledge Alessandro Chiesa, Eran Tromer, Madars Virza
2015/376 (PDF ) Cryptography from Post-Quantum Assumptions Raza Ali Kazmi
2015/375 (PDF ) Bounds on surmising remixed keys Daniel R. L. Brown
2015/374 (PDF ) On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
2015/373 (PDF ) Publicly Verifiable Software Watermarking Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan
2015/372 (PDF ) Security Analysis of PRINCE Jeremy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu
2015/371 (PDF ) Constant-Round MPC with Fairness and Guarantee of Output Delivery S. Dov Gordon, Feng-Hao Liu, Elaine Shi
2015/370 (PDF ) Financial Cryptography: Discriminatory Pricing Mechanism Sumit Chakraborty
2015/369 (PDF ) On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation Nir Bitansky, Omer Paneth
2015/368 (PDF ) Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov
2015/367 (PDF ) Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar-On
2015/366 (PDF ) A random zoo: sloth, unicorn, and trx Arjen K. Lenstra, Benjamin Wesolowski
2015/365 (PDF ) On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri
2015/364 (PDF ) Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions Qiang Tang, Jun Wang
2015/363 (PDF ) Optimally Secure Tweakable Blockciphers Bart Mennink
2015/362 (PDF ) Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Crepeau, Raza Ali Kazmi
2015/361 (PDF ) Computationally binding quantum commitments Dominique Unruh
2015/360 (PDF ) Achieving Differential Privacy with Bias-Control Limited Source Yanqing Yao, Zhoujun Li
2015/359 (PDF ) Higher-Order Side Channel Security and Mask Refreshing Jean-Sebastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2015/358 (PDF ) On Generalized First Fall Degree Assumptions Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi
2015/357 (PDF ) A Group-theory Method to The Cycle Structures of Feedback Shift Registers Ming Li, Yupeng Jiang, Dongdai Lin
2015/356 (PDF ) Succinct Randomized Encodings and their Applications Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang
2015/355 (PDF ) Semantic Security and Indistinguishability in the Quantum World Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
2015/354 (PDF ) SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann
2015/353 (PDF ) Matrix Computational Assumptions in Multilinear Groups Paz Morillo, Carla Ràfols, Jorge L. Villar
2015/352 (PDF ) Broadcast from Minicast Secure Against General Adversaries Pavel Raykov
2015/351 (PDF ) Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad, Alptekin Küpçü
2015/350 (PDF ) Improving Local Collisions: New Attacks on Reduced SHA-256 Florian Mendel, Tomislav Nad, Martin Schläffer
2015/349 (PDF ) Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud Chang Liu, Liehuang Zhu, Jinjun Chen
2015/348 (PDF ) A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar
2015/347 (PDF ) Fault Analysis of Kuznyechik Riham AlTawy, Onur Duman, Amr M. Youssef
2015/346 (PDF ) End-to-End Verifiable Elections in the Standard Model∗ Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
2015/345 (PDF ) Two Round Multiparty Computation via Multi-Key FHE Pratyay Mukherjee, Daniel Wichs
2015/344 (PDF ) Watermarking Cryptographic Programs Against Arbitrary Removal Strategies Ryo Nishimaki, Daniel Wichs
2015/343 (PDF ) High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe
2015/342 (PDF ) Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
2015/341 (PDF ) Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov, Gil Segev
2015/340 (PDF ) A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar
2015/339 (PDF ) Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen
2015/338 (PDF ) Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane
2015/337 (PDF ) Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede
2015/336 (PDF ) Arithmetic Cryptography Benny Applebaum, Jonathan Avron, Chris Brzuska
2015/335 (PDF ) Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2015/334 (PDF ) On the Correlation Intractability of Obfuscated Pseudorandom Functions Ran Canetti, Yilei Chen, Leonid Reyzin
2015/333 (PDF ) Nearly Optimal Verifiable Data Streaming (Full Version) Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nuernberger
2015/332 (PDF ) Security Intelligence for Broadcast : Threat Analytics Sumit Chakraborty
2015/331 (PDF ) A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, Somitra Sanadhya
2015/330 (PDF ) Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
2015/329 (PDF ) PAGES - A Family of Block Ciiphers Dieter Schmidt
2015/328 (PDF ) Strongly Secure Authenticated Key Exchange from Ideal Lattices Xiaopeng Yang, Wenping Ma
2015/327 (PDF ) Some results on Sprout Subhadeep Banik
