Cryptology ePrint Archive: Listing for 2018
Regex
2018/1251 (PDF ) Accountable Tracing Signatures from Lattices San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2018/1250 (PDF ) Function Private Predicate Encryption for Low Min-Entropy Predicates Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna
2018/1249 (PDF ) Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations NingBo Li, TanPing Zhou, XiaoYuan Yang, YiLiang Han, Longfei Liu, WenChao Liu
2018/1248 (PDF ) Fiat-Shamir: From Practice to Theory, Part II (NIZK and Correlation Intractability from Circular-Secure FHE) Ran Canetti, Alex Lombardi, Daniel Wichs
2018/1247 (PDF ) qSCMS: Post-quantum certificate provisioning process for V2X Paulo S. L. M. Barreto, Jefferson E. Ricardini, Marcos A. Simplicio Jr., Harsh Kupwade Patil
2018/1246 (PDF ) Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution Dat Le Tien, Frank Eliassen
2018/1245 (PDF ) Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics Jung Hee Cheon, Andrey Kim, Donggeon Yhee
2018/1244 (PDF ) Fully Deniable Interactive Encryption Ran Canetti, Sunoo Park, Oxana Poburinnaya
2018/1242 (PDF ) Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions Nicolas T. Courtois
2018/1241 (PDF ) Universally Composable Accumulators Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov
2018/1239 (PDF ) Proof-of-Stake Sidechains Peter Gaži, Aggelos Kiayias, Dionysis Zindros
2018/1238 (PDF ) Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi
2018/1237 (PDF ) Sum-of-Squares Meets Program Obfuscation, Revisited Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai
2018/1236 (PDF ) Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks Mark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
2018/1235 (PDF ) Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free Adi Akavia, Craig Gentry, Shai Halevi, Max Leibovich
2018/1234 (PDF ) FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
2018/1233 (PDF ) Key Assignment Scheme with Authenticated Encryption Suyash Kandele, Souradyuti Paul
2018/1232 (PDF ) Certificate Transparency Using Blockchain D S V Madala, Mahabir Prasad Jhanwar, Anupam Chattopadhyay
2018/1231 (PDF ) Post-quantum verifiable random functions from ring signatures Endre Abraham
2018/1230 (PDF ) Pooled Mining Makes Selfish Mining Tricky Suhyeon Lee, Seungjoo Kim
2018/1229 (PDF ) On Some Computational Problems in Local Fields Yingpu Deng, Lixia Luo, Guanju Xiao
2018/1227 (PDF ) Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation Louis Cianciullo, Hossein Ghodosi
2018/1226 (PDF ) Boolean Exponent Splitting Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos
2018/1225 (PDF ) XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen
2018/1224 (PDF ) Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups Essam Ghadafi
2018/1223 (PDF ) Error Amplification in Code-based Cryptography Alexander Nilsson, Thomas Johansson, Paul Stankovski Wagner
2018/1222 (PDF ) Implementing Token-Based Obfuscation under (Ring) LWE Cheng Chen, Nicholas Genise, Daniele Micciancio, Yuriy Polyakov, Kurt Rohloff
2018/1221 (PDF ) Using the Cloud to Determine Key Strengths -- Triennial Update M. Delcourt, T. Kleinjung, A. K. Lenstra, S. Nath, D. Page, N. Smart
2018/1220 (PDF ) Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi
2018/1219 (PDF ) Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property Tomer Ashur, Raluca Posteuca
2018/1218 (PDF ) Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu
2018/1217 (PDF ) Changing Points in APN Functions Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay Kaleyski
2018/1216 (PDF ) This is Not an Attack on Wave Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2018/1215 (PDF ) New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves Suhri Kim, Kisoon Yoon, Jihoon Kwon, Young-Ho Park, Seokhie Hong
2018/1214 (PDF ) Instant Privacy-Preserving Biometric Authentication for Hamming Distance Joohee Lee, Dongwoo Kim, Duhyeong Kim, Yongsoo Song, Junbum Shin, Jung Hee Cheon
2018/1213 (PDF ) Deep Learning vs Template Attacks in front of fundamental targets: experimental study Yevhenii ZOTKIN, Francis OLIVIER, Eric BOURBAO
2018/1212 (PDF ) Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols Itai Dinur, Niv Nadler
2018/1211 (PDF ) Countering Block Withholding Attack Effciently Suhyeon Lee, Seungjoo Kim
2018/1210 (PDF ) MProve: A Proof of Reserves Protocol for Monero Exchanges Arijit Dutta, Saravanan Vijayakumaran
2018/1209 (PDF ) Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security Min Liang
2018/1208 (PDF ) Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications Jun Xu, Santanu Sarkar, Lei Hu
2018/1207 (PDF ) On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders Nicolas Sendrier, Valentin Vasseur
2018/1206 (PDF ) ARPA Whitepaper Derek Zhang, Alex Su, Felix Xu, Jiang Chen
2018/1205 (PDF ) Cryptanalysis of a code-based one-time signature Jean-Christophe Deneuville, Philippe Gaborit
2018/1204 (PDF ) The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing Antonis Michalas
2018/1203 (PDF ) DAGS: Reloaded Revisiting Dyadic Key Encapsulation Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
2018/1202 (PDF ) AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Kwonho Jeong, Hyunok Oh
2018/1201 (PDF ) Subversion in Practice: How to Efficiently Undermine Signatures Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow
2018/1200 (PDF ) On a Rank-Metric Code-Based Cryptosystem with Small Key Size Julian Renner, Sven Puchinger, Antonia Wachter-Zeh
2018/1199 (PDF ) Quantum Equivalence of the DLP and CDHP for Group Actions Steven Galbraith, Lorenz Panny, Benjamin Smith, Frederik Vercauteren
2018/1198 (PDF ) On Lions and Elligators: An efficient constant-time implementation of CSIDH Michael Meyer, Fabio Campos, Steffen Reith
2018/1197 (PDF ) Automated software protection for the masses against side-channel attacks NICOLAS BELLEVILLE, DAMIEN COUROUSSÉ, KARINE HEYDEMANN, HENRI-PIERRE CHARLES
2018/1196 (PDF ) Gradient Visualization for General Characterization in Profiling Attacks Loïc Masure, Cécile Dumas, Emmanuel Prouff
2018/1195 (PDF ) M&M: Masks and Macs against Physical Attacks Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/1194 (PDF ) On Degree-d Zero-Sum Sets of Full Rank Christof Beierle, Alex Biryukov, Aleksei Udovenko
2018/1193 (PDF ) Quantum Chosen-Ciphertext Attacks against Feistel Ciphers Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata
2018/1192 (PDF ) Durandal: a rank metric based signature scheme Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor
2018/1191 (PDF ) Cryptanalysis of 2-round KECCAK-384 Rajendra Kumar, Nikhil Mittal, Shashank Singh
2018/1190 (PDF ) Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle) Sanjit Chatterjee, Sayantan Mukherjee
2018/1189 (PDF ) The Role of the Adversary Model in Applied Security Research Quang Do, Ben Martini, Kim-Kwang Raymond Choo
2018/1188 (PDF ) Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains Dan Boneh, Benedikt Bünz, Ben Fisch
2018/1187 (PDF ) Automatic Search for A Variant of Division Property Using Three Subsets (Full Version) Kai Hu, Meiqin Wang
2018/1186 (PDF ) MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
2018/1185 (PDF ) On Quantum Chosen-Ciphertext Attacks and Learning with Errors Gorjan Alagic, Stacey Jeffery, Maris Ozols, Alexander Poremba
2018/1184 (PDF ) Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity Nasser Alsalami, Bingsheng Zhang
2018/1183 (PDF ) Lossy Trapdoor Permutations with Improved Lossiness Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen
2018/1181 (PDF ) Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendoerfer
2018/1180 (PDF ) Lattice-Based Signature from Key Consensus Leixiao Cheng, Boru Gong, Yunlei Zhao
2018/1179 (PDF ) Elliptic Curves in Generalized Huff's Model Ronal Pranil Chand, Maheswara Rao Valluri
2018/1178 (PDF ) Pseudo-Free Families of Computational Universal Algebras Mikhail Anokhin
2018/1177 (PDF ) Excalibur Key-Generation Protocols For DAG Hierarchic Decryption Louis Goubin, Geraldine Monsalve, Juan Reutter, Francisco Vial Prado
2018/1176 (PDF ) Downgradable Identity-based Encryption and Applications Olivier Blazy, Paul Germouty, Duong Hieu Phan
2018/1175 (PDF ) New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, Altaf Shaik
2018/1174 (PDF ) A Comparison of NTRU Variants John M. Schanck
2018/1173 (PDF ) The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom
2018/1172 (PDF ) The impact of error dependencies on Ring/Mod-LWE/LWR based schemes Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
2018/1171 (PDF ) PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang
2018/1170 (PDF ) Toward RSA-OAEP without Random Oracles Nairen Cao, Adam O'Neill, Mohammad Zaheri
2018/1169 (PDF ) Placing Conditional Disclosure of Secrets in the Communication Complexity Universe Benny Applebaum, Prashant Nalini Vasudevan
2018/1168 (PDF ) Result Pattern Hiding Searchable Encryption for Conjunctive Queries Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shi-Feng Sun, Dongxi Liu, Cong Zuo
2018/1167 (PDF ) On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan
2018/1166 (PDF ) Keeping Time-Release Secrets through Smart Contracts Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang
2018/1165 (PDF ) Identity-Concealed Authenticated Encryption and Key Exchange Yunlei Zhao
2018/1164 (PDF ) Can you sign a quantum state Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2018/1163 (PDF ) More on sliding right Joachim Breitner
2018/1162 (PDF ) On the Concrete Security of Goldreich’s Pseudorandom Generator Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
2018/1161 (PDF ) Adaptively Secure MPC with Sublinear Communication Complexity Ran Cohen, abhi shelat, Daniel Wichs
2018/1160 (PDF ) Algebraic normal form of a bent function: properties and restrictions Natalia Tokareva
2018/1159 (PDF ) Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions Sihem Mesnager, Kwang Ho Kim, Myong Song Jo
2018/1158 (PDF ) Adversarially Robust Property Preserving Hash Functions Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan
2018/1157 (PDF ) Special Soundness Revisited Douglas Wikström
2018/1156 (PDF ) Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park
2018/1155 (PDF ) Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
2018/1154 (PDF ) Leakage Resilient Secret Sharing and Applications Akshayaram Srinivasan, Prashant Nalini Vasudevan
2018/1153 (PDF ) Dfinity Consensus, Explored Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren
2018/1152 (PDF ) Improvements of Blockchain’s Block Broadcasting:An Incentive Approach Qingzhao Zhang, Yijun Leng, Lei Fan
2018/1151 (PDF ) Analysis Of The Simulatability Of An Oblivious Transfer Bing Zeng
2018/1150 (PDF ) Quantum-secure message authentication via blind-unforgeability Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song
2018/1149 (PDF ) Compressive Sensing based Leakage Sampling and Reconstruction: A First Study Changhai Ou, Chengju Zhou, Siew-Kei Lam
2018/1148 (PDF ) Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak
2018/1147 (PDF ) Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures Divesh Aggarwal, Ivan Damgard, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, Joao Ribeiro, Mark Simkin
2018/1145 (PDF ) Privacy Computing: Concept, Computing Framework And Future Development Trends Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
2018/1144 (PDF ) Revisiting Non-Malleable Secret Sharing Saikrishna Badrinarayanan, Akshayaram Srinivasan
2018/1143 (PDF ) A new SNOW stream cipher called SNOW-V Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang
2018/1142 (PDF ) Factoring Products of Braids via Garside Normal Form Simon-Philipp Merz, Christophe Petit
2018/1141 (PDF ) Fast Authentication from Aggregate Signatures with Improved Security Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
2018/1140 (PDF ) Efficient Fully-Leakage Resilient One-More Signature Schemes Antonio Faonio
2018/1139 (PDF ) Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications Kexin Hu, Zhenfeng Zhang, Kaiven Guo
2018/1138 (PDF ) Leakage-Resilient Secret Sharing Ashutosh Kumar, Raghu Meka, Amit Sahai
2018/1137 (PDF ) Genus 2 curves with given split Jacobian Jasper Scholten
2018/1136 (PDF ) A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
2018/1135 (PDF ) PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains Sébastien Andreina, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li, Giorgia Azzurra Marson
2018/1134 (PDF ) Echoes of the Past: Recovering Blockchain Metrics From Merged Mining Nicholas Stifter, Philipp Schindler, Aljosha Judmayer, Alexei Zamyatin, Andreas Kern, Edgar Weippl
2018/1133 (PDF ) A Public Key Exchange Cryptosystem Based on Ideal Secrecy Vamshi Krishna Kammadanam, Virendra R. Sule, Yi Hong
2018/1132 (PDF ) Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake Thomas Kerber, Markulf Kohlweiss, Aggelos Kiayias, Vassilis Zikas
2018/1131 (PDF ) A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan
2018/1130 (PDF ) A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF Ashwin Jha, Mridul Nandi
2018/1129 (PDF ) On Kilian's Randomization of Multilinear Map Encodings Jean-Sebastien Coron, Hilder V. L. Pereira
2018/1128 (PDF ) Direct Anonymous Attestation with Optimal TPM Signing Efficiency Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi
2018/1127 (PDF ) Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks P. Arun Babu, Jithin Jose Thomas
2018/1126 (PDF ) Lightweight AE and HASH in a Single Round Function Dingfeng Ye, Danping Shi, Peng Wang
2018/1125 (PDF ) Verifying liquidity of Bitcoin contracts Massimo Bartoletti, Roberto Zunino
2018/1124 (PDF ) Secure Opportunistic Multipath Key Exchange Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu
2018/1123 (PDF ) When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis Stjepan Picek, Annelie Heuser, Lichao Wu, Cesare Alippi, Francesco Regazzoni
2018/1122 (PDF ) Improved Quantum Multicollision-Finding Algorithm Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa
2018/1121 (PDF ) An Analysis of the ProtonMail Cryptographic Architecture Nadim Kobeissi
2018/1120 (PDF ) Organizational Cryptography for Access Control Masahito Gotaishi, Shigeo Tsujii
2018/1119 (PDF ) Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition Matthias Fitzi, Peter Ga{ž}i, Aggelos Kiayias, Alexander Russell
2018/1118 (PDF ) Non-Interactive Non-Malleability from Quantum Supremacy Yael Tauman Kalai, Dakshita Khurana
2018/1117 (PDF ) A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness Felix Wegener, Amir Moradi
2018/1116 (PDF ) Fly, you fool! Faster Frodo for the ARM Cortex-M4 Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
2018/1115 (PDF ) Group Signature without Random Oracles from Randomizable Signatures Remi Clarisse, Olivier Sanders
2018/1114 (PDF ) Lightweight Circuits with Shift and Swap Subhadeep Banik, Francesco Regazzoni, Serge Vaudenay
2018/1113 (PDF ) Private Function Evaluation with Cards Alexander Koch, Stefan Walzer
2018/1112 (PDF ) DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm Tai-Yuan Chen, Wei-Ning Huang, Po-Chun Kuo, Hao Chung, Tzu-Wei Chao
2018/1110 (PDF ) Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies Dominic Deuber, Nico Döttling, Bernardo Magri, Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
2018/1109 (PDF ) Faster SeaSign signatures through improved rejection sampling Thomas Decru, Lorenz Panny, Frederik Vercauteren
2018/1108 (PDF ) Covert Security with Public Verifiability: Faster, Leaner, and Simpler Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, Xiao Wang
2018/1107 (PDF ) Further observations on SIMON and SPECK families of block ciphers S. M. Dehnavi
2018/1106 (PDF ) P4TC—Provably-Secure yet Practical Privacy-Preserving Toll Collection Valerie Fetzer, Max Hoffmann, Matthias Nagel, Andy Rupp, Rebecca Schwerdt
2018/1105 (PDF ) Proof-of-Stake Protocols for Privacy-Aware Blockchains Chaya Ganesh, Claudio Orlandi, Daniel Tschudi
2018/1104 (PDF ) Tropical cryptography II: extensions by homomorphisms Dima Grigoriev, Vladimir Shpilrain
2018/1103 (PDF ) Some Properties of Modular Addition Victoria Vysotskaya
2018/1102 (PDF ) A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi
2018/1101 (PDF ) Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments Lunzhi Deng
2018/1100 (PDF ) Correction to "Improving the DGK comparison protocol" Thijs Veugen
2018/1099 (PDF ) SoK: Modular and Efficient Private Decision Tree Evaluation Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider
2018/1098 (PDF ) MARVELlous: a STARK-Friendly Family of Cryptographic Primitives Tomer Ashur, Siemen Dhooghe
2018/1097 (PDF ) End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability Michael Schliep, Nicholas Hopper
2018/1096 (PDF ) On Finding Quantum Multi-collisions Qipeng Liu, Mark Zhandry
2018/1095 (PDF ) Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security Wen-Ran Zhang
2018/1094 (PDF ) Match Me if You Can: Matchmaking Encryption and its Applications Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi
2018/1093 (PDF ) Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
2018/1092 (PDF ) Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak Felix Wegener, Christian Baiker, Amir Moradi
2018/1091 (PDF ) Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/1090 (PDF ) Plaintext Recovery Attack of OCB2 Tetsu Iwata
2018/1089 (PDF ) On the impact of decryption failures on the security of LWE/LWR based schemes Jan-Pieter D'Anvers, Frederik Vercauteren, Ingrid Verbauwhede
2018/1088 (PDF ) High-speed Side-channel-protected Encryption and Authentication in Hardware Nele Mentens, Vojtech Miskovsky, Martin Novotny, Jo Vliegen
2018/1087 (PDF ) Breaking the confidentiality of OCB2 Bertram Poettering
2018/1086 (PDF ) Two Party Distribution Testing: Communication and Security Alexandr Andoni, Tal Malkin, Negev Shekel Nosatzki
2018/1085 (PDF ) Exact maximum expected differential and linear probability for 2-round Kuznyechik Vitaly Kiryukhin
2018/1084 (PDF ) A Deep Dive into Blockchain Selfish Mining Qianlan Bai, Xinyan Zhou, Xing Wang, Yuedong Xu, Xin Wang, Qingsheng Kong
2018/1083 (PDF ) Private Stateful Information Retrieval Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2018/1082 (PDF ) An Algebraic Method to Recover Superpolies in Cube Attacks Chen-Dong Ye, Tian Tian
2018/1081 (PDF ) Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, Changmin Lee
2018/1080 (PDF ) How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation Yiwen Gao, Yongbin Zhou, Wei Cheng
2018/1079 (PDF ) Analysis of Deterministic Longest-Chain Protocols Elaine Shi
2018/1078 (PDF ) Two Round Information-Theoretic MPC with Malicious Security Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2018/1077 (PDF ) More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers Hart Montgomery
2018/1076 (PDF ) Game Theoretic Notions of Fairness in Multi-Party Coin Toss Kai-Min Chung, Yue Guo, Wei-Kai Lin, Rafael Pass, Elaine Shi
2018/1074 (PDF ) Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication Felix Wegener, Amir Moradi
2018/1073 (PDF ) Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping Jung Hee Cheon, Kyoohyung Han, Minki Hhan
2018/1072 (PDF ) Construction of MDS Matrices from Generalized Feistel Structures Mahdi Sajadieh, Mohsen Mousavi
2018/1071 (PDF ) CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2018/1070 (PDF ) A New Batch FHE Scheme over the Integers Kwak Wi Song, Kim Chol Un
2018/1069 (PDF ) Non-Malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering Eshan Chattopadhyay, Xin Li
2018/1068 (PDF ) Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
2018/1067 (PDF ) On Quantum Slide Attacks Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
2018/1066 (PDF ) Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness Akinori Hosoyamada, Takashi Yamakawa
2018/1065 (PDF ) Homomorphic Secret Sharing for Low Degree Polynomials Russell W. F. Lai, Giulio Malavolta, Dominique Schröder
2018/1064 (PDF ) Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction Nithyashankari Gummidipoondi Jayasankaran, Adriana Sanabria Borbon, Edgar Sanchez-Sinencio, Jiang Hu, Jeyavijayan Rajendran
2018/1063 (PDF ) Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset Mashael AlSabah, Gabriele Oligeri, Ryan Riley
2018/1062 (PDF ) DAGsim: Simulation of DAG-based distributed ledger protocols Manuel Zander, Tom Waite, Dominik Harz
2018/1061 (PDF ) On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks Behnam Zahednejad, Majid Bayat, Ashok Kumar Das
2018/1060 (PDF ) Port Contention for Fun and Profit Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, Nicola Tuveri
2018/1059 (PDF ) Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny
2018/1058 (PDF ) Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang
2018/1057 (PDF ) Limiting the impact of unreliable randomness in deployed security protocols Liliya Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav V. Smyshlyaev, Nick Sullivan
2018/1056 (PDF ) Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar
2018/1055 (PDF ) Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation Pan Dongxue, Li Hongda, Ni Peifang
2018/1054 (PDF ) Efficient Multi-key FHE with short extended ciphertexts and less public parameters Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Yiliang Han, Wenchao Liu
2018/1053 (PDF ) Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation Jothi Rangasamy, Lakshmi Kuppusamy
2018/1052 (PDF ) Verifiability Analysis of CHVote David Bernhard, Véronique Cortier, Pierrick Gaudry, Mathieu Turuani, Bogdan Warinschi
2018/1051 (PDF ) Lower Bounds for Differentially Private RAMs Giuseppe Persiano, Kevin Yeo
2018/1050 (PDF ) Towards Automatically Penalizing Multimedia Breaches Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate
2018/1049 (PDF ) Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol Aggelos Kiayias, Alexander Russell
2018/1048 (PDF ) Proof-of-Work Sidechains Aggelos Kiayias, Dionysis Zindros
2018/1047 (PDF ) On the Linear Transformation in White-box Cryptography Seungkwang Lee, Nam-su Jho, Myungchul Kim
2018/1046 (PDF ) Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$ Claude Carlet, Xi Chen, Longjiang Qu
2018/1045 (PDF ) MPC Joins the Dark Side John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2018/1044 (PDF ) Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions Masahito Ishizaka, Kanta Matsuura
2018/1043 (PDF ) Improved Bootstrapping for Approximate Homomorphic Encryption Hao Chen, Ilaria Chillotti, Yongsoo Song
2018/1042 (PDF ) Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger
2018/1041 (PDF ) Secure Outsourced Matrix Computation and Application to Neural Networks Xiaoqian Jiang, Miran Kim, Kristin Lauter, Yongsoo Song
2018/1040 (PDF ) Cryptanalysis of OCB2 Akiko Inoue, Kazuhiko Minematsu
2018/1039 (PDF ) Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble Georg Fuchsbauer, Michele Orrù, Yannick Seurin
2018/1038 (PDF ) On inversion modulo pseudo-Mersenne primes Michael Scott
2018/1037 (PDF ) The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol Joël Alwen, Sandro Coretti, Yevgeniy Dodis
2018/1036 (PDF ) If a Generalised Butterfly is APN then it Operates on 6 Bits Anne Canteaut, Léo Perrin, Shizhu Tian
2018/1035 (PDF ) Relating different Polynomial-LWE problems Madalina Bolboceanu
2018/1034 (PDF ) Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui
2018/1033 (PDF ) One-Round Authenticated Group Key Exchange from Isogenies Atsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama
2018/1032 (PDF ) Conditionals in Homomorphic Encryption and Machine Learning Applications Diego Chialva, Ann Dooms
2018/1031 (PDF ) Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking Roderick Bloem, Rinat Iusupov, Martin Krenn, Stefan Mangard
2018/1030 (PDF ) Registration-Based Encryption from Standard Assumptions Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar
2018/1029 (PDF ) Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations Zhe Li, Chaoping Xing, Sze Ling Yeo
2018/1028 (PDF ) Synchronous Byzantine Agreement with Expected $O(1)$ Rounds, Expected $O(n^2)$ Communication, and Optimal Resilience Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
2018/1027 (PDF ) A Unified Security Perspective on Legally Fair Contract Signing Protocols Diana Maimut, George Teseleanu
2018/1026 (PDF ) Pairing-Friendly Twisted Hessian Curves Chitchanok Chuengsatiansup, Chloe Martindale
2018/1025 (PDF ) Integer Matrices Homomorphic Encryption and Its application Yanan Bai, Jingwei Chen, Yong Feng, Wenyuan Wu
2018/1024 (PDF ) ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun
2018/1023 (PDF ) Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic
2018/1022 (PDF ) Blind Certificate Authorities Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, abhi shelat
2018/1021 (PDF ) Multi-Client Functional Encryption with Repetition for Inner Product Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2018/1020 (PDF ) Non-Interactive Secure Computation from One-Way Functions Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
2018/1019 (PDF ) Decentralized Evaluation of Quadratic Polynomials on Encrypted Data Chloé Hébant, Duong Hieu Phan, David Pointcheval
2018/1018 (PDF ) Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe
2018/1017 (PDF ) TNFS Resistant Families of Pairing-Friendly Elliptic Curves Georgios Fotiadis, Elisavet Konstantinou
2018/1016 (PDF ) Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol Gerben Geltink
2018/1015 (PDF ) Non-Malleable Codes Against Bounded Polynomial Time Tampering Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Huijia Lin, Tal Malkin
2018/1014 (PDF ) An FPGA-based programmable processor for bilinear pairings Eduardo Cuevas-Farfán, Miguel Morales-Sandoval, René Cumplido
2018/1013 (PDF ) E3: A Framework for Compiling C++ Programs with Encrypted Operands Eduardo Chielle, Oleg Mazonka, Homer Gamil, Nektarios Georgios Tsoutsos, Michail Maniatakos
2018/1012 (PDF ) The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2018/1011 (PDF ) BISON - Instantiating the Whitened Swap-Or-Not Construction Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer
2018/1010 (PDF ) Space Efficient Computational Multi-Secret Sharing and Its Applications Aggelos Kiayias, Murat Osmanoglu, Alexander Russell, Qiang Tang
2018/1009 (PDF ) LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li, Kunpeng Wang
2018/1007 (PDF ) Masking the AES with Only Two Random Bits Hannes Gross, Ko Stoffelen, Lauren De Meyer, Martin Krenn, Stefan Mangard
2018/1005 (PDF ) Code Offset in the Exponent Luke Demarest, Benjamin Fuller, Alexander Russell
2018/1004 (PDF ) Fiat-Shamir From Simpler Assumptions Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum
2018/1003 (PDF ) Secure Data Retrieval On The Cloud: Homomorphic Encryption Meets Coresets Adi Akavia, Dan Feldman, Hayim Shaul
2018/1002 (PDF ) "S-Box" Implementation of AES is NOT side-channel resistant C Ashokkumar, Bholanath Roy, M Bhargav Sri Venkatesh, Bernard L Menezes
2018/1001 (PDF ) Illuminating the Dark or how to recover what should not be seen in FE-based classifiers Sergiu Carpov, Caroline Fontaine, Damien Ligier, Renaud Sirdey
2018/1000 (PDF ) Adaptively Single-Key Secure Constrained PRFs for NC1 Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2018/999 (PDF ) A Refinement of ``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018 Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao
2018/997 (PDF ) Turning HATE Into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC Leonid Reyzin, Adam Smith, Sophia Yakoubov
2018/996 (PDF ) Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2018/995 (PDF ) Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He
2018/994 (PDF ) People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes Long Chen, Qiang Tang
2018/993 (PDF ) The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam
2018/992 (PDF ) Deconstructing the Blockchain to Approach Physical Limits Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, Pramod Viswanath
2018/991 (PDF ) Reconsidering Generic Composition: the Tag-then-Encrypt case Francesco Berti, Olivier Pereira, Thomas Peters
2018/990 (PDF ) Quisquis: A New Design for Anonymous Cryptocurrencies Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi
2018/989 (PDF ) Kleptography trapdoor free cryptographic protocols Bohdan Kovalenko, Anton Kudin
2018/988 (PDF ) On the Hardness of Learning With Errors with Binary Secrets Daniele Micciancio
2018/987 (PDF ) Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody Iftach Haitner, Yehuda Lindell, Ariel Nof, Samuel Ranellucci
2018/986 (PDF ) Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs Sam Kim, David J. Wu
2018/985 (PDF ) Efficient Arithmetic In (Pseudo-)Mersenne Prime Order Fields Kaushik Nath, Palash Sarkar
2018/984 (PDF ) Pseudorandomness Against Mean and Variance Bounded Attackers Maciej Skorski
2018/983 (PDF ) Efficient UC Commitment Extension with Homomorphism for Free (and Applications) Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli
2018/982 (PDF ) Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada
2018/981 (PDF ) PaLa: A Simple Partially Synchronous Blockchain T-H. Hubert Chan, Rafael Pass, Elaine Shi
2018/980 (PDF ) PiLi: An Extremely Simple Synchronous Blockchain T-H. Hubert Chan, Rafael Pass, Elaine Shi
2018/979 (PDF ) FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval
2018/978 (PDF ) Encrypted Multi-Maps with Computationally-Secure Leakage Seny Kamara, Tarik Moataz
2018/977 (PDF ) Threshold Single Password Authentication Devriş İşler, Alptekin Küpçü
2018/976 (PDF ) Distributed Single Password Protocol Framework Devriş İşler, Alptekin Küpçü
2018/975 (PDF ) User Study on Single Password Authentication Devriş İşler, Alptekin Küpçü, Aykut Coskun
2018/974 (PDF ) Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka, Takashi Yamakawa
2018/973 (PDF ) How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO Aayush Jain, Amit Sahai
2018/972 (PDF ) Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18 Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang
2018/971 (PDF ) Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2018/970 (PDF ) Protean Signature Schemes Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2018/969 (PDF ) Optimal TNFS-secure pairings on elliptic curves with even embedding degree Georgios Fotiadis, Chloe Martindale
2018/968 (PDF ) Edrax: A Cryptocurrency with Stateless Transaction Validation Alexander Chepurnoy, Charalampos Papamanthou, Shravan Srinivasan, Yupeng Zhang
2018/967 (PDF ) Higher dimensional sieving for the number field sieve algorithms Laurent Grémy
2018/966 (PDF ) On the Security of the Multivariate Ring Learning with Errors Problem Carl Bootland, Wouter Castryck, Frederik Vercauteren
2018/965 (PDF ) Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenny Paterson
2018/964 (PDF ) Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas Saud Al Musa, Guangwu Xu
2018/963 (PDF ) On Enabling Attribute-Based Encryption to Be Traceable against Traitors Zhen Liu, Qiong Huang, Duncan S. Wong
2018/962 (PDF ) Zexe: Enabling Decentralized Private Computation Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu
2018/961 (PDF ) Jitter Estimation with High Accuracy for Oscillator-Based TRNGs Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng
2018/960 (PDF ) Towards Quantum One-Time Memories from Stateless Hardware Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou
2018/959 (PDF ) Information Entropy Based Leakage Certification Changhai Ou, Xinping Zhou, Siew-Kei Lam
2018/958 (PDF ) On Tightly Secure Primitives in the Multi-Instance Setting Dennis Hofheinz, Ngoc Khanh Nguyen
2018/957 (PDF ) Same Point Composable and Nonmalleable Obfuscated Point Functions Peter Fenteany, Benjamin Fuller
2018/956 (PDF ) Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang
2018/955 (PDF ) Compact Sparse Merkle Trees Faraz Haider
2018/954 (PDF ) Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging Daniel Jost, Ueli Maurer, Marta Mularczyk
2018/953 (PDF ) A Comparative Evaluation of Order-Revealing Encryption Schemes and Secure Range-Query Protocols Dmytro Bogatov, George Kollios, Leonid Reyzin
2018/952 (PDF ) Approximate Homomorphic Encryption over the Conjugate-invariant Ring Duhyeong Kim, Yongsoo Song
2018/951 (PDF ) The Landscape of Optimal Card-based Protocols Alexander Koch
2018/950 (PDF ) Security bound for CTR-ACPKM internally re-keyed encryption mode Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Stanislav V. Smyshlyaev
2018/949 (PDF ) Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations Si Gao, Arnab Roy, Elisabeth Oswald
2018/948 (PDF ) MILP-Based Automatic Differential Searches for LEA and HIGHT Elnaz Bagherzadeh, Zahra Ahmadian
2018/947 (PDF ) On the security of Circulant UOV/Rainbow Yasufumi Hashimoto
2018/946 (PDF ) Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More Nicholas Genise, Daniele Micciancio, Yuriy Polyakov
2018/945 (PDF ) On the Inner Product Predicate and a Generalization of Matching Vector Families Balthazar Bauer, Jevgēnijs Vihrovs, Hoeteck Wee
2018/944 (PDF ) Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions Jeremiah Blocki, Ben Harsha, Siteng Kang, Seunghoon Lee, Lu Xing, Samson Zhou
2018/943 (PDF ) Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu
2018/942 (PDF ) Insured MPC: Efficient Secure Computation with Financial Penalties Carsten Baum, Bernardo David, Rafael Dowsley