2015/326 (PDF ) Cryptanalysis of an Authenticated Image Encryption Scheme Based on Chaotic Maps and Memory Cellular Automata Saeideh Kabirirad, Hamideh Hajiabadi
2015/325 (PDF ) Secure Multi-Party Computation with Identifiable Abort Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
2015/324 (PDF ) A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys Divesh Aggarwal, Alexander Golovnev
2015/322 (PDF ) Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers Peeter Laud, Alisa Pankova
2015/320 (PDF ) Hybrid Publicly Verifiable Computation James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2015/319 (PDF ) Point Decomposition Problem in Binary Elliptic Curves Koray Karabina
2015/318 (PDF ) Practical Divisible E-Cash Patrick Märtens
2015/317 (PDF ) Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti
2015/316 (PDF ) Non-malleability under Selective Opening Attacks: Implication and Separation Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
2015/315 (PDF ) Query-Complexity Amplification for Random Oracles Grégory Demay, Peter Gaži, Ueli Maurer, Björn Tackmann
2015/314 (PDF ) Certificate-Based Encryption Resilient to Key Leakage Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang
2015/313 (PDF ) Recovering Short Generators of Principal Ideals in Cyclotomic Rings Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev
2015/312 (PDF ) Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks Pierre-Alain Fouque, Thomas Vannet
2015/311 (PDF ) Tagged One-Time Signatures: Tight Security and Optimal Tag Size Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2015/310 (PDF ) New algorithm for the discrete logarithm problem on elliptic curves Igor Semaev
2015/309 (PDF ) TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
2015/308 (PDF ) Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao
2015/307 (PDF ) Black-Box Garbled RAM Sanjam Garg, Steve Lu, Rafail Ostrovsky
2015/306 (PDF ) Analysis of VAES3 (FF2) Morris Dworkin, Ray Perlner
2015/305 (PDF ) Foundations of Reconfigurable PUFs (Full Version) Jonas Schneider, Dominique Schröder
2015/304 (PDF ) Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
2015/303 (PDF ) The Design Space of Lightweight Cryptography Nicky Mouha
2015/302 (PDF ) Boosting OMD for Almost Free Authentication of Associated Data Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2015/301 (PDF ) Cryptanalysis of GGH Map Yupu Hu, Huiwen Jia
2015/300 (PDF ) Scalable Divisible E-cash Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
2015/299 (PDF ) A Note on the Lindell-Waisbard Private Web Search Scheme Zhengjun Cao, Lihua Liu
2015/298 (PDF ) Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang
2015/297 (PDF ) Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao
2015/296 (PDF ) The Uniform Distribution of Sequences Generated by Iteration of Polynomials Emil Lerner
2015/295 (PDF ) Security Analysis of Re-Encryption RPC Mix Nets Ralf Kuesters, Tomasz Truderung
2015/294 (PDF ) Accelerating Somewhat Homomorphic Evaluation using FPGAs Erdi̇̀nç Öztürk, Yarkın Doröz, Berk Sunar, Erkay Savaş
2015/293 (PDF ) Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015/292 (PDF ) Secret Shared Random Access Machine Shlomi Dolev, Yin Li
2015/291 (PDF ) Two Operands of Multipliers in Side-Channel Attack Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki
2015/290 (PDF ) Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes Joseph A. Akinyele, Christina Garman, Susan Hohenberger
2015/289 (PDF ) Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin, Orhun Kara
2015/288 (PDF ) Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms Aydin Aysu, Patrick Schaumont
2015/287 (PDF ) Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world John M. Schanck, William Whyte, Zhenfei Zhang
2015/286 (PDF ) Impossible Differential Cryptanalysis of Reduced Round SIMON Zhan Chen, Ning Wang, Xiaoyun Wang
2015/285 (PDF ) Improved Linear Trails for the Block Cipher Simon Tomer Ashur
2015/284 (PDF ) A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu, Chang-An Zhao
2015/283 (PDF ) Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
2015/282 (PDF ) Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva
2015/281 (PDF ) Secret Sharing and Statistical Zero Knowledge Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2015/280 (PDF ) Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou
2015/279 (PDF ) Improved Cryptanalysis of AES-like Permutations Jérémy Jean, Maria Naya-Plasencia, Thomas Peyrin
2015/278 (PDF ) Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting Sébastien Canard, David Pointcheval, Olivier Sanders
2015/277 (PDF ) One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games Marco Tomamichel, Serge Fehr, Jędrzej Kaniewski, Stephanie Wehner
2015/276 (PDF ) An Improvment of the Elliptic Net Algorithm Binglong Chen, Chang-An Zhao
2015/275 (PDF ) MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai
2015/274 (PDF ) Low Depth Circuits for Efficient Homomorphic Sorting Gizem S. Çetin, Yarkın Doröz, Berk Sunar, Erkay Savaş
2015/273 (PDF ) Dual System Encryption via Predicate Encodings Hoeteck Wee
2015/272 (PDF ) Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing Baodong Qin, Shengli Liu
2015/271 (PDF ) Toward Secure Implementation of McEliece Decryption Mariya Georgieva, Frédéric de Portzamparc
2015/270 (PDF ) Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk Markus Dichtl
2015/269 (PDF ) Ideal Multilinear Maps Based on Ideal Lattices Gu Chunsheng
2015/268 (PDF ) Improved Top-Down Techniques in Differential Cryptanalysis Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir
2015/267 (PDF ) The Simplest Protocol for Oblivious Transfer Tung Chou, Claudio Orlandi
2015/266 (PDF ) GRECS: Graph Encryption for Approximate Shortest Distance Queries Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
2015/265 (PDF ) Password Hashing Competition - Survey and Benchmark George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas
2015/264 (PDF ) BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy
2015/263 (PDF ) Eclipse Attacks on Bitcoin’s Peer-to-Peer Network Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg
2015/262 (PDF ) A look at the PGP ecosystem through the key server data Hanno Böck
2015/261 (PDF ) Research Perspectives and Challenges for Bitcoin and Cryptocurrencies Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
2015/260 (PDF ) Computational Aspects of Correlation Power Analysis Paul Bottinelli, Joppe W. Bos
2015/259 (PDF ) Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES Patrick Derbez, Pierre-Alain Fouque
2015/258 (PDF ) Lightweight MDS Involution Matrices Siang Meng Sim, Khoongming Khoo, Frédérique Oggier, Thomas Peyrin
2015/257 (PDF ) Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices Vadim Lyubashevsky, Thomas Prest
2015/256 (PDF ) Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction Yang Lu, Quanling Zhang, Jiguo Li
2015/255 (PDF ) A comprehensive analysis of game-based ballot privacy definitions David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi
2015/254 (PDF ) Tornado Attack on RC4 with Applications to WEP and WPA Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux
2015/253 (PDF ) Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers Haiyan Wang, Dongdai Lin
2015/252 (PDF ) Linearization of Multi-valued Nonlinear Feedback Shift Registers Haiyan Wang, Jianghua Zhong, Dongdai Lin
2015/251 (PDF ) How to Construct UC-Secure Searchable Symmetric Encryption Scheme Kaoru Kurosawa, Yasuhiro Ohtaki
2015/250 (PDF ) Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys Junji Shikata
2015/249 (PDF ) Improved (Hierarchical) Inner-Product Encryption from Lattices Keita Xagawa
2015/248 (PDF ) Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES Ryo Nishimaki, Keita Xagawa
2015/247 (PDF ) Subgroup security in pairing-based cryptography Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, Geovandro C. C. F. Pereira, Gustavo Zanon
2015/246 (PDF ) Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee
2015/245 (PDF ) Practical Attacks on the Round-reduced PRINCE Pawel Morawiecki
2015/244 (PDF ) Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation Jeremy Jean, Ivica Nikolic
2015/243 (PDF ) Reliable communication via semilattice properties of partial knowledge Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2015/242 (PDF ) Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications Benoit Libert, Thomas Peters, Marc Joye, Moti Yung
2015/241 (PDF ) Espresso: A Stream Cipher for 5G Wireless Communication Systems Elena Dubrova, Martin Hell
2015/240 (PDF ) Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE Alex Biryukov, Patrick Derbez, Léo Perrin
2015/239 (PDF ) Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE Patrick Derbez, Léo Perrin
2015/238 (PDF ) One Time Programs with Limited Memory Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michał Zając
2015/237 (PDF ) Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers
2015/236 (PDF ) Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey
2015/235 (PDF ) Performance and Security Improvements for Tor: A Survey Mashael AlSabah, Ian Goldberg
2015/234 (PDF ) Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
2015/233 (PDF ) Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ Ben Smyth, Steven Frink, Michael R. Clarkson
2015/232 (PDF ) Cryptanalysis of Full Sprout Virginie Lallemand, María Naya-Plasencia