2018/941 (PDF ) A tutorial introduction to CryptHOL Andreas Lochbihler, S. Reza Sefidgar
2018/940 (PDF ) Reusable Non-Interactive Secure Computation Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
2018/939 (PDF ) The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms Marcella Hastings, Nadia Heninger, Eric Wustrow
2018/938 (PDF ) Private Message Franking with After Opening Privacy Iraklis Leontiadis, Serge Vaudenay
2018/937 (PDF ) Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys Mathias Wagner, Stefan Heyse
2018/936 (PDF ) New Techniques for Obfuscating Conjunctions James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry
2018/935 (PDF ) Distinguishing Error of Nonlinear Invariant Attacks Subhabrata Samajder, Palash Sarkar
2018/934 (PDF ) Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices Yuichi Komano, Hideo Shimizu, Hideyuki Miyake
2018/933 (PDF ) Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures Ferucio Laurentiu Tiplea, Constantin Catalin Dragan
2018/932 (PDF ) 18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices Philipp Koppermann, Eduard Pop, Johann Heyszl, Georg Sigl
2018/931 (PDF ) A Full RNS Variant of Approximate Homomorphic Encryption Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
2018/930 (PDF ) A study on the fast ElGamal encryption Kim Gyu-Chol, Li Su-Chol
2018/929 (PDF ) Expander Graphs are Non-Malleable Codes Peter M. R. Rasmussen, Amit Sahai
2018/928 (PDF ) Generic Authenticated Key Exchange in the Quantum Random Oracle Model Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh
2018/927 (PDF ) Adaptively Secure Distributed PRFs from LWE Benoît Libert, Damien Stehlé, Radu Titiu
2018/926 (PDF ) Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion Salim Ali Altug, Yilei Chen
2018/925 (PDF ) PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously Songze Li, Mingchao Yu, A. Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
2018/924 (PDF ) Forward Secure Signatures on Smart Cards Andreas Hülsing, Christoph Busold, Johannes Buchmann
2018/923 (PDF ) Delegatable Anonymous Credentials from Mercurial Signatures Elizabeth C. Crites, Anna Lysyanskaya
2018/922 (PDF ) Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications Dušan Božilov, Miroslav Knežević, Ventzislav Nikov
2018/921 (PDF ) Round Optimal Black-Box “Commit-and-Prove” Dakshita Khurana, Rafail Ostrovsky, Akshayaram Srinivasan
2018/920 (PDF ) A Message Franking Channel Loïs Huguenin-Dumittan, Iraklis Leontiadis
2018/919 (PDF ) Registration-Based Encryption: Removing Private-Key Generator from IBE Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi
2018/918 (PDF ) Scalable Lightning Factories for Bitcoin Alejandro Ranchal-Pedrosa, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/917 (PDF ) Secure multiparty PageRank algorithm for collaborative fraud detection Alex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, Daniël Worm
2018/916 (PDF ) Forking a Blockcipher for Authenticated Encryption of Very Short Messages Elena Andreeva, Reza Reyhanitabar, Kerem Varici, Damian Vizár
2018/915 (PDF ) On the Security of a Certificateless Strong Designated Verifier Signature Scheme Nasrollah Pakniat
2018/914 (PDF ) Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance Shuichi Katsumata, Shota Yamada
2018/913 (PDF ) Best Possible Information-Theoretic MPC Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
2018/912 (PDF ) Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2018/911 (PDF ) Achieving Fair Treatment in Algorithmic Classification Andrew Morgan, Rafael Pass
2018/910 (PDF ) Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail
2018/909 (PDF ) Two-Round MPC: Information-Theoretic and Black-Box Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
2018/908 (PDF ) FE and iO for Turing Machines from Minimal Assumptions Shweta Agrawal, Monosij Maitra
2018/907 (PDF ) Proving the correct execution of concurrent services in zero-knowledge Srinath Setty, Sebastian Angel, Trinabh Gupta, Jonathan Lee
2018/906 (PDF ) Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries Willy Quach, Daniel Wichs, Giorgos Zirdelis
2018/905 (PDF ) On the Security Loss of Unique Signatures Andrew Morgan, Rafael Pass
2018/904 (PDF ) Quantum security proofs using semi-classical oracles Andris Ambainis, Mike Hamburg, Dominique Unruh
2018/903 (PDF ) Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila
2018/902 (PDF ) ProximiTEE: Hardened SGX Attestation by Proximity Verification Aritra Dhar, Evan Puddu, Kari Kostiainen, Srdjan Capkun
2018/901 (PDF ) On the Complexity of Fair Coin Flipping Iftach Haitner, Nikolaos Makriyannis, Eran Omri
2018/900 (PDF ) Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations Mohammad Hajiabadi
2018/899 (PDF ) Differential Cryptanalysis of Round-Reduced SPECK Ashutosh Dhar Dwivedi, Pawel Morawiecki
2018/898 (PDF ) Differential Cryptanalysis in ARX Ciphers with specific applications to LEA Ashutosh Dhar Dwivedi, Gautam Srivastava
2018/897 (PDF ) Traitor-Tracing from LWE Made Simple and Attribute-Based Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs
2018/896 (PDF ) Proofs of Ignorance and Applications to 2-Message Witness Hiding Apoorvaa Deshpande, Yael Kalai
2018/895 (PDF ) Weak Zero-Knowledge Beyond the Black-Box Barrier Nir Bitansky, Dakshita Khurana, Omer Paneth
2018/894 (PDF ) Perfect Secure Computation in Two Rounds Benny Applebaum, Zvika Brakerski, Rotem Tsabary
2018/893 (PDF ) Blockchain as cryptanalytic tool Manfred Lochter
2018/892 (PDF ) OptORAMa: Optimal Oblivious RAM Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi
2018/891 (PDF ) Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment Seyed Farhad Aghili, Hamid Mala
2018/890 (PDF ) A Bit-fixing PRF with O(1) Collusion-Resistance from LWE Alex Davidson, Ryo Nishimaki
2018/889 (PDF ) Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity F. Betül Durak, Serge Vaudenay
2018/888 (PDF ) Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg Thom Wiggers
2018/887 (PDF ) Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions Serge Fehr
2018/886 (PDF ) Towards Isogeny-Based Password-Authenticated Key Establishment Oleg Taraskin, Vladimir Soukharev, David Jao, Jason LeGrow
2018/885 (PDF ) PASTA: PASsword-based Threshold Authentication Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee
2018/884 (PDF ) Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model Alan Szepieniec, Reza Reyhanitabar, Bart Preneel
2018/883 (PDF ) Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks Suvradip Chakraborty, C. Pandu Rangan
2018/882 (PDF ) Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies Benjamin Smith
2018/881 (PDF ) Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
2018/880 (PDF ) Spread: a new layer for profiled deep-learning side-channel attacks Christophe Pfeifer, Patrick Haddad
2018/879 (PDF ) Efficient Group Signature Scheme without Pairings Ke Gu, Bo Yin
2018/878 (PDF ) RSA Signatures Under Hardware Restrictions Marc Joye, Yan Michalevsky
2018/877 (PDF ) On QA-NIZK in the BPK Model Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michał Zając
2018/876 (PDF ) Identity Confidentiality in 5G Mobile Telephony Systems Haibat Khan, Benjamin Dowling, Keith M. Martin
2018/875 (PDF ) Oblivious Transfer in Incomplete Networks Varun Narayanan, Vinod M. Prabhakaran
2018/874 (PDF ) Enhanced Security of Attribute-Based Signatures Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018/873 (PDF ) TACHYON: Fast Signatures from Compact Knapsack Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz, Mike Rosulek
2018/872 (PDF ) New Techniques for Efficient Trapdoor Functions and Applications Sanjam Garg, Romain Gay, Mohammad Hajiabadi
2018/871 (PDF ) Non-profiled Mask Recovery: the impact of Independent Component Analysis Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi
2018/870 (PDF ) Unifying Kleptographic Attacks George Teseleanu
2018/869 (PDF ) Higher-Order DCA against Standard Side-Channel Countermeasures Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang
2018/868 (PDF ) S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard Dea Saka Kurnia Putra, Mohamad Ali Sadikin, Susila Windarta
2018/867 (PDF ) Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling Liron David, Avishai Wool
2018/866 (PDF ) Output Compression, MPC, and iO for Turing Machines Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters
2018/865 (PDF ) Multiplicative Masking for AES in Hardware Lauren De Meyer, Oscar Reparaz, Begül Bilgin
2018/863 (PDF ) Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation Avi Asayag, Gad Cohen, Ido Grayevsky, Maya Leshkowitz, Ori Rottenstreich, Ronen Tamari, David Yakira
2018/862 (PDF ) Attacking RO-PUFs with Enhanced Challenge-Response Pairs Nils Wisiol, Marian Margraf
2018/861 (PDF ) Delegating Computations with (almost) Minimal Time and Space Overhead Justin Holmgren, Ron D. Rothblum
2018/860 (PDF ) Encrypted Databases for Differential Privacy Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
2018/859 (PDF ) Cryptanalysis of Low-Data Instances of Full LowMCv2 Christian Rechberger, Hadi Soleimany, Tyge Tiessen
2018/858 (PDF ) Stronger Security for Sanitizable Signatures Stephan Krenn, Kai Samelin, Dieter Sommer
2018/857 (PDF ) Raptor: A Practical Lattice-Based (Linkable) Ring Signature Xingye Lu, Man Ho Au, Zhenfei Zhang
2018/856 (PDF ) Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai, Damien Stehlé, Weiqiang Wen
2018/855 (PDF ) On the Security of the PKCS#1 v1.5 Signature Scheme Tibor Jager, Saqib A. Kakvi, Alexander May
2018/854 (PDF ) Universal Multi-Party Poisoning Attacks Saeed Mahloujifar, Mahammad Mahmoody, Ameer Mohammed
2018/853 (PDF ) Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias
2018/852 (PDF ) Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas
2018/851 (PDF ) More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting T-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi
2018/850 (PDF ) Computing supersingular isogenies on Kummer surfaces Craig Costello
2018/849 (PDF ) Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
2018/848 (PDF ) A Universally Composable Framework for the Privacy of Email Ecosystems Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias
2018/847 (PDF ) Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption Venkata Koppula, Brent Waters
2018/846 (PDF ) Strong Leakage Resilient Encryption: Enhancing Data Confidentiality by Hiding Partial Ciphertext Jia Xu, Jianying Zhou
2018/845 (PDF ) A Framework for Achieving KDM-CCA Secure Public-Key Encryption Fuyuki Kitagawa, Keisuke Tanaka
2018/844 (PDF ) Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove Jean Paul Degabriele, Marc Fischlin
2018/843 (PDF ) Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT) Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2018/842 (PDF ) Attribute-Based Signatures for Unbounded Languages from Standard Assumptions Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
2018/841 (PDF ) Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions Akinori Hosoyamada, Kan Yasuda
2018/840 (PDF ) Universal Proxy Re-Encryption Nico Döttling, Ryo Nishimaki
2018/839 (PDF ) On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography Huseyin Hisil, Joost Renes
2018/838 (PDF ) (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model Keita Xagawa, Takashi Yamakawa
2018/837 (PDF ) Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang
2018/836 (PDF ) Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques Aljosha Judmayer, Nicholas Stifter, Philipp Schindler, Edgar Weippl
2018/835 (PDF ) Fully-Featured Anonymous Credentials with Reputation System Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier
2018/834 (PDF ) Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks Dennis Hofheinz, Dingding Jia, Jiaxin Pan
2018/833 (PDF ) Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding Jie Chen, Junqing Gong, Hoeteck Wee
2018/832 (PDF ) Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
2018/831 (PDF ) Practical Attack on RaCoSS-R Keita Xagawa
2018/830 (PDF ) A remark on a success rate model fpr DPA and CPA Andreas Wiemers
2018/829 (PDF ) Information-Theoretic Broadcast with Dishonest Majority for Long Messages Wutichai Chongchitmate, Rafail Ostrovsky
2018/828 (PDF ) Aurora: Transparent Succinct Arguments for R1CS Eli Ben-Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, Nicholas P. Ward
2018/827 (PDF ) Practical Strategy-Resistant Privacy-Preserving Elections Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré
2018/826 (PDF ) Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH Tibor Jager, Rafael Kurek, Jiaxin Pan
2018/825 (PDF ) Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information Kostas Papagiannopoulos
2018/824 (PDF ) SeaSign: Compact isogeny signatures from class group actions Luca De Feo, Steven D. Galbraith
2018/823 (PDF ) The Security of Lazy Users in Out-of-Band Authentication Moni Naor, Lior Rotem, Gil Segev
2018/822 (PDF ) LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi
2018/821 (PDF ) Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2018/820 (PDF ) Privacy Loss Classes: The Central Limit Theorem in Differential Privacy David Sommer, Sebastian Meiser, Esfandiar Mohammadi
2018/819 (PDF ) ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls Ritam Bhaumik, Eik List, Mridul Nandi
2018/818 (PDF ) Robustly Reusable Fuzzy Extractor from Standard Assumptions Yunhua Wen, Shengli Liu
2018/817 (PDF ) Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He
2018/816 (PDF ) Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security Chun Guo, Lei Wang
2018/815 (PDF ) Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation Yoshitatsu Matsuda, Tadanori Teruya, Kenji Kasiwabara
2018/814 (PDF ) White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo
2018/813 (PDF ) Programming the Demirci-Sel{ç}uk Meet-in-the-Middle Attack with Constraints Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu
2018/812 (PDF ) Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier? Lior Rotem, Gil Segev
2018/811 (PDF ) Reconstructing an S-box from its Difference Distribution Table Orr Dunkelman, Senyang Huang
2018/810 (PDF ) Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP Ling Song, Jian Guo
2018/809 (PDF ) Algebraic Cryptanalysis of Frit Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger
2018/808 (PDF ) Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher
2018/807 (PDF ) On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers Nicolas T. Courtois
2018/806 (PDF ) Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness Victor Arribas, Svetla Nikova, Vincent Rijmen
2018/805 (PDF ) Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda
2018/804 (PDF ) Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul
2018/803 (PDF ) BITE: Bitcoin Lightweight Client Privacy using Trusted Execution Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
2018/802 (PDF ) Secure Modulo Zero-Sum Randomness as Cryptographic Resource Masahito Hayashi, Takeshi Koshiba
2018/801 (PDF ) Faster PCA and Linear Regression through Hypercubes in HElib Deevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda
2018/800 (PDF ) Security of the Blockchain against Long Delay Attack Puwen Wei, Quan Yuan, Yuliang Zheng
2018/799 (PDF ) Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm Fukang Liu, Zhenfu Cao, Gaoli Wang
2018/798 (PDF ) Recovering Secrets From Prefix-Dependent Leakage Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi
2018/797 (PDF ) Quantum algorithms for computing general discrete logarithms and orders with tradeoffs Martin Ekerå
2018/796 (PDF ) On relations between CCZ- and EA-equivalences Lilya Budaghyan, Marco Calderini, Irene Villa
2018/795 (PDF ) Solving ECDLP via List Decoding Fangguo Zhang, Shengli Liu
2018/794 (PDF ) Blending FHE-NTRU keys – The Excalibur Property Louis Goubin, Francisco Vial-Prado
2018/793 (PDF ) Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki
2018/792 (PDF ) Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices Joppe W. Bos, Simon J. Friedberger
2018/791 (PDF ) Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$ Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker
2018/790 (PDF ) Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation David Derler, Sebastian Ramacher, Daniel Slamanig
2018/789 (PDF ) Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free Vladimir Kolesnikov
2018/788 (PDF ) Privacy-preserving certificate linkage/revocation in VANETs without Linkage Authorities Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
2018/787 (PDF ) Labeled PSI from Fully Homomorphic Encryption with Malicious Security Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal
2018/786 (PDF ) Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices Zhongxiang Zheng, Guangwu Xu, Chunhuan Zhao