2015/231 (PDF ) A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher Yonglin Hao
2015/230 (PDF ) W-SPS: Designing a Wide-Area Secure Positioning System Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
2015/229 (PDF ) Improving GGH Public Key Scheme Using Low Density Lattice Codes Reza Hooshmand
2015/228 (PDF ) Leakage-Resilient Cryptography with Key Derived from Sensitive Data Konrad Durnoga, Tomasz Kazana, Michał Zając, Maciej Zdanowicz
2015/227 (PDF ) Tradeoff Cryptanalysis of Memory-Hard Functions Alex Biryukov, Dmitry Khovratovich
2015/226 (PDF ) Secure Physical Computation using Disposable Circuits Ben Fisch, Daniel Freund, Moni Naor
2015/225 (PDF ) Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/224 (PDF ) GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2015/223 (PDF ) New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar
2015/222 (PDF ) Towards Understanding the Known-Key Security of Block Ciphers Elena Andreeva, Andrey Bogdanov, Bart Mennink
2015/221 (PDF ) Tighter, faster, simpler side-channel security evaluations beyond computing power Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal
2015/220 (PDF ) Key Homomorphic PRFs and Their Applications Dan Boneh, Kevin Lewi, Hart Montgomery, Ananth Raghunathan
2015/219 (PDF ) Efficient Format Preserving Encrypted Databases Prakruti C, Sashank Dara, V. N. Muralidhara
2015/218 (PDF ) Efficient k-out-of-n oblivious transfer protocol wang qinglong
2015/217 (PDF ) Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles Subhamoy Maitra, Goutam Paul, Willi Meier
2015/216 (PDF ) Quasi-Adaptive NIZK for Linear Subspaces Revisited Eike Kiltz, Hoeteck Wee
2015/215 (PDF ) A revocable anonymity in Tor Amadou Moctar Kane
2015/214 (PDF ) GCM Security Bounds Reconsidered Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata
2015/213 (PDF ) Attribute-Based Versions of Schnorr and ElGamal Javier Herranz
2015/212 (PDF ) Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
2015/211 (PDF ) Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing Thijs Laarhoven, Benne de Weger
2015/210 (PDF ) Secure and Efficient Initialization and Authentication Protocols for SHIELD Chenglu Jin, Marten van Dijk
2015/209 (PDF ) Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov
2015/208 (PDF ) Towards Secure Distance Bounding Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2015/207 (PDF ) Leakage Assessment Methodology - a clear roadmap for side-channel evaluations Tobias Schneider, Amir Moradi
2015/206 (PDF ) Efficient and Secure Delegation of Group Exponentiation to a Single Server Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain
2015/205 (PDF ) Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption Jooyoung Lee
2015/204 (PDF ) Leakage-Resilient Symmetric Encryption via Re-keying Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque
2015/203 (PDF ) Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu
2015/202 (PDF ) Adaptively Secure Coin-Flipping, Revisited Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park
2015/201 (PDF ) Statistical Properties of Multiplication mod $2^n$ A. Mahmoodi Rishakani, S. M. Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha
2015/200 (PDF ) Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs Alexander Wild, Amir Moradi, Tim Güneysu
2015/199 (PDF ) Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs Amir Moradi, Gesine Hinterwälder
2015/198 (PDF ) Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu
2015/197 (PDF ) SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON N. Nalla Anandakumar
2015/196 (PDF ) Tighter Reductions for Forward-Secure Signature Schemes Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2015/195 (PDF ) Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists Stephanie Bayer, Jens Groth
2015/194 (PDF ) Practical Homomorphic MACs for Arithmetic Circuits Dario Catalano, Dario Fiore
2015/193 (PDF ) Improving Modular Inversion in RNS using the Plus-Minus Method Karim Bigou, Arnaud Tisserand
2015/192 (PDF ) Memory-saving computation of the pairing final exponentiation on BN curves Sylvain DUQUESNE, Loubna GHAMMAM
2015/191 (PDF ) iDASH Secure Genome Analysis Competition Using ObliVM Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi
2015/190 (PDF ) Multi-Client Non-Interactive Verifiable Computation Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid
2015/189 (PDF ) Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár
2015/188 (PDF ) New Techniques for SPHFs and Efficient One-Round PAKE Protocols Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
2015/187 (PDF ) How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality Juan Garay, Jonathan Katz, Bjoern Tackmann, Vassilis Zikas