2018/785 (PDF ) Efficiently Processing Complex-Valued Data in Homomorphic Encryption Carl Bootland, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2018/784 (PDF ) Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model ByeongHak Lee, Jooyoung Lee
2018/783 (PDF ) Short Variable Length Domain Extenders With Beyond Birthday Bound Security Yu Long Chen, Bart Mennink, Mridul Nandi
2018/782 (PDF ) A faster way to the CSIDH Michael Meyer, Steffen Reith
2018/781 (PDF ) Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation Yu Chen, Yuyu Wang, Hong-sheng Zhou
2018/780 (PDF ) A Game Theoretic Analysis of Resource Mining in Blockchain Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng
2018/779 (PDF ) Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
2018/778 (PDF ) PPP-Completeness with Connections to Cryptography Katerina Sotiraki, Manolis Zampetakis, Giorgos Zirdelis
2018/777 (PDF ) Delegation of Decryption Rights with Revocability from Learning with Errors Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang
2018/776 (PDF ) On Publicly Verifiable Delegation From Standard Assumptions Yael Kalai, Omer Paneth, Lisa Yang
2018/775 (PDF ) The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun
2018/774 (PDF ) Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies Brandon Goodell, Sarang Noether
2018/773 (PDF ) Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu
2018/772 (PDF ) Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
2018/771 (PDF ) A Simple Construction of iO for Turing Machines Sanjam Garg, Akshayaram Srinivasan
2018/770 (PDF ) Combiners for Backdoored Random Oracles Balthazar Bauer, Pooya Farshim, Sogol Mazaheri
2018/769 (PDF ) Constructing APN functions through isotopic shifts Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa
2018/768 (PDF ) DRANKULA: a McEliece-like rank metric based cryptosystem implementation Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Victor Mateu
2018/767 (PDF ) Xoodoo cookbook Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
2018/766 (PDF ) Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols Nadim Kobeissi, Georgio Nicolas, Karthikeyan Bhargavan
2018/765 (PDF ) Symbolic Proofs for Lattice-Based Cryptography Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi
2018/764 (PDF ) Generating Graphs Packed with Paths Mathias Hall-Andersen, Philip S. Vejre
2018/763 (PDF ) Block Cipher Invariants as Eigenvectors of Correlation Matrices (Full Version) Tim Beyne
2018/762 (PDF ) Generalizing the SPDZ Compiler For Other Protocols Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, Hikaru Tsuchida
2018/761 (PDF ) New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami
2018/760 (PDF ) Strongly Secure Authenticated Key Exchange from Supersingular Isogenies Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Bei Liang, Song Tian
2018/759 (PDF ) Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm Prabhanjan Ananth, Alex Lombardi
2018/758 (PDF ) CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2018/757 (PDF ) Cryptography for Human Senses Kimmo Halunen, Outi-Marja Latvala
2018/756 (PDF ) Obfuscation Using Tensor Products Craig Gentry, Charanjit S. Jutla, Daniel Kane
2018/755 (PDF ) Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
2018/754 (PDF ) SoK: A Consensus Taxonomy in the Blockchain Era Juan Garay, Aggelos Kiayias
2018/753 (PDF ) Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy Yan Michalevsky, Marc Joye
2018/752 (PDF ) Isogeny Secrets can be Traded David Urbanik
2018/751 (PDF ) An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell
2018/750 (PDF ) Non-Malleable Secret Sharing for General Access Structures Vipul Goyal, Ashutosh Kumar
2018/749 (PDF ) Prime and Prejudice: Primality Testing Under Adversarial Conditions Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky
2018/748 (PDF ) Definitions for Plaintext-Existence Hiding in Cloud Storage Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani
2018/747 (PDF ) Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure Eyal Ronen, Kenneth G. Paterson, Adi Shamir
2018/746 (PDF ) Secret Sharing with Binary Shares Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang
2018/745 (PDF ) Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure Jingdian Ming, Wei Cheng, Huizhong Li, Guang Yang, Yongbin Zhou, Qian Zhang
2018/744 (PDF ) BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin
2018/743 (PDF ) On the Leakage of Corrupted Garbled Circuits Aurélien Dupin, David Pointcheval, Christophe Bidan
2018/742 (PDF ) Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities Hiroaki Anada, Seiko Arita
2018/741 (PDF ) LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE Alexander May, Gottfried Herold
2018/740 (PDF ) FairSwap: How to fairly exchange digital goods Stefan Dziembowski, Lisa Eckey, Sebastian Faust
2018/739 (PDF ) Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism Mahdi Sajadieh, Mohammad Vaziri
2018/738 (PDF ) Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature Sanjit Chatterjee, R. Kabaleeshwaran
2018/737 (PDF ) Steady: A Simple End-to-End Secure Logging System Tobias Pulls, Rasmus Dahlberg
2018/736 (PDF ) Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs Marina Blanton, Myoungin Jeong
2018/734 (PDF ) Random Number Generators Can Be Fooled to Behave Badly George Teseleanu
2018/733 (PDF ) Threshold Partially-Oblivious PRFs with Applications to Key Management Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
2018/732 (PDF ) Data Oblivious Genome Variants Search on Intel SGX Avradip Mandal, John C. Mitchell, Hart Montgomery, Arnab Roy
2018/731 (PDF ) An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing Itai Dinur, Nathan Keller, Ohad Klein
2018/730 (PDF ) Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange Atsushi Fujioka, Katsuyuki Takashima, Shintaro Terada, Kazuki Yoneyama
2018/728 (PDF ) A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto
2018/727 (PDF ) DiSE: Distributed Symmetric-key Encryption Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal
2018/726 (PDF ) Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang
2018/725 (PDF ) Round5: KEM and PKE based on GLWR Sauvik Bhattacharya, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
2018/724 (PDF ) Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow Nele Mentens, Edoardo Charbon, Francesco Regazzoni
2018/723 (PDF ) Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang
2018/722 (PDF ) uMine: a Blockchain based on Human Miners Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter
2018/721 (PDF ) Transparency Logs via Append-only Authenticated Dictionaries Alin Tomescu, Vivek Bhupatiraju, Dimitrios Papadopoulos, Charalampos Papamanthou, Nikos Triandopoulos, Srinivas Devadas
2018/720 (PDF ) {Adiantum}: length-preserving encryption for entry-level processors Paul Crowley, Eric Biggers
2018/719 (PDF ) Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2018/718 (PDF ) Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic Koji Nuida
2018/717 (PDF ) Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert
2018/716 (PDF ) Lattice-Based Zero-Knowledge Arguments for Integer Relations Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
2018/715 (PDF ) Practical Attacks on Relational Databases Protected via Searchable Encryption Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin
2018/714 (PDF ) PKP-Based Signature Scheme Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret
2018/713 (PDF ) On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting Anne Canteaut, Léo Perrin
2018/712 (PDF ) A Survey of Two Verifiable Delay Functions Dan Boneh, Benedikt Bünz, Ben Fisch
2018/711 (PDF ) Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures Kallepu Raju, Appala Naidu Tentuand, V. Ch. Venkaiah
2018/710 (PDF ) Fast Secure Computation for Small Population over the Internet Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi
2018/709 (PDF ) Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies Vanessa Vitse
2018/708 (PDF ) Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
2018/707 (PDF ) Function Secret Sharing: Improvements and Extensions Elette Boyle, Niv Gilboa, Yuval Ishai
2018/706 (PDF ) Efficient 3-Party Distributed ORAM Paul Bunn, Jonathan Katz, Eyal Kushilevitz, Rafail Ostrovsky
2018/705 (PDF ) Subvector Commitments with Application to Succinct Arguments Russell W. F. Lai, Giulio Malavolta
2018/704 (PDF ) Verifiable Sealed-Bid Auction on the Ethereum Blockchain Hisham S. Galal, Amr M. Youssef
2018/703 (PDF ) New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition Niek J. Bouman, Niels de Vreede
2018/702 (PDF ) Tight Proofs of Space and Replication Ben Fisch
2018/700 (PDF ) SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu
2018/699 (PDF ) Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64 Raghvendra Rohit, Guang Gong
2018/698 (PDF ) Parameter-Hiding Order Revealing Encryption David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang
2018/697 (PDF ) AUDIT: Practical Accountability of Secret Processes Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner
2018/696 (PDF ) Unbounded Inner Product Functional Encryption from Bilinear Maps Junichi Tomida, Katsuyuki Takashima
2018/695 (PDF ) SPHINX: A Password Store that Perfectly Hides Passwords from Itself Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena
2018/694 (PDF ) Faster Privacy-Preserving Location Proximity Schemes Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
2018/693 (PDF ) Efficient Side-Channel Protections of ARX Ciphers Bernhard Jungk, Richard Petri, Marc Stöttinger
2018/692 (PDF ) New Configurations of Grain Ciphers: Security Against Slide Attacks Diana Maimut, George Teseleanu
2018/691 (PDF ) DIZK: A Distributed Zero Knowledge Proof System Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica
2018/690 (PDF ) Efficient KEA-Style Lattice-Based Authenticated Key Exchange Zilong Wang, Honggang Hu
2018/689 (PDF ) Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis Ralph Ankele, Stefan Kölbl
2018/688 (PDF ) Finding Integral Distinguishers with Ease Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, Tyge Tiessen
2018/687 (PDF ) Assessing the Feasibility of Single Trace Power Analysis of Frodo Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
2018/686 (PDF ) Standard Lattice-Based Key Encapsulation on Embedded Devices James Howe, Tobias Oder, Markus Krausz, Tim Güneysu
2018/685 (PDF ) On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson
2018/684 (PDF ) PIEs: Public Incompressible Encodings for Decentralized Storage Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels
2018/683 (PDF ) Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability Oksana Kulyk, Melanie Volkamer
2018/682 (PDF ) Saber on ARM CCA-secure module lattice-based key encapsulation on ARM Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede
2018/681 (PDF ) A Reusable Fuzzy Extractor with Practical Storage Size Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
2018/680 (PDF ) Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256 Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2018/679 (PDF ) DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang, Weiqi Luo
2018/678 (PDF ) PoReps: Proofs of Space on Useful Data Ben Fisch
2018/677 (PDF ) Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems François Gérard
2018/676 (PDF ) Static Power Side-Channel Analysis - An Investigation of Measurement Factors Thorben Moos, Amir Moradi, Bastian Richter
2018/675 (PDF ) A signature scheme from the finite field isomorphism problem Jeffrey Hoffstein, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2018/674 (PDF ) Practical Fault Injection Attacks on SPHINCS Aymeric Genêt, Matthias J. Kannwischer, Hervé Pelletier, Andrew McLauchlan
2018/673 (PDF ) Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
2018/672 (PDF ) Cold Boot Attacks on Ring and Module LWE Keys Under the NTT Martin R. Albrecht, Amit Deo, Kenneth G. Paterson
2018/671 (PDF ) A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES Joey Green, Elisabeth Oswald, Arnab Roy
2018/670 (PDF ) Public Key Compression for Constrained Linear Signature Schemes Ward Beullens, Bart Preneel, Alan Szepieniec
2018/669 (PDF ) Faster cofactorization with ECM using mixed representations Cyril Bouvier, Laurent Imbert
2018/668 (PDF ) Breaking Message Integrity of an End-to-End Encryption Scheme of LINE Takanori Isobe, Kazuhiko Minematsu
2018/667 (PDF ) On Hardware Implementation of Tang-Maitra Boolean Functions Mustafa Khairallah, Anupam Chattopadhyay, Bimal Mandal, Subhamoy Maitra
2018/666 (PDF ) Reproducible Families of Codes and Cryptographic Applications Paolo Santini, Edoardo Persichetti, Marco Baldi
2018/665 (PDF ) Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry
2018/664 (PDF ) Public Accountability vs. Secret Laws: Can They Coexist? Shafi Goldwasser, Sunoo Park
2018/663 (PDF ) Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda
2018/662 (PDF ) Efficient Logistic Regression on Large Encrypted Data Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park
2018/661 (PDF ) Exploring Deployment Strategies for the Tor Network Christoph Döpmann, Sebastian Rust, Florian Tschorsch
2018/660 (PDF ) A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity Xun Yi, Kwok-Yan Lam, Dieter Gollmann
2018/659 (PDF ) On the Menezes-Teske-Weng’s conjecture Sihem Mesnager, Kwang Ho Kim, Junyop Choe, Chunming Tang
2018/658 (PDF ) Blockchained Post-Quantum Signatures Konstantinos Chalkias, James Brown, Mike Hearn, Tommy Lillehagen, Igor Nitto, Thomas Schroeter
2018/657 (PDF ) Platform-independent Secure Blockchain-Based Voting System Bin Yu, Joseph Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au
2018/656 (PDF ) FPGA Cluster based high performance Cryptanalysis framework Abhishek Bajpai, S V Kulgod
2018/655 (PDF ) Loamit: A Blockchain-based Residual Loanable-limit Query System Lijing Zhou, Licheng Wang, Yiru Sun, Pin Lv
2018/654 (PDF ) Proofs of Replicated Storage Without Timing Assumptions Ivan Damgård, Chaya Ganesh, Claudio Orlandi
2018/653 (PDF ) Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes Pierre-Alain Fouque, Benjamin Hadjibeyli, Paul Kirchner
2018/652 (PDF ) Efficient Collision Attack Frameworks for RIPEMD-160 Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
2018/651 (PDF ) Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Brumley
2018/650 (PDF ) Designing Efficient Dyadic Operations for Cryptographic Applications Gustavo Banegas, Paulo S. L. M. Barreto, Edoardo Persichetti, Paolo Santini
2018/649 (PDF ) No-signaling Linear PCPs Susumu Kiyoshima
2018/648 (PDF ) Semi-Commutative Masking: A Framework for Isogeny-based Protocols, with an Application to Fully Secure Two-Round Isogeny-based OT Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart
2018/647 (PDF ) A new perspective on the powers of two descent for discrete logarithms in finite fields Thorsten Kleinjung, Benjamin Wesolowski
2018/646 (PDF ) Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation Huijia Lin, Christian Matt
2018/645 (PDF ) Mitigating the One-Use Restriction in Attribute-Based Encryption Lucas Kowalczyk, Jiahui Liu, Kailash Meiyappan, Tal Malkin
2018/644 (PDF ) Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT Osmanbey Uzunkol, Jothi Rangasamy, Lakshmi Kuppusamy
2018/643 (PDF ) XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, William J. Knottenbelt
2018/642 (PDF ) Commit-Chains: Secure, Scalable Off-Chain Payments Rami Khalil, Alexei Zamyatin, Guillaume Felley, Pedro Moreno-Sanchez, Arthur Gervais
2018/641 (PDF ) Membership Privacy for Fully Dynamic Group Signatures Michael Backes, Lucjan Hanzlik, Jonas Schneider
2018/640 (PDF ) Lower Bounds on Structure-Preserving Signatures for Bilateral Messages Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi
2018/639 (PDF ) Function-Dependent Commitments for Verifiable Multi-Party Computation Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann
2018/638 (PDF ) BurnBox: Self-Revocable Encryption in a World of Compelled Access Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, Ian Miers
2018/637 (PDF ) Efficient Fully Homomorphic Encryption Scheme Shuhong Gao
2018/636 (PDF ) Lattice-Based Dual Receiver Encryption and More Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
2018/635 (PDF ) On linear hulls in one round of DES Tomer Ashur, Raluca Posteuca
2018/634 (PDF ) Partially Specified Channels: The TLS 1.3 Record Layer without Elision Christopher Patton, Thomas Shrimpton
2018/633 (PDF ) New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation Shweta Agrawal
2018/632 (PDF ) CHARIOT: Cloud-Assisted Access Control for the Internet of Things Clementine Gritti, Melek Onen, Refik Molva