2015/186 (PDF ) Higher Order Differential Analysis of NORX Sourav Das, Subhamoy Maitra, Willi Meier
2015/185 (PDF ) Remotely Managed Logic Built-In Self-Test for Secure M2M Communications Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben Smeets
2015/184 (PDF ) Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities Céline Blondeau, Kaisa Nyberg
2015/183 (PDF ) New Links Between Differential and Linear Cryptanalysis Céline Blondeau, Kaisa Nyberg
2015/182 (PDF ) Tweakable Blockciphers with Asymptotically Optimal Security Rodolphe Lampe, Yannick Seurin
2015/181 (PDF ) Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li
2015/180 (PDF ) Key-Homomorphic Constrained Pseudorandom Functions Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens
2015/179 (PDF ) A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves Palash Sarkar, Shashank Singh
2015/178 (PDF ) How to Incentivize Data-Driven Collaboration Among Competing Parties Pablo Daniel Azar, Shafi Goldwasser, Sunoo Park
2015/177 (PDF ) On the Security of an Efficient Group Key Agreement Scheme for MANETs Purushothama B R, Nishat Koti
2015/176 (PDF ) Key Recovery for LWE in Polynomial Time Kim Laine, Kristin Lauter
2015/175 (PDF ) Trivial Nonce-Misusing Attack on Pure OMD Tomer Ashur, Bart Mennink
2015/174 (PDF ) A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
2015/173 (PDF ) Indistinguishability Obfuscation from Compact Functional Encryption Prabhanjan Ananth, Abhishek Jain
2015/172 (PDF ) Silent Simon: A Threshold Implementation under 100 Slices Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth
2015/171 (PDF ) Authenticated Network Time Synchronization Benjamin Dowling, Douglas Stebila, Greg Zaverucha
2015/170 (PDF ) Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
2015/169 (PDF ) Short Schnorr signatures require a hash function with more than just random-prefix resistance Daniel R. L. Brown
2015/168 (PDF ) More PS and H-like bent functions C. Carlet
2015/167 (PDF ) Post-Zeroizing Obfuscation: The case of Evasive Circuits Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry
2015/166 (PDF ) Naturally Rehearsing Passwords Jeremiah Blocki, Manuel Blum, Anupam Datta
2015/165 (PDF ) The Cryptographic Hardness of Random Local Functions -- Survey Benny Applebaum
2015/164 (PDF ) Constant Size Ring Signature Without Random Oracle Priyanka Bose, Dipanjan Das, C. Pandu Rangan
2015/163 (PDF ) Indistinguishability Obfuscation from Functional Encryption Nir Bitansky, Vinod Vaikuntanathan
2015/162 (PDF ) New Multilinear Maps over the Integers Jean-Sebastien Coron, Tancrede Lepoint, Mehdi Tibouchi
2015/161 (PDF ) Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
2015/160 (PDF ) Differential-Linear Cryptanalysis of ICEPOLE Tao Huang, Ivan Tjuawinata, Hongjun Wu
2015/159 (PDF ) Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu
2015/158 (PDF ) Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions Zvika Brakerski, Ilan Komargodski, Gil Segev
2015/157 (PDF ) Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings Nuttapong Attrapadung, Shota Yamada
2015/156 (PDF ) Building Lossy Trapdoor Functions from Lossy Encryption Brett Hemenway, Rafail Ostrovsky
2015/155 (PDF ) On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor
2015/154 (PDF ) Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin, Yuval Ishai, Manoj M. Prabhakaran, Amit Sahai, Eran Tromer
2015/153 (PDF ) Functional Encryption from (Small) Hardware Tokens Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou
2015/152 (PDF ) Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults Ronan Lashermes, Jacques Fournier, Louis Goubin
2015/151 (PDF ) Bad directions in cryptographic hash functions Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen
2015/150 (PDF ) Insynd: Improved Privacy-Preserving Transparency Logging Roel Peeters, Tobias Pulls
2015/149 (PDF ) Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu
2015/148 (PDF ) On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann
2015/147 (PDF ) High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage
2015/146 (PDF ) New Attacks on Feistel Structures with Improved Memory Complexities Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2015/145 (PDF ) Observations on the SIMON block cipher family Stefan Kölbl, Gregor Leander, Tyge Tiessen
2015/144 (PDF ) Security of the AES with a Secret S-box Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen
2015/143 (PDF ) Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs Erich Wenger, Paul Wolfger
2015/142 (PDF ) Multi-Client Verifiable Computation with Stronger Security Guarantees S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