2018/631 (PDF ) Efficient Construction of the Boomerang Connection Table Orr Dunkelman
2018/630 (PDF ) Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger, Barak Shani
2018/629 (PDF ) Context Hiding Multi-Key Linearly Homomorphic Authenticators Lucas Schabhüser, Denis Butin, Johannes Buchmann
2018/627 (PDF ) Simple Verifiable Delay Functions Krzysztof Pietrzak
2018/626 (PDF ) Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes Sergiu Carpov, Oana Stan
2018/625 (PDF ) Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions Mihir Bellare, Joseph Jaeger, Julia Len
2018/624 (PDF ) Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker Gergei Bana, Rohit Chadha, Ajay Kumar Eeralla
2018/623 (PDF ) Efficient verifiable delay functions Benjamin Wesolowski
2018/622 (PDF ) New techniques for Multi-value input Homomorphic Evaluation and Applications Sergiu Carpov, Malika Izabachène, Victor Mollimard
2018/621 (PDF ) Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis Ben Lapid, Avishai Wool
2018/620 (PDF ) STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis Debayan Das, Mayukh Nath, Baibhab Chatterjee, Santosh Ghosh, Shreyas Sen
2018/619 (PDF ) Is there an Oblivious RAM Lower Bound for Online Reads? Mor Weiss, Daniel Wichs
2018/618 (PDF ) On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks Reynier Antonio de la Cruz Jiménez
2018/617 (PDF ) Two Notions of Differential Equivalence on Sboxes Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
2018/616 (PDF ) Matrioska: A Compiler for Multi-Key Homomorphic Signatures Dario Fiore, Elena Pagnin
2018/615 (PDF ) Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness Prabhanjan Ananth, Aayush Jain, Amit Sahai
2018/614 (PDF ) A Note on Key Rank Daniel P. Martin, Marco Martinoli
2018/613 (PDF ) One-Message Zero Knowledge and Non-Malleable Commitments Nir Bitansky, Huijia Lin
2018/612 (PDF ) Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol Tim Ruffing, Sri Aravinda Thyagarajan, Viktoria Ronge, Dominique Schröder
2018/611 (PDF ) Is Java Card ready for hash-based signatures? Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren
2018/610 (PDF ) Hierarchical Attribute-based Signatures Constantin-Catalin Dragan, Daniel Gardham, Mark Manulis
2018/609 (PDF ) Improved Results on Factoring General RSA Moduli with Known Bits Mengce Zheng
2018/608 (PDF ) Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols Hamid Nejatollahi, Nikil Dutt, Indranil Banerjee, Rosario Cammarota
2018/607 (PDF ) SEEMless: Secure End-to-End Encrypted Messaging with less trust Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai
2018/606 (PDF ) Continuously Non-Malleable Codes with Split-State Refresh Antonio Faonio, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi
2018/605 (PDF ) N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi
2018/604 (PDF ) Attack on Kayawood Protocol: Uncloaking Private Keys Matvei Kotov, Anton Menshov, Alexander Ushakov
2018/603 (PDF ) Actively Secure OT-Extension from q-ary Linear Codes Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen
2018/602 (PDF ) On the Universally Composable Security of OpenStack Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang
2018/601 (PDF ) Verifiable Delay Functions Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch
2018/600 (PDF ) GRANULE: An Ultra lightweight cipher design for embedded security Gaurav Bansod, Abhijit Patil, Narayan Pisharoty
2018/599 (PDF ) CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case Lucas Schabhüser, Denis Butin, Johannes Buchmann
2018/598 (PDF ) Trends in design of ransomware viruses Vlad Constantin Craciun, Andrei Mogage, Emil Simion
2018/597 (PDF ) Consolidating Security Notions in Hardware Masking Lauren De Meyer, Begül Bilgin, Oscar Reparaz
2018/596 (PDF ) Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi
2018/594 (PDF ) Cryptanalysis of SFN Block Cipher Sadegh Sadeghi, Nasour Bagheri
2018/593 (PDF ) Ramanujan graphs in cryptography Anamaria Costache, Brooke Feigon, Kristin Lauter, Maike Massierer, Anna Puskas
2018/592 (PDF ) XS-circuits in Block Ciphers Sergey Agievich
2018/591 (PDF ) 4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis. Sankhanil Dey, Ranjan Ghosh
2018/590 (PDF ) The Twin Conjugacy Search Problem and Applications Xiaoming Chen, Weiqing You
2018/589 (PDF ) Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff
2018/588 (PDF ) BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage Guilherme Borges, Henrique Domingos, Bernardo Ferreira, João Leitão, Tiago Oliveira, Bernardo Portela
2018/587 (PDF ) Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model Tapas Pal, Ratna Dutta
2018/586 (PDF ) Lower Bounds on Lattice Enumeration with Extreme Pruning Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata
2018/585 (PDF ) Polynomial Functional Encryption Scheme with Linear Ciphertext Size Jung Hee Cheon, Seungwan Hong, Changmin Lee, Yongha Son
2018/584 (PDF ) Bounded Fully Homomorphic Encryption from Monoid Algebras Mugurel Barcau, Vicentiu Pasol
2018/583 (PDF ) Ring Homomorphic Encryption Schemes Mugurel Barcau, Vicentiu Pasol
2018/582 (PDF ) Pisa: Arbitration Outsourcing for State Channels Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, Sarah Meiklejohn
2018/581 (PDF ) Smart contracts for bribing miners Patrick McCorry, Alexander Hicks, Sarah Meiklejohn
2018/580 (PDF ) Secure MPC: Laziness Leads to GOD Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
2018/579 (PDF ) PIR-PSI: Scaling Private Contact Discovery Daniel Demmler, Peter Rindal, Mike Rosulek, Ni Trieu
2018/578 (PDF ) Optimizing Authenticated Garbling for Faster Secure Two-Party Computation Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang
2018/577 (PDF ) Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas
2018/576 (PDF ) Simpler Constructions of Asymmetric Primitives from Obfuscation Pooya Farshim, Georg Fuchsbauer, Alain Passelègue
2018/575 (PDF ) An Algorithmic Framework for the Generalized Birthday Problem Itai Dinur
2018/574 (PDF ) Correctness and Fairness of Tendermint-core Blockchains Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/573 (PDF ) Improved Lightweight Implementations of CAESAR Authenticated Ciphers Farnoud Farahmand, William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2018/572 (PDF ) Round-Optimal Secure Multiparty Computation with Honest Majority Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
2018/571 (PDF ) Limits of Practical Sublinear Secure Computation Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
2018/570 (PDF ) Fast Large-Scale Honest-Majority MPC for Malicious Adversaries Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof
2018/569 (PDF ) Dissection-BKW Andre Esser, Felix Heuer, Robert Kübler, Alexander May, Christian Sohler
2018/568 (PDF ) Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen
2018/567 (PDF ) On the Security Properties of e-Voting Bulletin Boards Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias
2018/566 (PDF ) Private Circuits: A Modular Approach Prabhanjan Ananth, Yuval Ishai, Amit Sahai
2018/564 (PDF ) Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/563 (PDF ) Multi-client Predicate-only Encryption for Conjunctive Equality Tests Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker
2018/562 (PDF ) maskVerif: automated analysis of software and hardware higher-order masked implementations Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert
2018/561 (PDF ) Blockchain Abstract Data Type Emmanuelle Anceaume, Antonella Del Pozzo, Romaric Ludinard, Maria Potop-Butucaru, Sara Tucci-Piergiovanni
2018/560 (PDF ) Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits Carsten Baum, Jonathan Bootle, Andrea Cerulli, Rafael del Pino, Jens Groth, Vadim Lyubashevsky
2018/559 (PDF ) Proofs of Work from Worst-Case Assumptions Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2018/558 (PDF ) Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE Phillip Rogaway, Yusi Zhang
2018/557 (PDF ) Non-Interactive Zero-Knowledge Proofs for Composite Statements Shashank Agrawal, Chaya Ganesh, Payman Mohassel
2018/556 (PDF ) The Curse of Small Domains: New Attacks on Format-Preserving Encryption Viet Tung Hoang, Stefano Tessaro, Ni Trieu
2018/555 (PDF ) Limits on the Power of Garbling Techniques for Public-Key Encryption Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ameer Mohammed
2018/554 (PDF ) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas, Ricardo Custodio, Daniel Panario
2018/553 (PDF ) Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging Joseph Jaeger, Igors Stepanovs
2018/552 (PDF ) On the Complexity of Compressing Obfuscation Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
2018/551 (PDF ) Structured Encryption and Leakage Suppression Seny Kamara, Tarik Moataz, Olga Ohrimenko
2018/550 (PDF ) PRank: Fast Analytical Rank Estimation via Pareto Distributions Liron David, Avishai Wool
2018/549 (PDF ) Adaptive Garbled RAM from Laconic Oblivious Transfer Sanjam Garg, Rafail Ostrovsky, Akshayaram Srinivasan
2018/548 (PDF ) From Laconic Zero-Knowledge to Public-Key Cryptography Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
2018/547 (PDF ) Indifferentiable Authenticated Encryption Manuel Barbosa, Pooya Farshim
2018/546 (PDF ) Quantum Lattice Enumeration and Tweaking Discrete Pruning Yoshinori Aono, Phong Q. Nguyen, Yixin Shen
2018/545 (PDF ) Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu
2018/544 (PDF ) Pseudorandom Quantum States Zhengfeng Ji, Yi-Kai Liu, Fang Song
2018/543 (PDF ) Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange Kristian Gjøsteen, Tibor Jager
2018/542 (PDF ) Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti
2018/541 (PDF ) Generic Attacks against Beyond-Birthday-Bound MACs Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras
2018/540 (PDF ) Must the Communication Graph of MPC Protocols be an Expander? Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubacek
2018/539 (PDF ) Extracting Linearization Equations from Noisy Sources Daniel Smith-Tone
2018/538 (PDF ) Non-Malleable Codes for Partial Functions with Manipulation Detection Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2018/537 (PDF ) Quantum Security Analysis of CSIDH Xavier Bonnetain, André Schrottenloher
2018/536 (PDF ) On the Hardness of the Computational Ring-LWR Problem and its Applications Long Chen, Zhenfeng Zhang, Zhenfei Zhang
2018/535 (PDF ) Monero - Privacy in the Blockchain Kurt M. Alonso, Jordi Herrera Joancomartí
2018/534 (PDF ) Cryptographic Constructions Supporting Implicit Data Integrity Michael Kounavis, David Durham, Sergej Deutsch
2018/533 (PDF ) Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model Alice Pellet-Mary
2018/532 (PDF ) Ring packing and amortized FHEW bootstrapping Daniele Micciancio, Jessica Sorrell
2018/531 (PDF ) Polynomial direct sum masking to protect against both SCA and FIA Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
2018/530 (PDF ) Two-Message Statistically Sender-Private OT from LWE Zvika Brakerski, Nico Döttling
2018/529 (PDF ) Trapdoor Functions from the Computational Diffie-Hellman Assumption Sanjam Garg, Mohammad Hajiabadi
2018/528 (PDF ) Recovering short secret keys of RLCE in polynomial time Alain Couvreur, Matthieu Lequesne, Jean-Pierre Tillich
2018/527 (PDF ) Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2018/526 (PDF ) Towards KEM Unification Daniel J. Bernstein, Edoardo Persichetti
2018/525 (PDF ) Location-Proof System based on Secure Multi-Party Computations Aurélien Dupin, Jean-Marc Robert, Christophe Bidan
2018/524 (PDF ) New Smooth Projective Hashing For Oblivious Transfer Bing Zeng
2018/523 (PDF ) Reducing Complexity of Pairing Comparisons using Polynomial Evaluation Adam Bobowski, Marcin Słowik
2018/522 (PDF ) Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1 Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang
2018/521 (PDF ) Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound Gil Segev, Ido Shahaf
2018/520 (PDF ) Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries Mridul Nandi
2018/519 (PDF ) Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules Brandon Broadnax, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel
2018/518 (PDF ) Secure and Reliable Key Agreement with Physical Unclonable Functions Onur Gunlu, Tasnad Kernetzky, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, Rafael F. Schaefer
2018/517 (PDF ) Upper and Lower Bounds for Continuous Non-Malleable Codes Dana Dachman-Soled, Mukul Kulkarni
2018/516 (PDF ) Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound Atsushi Takayasu, Noboru Kunihiro
2018/515 (PDF ) Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
2018/514 (PDF ) Weak Compression and (In)security of Rational Proofs of Storage Ben Fisch, Shashwat Silas
2018/513 (PDF ) Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart
2018/512 (PDF ) Provably Secure Integration Cryptosystem on Non-Commutative Group Weiqing You, Xiaoming Chen
2018/511 (PDF ) Return of GGH15: Provable Security Against Zeroizing Attacks James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry
2018/510 (PDF ) Key-Secrecy of PACE with OTS/CafeOBJ Dominik Klein
2018/508 (PDF ) Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors Mriganka Mandal, Ratna Dutta
2018/507 (PDF ) Tight Tradeoffs in Searchable Symmetric Encryption Gilad Asharov, Gil Segev, Ido Shahaf
2018/506 (PDF ) Secure Two-Party Computation over Unreliable Channels Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas
2018/505 (PDF ) Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub
2018/504 (PDF ) Quantum Attacks on Some Feistel Block Ciphers Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang
2018/503 (PDF ) Finger Printing Data Gideon Samid
2018/502 (PDF ) Computer-aided proofs for multiparty computation with active security Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
2018/500 (PDF ) Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda
2018/499 (PDF ) Secure Two-party Threshold ECDSA from ECDSA Assumptions Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2018/498 (PDF ) Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain
2018/497 (PDF ) Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
2018/496 (PDF ) Efficient Delegated Private Set Intersection on Outsourced Private Datasets Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong
2018/495 (PDF ) Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity Changyu Dong, Grigorios Loukides
2018/494 (PDF ) Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
2018/493 (PDF ) Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal Lior Rotem, Gil Segev
2018/492 (PDF ) New Instantiations of the CRYPTO 2017 Masking Schemes Pierre Karpman, Daniel S. Roche
2018/491 (PDF ) Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol Matvei Kotov, Anton Menshov, Alexey Myasnikov, Dmitry Panteleev, Alexander Ushakov
2018/490 (PDF ) Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert
2018/489 (PDF ) Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
2018/488 (PDF ) Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound Benoît Cogliati, Jooyoung Lee
2018/487 (PDF ) Unbounded Inner-Product Functional Encryption, with Succinct Keys Edouard Dufour-Sans, David Pointcheval
2018/486 (PDF ) Pushing the Communication Barrier in Secure Computation using Lookup Tables Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner
2018/485 (PDF ) Towards practical key exchange from ordinary isogeny graphs Luca De Feo, Jean Kieffer, Benjamin Smith
2018/484 (PDF ) Authenticated Encryption with Nonce Misuse and Physical Leakages: Definitions, Separation Results, and Leveled Constructions Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2018/483 (PDF ) Compact Multi-Signatures for Smaller Blockchains Dan Boneh, Manu Drijvers, Gregory Neven
2018/482 (PDF ) SPDZ2k: Efficient MPC mod 2^k for Dishonest Majority Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing
2018/481 (PDF ) On the Exact Round Complexity of Secure Three-Party Computation Arpita Patra, Divya Ravi
2018/480 (PDF ) On Distributional Collision Resistant Hashing Ilan Komargodski, Eylon Yogev
2018/479 (PDF ) On the security of Jhanwar-Barua Identity-Based Encryption Scheme Adrian G. Schipor
2018/478 (PDF ) On Non-Monotonicity of the Success Probability in Linear Cryptanalysis Ali Aydin Selcuk
2018/477 (PDF ) CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek
2018/476 (PDF ) The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni
2018/475 (PDF ) Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures Jonathan Katz, Vladimir Kolesnikov, Xiao Wang
2018/474 (PDF ) Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification Peter Sebastian Nordholt, Meilof Veeningen
2018/473 (PDF ) A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement Daniele Friolo, Daniel Masny, Daniele Venturi
2018/472 (PDF ) Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei
2018/471 (PDF ) Efficient Range ORAM with $\mathbb{O}(\log^{2}{N})$ Locality Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion
2018/470 (PDF ) The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
2018/469 (PDF ) An Abstract Model of UTxO-based Cryptocurrencies with Scripts Joachim Zahnentferner
2018/468 (PDF ) On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs Yaobin Shen, Lei Wang
2018/467 (PDF ) Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation Nigel P. Smart, Tim Wood
2018/466 (PDF ) A secure end-to-end verifiable e-voting system using zero knowledge based blockchain Somnath Panja, Bimal Kumar Roy
2018/465 (PDF ) A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model Geoffroy Couteau
2018/464 (PDF ) Cryptanalysis of MORUS Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier
2018/463 (PDF ) Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
2018/462 (PDF ) Logistic regression over encrypted data from fully homomorphic encryption Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin Lauter
2018/461 (PDF ) Continuous-Source Fuzzy Extractors: Source uncertainty and security Benjamin Fuller, Lowen Peng
2018/460 (PDF ) RapidChain: Scaling Blockchain via Full Sharding Mahdi Zamani, Mahnush Movahedi, Mariana Raykova
2018/459 (PDF ) Revisiting SIOT protocol with new security assumptions Paulo Barreto, Glaucio Oliveira, Waldyr Benits
2018/458 (PDF ) Characterizing Collision and Second-Preimage Resistance in Linicrypt Ian McQuoid, Trevor Swope, Mike Rosulek
2018/457 (PDF ) From FE Combiners to Secure MPC and Back Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
2018/456 (PDF ) An efficient structural attack on NIST submission DAGS Elise Barelli, Alain Couvreur
2018/455 (PDF ) On Renyi Entropies and their Applications to Guessing Attacks in Cryptography Serdar Boztas
2018/454 (PDF ) R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
2018/453 (PDF ) Floppy-Sized Group Signatures from Lattices Cecilia Boschini, Jan Camenisch, Gregory Neven
2018/452 (PDF ) Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2 Panjin Kim, Daewan Han, Kyung Chul Jeong
2018/451 (PDF ) Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model Shuichi Katsumata, Shota Yamada, Takashi Yamakawa
2018/450 (PDF ) From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation David W. Archer, Dan Bogdanov, Liina Kamm, Y. Lindell, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright
2018/449 (PDF ) Key Prediction Security of Keyed Sponges Bart Mennink
2018/448 (PDF ) Non-adaptive Group-Testing Aggregate MAC Scheme Shoichi Hirose, Junji Shikata
2018/447 (PDF ) Improved Distinguisher Search Techniques Based on Parity Sets Xiaofeng Xie, Tian Tian
2018/446 (PDF ) A voting scheme with post-quantum security based on physical laws Hua Dong, Li Yang
2018/445 (PDF ) CRPSF and NTRU Signatures over cyclotomic fields Yang Wang, Mingqiang Wang
2018/444 (PDF ) Founding Cryptography on Smooth Projective Hashing Bing Zeng
2018/443 (PDF ) Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits Rishab Goyal
2018/442 (PDF ) SecureNN: Efficient and Private Neural Network Training Sameer Wagh, Divya Gupta, Nishanth Chandran
2018/441 (PDF ) Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols Amos Beimel, Naty Peter
2018/440 (PDF ) Formal Analysis of Distance Bounding with Secure Hardware Handan Kılınç, Serge Vaudenay
2018/439 (PDF ) Tight Private Circuits: Achieving Probing Security with the Least Refreshing Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain
2018/438 (PDF ) Trivially and Efficiently Composing Masked Gadgets with Probe Isolating Non-Interference Gaëtan Cassiers, François-Xavier Standaert
2018/437 (PDF ) Zero-Knowledge Protocols for Search Problems Ben Berger, Zvika Brakerski
2018/436 (PDF ) Crash-tolerant Consensus in Directed Graph Revisited Ashish Choudhury, Gayathri Garimella, Arpita Patra, Divya Ravi, Pratik Sarkar
2018/435 (PDF ) A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence Bingsheng Zhang, Roman Oliynykov, Hamed Balogun
2018/434 (PDF ) Towards Tight Security of Cascaded LRW2 Bart Mennink
2018/433 (PDF ) Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data Guowen Xu, Hongwei Li
2018/432 (PDF ) Hidden Shift Quantum Cryptanalysis and Implications Xavier Bonnetain, María Naya-Plasencia
2018/430 (PDF ) A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms Faruk Göloğlu, Antoine Joux
2018/429 (PDF ) Amortized Complexity of Information-Theoretically Secure MPC Revisited Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan
2018/428 (PDF ) Differential Fault Analysis of Rectangle-80 Shobhit Sinha, Sandip Karmakar
2018/427 (PDF ) Secure Boot and Remote Attestation in the Sanctum Processor Ilia Lebedev, Kyle Hogan, Srinivas Devadas
2018/426 (PDF ) Adaptively Secure Proxy Re-encryption Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
2018/425 (PDF ) Implementing RLWE-based Schemes Using an RSA Co-Processor Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner
2018/424 (PDF ) Circumventing Cryptographic Deniability with Remote Attestation Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan
2018/423 (PDF ) Yes, There is an Oblivious RAM Lower Bound! Kasper Green Larsen, Jesper Buus Nielsen
2018/422 (PDF ) Message-locked Encryption with File Update Suyash Kandele, Souradyuti Paul
2018/421 (PDF ) TFHE: Fast Fully Homomorphic Encryption over the Torus Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2018/420 (PDF ) Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu
2018/419 (PDF ) Homomorphic Secret Sharing: Optimizations and Applications Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù
2018/418 (PDF ) DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, Joel Emer
2018/417 (PDF ) On the Security of Two-Round Multi-Signatures Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs
2018/416 (PDF ) Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers Nadim Kobeissi, Natalia Kulatova
2018/415 (PDF ) Flux: Revisiting Near Blocks for Proof-of-Work Blockchains Alexei Zamyatin, Nicholas Stifter, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
2018/414 (PDF ) Aggregation of Gamma-Signatures and Applications to Bitcoin Yunlei Zhao
2018/413 (PDF ) Scaling Backend Authentication at Facebook Kevin Lewi, Callen Rain, Stephen Weis, Yueting Lee, Haozhi Xiong, Benjamin Yang
2018/412 (PDF ) PRCash: Fast, Private and Regulated Transactions for Digital Currencies Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun
2018/411 (PDF ) Unsupervised Machine Learning on Encrypted Data Angela Jäschke, Frederik Armknecht
2018/410 (PDF ) Violating Clauser-Horne-Shimony-Holt Inequality Represents Nothing Zhengjun Cao, Zhenfu Cao, Lihua Liu
2018/409 (PDF ) Laconic Function Evaluation and Applications Willy Quach, Hoeteck Wee, Daniel Wichs
2018/408 (PDF ) Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
2018/407 (PDF ) Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu
2018/406 (PDF ) “Larger Keys, Less Complexity” A Strategic Proposition Gideon Samid
2018/405 (PDF ) A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes. Sankhanil Dey, Ranjan Ghosh
2018/404 (PDF ) Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela
2018/403 (PDF ) ABY3: A Mixed Protocol Framework for Machine Learning Payman Mohassel, Peter Rindal
2018/402 (PDF ) Another Look at Relay and Distance-based Attacks in Contactless Payments Ioana Boureanu, Anda Anda
2018/401 (PDF ) Lattice-based Direct Anonymous Attestation (LDAA) Nada EL Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
2018/400 (PDF ) Agreement with Satoshi – On the Formalization of Nakamoto Consensus Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Alexei Zamyatin, Edgar Weippl
2018/399 (PDF ) On the Feasibility of an ECDLP Algorithm Sergey Grebnev
2018/398 (PDF ) Fun with Bitcoin smart contracts Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino
2018/397 (PDF ) Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
2018/396 (PDF ) New Bleichenbacher Records: Fault Attacks on qDSA Signatures Akira Takahashi, Mehdi Tibouchi, Masayuki Abe
2018/395 (PDF ) Secure Computation with Constant Communication Overhead using Multiplication Embeddings Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen
2018/394 (PDF ) Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited Laasya Bangalore, Ashish Choudhury, Arpita Patra
2018/393 (PDF ) AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM Matvei Kotov, Anton Menshov, Alexander Ushakov
2018/392 (PDF ) Making AES great again: the forthcoming vectorized AES instruction Nir Drucker, Shay Gueron, Vlad Krasnov
2018/391 (PDF ) Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys Romain Gay, Lucas Kowalczyk, Hoeteck Wee
2018/390 (PDF ) MILP-based Differential Attack on Round-reduced GIFT Baoyu Zhu, Xiaoyang Dong, Hongbo Yu
2018/389 (PDF ) Distributed SSH Key Management with Proactive RSA Threshold Signatures Yotam Harchol, Ittai Abraham, Benny Pinkas
2018/388 (PDF ) Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT Seyed Farhad Aghili, Hamid Mala
2018/387 (PDF ) Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida
2018/386 (PDF ) Certificateless Public Key Signature Schemes from Standard Algorithms Zhaohui Cheng, Liqun Chen
2018/385 (PDF ) Cryptographic Hashing From Strong One-Way Functions Justin Holmgren, Alex Lombardi
2018/383 (PDF ) CSIDH: An Efficient Post-Quantum Commutative Group Action Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
2018/382 (PDF ) Revocable Identity-based Encryption from Codes with Rank Metric Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya
2018/381 (PDF ) Masking the GLP Lattice-Based Signature Scheme at Any Order Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi
2018/380 (PDF ) Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution Jonathan Bootle, Andrea Cerulli, Jens Groth, Sune Jakobsen, Mary Maller
2018/379 (PDF ) Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0) Wilson Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng
2018/378 (PDF ) Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2018/377 (PDF ) ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement Jing Chen, Sergey Gorbunov, Silvio Micali, Georgios Vlachos
2018/376 (PDF ) Arithmetic Considerations for Isogeny Based Cryptography Joppe W. Bos, Simon Friedberger
2018/375 (PDF ) Witness Indistinguishability for any Single-Round Argument with Applications to Access Control Zvika Brakerski, Yael Tauman Kalai
2018/374 (PDF ) Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions Zhenzhen Bao, Jian Guo, Lei Wang
2018/373 (PDF ) PanORAMa: Oblivious RAM with Logarithmic Overhead Sarvar Patel, Giuseppe Persiano, Mariana Raykova, Kevin Yeo
2018/372 (PDF ) Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions) Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen
2018/371 (PDF ) Supersingular isogeny graphs and endomorphism rings: reductions and solutions Kirsten Eisentraeger, Sean Hallgren, Kristin Lauter, Travis Morrison, Christophe Petit
2018/370 (PDF ) Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters A. V. Menyachikhin
2018/369 (PDF ) Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017 Hyung Tae Lee, Huaxiong Wang, Kai Zhang
2018/367 (PDF ) Cache-Timing Attacks on RSA Key Generation Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley
2018/366 (PDF ) Directional Distance-Bounding Identification Protocols Ahmad Ahmadi, Reihaneh Safavi-Naini
2018/365 (PDF ) Anonymous Distance-Bounding Identification Ahmad Ahmadi, Reihaneh Safavi-Naini, Mamunur Akand
2018/364 (PDF ) Perfectly Secure Oblivious Parallel RAM T-H. Hubert Chan, Kartik Nayak, Elaine Shi
2018/363 (PDF ) Private Anonymous Data Access Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs
2018/362 (PDF ) Backdoored Hash Functions: Immunizing HMAC and HKDF Marc Fischlin, Christian Janson, Sogol Mazaheri
2018/361 (PDF ) Two-message Key Exchange with Strong Security from Ideal Lattices Zheng Yang, Yu Chen, Song Luo
2018/360 (PDF ) GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee
2018/358 (PDF ) Efficient Erasable PUFs from Programmable Logic and Memristors Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne Burleson, Omid Kavehei, Marten van Dijk, Damith C. Ranasinghe, Ulrich Rührmair
2018/357 (PDF ) Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Stefan Mangard, Florian Mendel, Robert Primas
2018/356 (PDF ) In Praise of Twisted Embeddings Jheyne N. Ortiz, Robson R. de Araujo, Diego F. Aranha, Sueli I. R. Costa, Ricardo Dahab
2018/355 (PDF ) Differential Fault Attacks on Deterministic Lattice Signatures Leon Groot Bruinderink, Peter Pessl
2018/354 (PDF ) Start your ENGINEs: dynamically loadable contemporary crypto Nicola Tuveri, Billy B. Brumley
2018/353 (PDF ) Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions Xin Li
2018/352 (PDF ) Cryptography with Disposable Backdoors Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas
2018/351 (PDF ) A Chosen Plaintext Attack on Offset Public Permutation Mode Miloslav Homer
2018/350 (PDF ) The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk
2018/349 (PDF ) An Analysis of the NIST SP 800-90A Standard Joanne Woodage, Dan Shumow
2018/348 (PDF ) Monero Ring Attack: Recreating Zero Mixin Transaction Effect Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu
2018/347 (PDF ) 3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval Stanislaw Jarecki, Boyang Wei
2018/346 (PDF ) Collusion Resistant Traitor Tracing from Learning with Errors Rishab Goyal, Venkata Koppula, Brent Waters
2018/345 (PDF ) In-region Authentication Mamunur Rashid Akand, Reihaneh Safavi-Naini
2018/344 (PDF ) Nothing Refreshes Like a RePSI: Reactive Private Set Intersection Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente
2018/343 (PDF ) Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments Duc Viet Le, Mahimna Kelkar, Aniket Kate
2018/342 (PDF ) MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth Ralph Ankele, Florian Böhl, Simon Friedberger
2018/341 (PDF ) Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj
2018/340 (PDF ) Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures Johannes Blömer, Jan Bobolz
2018/339 (PDF ) Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme Thomas Debris-Alazard, Jean-Pierre Tillich
2018/338 (PDF ) Quantum FHE (Almost) As Secure As Classical Zvika Brakerski
2018/337 (PDF ) Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent Marc Fischlin, Patrick Harasser
2018/336 (PDF ) SoK: The Problem Landscape of SIDH David Urbanik, David Jao
2018/335 (PDF ) Fast modular squaring with AVX512IFMA Nir Drucker, Shay Gueron
2018/334 (PDF ) Impossible Differential Attack on QARMA Family of Block Ciphers Dong Yang, Wen-feng Qi, Hua-jin Chen
2018/333 (PDF ) Breaking the Circuit-Size Barrier in Secret Sharing Tianren Liu, Vinod Vaikuntanathan
2018/332 (PDF ) Differential Cryptanalysis of Round-Reduced Sparx-64/128 Ralph Ankele, Eik List
2018/331 (PDF ) Estimate all the {LWE, NTRU} schemes! Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer
2018/330 (PDF ) Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang
2018/329 (PDF ) Symbolic Side-Channel Analysis for Probabilistic Programs Pasquale Malacaria, MHR. Khouzani, Corina S. Păsăreanu, Quoc-Sang Phan, Kasper Luckow
2018/328 (PDF ) Improved High-Order Conversion From Boolean to Arithmetic Masking Luk Bettale, Jean-Sebastien Coron, Rina Zeitoun
2018/327 (PDF ) A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System Zhengjun Cao, Lihua Liu
2018/325 (PDF ) Multi-power Post-quantum RSA John M. Schanck
2018/324 (PDF ) ACPC: Efficient revocation of pseudonym certificates using activation codes Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
2018/323 (PDF ) PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2018/322 (PDF ) DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
2018/321 (PDF ) Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2018/320 (PDF ) General State Channel Networks Stefan Dziembowski, Sebastian Faust, Kristina Hostáková
2018/319 (PDF ) HydRand: Practical Continuous Distributed Randomness Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
2018/318 (PDF ) Practical attacks against the Walnut digital signature scheme Ward Beullens, Simon R. Blackburn
2018/317 (PDF ) Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock Dor Fledel, Avishai Wool
2018/316 (PDF ) Non-Malleable Secret Sharing Vipul Goyal, Ashutosh Kumar
2018/315 (PDF ) Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, François-Xavier Standaert
2018/314 (PDF ) Secure top most significant genome variants search: iDASH 2017 competition Sergiu Carpov, Thibaud Tortech