2015/141 (PDF ) Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method Céline Blondeau, Marine Minier
2015/140 (PDF ) The Random Oracle Model: A Twenty-Year Retrospective Neal Koblitz, Alfred Menezes
2015/139 (PDF ) Performance Analysis of Some Password Hashing Schemes Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2015/138 (PDF ) A Practical Key Exchange for the Internet using Lattice Cryptography Vikram Singh
2015/137 (PDF ) Multi-keyword Similarity Search Over Encrypted Cloud Data Mikhail Strizhov, Indrajit Ray
2015/136 (PDF ) Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto
2015/135 (PDF ) Generalizing Efficient Multiparty Computation Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp
2015/134 (PDF ) From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions Pierre Karpman
2015/133 (PDF ) Private Computation on Encrypted Genomic Data Kristin Lauter, Adriana Lopez-Alt, Michael Naehrig
2015/132 (PDF ) Homomorphic Computation of Edit Distance Jung Hee Cheon, Miran Kim, Kristin Lauter
2015/131 (PDF ) On Lightweight Stream Ciphers with Shorter Internal States Frederik Armknecht, Vasily Mikhalev
2015/130 (PDF ) How to Bootstrap Anonymous Communication Sune K. Jakobsen, Claudio Orlandi
2015/129 (PDF ) Block-wise Non-Malleable Codes Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay
2015/128 (PDF ) Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2015/127 (PDF ) Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes Ricardo Dahab, Steven Galbraith, Eduardo Morais
2015/126 (PDF ) Perfect Structure on the Edge of Chaos Nir Bitansky, Omer Paneth, Daniel Wichs
2015/125 (PDF ) Multilinear Pseudorandom Functions Aloni Cohen, Justin Holmgren
2015/124 (PDF ) GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs Alexander Wild, Amir Moradi, Tim Güneysu
2015/123 (PDF ) Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting Dennis Hofheinz, Jessica Koch, Christoph Striecks
2015/122 (PDF ) Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu
2015/121 (PDF ) Multi-Client Oblivious RAM secure against Malicious Servers Travis Mayberry, Erik-Oliver Blass, Guevara Noubir
2015/120 (PDF ) Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm
2015/119 (PDF ) Making Masking Security Proofs Concrete or How to Evaluate the Security of any Leaking Device (Extended Version) Alexandre Duc, Sebastian Faust, François-Xavier Standaert
2015/118 (PDF ) Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms Takahiro Matsuda, Goichiro Hanaoka
2015/117 (PDF ) Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy Maciej Skorski
2015/116 (PDF ) Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabâa, Ammar Bouallègue
2015/115 (PDF ) Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors Muhammad Yasir Malik
2015/114 (PDF ) Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy
2015/113 (PDF ) Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
2015/112 (PDF ) Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
2015/111 (PDF ) The Multivariate Hidden Number Problem Steven D. Galbraith, Barak Shani
2015/110 (PDF ) sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices Shijun Zhao, Qianying Zhang
2015/108 (PDF ) TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski
2015/107 (PDF ) Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware Attila A. Yavuz, Jorge Guajardo
2015/106 (PDF ) Provably weak instances of Ring-LWE Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange
2015/105 (PDF ) Inner Product Masking Revisited Josep Balasch, Sebastian Faust, Benedikt Gierlichs
2015/104 (PDF ) Weakening the Isolation Assumption of Tamper-proof Hardware Tokens Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges
2015/103 (PDF ) Mergeable Functional Encryption Vincenzo Iovino, Karol Zebrowski
2015/102 (PDF ) GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron, Yehuda Lindell
2015/101 (PDF ) Multi-Key Security: The Even-Mansour Construction Revisited Nicky Mouha, Atul Luykx
2015/100 (PDF ) Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA Christian Wittke, Zoya Dyka, Peter Langendoerfer
2015/099 (PDF ) Universally Composable Firewall Architectures using Trusted Hardware Dirk Achenbach, Jörn Müller-Quade, Jochen Rill
2015/098 (PDF ) Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method Shantian Cheng, Juanyang Zhang
2015/097 (PDF ) Surreptitiously Weakening Cryptographic Systems Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart
2015/096 (PDF ) A Meet in the Middle Attack on Reduced Round Kuznyechik Riham AlTawy, Amr M. Youssef
2015/095 (PDF ) Rotational Cryptanalysis of ARX Revisited Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld
2015/094 (PDF ) Some New Results on Binary Polynomial Multiplication Murat Cenk, M. Anwar Hasan