2018/313 (PDF ) On the cost of computing isogenies between supersingular elliptic curves Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez
2018/312 (PDF ) Multilinear maps via secret ring Chunsheng Gu
2018/311 (PDF ) DeepSigns: A Generic Watermarking Framework for Protecting the Ownership of Deep Learning Models Bita Darvish Rouhani, Huili Chen, farinaz Koushanfar
2018/310 (PDF ) Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017 Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi
2018/308 (PDF ) On perfectly secure 2PC in the OT-hybrid model Bar Alon, Anat Paskin-Cherniavsky
2018/307 (PDF ) Isolated Curves and the MOV Attack Travis Scholl
2018/306 (PDF ) State Separation for Code-Based Game-Playing Proofs Chris Brzuska, Antoine Delignat-Lavaud, Cedric Fournet, Konrad Kohbrok, Markulf Kohlweiss
2018/305 (PDF ) Efficient four-dimensional GLV curve with high security Olivier Bernard, Renaud Dubois, Simon Masson
2018/304 (PDF ) Geosocial Query with User-Controlled Privacy Peizhao Hu, Sherman S. M. Chow, Asma Aloufi
2018/303 (PDF ) 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State Bernardo David, Rafael Dowsley, Mario Larangeira
2018/302 (PDF ) Rethinking Large-Scale Consensus Rafael Pass, Elaine Shi
2018/301 (PDF ) On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff
2018/300 (PDF ) Outsourcing Modular Exponentiation in Cryptographic Web Applications Pascal Mainini, Rolf Haenni
2018/299 (PDF ) Clusters of Re-used Keys Stephen Farrell
2018/298 (PDF ) In search of CurveSwap: Measuring elliptic curve implementations in the wild Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger
2018/297 (PDF ) Fine-Grained Secure Computation Matteo Campanelli, Rosario Gennaro
2018/296 (PDF ) Asynchronous ratcheted key exchange Bertram Poettering, Paul Rösler
2018/295 (PDF ) ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers (Revised Version) Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta
2018/294 (PDF ) Learning strikes again: the case of the DRS signature scheme Léo Ducas, Yang Yu
2018/293 (PDF ) Privacy Amplification from Non-malleable Codes Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2018/292 (PDF ) Linear Biases in AEGIS Keystream Brice Minaud
2018/291 (PDF ) Simulations of Optical Emissions for Attacking AES and Masked AES Guido Marco Bertoni, Lorenzo Grassi, Filippo Melzani
2018/290 (PDF ) Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min (Jerry) Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati
2018/289 (PDF ) Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue Phillipp Schoppmann, Lennart Vogelsang, Adrià Gascón, Borja Balle
2018/288 (PDF ) Constant Size Traceable Ring Signature Scheme without Random Oracles Ke Gu, Na Wu
2018/287 (PDF ) Secure Cloud Storage Scheme Based On Hybrid Cryptosystem Atanu Basu, Indranil Sengupta
2018/286 (PDF ) AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT Björn Haase, Benoît Labrique
2018/285 (PDF ) Collateral Damage of Facebook Applications: a Comprehensive Study Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel
2018/284 (PDF ) Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang
2018/283 (PDF ) Homomorphic Rank Sort Using Surrogate Polynomials Gizem S. Çetin, Berk Sunar
2018/282 (PDF ) Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol Jason LeGrow, David Jao, Reza Azarderakhsh
2018/281 (PDF ) Upgrading to Functional Encryption Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters
2018/280 (PDF ) Updatable and Universal Common Reference Strings with Applications to zk-SNARKs Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers
2018/279 (PDF ) Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs
2018/278 (PDF ) Mixed-radix Naccache-Stern encryption Rémi Géraud, David Naccache
2018/277 (PDF ) Approximate and Probabilistic Differential Privacy Definitions Sebastian Meiser
2018/276 (PDF ) How to Record Quantum Queries, and Applications to Quantum Indifferentiability Mark Zhandry
2018/275 (PDF ) Lattice-Based zk-SNARKs from Square Span Programs Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
2018/274 (PDF ) G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions Rachid El Bansarkhani, Rafael Misoczki
2018/273 (PDF ) Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More Prabhanjan Ananth, Xiong Fan, Elaine Shi
2018/272 (PDF ) Multi-Theorem Preprocessing NIZKs from Lattices Sam Kim, David J. Wu
2018/271 (PDF ) MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public Borching Su
2018/270 (PDF ) A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later Douglas R. Stinson
2018/269 (PDF ) Vault: Fast Bootstrapping for the Algorand Cryptocurrency Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich
2018/268 (PDF ) Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead Michael Raskin, Mark Simkin
2018/267 (PDF ) A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies Patrick Longa
2018/266 (PDF ) Authenticated key exchange for SIDH Steven D. Galbraith
2018/265 (PDF ) Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography Ayesha Khalid, James Howe, Ciara Rafferty, Francesco Regazzoni, Maire O’Neill
2018/264 (PDF ) Security proof for Quantum Key Recycling with noise Daan Leermakers, Boris Skoric
2018/262 (PDF ) Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies Joachim Zahnentferner
2018/261 (PDF ) Post-Quantum EPID Signatures from Symmetric Primitives Dan Boneh, Saba Eskandarian, Ben Fisch
2018/260 (PDF ) MDS Matrices with Lightweight Circuits Sébastien Duval, Gaëtan Leurent
2018/259 (PDF ) The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption Zheng Yang, Kimmo Järvinen
2018/258 (PDF ) Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
2018/257 (PDF ) On Quantum Indifferentiability Tore Vincent Carstens, Ehsan Ebrahimi, Gelo Noel Tabia, Dominique Unruh
2018/256 (PDF ) QC-MDPC: A Timing Attack and a CCA2 KEM Edward Eaton, Matthieu Lequesne, Alex Parent, Nicolas Sendrier
2018/255 (PDF ) Topology-Hiding Computation Beyond Semi-Honest Adversaries Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
2018/254 (PDF ) Logistic Regression Model Training based on the Approximate Homomorphic Encryption Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon
2018/253 (PDF ) Capsule: A Protocol for Secure Collaborative Document Editing Nadim Kobeissi
2018/252 (PDF ) The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract Yongge Wang, Qutaibah m. Malluhi
2018/251 (PDF ) VeritasDB: High Throughput Key-Value Store with Integrity Rohit Sinha, Mihai Christodorescu
2018/250 (PDF ) Making Public Key Functional Encryption Function Private, Distributively Xiong Fan, Qiang Tang
2018/249 (PDF ) Analysis of Deutsch-Jozsa Quantum Algorithm Zhengjun Cao, Lihua Liu
2018/248 (PDF ) Stake-Bleeding Attacks on Proof-of-Stake Blockchains Peter Gaži, Aggelos Kiayias, Alexander Russell
2018/247 (PDF ) Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz
2018/246 (PDF ) Universally Verifiable MPC with Applications to IRV Ballot Counting Chris Culnane, Olivier Pereira, Kim Ramchen, Vanessa Teague
2018/245 (PDF ) Secure Search via Multi-Ring Fully Homomorphic Encryption Adi Akavia, Dan Feldman, Hayim Shaul
2018/244 (PDF ) Faster Homomorphic Linear Transformations in HElib Shai Halevi, Victor Shoup
2018/243 (PDF ) A New Approach to Deanonymization of Unreachable Bitcoin Nodes Indra Deep Mastan, Souradyuti Paul
2018/242 (PDF ) A New Constant-size Accountable Ring Signature Scheme Without Random Oracles Sudhakar Kumawat, Souradyuti Paul
2018/241 (PDF ) zkLedger: Privacy-Preserving Auditing for Distributed Ledgers Neha Narula, Willy Vasquez, Madars Virza
2018/240 (PDF ) Towards Non-Interactive Zero-Knowledge for NP from LWE Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki
2018/239 (PDF ) RepuCoin: Your Reputation is Your Power Jiangshan Yu, David Kozhaya, Jeremie Decouchant, Paulo Esteves-Verissimo
2018/238 (PDF ) Private Set Intersection with Linear Communication from General Assumptions Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
2018/237 (PDF ) On Tightly Secure Non-Interactive Key Exchange Julia Hesse, Dennis Hofheinz, Lisa Kohl
2018/236 (PDF ) Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network Yuval Marcus, Ethan Heilman, Sharon Goldberg
2018/235 (PDF ) Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds Julian Loss, Tal Moran
2018/234 (PDF ) P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations Hagen Sparka, Florian Tschorsch, Björn Scheuermann
2018/233 (PDF ) Privacy-Preserving Logistic Regression Training Charlotte Bonte, Frederik Vercauteren
2018/232 (PDF ) Improved fully homomorphic public-key encryption with small ciphertext size Masahiro Yagisawa
2018/231 (PDF ) The Violation of Bell's Inequality Represents Nothing Zhengjun Cao, Lihua Liu
2018/230 (PDF ) Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM Jan-Pieter D’Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren
2018/229 (PDF ) Optimizing polynomial convolution for NTRUEncrypt Wei Dai, William Whyte, Zhenfei Zhang
2018/228 (PDF ) Non-interactive zaps of knowledge Georg Fuchsbauer, Michele Orrù
2018/227 (PDF ) Can We Overcome the $n \log n$ Barrier for Oblivious Sorting? Wei-Kai Lin, Elaine Shi, Tiancheng Xie
2018/226 (PDF ) Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models Sandro Coretti, Yevgeniy Dodis, Siyao Guo
2018/225 (PDF ) A foundation for secret, verifiable elections Ben Smyth
2018/224 (PDF ) Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin
2018/223 (PDF ) Shorter double-authentication preventing signatures for small address spaces Bertram Poettering
2018/222 (PDF ) Authentication with weaker trust assumptions for voting systems Elizabeth A. Quaglia, Ben Smyth
2018/221 (PDF ) Bandwidth-Hard Functions: Reductions and Lower Bounds Jeremiah Blocki, Peiyuan Liu, Ling Ren, Samson Zhou
2018/220 (PDF ) PRO-ORAM: Constant Latency Read-Only Oblivious RAM Shruti Tople, Yaoqi Jia, Prateek Saxena
2018/219 (PDF ) On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin
2018/218 (PDF ) On Evaluating Fault Resilient Encoding Schemes in Software Jakub Breier, Xiaolu Hou, Yang Liu
2018/217 (PDF ) Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction Mihir Bellare, Wei Dai
2018/216 (PDF ) Secure Computation with Low Communication from Cross-checking S. Dov Gordon, Samuel Ranellucci, Xiao Wang
2018/215 (PDF ) Towards everlasting privacy and efficient coercion resistance in remote electronic voting Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang
2018/214 (PDF ) RMAC -- A Lightweight Authentication Protocol for Highly Constrained IoT Devices Ahmad Khoureich Ka
2018/213 (PDF ) Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack I. Stewart, D. Ilie, A. Zamyatin, S. Werner, M. F. Torshizi, W. J. Knottenbelt
2018/212 (PDF ) How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan
2018/211 (PDF ) Number "Not Used" Once - Practical fault attack on pqm4 implementations of NIST candidates Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2018/210 (PDF ) A Simple Obfuscation Scheme for Pattern-Matching with Wildcards Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
2018/209 (PDF ) CALYPSO: Private Data Management for Decentralized Ledgers Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Linus Gasser, Philipp Jovanovic, Ewa Syta, Bryan Ford
2018/208 (PDF ) TinyKeys: A New Approach to Efficient Multi-Party Computation Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
2018/207 (PDF ) Non-Malleable Codes for Small-Depth Circuits Marshall Ball, Dana Dachman-Soled, Siyao Guo, Tal Malkin, Li-Yang Tan
2018/206 (PDF ) Reading in the Dark: Classifying Encrypted Digits with Functional Encryption Edouard Dufour-Sans, Romain Gay, David Pointcheval
2018/205 (PDF ) Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time Thaddeus Dryja, Quanquan C. Liu, Sunoo Park
2018/204 (PDF ) Short Non-Malleable Codes from Related-Key Secure Block Ciphers Serge Fehr, Pierre Karpman, Bart Mennink
2018/203 (PDF ) Impeccable Circuits Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider
2018/202 (PDF ) Doing Real Work with FHE: The Case of Logistic Regression Jack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup
2018/201 (PDF ) Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers Jim Basilakis, Bahman Javadi
2018/200 (PDF ) Hermes. A framework for cryptographically assured access control and data security Eugene Pilyankevich, Ignat Korchagin, Andrey Mnatsakanov
2018/199 (PDF ) Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
2018/198 (PDF ) A Key-recovery Attack on 855-round Trivium Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
2018/197 (PDF ) Green Mining: toward a less energetic impact of cryptocurrencies Philippe Jacquet, Bernard Mans
2018/196 (PDF ) Non-Profiled Deep Learning-Based Side-Channel Attacks Benjamin Timon
2018/195 (PDF ) Breach-Resistant Structured Encryption Ghous Amjad, Seny Kamara, Tarik Moataz
2018/194 (PDF ) Proofs of Catalytic Space Krzysztof Pietrzak
2018/193 (PDF ) A New Family of Pairing-Friendly elliptic curves Michael Scott, Aurore Guillevic
2018/192 (PDF ) SoK: unraveling Bitcoin smart contracts Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino
2018/191 (PDF ) Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
2018/190 (PDF ) New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption Sikhar Patranabis, Debdeep Mukhopadhyay
2018/189 (PDF ) Threshold Implementation in Software - Case Study of PRESENT Pascal Sasdrich, René Bock, Amir Moradi
2018/188 (PDF ) Kissing numbers and transference theorems from generalized tail bounds Stephen D. Miller, Noah Stephens-Davidowitz
2018/187 (PDF ) Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model Sean Bowe, Ariel Gabizon
2018/186 (PDF ) RKHD ElGamal signing and 1-way sums Daniel R. L. Brown
2018/185 (PDF ) A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
2018/184 (PDF ) Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI Yongjun Zhao, Sherman S. M. Chow
2018/183 (PDF ) Simple Proofs of Sequential Work Bram Cohen, Krzysztof Pietrzak
2018/182 (PDF ) Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES Lorenzo Grassi, Christian Rechberger
2018/181 (PDF ) Rasta: A cipher with low ANDdepth and few ANDs per bit Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger
2018/180 (PDF ) Two-Round Multiparty Secure Computation Minimizing Public Key Operations Sanjam Garg, Peihan Miao, Akshayaram Srinivasan
2018/179 (PDF ) Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations Ken Goss, Wei Jiang
2018/177 (PDF ) On the Use of Independent Component Analysis to Denoise Side-Channel Measurements Houssem Maghrebi, Emmanuel Prouff
2018/176 (PDF ) Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability Kamil Kluczniak, Man Ho Au
2018/175 (PDF ) Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys Vincent Grosso
2018/174 (PDF ) A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers Chen-Dong Ye, Tian Tian
2018/173 (PDF ) Vectorizing Higher-Order Masking Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, Ko Stoffelen
2018/172 (PDF ) A First-Order SCA Resistant AES without Fresh Randomness Felix Wegener, Amir Moradi
2018/171 (PDF ) On the Complexity of Simulating Auxiliary Input Yi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao
2018/170 (PDF ) On the Ring-LWE and Polynomial-LWE problems Miruna Rosca, Damien Stehlé, Alexandre Wallet
2018/169 (PDF ) Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method Srimanta Bhattacharya, Mridul Nandi
2018/168 (PDF ) Statistical Witness Indistinguishability (and more) in Two Messages Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
2018/167 (PDF ) On the Existence of Three Round Zero-Knowledge Proofs Nils Fleischhacker, Vipul Goyal, Abhishek Jain
2018/166 (PDF ) Optimal Forgeries Against Polynomial-Based MACs and GCM Atul Luykx, Bart Preneel
2018/165 (PDF ) The Wonderful World of Global Random Oracles Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven
2018/164 (PDF ) An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge Pavel Hubáček, Alon Rosen, Margarita Vald
2018/163 (PDF ) OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu
2018/162 (PDF ) Untagging Tor: A Formal Treatment of Onion Encryption Jean Paul Degabriele, Martijn Stam
2018/161 (PDF ) Boomerang Connectivity Table: A New Cryptanalysis Tool Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2018/160 (PDF ) DelegaTEE: Brokered Delegation Using Trusted Execution Environments Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
2018/159 (PDF ) The Missing Difference Problem, and its Applications to Counter Mode Encryption Gaëtan Leurent, Ferdinand Sibleyras
2018/158 (PDF ) Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin
2018/157 (PDF ) ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement Bernardo David, Rafael Dowsley, Mario Larangeira