2015/093 (PDF ) Generalization of Statistical Criteria for Sboxes S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad, Einollah Pasha
2015/092 (PDF ) TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY Grasha Jacob, Dr. A. Murugan, Irine Viola
2015/091 (PDF ) Related-Key Forgeries for Prøst-OTR Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015/090 (PDF ) Structural Evaluation by Generalized Integral Property Yosuke Todo
2015/089 (PDF ) On the security margin of MAC striping Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt
2015/088 (PDF ) Structural Weaknesses in the Open Smart Grid Protocol Klaus Kursawe, Christiane Peters
2015/087 (PDF ) Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives David Derler, Christian Hanser, Daniel Slamanig
2015/086 (PDF ) Practical Compact E-Cash with Arbitrary Wallet Size Patrick Märtens
2015/085 (PDF ) On the behaviors of affine equivalent Sboxes regarding differential and linear attacks Anne Canteaut, Joëlle Roué
2015/084 (PDF ) On the Disadvantages of Pairing-based Cryptography Zhengjun Cao, Lihua Liu
2015/083 (PDF ) Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal, Qiang Tang
2015/082 (PDF ) On the Difficulty of Securing Web Applications using CryptDB İhsan Haluk AKIN, Berk Sunar
2015/081 (PDF ) Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff
2015/080 (PDF ) The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group Feng Hao, Xun Yi, Liqun Chen, Siamak F. Shahandashti
2015/079 (PDF ) On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack Jiqiang Lu
2015/078 (PDF ) Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters GU Chun-xiang, Xin Dan, ZHENG Yong-hui, KANG Yuan-ji
2015/077 (PDF ) On the Primary Constructions of Vectorial Boolean Bent Functions Yuwei Xu, Chuankun Wu
2015/076 (PDF ) Fully Structure-Preserving Signatures and Shrinking Commitments Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi
2015/075 (PDF ) Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen
2015/074 (PDF ) Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt
2015/073 (PDF ) Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin
2015/072 (PDF ) Non-Interactive Zero-Knowledge Proofs of Non-Membership Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015/071 (PDF ) Factoring N=p^r q^s for Large r and s Jean-Sebastien Coron, Jean-Charles Faugere, Guenael Renault, Rina Zeitoun
2015/070 (PDF ) The Sum Can Be Weaker Than Each Part Gaëtan Leurent, Lei Wang
2015/069 (PDF ) On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks Benoît Cogliati, Yannick Seurin
2015/068 (PDF ) A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro Gregor Leander, Brice Minaud, Sondre Rønjom
2015/067 (PDF ) Non-black-box Simulation in the Fully Concurrent Setting, Revisited Susumu Kiyoshima
2015/066 (PDF ) Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware Tobias Schneider, Amir Moradi, Tim Güneysu
2015/065 (PDF ) A lightweight-friendly modifcation of GOST block cipher Andrey Dmukh, Denis Dygin, Grigory Marshalko
2015/064 (PDF ) Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation Handan Kılınç, Alptekin Küpçü
2015/063 (PDF ) CamlCrush: A PKCS\#11 Filtering Proxy R. Benadjila, T. Calderon, M. Daubignard
2015/062 (PDF ) Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher Yuval Yarom, Gefei Li, Damith C. Ranasinghe
2015/061 (PDF ) More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
2015/060 (PDF ) Verified Proofs of Higher-Order Masking Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub
2015/059 (PDF ) Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2015/058 (PDF ) Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems Berry Schoenmakers, Meilof Veeningen
2015/057 (PDF ) Cold Boot Attacks in the Discrete Logarithm Setting Bertram Poettering, Dale L. Sibborn
2015/056 (PDF ) Better Algorithms for LWE and LWR Alexandre Duc, Florian Tramèr, Serge Vaudenay
2015/055 (PDF ) Richer Efficiency/Security Trade-offs in 2PC Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
2015/054 (PDF ) Non-committing encryption from $\Phi$-hiding Brett Hemenway, Rafail Ostrovsky, Alon Rosen
2015/053 (PDF ) Tight Bounds for Keyed Sponges and Truncated CBC Peter Gaži, Krzysztof Pietrzak, Stefano Tessaro
2015/052 (PDF ) Interactive Message-Locked Encryption and Secure Deduplication Mihir Bellare, Sriram Keelveedhi
2015/051 (PDF ) Improved Meet-in-the-Middle Distinguisher on Feistel Schemes Li Lin, Wenling Wu
2015/050 (PDF ) Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability Carla Ràfols
2015/049 (PDF ) On Solving Lpn using BKW and Variants Sonia Bogos, Florian Tramer, Serge Vaudenay