2018/156 (PDF ) A New Approach to Black-Box Concurrent Secure Computation Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
2018/155 (PDF ) Memory Lower Bounds of Reductions Revisited Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2018/154 (PDF ) Constrained PRFs for NC1 in Traditional Groups Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2018/153 (PDF ) Bootstrapping for Approximate Homomorphic Encryption Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song
2018/152 (PDF ) A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim
2018/151 (PDF ) Adaptively Secure Garbling with Near Optimal Online Complexity Sanjam Garg, Akshayaram Srinivasan
2018/150 (PDF ) Analysis of Error-Correcting Codes for Lattice-Based Key Exchange Tim Fritzmann, Thomas Pöppelmann, Johanna Sepulveda
2018/149 (PDF ) Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation Ilan Komargodski, Eylon Yogev
2018/148 (PDF ) The Complexity of Multiparty PSM Protocols and Related Models Amos Beimel, Eyal Kushilevitz, Pnina Nissim
2018/147 (PDF ) Sustained Space Complexity Joel Alwen, Jeremiah Blocki, Krzysztof Pietrzak
2018/146 (PDF ) Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices Léo Ducas, Cécile Pierrot
2018/145 (PDF ) Fast Near Collision Attack on the Grain v1 Stream Cipher Bin Zhang, Chao Xu, Willi Meier
2018/144 (PDF ) The Communication Complexity of Private Simultaneous Messages, Revisited Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz
2018/143 (PDF ) Conjecturally Superpolynomial Lower Bound for Share Size Shahram Khazaei
2018/142 (PDF ) MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC Rui Zong, Xiaoyang Dong
2018/141 (PDF ) Symbolic security of garbled circuits Baiyu Li, Daniele Micciancio
2018/140 (PDF ) A Reaction Attack on LEDApkc Tomas Fabsic, Viliam Hromada, Pavol Zajac
2018/138 (PDF ) But Why does it Work? A Rational Protocol Design Treatment of Bitcoin Christian Badertscher, Juan Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2018/137 (PDF ) Naor-Reingold Goes Public: The Complexity of Known-key Security Pratik Soni, Stefano Tessaro
2018/136 (PDF ) Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds Priyanka Bose, Viet Tung Hoang, Stefano Tessaro
2018/135 (PDF ) A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT Daniel Jost, Christian Badertscher, Fabio Banfi
2018/134 (PDF ) A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem Ayan Mahalanobis, Vivek Mallick
2018/133 (PDF ) Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
2018/132 (PDF ) On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields Gora Adj, Omran Ahmadi, Alfred Menezes
2018/131 (PDF ) Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum
2018/130 (PDF ) SMT-based Cube Attack on Simeck32/64 Mojtaba Zaheri, Babak Sadeghiyan
2018/129 (PDF ) Multi-mode Cryptocurrency Systems Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou
2018/128 (PDF ) Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation Charanjit S. Jutla
2018/127 (PDF ) Accountability in Security Protocols Robert Künnemann, Deepak Garg, Michael Backes
2018/126 (PDF ) Onion-AE: Foundations of Nested Encryption Phillip Rogaway, Yusi Zhang
2018/125 (PDF ) Challenges in cyber security - Ransomware Phenomenon Pasca Vlad-Raul, Simion Emil
2018/124 (PDF ) Evaluating the indistinguishability of the XTS mode in the proposed security model Nguyen Tuan Anh, Nguyen Bui Cuong
2018/123 (PDF ) Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode) Howard M. Heys
2018/122 (PDF ) BitML: A Calculus for Bitcoin Smart Contracts Massimo Bartoletti, Roberto Zunino
2018/121 (PDF ) ECC mod 8^91+5 Daniel R. L. Brown
2018/120 (PDF ) Efficient Circuit-based PSI via Cuckoo Hashing Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder
2018/119 (PDF ) Drive-by Key-Extraction Cache Attacks from Portable Code Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
2018/118 (PDF ) Updatable Encryption with Post-Compromise Security Anja Lehmann, Bjoern Tackmann
2018/117 (PDF ) An Improved RNS Variant of the BFV Homomorphic Encryption Scheme Shai Halevi, Yuriy Polyakov, Victor Shoup
2018/116 (PDF ) Unbounded ABE via Bilinear Entropy Expansion, Revisited Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee
2018/115 (PDF ) An Improved Affine Equivalence Algorithm for Random Permutations Itai Dinur
2018/114 (PDF ) Offline Assisted Group Key Exchange Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
2018/113 (PDF ) Classification of Balanced Quadratic Functions Lauren De Meyer, Begül Bilgin
2018/112 (PDF ) Just in Time Hashing Benjamin Harsha, Jeremiah Blocki
2018/111 (PDF ) MRHS Solver Based on Linear Algebra and Exhaustive Search Håvard Raddum, Pavol Zajac
2018/110 (PDF ) Rank Analysis of Cubic Multivariate Cryptosystems John Baena, Daniel Cabarcas, Daniel Escudero, Karan Khathuria, Javier Verbel
2018/109 (PDF ) NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck
2018/108 (PDF ) Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains F. Betül Durak, Serge Vaudenay
2018/107 (PDF ) Towards Practical Lattice-Based One-Time Linkable Ring Signatures Carsten Baum, Huang Lin, Sabine Oechsner
2018/106 (PDF ) On the Gold Standard for Security of Universal Steganography Sebastian Berndt, Maciej Liśkiewicz
2018/105 (PDF ) Combining Private Set-Intersection with Secure Two-Party Computation Michele Ciampi, Claudio Orlandi
2018/104 (PDF ) PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus Yonatan Sompolinsky, Shai Wyborski, Aviv Zohar
2018/103 (PDF ) Decomposition of Permutations in a Finite Field Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/102 (PDF ) Grafting Trees: a Fault Attack against the SPHINCS framework Laurent Castelnovi, Ange Martinelli, Thomas Prest
2018/101 (PDF ) A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin
2018/100 (PDF ) A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples Hart Montgomery
2018/099 (PDF ) Improved Bounds on the Threshold Gap in Ramp Secret Sharing Ignacio Cascudo, Jaron Skovsted Gundersen, Diego Ruano
2018/098 (PDF ) How to Reveal the Secrets of an Obscure White-Box Implementation Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang
2018/097 (PDF ) Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2 Andrea Visconti, Federico Gorla
2018/096 (PDF ) Paralysis Proofs: Secure Access-Structure Updates for Cryptocurrencies and More Fan Zhang, Philip Daian, Gabriel Kaptchuk, Iddo Bentov, Ian Miers, Ari Juels
2018/095 (PDF ) Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage Cees-Bart Breunesse, Ilya Kizhvatov, Ruben Muijrers, Albert Spruyt
2018/094 (PDF ) Parameterization of Edwards curves on the rational field Q with given torsion subgroups Linh Tung Vo
2018/093 (PDF ) Statistical Attacks on Cookie Masking for RC4 Kenneth G. Paterson, Jacob C. N. Schuldt
2018/092 (PDF ) Constructions of S-boxes with uniform sharing Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2018/091 (PDF ) Polynomial multiplication over binary finite fields: new upper bounds Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo
2018/090 (PDF ) Secure and Scalable Multi-User Searchable Encryption Cédric Van Rompay, Refik Molva, Melek Önen
2018/089 (PDF ) The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
2018/088 (PDF ) Fully homomorphic public-key encryption with small ciphertext size Masahiro Yagisawa
2018/087 (PDF ) (Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, William J. Knottenbelt
2018/086 (PDF ) Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform Claude Carlet, Xi Chen
2018/085 (PDF ) Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version) Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin
2018/084 (PDF ) Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher Gideon Samid
2018/083 (PDF ) Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017 Maki Yoshida, Satoshi Obana
2018/082 (PDF ) Synchronized Aggregate Signatures from the RSA Assumption Susan Hohenberger, Brent Waters
2018/081 (PDF ) How to validate the secret of a Ring Learning with Errors (RLWE) key Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough
2018/080 (PDF ) A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling, Kenneth G. Paterson
2018/079 (PDF ) Progressive lattice sieving Thijs Laarhoven, Artur Mariano
2018/078 (PDF ) A Systematic Approach To Cryptocurrency Fees Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov
2018/077 (PDF ) On the Bit Security of Cryptographic Primitives Daniele Micciancio, Michael Walter
2018/076 (PDF ) EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread Daniel Dinu, Ilya Kizhvatov
2018/075 (PDF ) MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang
2018/074 (PDF ) Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang
2018/073 (PDF ) GAZELLE: A Low Latency Framework for Secure Neural Network Inference Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
2018/072 (PDF ) Template-based Fault Injection Analysis of Block Ciphers Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay
2018/071 (PDF ) SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas
2018/070 (PDF ) A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures Craig Gentry, Adam O'Neill, Leonid Reyzin
2018/069 (PDF ) Reusing Nonces in Schnorr Signatures Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud
2018/068 (PDF ) Simple Schnorr Multi-Signatures with Applications to Bitcoin Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille
2018/067 (PDF ) Homomorphic Lower Digits Removal and Improved FHE Bootstrapping Hao Chen, Kyoohyung Han
2018/066 (PDF ) Tweaking Generic OTR to Avoid Forgery Attacks Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
2018/065 (PDF ) Non-Locality in Interactive Proofs Claude Crépeau, Nan Yang
2018/064 (PDF ) Systematization Of A 256-Bit Lightweight Block Cipher Marvin Sukanya Saha, Krishnendu Rarhi, Abhishek Bhattacharya
2018/063 (PDF ) The Viability of Post-quantum X.509 Certificates Panos Kampanakis, Peter Panburana, Ellie Daw, Daniel Van Geest
2018/062 (PDF ) Countermeasures against a side-channel attack in a kernel memory Na-Young Ahn, Dong Hoon Lee
2018/061 (PDF ) Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption Pratish Datta, Tatsuaki Okamoto, Junichi Tomida
2018/060 (PDF ) A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks Abhinav Aggarwal, Yue Guo
2018/059 (PDF ) New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC Chen-Dong Ye, Tian Tian
2018/058 (PDF ) Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters Divesh Aggarwal, Tomasz Kazana, Maciej Obremski
2018/057 (PDF ) Efficient Noninteractive Certification of RSA Moduli and Beyond Sharon Goldberg, Leonid Reyzin, Omar Sagga, Foteini Baldimtsi
2018/056 (PDF ) SETLA: Signature and Encryption from Lattices François Gérard, Keno Merckx
2018/055 (PDF ) High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl
2018/054 (PDF ) More Efficient (Almost) Tightly Secure Structure-Preserving Signatures Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan
2018/053 (PDF ) Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database Emmanuel Prouff, Remi Strullu, Ryad Benadjila, Eleonora Cagli, Cecile Dumas
2018/052 (PDF ) Optimizing Trees for Static Searchable Encryption Mohammad Etemad, Mohammad Mahmoody, David Evans
2018/051 (PDF ) Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis, John C. Mitchell
2018/050 (PDF ) A Constructive Perspective on Signcryption Security Christian Badertscher, Fabio Banfi, Ueli Maurer
2018/049 (PDF ) Attacks and Countermeasures for White-box Designs Alex Biryukov, Aleksei Udovenko
2018/048 (PDF ) Impossible Differential Cryptanalysis on Deoxys-BC-256 Alireza mehrdad, Farokhlagha Moazami, Hadi Soleimany
2018/047 (PDF ) The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA Boris Ryabko, Aleksandr Soskov
2018/046 (PDF ) Scalable, transparent, and post-quantum secure computational integrity Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, Michael Riabzev
2018/045 (PDF ) Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials Jonathan Bootle, Jens Groth
2018/044 (PDF ) Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka
2018/043 (PDF ) Efficient Adaptively Secure Zero-knowledge from Garbled Circuits Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar
2018/042 (PDF ) Improved (Almost) Tightly-Secure Structure-Preserving Signatures Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy
2018/041 (PDF ) Related Randomness Security for Public Key Encryption, Revisited Takahiro Matsuda, Jacob C. N. Schuldt
2018/040 (PDF ) An Analysis of Acceptance Policies For Blockchain Transactions Seb Neumayer, Mayank Varia, Ittay Eyal
2018/039 (PDF ) Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography Gregor Seiler
2018/038 (PDF ) On the Message Complexity of Secure Multiparty Computation Yuval Ishai, Manika Mittal, Rafail Ostrovsky
2018/037 (PDF ) Weakly Secure Equivalence-Class Signatures from Standard Assumptions Georg Fuchsbauer, Romain Gay
2018/036 (PDF ) Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs Peter Scholl
2018/035 (PDF ) A Linearly Homomorphic Signature Scheme From Weaker Assumptions Lucas Schabhüser, Johannes Buchmann, Patrick Struck
2018/034 (PDF ) Constant-size Group Signatures from Lattices San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2018/033 (PDF ) Two-Factor Password-Authenticated Key Exchange with End-to-End Password Security Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2018/031 (PDF ) Secure Remote Attestation Markus Jakobsson
2018/030 (PDF ) Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu
2018/029 (PDF ) Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018/028 (PDF ) Compact Energy and Delay-Aware Authentication Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz
2018/027 (PDF ) A verifiable shuffle for the GSW cryptosystem Martin Strand
2018/026 (PDF ) Zero-Knowledge Proof of Decryption for FHE Ciphertexts Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand
2018/025 (PDF ) Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li
2018/024 (PDF ) KEM Combiners Federico Giacon, Felix Heuer, Bertram Poettering
2018/023 (PDF ) Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups Benedikt Auerbach, Mihir Bellare, Eike Kiltz
2018/022 (PDF ) Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices Ali El Kaafarani, Shuichi Katsumata
2018/021 (PDF ) Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography Yu Chen, Baodong Qin, Haiyang Xue
2018/020 (PDF ) Ciphertext-Only Attacks against Compact-LWE Submitted to NIST PQC Project Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
2018/019 (PDF ) Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. Daniel P. Martin, Luke Mather, Elisabeth Oswald
2018/018 (PDF ) Multi-Key Searchable Encryption, Revisited Ariel Hamlin, abhi shelat, Mor Weiss, Daniel Wichs
2018/017 (PDF ) Verifiability of Helios Mixnet Ben Smyth
2018/016 (PDF ) New Techniques for Public Key Encryption with Sender Recovery Murali Godi, Roopa Vishwanathan
2018/015 (PDF ) On Composable Security for Digital Signatures Christian Badertscher, Ueli Maurer, Björn Tackmann
2018/014 (PDF ) Ubiquitous Weak-key Classes of BRW-polynomial Function Kaiyan Zheng, Peng Wang, Dingfeng Ye
2018/013 (PDF ) Hashing solutions instead of generating problems: On the interactive certification of RSA moduli Benedikt Auerbach, Bertram Poettering
2018/012 (PDF ) An Inside Job: Remote Power Analysis Attacks on FPGAs Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi B. Tahoori
2018/011 (PDF ) Graded Encoding Schemes from Obfuscation Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
2018/010 (PDF ) Interactively Secure Groups from Obfuscation Thomas Agrikola, Dennis Hofheinz
2018/009 (PDF ) Evaluation of Resilience of randomized RNS implementation Jérôme Courtois, Lokman Abbas-Turki, Jean-Claude Bajard
2018/008 (PDF ) Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems Yu-Ao Chen, Xiao-Shan Gao
2018/007 (PDF ) An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks Qiong Huang, Hongbo Li
2018/006 (PDF ) Higher Order Side-Channel Attacks Resilient S-boxes Liran Lerman, Stjepan Picek, Nikita Veshchikov, Olivier Markowitch
2018/005 (PDF ) Simple and Efficient Two-Server ORAM S. Dov Gordon, Jonathan Katz, Xiao Wang
2018/004 (PDF ) On the Performance of Convolutional Neural Networks for Side-channel Analysis Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay
2018/003 (PDF ) How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior Moni Naor, Benny Pinkas, Eyal Ronen
2018/002 (PDF ) The Multiplicative Complexity of 6-variable Boolean Functions Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
2018/001 (PDF ) On the Power of Amortization in Secret Sharing: $d$-Uniform Secret Sharing and CDS with Constant Information Rate Benny Applebaum, Barak Arkis
[ Cryptology ePrint archive ]