2015/048 (PDF ) On Obfuscation with Random Oracles Ran Canetti, Yael Tauman Kalai, Omer Paneth
2015/047 (PDF ) Linearly Homomorphic Encryption from DDH Guilhem Castagnos, Fabien Laguillaumie
2015/046 (PDF ) On the concrete hardness of Learning with Errors Martin R. Albrecht, Rachel Player, Sam Scott
2015/045 (PDF ) Reliable Information Extraction for Single Trace Attacks Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall
2015/044 (PDF ) Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms Binanda Sengupta, Abhijit Das
2015/043 (PDF ) Group Signature with Deniability: How to Disavow a Signature Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
2015/042 (PDF ) High Performance Lattice-based CCA-secure Encryption Rachid El Bansarkhani, Johannes Buchmann
2015/041 (PDF ) Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP Artur Mariano, Thijs Laarhoven, Christian Bischof
2015/040 (PDF ) Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/039 (PDF ) Type-Based Verification of Electronic Voting Protocols Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling
2015/038 (PDF ) Aggregate Pseudorandom Functions and Connections to Learning Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan
2015/037 (PDF ) Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref
2015/036 (PDF ) Faster software for fast endomorphisms Billy Bob Brumley
2015/035 (PDF ) Cryptographically Secure CRC for Lightweight Message Authentication Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist
2015/034 (PDF ) Suit up! Made-to-Measure Hardware Implementations of Ascon Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer
2015/033 (PDF ) On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel
2015/032 (PDF ) Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF Zvika Brakerski, Vinod Vaikuntanathan
2015/031 (PDF ) Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence Kai-Min Chung, Rafael Pass
2015/030 (PDF ) Cryptanalysis of Ascon Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2015/029 (PDF ) Predicate Encryption for Circuits from LWE Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
2015/028 (PDF ) Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$) Jeremy Maitin-Shepard
2015/027 (PDF ) On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption Adam Smith, Ye Zhang
2015/026 (PDF ) A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/025 (PDF ) Obfuscating Circuits via Composite-Order Graded Encoding Benny Applebaum, Zvika Brakerski
2015/024 (PDF ) Non-Abelian Analogs of Lattice Rounding Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan
2015/023 (PDF ) Multilinear Maps Using Ideal Lattices without Encodings of Zero Gu Chunsheng
2015/022 (PDF ) TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang
2015/021 (PDF ) Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification Xin Li
2015/020 (PDF ) Simpler Efficient Group Signatures from Lattices Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
2015/019 (PDF ) Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi
2015/018 (PDF ) A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS JINTAI DING, ALEXEI MIASNIKOV, ALEXANDER USHAKOV
2015/017 (PDF ) Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
2015/016 (PDF ) Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption Yannis Rouselakis, Brent Waters
2015/015 (PDF ) One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model Florian Bergsma, Tibor Jager, Jörg Schwenk
2015/014 (PDF ) Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang
2015/013 (PDF ) Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification Nico Döttling
2015/012 (PDF ) Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint, Mehdi Tibouchi
2015/011 (PDF ) Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications Benjamin Buhrow, Paul Riemer, Mike Shea, Barry Gilbert, Erik Daniel
2015/010 (PDF ) Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms Shengli Liu, Kenneth G. Paterson
2015/009 (PDF ) Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2015/008 (PDF ) Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh, Aniket Kate
2015/007 (PDF ) Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure Tobias Pulls, Roel Peeters
2015/006 (PDF ) Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven
2015/005 (PDF ) Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs
2015/004 (PDF ) Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs Carmit Hazay
2015/003 (PDF ) Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen
2015/002 (PDF ) Characterization of MDS mappings S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad
2015/001 (PDF ) A note on the security of Higher-Order Threshold Implementations Oscar Reparaz
[ Cryptology ePrint archive ]